From patchwork Mon Sep 4 14:22:36 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29934 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1C253C88CB2 for ; Mon, 4 Sep 2023 14:22:54 +0000 (UTC) Received: from mail-pg1-f171.google.com (mail-pg1-f171.google.com [209.85.215.171]) by mx.groups.io with SMTP id smtpd.web10.48935.1693837370909601531 for ; Mon, 04 Sep 2023 07:22:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=NekglP9J; spf=softfail (domain: sakoman.com, ip: 209.85.215.171, mailfrom: steve@sakoman.com) Received: by mail-pg1-f171.google.com with SMTP id 41be03b00d2f7-56a9c951aaaso535156a12.3 for ; Mon, 04 Sep 2023 07:22:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1693837370; x=1694442170; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=RWVSe2sashryRY5PRD76Zbrpe6xa4WlTVX+DihA4VSc=; b=NekglP9JKrg7gYln0QMAiuGAHSdAhs9teZ86dpJkkUu+FZaZvxR6YCdtCur9sLT95/ Y7MTRY6/GCaMn7aQ5e+y0+Y6uP3V01OU7FHv7UuSi1u5jV6XrwJdO+TaVUG2WAfAKuR9 KB4GIVeS12Mr8SumhPimr8YSCXvEfxgfBvUhksw41WNgqx1MDEn9DvwGWYkrL3WmXZyY LU6dEipCyDwyTqFYClR7R40KeM2z0F3F/nJq7HTny5hF0GC6ihFexpTrlIhbVzK4uwzV kU/b90+ZldPabMYIZSowLN2xkKLQ87SPkQEcr74jtNlTlaUbg+V2FtC+94lj2hgl8QjP pUDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693837370; x=1694442170; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RWVSe2sashryRY5PRD76Zbrpe6xa4WlTVX+DihA4VSc=; b=M9KGmd6s7cIhvRJQt4K19YVVC3g455TKdMdoKKs7RENahsTV5pM3bCEQsp3TyH2IFI w1z3HEhEOS3/v8eOfJBemAXG6NBQnUPDbqTIhkl7gxF295Czbe6VaPtWppC5LrfHWYuR dj4aWOWnp3n47lizkuAd+lvJObqZWgCHfCx1rRQdgOfkiZbYNyBrzihigSATFfii2SzY G6A1L+t7+h8RbETzR1G1zKymkbFadUzgTKVDtuBOAwgi3m+tlJH+toMC2fLg09aqptzp wtU8Ijpj+OPq2dCxkyihA92erAEvY7oOg6BYEdK5G/bBBbZxtReK20b8y6t3qTlNOk4G YXiw== X-Gm-Message-State: AOJu0YzeUGymTC8uYPVJIxugCof5gV/J0DIbUsO4cwW4uaCzghLW1qE3 3d/kwUPBTxVnUzb+iDL7+i/Zd2ZnAOmqLw+8Wek= X-Google-Smtp-Source: AGHT+IH/e6Eefq1/HJp5oEndq0bwSthwx/b5kDmYhqIEabPQp//W6A0BhmUSajZfahAwBby9wwOu+Q== X-Received: by 2002:a05:6a21:33a7:b0:14b:8b51:44b0 with SMTP id yy39-20020a056a2133a700b0014b8b5144b0mr10660116pzb.37.1693837369495; Mon, 04 Sep 2023 07:22:49 -0700 (PDT) Received: from xps13.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id z14-20020aa785ce000000b00689f10adef9sm7443032pfn.67.2023.09.04.07.22.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Sep 2023 07:22:49 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 1/5] inetutils: Backport fix for CVE-2023-40303 Date: Mon, 4 Sep 2023 04:22:36 -1000 Message-Id: <57f6d8548e778712eb11507e889f3eadf3732041.1693837232.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Sep 2023 14:22:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187183 From: Vijay Anusuri Upstream-commit: https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6 & https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=9122999252c7e21eb7774de11d539748e7bdf46d Signed-off-by: Vijay Anusuri Signed-off-by: Steve Sakoman --- ...tpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch | 283 ++++++++++++++++++ ...03-Indent-changes-in-previous-commit.patch | 254 ++++++++++++++++ .../inetutils/inetutils_1.9.4.bb | 2 + 3 files changed, 539 insertions(+) create mode 100644 meta/recipes-connectivity/inetutils/inetutils/0001-CVE-2023-40303-ftpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch create mode 100644 meta/recipes-connectivity/inetutils/inetutils/0002-CVE-2023-40303-Indent-changes-in-previous-commit.patch diff --git a/meta/recipes-connectivity/inetutils/inetutils/0001-CVE-2023-40303-ftpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch b/meta/recipes-connectivity/inetutils/inetutils/0001-CVE-2023-40303-ftpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch new file mode 100644 index 0000000000..aea07bd803 --- /dev/null +++ b/meta/recipes-connectivity/inetutils/inetutils/0001-CVE-2023-40303-ftpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch @@ -0,0 +1,283 @@ +From 703418fe9d2e3b1e8d594df5788d8001a8116265 Mon Sep 17 00:00:00 2001 +From: Jeffrey Bencteux +Date: Fri, 30 Jun 2023 19:02:45 +0200 +Subject: [PATCH] CVE-2023-40303: ftpd,rcp,rlogin,rsh,rshd,uucpd: fix: check + set*id() return values + +Several setuid(), setgid(), seteuid() and setguid() return values +were not checked in ftpd/rcp/rlogin/rsh/rshd/uucpd code potentially +leading to potential security issues. + +CVE: CVE-2023-40303 +Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6] +Signed-off-by: Jeffrey Bencteux +Signed-off-by: Simon Josefsson +Signed-off-by: Khem Raj +Signed-off-by: Vijay Anusuri +--- + ftpd/ftpd.c | 10 +++++++--- + src/rcp.c | 39 +++++++++++++++++++++++++++++++++------ + src/rlogin.c | 11 +++++++++-- + src/rsh.c | 25 +++++++++++++++++++++---- + src/rshd.c | 20 +++++++++++++++++--- + src/uucpd.c | 15 +++++++++++++-- + 6 files changed, 100 insertions(+), 20 deletions(-) + +diff --git a/ftpd/ftpd.c b/ftpd/ftpd.c +index 5db88d0..b52b122 100644 +--- a/ftpd/ftpd.c ++++ b/ftpd/ftpd.c +@@ -862,7 +862,9 @@ end_login (struct credentials *pcred) + char *remotehost = pcred->remotehost; + int atype = pcred->auth_type; + +- seteuid ((uid_t) 0); ++ if (seteuid ((uid_t) 0) == -1) ++ _exit (EXIT_FAILURE); ++ + if (pcred->logged_in) + { + logwtmp_keep_open (ttyline, "", ""); +@@ -1151,7 +1153,8 @@ getdatasock (const char *mode) + + if (data >= 0) + return fdopen (data, mode); +- seteuid ((uid_t) 0); ++ if (seteuid ((uid_t) 0) == -1) ++ _exit (EXIT_FAILURE); + s = socket (ctrl_addr.ss_family, SOCK_STREAM, 0); + if (s < 0) + goto bad; +@@ -1978,7 +1981,8 @@ passive (int epsv, int af) + else /* !AF_INET6 */ + ((struct sockaddr_in *) &pasv_addr)->sin_port = 0; + +- seteuid ((uid_t) 0); ++ if (seteuid ((uid_t) 0) == -1) ++ _exit (EXIT_FAILURE); + if (bind (pdata, (struct sockaddr *) &pasv_addr, pasv_addrlen) < 0) + { + if (seteuid ((uid_t) cred.uid)) +diff --git a/src/rcp.c b/src/rcp.c +index bafa35f..366295c 100644 +--- a/src/rcp.c ++++ b/src/rcp.c +@@ -347,14 +347,23 @@ main (int argc, char *argv[]) + if (from_option) + { /* Follow "protocol", send data. */ + response (); +- setuid (userid); ++ ++ if (setuid (userid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } ++ + source (argc, argv); + exit (errs); + } + + if (to_option) + { /* Receive data. */ +- setuid (userid); ++ if (setuid (userid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } ++ + sink (argc, argv); + exit (errs); + } +@@ -539,7 +548,11 @@ toremote (char *targ, int argc, char *argv[]) + if (response () < 0) + exit (EXIT_FAILURE); + free (bp); +- setuid (userid); ++ ++ if (setuid (userid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } + } + source (1, argv + i); + close (rem); +@@ -634,7 +647,12 @@ tolocal (int argc, char *argv[]) + ++errs; + continue; + } +- seteuid (userid); ++ ++ if (seteuid (userid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); ++ } ++ + #if defined IP_TOS && defined IPPROTO_IP && defined IPTOS_THROUGHPUT + sslen = sizeof (ss); + (void) getpeername (rem, (struct sockaddr *) &ss, &sslen); +@@ -647,7 +665,12 @@ tolocal (int argc, char *argv[]) + #endif + vect[0] = target; + sink (1, vect); +- seteuid (effuid); ++ ++ if (seteuid (effuid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); ++ } ++ + close (rem); + rem = -1; + #ifdef SHISHI +@@ -1453,7 +1476,11 @@ susystem (char *s, int userid) + return (127); + + case 0: +- setuid (userid); ++ if (setuid (userid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } ++ + execl (PATH_BSHELL, "sh", "-c", s, NULL); + _exit (127); + } +diff --git a/src/rlogin.c b/src/rlogin.c +index e5e11a7..6b38901 100644 +--- a/src/rlogin.c ++++ b/src/rlogin.c +@@ -649,8 +649,15 @@ try_connect: + /* Now change to the real user ID. We have to be set-user-ID root + to get the privileged port that rcmd () uses. We now want, however, + to run as the real user who invoked us. */ +- seteuid (uid); +- setuid (uid); ++ if (seteuid (uid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); ++ } ++ ++ if (setuid (uid) == -1) ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } + + doit (&osmask); /* The old mask will activate SIGURG and SIGUSR1! */ + +diff --git a/src/rsh.c b/src/rsh.c +index bd70372..b451a70 100644 +--- a/src/rsh.c ++++ b/src/rsh.c +@@ -278,8 +278,17 @@ main (int argc, char **argv) + { + if (asrsh) + *argv = (char *) "rlogin"; +- seteuid (getuid ()); +- setuid (getuid ()); ++ ++ if (seteuid (getuid ()) == -1) ++ { ++ error (EXIT_FAILURE, errno, "seteuid() failed"); ++ } ++ ++ if (setuid (getuid ()) == -1) ++ { ++ error (EXIT_FAILURE, errno, "setuid() failed"); ++ } ++ + execv (PATH_RLOGIN, argv); + error (EXIT_FAILURE, errno, "cannot execute %s", PATH_RLOGIN); + } +@@ -543,8 +552,16 @@ try_connect: + error (0, errno, "setsockopt DEBUG (ignored)"); + } + +- seteuid (uid); +- setuid (uid); ++ if (seteuid (uid) == -1) ++ { ++ error (EXIT_FAILURE, errno, "seteuid() failed"); ++ } ++ ++ if (setuid (uid) == -1) ++ { ++ error (EXIT_FAILURE, errno, "setuid() failed"); ++ } ++ + #ifdef HAVE_SIGACTION + sigemptyset (&sigs); + sigaddset (&sigs, SIGINT); +diff --git a/src/rshd.c b/src/rshd.c +index b824a10..8cdcd06 100644 +--- a/src/rshd.c ++++ b/src/rshd.c +@@ -1848,8 +1848,18 @@ doit (int sockfd, struct sockaddr *fromp, socklen_t fromlen) + pwd->pw_shell = PATH_BSHELL; + + /* Set the gid, then uid to become the user specified by "locuser" */ +- setegid ((gid_t) pwd->pw_gid); +- setgid ((gid_t) pwd->pw_gid); ++ if (setegid ((gid_t) pwd->pw_gid) == -1) ++ { ++ rshd_error ("Cannot drop privileges (setegid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } ++ ++ if (setgid ((gid_t) pwd->pw_gid) == -1) ++ { ++ rshd_error ("Cannot drop privileges (setgid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } ++ + #ifdef HAVE_INITGROUPS + initgroups (pwd->pw_name, pwd->pw_gid); /* BSD groups */ + #endif +@@ -1871,7 +1881,11 @@ doit (int sockfd, struct sockaddr *fromp, socklen_t fromlen) + } + #endif /* WITH_PAM */ + +- setuid ((uid_t) pwd->pw_uid); ++ if (setuid ((uid_t) pwd->pw_uid) == -1) ++ { ++ rshd_error ("Cannot drop privileges (setuid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } + + /* We'll execute the client's command in the home directory + * of locuser. Note, that the chdir must be executed after +diff --git a/src/uucpd.c b/src/uucpd.c +index 55c3d44..6aba294 100644 +--- a/src/uucpd.c ++++ b/src/uucpd.c +@@ -254,7 +254,12 @@ doit (struct sockaddr *sap, socklen_t salen) + sprintf (Username, "USER=%s", user); + sprintf (Logname, "LOGNAME=%s", user); + dologin (pw, sap, salen); +- setgid (pw->pw_gid); ++ ++ if (setgid (pw->pw_gid) == -1) ++ { ++ fprintf (stderr, "setgid() failed"); ++ return; ++ } + #ifdef HAVE_INITGROUPS + initgroups (pw->pw_name, pw->pw_gid); + #endif +@@ -263,7 +268,13 @@ doit (struct sockaddr *sap, socklen_t salen) + fprintf (stderr, "Login incorrect."); + return; + } +- setuid (pw->pw_uid); ++ ++ if (setuid (pw->pw_uid) == -1) ++ { ++ fprintf (stderr, "setuid() failed"); ++ return; ++ } ++ + execl (uucico_location, "uucico", NULL); + perror ("uucico server: execl"); + } +-- +2.25.1 + diff --git a/meta/recipes-connectivity/inetutils/inetutils/0002-CVE-2023-40303-Indent-changes-in-previous-commit.patch b/meta/recipes-connectivity/inetutils/inetutils/0002-CVE-2023-40303-Indent-changes-in-previous-commit.patch new file mode 100644 index 0000000000..4bc354d256 --- /dev/null +++ b/meta/recipes-connectivity/inetutils/inetutils/0002-CVE-2023-40303-Indent-changes-in-previous-commit.patch @@ -0,0 +1,254 @@ +From 70fe022f9dac760eaece0228cad17e3d29a57fb8 Mon Sep 17 00:00:00 2001 +From: Simon Josefsson +Date: Mon, 31 Jul 2023 13:59:05 +0200 +Subject: [PATCH] CVE-2023-40303: Indent changes in previous commit. + +CVE: CVE-2023-40303 +Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=9122999252c7e21eb7774de11d539748e7bdf46d] +Signed-off-by: Khem Raj +Signed-off-by: Vijay Anusuri +--- + src/rcp.c | 42 ++++++++++++++++++++++++------------------ + src/rlogin.c | 12 ++++++------ + src/rsh.c | 24 ++++++++++++------------ + src/rshd.c | 24 ++++++++++++------------ + src/uucpd.c | 16 ++++++++-------- + 5 files changed, 62 insertions(+), 56 deletions(-) + +diff --git a/src/rcp.c b/src/rcp.c +index cdcf8500..652f22e6 100644 +--- a/src/rcp.c ++++ b/src/rcp.c +@@ -347,9 +347,10 @@ main (int argc, char *argv[]) + response (); + + if (setuid (userid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (setuid() failed)"); ++ } + + source (argc, argv); + exit (errs); +@@ -358,9 +359,10 @@ main (int argc, char *argv[]) + if (to_option) + { /* Receive data. */ + if (setuid (userid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (setuid() failed)"); ++ } + + sink (argc, argv); + exit (errs); +@@ -548,9 +550,10 @@ toremote (char *targ, int argc, char *argv[]) + free (bp); + + if (setuid (userid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (setuid() failed)"); ++ } + } + source (1, argv + i); + close (rem); +@@ -645,9 +648,10 @@ tolocal (int argc, char *argv[]) + } + + if (seteuid (userid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (seteuid() failed)"); ++ } + + #if defined IP_TOS && defined IPPROTO_IP && defined IPTOS_THROUGHPUT + sslen = sizeof (ss); +@@ -663,9 +667,10 @@ tolocal (int argc, char *argv[]) + sink (1, vect); + + if (seteuid (effuid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (seteuid() failed)"); ++ } + + close (rem); + rem = -1; +@@ -1465,9 +1470,10 @@ susystem (char *s, int userid) + + case 0: + if (setuid (userid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, ++ "Could not drop privileges (setuid() failed)"); ++ } + + execl (PATH_BSHELL, "sh", "-c", s, NULL); + _exit (127); +diff --git a/src/rlogin.c b/src/rlogin.c +index c543de0c..4360202f 100644 +--- a/src/rlogin.c ++++ b/src/rlogin.c +@@ -648,14 +648,14 @@ try_connect: + to get the privileged port that rcmd () uses. We now want, however, + to run as the real user who invoked us. */ + if (seteuid (uid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (seteuid() failed)"); ++ } + + if (setuid (uid) == -1) +- { +- error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); +- } ++ { ++ error (EXIT_FAILURE, 0, "Could not drop privileges (setuid() failed)"); ++ } + + doit (&osmask); /* The old mask will activate SIGURG and SIGUSR1! */ + +diff --git a/src/rsh.c b/src/rsh.c +index 6f60667d..179b47cd 100644 +--- a/src/rsh.c ++++ b/src/rsh.c +@@ -278,14 +278,14 @@ main (int argc, char **argv) + *argv = (char *) "rlogin"; + + if (seteuid (getuid ()) == -1) +- { +- error (EXIT_FAILURE, errno, "seteuid() failed"); +- } ++ { ++ error (EXIT_FAILURE, errno, "seteuid() failed"); ++ } + + if (setuid (getuid ()) == -1) +- { +- error (EXIT_FAILURE, errno, "setuid() failed"); +- } ++ { ++ error (EXIT_FAILURE, errno, "setuid() failed"); ++ } + + execv (PATH_RLOGIN, argv); + error (EXIT_FAILURE, errno, "cannot execute %s", PATH_RLOGIN); +@@ -551,14 +551,14 @@ try_connect: + } + + if (seteuid (uid) == -1) +- { +- error (EXIT_FAILURE, errno, "seteuid() failed"); +- } ++ { ++ error (EXIT_FAILURE, errno, "seteuid() failed"); ++ } + + if (setuid (uid) == -1) +- { +- error (EXIT_FAILURE, errno, "setuid() failed"); +- } ++ { ++ error (EXIT_FAILURE, errno, "setuid() failed"); ++ } + + #ifdef HAVE_SIGACTION + sigemptyset (&sigs); +diff --git a/src/rshd.c b/src/rshd.c +index 707790e7..3a153a18 100644 +--- a/src/rshd.c ++++ b/src/rshd.c +@@ -1848,16 +1848,16 @@ doit (int sockfd, struct sockaddr *fromp, socklen_t fromlen) + + /* Set the gid, then uid to become the user specified by "locuser" */ + if (setegid ((gid_t) pwd->pw_gid) == -1) +- { +- rshd_error ("Cannot drop privileges (setegid() failed)\n"); +- exit (EXIT_FAILURE); +- } ++ { ++ rshd_error ("Cannot drop privileges (setegid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } + + if (setgid ((gid_t) pwd->pw_gid) == -1) +- { +- rshd_error ("Cannot drop privileges (setgid() failed)\n"); +- exit (EXIT_FAILURE); +- } ++ { ++ rshd_error ("Cannot drop privileges (setgid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } + + #ifdef HAVE_INITGROUPS + initgroups (pwd->pw_name, pwd->pw_gid); /* BSD groups */ +@@ -1881,10 +1881,10 @@ doit (int sockfd, struct sockaddr *fromp, socklen_t fromlen) + #endif /* WITH_PAM */ + + if (setuid ((uid_t) pwd->pw_uid) == -1) +- { +- rshd_error ("Cannot drop privileges (setuid() failed)\n"); +- exit (EXIT_FAILURE); +- } ++ { ++ rshd_error ("Cannot drop privileges (setuid() failed)\n"); ++ exit (EXIT_FAILURE); ++ } + + /* We'll execute the client's command in the home directory + * of locuser. Note, that the chdir must be executed after +diff --git a/src/uucpd.c b/src/uucpd.c +index 29cfce35..fde7b9c9 100644 +--- a/src/uucpd.c ++++ b/src/uucpd.c +@@ -254,10 +254,10 @@ doit (struct sockaddr *sap, socklen_t salen) + dologin (pw, sap, salen); + + if (setgid (pw->pw_gid) == -1) +- { +- fprintf (stderr, "setgid() failed"); +- return; +- } ++ { ++ fprintf (stderr, "setgid() failed"); ++ return; ++ } + #ifdef HAVE_INITGROUPS + initgroups (pw->pw_name, pw->pw_gid); + #endif +@@ -268,10 +268,10 @@ doit (struct sockaddr *sap, socklen_t salen) + } + + if (setuid (pw->pw_uid) == -1) +- { +- fprintf (stderr, "setuid() failed"); +- return; +- } ++ { ++ fprintf (stderr, "setuid() failed"); ++ return; ++ } + + execl (uucico_location, "uucico", NULL); + perror ("uucico server: execl"); diff --git a/meta/recipes-connectivity/inetutils/inetutils_1.9.4.bb b/meta/recipes-connectivity/inetutils/inetutils_1.9.4.bb index fe391b8bce..3a68b34825 100644 --- a/meta/recipes-connectivity/inetutils/inetutils_1.9.4.bb +++ b/meta/recipes-connectivity/inetutils/inetutils_1.9.4.bb @@ -25,6 +25,8 @@ SRC_URI = "${GNU_MIRROR}/inetutils/inetutils-${PV}.tar.gz \ file://fix-buffer-fortify-tfpt.patch \ file://CVE-2021-40491.patch \ file://CVE-2022-39028.patch \ + file://0001-CVE-2023-40303-ftpd-rcp-rlogin-rsh-rshd-uucpd-fix-ch.patch \ + file://0002-CVE-2023-40303-Indent-changes-in-previous-commit.patch \ " SRC_URI[md5sum] = "04852c26c47cc8c6b825f2b74f191f52" From patchwork Mon Sep 4 14:22:37 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29935 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 128C4C83F33 for ; Mon, 4 Sep 2023 14:22:54 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.48937.1693837372631342839 for ; Mon, 04 Sep 2023 07:22:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=OLfs3G8w; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-68ca2a37c6aso1445571b3a.0 for ; Mon, 04 Sep 2023 07:22:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1693837371; x=1694442171; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=lH/Pu7nFcnTF8IDDfjBhzn/gWKz4Qdqq/1gxC/CsoxM=; b=OLfs3G8wQ7+nnWFe5M2/nrxCP6aMnZppxo3kW0pXahcufpLL70CFZdjccDelReOMhf R5QwPO9JW5gXNmReYzLdtVypRrRCvwcbukaW53A8xa9qRe6KTg4MMNaOwDUrdluNf5cO tZpI3DQLjHy7tLyaSyvr31XyIpsYIOAH/0rNkNMcQuFguFjmzXFdyZ3NhPjUZqfOUjhT rQwCbR/6WVLk3B34vEQro86NLLIpnvSQ7qm0EXjCJrI8ZTRZXwd4Fn+RWjscCNHUcO3z g1sBIoDm17Tv7+HzxjG4weIbwiUb27SsLjvue2zw1HK5CCXdJqQf9UY/QRG++JmRYsSQ dmFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693837371; x=1694442171; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=lH/Pu7nFcnTF8IDDfjBhzn/gWKz4Qdqq/1gxC/CsoxM=; b=dnEXYFHQ47wYbgU6tMEuRXK93qklB4dq4yyYvLvntPDJiAbLciSRacRKDDCTC1UEDi htAtOsqdFhT/nHnw2I1Rd9DrrK5HlgVoncBlG69OqhfRv5762EYHFRVL69CZ6NOpteWD 99yWc9SO76J7eCuVXmmnt+RZ5YrnXaZ0pd9ch/dK4LSEXUpzQoaq72xM/6Pn/MdqaBpK 8IpieBHw8WjC5+jBQCUncF6+1PSHeG5cI+HuGpW6C4c9w16+kQhGVZDKUexNX4wRyiY5 nN6GhAhDR+U/ZEQ1Mv7ogk5z8e8HRefDFbclz/+Eu3aHDG2mkwdzukpRpDBeyIqWmXKh 0ozg== X-Gm-Message-State: AOJu0YzWp1IA/SZVU2mbqwge50bbNXjg5CIi4alg7B77Uw6+dAowx+Go xGq8RjkxCDDqqllExgFOlGfcCptP41tPyqJsR5o= X-Google-Smtp-Source: AGHT+IEyYWm+PVkCjVSIrSTN/KmBH0eC282Sb2Xmg0Is/yv3gRcl3ohTIXBX1Z6kkJuv6AnMBhlMTQ== X-Received: by 2002:a05:6a20:7d9c:b0:149:602e:9239 with SMTP id v28-20020a056a207d9c00b00149602e9239mr13518361pzj.21.1693837371378; Mon, 04 Sep 2023 07:22:51 -0700 (PDT) Received: from xps13.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id z14-20020aa785ce000000b00689f10adef9sm7443032pfn.67.2023.09.04.07.22.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Sep 2023 07:22:51 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 2/5] go: Backport fix for CVE-2023-29409 Date: Mon, 4 Sep 2023 04:22:37 -1000 Message-Id: <37212694b9a610b1086ef574673dd24095585f4a.1693837232.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Sep 2023 14:22:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187184 From: Vijay Anusuri Upstream-commit: https://github.com/golang/go/commit/2300f7ef07718f6be4d8aa8486c7de99836e233f Signed-off-by: Vijay Anusuri Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.14.inc | 1 + .../go/go-1.14/CVE-2023-29409.patch | 175 ++++++++++++++++++ 2 files changed, 176 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.14/CVE-2023-29409.patch diff --git a/meta/recipes-devtools/go/go-1.14.inc b/meta/recipes-devtools/go/go-1.14.inc index b2cf805d2d..20377e095b 100644 --- a/meta/recipes-devtools/go/go-1.14.inc +++ b/meta/recipes-devtools/go/go-1.14.inc @@ -69,6 +69,7 @@ SRC_URI += "\ file://CVE-2023-29404.patch \ file://CVE-2023-29400.patch \ file://CVE-2023-29406.patch \ + file://CVE-2023-29409.patch \ " SRC_URI_append_libc-musl = " file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch" diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2023-29409.patch b/meta/recipes-devtools/go/go-1.14/CVE-2023-29409.patch new file mode 100644 index 0000000000..00685cc180 --- /dev/null +++ b/meta/recipes-devtools/go/go-1.14/CVE-2023-29409.patch @@ -0,0 +1,175 @@ +From 2300f7ef07718f6be4d8aa8486c7de99836e233f Mon Sep 17 00:00:00 2001 +From: Roland Shoemaker +Date: Wed, 7 Jun 2023 15:27:13 -0700 +Subject: [PATCH] [release-branch.go1.19] crypto/tls: restrict RSA keys in + certificates to <= 8192 bits + +Extremely large RSA keys in certificate chains can cause a client/server +to expend significant CPU time verifying signatures. Limit this by +restricting the size of RSA keys transmitted during handshakes to <= +8192 bits. + +Based on a survey of publicly trusted RSA keys, there are currently only +three certificates in circulation with keys larger than this, and all +three appear to be test certificates that are not actively deployed. It +is possible there are larger keys in use in private PKIs, but we target +the web PKI, so causing breakage here in the interests of increasing the +default safety of users of crypto/tls seems reasonable. + +Thanks to Mateusz Poliwczak for reporting this issue. + +Updates #61460 +Fixes #61579 +Fixes CVE-2023-29409 + +Change-Id: Ie35038515a649199a36a12fc2c5df3af855dca6c +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1912161 +Reviewed-by: Damien Neil +Reviewed-by: Tatiana Bradley +Run-TryBot: Roland Shoemaker +(cherry picked from commit d865c715d92887361e4bd5596e19e513f27781b7) +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1965487 +Reviewed-on: https://go-review.googlesource.com/c/go/+/514915 +Run-TryBot: David Chase +Reviewed-by: Matthew Dempsky +TryBot-Bypass: David Chase + +Upstream-Status: Backport [https://github.com/golang/go/commit/2300f7ef07718f6be4d8aa8486c7de99836e233f] +CVE: CVE-2023-29409 +Signed-off-by: Vijay Anusuri +--- + src/crypto/tls/handshake_client.go | 8 +++ + src/crypto/tls/handshake_client_test.go | 78 +++++++++++++++++++++++++ + src/crypto/tls/handshake_server.go | 4 ++ + 3 files changed, 90 insertions(+) + +diff --git a/src/crypto/tls/handshake_client.go b/src/crypto/tls/handshake_client.go +index 4fb528c..ba33ea1 100644 +--- a/src/crypto/tls/handshake_client.go ++++ b/src/crypto/tls/handshake_client.go +@@ -788,6 +788,10 @@ func (hs *clientHandshakeState) sendFinished(out []byte) error { + return nil + } + ++// maxRSAKeySize is the maximum RSA key size in bits that we are willing ++// to verify the signatures of during a TLS handshake. ++const maxRSAKeySize = 8192 ++ + // verifyServerCertificate parses and verifies the provided chain, setting + // c.verifiedChains and c.peerCertificates or sending the appropriate alert. + func (c *Conn) verifyServerCertificate(certificates [][]byte) error { +@@ -798,6 +802,10 @@ func (c *Conn) verifyServerCertificate(certificates [][]byte) error { + c.sendAlert(alertBadCertificate) + return errors.New("tls: failed to parse certificate from server: " + err.Error()) + } ++ if cert.PublicKeyAlgorithm == x509.RSA && cert.PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize { ++ c.sendAlert(alertBadCertificate) ++ return fmt.Errorf("tls: server sent certificate containing RSA key larger than %d bits", maxRSAKeySize) ++ } + certs[i] = cert + } + +diff --git a/src/crypto/tls/handshake_client_test.go b/src/crypto/tls/handshake_client_test.go +index 6bd3c37..8d20b2b 100644 +--- a/src/crypto/tls/handshake_client_test.go ++++ b/src/crypto/tls/handshake_client_test.go +@@ -1984,3 +1984,81 @@ func TestCloseClientConnectionOnIdleServer(t *testing.T) { + t.Errorf("Error expected, but no error returned") + } + } ++ ++// discardConn wraps a net.Conn but discards all writes, but reports that they happened. ++type discardConn struct { ++ net.Conn ++} ++ ++func (dc *discardConn) Write(data []byte) (int, error) { ++ return len(data), nil ++} ++ ++// largeRSAKeyCertPEM contains a 8193 bit RSA key ++const largeRSAKeyCertPEM = `-----BEGIN CERTIFICATE----- ++MIIInjCCBIWgAwIBAgIBAjANBgkqhkiG9w0BAQsFADASMRAwDgYDVQQDEwd0ZXN0 ++aW5nMB4XDTIzMDYwNzIxMjMzNloXDTIzMDYwNzIzMjMzNlowEjEQMA4GA1UEAxMH ++dGVzdGluZzCCBCIwDQYJKoZIhvcNAQEBBQADggQPADCCBAoCggQBAWdHsf6Rh2Ca ++n2SQwn4t4OQrOjbLLdGE1pM6TBKKrHUFy62uEL8atNjlcfXIsa4aEu3xNGiqxqur ++ZectlkZbm0FkaaQ1Wr9oikDY3KfjuaXdPdO/XC/h8AKNxlDOylyXwUSK/CuYb+1j ++gy8yF5QFvVfwW/xwTlHmhUeSkVSQPosfQ6yXNNsmMzkd+ZPWLrfq4R+wiNtwYGu0 ++WSBcI/M9o8/vrNLnIppoiBJJ13j9CR1ToEAzOFh9wwRWLY10oZhoh1ONN1KQURx4 ++qedzvvP2DSjZbUccdvl2rBGvZpzfOiFdm1FCnxB0c72Cqx+GTHXBFf8bsa7KHky9 ++sNO1GUanbq17WoDNgwbY6H51bfShqv0CErxatwWox3we4EcAmFHPVTCYL1oWVMGo ++a3Eth91NZj+b/nGhF9lhHKGzXSv9brmLLkfvM1jA6XhNhA7BQ5Vz67lj2j3XfXdh ++t/BU5pBXbL4Ut4mIhT1YnKXAjX2/LF5RHQTE8Vwkx5JAEKZyUEGOReD/B+7GOrLp ++HduMT9vZAc5aR2k9I8qq1zBAzsL69lyQNAPaDYd1BIAjUety9gAYaSQffCgAgpRO ++Gt+DYvxS+7AT/yEd5h74MU2AH7KrAkbXOtlwupiGwhMVTstncDJWXMJqbBhyHPF8 ++3UmZH0hbL4PYmzSj9LDWQQXI2tv6vrCpfts3Cqhqxz9vRpgY7t1Wu6l/r+KxYYz3 ++1pcGpPvRmPh0DJm7cPTiXqPnZcPt+ulSaSdlxmd19OnvG5awp0fXhxryZVwuiT8G ++VDkhyARrxYrdjlINsZJZbQjO0t8ketXAELJOnbFXXzeCOosyOHkLwsqOO96AVJA8 ++45ZVL5m95ClGy0RSrjVIkXsxTAMVG6SPAqKwk6vmTdRGuSPS4rhgckPVDHmccmuq ++dfnT2YkX+wB2/M3oCgU+s30fAHGkbGZ0pCdNbFYFZLiH0iiMbTDl/0L/z7IdK0nH ++GLHVE7apPraKC6xl6rPWsD2iSfrmtIPQa0+rqbIVvKP5JdfJ8J4alI+OxFw/znQe ++V0/Rez0j22Fe119LZFFSXhRv+ZSvcq20xDwh00mzcumPWpYuCVPozA18yIhC9tNn ++ALHndz0tDseIdy9vC71jQWy9iwri3ueN0DekMMF8JGzI1Z6BAFzgyAx3DkHtwHg7 ++B7qD0jPG5hJ5+yt323fYgJsuEAYoZ8/jzZ01pkX8bt+UsVN0DGnSGsI2ktnIIk3J ++l+8krjmUy6EaW79nITwoOqaeHOIp8m3UkjEcoKOYrzHRKqRy+A09rY+m/cAQaafW ++4xp0Zv7qZPLwnu0jsqB4jD8Ll9yPB02ndsoV6U5PeHzTkVhPml19jKUAwFfs7TJg ++kXy+/xFhYVUCAwEAATANBgkqhkiG9w0BAQsFAAOCBAIAAQnZY77pMNeypfpba2WK ++aDasT7dk2JqP0eukJCVPTN24Zca+xJNPdzuBATm/8SdZK9lddIbjSnWRsKvTnO2r ++/rYdlPf3jM5uuJtb8+Uwwe1s+gszelGS9G/lzzq+ehWicRIq2PFcs8o3iQMfENiv ++qILJ+xjcrvms5ZPDNahWkfRx3KCg8Q+/at2n5p7XYjMPYiLKHnDC+RE2b1qT20IZ ++FhuK/fTWLmKbfYFNNga6GC4qcaZJ7x0pbm4SDTYp0tkhzcHzwKhidfNB5J2vNz6l ++Ur6wiYwamFTLqcOwWo7rdvI+sSn05WQBv0QZlzFX+OAu0l7WQ7yU+noOxBhjvHds ++14+r9qcQZg2q9kG+evopYZqYXRUNNlZKo9MRBXhfrISulFAc5lRFQIXMXnglvAu+ ++Ipz2gomEAOcOPNNVldhKAU94GAMJd/KfN0ZP7gX3YvPzuYU6XDhag5RTohXLm18w ++5AF+ES3DOQ6ixu3DTf0D+6qrDuK+prdX8ivcdTQVNOQ+MIZeGSc6NWWOTaMGJ3lg ++aZIxJUGdo6E7GBGiC1YTjgFKFbHzek1LRTh/LX3vbSudxwaG0HQxwsU9T4DWiMqa ++Fkf2KteLEUA6HrR+0XlAZrhwoqAmrJ+8lCFX3V0gE9lpENfVHlFXDGyx10DpTB28 ++DdjnY3F7EPWNzwf9P3oNT69CKW3Bk6VVr3ROOJtDxVu1ioWo3TaXltQ0VOnap2Pu ++sa5wfrpfwBDuAS9JCDg4ttNp2nW3F7tgXC6xPqw5pvGwUppEw9XNrqV8TZrxduuv ++rQ3NyZ7KSzIpmFlD3UwV/fGfz3UQmHS6Ng1evrUID9DjfYNfRqSGIGjDfxGtYD+j ++Z1gLJZuhjJpNtwBkKRtlNtrCWCJK2hidK/foxwD7kwAPo2I9FjpltxCRywZUs07X ++KwXTfBR9v6ij1LV6K58hFS+8ezZyZ05CeVBFkMQdclTOSfuPxlMkQOtjp8QWDj+F ++j/MYziT5KBkHvcbrjdRtUJIAi4N7zCsPZtjik918AK1WBNRVqPbrgq/XSEXMfuvs ++6JbfK0B76vdBDRtJFC1JsvnIrGbUztxXzyQwFLaR/AjVJqpVlysLWzPKWVX6/+SJ ++u1NQOl2E8P6ycyBsuGnO89p0S4F8cMRcI2X1XQsZ7/q0NBrOMaEp5T3SrWo9GiQ3 ++o2SBdbs3Y6MBPBtTu977Z/0RO63J3M5i2tjUiDfrFy7+VRLKr7qQ7JibohyB8QaR ++9tedgjn2f+of7PnP/PEl1cCphUZeHM7QKUMPT8dbqwmKtlYY43EHXcvNOT5IBk3X ++9lwJoZk/B2i+ZMRNSP34ztAwtxmasPt6RAWGQpWCn9qmttAHAnMfDqe7F7jVR6rS ++u58= ++-----END CERTIFICATE-----` ++ ++func TestHandshakeRSATooBig(t *testing.T) { ++ testCert, _ := pem.Decode([]byte(largeRSAKeyCertPEM)) ++ ++ c := &Conn{conn: &discardConn{}, config: testConfig.Clone()} ++ ++ expectedErr := "tls: server sent certificate containing RSA key larger than 8192 bits" ++ err := c.verifyServerCertificate([][]byte{testCert.Bytes}) ++ if err == nil || err.Error() != expectedErr { ++ t.Errorf("Conn.verifyServerCertificate unexpected error: want %q, got %q", expectedErr, err) ++ } ++ ++ expectedErr = "tls: client sent certificate containing RSA key larger than 8192 bits" ++ err = c.processCertsFromClient(Certificate{Certificate: [][]byte{testCert.Bytes}}) ++ if err == nil || err.Error() != expectedErr { ++ t.Errorf("Conn.processCertsFromClient unexpected error: want %q, got %q", expectedErr, err) ++ } ++} +diff --git a/src/crypto/tls/handshake_server.go b/src/crypto/tls/handshake_server.go +index b16415a..2e36840 100644 +--- a/src/crypto/tls/handshake_server.go ++++ b/src/crypto/tls/handshake_server.go +@@ -738,6 +738,10 @@ func (c *Conn) processCertsFromClient(certificate Certificate) error { + c.sendAlert(alertBadCertificate) + return errors.New("tls: failed to parse client certificate: " + err.Error()) + } ++ if certs[i].PublicKeyAlgorithm == x509.RSA && certs[i].PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize { ++ c.sendAlert(alertBadCertificate) ++ return fmt.Errorf("tls: client sent certificate containing RSA key larger than %d bits", maxRSAKeySize) ++ } + } + + if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) { +-- +2.25.1 + From patchwork Mon Sep 4 14:22:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29936 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EAB61C71153 for ; Mon, 4 Sep 2023 14:23:03 +0000 (UTC) Received: from mail-pg1-f178.google.com (mail-pg1-f178.google.com [209.85.215.178]) by mx.groups.io with SMTP id smtpd.web11.49483.1693837374678394265 for ; Mon, 04 Sep 2023 07:22:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=hXiKEJ9T; spf=softfail (domain: sakoman.com, ip: 209.85.215.178, mailfrom: steve@sakoman.com) Received: by mail-pg1-f178.google.com with SMTP id 41be03b00d2f7-54290603887so745016a12.1 for ; Mon, 04 Sep 2023 07:22:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1693837373; x=1694442173; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0HSHL0PnZr86OluZmm232nbCx94ZbHRUHHMXvhcEv7s=; b=hXiKEJ9T59pm6tbl72ichyzDYsf7PrWihX1B40pKMjSrmCJl9/uo1vWS26wWJE8sw5 IHVG0FVc7FtIsJ9wI2F41V7/6zGIlQ/tIxKxi7zBeP+vaC1aH0dyE0sKGenKLJTCkDme 6DfXsF16VJNXWDG+J3OUqsYlKL1fyICYLQPvtIUi3IN1y0Coggon6J8QLtoPMdFop3tM gpWT3j2Gge+IQmmDa9IaIs3FFTsPZZcnNNJ1KHs3CtYvTjNoQgw4XwKNPaqK/9tonE5P QRsdgoWjvvjl0vJEzrzeNrWzFi9mzXOOvhKYUSjzY+56wKxu25wt1FUD/TllI8eKMOpF hxGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693837373; x=1694442173; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0HSHL0PnZr86OluZmm232nbCx94ZbHRUHHMXvhcEv7s=; b=ECU18aO0ue8cDUKEgYAxUWyfbKGtzPBgJCJC/Bmcjfss69QbMa/b5O/4C+UMUqFiUf o3wNAQ289U2CFOqopLHeps4/z6pO8HM7psFApVkahLl158uHYrSjnZBI0Gos4oySUdBI NOx7EUGWFhDRliCPX4LDkWqKK4aKKxC2L6R3R1EGKHCNX2Z/d3y6AYhs+nxjWJaBVd19 HBPeBcT+xmOmlilcx75Ug8WFWoRz3GHnAHftAUDVzREGR89KGiJsDkyE7yMdKD+pw12X 6hnX2H2t7B/IjDqb9yvum4A/fEsj7O6jr24dHx8ivmr41iU45INz2xphoDDCQx9u1nyW CTtg== X-Gm-Message-State: AOJu0YxocbCdxICRWESDqxahTXFPXg09MYhNBd0TAHQpYWmrijxNghWR /m6KYDld9EYtmj7LUyV8YK9gnuK2QTRw+0Fddi8= X-Google-Smtp-Source: AGHT+IHRDm99WYznJayhvC2C7uvsn6QpmumI1IjWSHYFpdGWhEiLsNv7UnldTokLz4MSgbztYrBWqw== X-Received: by 2002:a05:6a20:841f:b0:137:3c67:85d7 with SMTP id c31-20020a056a20841f00b001373c6785d7mr11934217pzd.16.1693837373428; Mon, 04 Sep 2023 07:22:53 -0700 (PDT) Received: from xps13.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id z14-20020aa785ce000000b00689f10adef9sm7443032pfn.67.2023.09.04.07.22.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Sep 2023 07:22:52 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 3/5] linux-yocto: add script to generate kernel CVE_CHECK_WHITELIST entries Date: Mon, 4 Sep 2023 04:22:38 -1000 Message-Id: <496c0b8fab5dd87102c3a63656debdb3aa214ae7.1693837232.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Sep 2023 14:23:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187185 From: Ross Burton Instead of manually looking up new CVEs and determining what point releases the fixes are incorporated into, add a script to generate the CVE_CHECK_WHITELIST data automatically. First, note that this is very much an interim solution until the cve-check class fetches data from www.linuxkernelcves.com directly. The script should be passed the path to a local clone of the linuxkernelcves repository[1] and the kernel version number. It will then write to standard output the CVE_STATUS entries for every known kernel CVE. The script should be periodically reran as CVEs are backported and kernels upgraded frequently. [1] https://github.com/nluedtke/linux_kernel_cves Note: for the Dunfell backport this is not a cherry-pick of the commit in master as the variable names are different. This incorporates the following commits: linux/generate-cve-exclusions: add version check warning linux/generate-cve-exclusions.py: fix comparison linux-yocto: add script to generate kernel CVE_STATUS entries Signed-off-by: Ross Burton Signed-off-by: Steve Sakoman --- .../linux/generate-cve-exclusions.py | 101 ++++++++++++++++++ 1 file changed, 101 insertions(+) create mode 100755 meta/recipes-kernel/linux/generate-cve-exclusions.py diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py new file mode 100755 index 0000000000..12ae3b0b1d --- /dev/null +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py @@ -0,0 +1,101 @@ +#! /usr/bin/env python3 + +# Generate granular CVE status metadata for a specific version of the kernel +# using data from linuxkernelcves.com. +# +# SPDX-License-Identifier: GPL-2.0-only + +import argparse +import datetime +import json +import pathlib +import re + +from packaging.version import Version + + +def parse_version(s): + """ + Parse the version string and either return a packaging.version.Version, or + None if the string was unset or "unk". + """ + if s and s != "unk": + # packaging.version.Version doesn't approve of versions like v5.12-rc1-dontuse + s = s.replace("-dontuse", "") + return Version(s) + return None + + +def main(argp=None): + parser = argparse.ArgumentParser() + parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves") + parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") + + args = parser.parse_args(argp) + datadir = args.datadir + version = args.version + base_version = f"{version.major}.{version.minor}" + + with open(datadir / "data" / "kernel_cves.json", "r") as f: + cve_data = json.load(f) + + with open(datadir / "data" / "stream_fixes.json", "r") as f: + stream_data = json.load(f) + + print(f""" +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at {datetime.datetime.now()} for version {version} + +python check_kernel_cve_status_version() {{ + this_version = "{version}" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +}} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" +""") + + for cve, data in cve_data.items(): + if "affected_versions" not in data: + print(f"# Skipping {cve}, no affected_versions") + print() + continue + + affected = data["affected_versions"] + first_affected, last_affected = re.search(r"(.+) to (.+)", affected).groups() + first_affected = parse_version(first_affected) + last_affected = parse_version(last_affected) + + handled = False + if not last_affected: + print(f"# {cve} has no known resolution") + elif first_affected and version < first_affected: + print(f"# fixed-version: only affects {first_affected} onwards") + handled = True + elif last_affected < version: + print(f"# fixed-version: Fixed after version {last_affected}") + handled = True + else: + if cve in stream_data: + backport_data = stream_data[cve] + if base_version in backport_data: + backport_ver = Version(backport_data[base_version]["fixed_version"]) + if backport_ver <= version: + print(f"# cpe-stable-backport: Backported in {backport_ver}") + handled = True + else: + # TODO print a note that the kernel needs bumping + print(f"# {cve} needs backporting (fixed from {backport_ver})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + + if handled: + print(f'CVE_CHECK_WHITELIST += "{cve}"') + + print() + + +if __name__ == "__main__": + main() From patchwork Mon Sep 4 14:22:39 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29938 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 25729C83F33 for ; Mon, 4 Sep 2023 14:23:04 +0000 (UTC) Received: from mail-pg1-f173.google.com (mail-pg1-f173.google.com [209.85.215.173]) by mx.groups.io with SMTP id smtpd.web10.48942.1693837378062401134 for ; Mon, 04 Sep 2023 07:22:58 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Vo069ajX; spf=softfail (domain: sakoman.com, ip: 209.85.215.173, mailfrom: steve@sakoman.com) Received: by mail-pg1-f173.google.com with SMTP id 41be03b00d2f7-53fbf2c42bfso1098944a12.3 for ; Mon, 04 Sep 2023 07:22:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1693837377; x=1694442177; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=1t7pTov8RKhL+DuByp9MmZpx/LbYcVm+cVUj0PQDGHA=; b=Vo069ajXMmWAm3KH3pRfUWAZa8f0ijipYufVmwmDc+VD0G6Kbn4DTfZLeGXRplUVGF 7YSJOJRMjEY+h9GmVEU8I6eavbDCfjXNOSG1a614ifkMlUj9esdS8od0NWL8irOSgLvW EGNrHMmW/Fii6KouxdYzlDhvEUgKb1mXriLjn5CTWKwh9nSOPuAP5ddiBLnfXVzus5Vt 41NqeJV6wRtU2793KyKuWfwDxqi0BK7ifcQ0pVGhoE/n1QZ017483Ot8YCJr6lbVDp3B WNSfoKDbPlgMDABmNgJHZjS8BcITsIOJflM98NSfdNhv//IEs+MVk5TUpIIWy9PDo/Ma rXzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693837377; x=1694442177; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1t7pTov8RKhL+DuByp9MmZpx/LbYcVm+cVUj0PQDGHA=; b=A2iz+k0eZ8sE3B9zQmNpE0tdYqHDYoCq1+KQ0ECNpEN20/d8Wa3ilxrs0a9HlgYJrj ITJ/4ft7PmdXgIvD73JIl6aWztHAo04H9H+p82w8TRSvdeEf+rUScbsywCiXlOyEcb4Y Wk7ACZnuav1xYDM+MHN9SwddQcebr02ok3QotpfDFvNCbYZb6Apkq4cv1yfOuvdlZkI/ 1EtRhzdDRkO5vc8X9V9iLA6b137GnISuof9LDc7jIq14vFCGVvO1OQ+j2R8SfCeOqOco 57h0VPYBW4TSVpNbvZ1X3A2tsUaxPTXEAHkkTuO+HBrkPON3rsq3FHEcKPGbNSzIRy4X JIcQ== X-Gm-Message-State: AOJu0YxPT3q53qYcb33X0gkAjLBR8wZgqqwABbivtRrh1tF6bOcbepHN l6ahczQE3nfxPKQZJwmsewFKPWq9c7jMyNUQE/w= X-Google-Smtp-Source: AGHT+IH32D+i0E/9WBZkZSxrLR32KveQYe8bo/+EF0A6FtusdB+R3ErmgEAaOuaOUASKES7pzU5MVQ== X-Received: by 2002:a05:6a20:4283:b0:132:a85f:b20c with SMTP id o3-20020a056a20428300b00132a85fb20cmr13557835pzj.38.1693837375950; Mon, 04 Sep 2023 07:22:55 -0700 (PDT) Received: from xps13.