From patchwork Sat Aug 26 15:38:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29527 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 158B7C83F11 for ; Sat, 26 Aug 2023 15:39:07 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web10.10475.1693064340023083477 for ; Sat, 26 Aug 2023 08:39:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=jZqrYtrY; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-68bed286169so1687757b3a.1 for ; Sat, 26 Aug 2023 08:38:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064339; x=1693669139; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zQImwiCCp0J1ZOL2acYOrJxo2KGqUMsozBMkqR3s8f0=; b=jZqrYtrYJm9sHRiuJWqIbqDwe+4IqDupyw00hgz5qePlMpmEU/PR3xLOGhOMmbYd+6 T4LoNql0FdahP2DaW2uqkeOlkrAKzOIYTBPHwQxGcGzTDCNe32eagVMw4MOGAFvhljHs wQNGmVbHq2zAJGw/RAVinKjDSEcc4qT9fiPLv0gzpEV9czf8HVxYR27luGEsLV2cDNhO uA5ZB363cQ9VDAcU49NuwgPY2C4Z2YQUA+O4rqXrkvIcz0xoCJMrkDQQU7CW1By5hiDV /i3DSa6qrSDcO+8OAEkDZCx+kUoyB3UYwmCzJw418qv1xfqhF3BqKXL5Yg3r58UIc8Jg UMyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064339; x=1693669139; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zQImwiCCp0J1ZOL2acYOrJxo2KGqUMsozBMkqR3s8f0=; b=KPCkckAVpMHQkdTTlQ3T3mNKRiIps+lz+a9hGu79m/yF5GT3Hyt9dFzM2xxZ8rjWfx HpaLAlvRdJSoGuzdQ8PjRDHdEQQ9Hag/9FHAMrb5vWvmrj7rzJGGZLUazCgVOwcvkPTv yv3yvQTNBuA4LHyHtC06GQ1x1u0Sr1kHxDUsO69wpU5LllKlPNns4TXLBIFWfjtfnhYV OmhD+4dUd0oYkU1WUt6RratjmNcqv5c0TnJj/r9XHrG1uMbXU2Irb/aclaMnGscD9qqC rOBKUZlA1/vZERiopT/ClTTxP4eLOgWxxwhxwcrn76jPzq/Oe1vQHcyVBOc6R2OQn4YB CeoQ== X-Gm-Message-State: AOJu0YyYH8D7hQuq49zzHY0js9nFkSr5dWC7spb3nOiVApOBULor6Ph6 1hLwD89Ttaj12P8V0IXzn6aSJxUSPbHQ0fAYMAQ= X-Google-Smtp-Source: AGHT+IHTlOLlZEVzubLUJ4g7HP9y7c8rOlVFAaENUCSKyW+eWBNVjXwpYThC0i2jilrAhJcJr6ut5w== X-Received: by 2002:a05:6a20:1441:b0:148:656b:9a1f with SMTP id a1-20020a056a20144100b00148656b9a1fmr26295375pzi.20.1693064338687; Sat, 26 Aug 2023 08:38:58 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.38.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:38:58 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 01/20] curl: fix CVE-2023-32001 Date: Sat, 26 Aug 2023 05:38:32 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186745 From: Chee Yang Lee Signed-off-by: Chee Yang Lee Signed-off-by: Steve Sakoman --- .../curl/curl/CVE-2023-32001.patch | 39 +++++++++++++++++++ meta/recipes-support/curl/curl_8.0.1.bb | 1 + 2 files changed, 40 insertions(+) create mode 100644 meta/recipes-support/curl/curl/CVE-2023-32001.patch diff --git a/meta/recipes-support/curl/curl/CVE-2023-32001.patch b/meta/recipes-support/curl/curl/CVE-2023-32001.patch new file mode 100644 index 0000000000..c9ca3ae514 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2023-32001.patch @@ -0,0 +1,39 @@ +CVE: CVE-2023-32001 +Upstream-Status: Backport [https://github.com/curl/curl/commit/0c667188e0c6cda615a036b8a2b4125f2c404dde] +Signed-off-by: Lee Chee Yang + + +From 0c667188e0c6cda615a036b8a2b4125f2c404dde Mon Sep 17 00:00:00 2001 +From: SaltyMilk +Date: Mon, 10 Jul 2023 21:43:28 +0200 +Subject: [PATCH] fopen: optimize + +Closes #11419 +--- + lib/fopen.c | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) + +diff --git a/lib/fopen.c b/lib/fopen.c +index c9c9e3d6e73a2..b6e3cadddef65 100644 +--- a/lib/fopen.c ++++ b/lib/fopen.c +@@ -56,13 +56,13 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename, + int fd = -1; + *tempname = NULL; + +- if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) { +- /* a non-regular file, fallback to direct fopen() */ +- *fh = fopen(filename, FOPEN_WRITETEXT); +- if(*fh) +- return CURLE_OK; ++ *fh = fopen(filename, FOPEN_WRITETEXT); ++ if(!*fh) + goto fail; +- } ++ if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode)) ++ return CURLE_OK; ++ fclose(*fh); ++ *fh = NULL; + + result = Curl_rand_hex(data, randsuffix, sizeof(randsuffix)); + if(result) diff --git a/meta/recipes-support/curl/curl_8.0.1.bb b/meta/recipes-support/curl/curl_8.0.1.bb index ecef173df2..bcfe4a6088 100644 --- a/meta/recipes-support/curl/curl_8.0.1.bb +++ b/meta/recipes-support/curl/curl_8.0.1.bb @@ -17,6 +17,7 @@ SRC_URI = " \ file://CVE-2023-28319.patch \ file://CVE-2023-28320.patch \ file://CVE-2023-28321.patch \ + file://CVE-2023-32001.patch \ " SRC_URI[sha256sum] = "0a381cd82f4d00a9a334438b8ca239afea5bfefcfa9a1025f2bf118e79e0b5f0" From patchwork Sat Aug 26 15:38:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29528 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1975AC83F19 for ; Sat, 26 Aug 2023 15:39:07 +0000 (UTC) Received: from mail-oi1-f173.google.com (mail-oi1-f173.google.com [209.85.167.173]) by mx.groups.io with SMTP id smtpd.web10.10477.1693064341481563751 for ; Sat, 26 Aug 2023 08:39:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=d05h3VMj; spf=softfail (domain: sakoman.com, ip: 209.85.167.173, mailfrom: steve@sakoman.com) Received: by mail-oi1-f173.google.com with SMTP id 5614622812f47-3a76d882080so1420326b6e.2 for ; Sat, 26 Aug 2023 08:39:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064340; x=1693669140; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=o+KRUQ2DRHBf9CRZ5HTG2gdjMTxsljAU7Tjzv7ZoPVQ=; b=d05h3VMjEwPxmS1QoL0vG0eGJxe5kBpLN8Mez5j5enUT8Q9BQ2FN62++4B09c6XY/H mWbCJ0DqUTov75jXCgwspOvEYfjb5lie4z9lha3/yzRM+s4oEQGy+gkWuKkSdRHL5gKr +tMbLVaa7KYCQ6X7OK8ewFKMIXQdEplpSBJkbixzjna8esBC++nY0vSgC4Rsx5tPwqSN 3U1EADkJjYMa8gFtprqgbQBMS4DNV3F2WuP0QU4KeSsr8ytXcqCUQ1xRij1HLXVSpSjY H6InRJxIt7j4FnMFAqBN3Qf2WKqfYf68IbuOiTew9neR9dkMnsm9J2eOTCs3cYyLH2Xa vw3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064340; x=1693669140; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=o+KRUQ2DRHBf9CRZ5HTG2gdjMTxsljAU7Tjzv7ZoPVQ=; b=UF3pqp8IcpPS6933H2TT55JyRYszmPC2EoQnpcYcwhhn10MyoDEg79R7+qeQ4/J/tf glvc5nbEsGRlOkj2slLzrengitlo+H0Rso5rWnb2NV/cimvlyKzTogw1D6FG5xxERDTY +MnP9vNLOFN/L5yOiPeL4XM/1vTNZJq7ZFvNffjMv6DoX8ucmmH8PU/BdLSiBmQhFi+t 5bE4NXc5ymq/8ZlP6sa395UDE9d5nVlDImi+qapitdnnRieDohCaEPdlqozbujMG1Hzt g3YEo5jiUGkuLl6mAcNf7aEpdIZLW+hyCZF621iB6pPWGVOqJgMWR1aQqpug35DhmUf5 pT9Q== X-Gm-Message-State: AOJu0YwcLOVm0OMRVwitGqwEHjR0YnIVxQmFRydB/B2b64UlRgtwVaSj 2I1MVwAuhuktT4YV1+Bc7CC+/lyeaB9T2JMZ+64= X-Google-Smtp-Source: AGHT+IFEZI05jpEJtSt1sA5kdfkppVgVu0HjOY4ZMkcXuF5hNvAaUeoSGKeh/zA6MKKkDO2EKD59vQ== X-Received: by 2002:a05:6871:690:b0:1bd:f87e:6ad3 with SMTP id l16-20020a056871069000b001bdf87e6ad3mr6881011oao.30.1693064340432; Sat, 26 Aug 2023 08:39:00 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.38.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:38:59 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 02/20] ghostscript: fix CVE-2023-38559 Date: Sat, 26 Aug 2023 05:38:33 -1000 Message-Id: <9552f934ae5305b9154f1560d4823b168457b784.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186746 From: Chee Yang Lee Signed-off-by: Chee Yang Lee Signed-off-by: Steve Sakoman --- .../ghostscript/CVE-2023-38559.patch | 31 +++++++++++++++++++ .../ghostscript/ghostscript_10.0.0.bb | 1 + 2 files changed, 32 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2023-38559.patch diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2023-38559.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2023-38559.patch new file mode 100644 index 0000000000..4ef71cba7b --- /dev/null +++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2023-38559.patch @@ -0,0 +1,31 @@ +CVE: CVE-2023-38559 +Upstream-Status: Backport [ https://git.ghostscript.com/?p=ghostpdl.git;a=patch;h=d81b82c70bc1 ] +Signed-off-by: Lee Chee Yang + +From d81b82c70bc1fb9991bb95f1201abb5dea55f57f Mon Sep 17 00:00:00 2001 +From: Chris Liddell +Date: Mon, 17 Jul 2023 14:06:37 +0100 +Subject: [PATCH] Bug 706897: Copy pcx buffer overrun fix from + devices/gdevpcx.c + +Bounds check the buffer, before dereferencing the pointer. +--- + base/gdevdevn.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/base/gdevdevn.c b/base/gdevdevn.c +index 7b14d9c71..6351fb77a 100644 +--- a/base/gdevdevn.c ++++ b/base/gdevdevn.c +@@ -1983,7 +1983,7 @@ devn_pcx_write_rle(const byte * from, const byte * end, int step, gp_file * file + byte data = *from; + + from += step; +- if (data != *from || from == end) { ++ if (from >= end || data != *from) { + if (data >= 0xc0) + gp_fputc(0xc1, file); + } else { +-- +2.34.1 + diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.0.0.bb b/meta/recipes-extended/ghostscript/ghostscript_10.0.0.bb index 9a900ee04f..9e2cd01ff4 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_10.0.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_10.0.0.bb @@ -36,6 +36,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d file://cross-compile.patch \ file://cve-2023-28879.patch \ file://cve-2023-36664.patch \ + file://CVE-2023-38559.patch \ " SRC_URI = "${SRC_URI_BASE} \ From patchwork Sat Aug 26 15:38:34 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29525 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 04B41C83F13 for ; Sat, 26 Aug 2023 15:39:06 +0000 (UTC) Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) by mx.groups.io with SMTP id smtpd.web11.10480.1693064343117080181 for ; Sat, 26 Aug 2023 08:39:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=UHP+8aNd; spf=softfail (domain: sakoman.com, ip: 209.85.210.179, mailfrom: steve@sakoman.com) Received: by mail-pf1-f179.google.com with SMTP id d2e1a72fcca58-68a6f6a66e1so1433115b3a.2 for ; Sat, 26 Aug 2023 08:39:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064342; x=1693669142; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9N8Ze6oVCQz7jvum7Jw54c8eoS2TgM4sbd83yMLllyQ=; b=UHP+8aNdOlWd0RB2oN1fk9lcpKA6I/wLTgxi+dpaYHoAp6y2Q0Di/umaOTIZLjuVES zkiniHSPi/4oq/sXTF7QvR1D5D5sSu0pxZe0MPCi2BxmblMvmwBm0Lq0v9Kq77xdiFhB FlKh68zwjbgKk/lDi28A+yJ1RO495rNzEWOYbUEHyJJVUUsoRp4udtWBBCahGHIBDSb5 bmXb0xhHfaDUJxWcT25FLLMC3bRY7fYZ+Yj49IEhQZa09bBe0haGchi1mzUgvmHg5o34 jbRF/xRTifZFz0pCbgfXlAyW9YsztGrHDyNLj9ogSAWxF4MNS6yJULO1nFAE+Kj9eEZN 8VYA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064342; x=1693669142; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=9N8Ze6oVCQz7jvum7Jw54c8eoS2TgM4sbd83yMLllyQ=; b=lEeLWNb5Um6XJxFbqRlem5cxlGpsJ9rY40oQFkRnif1L6A1ZMAz1YOPJwIsyRMWIQy 1mwmhtftJ/ZDEq4ZGWALGxxKR3dHJ6KF/ug2Nk3755TKvsoZ1eOfHyz2ig8N8hAJJ1hS 1+xCKUyMIDfSBUU1+oiNgeuv0EyTLMZKOyK7A5O0d911D3N/K6QGKQY4ZsHfPYslGzFj uxGVN0TXZtlKiLyNDHPRWdDhPzYH7pnmoGeeaUc3KI0CYqCduNAI/VQ1ajmOEo59I2YN gIlI1LB660I6Lp65frzS6UPGAMeunI2Jc+jdqgrkqB7Y+ntmmKoClowDxTuJCuvDFma8 qYBA== X-Gm-Message-State: AOJu0YwsP+iE8pF5MYWXqerW5Bo9xg1RFpJ8IjoyYEaWDFjOdTHa2pnq Gf0Q0NetxZumQZauK3h0XIxmrufwiKh85XvzLWQ= X-Google-Smtp-Source: AGHT+IHiv7HjKnSJ9S7QGMdKH0d7I7WZxa3KTFNUkCcRtxRnrTivpKuHNEwSWG6GbjCYX069ow9fPw== X-Received: by 2002:a05:6a00:1912:b0:68b:c1a2:abca with SMTP id y18-20020a056a00191200b0068bc1a2abcamr11958403pfi.14.1693064342182; Sat, 26 Aug 2023 08:39:02 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:01 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 03/20] ffmpeg: add CVE_CHECK_IGNORE for CVE-2023-39018 Date: Sat, 26 Aug 2023 05:38:34 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186747 From: Narpat Mali CVE-2023-39018 belongs to ffmpeg-cli-wrapper (Java wrapper around the FFmpeg CLI) and not ffmpeg itself. As per CVE description, it is mentioned as FFmpeg 0.7.0 which is the version for ffmpeg-cli-wrapper and ffmpeg don't have 0.7.0 version at all. Debian & Bugzilla trackers have already marked as NOT-FOR-US/RESOLVED-INVALID. As it won't be affecting the ffmpeg package so, we can ignore the CVE-2023-39018 in ffmpeg recipe. References: https://github.com/bramp/ffmpeg-cli-wrapper https://github.com/FFmpeg/FFmpeg https://security-tracker.debian.org/tracker/CVE-2023-39018 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-39018 Upstream master patch: https://git.openembedded.org/openembedded-core/commit/?id=c21ed498b423c13463a4ae0bb475883cc7901847 Signed-off-by: Narpat Mali Signed-off-by: Steve Sakoman --- meta/recipes-multimedia/ffmpeg/ffmpeg_5.1.2.bb | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.1.2.bb b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.1.2.bb index cccd9f65ab..aa5a8681cf 100644 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.1.2.bb +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.1.2.bb @@ -30,6 +30,12 @@ SRC_URI = "https://www.ffmpeg.org/releases/${BP}.tar.xz \ SRC_URI[sha256sum] = "619e706d662c8420859832ddc259cd4d4096a48a2ce1eefd052db9e440eef3dc" +# CVE-2023-39018 issue belongs to ffmpeg-cli-wrapper (Java wrapper around the FFmpeg CLI) +# and not ffmepg itself. +# https://security-tracker.debian.org/tracker/CVE-2023-39018 +# https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-39018 +CVE_CHECK_IGNORE += "CVE-2023-39018" + # Build fails when thumb is enabled: https://bugzilla.yoctoproject.org/show_bug.cgi?id=7717 ARM_INSTRUCTION_SET:armv4 = "arm" ARM_INSTRUCTION_SET:armv5 = "arm" From patchwork Sat Aug 26 15:38:35 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29526 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 02C23C83F01 for ; Sat, 26 Aug 2023 15:39:06 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by mx.groups.io with SMTP id smtpd.web10.10481.1693064344813960918 for ; Sat, 26 Aug 2023 08:39:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=fzBPmafN; spf=softfail (domain: sakoman.com, ip: 209.85.210.182, mailfrom: steve@sakoman.com) Received: by mail-pf1-f182.google.com with SMTP id d2e1a72fcca58-68a3e943762so1671118b3a.1 for ; Sat, 26 Aug 2023 08:39:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064344; x=1693669144; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=YIpWLj1NkB9je/dgR3CXyajtQg/wTrJ1vg3wyWQiIDY=; b=fzBPmafNxQ7Wy4DDq4+KfrqfNWbyWH6b3VH2oOEYyADTFNX0FDLaHdrF+CAnWGZulK pIqkJ9od/eiXcYWKp8atg0izAZpXLNFuMFFfv7ZUpKR0m0Bf/QkizruLsigaDR8OTovq 5CW5XrWBrZbtv7w6NOVP1ATyr+irDFfp1MOeloFofuvqrCh/2NCpWGJHupI5Vj6oohrC j7tx/4QRrXdpmSSnl7LGMCJsPMC7X0OTWoCZJdlMataFdkC6zg41J+uAw3Gk1wAjP00N 62YclV2opZYwMmUtMKHvATb1/iI8Z1O9VSauISY1WjDufXUo0yu63+m4iwETLXrpbp4F 8NXA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064344; x=1693669144; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YIpWLj1NkB9je/dgR3CXyajtQg/wTrJ1vg3wyWQiIDY=; b=Ok9GWb6Afkn8RswyLPFHcnxbFDpQRDz5Tu1aZ89y/GuQQ5qNSY+aK7rwIbbW6T5q4T Qaj7lJs/DZkCJ3lWgDQJKDAV5X40xYulMqKyjEYA6l1cLOy94F5Hy7xr0T/D9JAqK6Oz 4zT90ilVhqFMy7J+jYOrsrpv0RnjekTAu5xAfO1VsIkS3wiCWIpMaIj5lccZzYx+SvJG hY78InFYcg40/8NWVwMcj8Dr/2DTKrP0pHIbuhRHSRhZGXpJ4t0jpweHpNnlRAo4j8W5 AM69Gc2xyraCCGZwH2ba5KrhYFaahfEHdnORBpZzt/unTbSgc8AxKnDgpKag+m0SRWmo ydKQ== X-Gm-Message-State: AOJu0YwJX8rRR2ukj1jZUDdN1wsusDIMFOG0Hu7n1pfFVWRuJI9+z6Mb FGz1peaUdDI6FZ98zbU5UEEje1N3oo+ucHT4gdU= X-Google-Smtp-Source: AGHT+IHlmnFlBjcpYKSgQl9eKRGi2wbYY2P4OH8jBYTQV1twyu7euK3BTF93GImWHHDfOW4fcV+K7Q== X-Received: by 2002:a05:6a00:1955:b0:68a:3fbb:3985 with SMTP id s21-20020a056a00195500b0068a3fbb3985mr20655382pfk.20.1693064343834; Sat, 26 Aug 2023 08:39:03 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:03 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 04/20] linux-yocto: add script to generate kernel CVE_CHECK_IGNORE entries Date: Sat, 26 Aug 2023 05:38:35 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186748 From: Ross Burton Instead of manually looking up new CVEs and determining what point releases the fixes are incorporated into, add a script to generate the CVE_CHECK_IGNORE data automatically. First, note that this is very much an interim solution until the cve-check class fetches data from www.linuxkernelcves.com directly. The script should be passed the path to a local clone of the linuxkernelcves repository[1] and the kernel version number. It will then write to standard output the CVE_STATUS entries for every known kernel CVE. The script should be periodically reran as CVEs are backported and kernels upgraded frequently. [1] https://github.com/nluedtke/linux_kernel_cves Note: for the backport this is not a cherry-pick of the commit in master as the variable names are different. This incorporates the following commits: linux/generate-cve-exclusions: add version check warning linux/generate-cve-exclusions.py: fix comparison linux-yocto: add script to generate kernel CVE_STATUS entries Signed-off-by: Ross Burton Signed-off-by: Steve Sakoman --- .../linux/generate-cve-exclusions.py | 101 ++++++++++++++++++ 1 file changed, 101 insertions(+) create mode 100755 meta/recipes-kernel/linux/generate-cve-exclusions.py diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py new file mode 100755 index 0000000000..b9b87f245d --- /dev/null +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py @@ -0,0 +1,101 @@ +#! /usr/bin/env python3 + +# Generate granular CVE status metadata for a specific version of the kernel +# using data from linuxkernelcves.com. +# +# SPDX-License-Identifier: GPL-2.0-only + +import argparse +import datetime +import json +import pathlib +import re + +from packaging.version import Version + + +def parse_version(s): + """ + Parse the version string and either return a packaging.version.Version, or + None if the string was unset or "unk". + """ + if s and s != "unk": + # packaging.version.Version doesn't approve of versions like v5.12-rc1-dontuse + s = s.replace("-dontuse", "") + return Version(s) + return None + + +def main(argp=None): + parser = argparse.ArgumentParser() + parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves") + parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") + + args = parser.parse_args(argp) + datadir = args.datadir + version = args.version + base_version = f"{version.major}.{version.minor}" + + with open(datadir / "data" / "kernel_cves.json", "r") as f: + cve_data = json.load(f) + + with open(datadir / "data" / "stream_fixes.json", "r") as f: + stream_data = json.load(f) + + print(f""" +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at {datetime.datetime.now()} for version {version} + +python check_kernel_cve_status_version() {{ + this_version = "{version}" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +}} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" +""") + + for cve, data in cve_data.items(): + if "affected_versions" not in data: + print(f"# Skipping {cve}, no affected_versions") + print() + continue + + affected = data["affected_versions"] + first_affected, last_affected = re.search(r"(.+) to (.+)", affected).groups() + first_affected = parse_version(first_affected) + last_affected = parse_version(last_affected) + + handled = False + if not last_affected: + print(f"# {cve} has no known resolution") + elif first_affected and version < first_affected: + print(f"# fixed-version: only affects {first_affected} onwards") + handled = True + elif last_affected < version: + print(f"# fixed-version: Fixed after version {last_affected}") + handled = True + else: + if cve in stream_data: + backport_data = stream_data[cve] + if base_version in backport_data: + backport_ver = Version(backport_data[base_version]["fixed_version"]) + if backport_ver <= version: + print(f"# cpe-stable-backport: Backported in {backport_ver}") + handled = True + else: + # TODO print a note that the kernel needs bumping + print(f"# {cve} needs backporting (fixed from {backport_ver})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + + if handled: + print(f'CVE_CHECK_IGNORE += "{cve}"') + + print() + + +if __name__ == "__main__": + main() From patchwork Sat Aug 26 15:38:36 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29541 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E8A10C83F15 for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.10484.1693064348640736002 for ; Sat, 26 Aug 2023 08:39:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=ZELYYueR; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-68bed2c786eso1362459b3a.0 for ; Sat, 26 Aug 2023 08:39:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064348; x=1693669148; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=iuCe5o2JLk8ayPP48UfFOIu+xZqM3+zws63/XQ6tR+k=; b=ZELYYueR8jK716Qyjx/lnPzzlG728TyhEnVSqmRDCgIbZvK8VnvF+dpaZZExHoajvn 48K7RmxKwSjCmAta0AFFSdeznuaOBwqWOV9eQT0KY0MBpsnX+pUFzNAOTGwt2Se5LhV0 cWemLMfOFxkd9PY9omj4XwdlhVfa3KjtonXeYPF4UaB5w3LbBIiMhan7Ctu9TeGkCYPe M5OVSIhk3XKgcxGc21Hn9rp71YKnDafTnSKPiRH7GPF28gNwCvdR8dorX4Pd7lGJ5GT2 ME373aJ0xRpTfN0dk6pVaKjqgjZrlLeoPNUt5peVbAS7y5rSzUyjRHIAzh+L8klYdMYS t04w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064348; x=1693669148; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=iuCe5o2JLk8ayPP48UfFOIu+xZqM3+zws63/XQ6tR+k=; b=J0FpklmIphAna2HLjCN2a6ZKntI4r/3AlgMWd/c9RWkjZSA4mCFY3Ay+JUdvYB/T7U Iy/iKdKHncTgiWsgEINzlJrkcovR+mipd4PUXHTN1MdwDqh4G6kikxgUF1v+6ZLKpjHH 90Ik/f4TThccUljT0tnbypPRDIqls/g1aVqXFvIEH2Zz/BWzfa2ozQGRPiM7/RiaGXGy 2Io+z8rDKsYGQgOTX2QlAnoOkTj58Sfx7qYDfciGVbdWZI4UttvT4gwXmWbvwp041oe0 IMdMcJd+12ANM0LQlUsHwGJdq1WDri0T5MQ306NfnxPHxgtIf3RYeuuz4DbVcCLFBC1c hO5A== X-Gm-Message-State: AOJu0YwAcfNDD5NB87zeIAAWnWkFINAKCdPE4Gale9wK2xYAROrYMLe0 HPKbp41YviyRNtUnmkK7PARzdx7hNHKYiLearjk= X-Google-Smtp-Source: AGHT+IF53r6VGeHtksv5HJwt3Zjk0uL5Iqq3AGc8HK5iMgF7TFOPoODGgSv5+0lkz9NipLrGhQCs4A== X-Received: by 2002:a05:6a00:b45:b0:68b:daf2:b2d8 with SMTP id p5-20020a056a000b4500b0068bdaf2b2d8mr10640109pfo.9.1693064346045; Sat, 26 Aug 2023 08:39:06 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:05 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 05/20] linux/cve-exclusion: add generated CVE_CHECK_IGNOREs Date: Sat, 26 Aug 2023 05:38:36 -1000 Message-Id: <1328cd3a720735c848ab401b61f98fae4fd75dd3.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186749 From: Ross Burton Run generate-cve-exclusions.py to generate the ignore lists. The ignores already in this file are included in the generated lines, so nothing is lost. Signed-off-by: Ross Burton Signed-off-by: Steve Sakoman --- .../linux/cve-exclusion_6.1.inc | 7250 ++++++++++++++++- 1 file changed, 7220 insertions(+), 30 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 4cc151901b..4e809940db 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,36 +1,7226 @@ -# https://nvd.nist.gov/vuln/detail/CVE-2022-3523 -# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 -# Patched in kernel since v6.1 16ce101db85db694a91380aa4c89b25530871d33 + +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at 2023-08-25 16:54:59.886795 for version 6.1.38" + +python check_kernel_cve_status_version() { + this_version = "6.1.38" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_IGNORE += "CVE-2003-1604" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2004-0230" + +# CVE-2005-3660 has no known resolution + +# fixed-version: Fixed after version 2.6.26rc5 +CVE_CHECK_IGNORE += "CVE-2006-3635" + +# fixed-version: Fixed after version 2.6.19rc3 +CVE_CHECK_IGNORE += "CVE-2006-5331" + +# fixed-version: Fixed after version 2.6.19rc2 +CVE_CHECK_IGNORE += "CVE-2006-6128" + +# CVE-2007-3719 has no known resolution + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_IGNORE += "CVE-2007-4774" + +# fixed-version: Fixed after version 2.6.24rc6 +CVE_CHECK_IGNORE += "CVE-2007-6761" + +# fixed-version: Fixed after version 2.6.20rc5 +CVE_CHECK_IGNORE += "CVE-2007-6762" + +# CVE-2008-2544 has no known resolution + +# CVE-2008-4609 has no known resolution + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_IGNORE += "CVE-2008-7316" + +# fixed-version: Fixed after version 2.6.31rc6 +CVE_CHECK_IGNORE += "CVE-2009-2692" + +# fixed-version: Fixed after version 2.6.23rc9 +CVE_CHECK_IGNORE += "CVE-2010-0008" + +# fixed-version: Fixed after version 2.6.36rc5 +CVE_CHECK_IGNORE += "CVE-2010-3432" + +# CVE-2010-4563 has no known resolution + +# fixed-version: Fixed after version 2.6.37rc6 +CVE_CHECK_IGNORE += "CVE-2010-4648" + +# fixed-version: Fixed after version 2.6.38rc1 +CVE_CHECK_IGNORE += "CVE-2010-5313" + +# CVE-2010-5321 has no known resolution + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_IGNORE += "CVE-2010-5328" + +# fixed-version: Fixed after version 2.6.39rc1 +CVE_CHECK_IGNORE += "CVE-2010-5329" + +# fixed-version: Fixed after version 2.6.34rc7 +CVE_CHECK_IGNORE += "CVE-2010-5331" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_IGNORE += "CVE-2010-5332" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_IGNORE += "CVE-2011-4098" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_IGNORE += "CVE-2011-4131" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_IGNORE += "CVE-2011-4915" + +# CVE-2011-4916 has no known resolution + +# CVE-2011-4917 has no known resolution + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_IGNORE += "CVE-2011-5321" + +# fixed-version: Fixed after version 3.1rc1 +CVE_CHECK_IGNORE += "CVE-2011-5327" + +# fixed-version: Fixed after version 3.7rc2 +CVE_CHECK_IGNORE += "CVE-2012-0957" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2012-2119" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2012-2136" + +# fixed-version: Fixed after version 3.5rc2 +CVE_CHECK_IGNORE += "CVE-2012-2137" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_IGNORE += "CVE-2012-2313" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_IGNORE += "CVE-2012-2319" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2012-2372" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_IGNORE += "CVE-2012-2375" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2012-2390" + +# fixed-version: Fixed after version 3.5rc4 +CVE_CHECK_IGNORE += "CVE-2012-2669" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_IGNORE += "CVE-2012-2744" + +# fixed-version: Fixed after version 3.4rc3 +CVE_CHECK_IGNORE += "CVE-2012-2745" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_IGNORE += "CVE-2012-3364" + +# fixed-version: Fixed after version 3.4rc5 +CVE_CHECK_IGNORE += "CVE-2012-3375" + +# fixed-version: Fixed after version 3.5rc5 +CVE_CHECK_IGNORE += "CVE-2012-3400" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_IGNORE += "CVE-2012-3412" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2012-3430" + +# fixed-version: Fixed after version 2.6.19rc4 +CVE_CHECK_IGNORE += "CVE-2012-3510" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_IGNORE += "CVE-2012-3511" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-3520" + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_IGNORE += "CVE-2012-3552" + +# Skipping CVE-2012-4220, no affected_versions + +# Skipping CVE-2012-4221, no affected_versions + +# Skipping CVE-2012-4222, no affected_versions + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_IGNORE += "CVE-2012-4398" + +# fixed-version: Fixed after version 2.6.36rc4 +CVE_CHECK_IGNORE += "CVE-2012-4444" + +# fixed-version: Fixed after version 3.7rc6 +CVE_CHECK_IGNORE += "CVE-2012-4461" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_IGNORE += "CVE-2012-4467" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_IGNORE += "CVE-2012-4508" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_IGNORE += "CVE-2012-4530" + +# CVE-2012-4542 has no known resolution + +# fixed-version: Fixed after version 3.7rc4 +CVE_CHECK_IGNORE += "CVE-2012-4565" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_IGNORE += "CVE-2012-5374" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_IGNORE += "CVE-2012-5375" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2012-5517" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_IGNORE += "CVE-2012-6536" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_IGNORE += "CVE-2012-6537" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_IGNORE += "CVE-2012-6538" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6539" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6540" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6541" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6542" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6543" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6544" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6545" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2012-6546" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2012-6547" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2012-6548" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_IGNORE += "CVE-2012-6549" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_IGNORE += "CVE-2012-6638" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_IGNORE += "CVE-2012-6647" + +# fixed-version: Fixed after version 3.6 +CVE_CHECK_IGNORE += "CVE-2012-6657" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_IGNORE += "CVE-2012-6689" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2012-6701" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_IGNORE += "CVE-2012-6703" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2012-6704" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_IGNORE += "CVE-2012-6712" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-0160" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_IGNORE += "CVE-2013-0190" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_IGNORE += "CVE-2013-0216" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_IGNORE += "CVE-2013-0217" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_IGNORE += "CVE-2013-0228" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_IGNORE += "CVE-2013-0231" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_IGNORE += "CVE-2013-0268" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_IGNORE += "CVE-2013-0290" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_IGNORE += "CVE-2013-0309" + +# fixed-version: Fixed after version 3.5 +CVE_CHECK_IGNORE += "CVE-2013-0310" + +# fixed-version: Fixed after version 3.7rc8 +CVE_CHECK_IGNORE += "CVE-2013-0311" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_IGNORE += "CVE-2013-0313" + +# fixed-version: Fixed after version 3.11rc7 +CVE_CHECK_IGNORE += "CVE-2013-0343" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_IGNORE += "CVE-2013-0349" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_IGNORE += "CVE-2013-0871" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_IGNORE += "CVE-2013-0913" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-0914" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-1059" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-1763" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-1767" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_IGNORE += "CVE-2013-1772" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_IGNORE += "CVE-2013-1773" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_IGNORE += "CVE-2013-1774" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-1792" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_IGNORE += "CVE-2013-1796" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_IGNORE += "CVE-2013-1797" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_IGNORE += "CVE-2013-1798" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_IGNORE += "CVE-2013-1819" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_IGNORE += "CVE-2013-1826" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_IGNORE += "CVE-2013-1827" + +# fixed-version: Fixed after version 3.9rc2 +CVE_CHECK_IGNORE += "CVE-2013-1828" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-1848" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-1858" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-1860" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_IGNORE += "CVE-2013-1928" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_IGNORE += "CVE-2013-1929" + +# Skipping CVE-2013-1935, no affected_versions + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_IGNORE += "CVE-2013-1943" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_IGNORE += "CVE-2013-1956" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_IGNORE += "CVE-2013-1957" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_IGNORE += "CVE-2013-1958" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-1959" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_IGNORE += "CVE-2013-1979" + +# fixed-version: Fixed after version 3.8rc2 +CVE_CHECK_IGNORE += "CVE-2013-2015" + +# fixed-version: Fixed after version 2.6.34 +CVE_CHECK_IGNORE += "CVE-2013-2017" + +# fixed-version: Fixed after version 3.8rc4 +CVE_CHECK_IGNORE += "CVE-2013-2058" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_IGNORE += "CVE-2013-2094" + +# fixed-version: Fixed after version 2.6.34rc4 +CVE_CHECK_IGNORE += "CVE-2013-2128" + +# fixed-version: Fixed after version 3.11rc3 +CVE_CHECK_IGNORE += "CVE-2013-2140" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_IGNORE += "CVE-2013-2141" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_IGNORE += "CVE-2013-2146" + +# fixed-version: Fixed after version 3.12rc3 +CVE_CHECK_IGNORE += "CVE-2013-2147" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-2148" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-2164" + +# Skipping CVE-2013-2188, no affected_versions + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_IGNORE += "CVE-2013-2206" + +# Skipping CVE-2013-2224, no affected_versions + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_IGNORE += "CVE-2013-2232" + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_IGNORE += "CVE-2013-2234" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_IGNORE += "CVE-2013-2237" + +# Skipping CVE-2013-2239, no affected_versions + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-2546" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-2547" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_IGNORE += "CVE-2013-2548" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_IGNORE += "CVE-2013-2596" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-2634" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-2635" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_IGNORE += "CVE-2013-2636" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_IGNORE += "CVE-2013-2850" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-2851" + +# fixed-version: Fixed after version 3.10rc6 +CVE_CHECK_IGNORE += "CVE-2013-2852" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-2888" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2889" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2890" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2891" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-2892" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2893" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2894" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2895" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-2896" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-2897" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-2898" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-2899" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-2929" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-2930" + +# fixed-version: Fixed after version 3.9 +CVE_CHECK_IGNORE += "CVE-2013-3076" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3222" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3223" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3224" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3225" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3226" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3227" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3228" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3229" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3230" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3231" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3232" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3233" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3234" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3235" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3236" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3237" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_IGNORE += "CVE-2013-3301" + +# fixed-version: Fixed after version 3.8rc3 +CVE_CHECK_IGNORE += "CVE-2013-3302" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-4125" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-4127" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-4129" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-4162" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2013-4163" + +# fixed-version: Fixed after version 3.11rc5 +CVE_CHECK_IGNORE += "CVE-2013-4205" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_IGNORE += "CVE-2013-4220" + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_IGNORE += "CVE-2013-4247" + +# fixed-version: Fixed after version 3.11rc6 +CVE_CHECK_IGNORE += "CVE-2013-4254" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_IGNORE += "CVE-2013-4270" + +# fixed-version: Fixed after version 3.12rc6 +CVE_CHECK_IGNORE += "CVE-2013-4299" + +# fixed-version: Fixed after version 3.11 +CVE_CHECK_IGNORE += "CVE-2013-4300" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2013-4312" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-4343" + +# fixed-version: Fixed after version 3.13rc2 +CVE_CHECK_IGNORE += "CVE-2013-4345" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-4348" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_IGNORE += "CVE-2013-4350" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_IGNORE += "CVE-2013-4387" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_IGNORE += "CVE-2013-4470" + +# fixed-version: Fixed after version 3.10rc1 +CVE_CHECK_IGNORE += "CVE-2013-4483" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4511" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4512" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4513" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4514" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4515" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-4516" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-4563" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_IGNORE += "CVE-2013-4579" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2013-4587" + +# fixed-version: Fixed after version 2.6.33rc4 +CVE_CHECK_IGNORE += "CVE-2013-4588" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_IGNORE += "CVE-2013-4591" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_IGNORE += "CVE-2013-4592" + +# Skipping CVE-2013-4737, no affected_versions + +# Skipping CVE-2013-4738, no affected_versions + +# Skipping CVE-2013-4739, no affected_versions + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_IGNORE += "CVE-2013-5634" + +# fixed-version: Fixed after version 3.6rc6 +CVE_CHECK_IGNORE += "CVE-2013-6282" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2013-6367" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2013-6368" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2013-6376" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-6378" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-6380" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-6381" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_IGNORE += "CVE-2013-6382" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_IGNORE += "CVE-2013-6383" + +# Skipping CVE-2013-6392, no affected_versions + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2013-6431" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-6432" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_IGNORE += "CVE-2013-6885" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7026" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_IGNORE += "CVE-2013-7027" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7263" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7264" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7265" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7266" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7267" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7268" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7269" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7270" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7271" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7281" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_IGNORE += "CVE-2013-7339" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2013-7348" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2013-7421" + +# CVE-2013-7445 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_IGNORE += "CVE-2013-7446" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_IGNORE += "CVE-2013-7470" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_IGNORE += "CVE-2014-0038" + +# fixed-version: Fixed after version 3.14rc5 +CVE_CHECK_IGNORE += "CVE-2014-0049" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_IGNORE += "CVE-2014-0055" + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_IGNORE += "CVE-2014-0069" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_IGNORE += "CVE-2014-0077" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_IGNORE += "CVE-2014-0100" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_IGNORE += "CVE-2014-0101" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_IGNORE += "CVE-2014-0102" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_IGNORE += "CVE-2014-0131" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_IGNORE += "CVE-2014-0155" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_IGNORE += "CVE-2014-0181" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_IGNORE += "CVE-2014-0196" + +# fixed-version: Fixed after version 2.6.33rc5 +CVE_CHECK_IGNORE += "CVE-2014-0203" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_IGNORE += "CVE-2014-0205" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_IGNORE += "CVE-2014-0206" + +# Skipping CVE-2014-0972, no affected_versions + +# fixed-version: Fixed after version 3.13 +CVE_CHECK_IGNORE += "CVE-2014-1438" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_IGNORE += "CVE-2014-1444" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_IGNORE += "CVE-2014-1445" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_IGNORE += "CVE-2014-1446" + +# fixed-version: Fixed after version 3.13rc8 +CVE_CHECK_IGNORE += "CVE-2014-1690" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_IGNORE += "CVE-2014-1737" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_IGNORE += "CVE-2014-1738" + +# fixed-version: Fixed after version 3.15rc6 +CVE_CHECK_IGNORE += "CVE-2014-1739" + +# fixed-version: Fixed after version 3.14rc2 +CVE_CHECK_IGNORE += "CVE-2014-1874" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_IGNORE += "CVE-2014-2038" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_IGNORE += "CVE-2014-2039" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_IGNORE += "CVE-2014-2309" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_IGNORE += "CVE-2014-2523" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_IGNORE += "CVE-2014-2568" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-2580" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_IGNORE += "CVE-2014-2672" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_IGNORE += "CVE-2014-2673" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-2678" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_IGNORE += "CVE-2014-2706" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-2739" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_IGNORE += "CVE-2014-2851" + +# fixed-version: Fixed after version 3.2rc7 +CVE_CHECK_IGNORE += "CVE-2014-2889" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-3122" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_IGNORE += "CVE-2014-3144" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_IGNORE += "CVE-2014-3145" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_IGNORE += "CVE-2014-3153" + +# fixed-version: Fixed after version 3.17rc4 +CVE_CHECK_IGNORE += "CVE-2014-3180" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_IGNORE += "CVE-2014-3181" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-3182" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-3183" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-3184" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_IGNORE += "CVE-2014-3185" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_IGNORE += "CVE-2014-3186" + +# Skipping CVE-2014-3519, no affected_versions + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_IGNORE += "CVE-2014-3534" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_IGNORE += "CVE-2014-3535" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-3601" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-3610" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-3611" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_IGNORE += "CVE-2014-3631" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2014-3645" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-3646" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-3647" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-3673" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-3687" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-3688" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-3690" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-3917" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_IGNORE += "CVE-2014-3940" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-4014" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_IGNORE += "CVE-2014-4027" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-4157" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_IGNORE += "CVE-2014-4171" + +# Skipping CVE-2014-4322, no affected_versions + +# Skipping CVE-2014-4323, no affected_versions + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_IGNORE += "CVE-2014-4508" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-4608" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_IGNORE += "CVE-2014-4611" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_IGNORE += "CVE-2014-4652" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_IGNORE += "CVE-2014-4653" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_IGNORE += "CVE-2014-4654" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_IGNORE += "CVE-2014-4655" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_IGNORE += "CVE-2014-4656" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-4667" + +# fixed-version: Fixed after version 3.16rc4 +CVE_CHECK_IGNORE += "CVE-2014-4699" + +# fixed-version: Fixed after version 3.16rc6 +CVE_CHECK_IGNORE += "CVE-2014-4943" + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_IGNORE += "CVE-2014-5045" + +# fixed-version: Fixed after version 3.16 +CVE_CHECK_IGNORE += "CVE-2014-5077" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_IGNORE += "CVE-2014-5206" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_IGNORE += "CVE-2014-5207" + +# Skipping CVE-2014-5332, no affected_versions + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-5471" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-5472" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_IGNORE += "CVE-2014-6410" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_IGNORE += "CVE-2014-6416" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_IGNORE += "CVE-2014-6417" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_IGNORE += "CVE-2014-6418" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_IGNORE += "CVE-2014-7145" + +# Skipping CVE-2014-7207, no affected_versions + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-7283" + +# fixed-version: Fixed after version 3.15rc7 +CVE_CHECK_IGNORE += "CVE-2014-7284" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-7822" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_IGNORE += "CVE-2014-7825" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_IGNORE += "CVE-2014-7826" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_IGNORE += "CVE-2014-7841" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-7842" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_IGNORE += "CVE-2014-7843" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-7970" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-7975" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_IGNORE += "CVE-2014-8086" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-8133" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-8134" + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_IGNORE += "CVE-2014-8159" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-8160" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_IGNORE += "CVE-2014-8171" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2014-8172" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_IGNORE += "CVE-2014-8173" + +# Skipping CVE-2014-8181, no affected_versions + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-8369" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-8480" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-8481" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-8559" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_IGNORE += "CVE-2014-8709" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2014-8884" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-8989" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_IGNORE += "CVE-2014-9090" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_IGNORE += "CVE-2014-9322" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9419" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9420" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9428" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_IGNORE += "CVE-2014-9529" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9584" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_IGNORE += "CVE-2014-9585" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9644" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9683" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9710" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_IGNORE += "CVE-2014-9715" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2014-9717" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9728" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9729" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9730" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2014-9731" + +# Skipping CVE-2014-9777, no affected_versions + +# Skipping CVE-2014-9778, no affected_versions + +# Skipping CVE-2014-9779, no affected_versions + +# Skipping CVE-2014-9780, no affected_versions + +# Skipping CVE-2014-9781, no affected_versions + +# Skipping CVE-2014-9782, no affected_versions + +# Skipping CVE-2014-9783, no affected_versions + +# Skipping CVE-2014-9784, no affected_versions + +# Skipping CVE-2014-9785, no affected_versions + +# Skipping CVE-2014-9786, no affected_versions + +# Skipping CVE-2014-9787, no affected_versions + +# Skipping CVE-2014-9788, no affected_versions + +# Skipping CVE-2014-9789, no affected_versions + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-9803" + +# Skipping CVE-2014-9863, no affected_versions + +# Skipping CVE-2014-9864, no affected_versions + +# Skipping CVE-2014-9865, no affected_versions + +# Skipping CVE-2014-9866, no affected_versions + +# Skipping CVE-2014-9867, no affected_versions + +# Skipping CVE-2014-9868, no affected_versions + +# Skipping CVE-2014-9869, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2014-9870" + +# Skipping CVE-2014-9871, no affected_versions + +# Skipping CVE-2014-9872, no affected_versions + +# Skipping CVE-2014-9873, no affected_versions + +# Skipping CVE-2014-9874, no affected_versions + +# Skipping CVE-2014-9875, no affected_versions + +# Skipping CVE-2014-9876, no affected_versions + +# Skipping CVE-2014-9877, no affected_versions + +# Skipping CVE-2014-9878, no affected_versions + +# Skipping CVE-2014-9879, no affected_versions + +# Skipping CVE-2014-9880, no affected_versions + +# Skipping CVE-2014-9881, no affected_versions + +# Skipping CVE-2014-9882, no affected_versions + +# Skipping CVE-2014-9883, no affected_versions + +# Skipping CVE-2014-9884, no affected_versions + +# Skipping CVE-2014-9885, no affected_versions + +# Skipping CVE-2014-9886, no affected_versions + +# Skipping CVE-2014-9887, no affected_versions + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_IGNORE += "CVE-2014-9888" + +# Skipping CVE-2014-9889, no affected_versions + +# Skipping CVE-2014-9890, no affected_versions + +# Skipping CVE-2014-9891, no affected_versions + +# Skipping CVE-2014-9892, no affected_versions + +# Skipping CVE-2014-9893, no affected_versions + +# Skipping CVE-2014-9894, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2014-9895" + +# Skipping CVE-2014-9896, no affected_versions + +# Skipping CVE-2014-9897, no affected_versions + +# Skipping CVE-2014-9898, no affected_versions + +# Skipping CVE-2014-9899, no affected_versions + +# Skipping CVE-2014-9900, no affected_versions + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_IGNORE += "CVE-2014-9903" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_IGNORE += "CVE-2014-9904" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2014-9914" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_IGNORE += "CVE-2014-9922" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_IGNORE += "CVE-2014-9940" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_IGNORE += "CVE-2015-0239" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_IGNORE += "CVE-2015-0274" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-0275" + +# Skipping CVE-2015-0777, no affected_versions + +# Skipping CVE-2015-1328, no affected_versions + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_IGNORE += "CVE-2015-1333" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_IGNORE += "CVE-2015-1339" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2015-1350" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-1420" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_IGNORE += "CVE-2015-1421" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_IGNORE += "CVE-2015-1465" + +# fixed-version: Fixed after version 3.19rc5 +CVE_CHECK_IGNORE += "CVE-2015-1573" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2015-1593" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2015-1805" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_IGNORE += "CVE-2015-2041" + +# fixed-version: Fixed after version 3.19 +CVE_CHECK_IGNORE += "CVE-2015-2042" + +# fixed-version: Fixed after version 4.0rc4 +CVE_CHECK_IGNORE += "CVE-2015-2150" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2015-2666" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_IGNORE += "CVE-2015-2672" + +# fixed-version: Fixed after version 4.0rc6 +CVE_CHECK_IGNORE += "CVE-2015-2686" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_IGNORE += "CVE-2015-2830" + +# CVE-2015-2877 has no known resolution + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_IGNORE += "CVE-2015-2922" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2015-2925" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_IGNORE += "CVE-2015-3212" + +# fixed-version: Fixed after version 2.6.33rc8 +CVE_CHECK_IGNORE += "CVE-2015-3214" + +# fixed-version: Fixed after version 4.2rc2 +CVE_CHECK_IGNORE += "CVE-2015-3288" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_IGNORE += "CVE-2015-3290" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_IGNORE += "CVE-2015-3291" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_IGNORE += "CVE-2015-3331" + +# Skipping CVE-2015-3332, no affected_versions + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-3339" + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_IGNORE += "CVE-2015-3636" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-4001" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-4002" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-4003" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2015-4004" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2015-4036" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2015-4167" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_IGNORE += "CVE-2015-4170" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-4176" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-4177" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-4178" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_IGNORE += "CVE-2015-4692" + +# fixed-version: Fixed after version 4.1rc6 +CVE_CHECK_IGNORE += "CVE-2015-4700" + +# fixed-version: Fixed after version 4.2rc7 +CVE_CHECK_IGNORE += "CVE-2015-5156" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_IGNORE += "CVE-2015-5157" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_IGNORE += "CVE-2015-5257" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_IGNORE += "CVE-2015-5283" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-5307" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-5327" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-5364" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_IGNORE += "CVE-2015-5366" + +# fixed-version: Fixed after version 4.2rc6 +CVE_CHECK_IGNORE += "CVE-2015-5697" + +# fixed-version: Fixed after version 4.1rc3 +CVE_CHECK_IGNORE += "CVE-2015-5706" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-5707" + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_IGNORE += "CVE-2015-6252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-6526" + +# CVE-2015-6619 has no known resolution + +# CVE-2015-6646 has no known resolution + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2015-6937" + +# Skipping CVE-2015-7312, no affected_versions + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_IGNORE += "CVE-2015-7509" + +# fixed-version: Fixed after version 4.4rc7 +CVE_CHECK_IGNORE += "CVE-2015-7513" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-7515" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_IGNORE += "CVE-2015-7550" + +# Skipping CVE-2015-7553, no affected_versions + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_IGNORE += "CVE-2015-7566" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_IGNORE += "CVE-2015-7613" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-7799" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2015-7833" + +# Skipping CVE-2015-7837, no affected_versions + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_IGNORE += "CVE-2015-7872" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-7884" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-7885" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_IGNORE += "CVE-2015-7990" + +# Skipping CVE-2015-8019, no affected_versions + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-8104" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_IGNORE += "CVE-2015-8215" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_IGNORE += "CVE-2015-8324" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-8374" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_IGNORE += "CVE-2015-8539" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8543" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8550" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8551" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8552" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8553" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8569" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8575" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_IGNORE += "CVE-2015-8660" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2015-8709" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2015-8746" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_IGNORE += "CVE-2015-8767" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_IGNORE += "CVE-2015-8785" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-8787" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2015-8812" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_IGNORE += "CVE-2015-8816" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-8830" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2015-8839" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_IGNORE += "CVE-2015-8844" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_IGNORE += "CVE-2015-8845" + +# Skipping CVE-2015-8937, no affected_versions + +# Skipping CVE-2015-8938, no affected_versions + +# Skipping CVE-2015-8939, no affected_versions + +# Skipping CVE-2015-8940, no affected_versions + +# Skipping CVE-2015-8941, no affected_versions + +# Skipping CVE-2015-8942, no affected_versions + +# Skipping CVE-2015-8943, no affected_versions + +# Skipping CVE-2015-8944, no affected_versions + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_IGNORE += "CVE-2015-8950" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2015-8952" + +# fixed-version: Fixed after version 4.3 +CVE_CHECK_IGNORE += "CVE-2015-8953" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2015-8955" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_IGNORE += "CVE-2015-8956" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-8961" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2015-8962" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_IGNORE += "CVE-2015-8963" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2015-8964" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_IGNORE += "CVE-2015-8966" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2015-8967" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2015-8970" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_IGNORE += "CVE-2015-9004" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2015-9016" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_IGNORE += "CVE-2015-9289" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-0617" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_IGNORE += "CVE-2016-0723" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-0728" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-0758" + +# Skipping CVE-2016-0774, no affected_versions + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2016-0821" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_IGNORE += "CVE-2016-0823" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_IGNORE += "CVE-2016-10044" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10088" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_IGNORE += "CVE-2016-10147" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-10150" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10153" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10154" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_IGNORE += "CVE-2016-10200" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10208" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-10229" + +# fixed-version: Fixed after version 4.8rc6 +CVE_CHECK_IGNORE += "CVE-2016-10318" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2016-10723" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10741" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-10764" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2016-10905" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_IGNORE += "CVE-2016-10906" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2016-10907" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_IGNORE += "CVE-2016-1237" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-1575" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-1576" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_IGNORE += "CVE-2016-1583" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2016-2053" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2069" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_IGNORE += "CVE-2016-2070" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_IGNORE += "CVE-2016-2085" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_IGNORE += "CVE-2016-2117" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_IGNORE += "CVE-2016-2143" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-2184" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-2185" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-2186" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_IGNORE += "CVE-2016-2187" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2016-2188" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_IGNORE += "CVE-2016-2383" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_IGNORE += "CVE-2016-2384" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2543" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2544" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2545" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2546" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2547" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2548" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2549" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_IGNORE += "CVE-2016-2550" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_IGNORE += "CVE-2016-2782" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2016-2847" + +# Skipping CVE-2016-2853, no affected_versions + +# Skipping CVE-2016-2854, no affected_versions + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_IGNORE += "CVE-2016-3044" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2016-3070" + +# fixed-version: Fixed after version 4.6rc2 +CVE_CHECK_IGNORE += "CVE-2016-3134" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3135" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_IGNORE += "CVE-2016-3136" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_IGNORE += "CVE-2016-3137" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3138" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_IGNORE += "CVE-2016-3139" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_IGNORE += "CVE-2016-3140" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3156" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3157" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3672" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-3689" + +# Skipping CVE-2016-3695, no affected_versions + +# Skipping CVE-2016-3699, no affected_versions + +# Skipping CVE-2016-3707, no affected_versions + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-3713" + +# CVE-2016-3775 has no known resolution + +# CVE-2016-3802 has no known resolution + +# CVE-2016-3803 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_IGNORE += "CVE-2016-3841" + +# fixed-version: Fixed after version 4.8rc2 +CVE_CHECK_IGNORE += "CVE-2016-3857" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_IGNORE += "CVE-2016-3951" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_IGNORE += "CVE-2016-3955" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_IGNORE += "CVE-2016-3961" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4440" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_IGNORE += "CVE-2016-4470" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4482" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-4485" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-4486" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2016-4557" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_IGNORE += "CVE-2016-4558" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2016-4565" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2016-4568" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4569" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4578" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-4580" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_IGNORE += "CVE-2016-4581" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_IGNORE += "CVE-2016-4794" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-4805" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-4913" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4951" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4997" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-4998" + +# fixed-version: Fixed after version 4.9rc2 +CVE_CHECK_IGNORE += "CVE-2016-5195" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_IGNORE += "CVE-2016-5243" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_IGNORE += "CVE-2016-5244" + +# Skipping CVE-2016-5340, no affected_versions + +# Skipping CVE-2016-5342, no affected_versions + +# Skipping CVE-2016-5343, no affected_versions + +# Skipping CVE-2016-5344, no affected_versions + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_IGNORE += "CVE-2016-5400" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2016-5412" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_IGNORE += "CVE-2016-5696" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-5728" + +# fixed-version: Fixed after version 4.7rc6 +CVE_CHECK_IGNORE += "CVE-2016-5828" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_IGNORE += "CVE-2016-5829" + +# CVE-2016-5870 has no known resolution + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2016-6130" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2016-6136" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_IGNORE += "CVE-2016-6156" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_IGNORE += "CVE-2016-6162" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_IGNORE += "CVE-2016-6187" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-6197" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_IGNORE += "CVE-2016-6198" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2016-6213" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-6327" + +# fixed-version: Fixed after version 4.8rc3 +CVE_CHECK_IGNORE += "CVE-2016-6480" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2016-6516" + +# Skipping CVE-2016-6753, no affected_versions + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2016-6786" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_IGNORE += "CVE-2016-6787" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_IGNORE += "CVE-2016-6828" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-7039" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_IGNORE += "CVE-2016-7042" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2016-7097" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-7117" + +# Skipping CVE-2016-7118, no affected_versions + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2016-7425" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2016-7910" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_IGNORE += "CVE-2016-7911" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_IGNORE += "CVE-2016-7912" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-7913" + +# fixed-version: Fixed after version 4.6rc4 +CVE_CHECK_IGNORE += "CVE-2016-7914" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-7915" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_IGNORE += "CVE-2016-7916" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_IGNORE += "CVE-2016-7917" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_IGNORE += "CVE-2016-8399" + +# Skipping CVE-2016-8401, no affected_versions + +# Skipping CVE-2016-8402, no affected_versions + +# Skipping CVE-2016-8403, no affected_versions + +# Skipping CVE-2016-8404, no affected_versions + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_IGNORE += "CVE-2016-8405" + +# Skipping CVE-2016-8406, no affected_versions + +# Skipping CVE-2016-8407, no affected_versions + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-8630" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-8632" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-8633" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2016-8636" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_IGNORE += "CVE-2016-8645" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2016-8646" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_IGNORE += "CVE-2016-8650" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-8655" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_IGNORE += "CVE-2016-8658" + +# CVE-2016-8660 has no known resolution + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-8666" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-9083" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-9084" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-9120" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_IGNORE += "CVE-2016-9178" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2016-9191" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_IGNORE += "CVE-2016-9313" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_IGNORE += "CVE-2016-9555" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_IGNORE += "CVE-2016-9576" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_IGNORE += "CVE-2016-9588" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_IGNORE += "CVE-2016-9604" + +# Skipping CVE-2016-9644, no affected_versions + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2016-9685" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-9754" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-9755" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_IGNORE += "CVE-2016-9756" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_IGNORE += "CVE-2016-9777" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-9793" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-9794" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2016-9806" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_IGNORE += "CVE-2016-9919" + +# Skipping CVE-2017-0403, no affected_versions + +# Skipping CVE-2017-0404, no affected_versions + +# Skipping CVE-2017-0426, no affected_versions + +# Skipping CVE-2017-0427, no affected_versions + +# CVE-2017-0507 has no known resolution + +# CVE-2017-0508 has no known resolution + +# Skipping CVE-2017-0510, no affected_versions + +# Skipping CVE-2017-0528, no affected_versions + +# Skipping CVE-2017-0537, no affected_versions + +# CVE-2017-0564 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-0605" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-0627" + +# CVE-2017-0630 has no known resolution + +# CVE-2017-0749 has no known resolution + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2017-0750" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-0786" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_IGNORE += "CVE-2017-0861" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_IGNORE += "CVE-2017-1000" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_IGNORE += "CVE-2017-1000111" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_IGNORE += "CVE-2017-1000112" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-1000251" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-1000252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_IGNORE += "CVE-2017-1000253" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-1000255" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-1000363" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_IGNORE += "CVE-2017-1000364" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_IGNORE += "CVE-2017-1000365" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-1000370" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-1000371" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_IGNORE += "CVE-2017-1000379" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_IGNORE += "CVE-2017-1000380" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2017-1000405" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_IGNORE += "CVE-2017-1000407" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2017-1000410" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-10661" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-10662" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-10663" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-10810" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_IGNORE += "CVE-2017-10911" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-11089" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-11176" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-11472" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_IGNORE += "CVE-2017-11473" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_IGNORE += "CVE-2017-11600" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_IGNORE += "CVE-2017-12134" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-12146" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_IGNORE += "CVE-2017-12153" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-12154" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_IGNORE += "CVE-2017-12168" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-12188" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-12190" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-12192" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_IGNORE += "CVE-2017-12193" + +# fixed-version: Fixed after version 4.13rc4 +CVE_CHECK_IGNORE += "CVE-2017-12762" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-13080" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-13166" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_IGNORE += "CVE-2017-13167" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2017-13168" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_IGNORE += "CVE-2017-13215" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2017-13216" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2017-13220" + +# CVE-2017-13221 has no known resolution + +# CVE-2017-13222 has no known resolution + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_IGNORE += "CVE-2017-13305" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_IGNORE += "CVE-2017-13686" + +# CVE-2017-13693 has no known resolution + +# CVE-2017-13694 has no known resolution + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2017-13695" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_IGNORE += "CVE-2017-13715" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-14051" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_IGNORE += "CVE-2017-14106" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_IGNORE += "CVE-2017-14140" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-14156" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-14340" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-14489" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_IGNORE += "CVE-2017-14497" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-14954" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_IGNORE += "CVE-2017-14991" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_IGNORE += "CVE-2017-15102" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-15115" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_IGNORE += "CVE-2017-15116" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-15121" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-15126" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_IGNORE += "CVE-2017-15127" + +# fixed-version: Fixed after version 4.14rc8 +CVE_CHECK_IGNORE += "CVE-2017-15128" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-15129" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-15265" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_IGNORE += "CVE-2017-15274" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-15299" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_IGNORE += "CVE-2017-15306" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-15537" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-15649" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_IGNORE += "CVE-2017-15868" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-15951" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-16525" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-16526" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-16527" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2017-16528" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-16529" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-16530" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-16531" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-16532" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-16533" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2017-16534" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-16535" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-16536" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-16537" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-16538" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_IGNORE += "CVE-2017-16643" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-16644" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2017-16645" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-16646" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_IGNORE += "CVE-2017-16647" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-16648" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_IGNORE += "CVE-2017-16649" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_IGNORE += "CVE-2017-16650" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-16911" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-16912" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-16913" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-16914" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_IGNORE += "CVE-2017-16939" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-16994" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-16995" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-16996" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_IGNORE += "CVE-2017-17052" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_IGNORE += "CVE-2017-17053" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17448" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17449" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17450" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17558" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17712" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17741" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17805" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-17806" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_IGNORE += "CVE-2017-17807" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17852" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17853" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17854" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17855" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17856" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17857" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-17862" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17863" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_IGNORE += "CVE-2017-17864" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2017-17975" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_IGNORE += "CVE-2017-18017" + +# fixed-version: Fixed after version 4.15rc7 +CVE_CHECK_IGNORE += "CVE-2017-18075" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18079" + +# CVE-2017-18169 has no known resolution + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2017-18174" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18193" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-18200" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2017-18202" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-18203" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-18204" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2017-18208" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-18216" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18218" + +# fixed-version: Fixed after version 4.12rc4 +CVE_CHECK_IGNORE += "CVE-2017-18221" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-18222" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-18224" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-18232" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18241" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-18249" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-18255" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-18257" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_IGNORE += "CVE-2017-18261" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-18270" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2017-18344" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-18360" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2017-18379" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-18509" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18549" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-18550" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_IGNORE += "CVE-2017-18551" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-18552" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_IGNORE += "CVE-2017-18595" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-2583" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-2584" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-2596" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-2618" + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_IGNORE += "CVE-2017-2634" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2017-2636" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2017-2647" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_IGNORE += "CVE-2017-2671" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_IGNORE += "CVE-2017-5123" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-5546" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_IGNORE += "CVE-2017-5547" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_IGNORE += "CVE-2017-5548" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-5549" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-5550" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-5551" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_IGNORE += "CVE-2017-5576" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_IGNORE += "CVE-2017-5577" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-5669" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2017-5715" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2017-5753" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-5754" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-5897" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-5967" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-5970" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_IGNORE += "CVE-2017-5972" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-5986" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-6001" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_IGNORE += "CVE-2017-6074" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-6214" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_IGNORE += "CVE-2017-6345" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_IGNORE += "CVE-2017-6346" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-6347" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_IGNORE += "CVE-2017-6348" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-6353" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2017-6874" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2017-6951" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_IGNORE += "CVE-2017-7184" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_IGNORE += "CVE-2017-7187" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_IGNORE += "CVE-2017-7261" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_IGNORE += "CVE-2017-7273" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_IGNORE += "CVE-2017-7277" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_IGNORE += "CVE-2017-7294" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_IGNORE += "CVE-2017-7308" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_IGNORE += "CVE-2017-7346" + +# CVE-2017-7369 has no known resolution + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_IGNORE += "CVE-2017-7374" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_IGNORE += "CVE-2017-7472" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_IGNORE += "CVE-2017-7477" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_IGNORE += "CVE-2017-7482" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-7487" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_IGNORE += "CVE-2017-7495" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_IGNORE += "CVE-2017-7518" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-7533" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-7541" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_IGNORE += "CVE-2017-7542" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_IGNORE += "CVE-2017-7558" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_IGNORE += "CVE-2017-7616" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_IGNORE += "CVE-2017-7618" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_IGNORE += "CVE-2017-7645" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_IGNORE += "CVE-2017-7889" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_IGNORE += "CVE-2017-7895" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_IGNORE += "CVE-2017-7979" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_IGNORE += "CVE-2017-8061" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2017-8062" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-8063" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-8064" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-8065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-8066" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2017-8067" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-8068" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-8069" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_IGNORE += "CVE-2017-8070" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_IGNORE += "CVE-2017-8071" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_IGNORE += "CVE-2017-8072" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2017-8106" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_IGNORE += "CVE-2017-8240" + +# CVE-2017-8242 has no known resolution + +# CVE-2017-8244 has no known resolution + +# CVE-2017-8245 has no known resolution + +# CVE-2017-8246 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-8797" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_IGNORE += "CVE-2017-8824" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-8831" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-8890" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2017-8924" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_IGNORE += "CVE-2017-8925" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-9059" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-9074" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-9075" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-9076" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_IGNORE += "CVE-2017-9077" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2017-9150" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_IGNORE += "CVE-2017-9211" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_IGNORE += "CVE-2017-9242" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_IGNORE += "CVE-2017-9605" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_IGNORE += "CVE-2017-9725" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-9984" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2017-9985" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2017-9986" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_IGNORE += "CVE-2018-1000004" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-1000026" + +# fixed-version: Fixed after version 4.15 +CVE_CHECK_IGNORE += "CVE-2018-1000028" + +# fixed-version: Fixed after version 4.16 +CVE_CHECK_IGNORE += "CVE-2018-1000199" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_IGNORE += "CVE-2018-1000200" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_IGNORE += "CVE-2018-1000204" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-10021" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-10074" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2018-10087" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2018-10124" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_IGNORE += "CVE-2018-10322" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_IGNORE += "CVE-2018-10323" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_IGNORE += "CVE-2018-1065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2018-1066" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_IGNORE += "CVE-2018-10675" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_IGNORE += "CVE-2018-1068" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-10840" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-10853" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-1087" + +# CVE-2018-10872 has no known resolution + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10876" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10877" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10878" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10879" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10880" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10881" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10882" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-10883" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_IGNORE += "CVE-2018-10901" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_IGNORE += "CVE-2018-10902" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_IGNORE += "CVE-2018-1091" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-1092" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-1093" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_IGNORE += "CVE-2018-10938" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-1094" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_IGNORE += "CVE-2018-10940" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-1095" + +# fixed-version: Fixed after version 4.17rc2 +CVE_CHECK_IGNORE += "CVE-2018-1108" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-1118" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_IGNORE += "CVE-2018-1120" + +# CVE-2018-1121 has no known resolution + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2018-11232" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-1128" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-1129" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-1130" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-11412" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_IGNORE += "CVE-2018-11506" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_IGNORE += "CVE-2018-11508" + +# CVE-2018-11987 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2018-12126" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2018-12127" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2018-12130" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2018-12207" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-12232" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_IGNORE += "CVE-2018-12233" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-12633" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_IGNORE += "CVE-2018-12714" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-12896" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-12904" + +# CVE-2018-12928 has no known resolution + +# CVE-2018-12929 has no known resolution + +# CVE-2018-12930 has no known resolution + +# CVE-2018-12931 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13053" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-13093" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-13094" + +# fixed-version: Fixed after version 4.18rc3 +CVE_CHECK_IGNORE += "CVE-2018-13095" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13096" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13097" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13098" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13099" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-13100" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_IGNORE += "CVE-2018-13405" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-13406" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14609" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14610" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14611" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14612" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14613" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14614" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14615" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14616" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-14617" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_IGNORE += "CVE-2018-14619" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_IGNORE += "CVE-2018-14625" + +# fixed-version: Fixed after version 4.19rc6 +CVE_CHECK_IGNORE += "CVE-2018-14633" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2018-14634" + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_IGNORE += "CVE-2018-14641" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2018-14646" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_IGNORE += "CVE-2018-14656" + +# fixed-version: Fixed after version 4.18rc8 +CVE_CHECK_IGNORE += "CVE-2018-14678" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-14734" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_IGNORE += "CVE-2018-15471" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-15572" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-15594" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_IGNORE += "CVE-2018-16276" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2018-16597" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_IGNORE += "CVE-2018-16658" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_IGNORE += "CVE-2018-16862" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_IGNORE += "CVE-2018-16871" + +# fixed-version: Fixed after version 5.0rc5 +CVE_CHECK_IGNORE += "CVE-2018-16880" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_IGNORE += "CVE-2018-16882" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2018-16884" + +# CVE-2018-16885 has no known resolution + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_IGNORE += "CVE-2018-17182" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_IGNORE += "CVE-2018-17972" + +# CVE-2018-17977 has no known resolution + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_IGNORE += "CVE-2018-18021" + +# fixed-version: Fixed after version 4.19 +CVE_CHECK_IGNORE += "CVE-2018-18281" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_IGNORE += "CVE-2018-18386" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_IGNORE += "CVE-2018-18397" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_IGNORE += "CVE-2018-18445" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-18559" + +# CVE-2018-18653 has no known resolution + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_IGNORE += "CVE-2018-18690" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_IGNORE += "CVE-2018-18710" + +# fixed-version: Fixed after version 4.20rc2 +CVE_CHECK_IGNORE += "CVE-2018-18955" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_IGNORE += "CVE-2018-19406" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_IGNORE += "CVE-2018-19407" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_IGNORE += "CVE-2018-19824" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_IGNORE += "CVE-2018-19854" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_IGNORE += "CVE-2018-19985" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_IGNORE += "CVE-2018-20169" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-20449" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2018-20509" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_IGNORE += "CVE-2018-20510" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_IGNORE += "CVE-2018-20511" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2018-20669" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2018-20784" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_IGNORE += "CVE-2018-20836" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_IGNORE += "CVE-2018-20854" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-20855" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-20856" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-20961" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-20976" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2018-21008" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_IGNORE += "CVE-2018-25015" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_IGNORE += "CVE-2018-25020" + +# CVE-2018-3574 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-3620" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_IGNORE += "CVE-2018-3639" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-3646" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_IGNORE += "CVE-2018-3665" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-3693" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2018-5332" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2018-5333" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_IGNORE += "CVE-2018-5344" + +# fixed-version: Fixed after version 4.18rc7 +CVE_CHECK_IGNORE += "CVE-2018-5390" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-5391" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_IGNORE += "CVE-2018-5703" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-5750" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-5803" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_IGNORE += "CVE-2018-5814" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-5848" + +# Skipping CVE-2018-5856, no affected_versions + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_IGNORE += "CVE-2018-5873" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-5953" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-5995" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_IGNORE += "CVE-2018-6412" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-6554" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2018-6555" + +# CVE-2018-6559 has no known resolution + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_IGNORE += "CVE-2018-6927" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_IGNORE += "CVE-2018-7191" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-7273" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_IGNORE += "CVE-2018-7480" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_IGNORE += "CVE-2018-7492" + +# fixed-version: Fixed after version 4.16rc2 +CVE_CHECK_IGNORE += "CVE-2018-7566" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-7740" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2018-7754" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_IGNORE += "CVE-2018-7755" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-7757" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_IGNORE += "CVE-2018-7995" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-8043" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2018-8087" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-8781" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-8822" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2018-8897" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2018-9363" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_IGNORE += "CVE-2018-9385" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_IGNORE += "CVE-2018-9415" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_IGNORE += "CVE-2018-9422" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_IGNORE += "CVE-2018-9465" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_IGNORE += "CVE-2018-9516" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_IGNORE += "CVE-2018-9517" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_IGNORE += "CVE-2018-9518" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2018-9568" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-0136" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-0145" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-0146" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-0147" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-0148" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-0149" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_IGNORE += "CVE-2019-0154" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_IGNORE += "CVE-2019-0155" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-10124" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-10125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-10126" + +# CVE-2019-10140 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-10142" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_IGNORE += "CVE-2019-10207" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-10220" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-10638" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-10639" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_IGNORE += "CVE-2019-11085" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-11091" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_IGNORE += "CVE-2019-11135" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_IGNORE += "CVE-2019-11190" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-11191" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_IGNORE += "CVE-2019-1125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-11477" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-11478" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-11479" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-11486" + +# fixed-version: Fixed after version 5.1rc5 +CVE_CHECK_IGNORE += "CVE-2019-11487" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-11599" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_IGNORE += "CVE-2019-11683" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-11810" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-11811" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-11815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-11833" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-11884" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-12378" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-12379" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-12380" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-12381" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-12382" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-12454" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-12455" + +# CVE-2019-12456 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-12614" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_IGNORE += "CVE-2019-12615" + +# fixed-version: Fixed after version 5.2rc7 +CVE_CHECK_IGNORE += "CVE-2019-12817" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_IGNORE += "CVE-2019-12818" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_IGNORE += "CVE-2019-12819" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2019-12881" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-12984" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_IGNORE += "CVE-2019-13233" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_IGNORE += "CVE-2019-13272" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-13631" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_IGNORE += "CVE-2019-13648" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-14283" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-14284" + +# fixed-version: Fixed after version 5.5rc7 +CVE_CHECK_IGNORE += "CVE-2019-14615" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2019-14763" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-14814" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-14815" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-14816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-14821" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-14835" + +# fixed-version: Fixed after version 5.5rc3 +CVE_CHECK_IGNORE += "CVE-2019-14895" + +# fixed-version: Fixed after version 5.5 +CVE_CHECK_IGNORE += "CVE-2019-14896" + +# fixed-version: Fixed after version 5.5 +CVE_CHECK_IGNORE += "CVE-2019-14897" + +# CVE-2019-14898 has no known resolution + +# fixed-version: Fixed after version 5.5rc3 +CVE_CHECK_IGNORE += "CVE-2019-14901" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_IGNORE += "CVE-2019-15030" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_IGNORE += "CVE-2019-15031" + +# fixed-version: Fixed after version 5.2rc2 +CVE_CHECK_IGNORE += "CVE-2019-15090" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-15098" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-15099" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_IGNORE += "CVE-2019-15117" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_IGNORE += "CVE-2019-15118" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15211" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-15212" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15213" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-15214" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15215" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_IGNORE += "CVE-2019-15216" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15217" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-15218" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-15219" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15220" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_IGNORE += "CVE-2019-15221" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_IGNORE += "CVE-2019-15222" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-15223" + +# CVE-2019-15239 has no known resolution + +# CVE-2019-15290 has no known resolution + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-15291" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-15292" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-15504" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-15505" + +# fixed-version: Fixed after version 5.3rc6 +CVE_CHECK_IGNORE += "CVE-2019-15538" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_IGNORE += "CVE-2019-15666" + +# CVE-2019-15791 has no known resolution + +# CVE-2019-15792 has no known resolution + +# CVE-2019-15793 has no known resolution + +# fixed-version: Fixed after version 5.12 +CVE_CHECK_IGNORE += "CVE-2019-15794" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2019-15807" + +# CVE-2019-15902 has no known resolution + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-15916" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-15917" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-15918" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-15919" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-15920" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_IGNORE += "CVE-2019-15921" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-15922" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-15923" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-15924" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15925" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-15926" + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_IGNORE += "CVE-2019-15927" + +# CVE-2019-16089 has no known resolution + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-16229" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-16230" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-16231" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-16232" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_IGNORE += "CVE-2019-16233" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-16234" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-16413" + +# fixed-version: Fixed after version 5.3rc7 +CVE_CHECK_IGNORE += "CVE-2019-16714" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-16746" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2019-16921" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_IGNORE += "CVE-2019-16994" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-16995" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-17052" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-17053" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-17054" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-17055" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-17056" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-17075" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-17133" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-17351" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-17666" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-18198" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-18282" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-18660" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_IGNORE += "CVE-2019-18675" + +# CVE-2019-18680 has no known resolution + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-18683" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-18786" + +# fixed-version: Fixed after version 5.1rc7 +CVE_CHECK_IGNORE += "CVE-2019-18805" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-18806" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-18807" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-18808" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-18809" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-18810" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-18811" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-18812" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-18813" + +# fixed-version: Fixed after version 5.7rc7 +CVE_CHECK_IGNORE += "CVE-2019-18814" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-18885" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19036" + +# fixed-version: Fixed after version 5.5rc3 +CVE_CHECK_IGNORE += "CVE-2019-19037" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2019-19039" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19043" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-19044" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-19045" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19046" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-19047" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19048" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_IGNORE += "CVE-2019-19049" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19050" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-19051" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-19052" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19053" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19054" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-19055" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19056" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19057" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-19058" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-19059" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19060" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19061" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19062" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19063" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19064" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19065" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19066" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-19067" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19068" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19069" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19070" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19071" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19072" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19073" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19074" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-19075" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19076" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19077" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19078" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-19079" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19080" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19081" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19082" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-19083" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_IGNORE += "CVE-2019-19227" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19241" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19252" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19318" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-19319" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19332" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19338" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2019-19377" + +# CVE-2019-19378 has no known resolution + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19447" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2019-19448" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2019-19449" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2019-19462" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19523" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_IGNORE += "CVE-2019-19524" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_IGNORE += "CVE-2019-19525" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_IGNORE += "CVE-2019-19526" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_IGNORE += "CVE-2019-19527" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_IGNORE += "CVE-2019-19528" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-19529" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_IGNORE += "CVE-2019-19530" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_IGNORE += "CVE-2019-19531" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2019-19532" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19533" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-19534" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_IGNORE += "CVE-2019-19535" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_IGNORE += "CVE-2019-19536" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_IGNORE += "CVE-2019-19537" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-19543" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19602" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2019-19767" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2019-19768" + +# fixed-version: Fixed after version 5.6rc5 +CVE_CHECK_IGNORE += "CVE-2019-19769" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2019-19770" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_IGNORE += "CVE-2019-19807" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-19813" + +# CVE-2019-19814 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2019-19815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-19816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-19922" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-19927" + +# fixed-version: Fixed after version 5.5rc3 +CVE_CHECK_IGNORE += "CVE-2019-19947" + +# fixed-version: Fixed after version 5.5rc2 +CVE_CHECK_IGNORE += "CVE-2019-19965" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-19966" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_IGNORE += "CVE-2019-1999" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_IGNORE += "CVE-2019-20054" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-20095" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-20096" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2019-2024" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_IGNORE += "CVE-2019-2025" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-20422" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_IGNORE += "CVE-2019-2054" + +# fixed-version: Fixed after version 5.5rc6 +CVE_CHECK_IGNORE += "CVE-2019-20636" + +# CVE-2019-20794 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-20806" + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2019-20810" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_IGNORE += "CVE-2019-20811" + +# fixed-version: Fixed after version 5.5rc3 +CVE_CHECK_IGNORE += "CVE-2019-20812" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2019-20908" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_IGNORE += "CVE-2019-20934" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-2101" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-2181" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_IGNORE += "CVE-2019-2182" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-2213" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_IGNORE += "CVE-2019-2214" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2019-2215" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_IGNORE += "CVE-2019-25044" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_IGNORE += "CVE-2019-25045" + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2019-3016" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-3459" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-3460" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_IGNORE += "CVE-2019-3701" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_IGNORE += "CVE-2019-3819" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_IGNORE += "CVE-2019-3837" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_IGNORE += "CVE-2019-3846" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-3874" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-3882" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_IGNORE += "CVE-2019-3887" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_IGNORE += "CVE-2019-3892" + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_IGNORE += "CVE-2019-3896" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_IGNORE += "CVE-2019-3900" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_IGNORE += "CVE-2019-3901" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_IGNORE += "CVE-2019-5108" + +# Skipping CVE-2019-5489, no affected_versions + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_IGNORE += "CVE-2019-6133" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_IGNORE += "CVE-2019-6974" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_IGNORE += "CVE-2019-7221" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_IGNORE += "CVE-2019-7222" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_IGNORE += "CVE-2019-7308" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_IGNORE += "CVE-2019-8912" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_IGNORE += "CVE-2019-8956" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-8980" + +# fixed-version: Fixed after version 5.0rc4 +CVE_CHECK_IGNORE += "CVE-2019-9003" + +# fixed-version: Fixed after version 5.0rc7 +CVE_CHECK_IGNORE += "CVE-2019-9162" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_IGNORE += "CVE-2019-9213" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2019-9245" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_IGNORE += "CVE-2019-9444" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-9445" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2019-9453" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_IGNORE += "CVE-2019-9454" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2019-9455" + +# fixed-version: Fixed after version 4.16rc6 +CVE_CHECK_IGNORE += "CVE-2019-9456" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_IGNORE += "CVE-2019-9457" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_IGNORE += "CVE-2019-9458" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-9466" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-9500" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_IGNORE += "CVE-2019-9503" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_IGNORE += "CVE-2019-9506" + +# fixed-version: Fixed after version 5.1rc2 +CVE_CHECK_IGNORE += "CVE-2019-9857" + +# fixed-version: Fixed after version 5.6rc3 +CVE_CHECK_IGNORE += "CVE-2020-0009" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_IGNORE += "CVE-2020-0030" + +# fixed-version: Fixed after version 5.5rc2 +CVE_CHECK_IGNORE += "CVE-2020-0041" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_IGNORE += "CVE-2020-0066" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2020-0067" + +# fixed-version: Fixed after version 5.6rc2 +CVE_CHECK_IGNORE += "CVE-2020-0110" + +# fixed-version: Fixed after version 5.7rc4 +CVE_CHECK_IGNORE += "CVE-2020-0255" + +# fixed-version: Fixed after version 5.5rc6 +CVE_CHECK_IGNORE += "CVE-2020-0305" + +# CVE-2020-0347 has no known resolution + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2020-0404" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-0423" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2020-0427" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2020-0429" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2020-0430" + +# fixed-version: Fixed after version 5.5rc6 +CVE_CHECK_IGNORE += "CVE-2020-0431" + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2020-0432" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2020-0433" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_IGNORE += "CVE-2020-0435" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2020-0444" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-0465" + +# fixed-version: Fixed after version 5.9rc2 +CVE_CHECK_IGNORE += "CVE-2020-0466" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-0543" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-10135" + +# fixed-version: Fixed after version 5.5rc5 +CVE_CHECK_IGNORE += "CVE-2020-10690" + +# CVE-2020-10708 has no known resolution + +# fixed-version: Fixed after version 5.7rc6 +CVE_CHECK_IGNORE += "CVE-2020-10711" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_IGNORE += "CVE-2020-10720" + +# fixed-version: Fixed after version 5.7 +CVE_CHECK_IGNORE += "CVE-2020-10732" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_IGNORE += "CVE-2020-10742" + +# fixed-version: Fixed after version 5.7rc4 +CVE_CHECK_IGNORE += "CVE-2020-10751" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-10757" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-10766" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-10767" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-10768" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_IGNORE += "CVE-2020-10769" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_IGNORE += "CVE-2020-10773" + +# CVE-2020-10774 has no known resolution + +# fixed-version: Fixed after version 5.8rc6 +CVE_CHECK_IGNORE += "CVE-2020-10781" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2020-10942" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-11494" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-11565" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-11608" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-11609" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-11668" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2020-11669" + +# CVE-2020-11725 has no known resolution + +# fixed-version: Fixed after version 5.7rc4 +CVE_CHECK_IGNORE += "CVE-2020-11884" + +# CVE-2020-11935 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_IGNORE += "CVE-2020-12114" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-12351" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-12352" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-12362" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-12363" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-12364" + +# fixed-version: Fixed after version 5.7rc3 +CVE_CHECK_IGNORE += "CVE-2020-12464" + +# fixed-version: Fixed after version 5.6rc6 +CVE_CHECK_IGNORE += "CVE-2020-12465" + +# fixed-version: Fixed after version 5.5rc7 +CVE_CHECK_IGNORE += "CVE-2020-12652" + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2020-12653" + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2020-12654" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-12655" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-12656" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-12657" + +# fixed-version: Fixed after version 5.7rc2 +CVE_CHECK_IGNORE += "CVE-2020-12659" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2020-12768" + +# fixed-version: Fixed after version 5.5rc6 +CVE_CHECK_IGNORE += "CVE-2020-12769" + +# fixed-version: Fixed after version 5.7rc3 +CVE_CHECK_IGNORE += "CVE-2020-12770" + +# fixed-version: Fixed after version 5.8rc2 +CVE_CHECK_IGNORE += "CVE-2020-12771" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-12826" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-12888" + +# fixed-version: Fixed after version 5.10rc4 +CVE_CHECK_IGNORE += "CVE-2020-12912" + +# fixed-version: Fixed after version 5.7rc6 +CVE_CHECK_IGNORE += "CVE-2020-13143" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-13974" + +# CVE-2020-14304 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2020-14305" + +# fixed-version: Fixed after version 5.9rc2 +CVE_CHECK_IGNORE += "CVE-2020-14314" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-14331" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-14351" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_IGNORE += "CVE-2020-14353" + +# fixed-version: Fixed after version 5.8rc5 +CVE_CHECK_IGNORE += "CVE-2020-14356" + +# fixed-version: Fixed after version 5.6rc6 +CVE_CHECK_IGNORE += "CVE-2020-14381" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-14385" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-14386" + +# fixed-version: Fixed after version 5.9rc6 +CVE_CHECK_IGNORE += "CVE-2020-14390" + +# fixed-version: Fixed after version 5.5 +CVE_CHECK_IGNORE += "CVE-2020-14416" + +# fixed-version: Fixed after version 5.8rc3 +CVE_CHECK_IGNORE += "CVE-2020-15393" + +# fixed-version: Fixed after version 5.8rc2 +CVE_CHECK_IGNORE += "CVE-2020-15436" + +# fixed-version: Fixed after version 5.8rc7 +CVE_CHECK_IGNORE += "CVE-2020-15437" + +# fixed-version: Fixed after version 5.8rc3 +CVE_CHECK_IGNORE += "CVE-2020-15780" + +# CVE-2020-15802 has no known resolution + +# fixed-version: Fixed after version 5.8rc6 +CVE_CHECK_IGNORE += "CVE-2020-15852" + +# fixed-version: Fixed after version 5.15rc2 +CVE_CHECK_IGNORE += "CVE-2020-16119" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-16120" + +# fixed-version: Fixed after version 5.8 +CVE_CHECK_IGNORE += "CVE-2020-16166" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2020-1749" + +# fixed-version: Fixed after version 5.8rc4 +CVE_CHECK_IGNORE += "CVE-2020-24394" + +# fixed-version: Fixed after version 5.8 +CVE_CHECK_IGNORE += "CVE-2020-24490" + +# CVE-2020-24502 has no known resolution + +# CVE-2020-24503 has no known resolution + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2020-24504" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-24586" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-24587" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-24588" + +# fixed-version: Fixed after version 5.9rc7 +CVE_CHECK_IGNORE += "CVE-2020-25211" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-25212" + +# CVE-2020-25220 has no known resolution + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-25221" + +# fixed-version: Fixed after version 5.9rc5 +CVE_CHECK_IGNORE += "CVE-2020-25284" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-25285" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2020-25639" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2020-25641" + +# fixed-version: Fixed after version 5.9rc7 +CVE_CHECK_IGNORE += "CVE-2020-25643" + +# fixed-version: Fixed after version 5.9rc7 +CVE_CHECK_IGNORE += "CVE-2020-25645" + +# fixed-version: Fixed after version 5.10rc2 +CVE_CHECK_IGNORE += "CVE-2020-25656" + +# CVE-2020-25661 has no known resolution + +# CVE-2020-25662 has no known resolution + +# fixed-version: Fixed after version 5.10rc3 +CVE_CHECK_IGNORE += "CVE-2020-25668" + +# fixed-version: Fixed after version 5.10rc5 +CVE_CHECK_IGNORE += "CVE-2020-25669" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2020-25670" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2020-25671" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2020-25672" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2020-25673" + +# fixed-version: Fixed after version 5.10rc3 +CVE_CHECK_IGNORE += "CVE-2020-25704" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-25705" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-26088" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-26139" + +# CVE-2020-26140 has no known resolution + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-26141" + +# CVE-2020-26142 has no known resolution + +# CVE-2020-26143 has no known resolution + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-26145" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2020-26147" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2020-26541" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2020-26555" + +# CVE-2020-26556 has no known resolution + +# CVE-2020-26557 has no known resolution + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2020-26558" + +# CVE-2020-26559 has no known resolution + +# CVE-2020-26560 has no known resolution + +# fixed-version: Fixed after version 5.6 +CVE_CHECK_IGNORE += "CVE-2020-27066" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_IGNORE += "CVE-2020-27067" + +# fixed-version: Fixed after version 5.6rc2 +CVE_CHECK_IGNORE += "CVE-2020-27068" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27152" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2020-27170" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2020-27171" + +# fixed-version: Fixed after version 5.9 +CVE_CHECK_IGNORE += "CVE-2020-27194" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2020-2732" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27673" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27675" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27777" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27784" + +# fixed-version: Fixed after version 5.7rc6 +CVE_CHECK_IGNORE += "CVE-2020-27786" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-27815" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2020-27820" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-27825" + +# fixed-version: Fixed after version 5.10rc7 +CVE_CHECK_IGNORE += "CVE-2020-27830" + +# fixed-version: Fixed after version 5.10rc6 +CVE_CHECK_IGNORE += "CVE-2020-27835" + +# fixed-version: Fixed after version 5.9rc6 +CVE_CHECK_IGNORE += "CVE-2020-28097" + +# fixed-version: Fixed after version 5.11rc4 +CVE_CHECK_IGNORE += "CVE-2020-28374" + +# fixed-version: Fixed after version 5.10rc7 +CVE_CHECK_IGNORE += "CVE-2020-28588" + +# fixed-version: Fixed after version 5.9 +CVE_CHECK_IGNORE += "CVE-2020-28915" + +# fixed-version: Fixed after version 5.10rc5 +CVE_CHECK_IGNORE += "CVE-2020-28941" + +# fixed-version: Fixed after version 5.10rc3 +CVE_CHECK_IGNORE += "CVE-2020-28974" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-29368" + +# fixed-version: Fixed after version 5.8rc7 +CVE_CHECK_IGNORE += "CVE-2020-29369" + +# fixed-version: Fixed after version 5.6rc7 +CVE_CHECK_IGNORE += "CVE-2020-29370" + +# fixed-version: Fixed after version 5.9rc2 +CVE_CHECK_IGNORE += "CVE-2020-29371" + +# fixed-version: Fixed after version 5.7rc3 +CVE_CHECK_IGNORE += "CVE-2020-29372" + +# fixed-version: Fixed after version 5.6rc2 +CVE_CHECK_IGNORE += "CVE-2020-29373" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-29374" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-29534" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-29568" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-29569" + +# fixed-version: Fixed after version 5.10rc7 +CVE_CHECK_IGNORE += "CVE-2020-29660" + +# fixed-version: Fixed after version 5.10rc7 +CVE_CHECK_IGNORE += "CVE-2020-29661" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-35499" + +# CVE-2020-35501 has no known resolution + +# fixed-version: Fixed after version 5.10rc3 +CVE_CHECK_IGNORE += "CVE-2020-35508" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_IGNORE += "CVE-2020-35513" + +# fixed-version: Fixed after version 5.10rc7 +CVE_CHECK_IGNORE += "CVE-2020-35519" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-36158" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-36310" + +# fixed-version: Fixed after version 5.9rc5 +CVE_CHECK_IGNORE += "CVE-2020-36311" + +# fixed-version: Fixed after version 5.9rc5 +CVE_CHECK_IGNORE += "CVE-2020-36312" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-36313" + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2020-36322" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2020-36385" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-36386" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-36387" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2020-36516" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-36557" + +# fixed-version: Fixed after version 5.6rc3 +CVE_CHECK_IGNORE += "CVE-2020-36558" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2020-36691" + +# fixed-version: Fixed after version 5.10 +CVE_CHECK_IGNORE += "CVE-2020-36694" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2020-3702" + +# fixed-version: Fixed after version 5.10rc5 +CVE_CHECK_IGNORE += "CVE-2020-4788" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_IGNORE += "CVE-2020-7053" + +# fixed-version: Fixed after version 5.5 +CVE_CHECK_IGNORE += "CVE-2020-8428" + +# fixed-version: Fixed after version 5.6rc5 +CVE_CHECK_IGNORE += "CVE-2020-8647" + +# fixed-version: Fixed after version 5.6rc3 +CVE_CHECK_IGNORE += "CVE-2020-8648" + +# fixed-version: Fixed after version 5.6rc5 +CVE_CHECK_IGNORE += "CVE-2020-8649" + +# fixed-version: Fixed after version 5.10rc4 +CVE_CHECK_IGNORE += "CVE-2020-8694" + +# CVE-2020-8832 has no known resolution + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_IGNORE += "CVE-2020-8834" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2020-8835" + +# fixed-version: Fixed after version 5.6rc2 +CVE_CHECK_IGNORE += "CVE-2020-8992" + +# fixed-version: Fixed after version 5.6rc4 +CVE_CHECK_IGNORE += "CVE-2020-9383" + +# fixed-version: Fixed after version 5.6rc3 +CVE_CHECK_IGNORE += "CVE-2020-9391" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-0129" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2021-0342" + +# CVE-2021-0399 has no known resolution + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-0447" + +# fixed-version: Fixed after version 5.9rc7 +CVE_CHECK_IGNORE += "CVE-2021-0448" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-0512" + +# fixed-version: Fixed after version 5.8 +CVE_CHECK_IGNORE += "CVE-2021-0605" + +# CVE-2021-0606 has no known resolution + +# CVE-2021-0695 has no known resolution + +# fixed-version: Fixed after version 5.11rc3 +CVE_CHECK_IGNORE += "CVE-2021-0707" + +# fixed-version: Fixed after version 5.14rc4 +CVE_CHECK_IGNORE += "CVE-2021-0920" + +# CVE-2021-0924 has no known resolution + +# fixed-version: Fixed after version 5.6rc1 +CVE_CHECK_IGNORE += "CVE-2021-0929" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-0935" + +# CVE-2021-0936 has no known resolution + +# fixed-version: Fixed after version 5.12rc8 +CVE_CHECK_IGNORE += "CVE-2021-0937" + +# fixed-version: Fixed after version 5.10rc4 +CVE_CHECK_IGNORE += "CVE-2021-0938" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-0941" + +# CVE-2021-0961 has no known resolution + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2021-1048" + +# fixed-version: Fixed after version 5.5rc1 +CVE_CHECK_IGNORE += "CVE-2021-20177" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2021-20194" + +# CVE-2021-20219 has no known resolution + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2021-20226" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2021-20239" + +# fixed-version: Fixed after version 4.5rc5 +CVE_CHECK_IGNORE += "CVE-2021-20261" + +# fixed-version: Fixed after version 4.5rc3 +CVE_CHECK_IGNORE += "CVE-2021-20265" + +# fixed-version: Fixed after version 5.11rc5 +CVE_CHECK_IGNORE += "CVE-2021-20268" + +# fixed-version: Fixed after version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2021-20292" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_IGNORE += "CVE-2021-20317" + +# fixed-version: Fixed after version 5.15rc3 +CVE_CHECK_IGNORE += "CVE-2021-20320" + +# fixed-version: Fixed after version 5.15rc5 +CVE_CHECK_IGNORE += "CVE-2021-20321" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-20322" + +# fixed-version: Fixed after version 5.11rc7 +CVE_CHECK_IGNORE += "CVE-2021-21781" + +# fixed-version: Fixed after version 5.13 +CVE_CHECK_IGNORE += "CVE-2021-22543" + +# fixed-version: Fixed after version 5.12rc8 +CVE_CHECK_IGNORE += "CVE-2021-22555" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2021-22600" + +# fixed-version: Fixed after version 5.12rc8 +CVE_CHECK_IGNORE += "CVE-2021-23133" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-23134" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2021-26401" + +# fixed-version: Fixed after version 5.11rc7 +CVE_CHECK_IGNORE += "CVE-2021-26708" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-26930" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-26931" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-26932" + +# CVE-2021-26934 has no known resolution + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-27363" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-27364" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-27365" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-28038" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-28039" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-28375" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-28660" + +# fixed-version: Fixed after version 5.12rc6 +CVE_CHECK_IGNORE += "CVE-2021-28688" + +# fixed-version: Fixed after version 5.13rc6 +CVE_CHECK_IGNORE += "CVE-2021-28691" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-28711" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-28712" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-28713" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-28714" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-28715" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-28950" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-28951" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-28952" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-28964" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-28971" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-28972" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2021-29154" + +# fixed-version: Fixed after version 5.12rc8 +CVE_CHECK_IGNORE += "CVE-2021-29155" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-29264" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-29265" + +# fixed-version: Fixed after version 5.12rc4 +CVE_CHECK_IGNORE += "CVE-2021-29266" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-29646" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-29647" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-29648" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-29649" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-29650" + +# fixed-version: Fixed after version 5.12rc6 +CVE_CHECK_IGNORE += "CVE-2021-29657" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-30002" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2021-30178" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-31440" + +# fixed-version: Fixed after version 5.11rc5 +CVE_CHECK_IGNORE += "CVE-2021-3178" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-31829" + +# fixed-version: Fixed after version 5.12rc5 +CVE_CHECK_IGNORE += "CVE-2021-31916" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-32078" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-32399" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2021-32606" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-33033" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-33034" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2021-33061" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2021-33098" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2021-33135" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2021-33200" + +# fixed-version: Fixed after version 5.11rc6 +CVE_CHECK_IGNORE += "CVE-2021-3347" + +# fixed-version: Fixed after version 5.11rc6 +CVE_CHECK_IGNORE += "CVE-2021-3348" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-33624" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2021-33655" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-33656" + +# fixed-version: Fixed after version 5.14rc3 +CVE_CHECK_IGNORE += "CVE-2021-33909" + +# fixed-version: Fixed after version 5.10 +CVE_CHECK_IGNORE += "CVE-2021-3411" + +# fixed-version: Fixed after version 5.9rc2 +CVE_CHECK_IGNORE += "CVE-2021-3428" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-3444" + +# fixed-version: Fixed after version 5.14rc4 +CVE_CHECK_IGNORE += "CVE-2021-34556" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-34693" + +# fixed-version: Fixed after version 5.12rc6 +CVE_CHECK_IGNORE += "CVE-2021-3483" + +# fixed-version: Fixed after version 5.14 +CVE_CHECK_IGNORE += "CVE-2021-34866" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2021-3489" + +# fixed-version: Fixed after version 5.13rc4 +CVE_CHECK_IGNORE += "CVE-2021-3490" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-3491" + +# CVE-2021-3492 has no known resolution + +# fixed-version: Fixed after version 5.11rc1 +CVE_CHECK_IGNORE += "CVE-2021-3493" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-34981" + +# fixed-version: Fixed after version 5.12rc8 +CVE_CHECK_IGNORE += "CVE-2021-3501" + +# fixed-version: Fixed after version 5.13 +CVE_CHECK_IGNORE += "CVE-2021-35039" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-3506" + +# CVE-2021-3542 has no known resolution + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-3543" + +# fixed-version: Fixed after version 5.14rc4 +CVE_CHECK_IGNORE += "CVE-2021-35477" + +# fixed-version: Fixed after version 5.13rc5 +CVE_CHECK_IGNORE += "CVE-2021-3564" + +# fixed-version: Fixed after version 5.13rc5 +CVE_CHECK_IGNORE += "CVE-2021-3573" + +# fixed-version: Fixed after version 5.13rc5 +CVE_CHECK_IGNORE += "CVE-2021-3587" + +# fixed-version: Fixed after version 5.11 +CVE_CHECK_IGNORE += "CVE-2021-3600" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-3609" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-3612" + +# fixed-version: Fixed after version 5.5rc7 +CVE_CHECK_IGNORE += "CVE-2021-3635" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-3640" + +# fixed-version: Fixed after version 5.14rc7 +CVE_CHECK_IGNORE += "CVE-2021-3653" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-3655" + +# fixed-version: Fixed after version 5.14rc7 +CVE_CHECK_IGNORE += "CVE-2021-3656" + +# fixed-version: Fixed after version 5.12rc7 +CVE_CHECK_IGNORE += "CVE-2021-3659" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-3669" + +# fixed-version: Fixed after version 5.14rc3 +CVE_CHECK_IGNORE += "CVE-2021-3679" + +# CVE-2021-3714 has no known resolution + +# fixed-version: Fixed after version 5.6 +CVE_CHECK_IGNORE += "CVE-2021-3715" + +# fixed-version: Fixed after version 5.14rc3 +CVE_CHECK_IGNORE += "CVE-2021-37159" + +# fixed-version: Fixed after version 5.14rc6 +CVE_CHECK_IGNORE += "CVE-2021-3732" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-3736" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-3739" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-3743" + +# fixed-version: Fixed after version 5.15rc4 +CVE_CHECK_IGNORE += "CVE-2021-3744" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-3752" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-3753" + +# fixed-version: Fixed after version 5.14rc3 +CVE_CHECK_IGNORE += "CVE-2021-37576" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-3759" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-3760" + +# fixed-version: Fixed after version 5.15rc4 +CVE_CHECK_IGNORE += "CVE-2021-3764" + +# fixed-version: Fixed after version 5.15 +CVE_CHECK_IGNORE += "CVE-2021-3772" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-38160" + +# fixed-version: Fixed after version 5.14rc6 +CVE_CHECK_IGNORE += "CVE-2021-38166" + +# fixed-version: Fixed after version 5.13rc6 +CVE_CHECK_IGNORE += "CVE-2021-38198" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-38199" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-38200" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-38201" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-38202" + +# fixed-version: Fixed after version 5.14rc2 +CVE_CHECK_IGNORE += "CVE-2021-38203" + +# fixed-version: Fixed after version 5.14rc3 +CVE_CHECK_IGNORE += "CVE-2021-38204" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-38205" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-38206" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-38207" + +# fixed-version: Fixed after version 5.13rc5 +CVE_CHECK_IGNORE += "CVE-2021-38208" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-38209" + +# fixed-version: Fixed after version 5.15rc4 +CVE_CHECK_IGNORE += "CVE-2021-38300" + +# CVE-2021-3847 has no known resolution + +# CVE-2021-3864 has no known resolution + +# CVE-2021-3892 has no known resolution + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-3894" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-3896" + +# fixed-version: Fixed after version 5.16 +CVE_CHECK_IGNORE += "CVE-2021-3923" + +# fixed-version: Fixed after version 5.14 +CVE_CHECK_IGNORE += "CVE-2021-39633" + +# fixed-version: Fixed after version 5.9rc8 +CVE_CHECK_IGNORE += "CVE-2021-39634" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-39636" + +# fixed-version: Fixed after version 5.11rc3 +CVE_CHECK_IGNORE += "CVE-2021-39648" + +# fixed-version: Fixed after version 5.12rc3 +CVE_CHECK_IGNORE += "CVE-2021-39656" + +# fixed-version: Fixed after version 5.11rc4 +CVE_CHECK_IGNORE += "CVE-2021-39657" + +# fixed-version: Fixed after version 5.16rc5 +CVE_CHECK_IGNORE += "CVE-2021-39685" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-39686" + +# fixed-version: Fixed after version 5.16rc5 +CVE_CHECK_IGNORE += "CVE-2021-39698" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_IGNORE += "CVE-2021-39711" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_IGNORE += "CVE-2021-39713" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-39714" + +# CVE-2021-39800 has no known resolution + +# CVE-2021-39801 has no known resolution + +# CVE-2021-39802 has no known resolution + +# fixed-version: Fixed after version 5.16rc2 +CVE_CHECK_IGNORE += "CVE-2021-4001" + +# fixed-version: Fixed after version 5.16rc3 +CVE_CHECK_IGNORE += "CVE-2021-4002" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-4023" + +# fixed-version: Fixed after version 5.15rc4 +CVE_CHECK_IGNORE += "CVE-2021-4028" + +# fixed-version: Fixed after version 5.15rc7 +CVE_CHECK_IGNORE += "CVE-2021-4032" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2021-4037" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-40490" + +# fixed-version: Fixed after version 5.16rc4 +CVE_CHECK_IGNORE += "CVE-2021-4083" + +# fixed-version: Fixed after version 5.16rc2 +CVE_CHECK_IGNORE += "CVE-2021-4090" + +# fixed-version: Fixed after version 5.15rc7 +CVE_CHECK_IGNORE += "CVE-2021-4093" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2021-4095" + +# fixed-version: Fixed after version 5.15rc2 +CVE_CHECK_IGNORE += "CVE-2021-41073" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2021-4135" + +# fixed-version: Fixed after version 5.15 +CVE_CHECK_IGNORE += "CVE-2021-4148" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-4149" + +# fixed-version: Fixed after version 5.15rc7 +CVE_CHECK_IGNORE += "CVE-2021-4150" + +# fixed-version: Fixed after version 5.14rc2 +CVE_CHECK_IGNORE += "CVE-2021-4154" + +# fixed-version: Fixed after version 5.16 +CVE_CHECK_IGNORE += "CVE-2021-4155" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-4157" + +# fixed-version: Fixed after version 5.7rc1 +CVE_CHECK_IGNORE += "CVE-2021-4159" + +# fixed-version: Fixed after version 5.15rc5 +CVE_CHECK_IGNORE += "CVE-2021-41864" + +# fixed-version: Fixed after version 5.16 +CVE_CHECK_IGNORE += "CVE-2021-4197" + +# fixed-version: Fixed after version 5.14rc7 +CVE_CHECK_IGNORE += "CVE-2021-42008" + +# fixed-version: Fixed after version 5.16rc2 +CVE_CHECK_IGNORE += "CVE-2021-4202" + +# fixed-version: Fixed after version 5.15rc4 +CVE_CHECK_IGNORE += "CVE-2021-4203" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2021-4204" + +# fixed-version: Fixed after version 5.8rc1 +CVE_CHECK_IGNORE += "CVE-2021-4218" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2021-42252" + +# fixed-version: Fixed after version 5.15 +CVE_CHECK_IGNORE += "CVE-2021-42327" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-42739" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-43056" + +# fixed-version: Fixed after version 5.15rc3 +CVE_CHECK_IGNORE += "CVE-2021-43057" + +# fixed-version: Fixed after version 5.15 +CVE_CHECK_IGNORE += "CVE-2021-43267" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2021-43389" + +# fixed-version: Fixed after version 5.16rc2 +CVE_CHECK_IGNORE += "CVE-2021-43975" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2021-43976" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-44733" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2021-44879" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2021-45095" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2021-45100" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2021-45402" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2021-45469" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2021-45480" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2021-45485" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2021-45486" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2021-45868" + +# fixed-version: Fixed after version 5.13rc7 +CVE_CHECK_IGNORE += "CVE-2021-46283" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-0001" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-0002" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-0168" + +# fixed-version: Fixed after version 5.18rc4 +CVE_CHECK_IGNORE += "CVE-2022-0171" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-0185" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2022-0264" + +# fixed-version: Fixed after version 5.14rc2 +CVE_CHECK_IGNORE += "CVE-2022-0286" + +# fixed-version: Fixed after version 5.15rc6 +CVE_CHECK_IGNORE += "CVE-2022-0322" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-0330" + +# fixed-version: Fixed after version 5.16 +CVE_CHECK_IGNORE += "CVE-2022-0382" + +# CVE-2022-0400 has no known resolution + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-0433" + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-0435" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2022-0480" + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-0487" + +# fixed-version: Fixed after version 5.17rc3 +CVE_CHECK_IGNORE += "CVE-2022-0492" + +# fixed-version: Fixed after version 5.17rc5 +CVE_CHECK_IGNORE += "CVE-2022-0494" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-0500" + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-0516" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-0617" + +# fixed-version: Fixed after version 5.15rc7 +CVE_CHECK_IGNORE += "CVE-2022-0644" + +# fixed-version: Fixed after version 5.17rc5 +CVE_CHECK_IGNORE += "CVE-2022-0646" + +# fixed-version: Fixed after version 5.17rc7 +CVE_CHECK_IGNORE += "CVE-2022-0742" + +# fixed-version: Fixed after version 5.8rc6 +CVE_CHECK_IGNORE += "CVE-2022-0812" + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-0847" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2022-0850" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-0854" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-0995" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-0998" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-1011" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-1012" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1015" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1016" + +# fixed-version: Fixed after version 5.14rc7 +CVE_CHECK_IGNORE += "CVE-2022-1043" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1048" + +# fixed-version: Fixed after version 5.17rc3 +CVE_CHECK_IGNORE += "CVE-2022-1055" + +# CVE-2022-1116 has no known resolution + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1158" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1184" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2022-1195" + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-1198" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-1199" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1204" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1205" + +# CVE-2022-1247 has no known resolution + +# fixed-version: Fixed after version 5.18rc3 +CVE_CHECK_IGNORE += "CVE-2022-1263" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2022-1280" + +# fixed-version: Fixed after version 5.17 +CVE_CHECK_IGNORE += "CVE-2022-1353" + +# fixed-version: Fixed after version 5.6rc2 +CVE_CHECK_IGNORE += "CVE-2022-1419" + +# fixed-version: Fixed after version 5.19rc7 +CVE_CHECK_IGNORE += "CVE-2022-1462" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2022-1508" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1516" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1651" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-1652" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-1671" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_IGNORE += "CVE-2022-1678" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-1679" + +# fixed-version: Fixed after version 5.18 +CVE_CHECK_IGNORE += "CVE-2022-1729" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-1734" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-1786" + +# fixed-version: Fixed after version 5.18 +CVE_CHECK_IGNORE += "CVE-2022-1789" + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2022-1836" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1852" + +# fixed-version: Fixed after version 5.19rc8 +CVE_CHECK_IGNORE += "CVE-2022-1882" + +# fixed-version: Fixed after version 5.18rc7 +CVE_CHECK_IGNORE += "CVE-2022-1943" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1966" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1972" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1973" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-1974" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-1975" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-1976" + +# fixed-version: Fixed after version 5.17rc3 +CVE_CHECK_IGNORE += "CVE-2022-1998" + +# fixed-version: Fixed after version 5.17rc5 +CVE_CHECK_IGNORE += "CVE-2022-20008" + +# fixed-version: Fixed after version 5.16rc5 +CVE_CHECK_IGNORE += "CVE-2022-20132" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2022-20141" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2022-20148" + +# fixed-version: Fixed after version 5.13rc1 +CVE_CHECK_IGNORE += "CVE-2022-20153" + +# fixed-version: Fixed after version 5.16rc8 +CVE_CHECK_IGNORE += "CVE-2022-20154" + +# fixed-version: Fixed after version 5.17 +CVE_CHECK_IGNORE += "CVE-2022-20158" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2022-20166" + +# fixed-version: Fixed after version 5.17 +CVE_CHECK_IGNORE += "CVE-2022-20368" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-20369" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-20409" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-20421" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-20422" + +# fixed-version: Fixed after version 5.17 +CVE_CHECK_IGNORE += "CVE-2022-20423" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-20424" + +# fixed-version: Fixed after version 5.9rc4 +CVE_CHECK_IGNORE += "CVE-2022-20565" + +# fixed-version: Fixed after version 5.19 +CVE_CHECK_IGNORE += "CVE-2022-20566" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_IGNORE += "CVE-2022-20567" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-20568" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-20572" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-2078" + +# fixed-version: Fixed after version 5.19rc3 +CVE_CHECK_IGNORE += "CVE-2022-21123" + +# fixed-version: Fixed after version 5.19rc3 +CVE_CHECK_IGNORE += "CVE-2022-21125" + +# fixed-version: Fixed after version 5.19rc3 +CVE_CHECK_IGNORE += "CVE-2022-21166" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_IGNORE += "CVE-2022-21385" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-21499" + +# fixed-version: Fixed after version 5.19rc8 +CVE_CHECK_IGNORE += "CVE-2022-21505" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-2153" + +# cpe-stable-backport: Backported in 6.1.14 +CVE_CHECK_IGNORE += "CVE-2022-2196" + +# CVE-2022-2209 has no known resolution + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-22942" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23036" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23037" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23038" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23039" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23040" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23041" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23042" + +# fixed-version: Fixed after version 6.0 +CVE_CHECK_IGNORE += "CVE-2022-2308" + +# fixed-version: Fixed after version 5.19rc5 +CVE_CHECK_IGNORE += "CVE-2022-2318" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-23222" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-2327" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-2380" + +# fixed-version: Fixed after version 5.19rc7 +CVE_CHECK_IGNORE += "CVE-2022-23816" + +# CVE-2022-23825 has no known resolution + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-23960" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-24122" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-24448" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-24958" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-24959" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-2503" + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-25258" + +# CVE-2022-25265 has no known resolution + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-25375" + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-25636" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-2585" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-2586" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-2588" + +# fixed-version: Fixed after version 6.0rc3 +CVE_CHECK_IGNORE += "CVE-2022-2590" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-2602" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-26365" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-26373" + +# fixed-version: Fixed after version 5.18rc4 +CVE_CHECK_IGNORE += "CVE-2022-2639" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-26490" + +# fixed-version: Fixed after version 6.0rc5 +CVE_CHECK_IGNORE += "CVE-2022-2663" + +# CVE-2022-26878 has no known resolution + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-26966" + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-27223" + +# fixed-version: Fixed after version 5.17rc8 +CVE_CHECK_IGNORE += "CVE-2022-27666" + +# cpe-stable-backport: Backported in 6.1.12 +CVE_CHECK_IGNORE += "CVE-2022-27672" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-2785" + +# fixed-version: Fixed after version 5.17rc5 +CVE_CHECK_IGNORE += "CVE-2022-27950" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-28356" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-28388" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-28389" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-28390" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-2873" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-28796" + +# fixed-version: Fixed after version 5.18rc2 +CVE_CHECK_IGNORE += "CVE-2022-28893" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-2905" + +# fixed-version: Fixed after version 5.17rc6 +CVE_CHECK_IGNORE += "CVE-2022-29156" + +# fixed-version: Fixed after version 5.17rc2 +CVE_CHECK_IGNORE += "CVE-2022-2938" + +# fixed-version: Fixed after version 5.18rc4 +CVE_CHECK_IGNORE += "CVE-2022-29581" + +# fixed-version: Fixed after version 5.18rc2 +CVE_CHECK_IGNORE += "CVE-2022-29582" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-2959" + +# CVE-2022-2961 has no known resolution + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2022-2964" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-2977" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-2978" + +# fixed-version: Fixed after version 5.19rc7 +CVE_CHECK_IGNORE += "CVE-2022-29900" + +# fixed-version: Fixed after version 5.19rc7 +CVE_CHECK_IGNORE += "CVE-2022-29901" + +# fixed-version: Fixed after version 5.15rc1 +CVE_CHECK_IGNORE += "CVE-2022-2991" + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2022-29968" + +# fixed-version: Fixed after version 6.0rc3 +CVE_CHECK_IGNORE += "CVE-2022-3028" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-30594" + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2022-3061" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3077" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3078" + +# fixed-version: Fixed after version 6.0rc3 +CVE_CHECK_IGNORE += "CVE-2022-3103" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3104" + +# fixed-version: Fixed after version 5.16 +CVE_CHECK_IGNORE += "CVE-2022-3105" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2022-3106" + +# fixed-version: Fixed after version 5.17 +CVE_CHECK_IGNORE += "CVE-2022-3107" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-3108" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3110" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3111" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3112" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3113" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3114" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3115" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3169" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-3170" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2022-3176" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3202" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-32250" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2022-32296" + +# CVE-2022-3238 has no known resolution + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2022-3239" + +# fixed-version: Fixed after version 5.19rc2 +CVE_CHECK_IGNORE += "CVE-2022-32981" + +# fixed-version: Fixed after version 6.0rc5 +CVE_CHECK_IGNORE += "CVE-2022-3303" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2022-3344" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-33740" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-33741" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-33742" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-33743" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-33744" + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2022-33981" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2022-3424" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3435" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-34494" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-34495" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-34918" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3521" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3522" + +# fixed-version: Fixed after version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3523" -# https://nvd.nist.gov/vuln/detail/CVE-2022-3566 -# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 -# Patched in kernel since v6.1 f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57 -CVE_CHECK_IGNORE += "CVE-2022-3566" +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3524" + +# fixed-version: Fixed after version 5.18rc3 +CVE_CHECK_IGNORE += "CVE-2022-3526" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2022-3531" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2022-3532" + +# CVE-2022-3533 has no known resolution + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2022-3534" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3535" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3541" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3542" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3543" + +# CVE-2022-3544 has no known resolution + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3545" + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2022-3564" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3565" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3566" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3567" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3577" + +# fixed-version: Fixed after version 6.0rc5 +CVE_CHECK_IGNORE += "CVE-2022-3586" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3594" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3595" + +# CVE-2022-3606 has no known resolution + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-36123" + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2022-3619" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3621" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3623" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3624" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3625" + +# fixed-version: Fixed after version 6.1rc5 +CVE_CHECK_IGNORE += "CVE-2022-3628" + +# cpe-stable-backport: Backported in 6.1.4 +CVE_CHECK_IGNORE += "CVE-2022-36280" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3629" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3630" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3633" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-3635" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-3636" + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2022-3640" + +# CVE-2022-36402 has no known resolution + +# CVE-2022-3642 has no known resolution + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2022-3643" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3646" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3649" + +# fixed-version: Fixed after version 5.19rc8 +CVE_CHECK_IGNORE += "CVE-2022-36879" + +# fixed-version: Fixed after version 5.19 +CVE_CHECK_IGNORE += "CVE-2022-36946" + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2022-3707" + +# CVE-2022-38096 has no known resolution + +# cpe-stable-backport: Backported in 6.1.7 +CVE_CHECK_IGNORE += "CVE-2022-38457" + +# fixed-version: Fixed after version 6.1rc2 +CVE_CHECK_IGNORE += "CVE-2022-3903" + +# fixed-version: Fixed after version 6.0rc6 +CVE_CHECK_IGNORE += "CVE-2022-3910" + +# fixed-version: Fixed after version 5.19rc8 +CVE_CHECK_IGNORE += "CVE-2022-39188" + +# fixed-version: Fixed after version 5.19rc2 +CVE_CHECK_IGNORE += "CVE-2022-39189" + +# fixed-version: Fixed after version 6.0rc3 +CVE_CHECK_IGNORE += "CVE-2022-39190" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-3977" + +# fixed-version: Fixed after version 5.19rc4 +CVE_CHECK_IGNORE += "CVE-2022-39842" + +# cpe-stable-backport: Backported in 6.1.7 +CVE_CHECK_IGNORE += "CVE-2022-40133" + +# fixed-version: Fixed after version 6.0rc5 +CVE_CHECK_IGNORE += "CVE-2022-40307" + +# fixed-version: Fixed after version 5.19rc4 +CVE_CHECK_IGNORE += "CVE-2022-40476" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-40768" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-4095" + +# CVE-2022-40982 has no known resolution + +# cpe-stable-backport: Backported in 6.1.4 +CVE_CHECK_IGNORE += "CVE-2022-41218" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2022-41222" + +# fixed-version: Fixed after version 5.19rc6 +CVE_CHECK_IGNORE += "CVE-2022-4127" + +# fixed-version: Fixed after version 5.19rc7 +CVE_CHECK_IGNORE += "CVE-2022-4128" + +# fixed-version: Fixed after version 6.1rc6 +CVE_CHECK_IGNORE += "CVE-2022-4129" + +# fixed-version: Fixed after version 6.1rc8 +CVE_CHECK_IGNORE += "CVE-2022-4139" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-41674" + +# CVE-2022-41848 has no known resolution + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-41849" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-41850" + +# fixed-version: Fixed after version 5.18rc2 +CVE_CHECK_IGNORE += "CVE-2022-41858" + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2022-42328" + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2022-42329" + +# fixed-version: Fixed after version 6.0rc7 +CVE_CHECK_IGNORE += "CVE-2022-42432" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2022-4269" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-42703" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-42719" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-42720" -# https://nvd.nist.gov/vuln/detail/CVE-2022-3567 -# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 -# Patched in kernel since v6.1 364f997b5cfe1db0d63a390fe7c801fa2b3115f6 -CVE_CHECK_IGNORE += "CVE-2022-3567" +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-42721" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-42722" + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2022-42895" + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2022-42896" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-43750" + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2022-4378" + +# cpe-stable-backport: Backported in 6.1.3 +CVE_CHECK_IGNORE += "CVE-2022-4379" + +# cpe-stable-backport: Backported in 6.1.8 +CVE_CHECK_IGNORE += "CVE-2022-4382" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2022-43945" + +# CVE-2022-44032 has no known resolution + +# CVE-2022-44033 has no known resolution + +# CVE-2022-44034 has no known resolution + +# CVE-2022-4543 has no known resolution + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2022-45869" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +# CVE-2022-45886 has no known resolution + +# CVE-2022-45887 has no known resolution + +# CVE-2022-45888 needs backporting (fixed from 6.2rc1) + +# CVE-2022-45919 has no known resolution + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2022-45934" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2022-4662" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2022-4696" + +# fixed-version: Fixed after version 5.16rc7 +CVE_CHECK_IGNORE += "CVE-2022-4744" + +# fixed-version: Fixed after version 6.1rc8 +CVE_CHECK_IGNORE += "CVE-2022-47518" + +# fixed-version: Fixed after version 6.1rc8 +CVE_CHECK_IGNORE += "CVE-2022-47519" + +# fixed-version: Fixed after version 6.1rc8 +CVE_CHECK_IGNORE += "CVE-2022-47520" + +# fixed-version: Fixed after version 6.1rc8 +CVE_CHECK_IGNORE += "CVE-2022-47521" + +# cpe-stable-backport: Backported in 6.1.6 +CVE_CHECK_IGNORE += "CVE-2022-47929" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-47938" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-47939" +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2022-47940" -# 2023 - -# https://nvd.nist.gov/vuln/detail/CVE-2022-38457 -# https://nvd.nist.gov/vuln/detail/CVE-2022-40133 -# Both CVE-2022-38457 & CVE-2022-40133 are fixed by the same commit: -# Introduced in version v4.20 e14c02e6b6990e9f6ee18a214a22ac26bae1b25e -# Patched in kernel since v6.2 a309c7194e8a2f8bd4539b9449917913f6c2cd50 -# Backported in version v6.1.7 7ac9578e45b20e3f3c0c8eb71f5417a499a7226a -# See: -# * https://www.linuxkernelcves.com/cves/CVE-2022-38457 -# * https://www.linuxkernelcves.com/cves/CVE-2022-40133 -# * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/ -CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133" - -# https://nvd.nist.gov/vuln/detail/CVE-2023-1075 -# Introduced in v4.20 a42055e8d2c30d4decfc13ce943d09c7b9dad221 -# Patched in kernel v6.2 ffe2a22562444720b05bdfeb999c03e810d84cbb -# Backported in version 6.1.11 37c0cdf7e4919e5f76381ac60817b67bcbdacb50 -# 5.15 still has issue, include/net/tls.h:is_tx_ready() would need patch +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-47941" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-47942" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2022-47943" + +# fixed-version: Fixed after version 5.12rc2 +CVE_CHECK_IGNORE += "CVE-2022-47946" + +# cpe-stable-backport: Backported in 6.1.8 +CVE_CHECK_IGNORE += "CVE-2022-4842" + +# cpe-stable-backport: Backported in 6.1.3 +CVE_CHECK_IGNORE += "CVE-2022-48423" + +# cpe-stable-backport: Backported in 6.1.3 +CVE_CHECK_IGNORE += "CVE-2022-48424" + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2022-48425" + +# CVE-2022-48502 needs backporting (fixed from 6.1.40) + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-0030" + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2023-0045" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2023-0047" + +# fixed-version: Fixed after version 6.0rc4 +CVE_CHECK_IGNORE += "CVE-2023-0122" + +# CVE-2023-0160 has no known resolution + +# cpe-stable-backport: Backported in 6.1.7 +CVE_CHECK_IGNORE += "CVE-2023-0179" + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2023-0210" + +# fixed-version: Fixed after version 5.10rc1 +CVE_CHECK_IGNORE += "CVE-2023-0240" + +# cpe-stable-backport: Backported in 6.1.6 +CVE_CHECK_IGNORE += "CVE-2023-0266" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-0386" + +# cpe-stable-backport: Backported in 6.1.7 +CVE_CHECK_IGNORE += "CVE-2023-0394" + +# cpe-stable-backport: Backported in 6.1.8 +CVE_CHECK_IGNORE += "CVE-2023-0458" + +# cpe-stable-backport: Backported in 6.1.14 +CVE_CHECK_IGNORE += "CVE-2023-0459" + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2023-0461" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-0468" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-0469" + +# fixed-version: Fixed after version 6.1rc2 +CVE_CHECK_IGNORE += "CVE-2023-0590" + +# CVE-2023-0597 needs backporting (fixed from 6.2rc1) + +# fixed-version: Fixed after version 6.1rc3 +CVE_CHECK_IGNORE += "CVE-2023-0615" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1032" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-1073" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-1074" + +# cpe-stable-backport: Backported in 6.1.11 CVE_CHECK_IGNORE += "CVE-2023-1075" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1076" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1077" + +# cpe-stable-backport: Backported in 6.1.12 +CVE_CHECK_IGNORE += "CVE-2023-1078" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1079" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-1095" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1118" + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-1192" + +# CVE-2023-1193 has no known resolution + +# CVE-2023-1194 has no known resolution + +# fixed-version: Fixed after version 6.1rc3 +CVE_CHECK_IGNORE += "CVE-2023-1195" + +# CVE-2023-1206 needs backporting (fixed from 6.1.43) + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2023-1249" + +# fixed-version: Fixed after version 5.16rc1 +CVE_CHECK_IGNORE += "CVE-2023-1252" + +# cpe-stable-backport: Backported in 6.1.13 +CVE_CHECK_IGNORE += "CVE-2023-1281" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2023-1295" + +# cpe-stable-backport: Backported in 6.1.27 +CVE_CHECK_IGNORE += "CVE-2023-1380" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-1382" + +# fixed-version: Fixed after version 5.11rc4 +CVE_CHECK_IGNORE += "CVE-2023-1390" + +# cpe-stable-backport: Backported in 6.1.13 +CVE_CHECK_IGNORE += "CVE-2023-1513" + +# fixed-version: Fixed after version 5.17rc4 +CVE_CHECK_IGNORE += "CVE-2023-1582" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-1583" + +# cpe-stable-backport: Backported in 6.1.23 +CVE_CHECK_IGNORE += "CVE-2023-1611" + +# fixed-version: Fixed after version 5.18rc2 +CVE_CHECK_IGNORE += "CVE-2023-1637" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-1652" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-1670" + +# cpe-stable-backport: Backported in 6.1.18 +CVE_CHECK_IGNORE += "CVE-2023-1829" + +# fixed-version: Fixed after version 5.18 +CVE_CHECK_IGNORE += "CVE-2023-1838" + +# cpe-stable-backport: Backported in 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-1855" + +# cpe-stable-backport: Backported in 6.1.25 +CVE_CHECK_IGNORE += "CVE-2023-1859" + +# fixed-version: Fixed after version 5.18rc2 +CVE_CHECK_IGNORE += "CVE-2023-1872" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-1989" + +# cpe-stable-backport: Backported in 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-1990" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-1998" + +# cpe-stable-backport: Backported in 6.1.27 +CVE_CHECK_IGNORE += "CVE-2023-2002" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-2006" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-2007" + +# fixed-version: Fixed after version 5.19rc4 +CVE_CHECK_IGNORE += "CVE-2023-2008" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-2019" + +# CVE-2023-20569 has no known resolution + +# CVE-2023-20588 has no known resolution + +# CVE-2023-20593 needs backporting (fixed from 6.1.41) + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-20928" + +# CVE-2023-20937 has no known resolution + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2023-20938" + +# CVE-2023-20941 has no known resolution + +# cpe-stable-backport: Backported in 6.1.8 +CVE_CHECK_IGNORE += "CVE-2023-21102" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-21106" + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-2124" + +# cpe-stable-backport: Backported in 6.1.31 +CVE_CHECK_IGNORE += "CVE-2023-21255" + +# CVE-2023-21264 needs backporting (fixed from 6.4rc5) + +# CVE-2023-21400 has no known resolution + +# cpe-stable-backport: Backported in 6.1.26 +CVE_CHECK_IGNORE += "CVE-2023-2156" + +# cpe-stable-backport: Backported in 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-2162" + +# cpe-stable-backport: Backported in 6.1.26 +CVE_CHECK_IGNORE += "CVE-2023-2163" + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2023-2166" + +# CVE-2023-2176 needs backporting (fixed from 6.3rc1) + +# fixed-version: Fixed after version 5.19 +CVE_CHECK_IGNORE += "CVE-2023-2177" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-2194" + +# cpe-stable-backport: Backported in 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-2235" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-2236" + +# cpe-stable-backport: Backported in 6.1.26 +CVE_CHECK_IGNORE += "CVE-2023-2248" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-2269" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2023-22995" + +# fixed-version: Fixed after version 5.18rc1 +CVE_CHECK_IGNORE += "CVE-2023-22996" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2023-22997" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-22998" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2023-22999" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2023-23000" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2023-23001" + +# fixed-version: Fixed after version 5.17rc1 +CVE_CHECK_IGNORE += "CVE-2023-23002" + +# fixed-version: Fixed after version 5.16rc6 +CVE_CHECK_IGNORE += "CVE-2023-23003" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2023-23004" + +# CVE-2023-23005 needs backporting (fixed from 6.2rc1) + +# fixed-version: Fixed after version 5.16rc8 +CVE_CHECK_IGNORE += "CVE-2023-23006" + +# CVE-2023-23039 has no known resolution + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2023-23454" + +# cpe-stable-backport: Backported in 6.1.5 +CVE_CHECK_IGNORE += "CVE-2023-23455" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-23559" + +# fixed-version: Fixed after version 5.12rc1 +CVE_CHECK_IGNORE += "CVE-2023-23586" + +# CVE-2023-2430 needs backporting (fixed from 6.2rc5) + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-2483" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-25012" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-2513" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-2598" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +# cpe-stable-backport: Backported in 6.1.3 +CVE_CHECK_IGNORE += "CVE-2023-26544" + +# cpe-stable-backport: Backported in 6.1.13 +CVE_CHECK_IGNORE += "CVE-2023-26545" + +# fixed-version: Fixed after version 6.1rc7 +CVE_CHECK_IGNORE += "CVE-2023-26605" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2023-26606" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2023-26607" + +# fixed-version: Fixed after version 6.1 +CVE_CHECK_IGNORE += "CVE-2023-28327" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2023-28328" + +# fixed-version: Fixed after version 5.19rc1 +CVE_CHECK_IGNORE += "CVE-2023-28410" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-28464" + +# cpe-stable-backport: Backported in 6.1.20 +CVE_CHECK_IGNORE += "CVE-2023-28466" + +# fixed-version: Fixed after version 6.0rc5 +CVE_CHECK_IGNORE += "CVE-2023-2860" + +# fixed-version: Fixed after version 5.14rc1 +CVE_CHECK_IGNORE += "CVE-2023-28772" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-28866" + +# CVE-2023-2898 needs backporting (fixed from 6.1.39) + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-2985" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2023-3006" + +# Skipping CVE-2023-3022, no affected_versions + +# cpe-stable-backport: Backported in 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-30456" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-30772" + +# cpe-stable-backport: Backported in 6.1.30 +CVE_CHECK_IGNORE += "CVE-2023-3090" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_IGNORE += "CVE-2023-3106" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +# CVE-2023-31083 has no known resolution + +# CVE-2023-31084 needs backporting (fixed from 6.4rc3) + +# CVE-2023-31085 has no known resolution + +# fixed-version: Fixed after version 6.0rc2 +CVE_CHECK_IGNORE += "CVE-2023-3111" + +# cpe-stable-backport: Backported in 6.1.35 +CVE_CHECK_IGNORE += "CVE-2023-3117" + +# CVE-2023-31248 needs backporting (fixed from 6.1.39) + +# cpe-stable-backport: Backported in 6.1.30 +CVE_CHECK_IGNORE += "CVE-2023-3141" + +# cpe-stable-backport: Backported in 6.1.26 +CVE_CHECK_IGNORE += "CVE-2023-31436" + +# fixed-version: Fixed after version 5.18rc6 +CVE_CHECK_IGNORE += "CVE-2023-3159" + +# cpe-stable-backport: Backported in 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-3161" + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-3212" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-3220" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-32233" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-32247" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-32248" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-32250" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-32252" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-32254" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-32257" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-32258" + +# cpe-stable-backport: Backported in 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-32269" + +# CVE-2023-32629 has no known resolution + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-3268" + +# cpe-stable-backport: Backported in 6.1.37 +CVE_CHECK_IGNORE += "CVE-2023-3269" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-3312" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-3317" + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-33203" + +# CVE-2023-33250 has no known resolution + +# cpe-stable-backport: Backported in 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-33288" + +# fixed-version: Fixed after version 6.1rc1 +CVE_CHECK_IGNORE += "CVE-2023-3338" + +# cpe-stable-backport: Backported in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-3355" + +# cpe-stable-backport: Backported in 6.1.2 +CVE_CHECK_IGNORE += "CVE-2023-3357" + +# cpe-stable-backport: Backported in 6.1.9 +CVE_CHECK_IGNORE += "CVE-2023-3358" + +# cpe-stable-backport: Backported in 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-3359" + +# fixed-version: Fixed after version 6.0rc1 +CVE_CHECK_IGNORE += "CVE-2023-3389" + +# cpe-stable-backport: Backported in 6.1.35 +CVE_CHECK_IGNORE += "CVE-2023-3390" + +# cpe-stable-backport: Backported in 6.1.13 +CVE_CHECK_IGNORE += "CVE-2023-33951" + +# cpe-stable-backport: Backported in 6.1.13 +CVE_CHECK_IGNORE += "CVE-2023-33952" + +# CVE-2023-3397 has no known resolution + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-34255" + +# cpe-stable-backport: Backported in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-34256" + +# CVE-2023-34319 has no known resolution + +# fixed-version: Fixed after version 5.18rc5 +CVE_CHECK_IGNORE += "CVE-2023-3439" + +# CVE-2023-35001 needs backporting (fixed from 6.1.39) + +# cpe-stable-backport: Backported in 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-3567" + +# CVE-2023-35693 has no known resolution + +# cpe-stable-backport: Backported in 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-35788" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35823" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35824" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35826" + +# CVE-2023-35827 has no known resolution + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35828" + +# cpe-stable-backport: Backported in 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35829" + +# cpe-stable-backport: Backported in 6.1.35 +CVE_CHECK_IGNORE += "CVE-2023-3609" + +# cpe-stable-backport: Backported in 6.1.36 +CVE_CHECK_IGNORE += "CVE-2023-3610" + +# CVE-2023-3611 needs backporting (fixed from 6.1.40) + +# CVE-2023-3640 has no known resolution + +# CVE-2023-37453 has no known resolution + +# CVE-2023-37454 has no known resolution + +# CVE-2023-3772 has no known resolution + +# CVE-2023-3773 has no known resolution + +# CVE-2023-3776 needs backporting (fixed from 6.1.40) + +# fixed-version: Fixed after version 6.1rc4 +CVE_CHECK_IGNORE += "CVE-2023-3812" + +# cpe-stable-backport: Backported in 6.1.25 +CVE_CHECK_IGNORE += "CVE-2023-38409" + +# cpe-stable-backport: Backported in 6.1.30 +CVE_CHECK_IGNORE += "CVE-2023-38426" + +# cpe-stable-backport: Backported in 6.1.34 +CVE_CHECK_IGNORE += "CVE-2023-38427" + +# cpe-stable-backport: Backported in 6.1.30 +CVE_CHECK_IGNORE += "CVE-2023-38428" + +# cpe-stable-backport: Backported in 6.1.30 +CVE_CHECK_IGNORE += "CVE-2023-38429" + +# cpe-stable-backport: Backported in 6.1.35 +CVE_CHECK_IGNORE += "CVE-2023-38430" + +# cpe-stable-backport: Backported in 6.1.34 +CVE_CHECK_IGNORE += "CVE-2023-38431" + +# cpe-stable-backport: Backported in 6.1.36 +CVE_CHECK_IGNORE += "CVE-2023-38432" + +# CVE-2023-3863 needs backporting (fixed from 6.1.39) + +# CVE-2023-4004 needs backporting (fixed from 6.1.42) + +# CVE-2023-4010 has no known resolution + +# CVE-2023-4128 needs backporting (fixed from 6.5rc5) + +# CVE-2023-4132 needs backporting (fixed from 6.1.39) + +# CVE-2023-4133 needs backporting (fixed from 6.3) + +# CVE-2023-4134 needs backporting (fixed from 6.5rc1) + +# CVE-2023-4147 needs backporting (fixed from 6.1.43) + +# CVE-2023-4155 has no known resolution + +# CVE-2023-4194 needs backporting (fixed from 6.5rc5) + +# CVE-2023-4273 needs backporting (fixed from 6.5rc5) + From patchwork Sat Aug 26 15:38:37 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29534 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F26CBC83F1A for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.10485.1693064349684774676 for ; Sat, 26 Aug 2023 08:39:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=hmHIpp5f; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-68a3ced3ec6so1519550b3a.1 for ; Sat, 26 Aug 2023 08:39:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064349; x=1693669149; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LDY9A2Cepxq6x43GnF+JwZ3HYRsCfT6k7Nj05aVNZk0=; b=hmHIpp5fnHqR+QSya88/yETk6MDg2ztLFjZbexfBdKQPHH11dChrRjDww/r0PAOUnI o4IEWpRGHUudU6Y8nRUGEEfFZDciFi0w2MtAtMyMVp8n3U2HDkzRkhnal30TLRCiIi5P AFpcTV7Xt9A3KeqVd5ZhqGYY7xzsi5WJ9RxB/pagQtNsrb/9r9PluZYLGPejI1f4C0LE V6mAxcsMORMZrgcziHcoIKBs0eRJAVNYtjAauRTjlAdVOOzmJm7L6J8ZS384Qne335nu W2QOhmOCJD4H7BqBLTaI8mMrcg406mV5AEYB9bg7JWzZT/APFXqFCgRVLjTn2lXk6kcS gx8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064349; x=1693669149; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=LDY9A2Cepxq6x43GnF+JwZ3HYRsCfT6k7Nj05aVNZk0=; b=VfIu83U8fxH3AqsZyyB7CCWMHmxm+/wc6QFvJu2HyQTxTyfSgwAen0fp4mJLy0D9UL U0StDMMo6lRCfpERqz9hPDEsM+DmeU6eTl3bWhrd6KAgHffPDWLT829d8yCJbEj32SoI k1khwqO9eTRqjWEEgm3d8hNN0eI26GIdmWiTuIdXTxps8MqjPjd15i3MLnqah/Gk5VNX ND3kU0Ah66HBYjN+H37ilKaARqh77Upz4hzzZ1GRZtd/WZJY6fNMmw8YcswL6Ug5L7x6 91n50SPPy0cpJ3nkI2kg8S3b+5RvkTcscdAL2riw5DNV9FIY/e5GwgYlkFXCfK/BsXBi flSw== X-Gm-Message-State: AOJu0Ywq3J82ouCc1psYuZ5PhKaBzfNnfK79teQFbNjdctEdEZXNLgnI 8AaZ16+dUzk8xC1hgK+ATrduXEUylcEL9diLlC4= X-Google-Smtp-Source: AGHT+IGM/0pN8zbZYNSbGirNEp102ljRr+QbLLfcNGbsd2ymmfyLV8Xy/Pv2XBWn7TkP/E//ykEcjQ== X-Received: by 2002:a05:6a20:5511:b0:140:cb66:73c0 with SMTP id ko17-20020a056a20551100b00140cb6673c0mr18543999pzb.58.1693064348746; Sat, 26 Aug 2023 08:39:08 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:08 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 06/20] librsvg: upgrade to 2.54.6 Date: Sat, 26 Aug 2023 05:38:37 -1000 Message-Id: <295eedb61d8224cc4bbb0ced1864db0a6a74ab1f.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186750 From: Chee Yang Lee update include fix for CVE-2023-38633. Signed-off-by: Chee Yang Lee Signed-off-by: Steve Sakoman --- .../librsvg/{librsvg_2.54.5.bb => librsvg_2.54.6.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-gnome/librsvg/{librsvg_2.54.5.bb => librsvg_2.54.6.bb} (97%) diff --git a/meta/recipes-gnome/librsvg/librsvg_2.54.5.bb b/meta/recipes-gnome/librsvg/librsvg_2.54.6.bb similarity index 97% rename from meta/recipes-gnome/librsvg/librsvg_2.54.5.bb rename to meta/recipes-gnome/librsvg/librsvg_2.54.6.bb index 59278d1b16..b917b76041 100644 --- a/meta/recipes-gnome/librsvg/librsvg_2.54.5.bb +++ b/meta/recipes-gnome/librsvg/librsvg_2.54.6.bb @@ -20,7 +20,7 @@ SRC_URI += "file://0001-Makefile.am-pass-rust-target-to-cargo-also-when-not-.pat file://0001-system-deps-src-lib.rs-do-not-probe-into-harcoded-li.patch \ " -SRC_URI[archive.sha256sum] = "4f03190f45324d1fa1f52a79dfcded1f64eaf49b3ae2f88eedab0c07617cae6e" +SRC_URI[archive.sha256sum] = "0ee6174140b5fc017e19a75c26e8c3324a560bf2c37f7abd3da06bd58542bb03" # librsvg is still autotools-based, but is calling cargo from its automake-driven makefiles # so we cannot use cargo class directly, but still need bits and pieces from it From patchwork Sat Aug 26 15:38:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29532 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E517EC83F19 for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web10.10487.1693064351488962700 for ; Sat, 26 Aug 2023 08:39:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=MwFHS9R4; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-68a3f1d8be2so1510086b3a.3 for ; Sat, 26 Aug 2023 08:39:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064350; x=1693669150; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=HlTO/P4SQX9J6dMaUrCpnS+GjUIpQsckBIFsA/Erscw=; b=MwFHS9R4nb4y0yDgyXKBC+JkWp/4Ga1cuFdhSLziEFTNQGUBS6yPKmgrvwQoMn/ORb RgOv1OztwSmwB2mY14W3y8L4LlvAq3GVlzqjgC0iKEprFOt8kq+cBDa4BHamh2VOOWB3 rtOeSneSw3VYSoFgxk1VFGi4VVU9O4kXPJh048BTaeQMHW47V8zlrYHipi0FVkC4S5Pd amx6OpEN8YHhFVseq3aF1a0VYACJsODRnKWhxfAbRCOj3kSgiDIk/CKY+Knx5wDWU2yh 3oRd4uJ9GFEjCdR8ubkuTCIC3CEkf3lAJXAIN6YJe4BU935nN4Y3Ng2wMkf8OASflRpq SasA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064350; x=1693669150; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HlTO/P4SQX9J6dMaUrCpnS+GjUIpQsckBIFsA/Erscw=; b=HPxUoFHKj8M152RCpZ6TNrsuFp9so0Z27zvtV8Ktg9SyZSKI/dvlgDmIIKDG3hyF3L 8SW5V7M3AqVr8NNQdn85jJLyoV9RdmQUqqOm15FX/vK9zf6klD6OmSvTjsbLL/gaaDGK GcmOABgzxOWxQryh72pReHNMdtI6irz0jwwMbfH3q6qMappZhVAi8PSh2QZrdBeNqS1G PWRsOfoxFEpIJDW17BwauKkSaM3MZqWSiZzJGoGiIIAw75q2dNX1SWpr6iAJRk2RwnGM oTm09nmcFuY17fPawUUV4+nS7yecbLwPZ8RvltEpFrSsflH/p2+zcLZnf9xiD4mSgzma xIZQ== X-Gm-Message-State: AOJu0Yw/e3zjGxIf4RjgnDESNCPc9lGhWlUDUuaX9fnsczzp17Es3vaV DsHMtiQDMLUMwNAUWswk90bjR4WzEXulTIQqV/0= X-Google-Smtp-Source: AGHT+IFoW4899mOxa606+63DnxEmX9f/YHCu6QThgsF1bho1KYYbw2zLIWwn/2dSSZ6hH5ufyVZJ+g== X-Received: by 2002:a05:6a00:850:b0:68b:a137:372b with SMTP id q16-20020a056a00085000b0068ba137372bmr15826572pfk.19.1693064350530; Sat, 26 Aug 2023 08:39:10 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 07/20] glibc: stable 2.37 branch updates Date: Sat, 26 Aug 2023 05:38:38 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186751 From: sanjana Below commits on glibc-2.37 stable branch are updated. 58f7431fd7 sparc: Fix la_symbind for bind-now 260d4b742b nptl: Fix tst-cancel30 on sparc64 3f4b4e2cdd elf: _dl_find_object may return 1 during early startup 0930ff8eb3 realloc: Limit chunk reuse to only growing requests 8dcb1a5181 hppa: xfail debug/tst-ssp-1 when have-ssp is yes Signed-off-by: sanjana Signed-off-by: Steve Sakoman --- meta/recipes-core/glibc/glibc-version.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 69e637e810..ff2b2ade9d 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.37/master" PV = "2.37" -SRCREV_glibc ?= "3593050c27dcf691f670fd3fa9d347c99351ed2f" +SRCREV_glibc ?= "58f7431fd77c0a6dd8df08d50c51ee3e7f09825f" SRCREV_localedef ?= "794da69788cbf9bf57b59a852f9f11307663fa87" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" From patchwork Sat Aug 26 15:38:39 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29531 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4EFFC83F11 for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web10.10488.1693064353126962058 for ; Sat, 26 Aug 2023 08:39:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=kaWpIPZa; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-68c0cb00fb3so1211365b3a.2 for ; Sat, 26 Aug 2023 08:39:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064352; x=1693669152; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=INM4t0YwcuCgUoopDcvgt40N4A3mUd/5gx6h1nMlUHY=; b=kaWpIPZaKG/dsEPCuedGEvLg5lG56wy9n55MNSorSW7gn6KJaLZz4x/w5+lWRbVo6L cZhszJqm0OADk0A5UnzNxb3cthVLGlNXBzgKDYL5nOD4eZUY3AN972iAAy3q5+rVV/hv RSecsBYqhftNHmtwHC8u9/SBzofKPHluVRX4eEfspgeBhOzZLQvzmCdGYaRrO5lVBZ2x TtqU0LX3VY2jbMZiRvLYxJuFt5ytjnKddTtdt6D9BMYAs/Xrfw0xmOLksU3DP6He7Jbx mvmC6LIeXKL2BfwsC8AxgiW36ggbC7aqiS2vgE6aNkNhqyujMWIKyya8NsXVI6eZ0uZk qEZw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064352; x=1693669152; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=INM4t0YwcuCgUoopDcvgt40N4A3mUd/5gx6h1nMlUHY=; b=eLDMAPj+dnvJu2Wtv6eR99Ikx3DZbdzYMLLyweNz8DJVKN2x6qjQW4uPbw6vZR9gwl 4igX19Q2kO0rwXDmiDrY0SRMmXEd/Pm5PN8VqdVqH/RSUz5eDkLQXosLQUnhbWEqi6/X 6EFr+BcjyCXX+HhtcxDRhrAIWP0UAqxpFWTAK8tgoYHlmEWyrRvCNe6Srnk82mxFnmFN HcF7YtJM+ZZevrE/wlF/p264eyLH8dyA8KT57zE9V6SK07ub6W0/ObRFJp0sHCmqTGqT ptTBk9YuOAUhNlpTrIf39k1bpc0TQpFjUHUHZZa92lPIehezJZ7xnwdZhr2q6lkDG/04 AIig== X-Gm-Message-State: AOJu0Yy7Z2CybjEB6oCCcw099Vm2frfonu1c/Y/a9vwxXzb8KHf7iSfi wUw0V9A05Mk1etNrX1FSeT+C29WXq3hI/iNsOTI= X-Google-Smtp-Source: AGHT+IExyzUGcYRa4IGadZOfE2AF7jOnDH8ksD+llHLBteJQg+2E+bSCD3AuCfzp5T5xKYvz3kfPsA== X-Received: by 2002:a05:6a00:2d83:b0:68a:366d:5ae3 with SMTP id fb3-20020a056a002d8300b0068a366d5ae3mr22299025pfb.27.1693064352257; Sat, 26 Aug 2023 08:39:12 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:11 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 08/20] python3-git: upgrade 3.1.31 -> 3.1.32 Date: Sat, 26 Aug 2023 05:38:39 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186752 From: Narpat Mali The delta between 3.1.31 & 3.1.32 contains the CVE-2023-40267 fix and other bugfixes. Changelog: https://github.com/gitpython-developers/GitPython/releases/tag/3.1.32 - Bump cygwin/cygwin-install-action from 3 to 4 by @dependabot in #1572 - Fix up the commit trailers functionality by @itsluketwist in #1576 - Name top-level exceptions as private variables by @Hawk777 in #1590 - fix pypi long description by @eUgEntOptIc44 in #1603 - Don't rely on del by @r-darwish in #1606 - Block insecure non-multi options in clone/clone_from by @Beuc in #1609 Signed-off-by: Narpat Mali Signed-off-by: Steve Sakoman --- .../python/{python3-git_3.1.31.bb => python3-git_3.1.32.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/python/{python3-git_3.1.31.bb => python3-git_3.1.32.bb} (92%) diff --git a/meta/recipes-devtools/python/python3-git_3.1.31.bb b/meta/recipes-devtools/python/python3-git_3.1.32.bb similarity index 92% rename from meta/recipes-devtools/python/python3-git_3.1.31.bb rename to meta/recipes-devtools/python/python3-git_3.1.32.bb index 08b9f66bcb..f217577eb8 100644 --- a/meta/recipes-devtools/python/python3-git_3.1.31.bb +++ b/meta/recipes-devtools/python/python3-git_3.1.32.bb @@ -12,7 +12,7 @@ PYPI_PACKAGE = "GitPython" inherit pypi python_setuptools_build_meta -SRC_URI[sha256sum] = "8ce3bcf69adfdf7c7d503e78fd3b1c492af782d58893b650adb2ac8912ddd573" +SRC_URI[sha256sum] = "8d9b8cb1e80b9735e8717c9362079d3ce4c6e5ddeebedd0361b228c3a67a62f6" DEPENDS += " ${PYTHON_PN}-gitdb" From patchwork Sat Aug 26 15:38:40 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29533 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D7CBFC83F01 for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web11.10489.1693064355048459195 for ; Sat, 26 Aug 2023 08:39:15 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=pF3eax35; spf=softfail (domain: sakoman.com, ip: 209.85.210.175, mailfrom: steve@sakoman.com) Received: by mail-pf1-f175.google.com with SMTP id d2e1a72fcca58-68c3b9f85b7so567984b3a.2 for ; Sat, 26 Aug 2023 08:39:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064354; x=1693669154; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=PRMtmoXTw/6drx9felr5cmEHL2IvoeTt7VCAblvGah0=; b=pF3eax35Ix+VIwQdhOJru6+fJWTQGGPSEJuQq1DUYVGIuknovCvQZNPT1kY0qCOh01 DzipAS2AwaYbKfN2nb0KW8o57GuT3CQFjaTVCpiI/+lOk25J36h0jLHUIuUNE0zZMSLC 9tLPuKZkfNjiGgbGoOxFprps5PsUI0Za91SGche9PnIBzY4DKHlVnyJB+jwY/CJ5i+o3 qrZDrtXLnp9kb7Fm9R53gOmqHtRoVlIBr18M3JN2Jh1VEAyrmCHNeMVln6f6R4HuoHLa NVmDMnvrwDJuM8UMbeeAoY+cdym4YdTXbcz7bPgVSVlJkcuyYyehxxCgI4ULRilJcLmb UQdw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064354; x=1693669154; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=PRMtmoXTw/6drx9felr5cmEHL2IvoeTt7VCAblvGah0=; b=CZAvqXXYSjsIVi6uVxrRJBSRW+W1UBTKfJgz0DvjNxVOn0pliHTd3m2dlKjzGxfpfJ GETkAlgstawleVlzOMrNBJq/krsAWgmVlgX5KUtMZa2LWK33/AeR66NnR0xPuVasNMkU +zdeBDs4/Srs8TOOnxooYHdHmAn/ks7tEeNwen0w1Q4SezKGA/V/j39EM14rMgcHxs9p mJtQkyJG9pIDN5jz70SGbmUrfKVSKE36qefw7nnuiDH+sRn18PZYFz+IEFvS+QPEFsAd kYNg+zlDsg8+eYp+zSv+P2EgbYWcah5GlFAwAJoUuYzN2l5ImnbX8A4ZGx1vxHKKeJmy CFug== X-Gm-Message-State: AOJu0YyiIxQvIg1B2SWvXTPwKpK8/jMJ1yZQeX2TdjdmdLb+otMeZGIz 8S45wUah4DLUQDOHpqO8npv1n9OOT9AwQTfCQEU= X-Google-Smtp-Source: AGHT+IH5Jl25xtBSW1UQWBmwpbmkC01a9KNmPGZ4sevOlrXOqwCINN6iU5naxRXACiP8Gwp/ecbVhw== X-Received: by 2002:a05:6a21:790b:b0:14b:f365:288a with SMTP id bg11-20020a056a21790b00b0014bf365288amr7868240pzc.47.1693064353985; Sat, 26 Aug 2023 08:39:13 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 09/20] file: upgrade 5.44 -> 5.45 Date: Sat, 26 Aug 2023 05:38:40 -1000 Message-Id: <6f1caa944982e265c394a554bfcfa8a105b1d698.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186753 From: Wang Mingyu Changelog: ========== -PR/465: psrok1: Avoid muslc asctime_r crash -add SIMH tape format support -bump the max size of the elf section notes to be read to 128K and make it configurable -PR/415: Fix decompression with program returning empty -PR/408: fix -p with seccomp -PR/412: fix MinGW compilation Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit facef006da35e22394a4cbb13243769586d10f31) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/file/{file_5.44.bb => file_5.45.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/file/{file_5.44.bb => file_5.45.bb} (97%) diff --git a/meta/recipes-devtools/file/file_5.44.bb b/meta/recipes-devtools/file/file_5.45.bb similarity index 97% rename from meta/recipes-devtools/file/file_5.44.bb rename to meta/recipes-devtools/file/file_5.45.bb index 3ce266475b..a7127023cb 100644 --- a/meta/recipes-devtools/file/file_5.44.bb +++ b/meta/recipes-devtools/file/file_5.45.bb @@ -13,7 +13,7 @@ DEPENDS:class-native = "bzip2-replacement-native" SRC_URI = "git://github.com/file/file.git;branch=master;protocol=https" -SRCREV = "b92eed41b1bc0739c5c5d70c444e0c574429321b" +SRCREV = "4cbd5c8f0851201d203755b76cb66ba991ffd8be" S = "${WORKDIR}/git" inherit autotools update-alternatives From patchwork Sat Aug 26 15:38:41 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29530 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D7E38C83F13 for ; Sat, 26 Aug 2023 15:39:16 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web10.10494.1693064356486711431 for ; Sat, 26 Aug 2023 08:39:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=HlVuTn8M; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-68a3082c771so1291994b3a.0 for ; Sat, 26 Aug 2023 08:39:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064355; x=1693669155; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=eUoK2EGGD6nn80Fe219q+SI0bDUBSvcWKZxk9q52pxo=; b=HlVuTn8M250wnS3Bj5kTNV2FHjB9+9zUIcs+AdBXxhY4zZN7vAF00ccQsK/sbcWCQH GKRDmjkj1yj9FH/pdbh/kwsmNgC7kfSpKblMtX4TMyXweM4kGR6i6Ba+JJyCm0lQ6tVq ApuM7kCdCJ7dRrTVI4jk2KL5hFvaehtwg3NDIEkURVP5WhjuVc3I+iCS9AKY+YF5k3hx PWTvRhtlsxYO9kiqOzah4emymlzqDYxMzJm4nt/zMyLOjaqMsQH0WjYfMVyZsyDss6WF u7khyXRLxQpez1pxg9rT9E+LSbKez4+RWzU++OHZb2oXdWzwfqArtiJT9BIAk+rT2pMi 6PrA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064355; x=1693669155; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=eUoK2EGGD6nn80Fe219q+SI0bDUBSvcWKZxk9q52pxo=; b=l3WylEP2hxclJNEoPti1sqlRQHtba1b8INMTIcVVGn0olftVkNIhWEskvH+6EYgtHQ xq+mroPDtwjTcdNnObnuOJrXTMLJXh52mgcM26J0JXAEUTVRpCrob7HzX2EGFDjYIi8d KsIKurAoRB9tpQgJ2ojG3U2ZydC8EtlHulukm14UswifGn9ZW8za2DYw8XJLPeyIXET+ mFxw06dLDLYmtxt6BNZgZIZaoN282uLjtmK/vb+Y4c98PVVLYgvjV4UqGfK2nt9SnyMX 3Nnn/BzG++emUWdklQK5tOMiScNZ0Dqkr9OiK1pEZzxS7CrqBCvjBrfadqnpkk/nFY4y Maew== X-Gm-Message-State: AOJu0YzIjYnBDI+kJ9Zz0+WqSohz1EqU6CMbP7ZtaXxB7KPohNjEzAu1 a6+eillL/27NPkX5ZKOfwtR+0thbCz6KpnfDd+g= X-Google-Smtp-Source: AGHT+IEfWVq+HLhNNcqBy/0/tJRp5kS6klOMOFssSs/5wNKCOPMGigVhPc7qYAr/uh0XU7ZsZLKWDg== X-Received: by 2002:a05:6a20:9185:b0:148:9ce9:2f2a with SMTP id v5-20020a056a20918500b001489ce92f2amr28931735pzd.8.1693064355552; Sat, 26 Aug 2023 08:39:15 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 10/20] gtk4: upgrade 4.10.4 -> 4.10.5 Date: Sat, 26 Aug 2023 05:38:41 -1000 Message-Id: <168bab3ea6a4581f320e2eb7360f6a98f256d3d6.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186754 From: Markus Volk Overview of Changes in 4.10.5, 05-08-2023 ========================================= * Fix ordering problems with filter model signals * Avoid lingering resize cursors * Fix alignment issues on sparc * Fix a problem with CSS corner values * Translation updates Brazilian Portuguese Czech Greek Spanish Vietnamese Signed-off-by: Markus Volk Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 99deaf528acdd8ef7031e251a821721191968644) Signed-off-by: Steve Sakoman --- meta/recipes-gnome/gtk+/{gtk4_4.10.4.bb => gtk4_4.10.5.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-gnome/gtk+/{gtk4_4.10.4.bb => gtk4_4.10.5.bb} (98%) diff --git a/meta/recipes-gnome/gtk+/gtk4_4.10.4.bb b/meta/recipes-gnome/gtk+/gtk4_4.10.5.bb similarity index 98% rename from meta/recipes-gnome/gtk+/gtk4_4.10.4.bb rename to meta/recipes-gnome/gtk+/gtk4_4.10.5.bb index 2d1e0e74a9..85fff6c61e 100644 --- a/meta/recipes-gnome/gtk+/gtk4_4.10.4.bb +++ b/meta/recipes-gnome/gtk+/gtk4_4.10.5.bb @@ -37,7 +37,7 @@ MAJ_VER = "${@oe.utils.trim_version("${PV}", 2)}" UPSTREAM_CHECK_REGEX = "gtk-(?P\d+\.(\d*[02468])+(\.\d+)+)\.tar.xz" SRC_URI = "http://ftp.gnome.org/pub/gnome/sources/gtk/${MAJ_VER}/gtk-${PV}.tar.xz" -SRC_URI[sha256sum] = "7725400482e0685e28265e226c62847f4e73cfca9e9b416ac5838207f5377a24" +SRC_URI[sha256sum] = "9bd5e437e41d48e3d6a224c336b0fd3fd490036dceb8956ed74b956369af609b" S = "${WORKDIR}/gtk-${PV}" From patchwork Sat Aug 26 15:38:42 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29536 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CE6DEC83F19 for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-oi1-f173.google.com (mail-oi1-f173.google.com [209.85.167.173]) by mx.groups.io with SMTP id smtpd.web11.10491.1693064358292612773 for ; Sat, 26 Aug 2023 08:39:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=FvvBlL5b; spf=softfail (domain: sakoman.com, ip: 209.85.167.173, mailfrom: steve@sakoman.com) Received: by mail-oi1-f173.google.com with SMTP id 5614622812f47-3a9b342c398so953956b6e.3 for ; Sat, 26 Aug 2023 08:39:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064357; x=1693669157; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=l6rE9kHhbwoZfeYjUo2WIrkAmnonFHHHZTB6PxyFyaw=; b=FvvBlL5btZ920s+Jli67TRlNh7AQoHIgHSL+72j9sU1u331As72Hz3AQyN57HTgpnF QDUm1LiEBvFGKcQZYE9ux5yXfIM/0qQO0CnPmHTwiW7QdXyx8v7yd7nSZhNEm+NjGrSH hSko6/L+v8E6l9hFahvhGTkphhR5Zb395hFpf8zFE0TKs88UQeXhGRBmDvjMn9+jST0V 5vij3/31Cl647FitDY6F6s7lIr/9LhWHqcyt8n0Dl+vKDSeDEdtsmWywbVk5fduVoa0+ 3h8GD1dHkPQMgI71f1AsFkHm9Dt2xGAX2MWO1RJSG1ZE/f1v+IKW4olUDyfiL8CXyuPA 5bmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064357; x=1693669157; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=l6rE9kHhbwoZfeYjUo2WIrkAmnonFHHHZTB6PxyFyaw=; b=XLH684qcIcgbOfoRO4nsVqODq1JC+pcYdnYR1zeLK8rkcjnOE+5dHwCq11//dS6PQY OVgZlwphEC7PaW/cUnuAeF4jfwI3FXkTFIPyJENGBLXLQFsHe9pbzdIDb3ewcWDNFRfZ bVrpVFLkTM5WsEt+LhHhrbA/2gFhUR9EtpLvsIBv2lU8gnHaidOevPKkM/own7UiWmHw lF7ZH7aKavYznczSiPvf4GXx7WjVUrYy5uSTfN9rwpw588pmebB9RD6puDTEFtnXmreC RPeIn8KoTrpsc47VRaJlziNHtjZz5VrmzJRoyhiHRf5kwKx3C7yJR9jWUiT5HR+JCT2n FENA== X-Gm-Message-State: AOJu0YyvhCvy5RBHWyjKN7Tq3FX0pXZ+Zo4QyFNX65XpglAFSyj0QBt0 6H6Sukjb8ZAARhRARjAGb0C3CZXZeA5MvYTzQtY= X-Google-Smtp-Source: AGHT+IE/vOsVfaveDP7ml7+A80OZG1gWRhR1pmcFRHNtoLPSSyAHSmy4xI/JFByrjk12pz7b2w/ARA== X-Received: by 2002:a05:6808:188f:b0:3a7:541c:805c with SMTP id bi15-20020a056808188f00b003a7541c805cmr7401472oib.24.1693064357300; Sat, 26 Aug 2023 08:39:17 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:16 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 11/20] openssl: Upgrade 3.1.1 -> 3.1.2 Date: Sat, 26 Aug 2023 05:38:42 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186755 From: Peter Marko https://github.com/openssl/openssl/blob/openssl-3.1/NEWS.md#major-changes-between-openssl-311-and-openssl-312-1-aug-2023 Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [1 Aug 2023] * Fix excessive time spent checking DH q parameter value (CVE-2023-3817) * Fix DH_check() excessive time with over sized modulus (CVE-2023-3446) * Do not ignore empty associated data entries with AES-SIV (CVE-2023-2975) * When building with the enable-fips option and using the resulting FIPS provider, TLS 1.2 will, by default, mandate the use of an extended master secret and the Hash and HMAC DRBGs will not operate with truncated digests. Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit e65802383b02df6f502af859a927309d881bbb27) Signed-off-by: Steve Sakoman --- .../openssl/{openssl_3.1.1.bb => openssl_3.1.2.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-connectivity/openssl/{openssl_3.1.1.bb => openssl_3.1.2.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl_3.1.1.bb b/meta/recipes-connectivity/openssl/openssl_3.1.2.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.1.1.bb rename to meta/recipes-connectivity/openssl/openssl_3.1.2.bb index 432ab4032b..d55695dba4 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.1.1.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.1.2.bb @@ -18,7 +18,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "b3aa61334233b852b63ddb048df181177c2c659eb9d4376008118f9c08d07674" +SRC_URI[sha256sum] = "a0ce69b8b97ea6a35b96875235aa453b966ba3cba8af2de23657d8b6767d6539" inherit lib_package multilib_header multilib_script ptest perlnative MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" From patchwork Sat Aug 26 15:38:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29540 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DF6D0C83F1A for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web10.10496.1693064359992091364 for ; Sat, 26 Aug 2023 08:39:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=C/jz1D+I; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-68c0d262933so960068b3a.0 for ; Sat, 26 Aug 2023 08:39:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064359; x=1693669159; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZGK8Dvp10+XZV+LYZVv2Ql3ynP3MHgoDRnMd5n0i2R8=; b=C/jz1D+IlUvit85C0mmA9ZF9kFaFGnAYmqIy+1oFA6EWMIan/wjXPrr/ZJ9rY+KlHF 4Y1tZOvsX3SGqGg1ZpN3FgzkBLAksVhUDbJ69lDDkbIJP8t83oVptHTl+T135Cf88R0J AJJq/AeQErm7F4uIJRBomF/TYAJKZaCxECq2e5vZSnSVNbaLwvgTxDP2U9cCkK9qbifY 6uXID/ECSLKFH19QwI6g4x+OCVMg++k30oCUbnRFzo+Chw44yCbg/7ypsSH6sghTyKN/ XfrPXqn6v9haSn0+pFq+m4ANkwSuIT4OYX36727yFaXWrL2vzxMdkqAexrjXT+6m0n+3 TovQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064359; x=1693669159; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZGK8Dvp10+XZV+LYZVv2Ql3ynP3MHgoDRnMd5n0i2R8=; b=Krlqmo/CnXvLSLXw9dM1kcmqc6B6fhmZW9hS0tNtZYVaU7QQ6rXotn9hdKR/M7deIP wESDUWxp3e+8b7cyGJSJiddA7Qs2bZc6+7klShcjbI/hY6NS9cFL65cDMcWj8tj78M2H H9C/zg/WL6HNomWQaAMt2XlSreitHAzeWOkb1g04Flzl1dHdnYWaj21q/hVttzmyQW+V OO1vEcU3iZE8Y02+bvAoXitP7xP8oG4wfL+tOyxDFtW7q2v1u46ariqMey7uejqAP0M6 E17nggWn0hNmF1GS0fkSE1nkAKx1jNS886MrDQer863CVZb5fZqUi6L/h1oFzx8KJH6w UcUQ== X-Gm-Message-State: AOJu0Yy/i3lbN8CYxH8IgfBPZqTgPoyZDHFA+lpA0ODAvHqhkqtmV0cB 5VdsxLrx/EdnNhxp6HAcuH56Ztd944ULI3nqSDU= X-Google-Smtp-Source: AGHT+IHBb0dZh6dKbHtewZM5z7kAPFaKSLqzbU2WWg4RWlmwqQ34+Xd4YBxd2EN6vMvodK0qdtN4Gg== X-Received: by 2002:a05:6a00:b83:b0:68c:111:3adf with SMTP id g3-20020a056a000b8300b0068c01113adfmr5821608pfj.22.1693064358871; Sat, 26 Aug 2023 08:39:18 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:18 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 12/20] pseudo: Fix to work with glibc 2.38 Date: Sat, 26 Aug 2023 05:38:43 -1000 Message-Id: <387b276c2d56d58c2a25d59984fcaaf9c88ac788.