From patchwork Wed Oct 11 00:01:14 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31956 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06F95CD98D5 for ; Wed, 11 Oct 2023 00:01:57 +0000 (UTC) Received: from mail-io1-f46.google.com (mail-io1-f46.google.com [209.85.166.46]) by mx.groups.io with SMTP id smtpd.web11.5172.1696982511956823621 for ; Tue, 10 Oct 2023 17:01:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=2opYBjHh; spf=softfail (domain: sakoman.com, ip: 209.85.166.46, mailfrom: steve@sakoman.com) Received: by mail-io1-f46.google.com with SMTP id ca18e2360f4ac-77acb04309dso271044639f.2 for ; Tue, 10 Oct 2023 17:01:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982510; x=1697587310; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=YtpIsCalLTGmQueM4YNqjpLa94WeoR2Dmd3rkyHSuok=; b=2opYBjHht6kjGr6dgyk2yzEfjrclBHxzXhyFwR08CPbIbOnds/Lnev0pVHbtjEsv0a 8z8MmhzPnsdhrfhJQE+bZ8aJNgeQ52ilmBrl/cSEWoThi3fp2Mw4f8o69gZiPV5cpjKP 7WNlbOUXuiCutf9oX4YrV6nyxey1FYEcTH+AK2c7cflCKLsn17CReFaSfEKAX4PDAkgH IFk9leK5ncnalPj74idgKbOkul5zN+M2T2c1IM1Uh+5LhiS1YRueiVg8nJc/AZMZiRUN j8drgS3MDfIboIpxiJ26PIwwoYMAZPtrUaFToWSbMfM0vSXRQgrpTbsYlEWJh/JqyYIJ GzdA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982510; x=1697587310; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YtpIsCalLTGmQueM4YNqjpLa94WeoR2Dmd3rkyHSuok=; b=qhuLyuHlU+WnXI4n45NwexKbgXn9qV1Ds+1nlxbY7GFsXNBdAByfujdJGGrdIoHoh9 Wy3lnys5o4wXPD6fYjdc/VjattRAhuyGs4CH45C3/HHLwWZrQPTabEDRn7yavyG0R69I OsiLLqRcdojoYADGj1q4MUSthZntqmFoOtlS/TW+kXjyyFHKbNr88CkBVO0NgIUR8z+5 VCQQlTfnurX+9hAKhX8Vgqm2j36duPewN8Hsphw72k/bnPxR3bfwhWFKdtxT+Xp0hPNr /MHIsQdkYeIGqiaTGMzUzTjp6kojluIj2oKrGH5MPwEU/j4CQNEkE0a4u21lD2eYxBAy t4Ew== X-Gm-Message-State: AOJu0YzIPyUGVkQBnDL4VIv0WXMnZFBESQDPyTwF3SbEKhZe1J/CiO7C WGjLrbKCcbWUjgUsEMPOjNcjm6kl7ITvB8iwUFc= X-Google-Smtp-Source: AGHT+IFEzrvBb6DGbBDV2orzsdHJEZahOduWHaY9grfrLrZDA2TTarY8zNeOQpn+p+BfsfZq6n4gig== X-Received: by 2002:a05:6e02:219a:b0:351:111d:9cfc with SMTP id j26-20020a056e02219a00b00351111d9cfcmr27962959ila.21.1696982510315; Tue, 10 Oct 2023 17:01:50 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:50 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 01/20] gstreamer: upgrade 1.22.5 -> 1.22.6 Date: Tue, 10 Oct 2023 14:01:14 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:01:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188919 From: Archana Polampalli This release only contains bugfixes and security fixes. Highlighted bugfixes in 1.22.6: Security fixes for the MXF demuxer and H.265 video parser Fix latency regression in H.264 hardware decoder base class androidmedia: fix HEVC codec profile registration and fix coded_data handling decodebin3: fix switching from a raw stream to an encoded stream gst-inspect: prettier and more correct signal and action signals printing rtmp2: Allow NULL flash version, omitting the field, for better RTMP server compatibility rtspsrc: better compatibility with buggy RTSP servers that don't set a clock-rate rtpjitterbuffer: fix integer overflow that led to more packets being declared lost than have been lost v4l2: fix video encoding regression on RPi and fix support for left and top padding waylandsink: Crop surfaces to their display width height cerbero: recognise Manjaro; add Rust support for MSVC ARM64; cmake detection fixes various bug fixes, build fixes, memory leak fixes, and other stability and reliability improvements https://nvd.nist.gov/vuln/detail/CVE-2023-40474 https://nvd.nist.gov/vuln/detail/CVE-2023-40475 https://nvd.nist.gov/vuln/detail/CVE-2023-40476 https://gstreamer.freedesktop.org/releases/1.22/#1.22.6 Signed-off-by: Archana Polampalli Signed-off-by: Steve Sakoman --- .../{gst-devtools_1.22.5.bb => gst-devtools_1.22.6.bb} | 2 +- ...streamer1.0-libav_1.22.5.bb => gstreamer1.0-libav_1.22.6.bb} | 2 +- .../{gstreamer1.0-omx_1.22.5.bb => gstreamer1.0-omx_1.22.6.bb} | 2 +- ...plugins-bad_1.22.5.bb => gstreamer1.0-plugins-bad_1.22.6.bb} | 2 +- ...ugins-base_1.22.5.bb => gstreamer1.0-plugins-base_1.22.6.bb} | 2 +- ...ugins-good_1.22.5.bb => gstreamer1.0-plugins-good_1.22.6.bb} | 2 +- ...ugins-ugly_1.22.5.bb => gstreamer1.0-plugins-ugly_1.22.6.bb} | 2 +- ...reamer1.0-python_1.22.5.bb => gstreamer1.0-python_1.22.6.bb} | 2 +- ...rtsp-server_1.22.5.bb => gstreamer1.0-rtsp-server_1.22.6.bb} | 2 +- ...streamer1.0-vaapi_1.22.5.bb => gstreamer1.0-vaapi_1.22.6.bb} | 