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id z14-20020aa785ce000000b00689f10adef9sm7443032pfn.67.2023.09.04.07.22.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Sep 2023 07:22:55 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 4/5] linux/cve-exclusion: add generated CVE_CHECK_WHITELISTs Date: Mon, 4 Sep 2023 04:22:39 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Sep 2023 14:23:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187186 From: Ross Burton Run generate-cve-exclusions.py to generate the ignore lists. This file is maintained separately from the existing manual whitelist entries. Signed-off-by: Ross Burton Signed-off-by: Steve Sakoman --- .../linux/cve-exclusion_5.4.inc | 7164 +++++++++++++++++ meta/recipes-kernel/linux/linux-yocto_5.4.bb | 1 + 2 files changed, 7165 insertions(+) create mode 100644 meta/recipes-kernel/linux/cve-exclusion_5.4.inc diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.4.inc b/meta/recipes-kernel/linux/cve-exclusion_5.4.inc new file mode 100644 index 0000000000..28e66d6f4f --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_5.4.inc @@ -0,0 +1,7164 @@ + +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at 2023-08-25 15:56:12.313882 for version 5.4.251 + +python check_kernel_cve_status_version() { + this_version = "5.4.251" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_WHITELIST += "CVE-2003-1604" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2004-0230" + +# CVE-2005-3660 has no known resolution + +# fixed-version: Fixed after version 2.6.26rc5 +CVE_CHECK_WHITELIST += "CVE-2006-3635" + +# fixed-version: Fixed after version 2.6.19rc3 +CVE_CHECK_WHITELIST += "CVE-2006-5331" + +# fixed-version: Fixed after version 2.6.19rc2 +CVE_CHECK_WHITELIST += "CVE-2006-6128" + +# CVE-2007-3719 has no known resolution + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_WHITELIST += "CVE-2007-4774" + +# fixed-version: Fixed after version 2.6.24rc6 +CVE_CHECK_WHITELIST += "CVE-2007-6761" + +# fixed-version: Fixed after version 2.6.20rc5 +CVE_CHECK_WHITELIST += "CVE-2007-6762" + +# CVE-2008-2544 has no known resolution + +# CVE-2008-4609 has no known resolution + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_WHITELIST += "CVE-2008-7316" + +# fixed-version: Fixed after version 2.6.31rc6 +CVE_CHECK_WHITELIST += "CVE-2009-2692" + +# fixed-version: Fixed after version 2.6.23rc9 +CVE_CHECK_WHITELIST += "CVE-2010-0008" + +# fixed-version: Fixed after version 2.6.36rc5 +CVE_CHECK_WHITELIST += "CVE-2010-3432" + +# CVE-2010-4563 has no known resolution + +# fixed-version: Fixed after version 2.6.37rc6 +CVE_CHECK_WHITELIST += "CVE-2010-4648" + +# fixed-version: Fixed after version 2.6.38rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5313" + +# CVE-2010-5321 has no known resolution + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5328" + +# fixed-version: Fixed after version 2.6.39rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5329" + +# fixed-version: Fixed after version 2.6.34rc7 +CVE_CHECK_WHITELIST += "CVE-2010-5331" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5332" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4098" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4131" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4915" + +# CVE-2011-4916 has no known resolution + +# CVE-2011-4917 has no known resolution + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-5321" + +# fixed-version: Fixed after version 3.1rc1 +CVE_CHECK_WHITELIST += "CVE-2011-5327" + +# fixed-version: Fixed after version 3.7rc2 +CVE_CHECK_WHITELIST += "CVE-2012-0957" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2119" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2136" + +# fixed-version: Fixed after version 3.5rc2 +CVE_CHECK_WHITELIST += "CVE-2012-2137" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_WHITELIST += "CVE-2012-2313" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_WHITELIST += "CVE-2012-2319" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2012-2372" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2375" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2390" + +# fixed-version: Fixed after version 3.5rc4 +CVE_CHECK_WHITELIST += "CVE-2012-2669" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2744" + +# fixed-version: Fixed after version 3.4rc3 +CVE_CHECK_WHITELIST += "CVE-2012-2745" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_WHITELIST += "CVE-2012-3364" + +# fixed-version: Fixed after version 3.4rc5 +CVE_CHECK_WHITELIST += "CVE-2012-3375" + +# fixed-version: Fixed after version 3.5rc5 +CVE_CHECK_WHITELIST += "CVE-2012-3400" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_WHITELIST += "CVE-2012-3412" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-3430" + +# fixed-version: Fixed after version 2.6.19rc4 +CVE_CHECK_WHITELIST += "CVE-2012-3510" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_WHITELIST += "CVE-2012-3511" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-3520" + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_WHITELIST += "CVE-2012-3552" + +# Skipping CVE-2012-4220, no affected_versions + +# Skipping CVE-2012-4221, no affected_versions + +# Skipping CVE-2012-4222, no affected_versions + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-4398" + +# fixed-version: Fixed after version 2.6.36rc4 +CVE_CHECK_WHITELIST += "CVE-2012-4444" + +# fixed-version: Fixed after version 3.7rc6 +CVE_CHECK_WHITELIST += "CVE-2012-4461" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_WHITELIST += "CVE-2012-4467" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_WHITELIST += "CVE-2012-4508" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-4530" + +# CVE-2012-4542 has no known resolution + +# fixed-version: Fixed after version 3.7rc4 +CVE_CHECK_WHITELIST += "CVE-2012-4565" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5374" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5375" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5517" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6536" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6537" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6538" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6539" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6540" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6541" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6542" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6543" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6544" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6545" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6546" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6547" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6548" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6549" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6638" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_WHITELIST += "CVE-2012-6647" + +# fixed-version: Fixed after version 3.6 +CVE_CHECK_WHITELIST += "CVE-2012-6657" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_WHITELIST += "CVE-2012-6689" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6701" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6703" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6704" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6712" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-0160" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0190" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0216" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0217" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_WHITELIST += "CVE-2013-0228" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0231" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-0268" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_WHITELIST += "CVE-2013-0290" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2013-0309" + +# fixed-version: Fixed after version 3.5 +CVE_CHECK_WHITELIST += "CVE-2013-0310" + +# fixed-version: Fixed after version 3.7rc8 +CVE_CHECK_WHITELIST += "CVE-2013-0311" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0313" + +# fixed-version: Fixed after version 3.11rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0343" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-0349" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0871" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-0913" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-0914" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1059" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1763" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1767" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1772" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1773" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1774" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1792" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1796" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1797" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1798" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-1819" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2013-1826" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1827" + +# fixed-version: Fixed after version 3.9rc2 +CVE_CHECK_WHITELIST += "CVE-2013-1828" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1848" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1858" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1860" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1928" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_WHITELIST += "CVE-2013-1929" + +# Skipping CVE-2013-1935, no affected_versions + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1943" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1956" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1957" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1958" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-1959" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-1979" + +# fixed-version: Fixed after version 3.8rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2015" + +# fixed-version: Fixed after version 2.6.34 +CVE_CHECK_WHITELIST += "CVE-2013-2017" + +# fixed-version: Fixed after version 3.8rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2058" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2094" + +# fixed-version: Fixed after version 2.6.34rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2128" + +# fixed-version: Fixed after version 3.11rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2140" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2141" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2146" + +# fixed-version: Fixed after version 3.12rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2147" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2148" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2164" + +# Skipping CVE-2013-2188, no affected_versions + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2206" + +# Skipping CVE-2013-2224, no affected_versions + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_WHITELIST += "CVE-2013-2232" + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_WHITELIST += "CVE-2013-2234" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_WHITELIST += "CVE-2013-2237" + +# Skipping CVE-2013-2239, no affected_versions + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2546" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2547" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2548" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2596" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2634" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2635" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2636" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2850" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2851" + +# fixed-version: Fixed after version 3.10rc6 +CVE_CHECK_WHITELIST += "CVE-2013-2852" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2888" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2889" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2890" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2891" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2892" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2893" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2894" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2895" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2896" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2897" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2898" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2899" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2929" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2930" + +# fixed-version: Fixed after version 3.9 +CVE_CHECK_WHITELIST += "CVE-2013-3076" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3222" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3223" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3224" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3225" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3226" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3227" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3228" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3229" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3230" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3231" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3232" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3233" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3234" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3235" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3236" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3237" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3301" + +# fixed-version: Fixed after version 3.8rc3 +CVE_CHECK_WHITELIST += "CVE-2013-3302" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4125" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4127" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4129" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4162" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4163" + +# fixed-version: Fixed after version 3.11rc5 +CVE_CHECK_WHITELIST += "CVE-2013-4205" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4220" + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_WHITELIST += "CVE-2013-4247" + +# fixed-version: Fixed after version 3.11rc6 +CVE_CHECK_WHITELIST += "CVE-2013-4254" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4270" + +# fixed-version: Fixed after version 3.12rc6 +CVE_CHECK_WHITELIST += "CVE-2013-4299" + +# fixed-version: Fixed after version 3.11 +CVE_CHECK_WHITELIST += "CVE-2013-4300" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4312" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4343" + +# fixed-version: Fixed after version 3.13rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4345" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4348" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4350" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4387" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-4470" + +# fixed-version: Fixed after version 3.10rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4483" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4511" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4512" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4513" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4514" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4515" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4516" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4563" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2013-4579" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4587" + +# fixed-version: Fixed after version 2.6.33rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4588" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4591" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4592" + +# Skipping CVE-2013-4737, no affected_versions + +# Skipping CVE-2013-4738, no affected_versions + +# Skipping CVE-2013-4739, no affected_versions + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_WHITELIST += "CVE-2013-5634" + +# fixed-version: Fixed after version 3.6rc6 +CVE_CHECK_WHITELIST += "CVE-2013-6282" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6367" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6368" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6376" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6378" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6380" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6381" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6382" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-6383" + +# Skipping CVE-2013-6392, no affected_versions + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6431" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6432" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6885" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7026" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7027" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7263" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7264" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7265" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7266" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7267" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7268" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7269" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7270" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7271" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7281" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7339" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7348" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7421" + +# CVE-2013-7445 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2013-7446" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7470" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-0038" + +# fixed-version: Fixed after version 3.14rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0049" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-0055" + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_WHITELIST += "CVE-2014-0069" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-0077" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-0100" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-0101" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-0102" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-0131" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-0155" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0181" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0196" + +# fixed-version: Fixed after version 2.6.33rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0203" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_WHITELIST += "CVE-2014-0205" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-0206" + +# Skipping CVE-2014-0972, no affected_versions + +# fixed-version: Fixed after version 3.13 +CVE_CHECK_WHITELIST += "CVE-2014-1438" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1444" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1445" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1446" + +# fixed-version: Fixed after version 3.13rc8 +CVE_CHECK_WHITELIST += "CVE-2014-1690" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-1737" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-1738" + +# fixed-version: Fixed after version 3.15rc6 +CVE_CHECK_WHITELIST += "CVE-2014-1739" + +# fixed-version: Fixed after version 3.14rc2 +CVE_CHECK_WHITELIST += "CVE-2014-1874" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2038" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_WHITELIST += "CVE-2014-2039" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-2309" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2523" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-2568" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2580" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2672" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2673" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2678" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2706" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2739" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-2851" + +# fixed-version: Fixed after version 3.2rc7 +CVE_CHECK_WHITELIST += "CVE-2014-2889" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3122" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3144" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3145" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_WHITELIST += "CVE-2014-3153" + +# fixed-version: Fixed after version 3.17rc4 +CVE_CHECK_WHITELIST += "CVE-2014-3180" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3181" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3182" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3183" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3184" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3185" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3186" + +# Skipping CVE-2014-3519, no affected_versions + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_WHITELIST += "CVE-2014-3534" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3535" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3601" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3610" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3611" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-3631" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3645" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3646" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3647" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3673" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3687" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3688" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3690" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3917" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_WHITELIST += "CVE-2014-3940" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4014" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4027" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4157" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4171" + +# Skipping CVE-2014-4322, no affected_versions + +# Skipping CVE-2014-4323, no affected_versions + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4508" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4608" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4611" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4652" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4653" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4654" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4655" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4656" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4667" + +# fixed-version: Fixed after version 3.16rc4 +CVE_CHECK_WHITELIST += "CVE-2014-4699" + +# fixed-version: Fixed after version 3.16rc6 +CVE_CHECK_WHITELIST += "CVE-2014-4943" + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_WHITELIST += "CVE-2014-5045" + +# fixed-version: Fixed after version 3.16 +CVE_CHECK_WHITELIST += "CVE-2014-5077" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-5206" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-5207" + +# Skipping CVE-2014-5332, no affected_versions + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-5471" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-5472" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6410" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6416" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6417" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6418" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-7145" + +# Skipping CVE-2014-7207, no affected_versions + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7283" + +# fixed-version: Fixed after version 3.15rc7 +CVE_CHECK_WHITELIST += "CVE-2014-7284" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7822" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-7825" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-7826" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_WHITELIST += "CVE-2014-7841" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7842" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_WHITELIST += "CVE-2014-7843" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7970" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7975" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-8086" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8133" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8134" + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_WHITELIST += "CVE-2014-8159" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8160" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8171" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8172" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_WHITELIST += "CVE-2014-8173" + +# Skipping CVE-2014-8181, no affected_versions + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8369" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8480" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8481" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8559" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_WHITELIST += "CVE-2014-8709" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8884" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8989" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_WHITELIST += "CVE-2014-9090" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_WHITELIST += "CVE-2014-9322" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9419" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9420" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9428" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9529" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9584" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9585" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9644" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9683" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9710" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9715" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9717" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9728" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9729" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9730" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9731" + +# Skipping CVE-2014-9777, no affected_versions + +# Skipping CVE-2014-9778, no affected_versions + +# Skipping CVE-2014-9779, no affected_versions + +# Skipping CVE-2014-9780, no affected_versions + +# Skipping CVE-2014-9781, no affected_versions + +# Skipping CVE-2014-9782, no affected_versions + +# Skipping CVE-2014-9783, no affected_versions + +# Skipping CVE-2014-9784, no affected_versions + +# Skipping CVE-2014-9785, no affected_versions + +# Skipping CVE-2014-9786, no affected_versions + +# Skipping CVE-2014-9787, no affected_versions + +# Skipping CVE-2014-9788, no affected_versions + +# Skipping CVE-2014-9789, no affected_versions + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9803" + +# Skipping CVE-2014-9863, no affected_versions + +# Skipping CVE-2014-9864, no affected_versions + +# Skipping CVE-2014-9865, no affected_versions + +# Skipping CVE-2014-9866, no affected_versions + +# Skipping CVE-2014-9867, no affected_versions + +# Skipping CVE-2014-9868, no affected_versions + +# Skipping CVE-2014-9869, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9870" + +# Skipping CVE-2014-9871, no affected_versions + +# Skipping CVE-2014-9872, no affected_versions + +# Skipping CVE-2014-9873, no affected_versions + +# Skipping CVE-2014-9874, no affected_versions + +# Skipping CVE-2014-9875, no affected_versions + +# Skipping CVE-2014-9876, no affected_versions + +# Skipping CVE-2014-9877, no affected_versions + +# Skipping CVE-2014-9878, no affected_versions + +# Skipping CVE-2014-9879, no affected_versions + +# Skipping CVE-2014-9880, no affected_versions + +# Skipping CVE-2014-9881, no affected_versions + +# Skipping CVE-2014-9882, no affected_versions + +# Skipping CVE-2014-9883, no affected_versions + +# Skipping CVE-2014-9884, no affected_versions + +# Skipping CVE-2014-9885, no affected_versions + +# Skipping CVE-2014-9886, no affected_versions + +# Skipping CVE-2014-9887, no affected_versions + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9888" + +# Skipping CVE-2014-9889, no affected_versions + +# Skipping CVE-2014-9890, no affected_versions + +# Skipping CVE-2014-9891, no affected_versions + +# Skipping CVE-2014-9892, no affected_versions + +# Skipping CVE-2014-9893, no affected_versions + +# Skipping CVE-2014-9894, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9895" + +# Skipping CVE-2014-9896, no affected_versions + +# Skipping CVE-2014-9897, no affected_versions + +# Skipping CVE-2014-9898, no affected_versions + +# Skipping CVE-2014-9899, no affected_versions + +# Skipping CVE-2014-9900, no affected_versions + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9903" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9904" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9914" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-9922" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9940" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_WHITELIST += "CVE-2015-0239" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2015-0274" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-0275" + +# Skipping CVE-2015-0777, no affected_versions + +# Skipping CVE-2015-1328, no affected_versions + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1333" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1339" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1350" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1420" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1421" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1465" + +# fixed-version: Fixed after version 3.19rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1573" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1593" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1805" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-2041" + +# fixed-version: Fixed after version 3.19 +CVE_CHECK_WHITELIST += "CVE-2015-2042" + +# fixed-version: Fixed after version 4.0rc4 +CVE_CHECK_WHITELIST += "CVE-2015-2150" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-2666" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-2672" + +# fixed-version: Fixed after version 4.0rc6 +CVE_CHECK_WHITELIST += "CVE-2015-2686" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-2830" + +# CVE-2015-2877 has no known resolution + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_WHITELIST += "CVE-2015-2922" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-2925" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-3212" + +# fixed-version: Fixed after version 2.6.33rc8 +CVE_CHECK_WHITELIST += "CVE-2015-3214" + +# fixed-version: Fixed after version 4.2rc2 +CVE_CHECK_WHITELIST += "CVE-2015-3288" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-3290" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-3291" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_WHITELIST += "CVE-2015-3331" + +# Skipping CVE-2015-3332, no affected_versions + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-3339" + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_WHITELIST += "CVE-2015-3636" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4001" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4002" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4003" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4004" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4036" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4167" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_WHITELIST += "CVE-2015-4170" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4176" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4177" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4178" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4692" + +# fixed-version: Fixed after version 4.1rc6 +CVE_CHECK_WHITELIST += "CVE-2015-4700" + +# fixed-version: Fixed after version 4.2rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5156" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5157" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5257" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5283" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5307" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5327" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5364" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5366" + +# fixed-version: Fixed after version 4.2rc6 +CVE_CHECK_WHITELIST += "CVE-2015-5697" + +# fixed-version: Fixed after version 4.1rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5706" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5707" + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_WHITELIST += "CVE-2015-6252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-6526" + +# CVE-2015-6619 has no known resolution + +# CVE-2015-6646 has no known resolution + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-6937" + +# Skipping CVE-2015-7312, no affected_versions + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7509" + +# fixed-version: Fixed after version 4.4rc7 +CVE_CHECK_WHITELIST += "CVE-2015-7513" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-7515" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_WHITELIST += "CVE-2015-7550" + +# Skipping CVE-2015-7553, no affected_versions + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2015-7566" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_WHITELIST += "CVE-2015-7613" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7799" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2015-7833" + +# Skipping CVE-2015-7837, no affected_versions + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2015-7872" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7884" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7885" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2015-7990" + +# Skipping CVE-2015-8019, no affected_versions + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8104" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8215" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8324" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8374" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8539" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8543" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8550" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8551" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8552" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8553" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8569" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8575" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2015-8660" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8709" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8746" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_WHITELIST += "CVE-2015-8767" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_WHITELIST += "CVE-2015-8785" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8787" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8812" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8816" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8830" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8839" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8844" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8845" + +# Skipping CVE-2015-8937, no affected_versions + +# Skipping CVE-2015-8938, no affected_versions + +# Skipping CVE-2015-8939, no affected_versions + +# Skipping CVE-2015-8940, no affected_versions + +# Skipping CVE-2015-8941, no affected_versions + +# Skipping CVE-2015-8942, no affected_versions + +# Skipping CVE-2015-8943, no affected_versions + +# Skipping CVE-2015-8944, no affected_versions + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_WHITELIST += "CVE-2015-8950" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8952" + +# fixed-version: Fixed after version 4.3 +CVE_CHECK_WHITELIST += "CVE-2015-8953" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8955" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8956" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8961" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8962" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_WHITELIST += "CVE-2015-8963" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8964" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_WHITELIST += "CVE-2015-8966" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8967" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8970" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-9004" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-9016" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-9289" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0617" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2016-0723" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0728" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-0758" + +# Skipping CVE-2016-0774, no affected_versions + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0821" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_WHITELIST += "CVE-2016-0823" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-10044" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10088" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-10147" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-10150" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10153" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10154" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-10200" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10208" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10229" + +# fixed-version: Fixed after version 4.8rc6 +CVE_CHECK_WHITELIST += "CVE-2016-10318" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10723" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10741" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10764" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10905" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_WHITELIST += "CVE-2016-10906" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10907" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_WHITELIST += "CVE-2016-1237" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-1575" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-1576" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-1583" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2053" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2069" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_WHITELIST += "CVE-2016-2070" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2085" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-2117" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-2143" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2184" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2185" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2186" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-2187" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2016-2188" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2383" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2384" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2543" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2544" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2545" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2546" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2547" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2548" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2549" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2550" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2016-2782" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2847" + +# Skipping CVE-2016-2853, no affected_versions + +# Skipping CVE-2016-2854, no affected_versions + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-3044" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3070" + +# fixed-version: Fixed after version 4.6rc2 +CVE_CHECK_WHITELIST += "CVE-2016-3134" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3135" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3136" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3137" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3138" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3139" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3140" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3156" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3157" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3672" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3689" + +# Skipping CVE-2016-3695, no affected_versions + +# Skipping CVE-2016-3699, no affected_versions + +# Skipping CVE-2016-3707, no affected_versions + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3713" + +# CVE-2016-3775 has no known resolution + +# CVE-2016-3802 has no known resolution + +# CVE-2016-3803 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2016-3841" + +# fixed-version: Fixed after version 4.8rc2 +CVE_CHECK_WHITELIST += "CVE-2016-3857" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-3951" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3955" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-3961" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4440" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_WHITELIST += "CVE-2016-4470" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4482" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4485" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4486" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4557" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-4558" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4565" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4568" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4569" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4578" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4580" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-4581" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_WHITELIST += "CVE-2016-4794" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4805" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4913" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4951" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4997" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4998" + +# fixed-version: Fixed after version 4.9rc2 +CVE_CHECK_WHITELIST += "CVE-2016-5195" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-5243" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-5244" + +# Skipping CVE-2016-5340, no affected_versions + +# Skipping CVE-2016-5342, no affected_versions + +# Skipping CVE-2016-5343, no affected_versions + +# Skipping CVE-2016-5344, no affected_versions + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-5400" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-5412" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-5696" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-5728" + +# fixed-version: Fixed after version 4.7rc6 +CVE_CHECK_WHITELIST += "CVE-2016-5828" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_WHITELIST += "CVE-2016-5829" + +# CVE-2016-5870 has no known resolution + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-6130" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6136" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-6156" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-6162" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-6187" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6197" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-6198" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6213" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6327" + +# fixed-version: Fixed after version 4.8rc3 +CVE_CHECK_WHITELIST += "CVE-2016-6480" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6516" + +# Skipping CVE-2016-6753, no affected_versions + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6786" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6787" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_WHITELIST += "CVE-2016-6828" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-7039" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_WHITELIST += "CVE-2016-7042" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7097" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7117" + +# Skipping CVE-2016-7118, no affected_versions + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7425" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7910" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-7911" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-7912" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7913" + +# fixed-version: Fixed after version 4.6rc4 +CVE_CHECK_WHITELIST += "CVE-2016-7914" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7915" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-7916" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_WHITELIST += "CVE-2016-7917" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-8399" + +# Skipping CVE-2016-8401, no affected_versions + +# Skipping CVE-2016-8402, no affected_versions + +# Skipping CVE-2016-8403, no affected_versions + +# Skipping CVE-2016-8404, no affected_versions + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2016-8405" + +# Skipping CVE-2016-8406, no affected_versions + +# Skipping CVE-2016-8407, no affected_versions + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-8630" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8632" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-8633" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8636" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_WHITELIST += "CVE-2016-8645" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2016-8646" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-8650" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8655" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-8658" + +# CVE-2016-8660 has no known resolution + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-8666" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9083" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9084" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9120" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9178" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9191" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_WHITELIST += "CVE-2016-9313" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9555" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-9576" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9588" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9604" + +# Skipping CVE-2016-9644, no affected_versions + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9685" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9754" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9755" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9756" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9777" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9793" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9794" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9806" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9919" + +# Skipping CVE-2017-0403, no affected_versions + +# Skipping CVE-2017-0404, no affected_versions + +# Skipping CVE-2017-0426, no affected_versions + +# Skipping CVE-2017-0427, no affected_versions + +# CVE-2017-0507 has no known resolution + +# CVE-2017-0508 has no known resolution + +# Skipping CVE-2017-0510, no affected_versions + +# Skipping CVE-2017-0528, no affected_versions + +# Skipping CVE-2017-0537, no affected_versions + +# CVE-2017-0564 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0605" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0627" + +# CVE-2017-0630 has no known resolution + +# CVE-2017-0749 has no known resolution + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0750" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-0786" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-0861" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000111" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000112" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000251" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000253" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000255" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-1000363" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_WHITELIST += "CVE-2017-1000364" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-1000365" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000370" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000371" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_WHITELIST += "CVE-2017-1000379" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000380" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-1000405" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-1000407" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-1000410" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10661" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10662" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10663" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10810" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-10911" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11089" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11176" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11472" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_WHITELIST += "CVE-2017-11473" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-11600" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-12134" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-12146" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2017-12153" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-12154" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_WHITELIST += "CVE-2017-12168" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-12188" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-12190" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-12192" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-12193" + +# fixed-version: Fixed after version 4.13rc4 +CVE_CHECK_WHITELIST += "CVE-2017-12762" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-13080" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13166" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2017-13167" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2017-13168" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13215" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-13216" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2017-13220" + +# CVE-2017-13221 has no known resolution + +# CVE-2017-13222 has no known resolution + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-13305" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-13686" + +# CVE-2017-13693 has no known resolution + +# CVE-2017-13694 has no known resolution + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13695" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13715" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14051" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14106" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-14140" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14156" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14340" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14489" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-14497" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14954" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2017-14991" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15102" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15115" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15116" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15121" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-15126" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15127" + +# fixed-version: Fixed after version 4.14rc8 +CVE_CHECK_WHITELIST += "CVE-2017-15128" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15129" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15265" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15274" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15299" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-15306" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-15537" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-15649" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2017-15868" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15951" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16525" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16526" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16527" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16528" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16529" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16530" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16531" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16532" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16533" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16534" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-16535" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16536" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16537" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16538" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-16643" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16644" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-16645" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16646" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16647" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16648" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16649" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16650" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16911" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16912" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16913" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16914" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-16939" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16994" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16995" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16996" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-17052" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-17053" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17448" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17449" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17450" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17558" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17712" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17741" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17805" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17806" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-17807" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17852" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17853" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17854" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17855" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17856" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17857" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-17862" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17863" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17864" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2017-17975" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_WHITELIST += "CVE-2017-18017" + +# fixed-version: Fixed after version 4.15rc7 +CVE_CHECK_WHITELIST += "CVE-2017-18075" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18079" + +# CVE-2017-18169 has no known resolution + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18174" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18193" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-18200" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18202" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18203" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18204" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18208" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18216" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18218" + +# fixed-version: Fixed after version 4.12rc4 +CVE_CHECK_WHITELIST += "CVE-2017-18221" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18222" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18224" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18232" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18241" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18249" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18255" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18257" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-18261" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-18270" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-18344" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18360" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-18379" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18509" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18549" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18550" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2017-18551" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18552" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2017-18595" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-2583" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-2584" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2596" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-2618" + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2634" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-2636" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2647" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-2671" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5123" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5546" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5547" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5548" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5549" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5550" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5551" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2017-5576" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2017-5577" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5669" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5715" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5753" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5754" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5897" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5967" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5970" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5972" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5986" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-6001" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6074" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-6214" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6345" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6346" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6347" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6348" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6353" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-6874" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6951" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7184" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7187" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7261" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7273" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7277" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7294" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7308" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7346" + +# CVE-2017-7369 has no known resolution + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7374" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7472" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7477" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7482" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7487" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7495" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7518" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7533" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7541" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_WHITELIST += "CVE-2017-7542" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-7558" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7616" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7618" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7645" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7889" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7895" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7979" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-8061" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8062" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8063" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8064" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8066" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8067" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8068" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8069" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8070" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_WHITELIST += "CVE-2017-8071" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_WHITELIST += "CVE-2017-8072" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8106" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_WHITELIST += "CVE-2017-8240" + +# CVE-2017-8242 has no known resolution + +# CVE-2017-8244 has no known resolution + +# CVE-2017-8245 has no known resolution + +# CVE-2017-8246 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8797" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-8824" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8831" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8890" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8924" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8925" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9059" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9074" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9075" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9076" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9077" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9150" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-9211" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-9242" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-9605" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2017-9725" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9984" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9985" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9986" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-1000004" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1000026" + +# fixed-version: Fixed after version 4.15 +CVE_CHECK_WHITELIST += "CVE-2018-1000028" + +# fixed-version: Fixed after version 4.16 +CVE_CHECK_WHITELIST += "CVE-2018-1000199" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2018-1000200" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1000204" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-10021" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-10074" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10087" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10124" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10322" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10323" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-1065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1066" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2018-10675" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-1068" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10840" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10853" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1087" + +# CVE-2018-10872 has no known resolution + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10876" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10877" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10878" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10879" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10880" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10881" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10882" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10883" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10901" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_WHITELIST += "CVE-2018-10902" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2018-1091" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1092" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1093" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2018-10938" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1094" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-10940" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1095" + +# fixed-version: Fixed after version 4.17rc2 +CVE_CHECK_WHITELIST += "CVE-2018-1108" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1118" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_WHITELIST += "CVE-2018-1120" + +# CVE-2018-1121 has no known resolution + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-11232" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1128" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1129" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1130" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-11412" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-11506" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2018-11508" + +# CVE-2018-11987 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12126" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12127" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12130" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12207" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12232" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12233" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12633" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12714" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12896" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12904" + +# CVE-2018-12928 has no known resolution + +# CVE-2018-12929 has no known resolution + +# CVE-2018-12930 has no known resolution + +# CVE-2018-12931 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13053" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13093" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13094" + +# fixed-version: Fixed after version 4.18rc3 +CVE_CHECK_WHITELIST += "CVE-2018-13095" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13096" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13097" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13098" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13099" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13100" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-13405" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13406" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14609" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14610" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14611" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14612" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14613" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14614" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14615" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14616" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14617" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2018-14619" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-14625" + +# fixed-version: Fixed after version 4.19rc6 +CVE_CHECK_WHITELIST += "CVE-2018-14633" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14634" + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_WHITELIST += "CVE-2018-14641" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-14646" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_WHITELIST += "CVE-2018-14656" + +# fixed-version: Fixed after version 4.18rc8 +CVE_CHECK_WHITELIST += "CVE-2018-14678" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14734" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-15471" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-15572" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-15594" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16276" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2018-16597" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_WHITELIST += "CVE-2018-16658" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16862" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_WHITELIST += "CVE-2018-16871" + +# fixed-version: Fixed after version 5.0rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16880" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2018-16882" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-16884" + +# CVE-2018-16885 has no known resolution + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_WHITELIST += "CVE-2018-17182" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-17972" + +# CVE-2018-17977 has no known resolution + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-18021" + +# fixed-version: Fixed after version 4.19 +CVE_CHECK_WHITELIST += "CVE-2018-18281" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2018-18386" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-18397" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-18445" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-18559" + +# CVE-2018-18653 has no known resolution + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-18690" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-18710" + +# fixed-version: Fixed after version 4.20rc2 +CVE_CHECK_WHITELIST += "CVE-2018-18955" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-19406" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-19407" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-19824" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_WHITELIST += "CVE-2018-19854" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2018-19985" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-20169" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-20449" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20509" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-20510" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_WHITELIST += "CVE-2018-20511" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20669" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20784" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20836" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20854" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20855" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20856" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20961" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20976" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-21008" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-25015" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-25020" + +# CVE-2018-3574 