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186756 From: Richard Purdie This adds a horrible hack to get pseudo working with glibc 2.38. We can't drop _GNU_SOURCE to something like _DEFAULT_SOURCE since we need the defines the gnu options bring in. That leaves using internal glibc defines to disable the c23 versions of strtol/fscanf and friends. Which would break pseudo build with 2.38 from running on hosts with older glibc. We'll probably need to come up with something better but this gets glibc 2.38 and working and avoids autobuilder failures. Signed-off-by: Richard Purdie (cherry picked from commit 596fb699d470d7779bfa694e04908929ffeabcf7) Signed-off-by: Steve Sakoman --- .../pseudo/files/glibc238.patch | 72 +++++++++++++++++++ meta/recipes-devtools/pseudo/pseudo_git.bb | 1 + 2 files changed, 73 insertions(+) create mode 100644 meta/recipes-devtools/pseudo/files/glibc238.patch diff --git a/meta/recipes-devtools/pseudo/files/glibc238.patch b/meta/recipes-devtools/pseudo/files/glibc238.patch new file mode 100644 index 0000000000..76ca8c11eb --- /dev/null +++ b/meta/recipes-devtools/pseudo/files/glibc238.patch @@ -0,0 +1,72 @@ +glibc 2.38 would include __isoc23_strtol and similar symbols. This is trggerd by +_GNU_SOURCE but we have to set that for other definitions. Therefore play with defines +to turn this off within pseudo_wrappers.c. Elsewhere we can switch to _DEFAULT_SOURCE +rather than _GNU_SOURCE. + +Upstream-Status: Pending + +Index: git/pseudo_wrappers.c +=================================================================== +--- git.orig/pseudo_wrappers.c ++++ git/pseudo_wrappers.c +@@ -6,6 +6,15 @@ + * SPDX-License-Identifier: LGPL-2.1-only + * + */ ++/* glibc 2.38 would include __isoc23_strtol and similar symbols. This is trggerd by ++ * _GNU_SOURCE but we have to set that for other definitions. Therefore play with defines ++ * to turn this off. ++ */ ++#include ++#undef __GLIBC_USE_ISOC2X ++#undef __GLIBC_USE_C2X_STRTOL ++#define __GLIBC_USE_C2X_STRTOL 0 ++ + #include + #include + #include +Index: git/pseudo_util.c +=================================================================== +--- git.orig/pseudo_util.c ++++ git/pseudo_util.c +@@ -8,6 +8,14 @@ + */ + /* we need access to RTLD_NEXT for a horrible workaround */ + #define _GNU_SOURCE ++/* glibc 2.38 would include __isoc23_strtol and similar symbols. This is trggerd by ++ * _GNU_SOURCE but we have to set that for other definitions. Therefore play with defines ++ * to turn this off. ++ */ ++#include ++#undef __GLIBC_USE_ISOC2X ++#undef __GLIBC_USE_C2X_STRTOL ++#define __GLIBC_USE_C2X_STRTOL 0 + + #include + #include +Index: git/pseudolog.c +=================================================================== +--- git.orig/pseudolog.c ++++ git/pseudolog.c +@@ -8,7 +8,7 @@ + */ + /* We need _XOPEN_SOURCE for strptime(), but if we define that, + * we then don't get S_IFSOCK... _GNU_SOURCE turns on everything. */ +-#define _GNU_SOURCE ++#define _DEFAULT_SOURCE + + #include + #include +Index: git/pseudo_client.c +=================================================================== +--- git.orig/pseudo_client.c ++++ git/pseudo_client.c +@@ -6,7 +6,7 @@ + * SPDX-License-Identifier: LGPL-2.1-only + * + */ +-#define _GNU_SOURCE ++#define _DEFAULT_SOURCE + + #include + #include diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index c3c4bb0ed9..9260a3faa3 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -2,6 +2,7 @@ require pseudo.inc SRC_URI = "git://git.yoctoproject.org/pseudo;branch=master;protocol=https \ file://0001-configure-Prune-PIE-flags.patch \ + file://glibc238.patch \ file://fallback-passwd \ file://fallback-group \ " From patchwork Sat Aug 26 15:38:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29537 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4742C83F1B for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web11.10495.1693064361311271710 for ; Sat, 26 Aug 2023 08:39:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=Mazzza+L; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-68bedc0c268so1701342b3a.0 for ; Sat, 26 Aug 2023 08:39:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064360; x=1693669160; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=cAZW+X7dZ5Oj2FpfHZd0scHi0L1J5ZvKInvgO5fE7ig=; b=Mazzza+LWBtJwO47y3wgfzHVFCqUcRFrmwFOHcrbAbnE5xLy27ANHrU1EcVz/0LOEm vrtwo9bBX1fc0ap7ZkCHVpnl+TVHVdg0wjVej+jqBNmuq+f4CXz4ZBdHhYbrkc/J6nMc PMxbve0v+CGU+0FF1xi1BKwPga87rphNDr8oO/ToLrWnDlBZMOdJEZCeM9LrVw0d/xdk wc+yfz4lsbWYlJ9errqy4aeQRMPkUkFmtr0eGfjDcFFhMDEGvdpONb3iUSNykhuKN5kP grd/Jd0D9VnOXdrvjDeTRCS1JAQUzrf3i/54W78fHlw7SNfKFrAkVp1hDfCcJ8ASK6qJ ftiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064360; x=1693669160; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cAZW+X7dZ5Oj2FpfHZd0scHi0L1J5ZvKInvgO5fE7ig=; b=VVgLM6BLzkdXEui7KW7wt2bU58g54sfXMgpO3tYZtGE9YBdsG88843lCVR1vcDz/27 A7mJwezSSBpPY9o3QNJ/4zYsU3NBDcPPIeqSZxYQC86HLSxERB6VUWSogRYBaq/2bzVe dUlJUCCQ8M6L78py/4EOBIzE84TA1aobDB/LJ4A5945kqNLG8BPQZZuCv7BhHwN+dRnA Y4ftXXflNqIG9TQihR/keVImKnYLK67zPgU7syFbesJXx3e1os+isVuKZuKs1w46NWfC aHf24zi0/wd+zcxH+y3agq5+bVv38IBVMn3obMkLPemoWRkoKi0uvD+pMrG5NiuqAQzH jYUg== X-Gm-Message-State: AOJu0YyckvdVgHB56Dza1CMzHMrCxlO5dOUtPJeFa8/Oq3Jfrj1B2D14 9nZTara63du0kcfzYgjlrsn9EDDZenhadQRNod0= X-Google-Smtp-Source: AGHT+IF58Ynb7Z8GFaau5QmlaMP/hTmBOKupAA5b+oB8OWC1jfxGUPBUTNDiaJVHdfezpCHnR1+mnw== X-Received: by 2002:a05:6a21:6da5:b0:138:64d4:b055 with SMTP id wl37-20020a056a216da500b0013864d4b055mr27467563pzb.55.1693064360479; Sat, 26 Aug 2023 08:39:20 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 13/20] yocto-uninative: Update hashes for uninative 4.1 Date: Sat, 26 Aug 2023 05:38:44 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186757 From: Michael Halstead This version includes fixes to patchelf. Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie (cherry picked from commit 1c5c8ff97ba0a7f9adc592d702b865b3d166a24b) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/yocto-uninative.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index ad4816a1f3..b3bd7794fb 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -7,9 +7,9 @@ # UNINATIVE_MAXGLIBCVERSION = "2.37" -UNINATIVE_VERSION = "4.0" +UNINATIVE_VERSION = "4.1" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "7baa8418a302df52e00916193b0a04f318356d9d2670c9a2bce3e966efefd738" -UNINATIVE_CHECKSUM[i686] ?= "83114d36883d43a521e280742b9849bf85d039b2f83d8e21d480659babe75ee8" -UNINATIVE_CHECKSUM[x86_64] ?= "fd75b2a1a67a10f6b7d65afb7d0f3e71a63b0038e428f34dfe420bb37716558a" +UNINATIVE_CHECKSUM[aarch64] ?= "b6ff9171aa7d3828bc81197822e804725908856bbd488bf412121cc0deddcb60" +UNINATIVE_CHECKSUM[i686] ?= "6354fd2e09af1f111bad5e34ce7af4f9ad7cd266188af7eeceaeb982afd5354b" +UNINATIVE_CHECKSUM[x86_64] ?= "f83eca543170adfd2432b135ca655922a4303622d73cc4b13e92b973cdf49e3a" From patchwork Sat Aug 26 15:38:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29538 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5C5FC83F13 for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web11.10496.1693064363296796004 for ; Sat, 26 Aug 2023 08:39:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=vxx2yMMt; spf=softfail (domain: sakoman.com, ip: 209.85.210.175, mailfrom: steve@sakoman.com) Received: by mail-pf1-f175.google.com with SMTP id d2e1a72fcca58-68a410316a2so1455667b3a.0 for ; Sat, 26 Aug 2023 08:39:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064362; x=1693669162; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=23NeLciyWMSs0mANQXVWfRZf8zN8Jmtxql9mGq5ClTQ=; b=vxx2yMMtepDKQuk81qvj1og58LmJh/BGGPyDSp7dOKy9NVob6OrADCfSSE3/LNk87U f7tz5Ndn88oyaDNad2CnHgK/l8tYtRBEnPBfX2wAnciUEOZhrItzXKmk+byAE4UErAgM cckUn3WpTOiznm3tHlFtk8o4PDQfh7cwbnMDr3xFnf/R58W72qa6PHlot25f7Ag7TRPe Q/XQO09I/pg2iXxdBEyw3nhXx1JWckvHIfoA4NzbOaShB6IijKJAiDODkRvULvnoILHU f/CYWVwBQnhnZJlMoOZ5ncgpNg1i8YK/rKA5tm5+mXfVreoMThA87FiVjM604yZeFf4U ElUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064362; x=1693669162; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=23NeLciyWMSs0mANQXVWfRZf8zN8Jmtxql9mGq5ClTQ=; b=HOb61cI4YBTZvt8VLgpM0HKU04bAeZztYBQjVGayBdtb4z+pMvpo1T2Me8KTxbK4sc lGS/HUYFtQVO8lxpubgWqjj5fKPUJY8uGRXcK0WyeGIJDVa4Gk0PPtE56mx/KIMiAC7h /W+eC2XKI5KBuh7nxqkUm3PwhNupdPShFP7LW6PPq+P4mOuVjfD+iCAII//TNDsMOsA7 Hb/e1maR+7RyxC8hntxK3ohdrocVtLMfjgR8CZ3y2FGiEo0D1rujBQtzs8+LPFT+pFpx e9yRmuYB93zGN6YWl0BkJeXsbkLqw4IeRlZPmI4TkxoM3d70UyKLbsIZ0AHAoJ5ad2MJ wXNw== X-Gm-Message-State: AOJu0YwVjX9T3nco0CDi5pTUjDbelEiEoCyrQrXGVvRx0v6bF0n+AMVf zN4zes6vI+Mj5gsJxH7r1FwaUdu51/DU+HClFJg= X-Google-Smtp-Source: AGHT+IFZEETNBnhZqoOh+2Anls78AcMDwrH/awEDH3qxnBxIacbyY6NkN8neQdu3JvQHwvGaHUabvg== X-Received: by 2002:a05:6a00:80d4:b0:68c:3f20:5e8b with SMTP id ei20-20020a056a0080d400b0068c3f205e8bmr944702pfb.15.1693064362249; Sat, 26 Aug 2023 08:39:22 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:21 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 14/20] yocto-uninative: Update to 4.2 for glibc 2.38 Date: Sat, 26 Aug 2023 05:38:45 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186758 From: Michael Halstead Uninative 4.2 adds glibc 2.38. Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie (cherry picked from commit c6654fab00a1b4e4bb05eec8b77c8c60e1f8a709) Signed-off-by: Steve Sakoman --- meta/conf/distro/include/yocto-uninative.inc | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index b3bd7794fb..6596c0f4a2 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -6,10 +6,10 @@ # to the distro running on the build machine. # -UNINATIVE_MAXGLIBCVERSION = "2.37" -UNINATIVE_VERSION = "4.1" +UNINATIVE_MAXGLIBCVERSION = "2.38" +UNINATIVE_VERSION = "4.2" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "b6ff9171aa7d3828bc81197822e804725908856bbd488bf412121cc0deddcb60" -UNINATIVE_CHECKSUM[i686] ?= "6354fd2e09af1f111bad5e34ce7af4f9ad7cd266188af7eeceaeb982afd5354b" -UNINATIVE_CHECKSUM[x86_64] ?= "f83eca543170adfd2432b135ca655922a4303622d73cc4b13e92b973cdf49e3a" +UNINATIVE_CHECKSUM[aarch64] ?= "cff40e7bdde50aeda06707af8c001796a71b4cf33c5ae1616e5c47943ff6b94e" +UNINATIVE_CHECKSUM[i686] ?= "a70516447e9a9f1465ffaf1c7f89e79d1692d2356d86fd2a5a63acd908db1ff2" +UNINATIVE_CHECKSUM[x86_64] ?= "6a86d71eeafba4fefec600c9bf8cf4a01324d1eb52788b6e398d3f23c10d19fb" From patchwork Sat Aug 26 15:38:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29539 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CE6BFC83F01 for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-oi1-f176.google.com (mail-oi1-f176.google.com [209.85.167.176]) by mx.groups.io with SMTP id smtpd.web10.10500.1693064364935247174 for ; Sat, 26 Aug 2023 08:39:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=bTHoueg5; spf=softfail (domain: sakoman.com, ip: 209.85.167.176, mailfrom: steve@sakoman.com) Received: by mail-oi1-f176.google.com with SMTP id 5614622812f47-3a8614fe8c4so1366871b6e.1 for ; Sat, 26 Aug 2023 08:39:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064364; x=1693669164; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vIERuWv1SBEnnQXDlrpopvOpAgl0SZR7S5FfK0s+Hro=; b=bTHoueg5YNjGLFWDRgteUliWf5eZH9vb9hCae4XLgLcrDtjMuucKIBTH4NzeNd8GAZ AZvbXbFgwivqHIszyPYoT3nTquJfrqSbak6GTNSQm8f/AbE2w+b4Pi3ICxHC80qEJsnO NSeOm4JDKiEHNryHm6xmL7BkxYVsvDOlEeWDCIyt3BwwKstuZF+P5sVye/t3fgYnb5D4 Pcq4HkGnHeF/DFKDoIZuWQrtuHoa1C2cD8BDGNCTeSwBDixnTtipCIKGwhek0X8+u9Xx 9go+z9mNa2v03HF+xA5xkeW/q8AHr5Zw2PlH0PFwXQhUwoCb/MHmUo9ifV8jWXWGCvmx CgRA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064364; x=1693669164; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vIERuWv1SBEnnQXDlrpopvOpAgl0SZR7S5FfK0s+Hro=; b=ZQTv9iOH3HdHoTRBy+R5rHfLDvnhcuXTQk3U7EFK/y/majgQ3fvtg9tX0AOrqQ3U8p MH98ndEUp86IhJYtgcwLF63gZAczgrYDlRdsRqrnaknGSYyeiubJKF8Rd8gxLdrKbdqs DF9pE686xmLvV45xXrz1q9ULNBxm0oNx0IrH2sa8+BrNIE7yyUHcfwUhhTGLkUefQsbe SgdUil1BUnQsT0vDNl8eiqAKGQQXZ+qZMeLoRDkw08zaA5SuLNtZPyJo/q6FUlsIzhxX JtEUsOExE5ESGcwVXLlNWjuKWCRyRgHM3MkfFfUuaDKDQ6BegTYeVw1/HzXyJl6tKHgG E/Gw== X-Gm-Message-State: AOJu0Yyns4oNFlZq4n03XGqICDbzv712d28ncJYG+7gra4z0QFHaWleI G3bA/ktZnU8Nwj4c2DOfqFNO3/zZqEQogvmi81w= X-Google-Smtp-Source: AGHT+IEg0ihB0HmzKEwn9WN0nEPPg9tep9Z4ziKF206AV4ajt2yJR2HCvQnjYG4XrtlnrPkc0qxbLg== X-Received: by 2002:aca:1719:0:b0:3a4:4b42:612b with SMTP id j25-20020aca1719000000b003a44b42612bmr5855127oii.42.1693064363917; Sat, 26 Aug 2023 08:39:23 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:23 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 15/20] lib/package_manager: Improve repo artefact filtering Date: Sat, 26 Aug 2023 05:38:46 -1000 Message-Id: <96954ff5ea258e8456c66bfa13a11fb4fe7a3808.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186759 From: Richard Purdie If you run an arm build followed by an x86 one and then ask for a full repo to be created, it will include all of the arm and x86 packages. testexport will then find the arm socat package rather than the x86 one and try and run arm binaries within an x86 qemu image with no success. The reproducer for this was: oe-selftest -r fitimage.FitImageTests.test_initramfs_bundle runtime_test.TestImage.test_testimage_install This patch only symlinks in the compatible package archictures rather than all of them which fixes the failure and the resulting autobuilder intermittent failure too. [YOCTO #15190] Signed-off-by: Richard Purdie (cherry picked from commit 30b45bcf49bf8207fd96bb45a55d7708661f3359) Signed-off-by: Steve Sakoman --- meta/lib/oe/package_manager/__init__.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/meta/lib/oe/package_manager/__init__.py b/meta/lib/oe/package_manager/__init__.py index 0c313190cf..6774cdb794 100644 --- a/meta/lib/oe/package_manager/__init__.py +++ b/meta/lib/oe/package_manager/__init__.py @@ -470,7 +470,10 @@ def create_packages_dir(d, subrepo_dir, deploydir, taskname, filterbydependencie # Detect bitbake -b usage nodeps = d.getVar("BB_LIMITEDDEPS") or False if nodeps or not filterbydependencies: - oe.path.symlink(deploydir, subrepo_dir, True) + for arch in d.getVar("ALL_MULTILIB_PACKAGE_ARCHS").split() + d.getVar("ALL_MULTILIB_PACKAGE_ARCHS").replace("-", "_").split(): + target = os.path.join(deploydir + "/" + arch) + if os.path.exists(target): + oe.path.symlink(target, subrepo_dir + "/" + arch, True) return start = None From patchwork Sat Aug 26 15:38:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29535 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C7962C83F11 for ; Sat, 26 Aug 2023 15:39:26 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web11.10498.1693064366648491775 for ; Sat, 26 Aug 2023 08:39:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=ksAt2jXs; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-68c0d886ea0so1058614b3a.2 for ; Sat, 26 Aug 2023 08:39:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064366; x=1693669166; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=XwJoO2EZyin7YDsYRHesJzfy7OjLeuM5W0jBfkOugf0=; b=ksAt2jXs3RN2Bp7kKroTZxXWPYcQZ8OcKxSV6jrnJuQ9n11ZqhpoKjwgpgmVkvsIc6 fq1lgiXUoBsN/hlEunbFTuroiN/S+KJDCaAnp23wlUmSfdRHA7X2RAhWj+jmR8/ryaOw vHW4t9xM2OjZ/79j5KIbMj3G4h4rDdUSpy135SaAHDa609l/9qAwiOfymrgrQSjx/mLR XXddMQM8UcxxNiB8ere1WRomoRgyQftEO+Q72E52wOe7VZcQSbd8ZoLW54s+qNQNe429 FZpdaMU4iSfdQfybEX3p2Um0YD/v74LLJ3KssPaRqxGlMNWFOMjdoE0Md2fHXKHHeQ8i 5a5A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064366; x=1693669166; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=XwJoO2EZyin7YDsYRHesJzfy7OjLeuM5W0jBfkOugf0=; b=Z5n/wHLMOsnanNDF0kWHunY5NYa+E/mspo7shIHYlicArgSpiQA+LQeGcJ49F3hdUk +c0CUX6z98GPs6QiO4/wfMbPvAumLt66dEc7CT177VfcWeEpx/rb7GdVKRFzSg4K2hHW bxRWDXOr4sNPodkn/re1xxjGZjVS9FoVln/XtbI9gKJ4Sq7RDrBzsfjlg/6/IFoYFcNd HYmavAxxBUO7menF7ek0m0Nlpr0C0wC7JLI/5/BwjdV2Xx1usMgKzrB0q1Yvq+Z3TDpC j9GhFv+zqdJQ4aiYeyJMJnjMvkYCdmvKYwOw/S2/hUYdTMbqvp5IzNfni5YcEVkCq9pI BqYw== X-Gm-Message-State: AOJu0YyB1zHv6ohlspg0vLcajlP6VYO+heq6bOk/k0x1BDQsykZDrUWM ycpyD8GOtHYuXzje3YVRDPQqoUw8gcU9ITYFZP4= X-Google-Smtp-Source: AGHT+IFJ4xF5la9EayA7tLg+Hzb0Op2EpyzzC4DXwjitOhquV6Jqm+wlu1rdvSt647t/rkYHSQaCuw== X-Received: by 2002:a05:6a00:248b:b0:68b:c423:fb1f with SMTP id c11-20020a056a00248b00b0068bc423fb1fmr12236213pfv.17.1693064365625; Sat, 26 Aug 2023 08:39:25 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:25 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 16/20] gnupg: Fix reproducibility failure Date: Sat, 26 Aug 2023 05:38:47 -1000 Message-Id: <8224e8cf402966a1108fe7035da9ed463f3d976a.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186760 From: Richard Purdie yat2m can be found within the build or from the recipe-sysroot-native if runtime dependencies are present. The sysroot version has version differences to the in tree copy. Specify the one we want to make the build determinstic. Signed-off-by: Richard Purdie (cherry picked from commit 1feb5274db6e985e10f58359b148dabb4076917a) Signed-off-by: Steve Sakoman --- meta/recipes-support/gnupg/gnupg_2.4.2.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-support/gnupg/gnupg_2.4.2.bb b/meta/recipes-support/gnupg/gnupg_2.4.2.bb index 580782037e..631df8ac9d 100644 --- a/meta/recipes-support/gnupg/gnupg_2.4.2.bb +++ b/meta/recipes-support/gnupg/gnupg_2.4.2.bb @@ -33,6 +33,8 @@ EXTRA_OECONF = "--disable-ldap \ --with-mailprog=${sbindir}/sendmail \ --enable-gpg-is-gpg2 \ " +# yat2m can be found from recipe-sysroot-native non-deterministically with different versioning otherwise +CACHED_CONFIGUREVARS += "ac_cv_path_YAT2M=./yat2m" # A minimal package containing just enough to run gpg+gpgagent (E.g. use gpgme in opkg) PACKAGES =+ "${PN}-gpg" From patchwork Sat Aug 26 15:38:48 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29542 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D3245C83F11 for ; Sat, 26 Aug 2023 15:39:36 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.10500.1693064368127550235 for ; Sat, 26 Aug 2023 08:39:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=D1NCAKO9; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-68a3082c771so1292033b3a.0 for ; Sat, 26 Aug 2023 08:39:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064367; x=1693669167; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QCvmfm/ef0HZZWULgXpsNvUfezdVc6RHBMdaGYL3eew=; b=D1NCAKO9aEsbhvX1KKeFFKyZ8QgWztrnoqx/hTvPMwxuRGdXKpZhwssujhBuuxZi6g 8lLZpsR0txFkfCsb/oeklllXEe+D2e2UEaNB1UU4dSUNyM2mj/KkebliXRj5CzQEpBXS N1JMI0DNMvOHFLRjmuxsdym1ggdvp5yZLfP8bxTfV9k+F5Ebm3j1LlEeYses9pQrilKi VxiAQxrjFWlqnwdtmKsilt/aKxvZaKdFKhE1GfaltyTcr1lkSokJWFfLxwUqM0UuhS3Y /azc49ROhVQ+F1y8CkAkWJJ4y4C32qvcQIYGntE60hy3xTi3f3vYOgxq1uUJ3JkZqVdO lrvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064367; x=1693669167; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=QCvmfm/ef0HZZWULgXpsNvUfezdVc6RHBMdaGYL3eew=; b=ghUjkelrGLn0xZi9MZ8zMzDj6/0nX1yKtwWX77kgqwHMD2/CRruWIQpQNK+tRZwub5 S1hIHvNHOdYWin7Z0s4IcQwpF5QzQQh95QINWAJp9oIkKATgaWdXGLqFcv/egGbA0fvo 1FSuwazjpxSoxHJg/DqRB3+FMMNJtRRHF96aXdv8U3sYlbEyJHEJsgNUzSvxKP+Z5ht0 h4/gkAxdtB3dp7cb3PDPoX5PxsJOWrxwovna9IS5DDwEsE0JscexZXSzBthJtFq4Beyi W4cj1oHmELgpe9YviRbcogtWuGsbIph8BUgdEbsr1XnGYWihoMRu48vnnCVrH+08DmFR VM5w== X-Gm-Message-State: AOJu0YzOhte8DaRFRW9RWAkaMgdHeXOQnB35w5YaqJE2hR2oD3kn2gLE QW2/ddmhj7blF4ReoeGe41oe7wUtdyNKasYupcw= X-Google-Smtp-Source: AGHT+IE4kKYJnol8e9PzFBmWAl6EtrD0Q/ztJxAd+H4uyoWfhYCh2MCi4OeosHHhkiuyHpeNa931RA== X-Received: by 2002:a05:6a20:8411:b0:13e:b6b0:72a2 with SMTP id c17-20020a056a20841100b0013eb6b072a2mr34121068pzd.6.1693064367220; Sat, 26 Aug 2023 08:39:27 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:26 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 17/20] externalsrc: fix dependency chain issues Date: Sat, 26 Aug 2023 05:38:48 -1000 Message-Id: <18d0ace2d7becf2a1588d2d2b7ca0f6f2108b64f.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186761 From: Peter Suti Instead of deleting setscene tasks, now SSTATE_SKIP_CREATION is set instead. This seems to fix the compile issues where the populate_sysroot task was not run when an externalsrc recipe was built as a dependency. [YOCTO #15164] [RP addition: The deltask was added by me in 2012 when the class was created. The trouble is bitbake assumes 'sstate' tasks have a setscene task and by deleting the setscene task, bitbake stops thinking the task can be accelerated. There is other code in the sysroot code which assumes some tasks are always sstate tasks. We cannot delete the task without changes to the way bitbake learns about 'setscene' tasks so the patch is correct, avoiding creating files is the better approach given the way the world works now. There would be concerns about exisitng sstate reuse however this shouldn't occur since SRC_URI changes and that will change the underlying hashes. Hash equivalency could potentially cause issues by joining hashes together again however if the output matches, that shouldn't in theory cause any issue.] Signed-off-by: Peter Suti Signed-off-by: Richard Purdie (cherry picked from commit ee4667a24ccdd8c9d547e73aecf661e6a1283890) Signed-off-by: Steve Sakoman --- meta/classes/externalsrc.bbclass | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/meta/classes/externalsrc.bbclass b/meta/classes/externalsrc.bbclass index b00fdba8e9..aedd78a03a 100644 --- a/meta/classes/externalsrc.bbclass +++ b/meta/classes/externalsrc.bbclass @@ -75,6 +75,8 @@ python () { # Dummy value because the default function can't be called with blank SRC_URI d.setVar('SRCPV', '999') + # sstate is never going to work for external source trees, disable it + d.setVar('SSTATE_SKIP_CREATION', '1') if d.getVar('CONFIGUREOPT_DEPTRACK') == '--disable-dependency-tracking': d.setVar('CONFIGUREOPT_DEPTRACK', '') @@ -82,10 +84,7 @@ python () { tasks = filter(lambda k: d.getVarFlag(k, "task"), d.keys()) for task in tasks: - if task.endswith("_setscene"): - # sstate is never going to work for external source trees, disable it - bb.build.deltask(task, d) - elif os.path.realpath(d.getVar('S')) == os.path.realpath(d.getVar('B')): + if os.path.realpath(d.getVar('S')) == os.path.realpath(d.getVar('B')): # Since configure will likely touch ${S}, ensure only we lock so one task has access at a time d.appendVarFlag(task, "lockfiles", " ${S}/singletask.lock") From patchwork Sat Aug 26 15:38:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29544 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DF035C83F15 for ; Sat, 26 Aug 2023 15:39:36 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web11.10501.1693064369847197674 for ; Sat, 26 Aug 2023 08:39:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=leeTNVlP; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-68a42d06d02so1364867b3a.0 for ; Sat, 26 Aug 2023 08:39:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064369; x=1693669169; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=VN0B+rdYNDi0ywUdnhNJcwtyhNyv4eHgN2BX1DvVRyc=; b=leeTNVlPuRw8kuFRrTlpEoHfK/yKUce6WeAKkBiPPASLfqYkpfxgON4wz/t1bCVxAz EFhnZgbdEASr/3odhhCf+LWmnP4ecS0LfO567kMCdBL7VSr5SqGUQdqXvtFwDqqsHmbO GiH2vP6VdNGK4HyD2p6Q8UxV/q2miOlCXYxQ8aTVpsB5soIiUInOy9e1W3lVzHD942pn hmjqNaHoScCSCeLhb7Tp/7MS1PcgdEKH5DdJBCqco5T5loQP+B5wYLHEUWIslv8DPvWI fjwi68+Zyxm+Uuw8GR8OfOH4fQ1WEWSjC26tg3y80/Y5PprH31Qws0w9WebpnHAU9ODw 0t6A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064369; x=1693669169; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=VN0B+rdYNDi0ywUdnhNJcwtyhNyv4eHgN2BX1DvVRyc=; b=HH/SxhiZ3rkg9jvMUe8XK+P4QXt2bLcwQXb3ArbgvJO+rZh1YHQ0W48UB/8XigNTgT PYE/4Jnhs1+1sIOdsPL6ZLnByPzvZ9RU6KWCpQjkx+jnfoReI3A50wIhIfiPSR/lA+XQ s2yxAETOzBvBhWj3PPPqyzpqKWrGeyiRPa+BRqrhnTIMu9oqBq4TBU6cb3eMvOFofMAa 8qUZ6sOKxxKK4AK8i51K88w5KlHLUJP22+vshTZwHaqraR+O5TbEOwQVsRWNNgHez/3Q ZE2vh68KOQIOIriWtfXZ/eNqUN6QwOvv3oHya8EsoAXLYJtvizApoAAA9GmeqSA/+4sd yOUw== X-Gm-Message-State: AOJu0YwMbJXbIcfqOGy2QNvHZOd18DfoV8qHtSt0P5CcU4JPMT5cPmZp NwX5dSMx0PZK48WTL8gS0m7z+LvxX2wix2/W7Sw= X-Google-Smtp-Source: AGHT+IERQrhRdRrECTxArY7zBoX4YBEsDxMUmUIywrF34HzlVrmclFXCqRy2kQ8+rqA7HZaTVc2K+Q== X-Received: by 2002:a05:6a00:cc9:b0:68a:3e68:f887 with SMTP id b9-20020a056a000cc900b0068a3e68f887mr18753788pfv.29.1693064368990; Sat, 26 Aug 2023 08:39:28 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:28 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 18/20] scripts/create-pull-request: update URLs to git repositories Date: Sat, 26 Aug 2023 05:38:49 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186762 From: Michael Opdenacker Also remove the git.pokylinux.org URL, no longer used. Signed-off-by: Michael Opdenacker Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 47b88d143c2fc61ce0e03b7eb3a9dbcffadbf5b1) Signed-off-by: Steve Sakoman --- scripts/create-pull-request | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/scripts/create-pull-request b/scripts/create-pull-request index 2f91a355b0..885105fab3 100755 --- a/scripts/create-pull-request +++ b/scripts/create-pull-request @@ -149,13 +149,10 @@ fi WEB_URL="" case "$REMOTE_URL" in *git.yoctoproject.org*) - WEB_URL="http://git.yoctoproject.org/cgit.cgi/$REMOTE_REPO/log/?h=$BRANCH" - ;; - *git.pokylinux.org*) - WEB_URL="http://git.pokylinux.org/cgit.cgi/$REMOTE_REPO/log/?h=$BRANCH" + WEB_URL="https://git.yoctoproject.org/$REMOTE_REPO/log/?h=$BRANCH" ;; *git.openembedded.org*) - WEB_URL="http://cgit.openembedded.org/$REMOTE_REPO/log/?h=$BRANCH" + WEB_URL="https://git.openembedded.org/$REMOTE_REPO/log/?h=$BRANCH" ;; *github.com*) WEB_URL="https://github.com/$REMOTE_REPO/tree/$BRANCH" From patchwork Sat Aug 26 15:38:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29543 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D11D2C83F01 for ; Sat, 26 Aug 2023 15:39:36 +0000 (UTC) Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web10.10503.1693064371478214643 for ; Sat, 26 Aug 2023 08:39:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=RqXT7ioU; spf=softfail (domain: sakoman.com, ip: 209.85.210.175, mailfrom: steve@sakoman.com) Received: by mail-pf1-f175.google.com with SMTP id d2e1a72fcca58-68bedc0c268so1701405b3a.0 for ; Sat, 26 Aug 2023 08:39:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064370; x=1693669170; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=cCdwuK9lv358AIi7n/5sgh4CqQmdvTqp6GgKr5UrQpg=; b=RqXT7ioU+9JcNo0TBQctJu8hkRF8d2XvHmcIsaWL/WGRhrCdpEfesRDUtpeF1PCipf XFQo3gA4wcmI9Rj92Rw+UQ9PYw8RSVTdtUQkR7ldjtb8KSAgknIG1gvlFoqKGZrXOLea ywlhnqJQQwuItb41t/0e3RfJk3/gN52Nz4xqhevXi62SIPP/yhvGXCe+yUDo1Uqfxa7K IQaDsCnKoR8bNJMH+4XpClqLp6XTkhGpkdsnSp+BHy0BWdX3dLr0ArdlG/bFE2QAf+is mlwgzN+LUDNx4tVx2ikU2OIR2MnB96+ifBdzcNJ6Zh78r3hlQwMhqEUZSdUQBl9ZiQjj dGKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064370; x=1693669170; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cCdwuK9lv358AIi7n/5sgh4CqQmdvTqp6GgKr5UrQpg=; b=b7ZNccSjTfXAywfhkpLOj9kJA3LdX7uQQ1g/XvtWqIwcsLV7epaHJqBOegW6cVk+/s 7m43969n7Kr4xqNvGmM92JfHlknbVLGnfyoh8rEnchgVpjvNc1mxpzOOULneEZtpmx1Y p5tOpVupvSwTk9SunHvTIFCTFsKAVuJqzQd4HmcxyW1RK7OpnZqFefKBPDq6fA2ePyUd 3xH7nBA1tx8/l6yqhyY6PBPbFrz2ly1veWSrYUxnhduC1eNkbwLc0m9FwXRJUGddQWzO c83zRp7SKLyylo+Uzrt/E260rDgUFRv/azy1IHrfl8t/ElvV9yBBT1qmOy6WgHYcTKXb iGAQ== X-Gm-Message-State: AOJu0YzVYaIIKhHmxlY5qqgq8UiOCxi+VQMwf8lxHHR10dN/93OIfEp6 VadUNGC7O0peHoXC+aS5H6fueeU5aQtfu7kXDYw= X-Google-Smtp-Source: AGHT+IE5fpQBv+bKSCUMVRr5ZTFUlLC6PSxu+tU8tKp+T33rthPrxjYMjM9kqRiXvnPvxV4wnNjlIg== X-Received: by 2002:a05:6a20:432a:b0:134:4f86:7990 with SMTP id h42-20020a056a20432a00b001344f867990mr24452683pzk.3.1693064370633; Sat, 26 Aug 2023 08:39:30 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:30 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 19/20] oeqa/utils/gitarchive: fix tag computation when creating archive Date: Sat, 26 Aug 2023 05:38:50 -1000 Message-Id: <5e3962a53657044431f687aaa08a993563f779e7.1693064194.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186763 From: Alexis Lothoré Sporadic errors have been observed in autobuilder when trying to store new tests results: error: failed to push some refs to 'push.yoctoproject.org:yocto-testresults' hint: Updates were rejected because the tag already exists in the remote. The new tag name is generated by gitarchive based on known tags from the repository (learnt with git tag). In autobuilder case, this repository is a shallow clone, so git tag only returns most recent tags, which mean we could miss some older tags which exist in remote but not locally. In this case, gitarchive will likely create a tag which already exists in remote, and so will fail to push Fix this tag duplication by using git ls-remote to learn about existing tags instead of git tag. Two places which wrongly read only local tags has been identified in gitarchive: expand_tag_strings and get_test_runs Fixes [YOCTO #15140] Signed-off-by: Alexis Lothoré Signed-off-by: Richard Purdie (cherry picked from commit 5a0a7da85a3acfd4a20a07478eabefdab60f313a) Signed-off-by: Steve Sakoman --- meta/lib/oeqa/utils/gitarchive.py | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/utils/gitarchive.py b/meta/lib/oeqa/utils/gitarchive.py index 6e8040eb5c..73beafecb5 100644 --- a/meta/lib/oeqa/utils/gitarchive.py +++ b/meta/lib/oeqa/utils/gitarchive.py @@ -116,7 +116,8 @@ def expand_tag_strings(repo, name_pattern, msg_subj_pattern, msg_body_pattern, tag_re = tag_re.format(tag_number='(?P[0-9]{1,5})') keyws['tag_number'] = 0 - for existing_tag in repo.run_cmd('tag').splitlines(): + tags_refs = repo.run_cmd(['ls-remote', '--refs', '--tags', '-q']) + for existing_tag in ["".join(d.split()[1].split('/', 2)[2:]) for d in tags_refs.splitlines()]: match = re.match(tag_re, existing_tag) if match and int(match.group('tag_number')) >= keyws['tag_number']: @@ -181,7 +182,8 @@ def get_test_runs(log, repo, tag_name, **kwargs): # Get a list of all matching tags tag_pattern = tag_name.format(**str_fields) - tags = repo.run_cmd(['tag', '-l', tag_pattern]).splitlines() + revs = repo.run_cmd(['ls-remote', '--refs', '--tags', 'origin', '-q', tag_pattern]).splitlines() + tags = ["".join(d.split()[1].split('/', 2)[2:]) for d in revs] log.debug("Found %d tags matching pattern '%s'", len(tags), tag_pattern) # Parse undefined fields from tag names From patchwork Sat Aug 26 15:38:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 29545 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D1200C83F13 for ; Sat, 26 Aug 2023 15:39:36 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web10.10509.1693064373243477434 for ; Sat, 26 Aug 2023 08:39:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=p9bHzrn4; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-68a440a8a20so1678891b3a.3 for ; Sat, 26 Aug 2023 08:39:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1693064372; x=1693669172; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4cpfLymLVzyGgNxX4vxTBoNY6rRHH5XQQwCD7Ms1ZMM=; b=p9bHzrn4WscCyer0lirNDIdmJHsY0U2UfDdkqGpuYjW8Y+9YHTlz2ZHxPW5Pdssr8d JuGUgR5Xbdu5MOLXjL7XVxdXvf/15lbsYentknDolBfs7uViq9/SUSXwvXw5Qw0ZNN/H 2LQ28dDqtFt99QHp6QPG4+grOIDm3STDgJnV/Ryjig3gjiyoRG0uOTPsmVtWUHoaUL/5 xACok8XmhCAg6sjIrz9wc55ztxF7ve+baWZtaVm9o0qux/ajCpznLolUJ5yX1M/zSTfH E0ivRtZch3jPlGtPylQsxBfcnkBhnExO+cZPLnhQfDEkUOuA8wNil71gfdLuXa7U5akl hueg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693064372; x=1693669172; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4cpfLymLVzyGgNxX4vxTBoNY6rRHH5XQQwCD7Ms1ZMM=; b=lOphzqCdtL4XDIqqYlhePWaACrW66oU6kEXQ5q8i/z86SoA5etVt+1EaDFU1Zh7LHN 2+5nvPWbAQak0MZBeu7++PvSyKUZyYdscPzRLutrxc4BnzEGbm2UJu5Mi1d6mlb7VmOw qjAlCP8E6DSiRDeKI1ALnmw6FfLXezBnvTKXoT0qEoIuyvXpX6mRr14hLL+JuE92arMY CY+haD8mheBeaw2/4LnTBPi2mCw+Z/u2+xqcNqhECDKKCZFWbRDQ/3C8BCVkV7YAfJ78 Mqo3N/G9vJ8Ze3I448E6qyxZN++/8piFYg9uZJkzEokqZA+HdnUTSbXVpJTFR4nkGpIN nPFA== X-Gm-Message-State: AOJu0YyvW0wqQiyOoEWhGILXcsPx3tNkJbUFxgAWZpAeXIVdiOFCQHJn h8toCpfYiEiHg+10yueNvB5GxAuUarHSoZ1Xv1Y= X-Google-Smtp-Source: AGHT+IHb5L9LJbln3f+J4wl7CMhIjDo3B7jyLj7de4F9CkT+e1Sgr5YGkyxHRW/tZ5QkfZAYgT9heA== X-Received: by 2002:a05:6a20:c901:b0:148:3c72:4878 with SMTP id gx1-20020a056a20c90100b001483c724878mr15696230pzb.50.1693064372439; Sat, 26 Aug 2023 08:39:32 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id g25-20020aa78759000000b006732786b5f1sm3422430pfo.213.2023.08.26.08.39.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 26 Aug 2023 08:39:32 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 20/20] resulttool/report: Avoid divide by zero Date: Sat, 26 Aug 2023 05:38:51 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 26 Aug 2023 15:39:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/186764 From: Richard Purdie Avoid a divide by zero traceback if unfortunate test counts are encountered. Signed-off-by: Richard Purdie (cherry picked from commit c5aeea53dfacb53dedb8445cb3523dc3a8cb6dca) Signed-off-by: Steve Sakoman --- scripts/lib/resulttool/report.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/scripts/lib/resulttool/report.py b/scripts/lib/resulttool/report.py index f0ca50ebe2..a349510ab8 100644 --- a/scripts/lib/resulttool/report.py +++ b/scripts/lib/resulttool/report.py @@ -176,7 +176,10 @@ class ResultsTextReport(object): vals['sort'] = line['testseries'] + "_" + line['result_id'] vals['failed_testcases'] = line['failed_testcases'] for k in cols: - vals[k] = "%d (%s%%)" % (line[k], format(line[k] / total_tested * 100, '.0f')) + if total_tested: + vals[k] = "%d (%s%%)" % (line[k], format(line[k] / total_tested * 100, '.0f')) + else: + vals[k] = "0 (0%)" for k in maxlen: if k in vals and len(vals[k]) > maxlen[k]: maxlen[k] = len(vals[k])