2 +- .../{gstreamer1.0_1.22.5.bb => gstreamer1.0_1.22.6.bb} | 2 +- 11 files changed, 11 insertions(+), 11 deletions(-) rename meta/recipes-multimedia/gstreamer/{gst-devtools_1.22.5.bb => gst-devtools_1.22.6.bb} (95%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-libav_1.22.5.bb => gstreamer1.0-libav_1.22.6.bb} (91%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-omx_1.22.5.bb => gstreamer1.0-omx_1.22.6.bb} (95%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-plugins-bad_1.22.5.bb => gstreamer1.0-plugins-bad_1.22.6.bb} (98%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-plugins-base_1.22.5.bb => gstreamer1.0-plugins-base_1.22.6.bb} (97%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-plugins-good_1.22.5.bb => gstreamer1.0-plugins-good_1.22.6.bb} (97%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-plugins-ugly_1.22.5.bb => gstreamer1.0-plugins-ugly_1.22.6.bb} (94%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-python_1.22.5.bb => gstreamer1.0-python_1.22.6.bb} (91%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-rtsp-server_1.22.5.bb => gstreamer1.0-rtsp-server_1.22.6.bb} (90%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0-vaapi_1.22.5.bb => gstreamer1.0-vaapi_1.22.6.bb} (95%) rename meta/recipes-multimedia/gstreamer/{gstreamer1.0_1.22.5.bb => gstreamer1.0_1.22.6.bb} (97%) diff --git a/meta/recipes-multimedia/gstreamer/gst-devtools_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gst-devtools_1.22.6.bb similarity index 95% rename from meta/recipes-multimedia/gstreamer/gst-devtools_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gst-devtools_1.22.6.bb index 3e029396a6..90bbd9c733 100644 --- a/meta/recipes-multimedia/gstreamer/gst-devtools_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gst-devtools_1.22.6.bb @@ -12,7 +12,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-devtools/gst-devtools-${PV} file://0001-connect-has-a-different-signature-on-musl.patch \ " -SRC_URI[sha256sum] = "2add1519aa6eeb01d544cb94293688ee3bc2079f6bca6075bf5c23d00a0921be" +SRC_URI[sha256sum] = "8928560efaf16137c30285e718708e5d0bab0777eb4ef8127e0274e120d3d86b" DEPENDS = "json-glib glib-2.0 glib-2.0-native gstreamer1.0 gstreamer1.0-plugins-base" RRECOMMENDS:${PN} = "git" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.6.bb similarity index 91% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.6.bb index af9dc5d2d5..8906556b44 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-libav_1.22.6.bb @@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=69333daa044cb77e486cc36129f7a770 \ " SRC_URI = "https://gstreamer.freedesktop.org/src/gst-libav/gst-libav-${PV}.tar.xz" -SRC_URI[sha256sum] = "8583f0c1f4fcb01eed11fa1e3c21126543a8bd739ed4fc1db31f756a5ab01d9a" +SRC_URI[sha256sum] = "7789e6408388a25f23cbf948cfc5c6230d735bbcd8b7f37f4a01c9e348a1e3a7" S = "${WORKDIR}/gst-libav-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.6.bb similarity index 95% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.6.bb index 5d99810cd4..2579aa3d66 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-omx_1.22.6.bb @@ -10,7 +10,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=4fbd65380cdd255951079008b364516c \ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-omx/gst-omx-${PV}.tar.xz" -SRC_URI[sha256sum] = "cf0cb9c4de06c5d62eef77cb31238bbaf257dc88802010072eedd1c168f136a4" +SRC_URI[sha256sum] = "223833c42518ad7eb1923bb4dd3726809f59a66d6e9aaaa69cb29ad0750c8758" S = "${WORKDIR}/gst-omx-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.6.bb similarity index 98% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.6.bb index 94e5bb894c..35c6003cc1 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.22.6.bb @@ -10,7 +10,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-plugins-bad/gst-plugins-bad file://0002-avoid-including-sys-poll.h-directly.patch \ file://0004-opencv-resolve-missing-opencv-data-dir-in-yocto-buil.patch \ " -SRC_URI[sha256sum] = "e64e75cdafd7ff2fc7fc34e855b06b1e3ed227cc06fa378d17bbcd76780c338c" +SRC_URI[sha256sum] = "b4029cd2908a089c55f1d902a565d007495c95b1442d838485dc47fb12df7137" S = "${WORKDIR}/gst-plugins-bad-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.6.bb similarity index 97% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.6.bb index 74105a44e7..45b806e800 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22.6.bb @@ -11,7 +11,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-plugins-base/gst-plugins-ba file://0003-viv-fb-Make-sure-config.h-is-included.patch \ file://0002-ssaparse-enhance-SSA-text-lines-parsing.patch \ " -SRC_URI[sha256sum] = "edd4338b45c26a9af28c0d35aab964a024c3884ba6f520d8428df04212c8c93a" +SRC_URI[sha256sum] = "50f2b4d17c02eefe430bbefa8c5cd134b1be78a53c0f60e951136d96cf49fd4b" S = "${WORKDIR}/gst-plugins-base-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.6.bb similarity index 97% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.6.bb index 93f0e76ee9..6b76ba957e 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.6.bb @@ -8,7 +8,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-plugins-good/gst-plugins-go file://0001-qt-include-ext-qt-gstqtgl.h-instead-of-gst-gl-gstglf.patch \ file://0001-v4l2-Define-ioctl_req_t-for-posix-linux-case.patch" -SRC_URI[sha256sum] = "b67b31313a54c6929b82969d41d3cfdf2f58db573fb5f491e6bba5d84aea0778" +SRC_URI[sha256sum] = "b3b07fe3f1ce7fe93aa9be7217866044548f35c4a7792280eec7e108a32f9817" S = "${WORKDIR}/gst-plugins-good-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.6.bb similarity index 94% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.6.bb index 29d705aaaf..77f79a630a 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-ugly_1.22.6.bb @@ -14,7 +14,7 @@ LICENSE_FLAGS = "commercial" SRC_URI = " \ https://gstreamer.freedesktop.org/src/gst-plugins-ugly/gst-plugins-ugly-${PV}.tar.xz \ " -SRC_URI[sha256sum] = "2680473b218158f18467cac3e1c50291b7ff4e0710dd350a59eaacbc29c09a54" +SRC_URI[sha256sum] = "3e31454c98cb2f7f6d2d355eceb933a892fa0f1dc09bc36c9abc930d8e29ca48" S = "${WORKDIR}/gst-plugins-ugly-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.6.bb similarity index 91% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.6.bb index be817bf3f5..addf12c427 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-python_1.22.6.bb @@ -8,7 +8,7 @@ LICENSE = "LGPL-2.1-or-later" LIC_FILES_CHKSUM = "file://COPYING;md5=c34deae4e395ca07e725ab0076a5f740" SRC_URI = "https://gstreamer.freedesktop.org/src/${PNREAL}/${PNREAL}-${PV}.tar.xz" -SRC_URI[sha256sum] = "bf05232415cf6018142ae51dd3b897bb73432687b5ce1786bf46edc6298ce5b0" +SRC_URI[sha256sum] = "51de2d6d13b12ce095eac97c0b94ee59c2aeba3712bb7462b78c4d57dde176c5" DEPENDS = "gstreamer1.0 gstreamer1.0-plugins-base python3-pygobject" RDEPENDS:${PN} += "gstreamer1.0 gstreamer1.0-plugins-base python3-pygobject" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.6.bb similarity index 90% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.6.bb index 84c51e8a6c..fd79fe4324 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server_1.22.6.bb @@ -10,7 +10,7 @@ PNREAL = "gst-rtsp-server" SRC_URI = "https://gstreamer.freedesktop.org/src/${PNREAL}/${PNREAL}-${PV}.tar.xz" -SRC_URI[sha256sum] = "f343eb54964ebd4d8c071be5eecad586f28feb0156e036e06b148d0e7febb1c0" +SRC_URI[sha256sum] = "0ae33a8b50443b62f11581a9181e906b41cd3877b2d799dbea72912c3eda4bb3" S = "${WORKDIR}/${PNREAL}-${PV}" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.6.bb similarity index 95% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.6.bb index 231d252323..bf4c105057 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-vaapi_1.22.6.bb @@ -11,7 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING.LIB;md5=4fbd65380cdd255951079008b364516c" SRC_URI = "https://gstreamer.freedesktop.org/src/${REALPN}/${REALPN}-${PV}.tar.xz" -SRC_URI[sha256sum] = "a9a550267c9584df0e8c70434d30476e8fd0018b733c1c1ee33deaf422bdb24b" +SRC_URI[sha256sum] = "d9ba2fc26bef98c78e982c599f585d46bbb65fe122da89c2d7ab41f468a52c7b" S = "${WORKDIR}/${REALPN}-${PV}" DEPENDS = "libva gstreamer1.0 gstreamer1.0-plugins-base gstreamer1.0-plugins-bad" diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.5.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.6.bb similarity index 97% rename from meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.5.bb rename to meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.6.bb index 2dacf037f8..a898464322 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.5.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.22.6.bb @@ -22,7 +22,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gstreamer/gstreamer-${PV}.tar.x file://0003-tests-use-a-dictionaries-for-environment.patch;striplevel=3 \ file://0004-tests-add-helper-script-to-run-the-installed_tests.patch;striplevel=3 \ " -SRC_URI[sha256sum] = "4408d7930f381809e85917acc19712f173261ba85bdf20c5567b2a21b1193b61" +SRC_URI[sha256sum] = "f500e6cfddff55908f937711fc26a0840de28a1e9ec49621c0b6f1adbd8f818e" PACKAGECONFIG ??