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3620" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-3639" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3646" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3665" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3693" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5332" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5333" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5344" + +# fixed-version: Fixed after version 4.18rc7 +CVE_CHECK_WHITELIST += "CVE-2018-5390" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5391" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-5703" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5750" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5803" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_WHITELIST += "CVE-2018-5814" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5848" + +# Skipping CVE-2018-5856, no affected_versions + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5873" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-5953" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-5995" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-6412" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-6554" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-6555" + +# CVE-2018-6559 has no known resolution + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-6927" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2018-7191" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7273" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-7480" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2018-7492" + +# fixed-version: Fixed after version 4.16rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7566" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-7740" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7754" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_WHITELIST += "CVE-2018-7755" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-7757" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-7995" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-8043" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-8087" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8781" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8822" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8897" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9363" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9385" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9415" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9422" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2018-9465" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_WHITELIST += "CVE-2018-9516" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9517" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9518" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2018-9568" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-0136" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0145" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0146" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0147" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0148" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0149" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-0154" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-0155" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10124" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-10126" + +# CVE-2019-10140 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10142" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_WHITELIST += "CVE-2019-10207" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-10220" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10638" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-10639" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-11085" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11091" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-11135" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_WHITELIST += "CVE-2019-11190" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11191" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-1125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11477" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11478" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11479" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-11486" + +# fixed-version: Fixed after version 5.1rc5 +CVE_CHECK_WHITELIST += "CVE-2019-11487" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11599" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-11683" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11810" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11811" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-11815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11833" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11884" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12378" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12379" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12380" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12381" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12382" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12454" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12455" + +# CVE-2019-12456 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12614" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-12615" + +# fixed-version: Fixed after version 5.2rc7 +CVE_CHECK_WHITELIST += "CVE-2019-12817" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-12818" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_WHITELIST += "CVE-2019-12819" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12881" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-12984" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-13233" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-13272" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-13631" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-13648" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14283" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14284" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-14615" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14763" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14814" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14815" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14821" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14835" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-14895" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2019-14896" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2019-14897" + +# CVE-2019-14898 has no known resolution + +# cpe-stable-backport: Backported in 5.4.11 +CVE_CHECK_WHITELIST += "CVE-2019-14901" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_WHITELIST += "CVE-2019-15030" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_WHITELIST += "CVE-2019-15031" + +# fixed-version: Fixed after version 5.2rc2 +CVE_CHECK_WHITELIST += "CVE-2019-15090" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15098" + +# cpe-stable-backport: Backported in 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15099" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-15117" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-15118" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15211" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15212" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15213" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15214" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15215" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-15216" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15217" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15218" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15219" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15220" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-15221" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15222" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15223" + +# CVE-2019-15239 has no known resolution + +# CVE-2019-15290 has no known resolution + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-15291" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15292" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-15504" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15505" + +# fixed-version: Fixed after version 5.3rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15538" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-15666" + +# CVE-2019-15791 has no known resolution + +# CVE-2019-15792 has no known resolution + +# CVE-2019-15793 has no known resolution + +# CVE-2019-15794 needs backporting (fixed from 5.12) + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15807" + +# CVE-2019-15902 has no known resolution + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15916" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15917" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15918" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15919" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15920" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15921" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15922" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15923" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15924" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15925" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15926" + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_WHITELIST += "CVE-2019-15927" + +# CVE-2019-16089 has no known resolution + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16229" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16230" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-16231" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16232" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_WHITELIST += "CVE-2019-16233" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-16234" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16413" + +# fixed-version: Fixed after version 5.3rc7 +CVE_CHECK_WHITELIST += "CVE-2019-16714" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-16746" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16921" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-16994" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16995" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17052" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17053" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17054" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17055" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17056" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-17075" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-17133" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17351" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-17666" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-18198" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-18282" + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-18660" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2019-18675" + +# CVE-2019-18680 has no known resolution + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-18683" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-18786" + +# fixed-version: Fixed after version 5.1rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18805" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18806" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18807" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2019-18808" + +# cpe-stable-backport: Backported in 5.4.9 +CVE_CHECK_WHITELIST += "CVE-2019-18809" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18810" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18811" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18812" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-18813" + +# cpe-stable-backport: Backported in 5.4.43 +CVE_CHECK_WHITELIST += "CVE-2019-18814" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-18885" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19036" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19037" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2019-19039" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2019-19043" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19044" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19045" + +# cpe-stable-backport: Backported in 5.4.15 +CVE_CHECK_WHITELIST += "CVE-2019-19046" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19047" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19048" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19049" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19050" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19051" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19052" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19053" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2019-19054" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19055" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19056" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19057" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19058" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19059" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19060" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19061" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19062" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19063" + +# cpe-stable-backport: Backported in 5.4.13 +CVE_CHECK_WHITELIST += "CVE-2019-19064" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19065" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19066" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19067" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19068" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19069" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19070" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19071" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19072" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19073" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19074" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19075" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19076" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19077" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19078" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-19079" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19080" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19081" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19082" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19083" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19227" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2019-19241" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19252" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19318" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19319" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19332" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19338" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2019-19377" + +# CVE-2019-19378 has no known resolution + +# cpe-stable-backport: Backported in 5.4.4 +CVE_CHECK_WHITELIST += "CVE-2019-19447" + +# cpe-stable-backport: Backported in 5.4.60 +CVE_CHECK_WHITELIST += "CVE-2019-19448" + +# CVE-2019-19449 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.45 +CVE_CHECK_WHITELIST += "CVE-2019-19462" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19523" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-19524" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19525" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19526" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19527" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19528" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19529" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19530" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19531" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19532" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19533" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19534" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19535" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19536" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19537" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19543" + +# cpe-stable-backport: Backported in 5.4.2 +CVE_CHECK_WHITELIST += "CVE-2019-19602" + +# cpe-stable-backport: Backported in 5.4.2 +CVE_CHECK_WHITELIST += "CVE-2019-19767" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2019-19768" + +# cpe-stable-backport: Backported in 5.4.28 +CVE_CHECK_WHITELIST += "CVE-2019-19769" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2019-19770" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19807" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19813" + +# CVE-2019-19814 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19922" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19927" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19947" + +# cpe-stable-backport: Backported in 5.4.9 +CVE_CHECK_WHITELIST += "CVE-2019-19965" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19966" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-1999" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-20054" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20095" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-20096" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2024" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2019-2025" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20422" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2054" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-20636" + +# CVE-2019-20794 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20806" + +# cpe-stable-backport: Backported in 5.4.48 +CVE_CHECK_WHITELIST += "CVE-2019-20810" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-20811" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-20812" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20908" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-20934" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2101" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2181" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2019-2182" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-2213" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-2214" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2215" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-25044" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-25045" + +# cpe-stable-backport: Backported in 5.4.19 +CVE_CHECK_WHITELIST += "CVE-2019-3016" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3459" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3460" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-3701" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3819" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3837" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3846" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3874" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3882" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3887" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3892" + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3896" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3900" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3901" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-5108" + +# Skipping CVE-2019-5489, no affected_versions + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_WHITELIST += "CVE-2019-6133" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-6974" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-7221" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-7222" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-7308" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_WHITELIST += "CVE-2019-8912" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-8956" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-8980" + +# fixed-version: Fixed after version 5.0rc4 +CVE_CHECK_WHITELIST += "CVE-2019-9003" + +# fixed-version: Fixed after version 5.0rc7 +CVE_CHECK_WHITELIST += "CVE-2019-9162" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-9213" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9245" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2019-9444" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9445" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9453" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2019-9454" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9455" + +# fixed-version: Fixed after version 4.16rc6 +CVE_CHECK_WHITELIST += "CVE-2019-9456" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9457" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2019-9458" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9466" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9500" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9503" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-9506" + +# fixed-version: Fixed after version 5.1rc2 +CVE_CHECK_WHITELIST += "CVE-2019-9857" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-0009" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2020-0030" + +# cpe-stable-backport: Backported in 5.4.4 +CVE_CHECK_WHITELIST += "CVE-2020-0041" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2020-0066" + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-0067" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-0110" + +# cpe-stable-backport: Backported in 5.4.39 +CVE_CHECK_WHITELIST += "CVE-2020-0255" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2020-0305" + +# CVE-2020-0347 has no known resolution + +# cpe-stable-backport: Backported in 5.4.19 +CVE_CHECK_WHITELIST += "CVE-2020-0404" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-0423" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2020-0427" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2020-0429" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0430" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2020-0431" + +# cpe-stable-backport: Backported in 5.4.17 +CVE_CHECK_WHITELIST += "CVE-2020-0432" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0433" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0435" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-0444" + +# cpe-stable-backport: Backported in 5.4.63 +CVE_CHECK_WHITELIST += "CVE-2020-0465" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-0466" + +# cpe-stable-backport: Backported in 5.4.46 +CVE_CHECK_WHITELIST += "CVE-2020-0543" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-10135" + +# cpe-stable-backport: Backported in 5.4.8 +CVE_CHECK_WHITELIST += "CVE-2020-10690" + +# CVE-2020-10708 has no known resolution + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-10711" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2020-10720" + +# cpe-stable-backport: Backported in 5.4.44 +CVE_CHECK_WHITELIST += "CVE-2020-10732" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2020-10742" + +# cpe-stable-backport: Backported in 5.4.39 +CVE_CHECK_WHITELIST += "CVE-2020-10751" + +# cpe-stable-backport: Backported in 5.4.45 +CVE_CHECK_WHITELIST += "CVE-2020-10757" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10766" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10767" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10768" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2020-10769" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2020-10773" + +# CVE-2020-10774 has no known resolution + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2020-10781" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-10942" + +# cpe-stable-backport: Backported in 5.4.32 +CVE_CHECK_WHITELIST += "CVE-2020-11494" + +# cpe-stable-backport: Backported in 5.4.31 +CVE_CHECK_WHITELIST += "CVE-2020-11565" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11608" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11609" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11668" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2020-11669" + +# CVE-2020-11725 has no known resolution + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-11884" + +# CVE-2020-11935 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2020-12114" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-12351" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-12352" + +# CVE-2020-12362 needs backporting (fixed from 5.11rc1) + +# CVE-2020-12363 needs backporting (fixed from 5.11rc1) + +# CVE-2020-12364 needs backporting (fixed from 5.11rc1) + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-12464" + +# cpe-stable-backport: Backported in 5.4.26 +CVE_CHECK_WHITELIST += "CVE-2020-12465" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2020-12652" + +# cpe-stable-backport: Backported in 5.4.20 +CVE_CHECK_WHITELIST += "CVE-2020-12653" + +# cpe-stable-backport: Backported in 5.4.20 +CVE_CHECK_WHITELIST += "CVE-2020-12654" + +# cpe-stable-backport: Backported in 5.4.50 +CVE_CHECK_WHITELIST += "CVE-2020-12655" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2020-12656" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2020-12657" + +# cpe-stable-backport: Backported in 5.4.35 +CVE_CHECK_WHITELIST += "CVE-2020-12659" + +# cpe-stable-backport: Backported in 5.4.43 +CVE_CHECK_WHITELIST += "CVE-2020-12768" + +# cpe-stable-backport: Backported in 5.4.17 +CVE_CHECK_WHITELIST += "CVE-2020-12769" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-12770" + +# cpe-stable-backport: Backported in 5.4.49 +CVE_CHECK_WHITELIST += "CVE-2020-12771" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2020-12826" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-12888" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-12912" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-13143" + +# cpe-stable-backport: Backported in 5.4.46 +CVE_CHECK_WHITELIST += "CVE-2020-13974" + +# CVE-2020-14304 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2020-14305" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-14314" + +# cpe-stable-backport: Backported in 5.4.58 +CVE_CHECK_WHITELIST += "CVE-2020-14331" + +# cpe-stable-backport: Backported in 5.4.78 +CVE_CHECK_WHITELIST += "CVE-2020-14351" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2020-14353" + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2020-14356" + +# cpe-stable-backport: Backported in 5.4.28 +CVE_CHECK_WHITELIST += "CVE-2020-14381" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-14385" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-14386" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-14390" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2020-14416" + +# cpe-stable-backport: Backported in 5.4.51 +CVE_CHECK_WHITELIST += "CVE-2020-15393" + +# cpe-stable-backport: Backported in 5.4.49 +CVE_CHECK_WHITELIST += "CVE-2020-15436" + +# cpe-stable-backport: Backported in 5.4.54 +CVE_CHECK_WHITELIST += "CVE-2020-15437" + +# cpe-stable-backport: Backported in 5.4.50 +CVE_CHECK_WHITELIST += "CVE-2020-15780" + +# CVE-2020-15802 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-15852" + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2020-16119" + +# CVE-2020-16120 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.57 +CVE_CHECK_WHITELIST += "CVE-2020-16166" + +# cpe-stable-backport: Backported in 5.4.5 +CVE_CHECK_WHITELIST += "CVE-2020-1749" + +# cpe-stable-backport: Backported in 5.4.51 +CVE_CHECK_WHITELIST += "CVE-2020-24394" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2020-24490" + +# CVE-2020-24502 has no known resolution + +# CVE-2020-24503 has no known resolution + +# CVE-2020-24504 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24586" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24587" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24588" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2020-25211" + +# cpe-stable-backport: Backported in 5.4.60 +CVE_CHECK_WHITELIST += "CVE-2020-25212" + +# CVE-2020-25220 has no known resolution + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-25221" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-25284" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-25285" + +# cpe-stable-backport: Backported in 5.4.102 +CVE_CHECK_WHITELIST += "CVE-2020-25639" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-25641" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2020-25643" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2020-25645" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-25656" + +# CVE-2020-25661 has no known resolution + +# CVE-2020-25662 has no known resolution + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-25668" + +# cpe-stable-backport: Backported in 5.4.79 +CVE_CHECK_WHITELIST += "CVE-2020-25669" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25670" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25671" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25672" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25673" + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-25704" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-25705" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2020-26088" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26139" + +# CVE-2020-26140 has no known resolution + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26141" + +# CVE-2020-26142 has no known resolution + +# CVE-2020-26143 has no known resolution + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26145" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26147" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2020-26541" + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2020-26555" + +# CVE-2020-26556 has no known resolution + +# CVE-2020-26557 has no known resolution + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2020-26558" + +# CVE-2020-26559 has no known resolution + +# CVE-2020-26560 has no known resolution + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-27066" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2020-27067" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-27068" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27152" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27170" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27171" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27194" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-2732" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27673" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27675" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27777" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-27784" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-27786" + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-27815" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2020-27820" + +# cpe-stable-backport: Backported in 5.4.94 +CVE_CHECK_WHITELIST += "CVE-2020-27825" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-27830" + +# CVE-2020-27835 needs backporting (fixed from 5.10rc6) + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-28097" + +# cpe-stable-backport: Backported in 5.4.89 +CVE_CHECK_WHITELIST += "CVE-2020-28374" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-28588" + +# cpe-stable-backport: Backported in 5.4.71 +CVE_CHECK_WHITELIST += "CVE-2020-28915" + +# cpe-stable-backport: Backported in 5.4.80 +CVE_CHECK_WHITELIST += "CVE-2020-28941" + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-28974" + +# cpe-stable-backport: Backported in 5.4.48 +CVE_CHECK_WHITELIST += "CVE-2020-29368" + +# cpe-stable-backport: Backported in 5.4.54 +CVE_CHECK_WHITELIST += "CVE-2020-29369" + +# cpe-stable-backport: Backported in 5.4.27 +CVE_CHECK_WHITELIST += "CVE-2020-29370" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-29371" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-29372" + +# CVE-2020-29373 needs backporting (fixed from 5.6rc2) + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-29374" + +# CVE-2020-29534 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-29568" + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-29569" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-29660" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-29661" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-35499" + +# CVE-2020-35501 has no known resolution + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-35508" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2020-35513" + +# cpe-stable-backport: Backported in 5.4.82 +CVE_CHECK_WHITELIST += "CVE-2020-35519" + +# cpe-stable-backport: Backported in 5.4.88 +CVE_CHECK_WHITELIST += "CVE-2020-36158" + +# CVE-2020-36310 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.131 +CVE_CHECK_WHITELIST += "CVE-2020-36311" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-36312" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36313" + +# cpe-stable-backport: Backported in 5.4.88 +CVE_CHECK_WHITELIST += "CVE-2020-36322" + +# CVE-2020-36385 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.58 +CVE_CHECK_WHITELIST += "CVE-2020-36386" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36387" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2020-36516" + +# cpe-stable-backport: Backported in 5.4.30 +CVE_CHECK_WHITELIST += "CVE-2020-36557" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-36558" + +# CVE-2020-36691 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-36694" + +# cpe-stable-backport: Backported in 5.4.143 +CVE_CHECK_WHITELIST += "CVE-2020-3702" + +# cpe-stable-backport: Backported in 5.4.79 +CVE_CHECK_WHITELIST += "CVE-2020-4788" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2020-7053" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2020-8428" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8647" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8648" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8649" + +# cpe-stable-backport: Backported in 5.4.77 +CVE_CHECK_WHITELIST += "CVE-2020-8694" + +# CVE-2020-8832 has no known resolution + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2020-8834" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-8835" + +# cpe-stable-backport: Backported in 5.4.21 +CVE_CHECK_WHITELIST += "CVE-2020-8992" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-9383" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-9391" + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2021-0129" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2021-0342" + +# CVE-2021-0399 has no known resolution + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2021-0447" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2021-0448" + +# cpe-stable-backport: Backported in 5.4.101 +CVE_CHECK_WHITELIST += "CVE-2021-0512" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2021-0605" + +# CVE-2021-0606 has no known resolution + +# CVE-2021-0695 has no known resolution + +# fixed-version: only affects 5.8rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-0707" + +# cpe-stable-backport: Backported in 5.4.137 +CVE_CHECK_WHITELIST += "CVE-2021-0920" + +# CVE-2021-0924 has no known resolution + +# CVE-2021-0929 needs backporting (fixed from 5.6rc1) + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2021-0935" + +# CVE-2021-0936 has no known resolution + +# cpe-stable-backport: Backported in 5.4.113 +CVE_CHECK_WHITELIST += "CVE-2021-0937" + +# cpe-stable-backport: Backported in 5.4.84 +CVE_CHECK_WHITELIST += "CVE-2021-0938" + +# cpe-stable-backport: Backported in 5.4.110 +CVE_CHECK_WHITELIST += "CVE-2021-0941" + +# CVE-2021-0961 has no known resolution + +# fixed-version: only affects 5.9rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2021-1048" + +# CVE-2021-20177 needs backporting (fixed from 5.5rc1) + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20194" + +# CVE-2021-20219 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20226" + +# CVE-2021-20239 needs backporting (fixed from 5.9rc1) + +# fixed-version: Fixed after version 4.5rc5 +CVE_CHECK_WHITELIST += "CVE-2021-20261" + +# fixed-version: Fixed after version 4.5rc3 +CVE_CHECK_WHITELIST += "CVE-2021-20265" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20268" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2021-20292" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2021-20317" + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2021-20320" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-20321" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-20322" + +# cpe-stable-backport: Backported in 5.4.99 +CVE_CHECK_WHITELIST += "CVE-2021-21781" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2021-22543" + +# cpe-stable-backport: Backported in 5.4.113 +CVE_CHECK_WHITELIST += "CVE-2021-22555" + +# fixed-version: only affects 5.6 onwards +CVE_CHECK_WHITELIST += "CVE-2021-22600" + +# cpe-stable-backport: Backported in 5.4.114 +CVE_CHECK_WHITELIST += "CVE-2021-23133" + +# fixed-version: only affects 5.12rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-23134" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2021-26401" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-26708" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26930" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26931" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26932" + +# CVE-2021-26934 has no known resolution + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27363" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27364" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27365" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-28038" + +# fixed-version: only affects 5.9rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28039" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-28375" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-28660" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-28688" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28691" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28711" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28712" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28713" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28714" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28715" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28950" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28951" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28952" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28964" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28971" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28972" + +# cpe-stable-backport: Backported in 5.4.111 +CVE_CHECK_WHITELIST += "CVE-2021-29154" + +# CVE-2021-29155 needs backporting (fixed from 5.12rc8) + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29264" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-29265" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29266" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29646" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29647" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29648" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29649" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29650" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29657" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-30002" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-30178" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-31440" + +# cpe-stable-backport: Backported in 5.4.92 +CVE_CHECK_WHITELIST += "CVE-2021-3178" + +# cpe-stable-backport: Backported in 5.4.117 +CVE_CHECK_WHITELIST += "CVE-2021-31829" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-31916" + +# CVE-2021-32078 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-32399" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-32606" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-33033" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-33034" + +# CVE-2021-33061 needs backporting (fixed from 5.18rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-33098" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-33135" + +# fixed-version: only affects 5.12rc8 onwards +CVE_CHECK_WHITELIST += "CVE-2021-33200" + +# cpe-stable-backport: Backported in 5.4.94 +CVE_CHECK_WHITELIST += "CVE-2021-3347" + +# cpe-stable-backport: Backported in 5.4.95 +CVE_CHECK_WHITELIST += "CVE-2021-3348" + +# cpe-stable-backport: Backported in 5.4.139 +CVE_CHECK_WHITELIST += "CVE-2021-33624" + +# cpe-stable-backport: Backported in 5.4.205 +CVE_CHECK_WHITELIST += "CVE-2021-33655" + +# cpe-stable-backport: Backported in 5.4.202 +CVE_CHECK_WHITELIST += "CVE-2021-33656" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-33909" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3411" + +# cpe-stable-backport: Backported in 5.4.62 +CVE_CHECK_WHITELIST += "CVE-2021-3428" + +# cpe-stable-backport: Backported in 5.4.101 +CVE_CHECK_WHITELIST += "CVE-2021-3444" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-34556" + +# cpe-stable-backport: Backported in 5.4.128 +CVE_CHECK_WHITELIST += "CVE-2021-34693" + +# cpe-stable-backport: Backported in 5.4.110 +CVE_CHECK_WHITELIST += "CVE-2021-3483" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-34866" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3489" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3490" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3491" + +# CVE-2021-3492 has no known resolution + +# CVE-2021-3493 needs backporting (fixed from 5.11rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-34981" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3501" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2021-35039" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-3506" + +# CVE-2021-3542 has no known resolution + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3543" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-35477" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3564" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3573" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3587" + +# cpe-stable-backport: Backported in 5.4.98 +CVE_CHECK_WHITELIST += "CVE-2021-3600" + +# cpe-stable-backport: Backported in 5.4.132 +CVE_CHECK_WHITELIST += "CVE-2021-3609" + +# cpe-stable-backport: Backported in 5.4.102 +CVE_CHECK_WHITELIST += "CVE-2021-3612" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2021-3635" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-3640" + +# cpe-stable-backport: Backported in 5.4.142 +CVE_CHECK_WHITELIST += "CVE-2021-3653" + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2021-3655" + +# cpe-stable-backport: Backported in 5.4.142 +CVE_CHECK_WHITELIST += "CVE-2021-3656" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2021-3659" + +# CVE-2021-3669 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-3679" + +# CVE-2021-3714 has no known resolution + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2021-3715" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-37159" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-3732" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3736" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-3739" + +# cpe-stable-backport: Backported in 5.4.128 +CVE_CHECK_WHITELIST += "CVE-2021-3743" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-3744" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-3752" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-3753" + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-37576" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2021-3759" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-3760" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-3764" + +# cpe-stable-backport: Backported in 5.4.157 +CVE_CHECK_WHITELIST += "CVE-2021-3772" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-38160" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38166" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-38198" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-38199" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38200" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38201" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38202" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38203" + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-38204" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-38205" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38206" + +# fixed-version: only affects 5.6rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38207" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-38208" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38209" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-38300" + +# CVE-2021-3847 has no known resolution + +# CVE-2021-3864 has no known resolution + +# CVE-2021-3892 has no known resolution + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2021-3894" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-3896" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-3923" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-39633" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2021-39634" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39636" + +# cpe-stable-backport: Backported in 5.4.89 +CVE_CHECK_WHITELIST += "CVE-2021-39648" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-39656" + +# cpe-stable-backport: Backported in 5.4.93 +CVE_CHECK_WHITELIST += "CVE-2021-39657" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2021-39685" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-39686" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2021-39698" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_WHITELIST += "CVE-2021-39711" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39713" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39714" + +# CVE-2021-39800 has no known resolution + +# CVE-2021-39801 has no known resolution + +# CVE-2021-39802 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4001" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2021-4002" + +# CVE-2021-4023 needs backporting (fixed from 5.15rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4028" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4032" + +# cpe-stable-backport: Backported in 5.4.241 +CVE_CHECK_WHITELIST += "CVE-2021-4037" + +# cpe-stable-backport: Backported in 5.4.145 +CVE_CHECK_WHITELIST += "CVE-2021-40490" + +# cpe-stable-backport: Backported in 5.4.164 +CVE_CHECK_WHITELIST += "CVE-2021-4083" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4090" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4093" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4095" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-41073" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-4135" + +# CVE-2021-4148 needs backporting (fixed from 5.15) + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2021-4149" + +# CVE-2021-4150 needs backporting (fixed from 5.15rc7) + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-4154" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-4155" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-4157" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2021-4159" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-41864" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2021-4197" + +# cpe-stable-backport: Backported in 5.4.143 +CVE_CHECK_WHITELIST += "CVE-2021-42008" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2021-4202" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-4203" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4204" + +# CVE-2021-4218 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2021-42252" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-42327" + +# cpe-stable-backport: Backported in 5.4.158 +CVE_CHECK_WHITELIST += "CVE-2021-42739" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-43056" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-43057" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-43267" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-43389" + +# cpe-stable-backport: Backported in 5.4.164 +CVE_CHECK_WHITELIST += "CVE-2021-43975" + +# cpe-stable-backport: Backported in 5.4.174 +CVE_CHECK_WHITELIST += "CVE-2021-43976" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-44733" + +# CVE-2021-44879 needs backporting (fixed from 5.17rc1) + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-45095" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45100" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45402" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-45469" + +# fixed-version: only affects 5.13rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45480" + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2021-45485" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-45486" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-45868" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46283" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-0001" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-0002" + +# CVE-2022-0168 needs backporting (fixed from 5.18rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0171" + +# cpe-stable-backport: Backported in 5.4.173 +CVE_CHECK_WHITELIST += "CVE-2022-0185" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0264" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0286" + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2022-0322" + +# cpe-stable-backport: Backported in 5.4.175 +CVE_CHECK_WHITELIST += "CVE-2022-0330" + +# CVE-2022-0382 needs backporting (fixed from 5.16) + +# CVE-2022-0400 has no known resolution + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0433" + +# cpe-stable-backport: Backported in 5.4.179 +CVE_CHECK_WHITELIST += "CVE-2022-0435" + +# CVE-2022-0480 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.179 +CVE_CHECK_WHITELIST += "CVE-2022-0487" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-0492" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-0494" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0500" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0516" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-0617" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2022-0644" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0646" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0742" + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2022-0812" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0847" + +# cpe-stable-backport: Backported in 5.4.132 +CVE_CHECK_WHITELIST += "CVE-2022-0850" + +# fixed-version: only affects 5.17rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0854" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0995" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0998" + +# cpe-stable-backport: Backported in 5.4.185 +CVE_CHECK_WHITELIST += "CVE-2022-1011" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-1012" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1015" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-1016" + +# fixed-version: only affects 5.12rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1043" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1048" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-1055" + +# CVE-2022-1116 has no known resolution + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1158" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-1184" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2022-1195" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1198" + +# cpe-stable-backport: Backported in 5.4.185 +CVE_CHECK_WHITELIST += "CVE-2022-1199" + +# cpe-stable-backport: Backported in 5.4.190 +CVE_CHECK_WHITELIST += "CVE-2022-1204" + +# fixed-version: only affects 5.17rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1205" + +# CVE-2022-1247 has no known resolution + +# CVE-2022-1263 needs backporting (fixed from 5.18rc3) + +# CVE-2022-1280 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1353" + +# cpe-stable-backport: Backported in 5.4.21 +CVE_CHECK_WHITELIST += "CVE-2022-1419" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-1462" + +# CVE-2022-1508 needs backporting (fixed from 5.15rc1) + +# fixed-version: only affects 5.7rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1516" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1651" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-1652" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1671" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2022-1678" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-1679" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-1729" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1734" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1786" + +# CVE-2022-1789 needs backporting (fixed from 5.18) + +# cpe-stable-backport: Backported in 5.4.192 +CVE_CHECK_WHITELIST += "CVE-2022-1836" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1852" + +# fixed-version: only affects 5.17rc8 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1882" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1943" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-1966" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1972" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1973" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1974" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1975" + +# fixed-version: only affects 5.18rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1976" + +# fixed-version: only affects 5.13rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1998" + +# cpe-stable-backport: Backported in 5.4.181 +CVE_CHECK_WHITELIST += "CVE-2022-20008" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2022-20132" + +# cpe-stable-backport: Backported in 5.4.145 +CVE_CHECK_WHITELIST += "CVE-2022-20141" + +# CVE-2022-20148 needs backporting (fixed from 5.16rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20153" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2022-20154" + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-20158" + +# CVE-2022-20166 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-20368" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2022-20369" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20409" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-20421" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-20422" + +# fixed-version: only affects 5.17rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20423" + +# CVE-2022-20424 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.63 +CVE_CHECK_WHITELIST += "CVE-2022-20565" + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2022-20566" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2022-20567" + +# fixed-version: only affects 5.7rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20568" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-20572" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2078" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21123" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21125" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21166" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2022-21385" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-21499" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-21505" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2153" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2196" + +# CVE-2022-2209 has no known resolution + +# cpe-stable-backport: Backported in 5.4.175 +CVE_CHECK_WHITELIST += "CVE-2022-22942" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23036" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23037" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23038" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23039" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23040" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23041" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23042" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2308" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-2318" + +# CVE-2022-23222 needs backporting (fixed from 5.17rc1) + +# CVE-2022-2327 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-2380" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-23816" + +# CVE-2022-23825 has no known resolution + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23960" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-24122" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-24448" + +# cpe-stable-backport: Backported in 5.4.183 +CVE_CHECK_WHITELIST += "CVE-2022-24958" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-24959" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-2503" + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-25258" + +# CVE-2022-25265 has no known resolution + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-25375" + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-25636" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2585" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2586" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2588" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2590" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-2602" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-26365" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2022-26373" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-2639" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-26490" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-2663" + +# CVE-2022-26878 has no known resolution + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-26966" + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-27223" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-27666" + +# CVE-2022-27672 needs backporting (fixed from 6.2) + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2785" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-27950" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-28356" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-28388" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-28389" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-28390" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2873" + +# fixed-version: only affects 5.17rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2022-28796" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-28893" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2905" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29156" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-2938" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-29581" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29582" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2959" + +# CVE-2022-2961 has no known resolution + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-2964" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-2977" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-2978" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-29900" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-29901" + +# CVE-2022-2991 needs backporting (fixed from 5.15rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29968" + +# cpe-stable-backport: Backported in 5.4.212 +CVE_CHECK_WHITELIST += "CVE-2022-3028" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-30594" + +# CVE-2022-3061 needs backporting (fixed from 5.18rc5) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3077" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3078" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3103" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3104" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2022-3105" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3106" + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-3107" + +# CVE-2022-3108 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3110" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3111" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3112" + +# fixed-version: only affects 5.10rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3113" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3114" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-3115" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2022-3169" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3170" + +# CVE-2022-3176 needs backporting (fixed from 5.17rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3202" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-32250" + +# cpe-stable-backport: Backported in 5.4.201 +CVE_CHECK_WHITELIST += "CVE-2022-32296" + +# CVE-2022-3238 has no known resolution + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3239" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-32981" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-3303" + +# CVE-2022-3344 needs backporting (fixed from 6.1rc7) + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33740" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33741" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33742" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-33743" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33744" + +# cpe-stable-backport: Backported in 5.4.192 +CVE_CHECK_WHITELIST += "CVE-2022-33981" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-3424" + +# fixed-version: only affects 5.18rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3435" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-34494" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-34495" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2022-34918" + +# cpe-stable-backport: Backported in 5.4.225 +CVE_CHECK_WHITELIST += "CVE-2022-3521" + +# CVE-2022-3522 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3523 needs backporting (fixed from 6.1rc1) + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3524" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3526" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3531" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3532" + +# CVE-2022-3533 has no known resolution + +# CVE-2022-3534 needs backporting (fixed from 6.2rc1) + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3535" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3541" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3542" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3543" + +# CVE-2022-3544 has no known resolution + +# cpe-stable-backport: Backported in 5.4.228 +CVE_CHECK_WHITELIST += "CVE-2022-3545" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3564" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3565" + +# CVE-2022-3566 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3567 needs backporting (fixed from 6.1rc1) + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-3577" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-3586" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3594" + +# CVE-2022-3595 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3606 has no known resolution + +# cpe-stable-backport: Backported in 5.4.207 +CVE_CHECK_WHITELIST += "CVE-2022-36123" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3619" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-3621" + +# cpe-stable-backport: Backported in 5.4.228 +CVE_CHECK_WHITELIST += "CVE-2022-3623" + +# CVE-2022-3624 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3625" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3628" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-36280" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3629" + +# fixed-version: only affects 5.19rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3630" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3633" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3635" + +# CVE-2022-3636 needs backporting (fixed from 5.19rc1) + +# fixed-version: only affects 5.19 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3640" + +# CVE-2022-36402 has no known resolution + +# CVE-2022-3642 has no known resolution + +# cpe-stable-backport: Backported in 5.4.227 +CVE_CHECK_WHITELIST += "CVE-2022-3643" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-3646" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3649" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-36879" + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2022-36946" + +# cpe-stable-backport: Backported in 5.4.233 +CVE_CHECK_WHITELIST += "CVE-2022-3707" + +# CVE-2022-38096 has no known resolution + +# CVE-2022-38457 needs backporting (fixed from 6.2rc4) + +# CVE-2022-3903 needs backporting (fixed from 6.1rc2) + +# fixed-version: only affects 5.18 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3910" + +# CVE-2022-39188 needs backporting (fixed from 5.19rc8) + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2022-39189" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-39190" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3977" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-39842" + +# CVE-2022-40133 needs backporting (fixed from 6.2rc4) + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-40307" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-40476" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-40768" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-4095" + +# CVE-2022-40982 has no known resolution + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-41218" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-41222" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4127" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4128" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2022-4129" + +# fixed-version: only affects 5.17rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4139" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-41674" + +# CVE-2022-41848 has no known resolution + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-41849" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-41850" + +# cpe-stable-backport: Backported in 5.4.190 +CVE_CHECK_WHITELIST += "CVE-2022-41858" + +# fixed-version: only affects 5.16rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42328" + +# fixed-version: only affects 5.16rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42329" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-42432" + +# CVE-2022-4269 needs backporting (fixed from 6.3rc1) + +# cpe-stable-backport: Backported in 5.4.212 +CVE_CHECK_WHITELIST += "CVE-2022-42703" + +# cpe-stable-backport: Backported in 5.4.219 +CVE_CHECK_WHITELIST += "CVE-2022-42719" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-42720" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-42721" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42722" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-42895" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2022-42896" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-43750" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4378" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4379" + +# cpe-stable-backport: Backported in 5.4.230 +CVE_CHECK_WHITELIST += "CVE-2022-4382" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-43945" + +# CVE-2022-44032 has no known resolution + +# CVE-2022-44033 has no known resolution + +# CVE-2022-44034 has no known resolution + +# CVE-2022-4543 has no known resolution + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-45869" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +# CVE-2022-45886 has no known resolution + +# CVE-2022-45887 has no known resolution + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-45888" + +# CVE-2022-45919 has no known resolution + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-45934" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-4662" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4696" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2022-4744" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47518" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47519" + +# CVE-2022-47520 needs backporting (fixed from 6.1rc8) + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47521" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-47929" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47938" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47939" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47940" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47941" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47942" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47943" + +# CVE-2022-47946 needs backporting (fixed from 5.12rc2) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4842" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48423" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48424" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48425" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48502" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2023-0030" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0045" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2023-0047" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0122" + +# CVE-2023-0160 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0179" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0210" + +# CVE-2023-0240 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0266" + +# CVE-2023-0386 needs backporting (fixed from 6.2rc6) + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0394" + +# cpe-stable-backport: Backported in 5.4.230 +CVE_CHECK_WHITELIST += "CVE-2023-0458" + +# cpe-stable-backport: Backported in 5.4.233 +CVE_CHECK_WHITELIST += "CVE-2023-0459" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0461" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0468" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0469" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-0590" + +# CVE-2023-0597 needs backporting (fixed from 6.2rc1) + +# cpe-stable-backport: Backported in 5.4.223 +CVE_CHECK_WHITELIST += "CVE-2023-0615" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1032" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-1073" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-1074" + +# CVE-2023-1075 needs backporting (fixed from 6.2rc7) + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1076" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1077" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-1078" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1079" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2023-1095" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1118" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1192" + +# CVE-2023-1193 has no known resolution + +# CVE-2023-1194 has no known resolution + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1195" + +# CVE-2023-1206 needs backporting (fixed from 6.5rc4) + +# CVE-2023-1249 needs backporting (fixed from 5.18rc1) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1252" + +# CVE-2023-1281 needs backporting (fixed from 6.2) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1295" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-1380" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2023-1382" + +# cpe-stable-backport: Backported in 5.4.92 +CVE_CHECK_WHITELIST += "CVE-2023-1390" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-1513" + +# CVE-2023-1582 needs backporting (fixed from 5.17rc4) + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1583" + +# CVE-2023-1611 needs backporting (fixed from 6.3rc5) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2023-1637" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1652" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-1670" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1829" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2023-1838" + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-1855" + +# cpe-stable-backport: Backported in 5.4.241 +CVE_CHECK_WHITELIST += "CVE-2023-1859" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1872" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-1989" + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-1990" + +# fixed-version: only affects 5.19rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1998" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-2002" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2006" + +# CVE-2023-2007 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.202 +CVE_CHECK_WHITELIST += "CVE-2023-2008" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2019" + +# CVE-2023-20569 has no known resolution + +# CVE-2023-20588 has no known resolution + +# cpe-stable-backport: Backported in 5.4.250 +CVE_CHECK_WHITELIST += "CVE-2023-20593" + +# CVE-2023-20928 needs backporting (fixed from 6.0rc1) + +# CVE-2023-20937 has no known resolution + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-20938" + +# CVE-2023-20941 has no known resolution + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21102" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21106" + +# cpe-stable-backport: Backported in 5.4.249 +CVE_CHECK_WHITELIST += "CVE-2023-2124" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21255" + +# CVE-2023-21264 needs backporting (fixed from 6.4rc5) + +# CVE-2023-21400 has no known resolution + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2156" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-2162" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2163" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2166" + +# CVE-2023-2176 needs backporting (fixed from 6.3rc1) + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2023-2177" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-2194" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2235" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2236" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2248" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-2269" + +# CVE-2023-22995 