= "${@bb.utils.contains('PTEST_ENABLED', '1', 'tests', '', d)} \ check \ From patchwork Wed Oct 11 00:01:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31952 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DCA21CD98CC for ; Wed, 11 Oct 2023 00:01:56 +0000 (UTC) Received: from mail-ot1-f54.google.com (mail-ot1-f54.google.com [209.85.210.54]) by mx.groups.io with SMTP id smtpd.web11.5173.1696982512861583482 for ; Tue, 10 Oct 2023 17:01:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=MluNbbcr; spf=softfail (domain: sakoman.com, ip: 209.85.210.54, mailfrom: steve@sakoman.com) Received: by mail-ot1-f54.google.com with SMTP id 46e09a7af769-6c0b8f42409so4283968a34.0 for ; Tue, 10 Oct 2023 17:01:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982512; x=1697587312; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Mtsub06EOwxvYk/K+zvjf8vbSTgGJcgX3N0cFDIC1rM=; b=MluNbbcrAjf1T158SWskOqxy3XkYzOIrAoVVRnfwJ8KoY0WuyR1WSbi4SDaU/KLnmo t7Qvs3nLtVGF7/JK5zf+szmzIkNTw1Np8UB5oU2L4/Qom50Ufb3PHhHSjRI+zt1NXZZg R4FuEIHYwXCUyd6HrL7Ja60eK3ZRjkv84EfwfyxRmqiWpiwEYr1V6nEfHPjpmTfN0GvX NdjMZ6kzdVSLmbMjT+Fu6mk4oUp2pu4M+H1ntrZLmawr7VslR8gSHCByvWgCZkkzcf+d z3iKDSf4FdP3nOhThA18U5mQ/9gD8PC0s9oxNy3md6mQqqxTzUfunS4zjF4bWLDx0GwW EPmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982512; x=1697587312; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Mtsub06EOwxvYk/K+zvjf8vbSTgGJcgX3N0cFDIC1rM=; b=h3KvxI2xGZK8uwtyAZL8lE+qQmrCiy7C8TSCs0iirSQ00kRFv2kSZeZXRF7fvpa+8B 5xMAiGwd7Ue5A9vm7HCcyusDzTjk7TWa/JFW+XgvpyUHom2qsphXb2fO8+RxrCQmvrZU rtXGlf+lmRnKcfh+XKxTZ7VZMvevOOpxoBVBFTPd3S8jZhXcIIuVwU7DK/xtF2pf2isc K/irPxgn3HAWqGSS4m04zG56JFmbPRWjFzcCMCEf1C1dYFYqulNDIdumQnBQjnEJ7vXd 2BmiHXYkZopSjxR/o/NItjpoVbHBSBzW3dU7K0oL0ZTxKjNE8//1xGSHUYIp/aFYd1NA E0uw== X-Gm-Message-State: AOJu0YyHxTXHsVgciZYgbSeWlv503O7v6YFove0yi6goMuMB03vTr8oe QI6AM/o8OYaqqsrawch+g9Z8oBXFFeZTflyvcQY= X-Google-Smtp-Source: AGHT+IEnZx+AfNoDW1hCRpffT3nhYUAgbQNOxl3yBBXX3a+/8RfEcnAY7MWXDaZUNCdtS3CunWX4tg== X-Received: by 2002:a9d:7c99:0:b0:6b9:bf1e:c141 with SMTP id q25-20020a9d7c99000000b006b9bf1ec141mr23314785otn.23.1696982511842; Tue, 10 Oct 2023 17:01:51 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:51 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 02/20] gnupg: upgrade 2.4.2 -> 2.4.3 Date: Tue, 10 Oct 2023 14:01:15 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:01:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188920 From: Alexander Kanavin New stable GnuPG release: version 2.4.3. This version fixes some minor bugs and improves the performance on Windows. Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit 0c2365540ae61fe6fab61fb076ddb976ca26ce47) Signed-off-by: Steve Sakoman --- ...-a-custom-value-for-the-location-of-.patch | 4 +-- .../gnupg/gnupg/fix-ldap.patch | 34 +++++++++++++++++++ .../gnupg/gnupg/relocate.patch | 2 +- .../gnupg/{gnupg_2.4.2.bb => gnupg_2.4.3.bb} | 3 +- 4 files changed, 39 insertions(+), 4 deletions(-) create mode 100644 meta/recipes-support/gnupg/gnupg/fix-ldap.patch rename meta/recipes-support/gnupg/{gnupg_2.4.2.bb => gnupg_2.4.3.bb} (96%) diff --git a/meta/recipes-support/gnupg/gnupg/0001-configure.ac-use-a-custom-value-for-the-location-of-.patch b/meta/recipes-support/gnupg/gnupg/0001-configure.ac-use-a-custom-value-for-the-location-of-.patch index 81aeaf5d3a..561616584c 100644 --- a/meta/recipes-support/gnupg/gnupg/0001-configure.ac-use-a-custom-value-for-the-location-of-.patch +++ b/meta/recipes-support/gnupg/gnupg/0001-configure.ac-use-a-custom-value-for-the-location-of-.patch @@ -1,4 +1,4 @@ -From 8b9e3d286e87bc978ec6bb9cfd790d8d253b79c3 Mon Sep 17 00:00:00 2001 +From acdb7e1d2844cd4088f099617e25352b3dc5b075 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Mon, 22 Jan 2018 18:00:21 +0200 Subject: [PATCH] configure.ac: use a custom value for the location of @@ -14,7 +14,7 @@ Signed-off-by: Alexander Kanavin 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac -index a547401..60bc2c5 100644 +index e68b779..eec9f89 100644 --- a/configure.ac +++ b/configure.ac @@ -1922,7 +1922,7 @@ AC_DEFINE_UNQUOTED(GPGCONF_DISP_NAME, "GPGConf", diff --git a/meta/recipes-support/gnupg/gnupg/fix-ldap.patch b/meta/recipes-support/gnupg/gnupg/fix-ldap.patch new file mode 100644 index 0000000000..4754781565 --- /dev/null +++ b/meta/recipes-support/gnupg/gnupg/fix-ldap.patch @@ -0,0 +1,34 @@ +From dc13361524c1477b2106c7385f2059f9ea111b84 Mon Sep 17 00:00:00 2001 +From: NIIBE Yutaka +Date: Wed, 5 Jul 2023 09:29:54 +0900 +Subject: [PATCH] dirmngr: Enable the call of ks_ldap_help_variables when + USE_LDAP. + +* dirmngr/server.c [USE_LDAP] (cmd_ad_query): Conditionalize. + +-- + +Upstream-Status: Backport +Signed-off-by: NIIBE Yutaka +Signed-off-by: Alexander Kanavin +--- + dirmngr/server.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/dirmngr/server.c b/dirmngr/server.c +index 51a149cb2..ee61f63d6 100644 +--- a/dirmngr/server.c ++++ b/dirmngr/server.c +@@ -2776,7 +2776,9 @@ cmd_ad_query (assuan_context_t ctx, char *line) + + if (opt_help) + { ++#if USE_LDAP + ks_ldap_help_variables (ctrl); ++#endif + err = 0; + goto leave; + } +-- +2.11.0 + diff --git a/meta/recipes-support/gnupg/gnupg/relocate.patch b/meta/recipes-support/gnupg/gnupg/relocate.patch index f7dd12fbcc..d540e9edbb 100644 --- a/meta/recipes-support/gnupg/gnupg/relocate.patch +++ b/meta/recipes-support/gnupg/gnupg/relocate.patch @@ -1,4 +1,4 @@ -From c4ddea8e6070d1df51058aac08088e27c37e7e73 Mon Sep 17 00:00:00 2001 +From 0e4b325c199354ce54cc4687532cced1440fd496 Mon Sep 17 00:00:00 2001 From: Ross Burton Date: Wed, 19 Sep 2018 14:44:40 +0100 Subject: [PATCH] Allow the environment to override where gnupg looks for its diff --git a/meta/recipes-support/gnupg/gnupg_2.4.2.bb b/meta/recipes-support/gnupg/gnupg_2.4.3.bb similarity index 96% rename from meta/recipes-support/gnupg/gnupg_2.4.2.bb rename to meta/recipes-support/gnupg/gnupg_2.4.3.bb index 631df8ac9d..e91ef34b7d 100644 --- a/meta/recipes-support/gnupg/gnupg_2.4.2.bb +++ b/meta/recipes-support/gnupg/gnupg_2.4.3.bb @@ -18,12 +18,13 @@ SRC_URI = "${GNUPG_MIRROR}/${BPN}/${BPN}-${PV}.tar.bz2 \ file://0002-use-pkgconfig-instead-of-npth-config.patch \ file://0004-autogen.sh-fix-find-version-for-beta-checking.patch \ file://0001-Woverride-init-is-not-needed-with-gcc-9.patch \ + file://fix-ldap.patch \ " SRC_URI:append:class-native = " file://0001-configure.ac-use-a-custom-value-for-the-location-of-.patch \ file://relocate.patch" SRC_URI:append:class-nativesdk = " file://relocate.patch" -SRC_URI[sha256sum] = "97eb47df8ae5a3ff744f868005a090da5ab45cb48ee9836dbf5ee739a4e5cf49" +SRC_URI[sha256sum] = "a271ae6d732f6f4d80c258ad9ee88dd9c94c8fdc33c3e45328c4d7c126bd219d" EXTRA_OECONF = "--disable-ldap \ --disable-ccid-driver \ From patchwork Wed Oct 11 00:01:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31954 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4878CD98D1 for ; Wed, 11 Oct 2023 00:01:56 +0000 (UTC) Received: from mail-il1-f172.google.com (mail-il1-f172.google.com [209.85.166.172]) by mx.groups.io with SMTP id smtpd.web10.5114.1696982514506502228 for ; Tue, 10 Oct 2023 17:01:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=rwKKH2Fp; spf=softfail (domain: sakoman.com, ip: 209.85.166.172, mailfrom: steve@sakoman.com) Received: by mail-il1-f172.google.com with SMTP id e9e14a558f8ab-35140cc9187so26011905ab.2 for ; Tue, 10 Oct 2023 17:01:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982513; x=1697587313; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bRt1+k0d05jAaQYKfFqz7BwsRQH8gkP+VFq7UpxsJaE=; b=rwKKH2Fp9Opr8s4dZ8HSHTcepYlBxpNymtYTawhEALSVlSI5NLbSyU8uyOnS2h7S6G Ybt8HTVNcMO2a68yRi11DD778qnqpZRF9QIbhA1VlqUpl1ziQOhBjI+znHJpQnUzXOXB 5znvijpSM+n/WHxLkKUrfxXRMqixKAfHZYUh0c6dMTNneXcB3izFVxOPijbBPyYsnt4v 3AXnb+xtAAo4TaK5jBBzuR9DKBR+Wm9cAsevGLC6wGg6uPpYqFHn9GHfoOLH+pDUXYQ8 QvzDh0Axh0oGliN+SMnEaCq0UwHdpTaZit4VGeKHiwCElQkyYs+S2we+f15FBmnf67tt atYA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982513; x=1697587313; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=bRt1+k0d05jAaQYKfFqz7BwsRQH8gkP+VFq7UpxsJaE=; b=Nl4X4YUr6sjFC1ljDOi4neNozoa3DjVTsOADLwiGP060SE94XspXFpxuCPLvVg1rLB EWBHQzYyw7ihTaNf8chxbtBOG3wvoTU0SQtzmRhATsmqLS4lXTiptkDYSQSUf43YfZfh vTFNyJGYRP4ZLYZOyU2FzFsTfGPeW/pY7zgvZBl3w6VWvWt/V6H8GdfayAvq7dswNp9O m+j5z/W7U3RGDfFsNTehuntue9RdawhLzYbVMj447mf6hs/VJl7hA0axo/Cly366IwRM toYi8KGsdX4G4GGRh2PT9YGtKM2CtQxEJ7u7deF8Cl0KNN+pApUyIen9BMszQLFwey3b wV+Q== X-Gm-Message-State: AOJu0Yy3WUa1ohtz1xUKCWpFByNuSHdG6kWEm4NxxM/2KVyVK5yhCeW3 UVjj++Nm1SkvtTN8JbE5n41mgd+bTBVSIvHD8B4= X-Google-Smtp-Source: AGHT+IHTpNK5dfAk7K1Ocjp5MQ1c4x+0Ge3lzi4y70sRpp+WI6jKOaj0Rd/RWSnZX21QPrAjBfAAeg== X-Received: by 2002:a05:6e02:20c9:b0:34f:2cb0:5d0 with SMTP id 9-20020a056e0220c900b0034f2cb005d0mr23403770ilq.30.1696982513362; Tue, 10 Oct 2023 17:01:53 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:53 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 03/20] openssl: Upgrade 3.1.2 -> 3.1.3 Date: Tue, 10 Oct 2023 14:01:16 -1000 Message-Id: <99e40cd72c73363fd1a1094106f90092d5d79c3a.