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22996" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22997" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22998" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22999" + +# CVE-2023-23000 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23001" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23002" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23003" + +# CVE-2023-23004 needs backporting (fixed from 5.19rc1) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23005" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2023-23006" + +# CVE-2023-23039 has no known resolution + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-23454" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-23455" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-23559" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23586" + +# CVE-2023-2430 needs backporting (fixed from 6.2rc5) + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-2483" + +# fixed-version: only affects 5.6rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2023-25012" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2513" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2598" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26544" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-26545" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26605" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26606" + +# cpe-stable-backport: Backported in 5.4.225 +CVE_CHECK_WHITELIST += "CVE-2023-26607" + +# cpe-stable-backport: Backported in 5.4.227 +CVE_CHECK_WHITELIST += "CVE-2023-28327" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-28328" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28410" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28464" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-28466" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2023-2860" + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2023-28772" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28866" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2898" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-2985" + +# CVE-2023-3006 needs backporting (fixed from 6.1rc1) + +# Skipping CVE-2023-3022, no affected_versions + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-30456" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-30772" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2023-3090" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2023-3106" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +# CVE-2023-31083 has no known resolution + +# CVE-2023-31084 needs backporting (fixed from 6.4rc3) + +# CVE-2023-31085 has no known resolution + +# cpe-stable-backport: Backported in 5.4.247 +CVE_CHECK_WHITELIST += "CVE-2023-3111" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3117" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-31248" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2023-3141" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-31436" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2023-3159" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-3161" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3212" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-3220" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-32233" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32247" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32248" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32250" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32252" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32254" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32257" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32258" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-32269" + +# CVE-2023-32629 has no known resolution + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-3268" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3269" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3312" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3317" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-33203" + +# CVE-2023-33250 has no known resolution + +# CVE-2023-33288 needs backporting (fixed from 6.3rc4) + +# cpe-stable-backport: Backported in 5.4.248 +CVE_CHECK_WHITELIST += "CVE-2023-3338" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3355" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3357" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-3358" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3359" + +# CVE-2023-3389 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3390" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-33951" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-33952" + +# CVE-2023-3397 has no known resolution + +# cpe-stable-backport: Backported in 5.4.249 +CVE_CHECK_WHITELIST += "CVE-2023-34255" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-34256" + +# CVE-2023-34319 has no known resolution + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3439" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-35001" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-3567" + +# CVE-2023-35693 has no known resolution + +# cpe-stable-backport: Backported in 5.4.246 +CVE_CHECK_WHITELIST += "CVE-2023-35788" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35823" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35824" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-35826" + +# CVE-2023-35827 has no known resolution + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35828" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-35829" + +# cpe-stable-backport: Backported in 5.4.248 +CVE_CHECK_WHITELIST += "CVE-2023-3609" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3610" + +# CVE-2023-3611 needs backporting (fixed from 6.5rc2) + +# CVE-2023-3640 has no known resolution + +# CVE-2023-37453 has no known resolution + +# CVE-2023-37454 has no known resolution + +# CVE-2023-3772 has no known resolution + +# CVE-2023-3773 has no known resolution + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3776" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2023-3812" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38409" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38426" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38427" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38428" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38429" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38430" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38431" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38432" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3863" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4004" + +# CVE-2023-4010 has no known resolution + +# CVE-2023-4128 needs backporting (fixed from 6.5rc5) + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-4132" + +# CVE-2023-4133 needs backporting (fixed from 6.3) + +# CVE-2023-4134 needs backporting (fixed from 6.5rc1) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4147" + +# CVE-2023-4155 has no known resolution + +# CVE-2023-4194 needs backporting (fixed from 6.5rc5) + +# CVE-2023-4273 needs backporting (fixed from 6.5rc5) + diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb index 848d9a339d..a466e5c2fc 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb @@ -1,6 +1,7 @@ KBRANCH ?= "v5.4/standard/base" require recipes-kernel/linux/linux-yocto.inc +include recipes-kernel/linux/cve-exclusion_5.4.inc # board specific branches KBRANCH_qemuarm ?= "v5.4/standard/arm-versatile-926ejs" From patchwork Mon Sep 4 14:22:40 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29937 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 03247C83F3F for ; Mon, 4 Sep 2023 14:23:04 +0000 (UTC) Received: from mail-pg1-f181.google.com (mail-pg1-f181.google.com [209.85.215.181]) by mx.groups.io with SMTP id smtpd.web11.49486.1693837380590827264 for ; Mon, 04 Sep 2023 07:23:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=JWMnIh2/; spf=softfail (domain: sakoman.com, ip: 209.85.215.181, mailfrom: steve@sakoman.com) Received: by mail-pg1-f181.google.com with SMTP id 41be03b00d2f7-56c2e882416so740588a12.3 for ; Mon, 04 Sep 2023 07:23:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1693837380; x=1694442180; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0AJZVKUK8uKsI9tFqPexTw7YCcu8SbZ4WsxvyWY3b94=; b=JWMnIh2/PNvRV9FN6xIqL/fpAquqMDGVN6wMkJTApsS3zEiOA9DP5eXoM0bKmEMTDP sPrwl6IjSyY+ZZLd8Dsz6R+x58vOGlg0UvsIvLnAyqMXWZQZYmzWREjJZKohMi6lNHPS HwPfqNfHKdZtdX9cHaSkECuqLRaKFO8Bti8Fb8ZAgR7n7p7g2TDF6DpRa+9oStTxnxHa HUaWGTL3O+eKMQeQuIg2bNLC3Kr/XWoN8YA+kdCR0KXTF1Kx9t5TGljVq7Z86ZB7d1Q+ urP9CO1NPrctrTQKy5/Ji1aYI7TckBHxEBV0PqdJTJmPLiwWMf4Le/TG8QwXVWEggASO JbyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693837380; x=1694442180; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0AJZVKUK8uKsI9tFqPexTw7YCcu8SbZ4WsxvyWY3b94=; b=EnMMW6D5BzE06Svwj+1TL4E4lPGp4P+peRH3sVLSsLYQvCs3TAMenMmt9FB6sK7dAY n0wSn57qZW5gubhe/FKwB9NEO4HqUkK3qlet5x4E+VmpoPdW8ceCV8XklMgHziqivPJ9 LuJi0k9UnTS7L3fTlMAlai4GCYtpEYSfTqJ+NAt5BbzlZwxUZyOYqcO9gnrvf4k0Begn ThBw77zuWenV604OEp+oDwFMOzitf4CW9C/H8I46DLA+6PjLRp5YMjmAWxpnuO5rqOsK GjVIs4Ay9V7LaOMtQHdJUHoiKLhSFRwqVZN8sWlhhP3clcosHmJShLma7pNqFJTco9W5 krTQ== X-Gm-Message-State: AOJu0Yw+rTxzPHH9AeHtBm3hrJwtHNa8gsh3Z/1CL7gNJr3i6Pm3N4zU K7aHLzn3BrlbfrhfJsDtylVx6lBI6EQguiOQMLA= X-Google-Smtp-Source: AGHT+IHkHza/8xO1Z4ikmFZ7IuN540TxWfzTpLDnQDdYcHYkCeDfXydoby69AlFeJfYOF2j/qrot3Q== X-Received: by 2002:a05:6a20:428b:b0:14d:7511:1c1 with SMTP id o11-20020a056a20428b00b0014d751101c1mr10920711pzj.49.1693837378430; Mon, 04 Sep 2023 07:22:58 -0700 (PDT) Received: from xps13.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id z14-20020aa785ce000000b00689f10adef9sm7443032pfn.67.2023.09.04.07.22.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Sep 2023 07:22:57 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 5/5] linux/cve-exclusion: remove obsolete manual entries Date: Mon, 4 Sep 2023 04:22:40 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Sep 2023 14:23:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187187 From: Ross Burton The generated file covers all but two of these CVEs (which will be fixed when [1] and [2] are resolved) so remove the redundant entries. [1] https://github.com/nluedtke/linux_kernel_cves/issues/344 [2] https://github.com/nluedtke/linux_kernel_cves/issues/345 Signed-off-by: Ross Burton Signed-off-by: Steve Sakoman --- meta/recipes-kernel/linux/cve-exclusion.inc | 1827 ------------------- 1 file changed, 1827 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc index a18e603bc9..efc8b09475 100644 --- a/meta/recipes-kernel/linux/cve-exclusion.inc +++ b/meta/recipes-kernel/linux/cve-exclusion.inc @@ -1,1840 +1,13 @@ # Kernel CVE exclusion file -# https://nvd.nist.gov/vuln/detail/CVE-2014-8171 -# Patched in kernel since v3.12 4942642080ea82d99ab5b653abb9a12b7ba31f4a -CVE_CHECK_WHITELIST += "CVE-2014-8171" - -# https://nvd.nist.gov/vuln/detail/CVE-2017-1000255 -# Patched in kernel since v4.14 265e60a170d0a0ecfc2d20490134ed2c48dd45ab -CVE_CHECK_WHITELIST += "CVE-2017-1000255" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-5873 -# Patched in kernel since v4.11 073c516ff73557a8f7315066856c04b50383ac34 -CVE_CHECK_WHITELIST += "CVE-2018-5873" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-10840 -# Patched in kernel since v4.18 8a2b307c21d4b290e3cbe33f768f194286d07c23 -CVE_CHECK_WHITELIST += "CVE-2018-10840" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-10876 -# Patched in kernel since v4.18 8844618d8aa7a9973e7b527d038a2a589665002c -CVE_CHECK_WHITELIST += "CVE-2018-10876" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-10882 -# Patched in kernel since v4.18 c37e9e013469521d9adb932d17a1795c139b36db -CVE_CHECK_WHITELIST += "CVE-2018-10882" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-10902 -# Patched in kernel since v4.18 39675f7a7c7e7702f7d5341f1e0d01db746543a0 -CVE_CHECK_WHITELIST += "CVE-2018-10902" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-14625 -# Patched in kernel since v4.20 834e772c8db0c6a275d75315d90aba4ebbb1e249 -CVE_CHECK_WHITELIST += "CVE-2018-14625" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-16880 -# Patched in kernel since v5.0 b46a0bf78ad7b150ef5910da83859f7f5a514ffd -CVE_CHECK_WHITELIST += "CVE-2018-16880" - -# https://nvd.nist.gov/vuln/detail/CVE-2018-16884 -# Patched in kernel since v5.0 d4b09acf924b84bae77cad090a9d108e70b43643 -CVE_CHECK_WHITELIST += "CVE-2018-16884" - -# https://nvd.nist.gov/vuln/detail/CVE-2019-3819 -# Patched in kernel since v5.0 13054abbaa4f1fd4e6f3b4b63439ec033b4c8035 -CVE_CHECK_WHITELIST += "CVE-2019-3819" - -# https://nvd.nist.gov/vuln/detail/CVE-2019-20810 -# Patched in kernel since v5.6 9453264ef58638ce8976121ac44c07a3ef375983 -# Backported in version v5.4.48 6e688a315acf9c2b9b6e8c3e3b7a0c2720f72cba -CVE_CHECK_WHITELIST += "CVE-2019-20810" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-1749 -# Patched in kernel since v5.5 6c8991f41546c3c472503dff1ea9daaddf9331c2 -# Backported in version v5.4.5 48d58ae9e87aaa11814364ddb52b3461f9abac57 -CVE_CHECK_WHITELIST += "CVE-2020-1749" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-8428 -# Patched in kernel since v5.5 d0cb50185ae942b03c4327be322055d622dc79f6 -# Backported in version v5.4.16 454759886d0b463213fad0f1c733469e2c501ab9 -CVE_CHECK_WHITELIST += "CVE-2020-8428" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-8647 -# Patched in kernel since v5.6 513dc792d6060d5ef572e43852683097a8420f56 -# Backported in version v5.4.25 5d230547476eea90b57ed9fda4bfe5307779abbb -CVE_CHECK_WHITELIST += "CVE-2020-8647" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-8649 -# Patched in kernel since v5.6 513dc792d6060d5ef572e43852683097a8420f56 -# Backported in version v5.4.25 5d230547476eea90b57ed9fda4bfe5307779abbb -CVE_CHECK_WHITELIST += "CVE-2020-8649" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-8992 -# Patched in kernel since v5.6 af133ade9a40794a37104ecbcc2827c0ea373a3c -# Backported in version v5.4.21 94f0fe04da78adc214b51523499031664f9db408 -CVE_CHECK_WHITELIST += "CVE-2020-8992" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-9383 -# Patched in kernel since v5.6 2e90ca68b0d2f5548804f22f0dd61145516171e3 -# Backported in version v5.4.23 1eb78bc92c847f9e1c01a01b2773fc2fe7b134cf -CVE_CHECK_WHITELIST += "CVE-2020-9383" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10690 -# Patched in kernel since v5.5 a33121e5487b424339636b25c35d3a180eaa5f5e -# Backported in version v5.4.8 bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad -CVE_CHECK_WHITELIST += "CVE-2020-10690" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10711 -# Patched in kernel since v5.7 eead1c2ea2509fd754c6da893a94f0e69e83ebe4 -# Backported in version v5.4.42 debcbc56fdfc2847804d3d00d43f68f3074c5987 -CVE_CHECK_WHITELIST += "CVE-2020-10711" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10732 -# Patched in kernel since v5.7 1d605416fb7175e1adf094251466caa52093b413 -# Backported in version v5.4.44 a02c130efbbce91af1e9dd99a5a381dd43494e15 -CVE_CHECK_WHITELIST += "CVE-2020-10732" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10742 -# Patched in kernel since v3.16 91f79c43d1b54d7154b118860d81b39bad07dfff -CVE_CHECK_WHITELIST += "CVE-2020-10742" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10757 -# Patched in kernel since v5.8 5bfea2d9b17f1034a68147a8b03b9789af5700f9 -# Backported in version v5.4.45 df4988aa1c9618d9c612639e96002cd4e772def2 -CVE_CHECK_WHITELIST += "CVE-2020-10757" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10766 -# Patched in kernel since v5.8 dbbe2ad02e9df26e372f38cc3e70dab9222c832e -# Backported in version v5.4.47 9d1dcba6dd48cf7c5801d8aee12852ca41110896 -CVE_CHECK_WHITELIST += "CVE-2020-10766" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10767 -# Patched in kernel since v5.8 21998a351512eba4ed5969006f0c55882d995ada -# Backported in version v5.4.47 6d60d5462a91eb46fb88b016508edfa8ee0bc7c8 -CVE_CHECK_WHITELIST += "CVE-2020-10767" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10768 -# Patched in kernel since v5.8 4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf -# Backported in version v5.4.47 e1545848ad5510e82eb75717c1f5757b984014cb -CVE_CHECK_WHITELIST += "CVE-2020-10768" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10781 -# Patched in kernel since v5.8 853eab68afc80f59f36bbdeb715e5c88c501e680 -# Backported in version v5.4.53 72648019cd52488716891c2cbb096ad1023ab83e -CVE_CHECK_WHITELIST += "CVE-2020-10781" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-10942 -# Patched in kernel since v5.6 42d84c8490f9f0931786f1623191fcab397c3d64 -# Backported in version v5.4.24 f09fbb1175cffdbbb36b28e2ff7db96dcc90de08 -CVE_CHECK_WHITELIST += "CVE-2020-10942" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11494 -# Patched in kernel since v5.7 b9258a2cece4ec1f020715fe3554bc2e360f6264 -# Backported in version v5.4.32 fdb6a094ba41e985d9fb14ae2bfc180e3e983720 -CVE_CHECK_WHITELIST += "CVE-2020-11494" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11565 -# Patched in kernel since v5.7 aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd -# Backported in version v5.4.31 c3f87e03f90ff2901525cc99c0e3bfb6fcbfd184 -CVE_CHECK_WHITELIST += "CVE-2020-11565" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11608 -# Patched in kernel since v5.7 998912346c0da53a6dbb71fab3a138586b596b30 -# Backported in version v5.4.29 e4af1cf37b901839320e40515d9a60a1c8b51f3a -CVE_CHECK_WHITELIST += "CVE-2020-11608" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11609 -# Patched in kernel since v5.7 485b06aadb933190f4bc44e006076bc27a23f205 -# Backported in version v5.4.29 4490085a9e2d2cde69e865e3691223ea9e94513b -CVE_CHECK_WHITELIST += "CVE-2020-11609" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11668 -# Patched in kernel since v5.7 a246b4d547708f33ff4d4b9a7a5dbac741dc89d8 -# Backported in version v5.4.29 e7cd85f398cd1ffe3ce707ce7e2ec0e4a5010475 -CVE_CHECK_WHITELIST += "CVE-2020-11668" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-11884 -# Patched in kernel since v5.7 316ec154810960052d4586b634156c54d0778f74 -# Backported in version v5.4.36 44d9eb0ebe8fd04f46b18d10a18b2c543b379a0c -CVE_CHECK_WHITELIST += "CVE-2020-11884" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12464 -# Patched in kernel since v5.7 056ad39ee9253873522f6469c3364964a322912b -# Backported in version v5.4.36 b48193a7c303272d357b27dd7d72cbf89f7b2d35 -CVE_CHECK_WHITELIST += "CVE-2020-12464" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12465 -# Patched in kernel since v5.6 b102f0c522cf668c8382c56a4f771b37d011cda2 -# Backported in version v5.4.26 02013734629bf57070525a3515509780092a63ab -CVE_CHECK_WHITELIST += "CVE-2020-12465" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12653 -# Patched in kernel since v5.6 b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d -# Backported in version v5.4.20 3c822e1f31186767d6b7261c3c066f01907ecfca -CVE_CHECK_WHITELIST += "CVE-2020-12653" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12654 -# Patched in kernel since v5.6 3a9b153c5591548612c3955c9600a98150c81875 -# Backported in version v5.4.20 c5b071e3f44d1125694ad4dcf1234fb9a78d0be6 -CVE_CHECK_WHITELIST += "CVE-2020-12654" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12655 -# Patched in kernel since v5.7 d0c7feaf87678371c2c09b3709400be416b2dc62 -# Backported in version v5.4.50 ffd40b7962d463daa531a8110e5b708bcb5c6da7 -CVE_CHECK_WHITELIST += "CVE-2020-12655" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12657 -# Patched in kernel since v5.7 2f95fa5c955d0a9987ffdc3a095e2f4e62c5f2a9 -# Backported in version v5.4.33 b37de1b1e882fa3741d252333e5745eea444483b -CVE_CHECK_WHITELIST += "CVE-2020-12657" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12659 -# Patched in kernel since v5.7 99e3a236dd43d06c65af0a2ef9cb44306aef6e02 -# Backported in version v5.4.35 25c9cdef57488578da21d99eb614b97ffcf6e59f -CVE_CHECK_WHITELIST += "CVE-2020-12659" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12768 -# Patched in kernel since v5.6 d80b64ff297e40c2b6f7d7abc1b3eba70d22a068 -# Backported in version v5.4.43 ac46cea606d59be18a6afd4560c48bcca836c44c -CVE_CHECK_WHITELIST += "CVE-2020-12768" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12770 -# Patched in kernel since v5.7 83c6f2390040f188cc25b270b4befeb5628c1aee -# Backported in version v5.4.42 2d6d0ce4de03832c8deedeb16c7af52868d7e99e -CVE_CHECK_WHITELIST += "CVE-2020-12770" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12771 -# Patched in kernel since v5.8 be23e837333a914df3f24bf0b32e87b0331ab8d1 -# Backported in version v5.4.49 f651e94899ed08b1766bda30f410d33fdd3970ff -CVE_CHECK_WHITELIST += "CVE-2020-12771" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12826 -# Patched in kernel since v5.7 d1e7fd6462ca9fc76650fbe6ca800e35b24267da -# Backported in version v5.4.33 5f2d04139aa5ed04eab54b84e8a25bab87a2449c -CVE_CHECK_WHITELIST += "CVE-2020-12826" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-12888 -# Patched in kernel since v5.8 abafbc551fddede3e0a08dee1dcde08fc0eb8476 -# Backported in version v5.4.64 8f747b0149c5a0c72626a87eb0dd2a5ec91f1a7d -CVE_CHECK_WHITELIST += "CVE-2020-12888" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-13143 -# Patched in kernel since v5.7 15753588bcd4bbffae1cca33c8ced5722477fe1f -# Backported in version v5.4.42 6bb054f006c3df224cc382f1ebd81b7276dcfb1c -CVE_CHECK_WHITELIST += "CVE-2020-13143" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14314 -# Patched in kernel since v5.9 5872331b3d91820e14716632ebb56b1399b34fe1 -# Backported in version v5.4.61 ea54176e5821936d109bb45dc2c19bd53559e735 -CVE_CHECK_WHITELIST += "CVE-2020-14314" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14331 -# Patched in kernel since v5.9 ebfdfeeae8c01fcb2b3b74ffaf03876e20835d2d -# Backported in version v5.4.58 8c3215a0426c404f4b7b02a1e0fdb0f7f4f1e6d3 -CVE_CHECK_WHITELIST += "CVE-2020-14331" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14351 -# Patched in kernel since v5.10 f91072ed1b7283b13ca57fcfbece5a3b92726143 -# Backported in version v5.4.78 c5cf5c7b585c7f48195892e44b76237010c0747a -CVE_CHECK_WHITELIST += "CVE-2020-14351" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14381 -# Patched in kernel since v5.6 8019ad13ef7f64be44d4f892af9c840179009254 -# Backported in version v5.4.28 553d46b07dc4813e1d8e6a3b3d6eb8603b4dda74 -CVE_CHECK_WHITELIST += "CVE-2020-14381" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14385 -# Patched in kernel since v5.9 f4020438fab05364018c91f7e02ebdd192085933 -# Backported in version v5.4.64 da7a1676d6c19971758976a84e87f5b1009409e7 -CVE_CHECK_WHITELIST += "CVE-2020-14385" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-14390 -# Patched in kernel since v5.9 50145474f6ef4a9c19205b173da6264a644c7489 -# Backported in version v5.4.66 cf5a7ded53652c3d63d7243944c6a8ec1f0ef392 -CVE_CHECK_WHITELIST += "CVE-2020-14390" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-15393 -# Patched in kernel since v5.8 28ebeb8db77035e058a510ce9bd17c2b9a009dba -# Backported in version v5.4.51 3dca0a299ff43204a69c9a7a00ce2b3e7ab3088c -CVE_CHECK_WHITELIST += "CVE-2020-15393" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-15436 -# Patched in kernel since v5.8 2d3a8e2deddea6c89961c422ec0c5b851e648c14 -# Backported in version v5.4.49 b3dc33946a742256ad9d2ccac848c9e3c2aaafef -CVE_CHECK_WHITELIST += "CVE-2020-15436" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-15437 -# Patched in kernel since v5.8 f4c23a140d80ef5e6d3d1f8f57007649014b60fa -# Backported in version v5.4.54 af811869db0698b587aa5418eab05c9f7e0bea3c -CVE_CHECK_WHITELIST += "CVE-2020-15437" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-15780 -# Patched in kernel since v5.8 75b0cea7bf307f362057cc778efe89af4c615354 -# Backported in version v5.4.50 824d0b6225f3fa2992704478a8df520537cfcb56 -CVE_CHECK_WHITELIST += "CVE-2020-15780" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-16119 -# Patched in kernel since v5.15 d9ea761fdd197351890418acd462c51f241014a7 -# Backported in version v5.4.148 5ab04a4ffed02f66e8e6310ba8261a43d1572343 -# Backported in version v5.10.68 6c3cb65d561e76fd0398026c023e587fec70e188 -CVE_CHECK_WHITELIST += "CVE-2020-16119" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-16166 -# Patched in kernel since v5.8 f227e3ec3b5cad859ad15666874405e8c1bbc1d4 -# Backported in version v5.4.57 c15a77bdda2c4f8acaa3e436128630a81f904ae7 -CVE_CHECK_WHITELIST += "CVE-2020-16166" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-24394 -# Patched in kernel since v5.8 22cf8419f1319ff87ec759d0ebdff4cbafaee832 -# Backported in version v5.4.51 fe05e114d0fde7f644ac9ab5edfce3fa65650875 -CVE_CHECK_WHITELIST += "CVE-2020-24394" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25211 -# Patched in kernel since v5.9 1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6 -# Backported in version v5.4.70 253052b636e98083b1ecc3e9b0cf6f151e1cb8c6 -CVE_CHECK_WHITELIST += "CVE-2020-25211" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25212 -# Patched in kernel since v5.9 b4487b93545214a9db8cbf32e86411677b0cca21 -# Backported in version v5.4.60 75cf7f895f563e14c82c1aeea0362dc155b5baf3 -CVE_CHECK_WHITELIST += "CVE-2020-25212" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25284 -# Patched in kernel since v5.9 f44d04e696feaf13d192d942c4f14ad2e117065a -# Backported in version v5.4.66 ea3d3bf85669195247ad6a522f4e4209695edca2 -CVE_CHECK_WHITELIST += "CVE-2020-25284" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25285 -# Patched in kernel since v5.9 17743798d81238ab13050e8e2833699b54e15467 -# Backported in version v5.4.64 af7786b20c717ff13d9148161dad4b8e286bfd39 -CVE_CHECK_WHITELIST += "CVE-2020-25285" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25639 -# Patched in kernel since v5.12 eaba3b28401f50e22d64351caa8afe8d29509f27 -# Backported in version v5.4.102 0faef25462f886a77e0b397cca31d51163215332 -# Backported in version v5.10.20 e3fcff9f45aa82dacad26e5828598340d2742f47 -CVE_CHECK_WHITELIST += "CVE-2020-25639" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25641 -# Patched in kernel since v5.9 7e24969022cbd61ddc586f14824fc205661bb124 -# Backported in version v5.4.64 84c041c12442d233c9b3c593cbe9eb8a77875578 -CVE_CHECK_WHITELIST += "CVE-2020-25641" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25643 -# Patched in kernel since v5.9 66d42ed8b25b64eb63111a2b8582c5afc8bf1105 -# Backported in version v5.4.68 c3de9daa662617132744731f1b4eb7b5cd1270a8 -CVE_CHECK_WHITELIST += "CVE-2020-25643" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25645 -# Patched in kernel since v5.9 34beb21594519ce64a55a498c2fe7d567bc1ca20 -# Backported in version v5.4.68 745c24fd1d79b588a951d3c5beca43575907f881 -CVE_CHECK_WHITELIST += "CVE-2020-25645" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25656 -# Patched in kernel since v5.10 82e61c3909db51d91b9d3e2071557b6435018b80 -# Backported in version v5.4.75 87d398f348b8a2d5246d3670a93fb63d4fd9f62a -CVE_CHECK_WHITELIST += "CVE-2020-25656" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25672 -# Patched in kernel since v5.12 7574fcdbdcb335763b6b322f6928dc0fd5730451 -# Backported in version v5.4.112 404daa4d62a364623b48349eb73a18579edf51ac -# Backported in version v5.10.30 568ac94df580b1a65837dc299e8758635e7b1423 -CVE_CHECK_WHITELIST += "CVE-2020-25672" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25704 -# Patched in kernel since v5.10 7bdb157cdebbf95a1cd94ed2e01b338714075d00 -# Backported in version v5.4.76 b7f7474b392194530d1ec07203c8668e81b7fdb9 -CVE_CHECK_WHITELIST += "CVE-2020-25704" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-25705 -# Patched in kernel since v5.10 b38e7819cae946e2edf869e604af1e65a5d241c5 -# Backported in version v5.4.73 8df0ffe2f32c09b4627cbce5cd5faf8e98a6a71e -CVE_CHECK_WHITELIST += "CVE-2020-25705" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-26088 -# Patched in kernel since v5.9 26896f01467a28651f7a536143fe5ac8449d4041 -# Backported in version v5.4.59 0b305f259ca9b85c48f9cb3159d034b7328ed225 -CVE_CHECK_WHITELIST += "CVE-2020-26088" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-26541 -# Patched in kernel since v5.13 56c5812623f95313f6a46fbf0beee7fa17c68bbf -# Backported in version v5.4.129 e20b90e4f81bb04e2b180824caae585928e24ba9 -# Backported in version v5.10.47 45109066f686597116467a53eaf4330450702a96 -CVE_CHECK_WHITELIST += "CVE-2020-26541" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27170 -# Patched in kernel since v5.12 f232326f6966cf2a1d1db7bc917a4ce5f9f55f76 -# Backported in version v5.4.107 ea8fb45eaac141b13f656a7056e4823845aa3b69 -# Backported in version v5.10.25 c4d37eea1c641a9319baf34253cc373abb39d3e1 -CVE_CHECK_WHITELIST += "CVE-2020-27170" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27171 -# Patched in kernel since v5.12 10d2bb2e6b1d8c4576c56a748f697dbeb8388899 -# Backported in version v5.4.107 2da0540739e43154b500a817d9c95d36c2f6a323 -# Backported in version v5.10.25 ac1b87a18c1ffbe3d093000b762121b5aae0a3f9 -CVE_CHECK_WHITELIST += "CVE-2020-27171" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27675 -# Patched in kernel since v5.10 073d0552ead5bfc7a3a9c01de590e924f11b5dd2 -# Backported in version v5.4.75 a01379671d67d34f254cc81f42cf854aa628f3a3 -CVE_CHECK_WHITELIST += "CVE-2020-27675" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27777 -# Patched in kernel since v5.10 bd59380c5ba4147dcbaad3e582b55ccfd120b764 -# Backported in version v5.4.75 240baebeda09e1e010fff58acc9183992f41f638 -CVE_CHECK_WHITELIST += "CVE-2020-27777" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27784 -# Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1 -# Backported in version v5.4.73 e9e791f5c39ab30e374a3b1a9c25ca7ff24988f3 -CVE_CHECK_WHITELIST += "CVE-2020-27784" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-27830 -# Patched in kernel since v5.10 f0992098cadb4c9c6a00703b66cafe604e178fea -# Backported in version v5.4.83 b0d4fa10bfcc3051e9426b6286fb2d80bad04d74 -CVE_CHECK_WHITELIST += "CVE-2020-27830" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-28097 -# Patched in kernel since v5.9 973c096f6a85e5b5f2a295126ba6928d9a6afd45 -# Backported in version v5.4.66 087b6cb17df5834d395ab72da3f937380470ba15 -CVE_CHECK_WHITELIST += "CVE-2020-28097" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-28374 -# Patched in kernel since v5.11 2896c93811e39d63a4d9b63ccf12a8fbc226e5e4 -# Backported in version v5.4.89 485e21729b1e1235e6075318225c09e76b376e81 -# Backported in version v5.10.7 6f1e88527c1869de08632efa2cc796e0131850dc -CVE_CHECK_WHITELIST += "CVE-2020-28374" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-28915 -# Patched in kernel since v5.9 5af08640795b2b9a940c9266c0260455377ae262 -# Backported in version v5.4.71 1b2fcd82c0ca23f6fa01298c0d7b59eb4efbaf48 -CVE_CHECK_WHITELIST += "CVE-2020-28915" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-28941 -# Patched in kernel since v5.10 d4122754442799187d5d537a9c039a49a67e57f1 -# Backported in version v5.4.80 3b78db264675e47ad3cf9c1e809e85d02fe1de90 -CVE_CHECK_WHITELIST += "CVE-2020-28941" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-28974 -# Patched in kernel since v5.10 3c4e0dff2095c579b142d5a0693257f1c58b4804 -# Backported in version v5.4.76 642181fe3567419d84d2457b58f262c37467f525 -CVE_CHECK_WHITELIST += "CVE-2020-28974" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-29368 -# Patched in kernel since v5.8 c444eb564fb16645c172d550359cb3d75fe8a040 -# Backported in version v5.4.48 a88d8aaf9b8b5e0af163a235a3baa9fdcb7d430a -CVE_CHECK_WHITELIST += "CVE-2020-29368" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-29369 -# Patched in kernel since v5.8 246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c -# Backported in version v5.4.54 549bfc14270681cd776c6d9b78fe544cbd21673a -CVE_CHECK_WHITELIST += "CVE-2020-29369" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-29370 -# Patched in kernel since v5.6 fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8 -# Backported in version v5.4.27 ae119b7e12472517bc35c1c003d5abf26653674a -CVE_CHECK_WHITELIST += "CVE-2020-29370" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-29371 -# Patched in kernel since v5.9 bcf85fcedfdd17911982a3e3564fcfec7b01eebd -# Backported in version v5.4.61 19a77c937a1914bdd655366e79a2a1b7d675f554 -CVE_CHECK_WHITELIST += "CVE-2020-29371" - # https://nvd.nist.gov/vuln/detail/CVE-2020-29373 # Patched in kernel since v5.6 ff002b30181d30cdfbca316dadd099c3ca0d739c # Backported in version v5.4.24 cac68d12c531aa3010509a5a55a5dfd18dedaa80 CVE_CHECK_WHITELIST += "CVE-2020-29373" -# https://nvd.nist.gov/vuln/detail/CVE-2020-29374 -# Patched in kernel since v5.8 17839856fd588f4ab6b789f482ed3ffd7c403e1f -# Backported in version v5.4.47 1027dc04f557328eb7b7b7eea48698377a959157 -CVE_CHECK_WHITELIST += "CVE-2020-29374" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-29660 -# Patched in kernel since v5.10 c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 -# Backported in version v5.4.83 35ee9ac513280f46eeb1196bac82ed5320380412 -CVE_CHECK_WHITELIST += "CVE-2020-29660" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-35508 -# Patched in kernel since v5.10 b4e00444cab4c3f3fec876dc0cccc8cbb0d1a948 -# Backported in version v5.4.76 beeb658cfd3544ceca894375c36b6572e4ae7a5f -CVE_CHECK_WHITELIST += "CVE-2020-35508" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36158 -# Patched in kernel since v5.11 5c455c5ab332773464d02ba17015acdca198f03d -# Backported in version v5.4.88 0a49aaf4df2936bca119ee38fe5a570a7024efdc -# Backported in version v5.10.6 94cc73b27a2599e4c88b7b2d6fd190107c58e480 -CVE_CHECK_WHITELIST += "CVE-2020-36158" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36311 -# Patched in kernel since v5.9 7be74942f184fdfba34ddd19a0d995deb34d4a03 -# Backported in version v5.4.131 abbd42939db646f7210e1473e9cb17c6bc6f184c -CVE_CHECK_WHITELIST += "CVE-2020-36311" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36312 -# Patched in kernel since v5.9 f65886606c2d3b562716de030706dfe1bea4ed5e -# Backported in version v5.4.66 41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d -CVE_CHECK_WHITELIST += "CVE-2020-36312" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36322 -# Patched in kernel since v5.11 5d069dbe8aaf2a197142558b6fb2978189ba3454 -# Backported in version v5.4.88 732251cabeb3bfd917d453a42274d769d6883fc4 -# Backported in version v5.10.6 36cf9ae54b0ead0daab7701a994de3dcd9ef605d -CVE_CHECK_WHITELIST += "CVE-2020-36322" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36386 -# Patched in kernel since v5.9 51c19bf3d5cfaa66571e4b88ba2a6f6295311101 -# Backported in version v5.4.58 c26eaaf547b785ae98fa08607b599c7df0da51bc -CVE_CHECK_WHITELIST += "CVE-2020-36386" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36516 -# Patched in kernel since v5.17 23f57406b82de51809d5812afd96f210f8b627f3 -# Backported in version v5.4.176 1f748455a8f0e984dc91fc09e6dfe99f0e58cfbe -# Backported in version v5.10.96 b26fed25e67bc09f28f998569ed14022e07b174b -# Backported in version v5.15.19 dee686cbfdd13ca022f20be344a14f595a93f303 -CVE_CHECK_WHITELIST += "CVE-2020-36516" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36557 -# Patched in kernel since v5.7 ca4463bf8438b403596edd0ec961ca0d4fbe0220 -# Backported in version v5.4.30 acf0e94019310a9e1c4b6807c208f49a25f74573 -CVE_CHECK_WHITELIST += "CVE-2020-36557" - -# https://nvd.nist.gov/vuln/detail/CVE-2020-36558 -# Patched in kernel since v5.6 6cd1ed50efd88261298577cd92a14f2768eddeeb -# Backported in version v5.4.23 897d5aaf3397e64a56274f2176d9e1b13adcb92e -CVE_CHECK_WHITELIST += "CVE-2020-36558" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3178 -# Patched in kernel since v5.11 51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 -# Backported in version v5.4.92 4aef760c28e8bd1860a27fd78067b4ea77124987 -# Backported in version v5.10.10 fdcaa4af5e70e2d984c9620a09e9dade067f2620 -CVE_CHECK_WHITELIST += "CVE-2021-3178" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3348 -# Patched in kernel since v5.11 b98e762e3d71e893b221f871825dc64694cfb258 -# Backported in version v5.4.95 587c6b75d7fdd366ad7dc615471006ce73c03a51 -# Backported in version v5.10.13 41f6f4a3143506ea1499cda2f14a16a2f82118a8 -CVE_CHECK_WHITELIST += "CVE-2021-3348" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3483 -# Patched in kernel since v5.12 829933ef05a951c8ff140e814656d73e74915faf -# Backported in version v5.4.110 5ecfad1efbc31ab913f16ed60f0efff301aebfca -# Backported in version v5.10.28 c04adcc819d3bdd85a5dc2523687707b89724df7 -CVE_CHECK_WHITELIST += "CVE-2021-3483" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3506 -# Patched in kernel since v5.13 b862676e371715456c9dade7990c8004996d0d9e -# Backported in version v5.4.118 27a130638406815eba083c632ee083f0c5e688c2 -# Backported in version v5.10.36 9aa4602237d535b83c579eb752e8fc1c3e7e7055 -CVE_CHECK_WHITELIST += "CVE-2021-3506" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3564 -# Patched in kernel since v5.13 6a137caec23aeb9e036cdfd8a46dd8a366460e5d -# Backported in