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:01:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188921 From: Peter Marko https://github.com/openssl/openssl/blob/openssl-3.1/NEWS.md#major-changes-between-openssl-312-and-openssl-313-19-sep-2023 Major changes between OpenSSL 3.1.2 and OpenSSL 3.1.3 [19 Sep 2023] * Fix POLY1305 MAC implementation corrupting XMM registers on Windows (CVE-2023-4807) Signed-off-by: Peter Marko Signed-off-by: Yi Zhao Signed-off-by: Steve Sakoman --- .../openssl/{openssl_3.1.2.bb => openssl_3.1.3.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-connectivity/openssl/{openssl_3.1.2.bb => openssl_3.1.3.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl_3.1.2.bb b/meta/recipes-connectivity/openssl/openssl_3.1.3.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.1.2.bb rename to meta/recipes-connectivity/openssl/openssl_3.1.3.bb index d55695dba4..e41bb78812 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.1.2.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.1.3.bb @@ -18,7 +18,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "a0ce69b8b97ea6a35b96875235aa453b966ba3cba8af2de23657d8b6767d6539" +SRC_URI[sha256sum] = "f0316a2ebd89e7f2352976445458689f80302093788c466692fb2a188b2eacf6" inherit lib_package multilib_header multilib_script ptest perlnative MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" From patchwork Wed Oct 11 00:01:17 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31955 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EAEEFCD98D3 for ; Wed, 11 Oct 2023 00:01:56 +0000 (UTC) Received: from mail-il1-f181.google.com (mail-il1-f181.google.com [209.85.166.181]) by mx.groups.io with SMTP id smtpd.web10.5116.1696982515962251018 for ; Tue, 10 Oct 2023 17:01:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=m9CIyL7j; spf=softfail (domain: sakoman.com, ip: 209.85.166.181, mailfrom: steve@sakoman.com) Received: by mail-il1-f181.google.com with SMTP id e9e14a558f8ab-35742cbb670so3208525ab.2 for ; Tue, 10 Oct 2023 17:01:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982515; x=1697587315; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=l3gzRt4UbO70kOyXw5f7k5WNLuBRsw7f241YgjJtFk0=; b=m9CIyL7jIKvx6rkoSTWhb8kI89kl1jG8xF/ox9hoVLEr5MctlJ66f80NGbJGMxTLdy RiG8Qyk8F6/Ybf0d7F86tk8bYdiLYVxGTtpw5Y2UoJmDX6OjReYpjLCb90/LHUktk4ib KxKGafLrhWZ/YbqzRWvnVwNoPGzP8tjGvh7cx1TTU/viz0ongRFtCcN6MrGVJREhOPZT py3zkAlXgv3nrsuHT4wOObfBz4dKUJ9X1vqdzuehILdFseOexEghEc0/Z1FvQe3TmRxb sI4GdWUWuduFXBzU1PoDgvsULyz4ddIj7oKLFaPii6AkzZ4ZuN+Q0J4iT1Sx3VhOdHI9 ICgg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982515; x=1697587315; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=l3gzRt4UbO70kOyXw5f7k5WNLuBRsw7f241YgjJtFk0=; b=VjJ517wwL/LfeNUh8dUbvzTa6LP4Wy51gGXkzMmiAu90OmUfYFE2ymAuSMPY2p99mk nYzVcbXVs0/3vI31MebYg6KYP6nd5Wu/CXAP9z8gOz+UBQ6qU8WU7dPgItkAT9WlC4Kh /4g3SUDk12E/6cWUkwniaMGDGYAeVYlsjBQO+e2/V1+V8+VuwPMt4OMSSXN/Xr9RMNGG EYl0o6Rwd/pzGRUsgAAEYZARlTCYXTj6SUS8bZ9fX2zw6Z3RQiSQQn3Ob53VdRoESSSm cNk+a+VDnQbdD5T1sNK24Wpz2vFKFl++uSY04mpWQ0W9+8qP6wLAzq3vnxzFkluXv4SF 0hZg== X-Gm-Message-State: AOJu0YxNU3JSFFLgnnezEOyKIkqy1MrHiinQYYSswInZhfkCYmx/gVQC gFzc5/cJb5ZPQp8Y1AqPiPBz4d6I/ocIUzU2fpU= X-Google-Smtp-Source: AGHT+IF4/cq6QvPtlRthF+Bo6nvNvpaop1ezKqW1fcmxlIMuzS4gRyNaY84cGopGB3pDGT3GEQLKLA== X-Received: by 2002:a05:6e02:1bc7:b0:351:5d8f:d299 with SMTP id x7-20020a056e021bc700b003515d8fd299mr25897826ilv.7.1696982514831; Tue, 10 Oct 2023 17:01:54 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:54 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 04/20] linux-yocto/6.1: update to v6.1.52 Date: Tue, 10 Oct 2023 14:01:17 -1000 Message-Id: <3dc84243cfb11df1e483568093b2214d15f99e5d.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:01:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188922 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 59b13c2b647e Linux 6.1.52 4a6284a2fc63 pinctrl: amd: Don't show `Invalid config param` errors 7bec12fa9813 usb: typec: tcpci: clear the fault status bit 4da07e958bfd nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse fdbfc54d5399 nilfs2: fix general protection fault in nilfs_lookup_dirty_data_buffers() 689561db6869 dt-bindings: sc16is7xx: Add property to change GPIO function dca7c9965141 tcpm: Avoid soft reset when partner does not support get_status a1fc0096921c fsi: master-ast-cf: Add MODULE_FIRMWARE macro b5c7bc370e03 firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe b7366429626e serial: sc16is7xx: fix bug when first setting GPIO direction 682f9b944374 serial: sc16is7xx: fix broken port 0 uart init 4b3de7d2f869 serial: qcom-geni: fix opp vote on shutdown 1cd102aaedb2 wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU 74ceef6e6925 wifi: mt76: mt7921: do not support one stream on secondary antenna only 179c65828593 Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition 86b818e2495d staging: rtl8712: fix race condition bd69537c1a2c HID: wacom: remove the battery when the EKR is off 48729a1d2a7a usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 c564d4f91a0c usb: dwc3: meson-g12a: do post init to fix broken usb after resumption bfc4ccc0bcae ALSA: usb-audio: Fix init call orders for UAC1 69d9330f2eff USB: serial: option: add FOXCONN T99W368/T99W373 product 34f396f7abd0 USB: serial: option: add Quectel EM05G variant (0x030e) 5d0fe30be4e2 modules: only allow symbol_get of EXPORT_SYMBOL_GPL modules 36231e2c4ebd rtc: ds1685: use EXPORT_SYMBOL_GPL for ds1685_rtc_poweroff 915219699da1 net: enetc: use EXPORT_SYMBOL_GPL for enetc_phc_index 4dab89cccd8c mmc: au1xmmc: force non-modular build and remove symbol_get usage ac6fa0e04be0 ARM: pxa: remove use of symbol_get() cf859267e639 ksmbd: reduce descriptor size if remaining bytes is less than request size d070c4dd2a5b ksmbd: replace one-element array with flex-array member in struct smb2_ea_info 30fd6521b2fb ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() 7d8855fd849d ksmbd: fix wrong DataOffset validation of create context 1ce9ebc96eda erofs: ensure that the post-EOF tails are all zeroed Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 9be500bb695d0c6f863397d2f4b17d505427001a) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index a391e3b0e6..503732c1c6 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ad7c05a03b8d70ee30ecce783a861cb96ea258cf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine ?= "7327e7ab3b5508182380405a51f2657f5bf669b4" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index e90e92ccbc..61175d5c6f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index c55d411784..e95848ff76 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -17,25 +17,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "8c81de99a4b9f69345873b06077f9d4e1321298e" -SRCREV_machine:qemuarm64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuloongarch64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemumips ?= "733cb5842aeac106f5606df4da7c64a180f0c500" -SRCREV_machine:qemuppc ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuriscv64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuriscv32 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemux86 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemux86-64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemumips64 ?= "1c11fe963667e9380725bef0650aeaea8544ea8b" -SRCREV_machine ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine:qemuarm ?= "3028542fe5ece9dd32c8e3b9b14b2c9f4c9cafac" +SRCREV_machine:qemuarm64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuloongarch64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemumips ?= "33c0b5a0c1af6abb4dee11ffa5ece66ffd01d3c8" +SRCREV_machine:qemuppc ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuriscv64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuriscv32 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemux86 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemux86-64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemumips64 ?= "ee418f38dbc9794b7976ad11fd74f5a3490c7c5e" +SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "c2cbfe5f51227dfe6ef7be013f0d56a32c040faa" +SRCREV_machine:class-devupstream ?