version v5.4.125 8d3d0ac73a4a1d31e3d4f7c068312aba78470166 -# Backported in version v5.10.43 3795007c8dfc8bca176529bfeceb17c6f4ef7e44 -CVE_CHECK_WHITELIST += "CVE-2021-3564" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3573 -# Patched in kernel since v5.13 e305509e678b3a4af2b3cfd410f409f7cdaabb52 -# Backported in version v5.4.125 b6f97555c71f78288682bc967121572f10715c89 -# Backported in version v5.10.43 74caf718cc7422a957aac381c73d798c0a999a65 -CVE_CHECK_WHITELIST += "CVE-2021-3573" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3609 -# Patched in kernel since v5.14 d5f9023fa61ee8b94f37a93f08e94b136cf1e463 -# Backported in version v5.4.132 70a9116b9e5ccd5332d3a60b359fb5902d268fd0 -# Backported in version v5.10.50 b52e0cf0bfc1ede495de36aec86f6013efa18f60 -CVE_CHECK_WHITELIST += "CVE-2021-3609" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3612 -# Patched in kernel since v5.14 f8f84af5da9ee04ef1d271528656dac42a090d00 -# Backported in version v5.4.132 0f382fa359ca1cb717ce27407538eb579b29a99f -# Backported in version v5.10.50 b4c35e9e8061b2386da1aa0d708e991204e76c45 -CVE_CHECK_WHITELIST += "CVE-2021-3612" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3635 -# Patched in kernel since v5.5 335178d5429c4cee61b58f4ac80688f556630818 -# Backported in version v5.4.14 8f4dc50b5c12e159ac846fdc00702c547fdf2e95 -CVE_CHECK_WHITELIST += "CVE-2021-3635" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3640 -# Patched in kernel since v5.16 99c23da0eed4fd20cae8243f2b51e10e66aa0951 -# Backported in version v5.4.160 d416020f1a9cc5f903ae66649b2c56d9ad5256ab -# Backported in version v5.10.80 4dfba42604f08a505f1a1efc69ec5207ea6243de -# Backported in version v5.15.3 b990c219c4c9d4993ef65ea9db73d9497e70f697 -CVE_CHECK_WHITELIST += "CVE-2021-3640" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3653 -# Patched in kernel since v5.14 0f923e07124df069ba68d8bb12324398f4b6b709 -# Backported in version v5.4.142 7c1c96ffb658fbfe66c5ebed6bcb5909837bc267 -# Backported in version v5.10.60 c0883f693187c646c0972d73e525523f9486c2e3 -CVE_CHECK_WHITELIST += "CVE-2021-3653" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3679 -# Patched in kernel since v5.14 67f0d6d9883c13174669f88adac4f0ee656cc16a -# Backported in version v5.4.136 f899f24d34d964593b16122a774c192a78e2ca56 -# Backported in version v5.10.54 757bdba8026be19b4f447487695cd0349a648d9e -CVE_CHECK_WHITELIST += "CVE-2021-3679" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3732 -# Patched in kernel since v5.14 427215d85e8d1476da1a86b8d67aceb485eb3631 -# Backported in version v5.4.141 812f39ed5b0b7f34868736de3055c92c7c4cf459 -# Backported in version v5.10.59 6a002d48a66076524f67098132538bef17e8445e -CVE_CHECK_WHITELIST += "CVE-2021-3732" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3739 -# Patched in kernel since v5.15 e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 -# Backported in version v5.4.144 d7f7eca72ecc08f0bb6897fda2290293fca63068 -# Backported in version v5.10.62 c43add24dffdbac269d5610465ced70cfc1bad9e -CVE_CHECK_WHITELIST += "CVE-2021-3739" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3744 -# Patched in kernel since v5.15 505d9dcb0f7ddf9d075e729523a33d38642ae680 -# Backported in version v5.4.151 24f3d2609114f1e1f6b487b511ce5fa36f21e0ae -# Backported in version v5.10.71 17ccc64e4fa5d3673528474bfeda814d95dc600a -CVE_CHECK_WHITELIST += "CVE-2021-3744" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3752 -# Patched in kernel since v5.16 1bff51ea59a9afb67d2dd78518ab0582a54a472c -# Backported in version v5.4.160 67bd269a84ce29dfc543c1683a2553b4169f9a55 -# Backported in version v5.10.80 c10465f6d6208db2e45a6dac1db312b9589b2583 -# Backported in version v5.15.3 7e22e4db95b04f09adcce18c75d27cbca8f53b99 -CVE_CHECK_WHITELIST += "CVE-2021-3752" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3753 -# Patched in kernel since v5.15 2287a51ba822384834dafc1c798453375d1107c7 -# Backported in version v5.4.144 f4418015201bdca0cd4e28b363d88096206e4ad0 -# Backported in version v5.10.62 60d69cb4e60de0067e5d8aecacd86dfe92a5384a -CVE_CHECK_WHITELIST += "CVE-2021-3753" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3759 -# Patched in kernel since v5.15 18319498fdd4cdf8c1c2c48cd432863b1f915d6f -# Backported in version v5.4.224 bad83d55134e647a739ebef2082541963f2cbc92 -# Backported in version v5.10.154 836686e1a01d7e2fda6a5a18252243ff30a6e196 -CVE_CHECK_WHITELIST += "CVE-2021-3759" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3764 -# Patched in kernel since v5.15 505d9dcb0f7ddf9d075e729523a33d38642ae680 -# Backported in version v5.4.151 24f3d2609114f1e1f6b487b511ce5fa36f21e0ae -# Backported in version v5.10.71 17ccc64e4fa5d3673528474bfeda814d95dc600a -CVE_CHECK_WHITELIST += "CVE-2021-3764" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-3923 -# Patched in kernel since v5.16 b35a0f4dd544eaa6162b6d2f13a2557a121ae5fd -# Backported in version v5.4.171 5eb5d9c6591d7e58f32088ef848503a4a947fc46 -# Backported in version v5.10.91 beeb0fdedae802a7fb606e955a81a56a2e3bbac1 -# Backported in version v5.15.14 e1e354771812b12f0b4c433bbaf916f87cd0f6c7 -CVE_CHECK_WHITELIST += "CVE-2021-3923" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4002 -# Patched in kernel since v5.16 a4a118f2eead1d6c49e00765de89878288d4b890 -# Backported in version v5.4.162 201340ca4eb748c52062c5e938826ddfbe313088 -# Backported in version v5.10.82 40bc831ab5f630431010d1ff867390b07418a7ee -# Backported in version v5.15.5 556d59293a2a94863797a7a50890992aa5e8db16 -CVE_CHECK_WHITELIST += "CVE-2021-4002" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4083 -# Patched in kernel since v5.16 054aa8d439b9185d4f5eb9a90282d1ce74772969 -# Backported in version v5.4.164 03d4462ba3bc8f830d9807e3c3fde54fad06e2e2 -# Backported in version v5.10.84 4baba6ba56eb91a735a027f783cc4b9276b48d5b -# Backported in version v5.15.7 6fe4eadd54da3040cf6f6579ae157ae1395dc0f8 -CVE_CHECK_WHITELIST += "CVE-2021-4083" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4135 -# Patched in kernel since v5.16 481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 -# Backported in version v5.4.168 699e794c12a3cd79045ff135bc87a53b97024e43 -# Backported in version v5.10.88 1a34fb9e2bf3029f7c0882069d67ff69cbd645d8 -# Backported in version v5.15.11 27358aa81a7d60e6bd36f0bb1db65cd084c2cad0 -CVE_CHECK_WHITELIST += "CVE-2021-4135" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4149 -# Patched in kernel since v5.15 19ea40dddf1833db868533958ca066f368862211 -# Backported in version v5.4.155 005a07c9acd6cf8a40555884f0650dfd4ec23fbe -# Backported in version v5.10.75 206868a5b6c14adc4098dd3210a2f7510d97a670 -CVE_CHECK_WHITELIST += "CVE-2021-4149" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4155 -# Patched in kernel since v5.16 983d8e60f50806f90534cc5373d0ce867e5aaf79 -# Backported in version v5.4.171 102af6edfd3a372db6e229177762a91f552e5f5e -# Backported in version v5.10.91 16d8568378f9ee2d1e69216d39961aa72710209f -# Backported in version v5.15.14 b0e72ba9e520b95346e68800afff0db65e766ca8 -CVE_CHECK_WHITELIST += "CVE-2021-4155" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4159 -# Patched in kernel since v5.7 294f2fc6da27620a506e6c050241655459ccd6bd -# Backported in version v5.4.210 7c1134c7da997523e2834dd516e2ddc51920699a -CVE_CHECK_WHITELIST += "CVE-2021-4159" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-4203 -# Patched in kernel since v5.15 35306eb23814444bd4021f8a1c3047d3cb0c8b2b -# Backported in version v5.4.151 0fcfaa8ed9d1dcbe377b202a1b3cdfd4e566114c -# Backported in version v5.10.71 3db53827a0e9130d9e2cbe3c3b5bca601caa4c74 -CVE_CHECK_WHITELIST += "CVE-2021-4203" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-20265 -# Patched in kernel since v4.5 fa0dc04df259ba2df3ce1920e9690c7842f8fa4b -CVE_CHECK_WHITELIST += "CVE-2021-20265" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-20292 -# Patched in kernel since v5.9 5de5b6ecf97a021f29403aa272cb4e03318ef586 -# Backported in version v5.4.59 c6d2ddf1a30d524106265ad2c48b907cd7a083d4 -CVE_CHECK_WHITELIST += "CVE-2021-20292" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-20321 -# Patched in kernel since v5.15 a295aef603e109a47af355477326bd41151765b6 -# Backported in version v5.4.153 fab338f33c25c4816ca0b2d83a04a0097c2c4aaf -# Backported in version v5.10.73 9763ffd4da217adfcbdcd519e9f434dfa3952fc3 -CVE_CHECK_WHITELIST += "CVE-2021-20321" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-23133 -# Patched in kernel since v5.13 34e5b01186858b36c4d7c87e1a025071e8e2401f -# Backported in version v5.4.119 3fe9ee040fb7332e2b4cc04c85561eced0a7f227 -# Backported in version v5.10.37 42f1b8653f85924743ea5b57b051a4e1f05b5e43 -CVE_CHECK_WHITELIST += "CVE-2021-23133" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-23134 -# Patched in kernel since v5.13 c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6 -# Backported in version v5.4.119 e32352070bcac22be6ed8ab635debc280bb65b8c -# Backported in version v5.10.37 6b7021ed36dabf29e56842e3408781cd3b82ef6e -CVE_CHECK_WHITELIST += "CVE-2021-23134" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-27363 -# Patched in kernel since v5.12 688e8128b7a92df982709a4137ea4588d16f24aa -# Backported in version v5.4.103 ca3afdd0377379f5031f376aec4b0c1b0285b556 -# Backported in version v5.10.21 c71edc5d2480774ec2fec62bb84064aed6d582bd -CVE_CHECK_WHITELIST += "CVE-2021-27363" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-27364 -# Patched in kernel since v5.12 688e8128b7a92df982709a4137ea4588d16f24aa -# Backported in version v5.4.103 ca3afdd0377379f5031f376aec4b0c1b0285b556 -# Backported in version v5.10.21 c71edc5d2480774ec2fec62bb84064aed6d582bd -CVE_CHECK_WHITELIST += "CVE-2021-27364" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28714 -# Patched in kernel since v5.16 6032046ec4b70176d247a71836186d47b25d1684 -# Backported in version v5.4.168 8bfcd0385211044627f93d170991da1ae5937245 -# Backported in version v5.10.88 525875c410df5d876b9615c44885ca7640aed6f2 -# Backported in version v5.15.11 88449dbe6203c3a91cf1c39ea3032ad61a297bd7 -CVE_CHECK_WHITELIST += "CVE-2021-28714" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28715 -# Patched in kernel since v5.16 be81992f9086b230623ae3ebbc85ecee4d00a3d3 -# Backported in version v5.4.168 0d99b3c6bd39a0a023e972d8f912fd47698bbbb8 -# Backported in version v5.10.88 88f20cccbeec9a5e83621df5cc2453b5081454dc -# Backported in version v5.15.11 bd926d189210cd1d5b4e618e45898053be6b4b3b -CVE_CHECK_WHITELIST += "CVE-2021-28715" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28950 -# Patched in kernel since v5.12 775c5033a0d164622d9d10dd0f0a5531639ed3ed -# Backported in version v5.4.107 187ae04636531065cdb4d0f15deac1fe0e812104 -# Backported in version v5.10.25 d955f13ea2120269319d6133d0dd82b66d1eeca3 -CVE_CHECK_WHITELIST += "CVE-2021-28950" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28964 -# Patched in kernel since v5.12 dbcc7d57bffc0c8cac9dac11bec548597d59a6a5 -# Backported in version v5.4.108 5b3b99525c4f18e543f6ef17ef97c29f5694e8b4 -# Backported in version v5.10.26 38ffe9eaeb7cce383525439f0948f9eb74632e1d -CVE_CHECK_WHITELIST += "CVE-2021-28964" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28971 -# Patched in kernel since v5.12 d88d05a9e0b6d9356e97129d4ff9942d765f46ea -# Backported in version v5.4.108 da326ba3b84aae8ac0513aa4725a49843f2f871e -# Backported in version v5.10.26 514ea597be8e4b6a787bc34da111c44944fbf5a5 -CVE_CHECK_WHITELIST += "CVE-2021-28971" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-28972 -# Patched in kernel since v5.12 cc7a0bb058b85ea03db87169c60c7cfdd5d34678 -# Backported in version v5.4.108 51a2b19b554c8c75ee2d253b87240309cd81f1fc -# Backported in version v5.10.26 be1f58e58f7644ab33f1413685c84173766408d3 -CVE_CHECK_WHITELIST += "CVE-2021-28972" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-29265 -# Patched in kernel since v5.12 9380afd6df70e24eacbdbde33afc6a3950965d22 -# Backported in version v5.4.106 8698133003cfb67e0f04dd044c954198e421b152 -# Backported in version v5.10.24 ab5c3186686aa87c741381d10a948817f1deb9b2 -CVE_CHECK_WHITELIST += "CVE-2021-29265" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-29647 -# Patched in kernel since v5.12 50535249f624d0072cd885bcdce4e4b6fb770160 -# Backported in version v5.4.109 ae23957bd1fb3184a9935bd99c5ad2351a59d7c8 -# Backported in version v5.10.27 fce6fb90218935f7319265459484b3762c80d0a8 -CVE_CHECK_WHITELIST += "CVE-2021-29647" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-29650 -# Patched in kernel since v5.12 175e476b8cdf2a4de7432583b49c871345e4f8a1 -# Backported in version v5.4.109 19a5fb4ceada903e692de96b8aa8494179abbf0b -# Backported in version v5.10.27 3fdebc2d8e7965f946a3d716ffdd482e66c1f46c -CVE_CHECK_WHITELIST += "CVE-2021-29650" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-30002 -# Patched in kernel since v5.12 fb18802a338b36f675a388fc03d2aa504a0d0899 -# Backported in version v5.4.103 027ddd67f68583a178a9bd65220611e9f978f014 -# Backported in version v5.10.21 5400770e31e8b80efc25b4c1d619361255174d11 -CVE_CHECK_WHITELIST += "CVE-2021-30002" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-31916 -# Patched in kernel since v5.12 4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a -# Backported in version v5.4.109 e6587d142d0214eb466f9978e25f0575c19b1ea0 -# Backported in version v5.10.27 921aae17bb0f02181fa05cf5580ebc855fdbd74d -CVE_CHECK_WHITELIST += "CVE-2021-31916" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-32399 -# Patched in kernel since v5.13 e2cb6b891ad2b8caa9131e3be70f45243df82a80 -# Backported in version v5.4.119 eeec325c9944b4427f482018d00b737220c31fd9 -# Backported in version v5.10.37 2d84ef4e6569a818f912d93d5345c21542807ac7 -CVE_CHECK_WHITELIST += "CVE-2021-32399" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-33656 -# Patched in kernel since v5.12 ff2047fb755d4415ec3c70ac799889371151796d -# Backported in version v5.4.202 c87e851b23e5cb2ba90a3049ef38340ed7d5746f -# Backported in version v5.10.127 3acb7dc242ca25eb258493b513ef2f4b0f2a9ad1 -CVE_CHECK_WHITELIST += "CVE-2021-33656" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-34693 -# Patched in kernel since v5.13 5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc -# Backported in version v5.4.128 c297559a2a2a6b6f0de61ed333a978a118b0e660 -# Backported in version v5.10.46 acb755be1f7adb204dcedc4d3b204ef098628623 -CVE_CHECK_WHITELIST += "CVE-2021-34693" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-35039 -# Patched in kernel since v5.13 0c18f29aae7ce3dadd26d8ee3505d07cc982df75 -# Backported in version v5.4.129 e2dc07ca4e0148d75963e14d2b78afc12426a487 -# Backported in version v5.10.47 3051f230f19feb02dfe5b36794f8c883b576e184 -CVE_CHECK_WHITELIST += "CVE-2021-35039" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-37159 -# Patched in kernel since v5.14 a6ecfb39ba9d7316057cea823b196b734f6b18ca -# Backported in version v5.4.151 fe57d53dd91d7823f1ceef5ea8e9458a4aeb47fa -# Backported in version v5.10.54 115e4f5b64ae8d9dd933167cafe2070aaac45849 -CVE_CHECK_WHITELIST += "CVE-2021-37159" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38160 -# Patched in kernel since v5.14 d00d8da5869a2608e97cfede094dfc5e11462a46 -# Backported in version v5.4.134 52bd1bce8624acb861fa96b7c8fc2e75422dc8f7 -# Backported in version v5.10.52 f6ec306b93dc600a0ab3bb2693568ef1cc5f7f7a -CVE_CHECK_WHITELIST += "CVE-2021-38160" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38198 -# Patched in kernel since v5.13 b1bd5cba3306691c771d558e94baa73e8b0b96b7 -# Backported in version v5.4.141 d28adaabbbf4a6949d0f6f71daca6744979174e2 -# Backported in version v5.10.44 6b6ff4d1f349cb35a7c7d2057819af1b14f80437 -CVE_CHECK_WHITELIST += "CVE-2021-38198" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38199 -# Patched in kernel since v5.14 dd99e9f98fbf423ff6d365b37a98e8879170f17c -# Backported in version v5.4.134 81e03fe5bf8f5f66b8a62429fb4832b11ec6b272 -# Backported in version v5.10.52 ff4023d0194263a0827c954f623c314978cf7ddd -CVE_CHECK_WHITELIST += "CVE-2021-38199" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38204 -# Patched in kernel since v5.14 b5fdf5c6e6bee35837e160c00ac89327bdad031b -# Backported in version v5.4.136 863d071dbcd54dacf47192a1365faec46b7a68ca -# Backported in version v5.10.54 7af54a4e221e5619a87714567e2258445dc35435 -CVE_CHECK_WHITELIST += "CVE-2021-38204" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38205 -# Patched in kernel since v5.14 d0d62baa7f505bd4c59cd169692ff07ec49dde37 -# Backported in version v5.4.141 38b8485b72cbe4521fd2e0b8770e3d78f9b89e60 -# Backported in version v5.10.59 25cff25ec60690247db8138cd1af8b867df2c489 -CVE_CHECK_WHITELIST += "CVE-2021-38205" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38207 -# Patched in kernel since v5.13 c364df2489b8ef2f5e3159b1dff1ff1fdb16040d -# Backported in version v5.4.128 b6c0ab11c88fb016bfc85fa4f6f878f5f4263646 -# Backported in version v5.10.46 cfe403f209b11fad123a882100f0822a52a7630f -CVE_CHECK_WHITELIST += "CVE-2021-38207" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38208 -# Patched in kernel since v5.13 4ac06a1e013cf5fdd963317ffd3b968560f33bba -# Backported in version v5.4.125 5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70 -# Backported in version v5.10.43 48ee0db61c8299022ec88c79ad137f290196cac2 -CVE_CHECK_WHITELIST += "CVE-2021-38208" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-38209 -# Patched in kernel since v5.13 2671fa4dc0109d3fb581bc3078fdf17b5d9080f6 -# Backported in version v5.4.120 baea536cf51f8180ab993e374cb134b5edad25e2 -# Backported in version v5.10.35 d3598eb3915cc0c0d8cab42f4a6258ff44c4033e -CVE_CHECK_WHITELIST += "CVE-2021-38209" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-40490 -# Patched in kernel since v5.15 a54c4613dac1500b40e4ab55199f7c51f028e848 -# Backported in version v5.4.145 9b3849ba667af99ee99a7853a021a7786851b9fd -# Backported in version v5.10.63 09a379549620f122de3aa4e65df9329976e4cdf5 -CVE_CHECK_WHITELIST += "CVE-2021-40490" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-41864 -# Patched in kernel since v5.15 30e29a9a2bc6a4888335a6ede968b75cd329657a -# Backported in version v5.4.153 b14f28126c51533bb329379f65de5b0dd689b13a -# Backported in version v5.10.73 064faa8e8a9b50f5010c5aa5740e06d477677a89 -CVE_CHECK_WHITELIST += "CVE-2021-41864" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-42008 -# Patched in kernel since v5.14 19d1532a187669ce86d5a2696eb7275310070793 -# Backported in version v5.4.143 a73b9aa142691c2ae313980a8734997a78f74b22 -# Backported in version v5.10.61 85e0518f181a0ff060f5543d2655fb841a83d653 -CVE_CHECK_WHITELIST += "CVE-2021-42008" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-42252 -# Patched in kernel since v5.15 b49a0e69a7b1a68c8d3f64097d06dabb770fec96 -# Backported in version v5.4.148 2712f29c44f18db826c7e093915a727b6f3a20e4 -# Backported in version v5.10.67 3fdf2feb6cbe76c6867224ed8527b356e805352c -CVE_CHECK_WHITELIST += "CVE-2021-42252" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-42739 -# Patched in kernel since v5.16 35d2969ea3c7d32aee78066b1f3cf61a0d935a4e -# Backported in version v5.4.158 2461f38384d50dd966e1db44fe165b1896f5df5a -# Backported in version v5.10.78 d7fc85f6104259541ec136199d3bf7c8a736613d -# Backported in version v5.15.1 cb667140875a3b1db92e4c50b4617a7cbf84659b -CVE_CHECK_WHITELIST += "CVE-2021-42739" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-43389 -# Patched in kernel since v5.15 1f3e2e97c003f80c4b087092b225c8787ff91e4d -# Backported in version v5.4.156 285e9210b1fab96a11c0be3ed5cea9dd48b6ac54 -# Backported in version v5.10.76 7f221ccbee4ec662e2292d490a43ce6c314c4594 -CVE_CHECK_WHITELIST += "CVE-2021-43389" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-43975 -# Patched in kernel since v5.16 b922f622592af76b57cbc566eaeccda0b31a3496 -# Backported in version v5.4.164 89d15a2e40d7edaaa16da2763b349dd7b056cc09 -# Backported in version v5.10.84 2c514d25003ac89bb7716bb4402918ccb141f8f5 -# Backported in version v5.15.7 cec49b6dfdb0b9fefd0f17c32014223f73ee2605 -CVE_CHECK_WHITELIST += "CVE-2021-43975" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-43976 -# Patched in kernel since v5.17 04d80663f67ccef893061b49ec8a42ff7045ae84 -# Backported in version v5.4.174 ae56c5524a750fd8cf32565cb3902ce5baaeb4e6 -# Backported in version v5.10.94 6036500fdf77caaca9333003f78d25a3d61c4e40 -# Backported in version v5.15.17 b2762757f4e484f8a164546f93aca82568d87649 -CVE_CHECK_WHITELIST += "CVE-2021-43976" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-44733 -# Patched in kernel since v5.16 dfd0743f1d9ea76931510ed150334d571fbab49d -# Backported in version v5.4.170 940e68e57ab69248fabba5889e615305789db8a7 -# Backported in version v5.10.89 c05d8f66ec3470e5212c4d08c46d6cb5738d600d -# Backported in version v5.15.12 492eb7afe858d60408b2da09adc78540c4d16543 -CVE_CHECK_WHITELIST += "CVE-2021-44733" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-45095 -# Patched in kernel since v5.16 bcd0f93353326954817a4f9fa55ec57fb38acbb0 -# Backported in version v5.4.171 2a6a811a45fde5acb805ead4d1e942be3875b302 -# Backported in version v5.10.91 4f260ea5537db35d2eeec9bca78a74713078a544 -# Backported in version v5.15.14 9ca97a693aa8b86e8424f0047198ea3ab997d50f -CVE_CHECK_WHITELIST += "CVE-2021-45095" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-45480 -# Patched in kernel since v5.16 5f9562ebe710c307adc5f666bf1a2162ee7977c0 -# Backported in version v5.4.168 166f0adf7e7525c87595ceadb21a91e2a9519a1e -# Backported in version v5.10.88 74dc97dfb276542f12746d706abef63364d816bb -# Backported in version v5.15.11 68014890e4382ff9192e1357be39b7d0455665fa -CVE_CHECK_WHITELIST += "CVE-2021-45480" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-45485 -# Patched in kernel since v5.14 62f20e068ccc50d6ab66fdb72ba90da2b9418c99 -# Backported in version v5.4.133 ccde03a6a0fbdc3c0ba81930e629b8b14974cce4 -# Backported in version v5.10.51 8f939b79579715b195dc3ad36669707fce6853ee -CVE_CHECK_WHITELIST += "CVE-2021-45485" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-45486 -# Patched in kernel since v5.13 aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba -# Backported in version v5.4.119 fee81285bd09ec2080ce2cbb5063aad0e58eb272 -# Backported in version v5.10.37 a273c27d7255fc527023edeb528386d1b64bedf5 -CVE_CHECK_WHITELIST += "CVE-2021-45486" - -# https://nvd.nist.gov/vuln/detail/CVE-2021-45868 -# Patched in kernel since v5.16 9bf3d20331295b1ecb81f4ed9ef358c51699a050 -# Backported in version v5.4.160 10b808307d37d09b132fc086002bc1aa9910d315 -# Backported in version v5.10.80 ceeb0a8a8716a1c72af3fa4d4f98c3aced32b037 -# Backported in version v5.15.3 332db0909293f3f4d853ee2ea695272c75082d87 -CVE_CHECK_WHITELIST += "CVE-2021-45868" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0322 -# Patched in kernel since v5.15 a2d859e3fc97e79d907761550dbc03ff1b36479c -# Backported in version v5.4.155 d88774539539dcbf825a25e61234f110513f5963 -# Backported in version v5.10.75 d84a69ac410f6228873d05d35120f6bdddab7fc3 -CVE_CHECK_WHITELIST += "CVE-2022-0322" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0330 -# Patched in kernel since v5.17 7938d61591d33394a21bdd7797a245b65428f44c -# Backported in version v5.4.175 1b5553c79d52f17e735cd924ff2178a2409e6d0b -# Backported in version v5.10.95 6a6acf927895c38bdd9f3cd76b8dbfc25ac03e88 -# Backported in version v5.15.18 8a17a077e7e9ecce25c95dbdb27843d2d6c2f0f7 -CVE_CHECK_WHITELIST += "CVE-2022-0330" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0487 -# Patched in kernel since v5.17 bd2db32e7c3e35bd4d9b8bbff689434a50893546 -# Backported in version v5.4.179 3a0a7ec5574b510b067cfc734b8bdb6564b31d4e -# Backported in version v5.10.100 be93028d306dac9f5b59ebebd9ec7abcfc69c156 -# Backported in version v5.15.23 af0e6c49438b1596e4be8a267d218a0c88a42323 -CVE_CHECK_WHITELIST += "CVE-2022-0487" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0492 -# Patched in kernel since v5.17 24f6008564183aa120d07c03d9289519c2fe02af -# Backported in version v5.4.177 0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8 -# Backported in version v5.10.97 1fc3444cda9a78c65b769e3fa93455e09ff7a0d3 -# Backported in version v5.15.20 4b1c32bfaa02255a5df602b41587174004996477 -CVE_CHECK_WHITELIST += "CVE-2022-0492" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0494 -# Patched in kernel since v5.17 cc8f7fe1f5eab010191aa4570f27641876fa1267 -# Backported in version v5.4.193 c7337efd1d11acb6f84c68ffee57d3f312e87b24 -# Backported in version v5.10.115 a439819f4797f0846c7cffa9475f44aef23c541f -# Backported in version v5.15.27 a1ba98731518b811ff90009505c1aebf6e400bc2 -CVE_CHECK_WHITELIST += "CVE-2022-0494" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0812 -# Patched in kernel since v5.8 912288442cb2f431bf3c8cb097a5de83bc6dbac1 -# Backported in version v5.4.53 c8a4452da9f4b09c28d904f70247b097d4c14932 -CVE_CHECK_WHITELIST += "CVE-2022-0812" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0850 -# Patched in kernel since v5.14 ce3aba43599f0b50adbebff133df8d08a3d5fffe -# Backported in version v5.4.132 ed628b2531196cc76d7c9b730abe4020cad26b0b -# Backported in version v5.10.50 ea5466f1a77720217a25a859b5a58b618aaba544 -CVE_CHECK_WHITELIST += "CVE-2022-0850" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-0854 -# Patched in kernel since v5.18 901c7280ca0d5e2b4a8929fbe0bfb007ac2a6544 -# Backported in version v5.4.196 b2f140a9f980806f572d672e1780acea66b9a25c -# Backported in version v5.10.118 f3f2247ac31cb71d1f05f56536df5946c6652f4a -# Backported in version v5.15.33 7007c894631cf43041dcfa0da7142bbaa7eb673c -CVE_CHECK_WHITELIST += "CVE-2022-0854" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1011 -# Patched in kernel since v5.17 0c4bcfdecb1ac0967619ee7ff44871d93c08c909 -# Backported in version v5.4.185 a9174077febfb1608ec3361622bf5f91e2668d7f -# Backported in version v5.10.106 ab5595b45f732212b3b1974041b43a257153edb7 -# Backported in version v5.15.29 ca62747b38f59d4e75967ebf63c992de8852ca1b -CVE_CHECK_WHITELIST += "CVE-2022-1011" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1016 -# Patched in kernel since v5.18 4c905f6740a365464e91467aa50916555b28213d -# Backported in version v5.4.188 06f0ff82c70241a766a811ae1acf07d6e2734dcb -# Backported in version v5.10.109 2c74374c2e88c7b7992bf808d9f9391f7452f9d9 -# Backported in version v5.15.32 fafb904156fbb8f1dd34970cd5223e00b47c33be -CVE_CHECK_WHITELIST += "CVE-2022-1016" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1055 -# Patched in kernel since v5.17 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 -# Backported in version v5.4.177 b1d17e920dfcd4b56fa2edced5710c191f7e50b5 -# Backported in version v5.10.97 e7be56926397cf9d992be8913f74a76152f8f08d -# Backported in version v5.15.20 f36cacd6c933183c1a8827d5987cf2cfc0a44c76 -CVE_CHECK_WHITELIST += "CVE-2022-1055" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1195 -# Patched in kernel since v5.16 b2f37aead1b82a770c48b5d583f35ec22aabb61e -# Backported in version v5.4.169 a5c6a13e9056d87805ba3042c208fbd4164ad22b -# Backported in version v5.10.89 7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca -# Backported in version v5.15.12 03d00f7f1815ec00dab5035851b3de83afd054a8 -CVE_CHECK_WHITELIST += "CVE-2022-1195" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1198 -# Patched in kernel since v5.17 efe4186e6a1b54bf38b9e05450d43b0da1fd7739 -# Backported in version v5.4.189 28c8fd84bea13cbf238d7b19d392de2fcc31331c -# Backported in version v5.10.110 f67a1400788f550d201c71aeaf56706afe57f0da -# Backported in version v5.15.33 3eb18f8a1d02a9462a0e4903efc674ca3d0406d1 -CVE_CHECK_WHITELIST += "CVE-2022-1198" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1199 -# Patched in kernel since v5.17 71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac -# Backported in version v5.4.185 0a64aea5fe023cf1e4973676b11f49038b1f045b -# Backported in version v5.10.106 e2201ef32f933944ee02e59205adb566bafcdf91 -# Backported in version v5.15.29 46ad629e58ce3a88c924ff3c5a7e9129b0df5659 -CVE_CHECK_WHITELIST += "CVE-2022-1199" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1353 -# Patched in kernel since v5.17 9a564bccb78a76740ea9d75a259942df8143d02c -# Backported in version v5.4.189 ef388db2fe351230ff7194b37d507784bef659ec -# Backported in version v5.10.110 8d3f4ad43054619379ccc697cfcbdb2c266800d8 -# Backported in version v5.15.33 d06ee4572fd916fbb34d16dc81eb37d1dff83446 -CVE_CHECK_WHITELIST += "CVE-2022-1353" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1419 -# Patched in kernel since v5.6 4b848f20eda5974020f043ca14bacf7a7e634fc8 -# Backported in version v5.4.21 3ea7f138cec139be98f8bb9fc1a6b432003f834e -CVE_CHECK_WHITELIST += "CVE-2022-1419" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1462 -# Patched in kernel since v5.19 a501ab75e7624d133a5a3c7ec010687c8b961d23 -# Backported in version v5.4.208 f7785092cb7f022f59ebdaa181651f7c877df132 -# Backported in version v5.10.134 08afa87f58d83dfe040572ed591b47e8cb9e225c -# Backported in version v5.15.58 b2d1e4cd558cffec6bfe318f5d74e6cffc374d29 -CVE_CHECK_WHITELIST += "CVE-2022-1462" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-1734 -# Patched in kernel since v5.18 d270453a0d9ec10bb8a802a142fb1b3601a83098 -# Backported in version v5.4.193 33d3e76fc7a7037f402246c824d750542e2eb37f -# Backported in version v5.10.115 1961c5a688edb53fe3bc25cbda57f47adf12563c -# Backported in version v5.15.39 b8f2b836e7d0a553b886654e8b3925a85862d2eb -CVE_CHECK_WHITELIST += "CVE-2022-1734" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2196 -# Patched in kernel since v6.2 2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 -# Backported in version v5.4.233 f93a1a5bdcdd122aae0a3eab7a52c15b71fb725b -# Backported in version v5.10.170 1b0cafaae8884726c597caded50af185ffc13349 -# Backported in version v5.15.96 6b539a7dbb49250f92515c2ba60aea239efc9e35 -# Backported in version v6.1.14 63fada296062e91ad9f871970d4e7f19e21a6a15 -CVE_CHECK_WHITELIST += "CVE-2022-2196" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2318 -# Patched in kernel since v5.19 9cc02ede696272c5271a401e4f27c262359bc2f6 -# Backported in version v5.4.204 bb91556d2af066f8ca2e7fd8e334d652e731ee29 -# Backported in version v5.10.129 8f74cb27c2b4872fd14bf046201fa7b36a46885e -# Backported in version v5.15.53 659d39545260100628d8a30020d09fb6bf63b915 -CVE_CHECK_WHITELIST += "CVE-2022-2318" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2380 -# Patched in kernel since v5.18 bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 -# Backported in version v5.4.189 478154be3a8c21ff106310bb1037b1fc9d81dc62 -# Backported in version v5.10.110 72af8810922eb143ed4f116db246789ead2d8543 -# Backported in version v5.15.33 46cdbff26c88fd75dccbf28df1d07cbe18007eac -CVE_CHECK_WHITELIST += "CVE-2022-2380" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2503 -# Patched in kernel since v5.19 4caae58406f8ceb741603eee460d79bacca9b1b5 -# Backported in version v5.4.197 fd2f7e9984850a0162bfb6948b98ffac9fb5fa58 -# Backported in version v5.10.120 8df42bcd364cc3b41105215d841792aea787b133 -# Backported in version v5.15.45 69712b170237ec5979f168149cd31e851a465853 -CVE_CHECK_WHITELIST += "CVE-2022-2503" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2663 -# Patched in kernel since v6.0 e8d5dfd1d8747b56077d02664a8838c71ced948e -# Backported in version v5.4.215 d0a24bc8e2aa703030d80affa3e5237fe3ad4dd2 -# Backported in version v5.10.146 9a5d7e0acb41bb2aac552f8eeb4b404177f3f66d -# Backported in version v5.15.71 dc33ffbc361e2579a8f31b8724ef85d4117440e4 -# Backported in version v5.19.12 510ea9eae5ee45f4e443023556532bda99387351 -CVE_CHECK_WHITELIST += "CVE-2022-2663" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-2873 -# Patched in kernel since v6.2 39244cc754829bf707dccd12e2ce37510f5b1f8d -# Backported in version v5.4.229 cdcbae2c5003747ddfd14e29db9c1d5d7e7c44dd -# Backported in version v5.10.163 9ac541a0898e8ec187a3fa7024b9701cffae6bf2 -# Backported in version v5.15.86 96c12fd0ec74641295e1c3c34dea3dce1b6c3422 -# Backported in version v6.1.2 233348a04becf133283f0076e20b317302de21d9 -CVE_CHECK_WHITELIST += "CVE-2022-2873" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3028 -# Patched in kernel since v6.0 ba953a9d89a00c078b85f4b190bc1dde66fe16b5 -# Backported in version v5.4.212 8ee27a4f0f1ad36d430221842767880df6494147 -# Backported in version v5.10.140 c5c4d4c9806dadac7bc82f9c29ef4e1b78894775 -# Backported in version v5.15.64 103bd319c0fc90f1cb013c3a508615e6df8af823 -# Backported in version v5.19.6 6901885656c029c976498290b52f67f2c251e6a0 -CVE_CHECK_WHITELIST += "CVE-2022-3028" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3105 -# Patched in kernel since v5.16 7694a7de22c53a312ea98960fcafc6ec62046531 -# Backported in version v5.4.171 7646a340b25bb68cfb6d2e087a608802346d0f7b -# Backported in version v5.10.91 16e5cad6eca1e506c38c39dc256298643fa1852a -# Backported in version v5.15.14 0ea8bb0811ba0ec22903cbb48ff2cd872382e8d4 -CVE_CHECK_WHITELIST += "CVE-2022-3105" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3107 -# Patched in kernel since v5.17 886e44c9298a6b428ae046e2fa092ca52e822e6a -# Backported in version v5.4.187 b01e2df5fbf68719dfb8e766c1ca6089234144c2 -# Backported in version v5.10.108 9b763ceda6f8963cc99df5772540c54ba46ba37c -# Backported in version v5.15.31 ab0ab176183191cffc69fe9dd8ac6c8db23f60d3 -CVE_CHECK_WHITELIST += "CVE-2022-3107" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3111 -# Patched in kernel since v5.18 6dee930f6f6776d1e5a7edf542c6863b47d9f078 -# Backported in version v5.4.189 90bec38f6a4c81814775c7f3dfc9acf281d5dcfa -# Backported in version v5.10.110 48d23ef90116c8c702bfa4cad93744e4e5588d7d -# Backported in version v5.15.33 4124966fbd95eeecca26d52433f393e2b9649a33 -CVE_CHECK_WHITELIST += "CVE-2022-3111" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3115 -# Patched in kernel since v5.19 73c3ed7495c67b8fbdc31cf58e6ca8757df31a33 -# Backported in version v5.4.198 fa0d7ba25a53ac2e4bb24ef31aec49ff3578b44f -# Backported in version v5.10.121 b4c7dd0037e6aeecad9b947b30f0d9eaeda11762 -# Backported in version v5.15.46 4cb37f715f601cee5b026c6f9091a466266b5ba5 -CVE_CHECK_WHITELIST += "CVE-2022-3115" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3202 -# Patched in kernel since v5.18 a53046291020ec41e09181396c1e829287b48d47 -# Backported in version v5.4.189 e19c3149a80e4fc8df298d6546640e01601f3758 -# Backported in version v5.10.111 b9c5ac0a15f24d63b20f899072fa6dd8c93af136 -# Backported in version v5.15.34 d925b7e78b62805fcc5440d1521181c82b6f03cb -CVE_CHECK_WHITELIST += "CVE-2022-3202" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3303 -# Patched in kernel since v6.0 8423f0b6d513b259fdab9c9bf4aaa6188d054c2d -# Backported in version v5.4.215 4051324a6dafd7053c74c475e80b3ba10ae672b0 -# Backported in version v5.10.148 fce793a056c604b41a298317cf704dae255f1b36 -# Backported in version v5.15.68 8015ef9e8a0ee5cecfd0cb6805834d007ab26f86 -# Backported in version v5.19.9 723ac5ab2891b6c10dd6cc78ef5456af593490eb -CVE_CHECK_WHITELIST += "CVE-2022-3303" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3424 -# Patched in kernel since v6.2 643a16a0eb1d6ac23744bb6e90a00fc21148a9dc -# Backported in version v5.4.229 0078dd8758561540ed30b2c5daa1cb647e758977 -# Backported in version v5.10.163 0f67ed565f20ea2fdd98e3b0b0169d9e580bb83c -# Backported in version v5.15.86 d5c8f9003a289ee2a9b564d109e021fc4d05d106 -# Backported in version v6.1.2 4e947fc71bec7c7da791f8562d5da233b235ba5e -CVE_CHECK_WHITELIST += "CVE-2022-3424" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3435 -# Patched in kernel since v6.1 61b91eb33a69c3be11b259c5ea484505cd79f883 -# Backported in version v5.4.226 cc3cd130ecfb8b0ae52e235e487bae3f16a24a32 -# Backported in version v5.10.158 0b5394229ebae09afc07aabccb5ffd705ffd250e -# Backported in version v5.15.82 25174d91e4a32a24204060d283bd5fa6d0ddf133 -CVE_CHECK_WHITELIST += "CVE-2022-3435" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3521 -# Patched in kernel since v6.1 ec7eede369fe5b0d085ac51fdbb95184f87bfc6c -# Backported in version v5.4.225 ad39d09190a545d0f05ae0a82900eee96c5facea -# Backported in version v5.10.156 7deb7a9d33e4941c5ff190108146d3a56bf69e9d -# Backported in version v5.15.80 27d706b0d394a907ff8c4f83ffef9d3e5817fa84 -CVE_CHECK_WHITELIST += "CVE-2022-3521" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3545 -# Patched in kernel since v6.0 02e1a114fdb71e59ee6770294166c30d437bf86a -# Backported in version v5.4.228 3c837460f920a63165961d2b88b425703f59affb -# Backported in version v5.10.160 eb6313c12955c58c3d3d40f086c22e44ca1c9a1b -# Backported in version v5.15.84 9d933af8fef33c32799b9f2d3ff6bf58a63d7f24 -CVE_CHECK_WHITELIST += "CVE-2022-3545" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3564 -# Patched in kernel since v6.1 3aff8aaca4e36dc8b17eaa011684881a80238966 -# Backported in version v5.4.224 4cd094fd5d872862ca278e15b9b51b07e915ef3f -# Backported in version v5.10.154 cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569 -# Backported in version v5.15.78 8278a87bb1eeea94350d675ef961ee5a03341fde -CVE_CHECK_WHITELIST += "CVE-2022-3564" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3586 -# Patched in kernel since v6.0 9efd23297cca530bb35e1848665805d3fcdd7889 -# Backported in version v5.4.213 279c7668e354fa151d5fd2e8c42b5153a1de3135 -# Backported in version v5.10.143 2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b -# Backported in version v5.15.68 1a889da60afc017050e1f517b3b976b462846668 -# Backported in version v5.19.9 8f796f36f5ba839c11eb4685150ebeed496c546f -CVE_CHECK_WHITELIST += "CVE-2022-3586" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3594 -# Patched in kernel since v6.1 93e2be344a7db169b7119de21ac1bf253b8c6907 -# Backported in version v5.4.220 61fd56b0a1a3e923aced4455071177778dd59e88 -# Backported in version v5.10.150 484400d433ca1903a87268c55f019e932297538a -# Backported in version v5.15.75 b3179865cf7e892b26eedab3d6c54b4747c774a2 -# Backported in version v5.19.17 2e896abccf99fef76691d8e1019bd44105a12e1f -CVE_CHECK_WHITELIST += "CVE-2022-3594" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3621 -# Patched in kernel since v6.1 21a87d88c2253350e115029f14fe2a10a7e6c856 -# Backported in version v5.4.218 792211333ad77fcea50a44bb7f695783159fc63c -# Backported in version v5.10.148 3f840480e31495ce674db4a69912882b5ac083f2 -# Backported in version v5.15.74 1e512c65b4adcdbdf7aead052f2162b079cc7f55 -# Backported in version v5.19.16 caf2c6b580433b3d3e413a3d54b8414a94725dcd -CVE_CHECK_WHITELIST += "CVE-2022-3621" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3623 -# Patched in kernel since v6.1 fac35ba763ed07ba93154c95ffc0c4a55023707f -# Backported in version v5.4.228 176ba4c19d1bb153aa6baaa61d586e785b7d736c -# Backported in version v5.10.159 fccee93eb20d72f5390432ecea7f8c16af88c850 -# Backported in version v5.15.78 3a44ae4afaa5318baed3c6e2959f24454e0ae4ff -# Backported in version v5.19.17 86a913d55c89dd13ba070a87f61a493563e94b54 -CVE_CHECK_WHITELIST += "CVE-2022-3623" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3629 -# Patched in kernel since v6.0 7e97cfed9929eaabc41829c395eb0d1350fccb9d -# Backported in version v5.4.211 f82f1e2042b397277cd39f16349950f5abade58d -# Backported in version v5.10.138 38ddccbda5e8b762c8ee06670bb1f64f1be5ee50 -# Backported in version v5.15.63 e4c0428f8a6fc8c218d7fd72bddd163f05b29795 -# Backported in version v5.19.4 8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72 -CVE_CHECK_WHITELIST += "CVE-2022-3629" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3633 -# Patched in kernel since v6.0 8c21c54a53ab21842f5050fa090f26b03c0313d6 -# Backported in version v5.4.211 04e41b6bacf474f5431491f92e981096e8cc8e93 -# Backported in version v5.10.138 a220ff343396bae8d3b6abee72ab51f1f34b3027 -# Backported in version v5.15.63 98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2 -# Backported in version v5.19.4 a0278dbeaaf7ca60346c62a9add65ae7d62564de -CVE_CHECK_WHITELIST += "CVE-2022-3633" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3635 -# Patched in kernel since v6.0 3f4093e2bf4673f218c0bf17d8362337c400e77b -# Backported in version v5.4.211 9a6cbaa50f263b12df18a051b37f3f42f9fb5253 -# Backported in version v5.10.138 a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e -# Backported in version v5.15.63 a5d7ce086fe942c5ab422fd2c034968a152be4c4 -# Backported in version v5.19.4 af412b252550f9ac36d9add7b013c2a2c3463835 -CVE_CHECK_WHITELIST += "CVE-2022-3635" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3646 -# Patched in kernel since v6.1 d0d51a97063db4704a5ef6bc978dddab1636a306 -# Backported in version v5.4.218 b7e409d11db9ce9f8bc05fcdfa24d143f60cd393 -# Backported in version v5.10.148 aad4c997857f1d4b6c1e296c07e4729d3f8058ee -# Backported in version v5.15.74 44b1ee304bac03f1b879be5afe920e3a844e40fc -# Backported in version v5.19.16 4755fcd844240857b525f6e8d8b65ee140fe9570 -CVE_CHECK_WHITELIST += "CVE-2022-3646" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3649 -# Patched in kernel since v6.1 d325dc6eb763c10f591c239550b8c7e5466a5d09 -# Backported in version v5.4.220 d1c2d820a2cd73867b7d352e89e92fb3ac29e926 -# Backported in version v5.10.148 21ee3cffed8fbabb669435facfd576ba18ac8652 -# Backported in version v5.15.74 cb602c2b654e26763226d8bd27a702f79cff4006 -# Backported in version v5.19.16 394b2571e9a74ddaed55aa9c4d0f5772f81c21e4 -CVE_CHECK_WHITELIST += "CVE-2022-3649" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-3707 -# Patched in kernel since v6.2 4a61648af68f5ba4884f0e3b494ee1cabc4b6620 -# Backported in version v5.4.233 787ef0db014085df8691e5aeb58ab0bb081e5ff0 -# Backported in version v5.10.170 3d743415c6fb092167df6c23e9c7e9f6df7db625 -# Backported in version v5.15.96 0d3d5099a50badadad6837edda00e42149b2f657 -# Backported in version v6.1.5 1022519da69d99d455c58ca181a6c499c562c70e -CVE_CHECK_WHITELIST += "CVE-2022-3707" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-4095 -# Patched in kernel since v6.0 e230a4455ac3e9b112f0367d1b8e255e141afae0 -# Backported in version v5.4.213 d0aac7146e96bf39e79c65087d21dfa02ef8db38 -# Backported in version v5.10.142 19e3f69d19801940abc2ac37c169882769ed9770 -# Backported in version v5.15.66 dc02aaf950015850e7589696521c7fca767cea77 -# Backported in version v5.19.8 b1727def850904e4b8ba384043775672841663a1 -CVE_CHECK_WHITELIST += "CVE-2022-4095" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-4139 -# Patched in kernel since v6.1 04aa64375f48a5d430b5550d9271f8428883e550 -# Backported in version v5.4.226 3659e33c1e4f8cfc62c6c15aca5d797010c277a4 -# Backported in version v5.10.157 86f0082fb9470904b15546726417f28077088fee -# Backported in version v5.15.81 ee2d04f23bbb16208045c3de545c6127aaa1ed0e -CVE_CHECK_WHITELIST += "CVE-2022-4139" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-4382 -# Patched in kernel since v6.2 d18dcfe9860e842f394e37ba01ca9440ab2178f4 -# Backported in version v5.4.230 9a39f4626b361ee7aa10fd990401c37ec3b466ae -# Backported in version v5.10.165 856e4b5e53f21edbd15d275dde62228dd94fb2b4 -# Backported in version v5.15.90 a2e075f40122d8daf587db126c562a67abd69cf9 -# Backported in version v6.1.8 616fd34d017000ecf9097368b13d8a266f4920b3 -CVE_CHECK_WHITELIST += "CVE-2022-4382" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-4662 -# Patched in kernel since v6.0 9c6d778800b921bde3bff3cff5003d1650f942d1 -# Backported in version v5.4.213 df1875084898b15cbc42f712e93d7f113ae6271b -# Backported in version v5.10.142 abe3cfb7a7c8e907b312c7dbd7bf4d142b745aa8 -# Backported in version v5.15.66 c548b99e1c37db6f7df86ecfe9a1f895d6c5966e -# Backported in version v5.19.8 d5eb850b3e8836197a38475840725260b9783e94 -CVE_CHECK_WHITELIST += "CVE-2022-4662" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-24448 -# Patched in kernel since v5.17 ac795161c93699d600db16c1a8cc23a65a1eceaf -# Backported in version v5.4.176 0dfacee40021dcc0a9aa991edd965addc04b9370 -# Backported in version v5.10.96 ce8c552b88ca25d775ecd0a0fbef4e0e03de9ed2 -# Backported in version v5.15.19 4c36ca387af4a9b5d775e46a6cb9dc2d151bf057 -CVE_CHECK_WHITELIST += "CVE-2022-24448" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-24959 -# Patched in kernel since v5.17 29eb31542787e1019208a2e1047bb7c76c069536 -# Backported in version v5.4.176 7afc09c8915b0735203ebcb8d766d7db37b794c0 -# Backported in version v5.10.96 729e54636b3ebefb77796702a5b1f1ed5586895e -# Backported in version v5.15.19 0690c3943ed0fa76654e600eca38cde6a13c87ac -CVE_CHECK_WHITELIST += "CVE-2022-24959" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-25258 -# Patched in kernel since v5.17 75e5b4849b81e19e9efe1654b30d7f3151c33c2c -# Backported in version v5.4.180 38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18 -# Backported in version v5.10.101 22ec1004728548598f4f5b4a079a7873409eacfd -# Backported in version v5.15.24 3e33e5c67cb9ebd2b791b9a9fb2b71daacebd8d4 -CVE_CHECK_WHITELIST += "CVE-2022-25258" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-25375 -# Patched in kernel since v5.17 38ea1eac7d88072bbffb630e2b3db83ca649b826 -# Backported in version v5.4.180 c9e952871ae47af784b4aef0a77db02e557074d6 -# Backported in version v5.10.101 fb4ff0f96de37c44236598e8b53fe43b1df36bf3 -# Backported in version v5.15.24 2da3b0ab54fb7f4d7c5a82757246d0ee33a47197 -CVE_CHECK_WHITELIST += "CVE-2022-25375" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-25636 -# Patched in kernel since v5.17 b1a5983f56e371046dcf164f90bfaf704d2b89f6 -# Backported in version v5.4.182 49c011a44edd14adb555dbcbaf757f52b1f2f748 -# Backported in version v5.10.103 68f19845f580a1d3ac1ef40e95b0250804e046bb -# Backported in version v5.15.26 6c5d780469d6c3590729940e2be8a3bd66ea4814 -CVE_CHECK_WHITELIST += "CVE-2022-25636" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-26365 -# Patched in kernel since v5.19 2f446ffe9d737e9a844b97887919c4fda18246e7 -# Backported in version v5.4.204 42112e8f94617d83943f8f3b8de2b66041905506 -# Backported in version v5.10.129 cfea428030be836d79a7690968232bb7fa4410f1 -# Backported in version v5.15.53 7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9 -CVE_CHECK_WHITELIST += "CVE-2022-26365" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-26490 -# Patched in kernel since v5.17 4fbcc1a4cb20fe26ad0225679c536c80f1648221 -# Backported in version v5.4.188 0aef7184630b599493a0dcad4eec6d42b3e68e91 -# Backported in version v5.10.109 25c23fe40e6e1ef8e6d503c52b4f518b2e520ab7 -# Backported in version v5.15.32 a34c47b1ab07153a047476de83581dc822287f39 -CVE_CHECK_WHITELIST += "CVE-2022-26490" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-26966 -# Patched in kernel since v5.17 e9da0b56fe27206b49f39805f7dcda8a89379062 -# Backported in version v5.4.182 b95d71abeb7d31d4d51cd836d80f99fd783fd6d5 -# Backported in version v5.10.103 4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3 -# Backported in version v5.15.26 9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe -CVE_CHECK_WHITELIST += "CVE-2022-26966" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-27223 -# Patched in kernel since v5.17 7f14c7227f342d9932f9b918893c8814f86d2a0d -# Backported in version v5.4.182 6b23eda989236fd75b4a9893cc816cd690c29dfc -# Backported in version v5.10.103 bfa8ffbaaaaf9752f66bc7cabcef2de715e7621f -# Backported in version v5.15.26 2c775ad1fd5e014b35e483da2aab8400933fb09d -CVE_CHECK_WHITELIST += "CVE-2022-27223" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-27666 -# Patched in kernel since v5.17 ebe48d368e97d007bfeb76fcb065d6cfc4c96645 -# Backported in version v5.4.188 fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4 -# Backported in version v5.10.108 9248694dac20eda06e22d8503364dc9d03df4e2f -# Backported in version v5.15.29 4aaabbffc3b0658ce80eebdde9bafa20a3f932e0 -CVE_CHECK_WHITELIST += "CVE-2022-27666" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-28356 -# Patched in kernel since v5.18 764f4eb6846f5475f1244767d24d25dd86528a4a -# Backported in version v5.4.188 572f9a0d3f3feb8bd3422e88ad71882bc034b3ff -# Backported in version v5.10.109 571df3393f523b59cba87e2f3e80a3a624030f9c -# Backported in version v5.15.32 e9072996108387ab19b497f5b557c93f98d96b0b -CVE_CHECK_WHITELIST += "CVE-2022-28356" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-28388 -# Patched in kernel since v5.18 3d3925ff6433f98992685a9679613a2cc97f3ce2 -# Backported in version v5.4.191 660784e7194ac2953aebe874c1f75f2441ba3d19 -# Backported in version v5.10.110 5318cdf4fd834856ce71238b064f35386f9ef528 -# Backported in version v5.15.33 f2ce5238904f539648aaf56c5ee49e5eaf44d8fc -CVE_CHECK_WHITELIST += "CVE-2022-28388" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-28389 -# Patched in kernel since v5.18 04c9b00ba83594a29813d6b1fb8fdc93a3915174 -# Backported in version v5.4.189 2dfe9422d528630e2ce0d454147230cce113f814 -# Backported in version v5.10.110 0801a51d79389282c1271e623613b2e1886e071e -# Backported in version v5.15.33 37f07ad24866c6c1423b37b131c9a42414bcf8a1 -CVE_CHECK_WHITELIST += "CVE-2022-28389" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-28390 -# Patched in kernel since v5.18 c70222752228a62135cee3409dccefd494a24646 -# Backported in version v5.4.189 e27caad38b59b5b00b9c5228d04c13111229deec -# Backported in version v5.10.110 b417f9c50586588754b2b0453a1f99520cf7c0e8 -# Backported in version v5.15.33 459b19f42fd5e031e743dfa119f44aba0b62ff97 -CVE_CHECK_WHITELIST += "CVE-2022-28390" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-28893 -# Patched in kernel since v5.18 f00432063db1a0db484e85193eccc6845435b80e -# Backported in version v5.4.196 2f8f6c393b11b5da059b1fc10a69fc2f2b6c446a -# Backported in version v5.10.117 e68b60ae29de10c7bd7636e227164a8dbe305a82 -# Backported in version v5.15.41 54f6834b283d9b4d070b0639d9ef5e1d156fe7b0 -CVE_CHECK_WHITELIST += "CVE-2022-28893" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-32250 -# Patched in kernel since v5.19 520778042ccca019f3ffa136dd0ca565c486cedd -# Backported in version v5.4.198 f36736fbd48491a8d85cd22f4740d542c5a1546e -# Backported in version v5.10.120 ea62d169b6e731e0b54abda1d692406f6bc6a696 -# Backported in version v5.15.45 f692bcffd1f2ce5488d24fbcb8eab5f351abf79d -CVE_CHECK_WHITELIST += "CVE-2022-32250" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-32296 -# Patched in kernel since v5.18 4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5 -# Backported in version v5.4.201 c26e1addf15763ae404f4bbf131719a724e768ab -# Backported in version v5.10.125 9429b75bc271b6f29e50dbb0ee0751800ff87dd9 -# Backported in version v5.15.41 952a238d779eea4ecb2f8deb5004c8f56be79bc9 -CVE_CHECK_WHITELIST += "CVE-2022-32296" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-32981 -# Patched in kernel since v5.19 8e1278444446fc97778a5e5c99bca1ce0bbc5ec9 -# Backported in version v5.4.198 0c4bc0a2f8257f79a70fe02b9a698eb14695a64b -# Backported in version v5.10.122 3be74fc0afbeadc2aff8dc69f3bf9716fbe66486 -# Backported in version v5.15.47 2a0165d278973e30f2282c15c52d91788749d2d4 -CVE_CHECK_WHITELIST += "CVE-2022-32981" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-33740 -# Patched in kernel since v5.19 307c8de2b02344805ebead3440d8feed28f2f010 -# Backported in version v5.4.204 04945b5beb73019145ac17a2565526afa7293c14 -# Backported in version v5.10.129 728d68bfe68d92eae1407b8a9edc7817d6227404 -# Backported in version v5.15.53 5dd0993c36832d33820238fc8dc741ba801b7961 -CVE_CHECK_WHITELIST += "CVE-2022-33740" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-33741 -# Patched in kernel since v5.19 4491001c2e0fa69efbb748c96ec96b100a5cdb7e -# Backported in version v5.4.204 ede57be88a5fff42cd00e6bcd071503194d398dd -# Backported in version v5.10.129 4923217af5742a796821272ee03f8d6de15c0cca -# Backported in version v5.15.53 ed3cfc690675d852c3416aedb271e0e7d179bf49 -CVE_CHECK_WHITELIST += "CVE-2022-33741" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-33742 -# Patched in kernel since v5.19 2400617da7eebf9167d71a46122828bc479d64c9 -# Backported in version v5.4.204 60ac50daad36ef3fe9d70d89cfe3b95d381db997 -# Backported in version v5.10.129 cbbd2d2531539212ff090aecbea9877c996e6ce6 -# Backported in version v5.15.53 6d0a9127279a4533815202e30ad1b3a39f560ba3 -CVE_CHECK_WHITELIST += "CVE-2022-33742" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-33744 -# Patched in kernel since v5.19 b75cd218274e01d026dc5240e86fdeb44bbed0c8 -# Backported in version v5.4.204 5c03cad51b84fb26ccea7fd99130d8ec47949cfc -# Backported in version v5.10.129 43c8d33ce353091f15312cb6de3531517d7bba90 -# Backported in version v5.15.53 9f83c8f6ab14bbf4311b70bf1b7290d131059101 -CVE_CHECK_WHITELIST += "CVE-2022-33744" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-33981 -# Patched in kernel since v5.18 233087ca063686964a53c829d547c7571e3f67bf -# Backported in version v5.4.192 7dea5913000c6a2974a00d9af8e7ffb54e47eac1 -# Backported in version v5.10.114 54c028cfc49624bfc27a571b94edecc79bbaaab4 -# Backported in version v5.15.37 e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3 -CVE_CHECK_WHITELIST += "CVE-2022-33981" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-36123 -# Patched in kernel since v5.19 38fa5479b41376dc9d7f57e71c83514285a25ca0 -# Backported in version v5.4.207 a3c7c1a726a4c6b63b85e8c183f207543fd75e1b -# Backported in version v5.10.132 136d7987fcfdeca73ee3c6a29e48f99fdd0f4d87 -# Backported in version v5.15.56 26bb7afc027ce6ac8ab6747babec674d55689ff0 -CVE_CHECK_WHITELIST += "CVE-2022-36123" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-36280 -# Patched in kernel since v6.2 4cf949c7fafe21e085a4ee386bb2dade9067316e -# Backported in version v5.4.229 94b283341f9f3f0ed56a360533766377a01540e0 -# Backported in version v5.10.163 439cbbc1519547f9a7b483f0de33b556ebfec901 -# Backported in version v5.15.87 6948e570f54f2044dd4da444b10471373a047eeb -# Backported in version v6.1.4 622d527decaac0eb65512acada935a0fdc1d0202 -CVE_CHECK_WHITELIST += "CVE-2022-36280" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-36879 -# Patched in kernel since v5.19 f85daf0e725358be78dfd208dea5fd665d8cb901 -# Backported in version v5.4.208 f4248bdb7d5c1150a2a6f8c3d3b6da0b71f62a20 -# Backported in version v5.10.134 47b696dd654450cdec3103a833e5bf29c4b83bfa -# Backported in version v5.15.58 c8e32bca0676ac663266a3b16562cb017300adcd -CVE_CHECK_WHITELIST += "CVE-2022-36879" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-36946 -# Patched in kernel since v5.19 99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164 -# Backported in version v5.4.209 52be29e8b6455788a4d0f501bd87aa679ca3ba3c -# Backported in version v5.10.135 440dccd80f627e0e11ceb0429e4cdab61857d17e -# Backported in version v5.15.59 91c11008aab0282957b8b8ccb0707d90e74cc3b9 -CVE_CHECK_WHITELIST += "CVE-2022-36946" - # https://nvd.nist.gov/vuln/detail/CVE-2022-39188 # Patched in kernel since v5.19 b67fbebd4cf980aecbcc750e1462128bffe8ae15 # Backported in version v5.4.212 c9c5501e815132530d741ec9fdd22657f91656bc # Backported in version v5.10.141 895428ee124ad70b9763259308354877b725c31d # Backported in version v5.15.65 3ffb97fce282df03723995f5eed6a559d008078e CVE_CHECK_WHITELIST += "CVE-2022-39188" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-39842 -# Patched in kernel since v5.19 a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 -# Backported in version v5.4.215 1878eaf0edb8c9e58a6ca0cf31b7a647ca346be9 -# Backported in version v5.10.145 06e194e1130c98f82d46beb40cdbc88a0d4fd6de -# Backported in version v5.15.70 ab5140c6ddd7473509e12f468948de91138b124e -CVE_CHECK_WHITELIST += "CVE-2022-39842" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-40307 -# Patched in kernel since v6.0 9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95 -# Backported in version v5.4.213 8028ff4cdbb3f20d3c1c04be33a83bab0cb94997 -# Backported in version v5.10.143 918d9c4a4bdf5205f2fb3f64dddfb56c9a1d01d6 -# Backported in version v5.15.68 dd291e070be0eca8807476b022bda00c891d9066 -# Backported in version v5.19.9 d46815a8f26ca6db2336106a148265239f73b0af -CVE_CHECK_WHITELIST += "CVE-2022-40307" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-40768 -# Patched in kernel since v6.1 6022f210461fef67e6e676fd8544ca02d1bcfa7a -# Backported in version v5.4.218 20a5bde605979af270f94b9151f753ec2caf8b05 -# Backported in version v5.10.148 36b33c63515a93246487691046d18dd37a9f589b -# Backported in version v5.15.74 76efb4897bc38b2f16176bae27ae801037ebf49a -# Backported in version v5.19.16 6ae8aa5dcf0d7ada07964c8638e55d3af5896a86 -CVE_CHECK_WHITELIST += "CVE-2022-40768" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-41218 -# Patched in kernel since v6.2 fd3d91ab1c6ab0628fe642dd570b56302c30a792 -# Backported in version v5.4.229 a29d6213098816ed4574824b6adae94fb1c0457d -# Backported in version v5.10.163 3df07728abde249e2d3f47cf22f134cb4d4f5fb1 -# Backported in version v5.15.87 8b45a3b19a2e909e830d09a90a7e1ec8601927d9 -# Backported in version v6.1.4 530ca64b44625f7d39eb1d5efb6f9ff21da991e2 -CVE_CHECK_WHITELIST += "CVE-2022-41218" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-41222 -# Patched in kernel since v5.14 97113eb39fa7972722ff490b947d8af023e1f6a2 -# Backported in version v5.4.211 79e522101cf40735f1936a10312e17f937b8dcad -# Backported in version v5.10.137 2613baa3ab2153cc45b175c58700d93f72ef36c4 -CVE_CHECK_WHITELIST += "CVE-2022-41222" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-41849 -# Patched in kernel since v6.1 5610bcfe8693c02e2e4c8b31427f1bdbdecc839c -# Backported in version v5.4.220 3742e9fd552e6c4193ebc5eb3d2cd02d429cad9c -# Backported in version v5.10.150 e50472949604f385e09ce3fa4e74dce9f44fb19b -# Backported in version v5.15.75 2b0897e33682a332167b7d355eec28693b62119e -# Backported in version v5.19.17 02c871d44090c851b07770176f88c6f5564808a1 -CVE_CHECK_WHITELIST += "CVE-2022-41849" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-41850 -# Patched in kernel since v6.1 cacdb14b1c8d3804a3a7d31773bc7569837b71a4 -# Backported in version v5.4.220 e30c3a9a88818e5cf3df3fda6ab8388bef3bc6cd -# Backported in version v5.10.150 dbcca76435a606a352c794956e6df62eedd3a353 -# Backported in version v5.15.75 c61786dc727d1850336d12c85a032c9a36ae396d -# Backported in version v5.19.17 2d38886ae0365463cdba3db669170eef1e3d55c0 -CVE_CHECK_WHITELIST += "CVE-2022-41850" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-41858 -# Patched in kernel since v5.18 ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 -# Backported in version v5.4.190 d05cd68ed8460cb158cc62c41ffe39fe0ca16169 -# Backported in version v5.10.112 ca24c5e8f0ac3d43ec0cff29e1c861be73aff165 -# Backported in version v5.15.35 efb020924a71391fc12e6f204eaf25694cc116a1 -CVE_CHECK_WHITELIST += "CVE-2022-41858" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-42328 -# Patched in kernel since v6.1 74e7e1efdad45580cc3839f2a155174cf158f9b5 -# Backported in version v5.4.227 50e1ab7e638f1009d953658af8f6b2d7813a7883 -# Backported in version v5.10.159 83632fc41449c480f2d0193683ec202caaa186c9 -# Backported in version v5.15.83 5d0fa6fc8899fe842329c0109f8ddd01144b1ed8 -CVE_CHECK_WHITELIST += "CVE-2022-42328" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-42329 -# Patched in kernel since v6.1 74e7e1efdad45580cc3839f2a155174cf158f9b5 -# Backported in version v5.4.227 50e1ab7e638f1009d953658af8f6b2d7813a7883 -# Backported in version v5.10.159 83632fc41449c480f2d0193683ec202caaa186c9 -# Backported in version v5.15.83 5d0fa6fc8899fe842329c0109f8ddd01144b1ed8 -CVE_CHECK_WHITELIST += "CVE-2022-42329" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-42703 -# Patched in kernel since v6.0 2555283eb40df89945557273121e9393ef9b542b -# Backported in version v5.4.212 2fe3eee48899a890310177d54537d5b8e255eb31 -# Backported in version v5.10.141 98f401d36396134c0c86e9e3bd00b6b6b028b521 -# Backported in version v5.15.65 c18a209b56e37b2a60414f714bd70b084ef25835 -# Backported in version v5.19.7 7877eaa1131147b4d6a063962f3aac0ab1b8ea1c -CVE_CHECK_WHITELIST += "CVE-2022-42703" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-42721 -# Patched in kernel since v6.1 bcca852027e5878aec911a347407ecc88d6fff7f -# Backported in version v5.4.218 77bb20ccb9dfc9ed4f9c93788c90d08cfd891cdc -# Backported in version v5.10.148 b0e5c5deb7880be5b8a459d584e13e1f9879d307 -# Backported in version v5.15.74 0a8ee682e4f992eccce226b012bba600bb2251e2 -# Backported in version v5.19.16 1d73c990e9bafc2754b1ced71345f73f5beb1781 -CVE_CHECK_WHITELIST += "CVE-2022-42721" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-42895 -# Patched in kernel since v6.1 b1a2cd50c0357f243b7435a732b4e62ba3157a2e -# Backported in version v5.4.224 6949400ec9feca7f88c0f6ca5cb5fdbcef419c89 -# Backported in version v5.10.154 26ca2ac091b49281d73df86111d16e5a76e43bd7 -# Backported in version v5.15.78 3e4697ffdfbb38a2755012c4e571546c89ab6422 -CVE_CHECK_WHITELIST += "CVE-2022-42895" - -# https://nvd.nist.gov/vuln/detail/CVE-2022-47929 -# Patched in kernel since v6.2 96398560f26aa07e8f2969d73c8197e6a6d10407 -# Backported in version v5.4.229 9b83ec63d0de7b1f379daa1571e128bc7b9570f8 -# Backported in version v5.10.163 9f7bc28a6b8afc2274e25650511555e93f45470f -# Backported in version v5.15.88 04941c1d5bb59d64165e09813de2947bdf6f4f28 -# Backported in version v6.1.6 e8988e878af693ac13b0fa80ba2e72d22d68f2dd -CVE_CHECK_WHITELIST += "CVE-2022-47929" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-0394 -# Patched in kernel since v6.2 cb3e9864cdbe35ff6378966660edbcbac955fe17 -# Backported in version v5.4.229 3998dba0f78a59922b0ef333ccfeb58d9410cd3d -# Backported in version v5.10.164 6c9e2c11c33c35563d34d12b343d43b5c12200b5 -# Backported in version v5.15.89 456e3794e08a0b59b259da666e31d0884b376bcf -# Backported in version v6.1.7 0afa5f0736584411771299074bbeca8c1f9706d4 -CVE_CHECK_WHITELIST += "CVE-2023-0394" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-0458 -# Patched in kernel since v6.2 739790605705ddcf18f21782b9c99ad7d53a8c11 -# Backported in version v5.4.230 96b02125dd68d77e28a29488e6f370a5eac7fb1c -# Backported in version v5.10.165 9f8e45720e0e7edb661d0082422f662ed243d8d8 -# Backported in version v5.15.90 f01aefe374d32c4bb1e5fd1e9f931cf77fca621a -# Backported in version v6.1.8 91185568c99d60534bacf38439846103962d1e2c -CVE_CHECK_WHITELIST += "CVE-2023-0458" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-0461 -# Patched in kernel since v6.2 2c02d41d71f90a5168391b6a5f2954112ba2307c -# Backported in version v5.4.229 c6d29a5ffdbc362314853462a0e24e63330a654d -# Backported in version v5.10.163 f8ed0a93b5d576bbaf01639ad816473bdfd1dcb0 -# Backported in version v5.15.88 dadd0dcaa67d27f550131de95c8e182643d2c9d6 -# Backported in version v6.1.5 7d242f4a0c8319821548c7176c09a6e0e71f223c -CVE_CHECK_WHITELIST += "CVE-2023-0461" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1073 -# Patched in kernel since v6.2 b12fece4c64857e5fab4290bf01b2e0317a88456 -# Backported in version v5.4.231 89e7fe3999e057c91f157b6ba663264f4cdfcb55 -# Backported in version v5.10.166 5dc3469a1170dd1344d262a332b26994214eeb58 -# Backported in version v5.15.91 2b49568254365c9c247beb0eabbaa15d0e279d64 -# Backported in version v6.1.9 cdcdc0531a51659527fea4b4d064af343452062d -CVE_CHECK_WHITELIST += "CVE-2023-1073" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1074 -# Patched in kernel since v6.2 458e279f861d3f61796894cd158b780765a1569f -# Backported in version v5.4.231 a7585028ac0a5836f39139c11594d79ede97d975 -# Backported in version v5.10.166 6ef652f35dcfaa1ab2b2cf6c1694718595148eee -# Backported in version v5.15.91 3391bd42351be0beb14f438c7556912b9f96cb32 -# Backported in version v6.1.9 9f08bb650078dca24a13fea1c375358ed6292df3 -CVE_CHECK_WHITELIST += "CVE-2023-1074" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1077 -# Patched in kernel since v6.3 7c4a5b89a0b5a57a64b601775b296abf77a9fe97 -# Backported in version v5.4.235 084cd75643b61fb924f70cba98a71dea14942938 -# Backported in version v5.10.173 80a1751730b302d8ab63a084b2fa52c820ad0273 -# Backported in version v5.15.99 2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7 -# Backported in version v6.1.16 6b4fcc4e8a3016e85766c161daf0732fca16c3a3 -# Backported in version v6.2.3 1099004ae1664703ec573fc4c61ffb24144bcb63 -CVE_CHECK_WHITELIST += "CVE-2023-1077" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1078 -# Patched in kernel since v6.2 f753a68980cf4b59a80fe677619da2b1804f526d -# Backported in version v5.4.232 ba38eacade35dd2316d77b37494e6e0c01bab595 -# Backported in version v5.10.168 c53f34ec3fbf3e9f67574118a6bb35ae1146f7ca -# Backported in version v5.15.94 528e3f3a4b53df36dafd10cdf6b8c0fe2aa1c4ba -# Backported in version v6.1.12 1d52bbfd469af69fbcae88c67f160ce1b968e7f3 -CVE_CHECK_WHITELIST += "CVE-2023-1078" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1079 -# Patched in kernel since v6.3 4ab3a086d10eeec1424f2e8a968827a6336203df -# Backported in version v5.4.235 dd08e68d04d08d2f42b09162c939a0b0841216cc -# Backported in version v5.10.173 21a2eec4a440060a6eb294dc890eaf553101ba09 -# Backported in version v5.15.99 3959316f8ceb17866646abc6be4a332655407138 -# Backported in version v6.1.16 ee907829b36949c452c6f89485cb2a58e97c048e -# Backported in version v6.2.3 b08bcfb4c97d7bd41b362cff44b2c537ce9e8540 -CVE_CHECK_WHITELIST += "CVE-2023-1079" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1095 -# Patched in kernel since v6.0 580077855a40741cf511766129702d97ff02f4d9 -# Backported in version v5.4.211 a452bc3deb23bf93f8a13d3e24611b7ef39645dc -# Backported in version v5.10.137 80977126bc20309f7f7bae6d8621356b393e8b41 -# Backported in version v5.15.61 8a2df34b5bf652566f2889d9fa321f3b398547ef -# Backported in version v5.19.2 109539c9ba8497aad2948af4f09077f6a65059fe -CVE_CHECK_WHITELIST += "CVE-2023-1095" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1118 -# Patched in kernel since v6.3 29b0589a865b6f66d141d79b2dd1373e4e50fe17 -# Backported in version v5.4.235 d120334278b370b6a1623a75ebe53b0c76cb247c -# Backported in version v5.10.173 78da5a378bdacd5bf68c3a6389bdc1dd0c0f5b3c -# Backported in version v5.15.99 29962c478e8b2e6a6154d8d84b8806dbe36f9c28 -# Backported in version v6.1.16 029c1410e345ce579db5c007276340d072aac54a -# Backported in version v6.2.3 182ea492aae5b64067277e60a4ea5995c4628555 -CVE_CHECK_WHITELIST += "CVE-2023-1118" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1382 -# Patched in kernel since v6.1 a7b42969d63f47320853a802efd879fbdc4e010e -# Backported in version v5.4.226 59f9aad22fd743572bdafa37d3e1dd5dc5658e26 -# Backported in version v5.10.157 4058e3b74ab3eabe0835cee9a0c6deda79e8a295 -# Backported in version v5.15.81 33fb115a76ae6683e34f76f7e07f6f0734b2525f -CVE_CHECK_WHITELIST += "CVE-2023-1382" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1390 -# Patched in kernel since v5.11 b77413446408fdd256599daf00d5be72b5f3e7c6 -# Backported in version v5.4.92 56e8947bcf814d195eb4954b4821868803d3dd67 -# Backported in version v5.10.10 60b8b4e6310b7dfc551ba68e8639eeaf70a0b2dd -CVE_CHECK_WHITELIST += "CVE-2023-1390" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1513 -# Patched in kernel since v6.2 2c10b61421a28e95a46ab489fd56c0f442ff6952 -# Backported in version v5.4.232 9f95a161a7deef62d6d2f57b1a69f94e0546d8d8 -# Backported in version v5.10.169 6416c2108ba54d569e4c98d3b62ac78cb12e7107 -# Backported in version v5.15.95 35351e3060d67eed8af1575d74b71347a87425d8 -# Backported in version v6.1.13 747ca7c8a0c7bce004709143d1cd6596b79b1deb -CVE_CHECK_WHITELIST += "CVE-2023-1513" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1829 -# Patched in kernel since v6.3 8c710f75256bb3cf05ac7b1672c82b92c43f3d28 -# Backported in version v5.4.235 7a6fb69bbcb21e9ce13bdf18c008c268874f0480 -# Backported in version v5.10.173 18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6 -# Backported in version v5.15.100 7c183dc0af472dec33d2c0786a5e356baa8cad19 -# Backported in version v6.1.18 3abebc503a5148072052c229c6b04b329a420ecd -# Backported in version v6.2.5 372ae77cf11d11fb118cbe2d37def9dd5f826abd -CVE_CHECK_WHITELIST += "CVE-2023-1829" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1838 -# Patched in kernel since v5.18 fb4554c2232e44d595920f4d5c66cf8f7d13f9bc -# Backported in version v5.4.196 3a12b2c413b20c17832ec51cb836a0b713b916ac -# Backported in version v5.10.118 ec0d801d1a44d9259377142c6218885ecd685e41 -# Backported in version v5.15.42 42d8a6dc45fc6619b8def1a70b7bd0800bcc4574 -CVE_CHECK_WHITELIST += "CVE-2023-1838" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1998 -# Patched in kernel since v6.3 6921ed9049bc7457f66c1596c5b78aec0dae4a9d -# Backported in version v5.4.235 34c1b60e7a80404056c03936dd9c2438da2789d4 -# Backported in version v5.10.173 abfed855f05863d292de2d0ebab4656791bab9c8 -# Backported in version v5.15.99 e7f1ddebd9f5b12de40bc37db9243957678f1448 -# Backported in version v6.1.16 08d87c87d6461d16827c9b88d84c48c26b6c994a -# Backported in version v6.2.3 ead3c8e54d28fa1d5454b1f8a21b96b4a969b1cb -CVE_CHECK_WHITELIST += "CVE-2023-1998" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-2008 -# Patched in kernel since v5.19 05b252cccb2e5c3f56119d25de684b4f810ba40a -# Backported in version v5.4.202 c7bdaad9cbfe17c83e4f56c7bb7a2d87d944f0fb -# Backported in version v5.10.127 20119c1e0fff89542ff3272ace87e04cf6ee6bea -# Backported in version v5.15.51 5b45535865d62633e3816ee30eb8d3213038dc17 -CVE_CHECK_WHITELIST += "CVE-2023-2008" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-2162 -# Patched in kernel since v6.2 f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3 -# Backported in version v5.4.232 d4d765f4761f9e3a2d62992f825aeee593bcb6b9 -# Backported in version v5.10.168 9758ffe1c07b86aefd7ca8e40d9a461293427ca0 -# Backported in version v5.15.93 0aaabdb900c7415caa2006ef580322f7eac5f6b6 -# Backported in version v6.1.11 61e43ebfd243bcbad11be26bd921723027b77441 -CVE_CHECK_WHITELIST += "CVE-2023-2162" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-2166 -# Patched in kernel since v6.1 0acc442309a0a1b01bcdaa135e56e6398a49439c -# Backported in version v5.4.227 3982652957e8d79ac32efcb725450580650a8644 -# Backported in version v5.10.159 c42221efb1159d6a3c89e96685ee38acdce86b6f -# Backported in version v5.15.83 c142cba37de29f740a3852f01f59876af8ae462a -CVE_CHECK_WHITELIST += "CVE-2023-2166" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-2177 -# Patched in kernel since v5.19 181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d -# Backported in version v5.4.209 8d6dab81ee3d0309c09987ff76164a25486c43e0 -# Backported in version v5.10.135 6f3505588d66b27220f07d0cab18da380fae2e2d -# Backported in version v5.15.59 e796e1fe20ecaf6da419ef6a5841ba181bba7a0c -CVE_CHECK_WHITELIST += "CVE-2023-2177" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-23006 -# Patched in kernel since v5.16 6b8b42585886c59a008015083282aae434349094 -# Backported in version v5.4.170 db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6 -# Backported in version v5.10.90 4cd1da02f0c39606e3378c9255f17d6f85d106c7 -# Backported in version v5.15.13 4595dffccfa5b9360162c72cc0f6a33477d871cf -CVE_CHECK_WHITELIST += "CVE-2023-23006" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-23454 -# Patched in kernel since v6.2 caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12 -# Backported in version v5.4.229 6b17b84634f932f4787f04578f5d030874b9ff32 -# Backported in version v5.10.163 b2c917e510e5ddbc7896329c87d20036c8b82952 -# Backported in version v5.15.87 04dc4003e5df33fb38d3dd85568b763910c479d4 -# Backported in version v6.1.5 dc46e39b727fddc5aacc0272ef83ee872d51be16 -CVE_CHECK_WHITELIST += "CVE-2023-23454" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-23455 -# Patched in kernel since v6.2 a2965c7be0522eaa18808684b7b82b248515511b -# Backported in version v5.4.229 63e469cb54a87df53edcfd85bb5bcdd84327ae4a -# Backported in version v5.10.163 5f65f48516bfeebaab1ccc52c8fad698ddf21282 -# Backported in version v5.15.87 f02327a4877a06cbc8277e22d4834cb189565187 -# Backported in version v6.1.5 85655c63877aeafdc23226510ea268a9fa0af807 -CVE_CHECK_WHITELIST += "CVE-2023-23455" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-23559 -# Patched in kernel since v6.2 b870e73a56c4cccbec33224233eaf295839f228c -# Backported in version v5.4.231 9042a9a3f29c942387e6d6036551d90c9ae6ce4f -# Backported in version v5.10.166 802fd7623e9ed19ee809b503e93fccc1e3f37bd6 -# Backported in version v5.15.91 8cbf932c5c40b0c20597fa623c308d5bde0848b5 -# Backported in version v6.1.9 7794efa358bca8b8a2a80070c6e088a74945f018 -CVE_CHECK_WHITELIST += "CVE-2023-23559" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-25012 -# Patched in kernel since v6.3 76ca8da989c7d97a7f76c75d475fe95a584439d7 -# Backported in version v5.4.235 25e14bf0c894f9003247e3475372f33d9be1e424 -# Backported in version v5.10.173 fddde36316da8acb45a3cca2e5fda102f5215877 -# Backported in version v5.15.99 0fd9998052926ed24cfb30ab1a294cfeda4d0a8f -# Backported in version v6.1.16 f2bf592ebd5077661e00aa11e12e054c4c8f6dd0 -# Backported in version v6.2.3 90289e71514e9533a9c44d694e2b492be9ed2b77 -CVE_CHECK_WHITELIST += "CVE-2023-25012" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-26545 -# Patched in kernel since v6.2 fda6c89fe3d9aca073495a664e1d5aea28cd4377 -# Backported in version v5.4.232 df099e65564aa47478eb1cacf81ba69024fb5c69 -# Backported in version v5.10.169 7ff0fdba82298d1f456c685e24930da89703c0fb -# Backported in version v5.15.95 59a74da8da75bdfb464cbdb399e87ba4f7500e96 -# Backported in version v6.1.13 c376227845eef8f2e62e2c29c3cf2140d35dd8e8 -CVE_CHECK_WHITELIST += "CVE-2023-26545" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-28327 -# Patched in kernel since v6.1 b3abe42e94900bdd045c472f9c9be620ba5ce553 -# Backported in version v5.4.227 c66d78aee55dab72c92020ebfbebc464d4f5dd2a -# Backported in version v5.10.159 575a6266f63dbb3b8eb1da03671451f0d81b8034 -# Backported in version v5.15.83 5c014eb0ed6c8c57f483e94cc6e90f34ce426d91 -CVE_CHECK_WHITELIST += "CVE-2023-28327" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-28328 -# Patched in kernel since v6.2 0ed554fd769a19ea8464bb83e9ac201002ef74ad -# Backported in version v5.4.229 8b256d23361c51aa4b7fdb71176c1ca50966fb39 -# Backported in version v5.10.163 559891d430e3f3a178040c4371ed419edbfa7d65 -# Backported in version v5.15.86 210fcf64be4db82c0e190e74b5111e4eef661a7a -# Backported in version v6.1.2 6b60cf73a931af34b7a0a3f467a79d9fe0df2d70 -CVE_CHECK_WHITELIST += "CVE-2023-28328" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-28772 -# Patched in kernel since v5.14 d3b16034a24a112bb83aeb669ac5b9b01f744bb7 -# Backported in version v5.4.133 33ab9138a13e379cf1c4ccd76b97ae2ee8c5421b -# Backported in version v5.10.51 f9fb4986f4d81182f938d16beb4f983fe71212aa -CVE_CHECK_WHITELIST += "CVE-2023-28772"