= "59b13c2b647e464dd85622c89d7f16c15d681e96" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -43,7 +43,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" PV = "${LINUX_VERSION}+git${SRCPV}" From patchwork Wed Oct 11 00:01:18 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31961 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1D48ECD98CC for ; Wed, 11 Oct 2023 00:02:07 +0000 (UTC) Received: from mail-ot1-f52.google.com (mail-ot1-f52.google.com [209.85.210.52]) by mx.groups.io with SMTP id smtpd.web10.5118.1696982518278051196 for ; Tue, 10 Oct 2023 17:01:58 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=VwKsG2TJ; spf=softfail (domain: sakoman.com, ip: 209.85.210.52, mailfrom: steve@sakoman.com) Received: by mail-ot1-f52.google.com with SMTP id 46e09a7af769-6bf58009a8dso4177723a34.1 for ; Tue, 10 Oct 2023 17:01:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982517; x=1697587317; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=wUhlHJI1vafwtrZT6wwKGtZoeRLBeKJZWMJyUlOY4JA=; b=VwKsG2TJoDqvJ8HsrjtdEydfrlu+cEq0KdV5praQURoa+dR4I6XxDmNvmehhguyFpT ft2AmsVyJcqe0tshKUMt0cgNJW3peiSEQM5znPPJBnXVxctycwO9vJ2tpPmHJYBu6UoO DA5fuSWhq9XkrtsSiQz0EKu8RvUsOJuYsrZNhMo35HIuvZrKUJLI8GmYntxoOqNNlBli h7KwuiE4CAFv4lNKMn3yzNbatFMXF88aW1Gn8o0vLqvv9sBHzVdg4n61KOBbIf9GMDG0 8xBj9Rjo1RdpPrC0CkO5JTdriM9kecvicGEz91ldiXv7XAPjrBrMZqr6u2oj2VsJ1bhy cGBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982517; x=1697587317; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wUhlHJI1vafwtrZT6wwKGtZoeRLBeKJZWMJyUlOY4JA=; b=KCNGsgSJE08rA7NK6P1U7/yPFYOjKYUkohj0FlMypW/i/APBauoi5Fd913+FJlN8Mu iYvuW5ndQdEBMpgpmp/9aYaeZgF6bAu9J804C1PSPJYX96ZI6pr2d6yth27qe7TOFmlH VsNg3XC/oBbkyC3ujsH0SjE+BLndGFlaI3EpEirIwrKAC2aFjxt8ug3ZCHFlDObXMVQw D1WkrDoT54OlvjlpDB2zopshlAljZrMB7z1U+88H5b2br09+MpXPa6KnPd8s3YFw78W/ Hb9gNer2p8ej1jqSrN0Z2rSNZwkW1INtwIDbosD4y9NZzLDnlDS7+l0UCoGDkIlbWCZE udmg== X-Gm-Message-State: AOJu0YyrUWxKUhrj5nB2f1ZDtpn+LVqppms3N2ywJO3MTuEHZQIz2Oty PyhdqVM/H9utcaRvNnB5kriavl393lsEtvkR+to= X-Google-Smtp-Source: AGHT+IEem9PPc7TAu763Gn+RVP1S3Zjl8xq5qkx1KlnnkblnpIMDnNVeCwLhJpHyMEfLaCnAhhtS8Q== X-Received: by 2002:a05:6830:1b77:b0:6b8:6f94:d3a2 with SMTP id d23-20020a0568301b7700b006b86f94d3a2mr21362995ote.25.1696982516459; Tue, 10 Oct 2023 17:01:56 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:56 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 05/20] linux-yocto/6.1: update to v6.1.53 Date: Tue, 10 Oct 2023 14:01:18 -1000 Message-Id: <3f3be3181f78355cfd2c2626f3188c5c1b8c7bc2.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188923 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 09045dae0d90 Linux 6.1.53 41cb5369cb80 udf: initialize newblock to 0 c74b1cd93f26 clk: Avoid invalid function names in CLK_OF_DECLARE() 59e0dd5bef6c treewide: Fix probing of devices in DT overlays abb597c85acb clk: Mark a fwnode as initialized when using CLK_OF_DECLARE() macro b372816ad610 md: fix regression for null-ptr-deference in __md_stop() adac9f0ddd2b NFSv4.2: Rework scratch handling for READ_PLUS (again) 779563475162 NFSv4.2: Fix a potential double free with READ_PLUS d9ece8c0269f md: Free resources in __md_stop ba6a70adb557 Revert "drm/amd/display: Do not set drr on pipe commit" 1dd387668d5b tracing: Zero the pipe cpumask on alloc to avoid spurious -EBUSY e43a7ae58d00 serial: sc16is7xx: fix regression with GPIO configuration 8aaef0a3eb1b serial: sc16is7xx: remove obsolete out_thread label cc8a853c2d5f perf/x86/uncore: Correct the number of CHAs on EMR e1eb0419126f x86/sgx: Break up long non-preemptible delays in sgx_vepc_release() f705617bab47 USB: core: Fix oversight in SuperSpeed initialization 8186596a6635 USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() d309fa69c2e3 USB: core: Change usb_get_device_descriptor() API 90b01f8df568 USB: core: Unite old scheme and new scheme descriptor reads 0d3b5fe47938 usb: typec: bus: verify partner exists in typec_altmode_attention 9b7cd3fe01f0 usb: typec: tcpm: set initial svdm version based on pd revision 33a31064211c of: property: fw_devlink: Add a devlink for panel followers 7f3d84cfaec7 cpufreq: brcmstb-avs-cpufreq: Fix -Warray-bounds bug 08c86156361c crypto: stm32 - fix loop iterating through scatterlist for DMA 73e64c5eeddf s390/dasd: fix string length handling f9a3d6f037c9 s390/ipl: add missing secure/has_secure file to ipl type 'unknown' 6489ec010786 s390/dcssblk: fix kernel crash with list_add corruption 8bf567b63c2a arm64: sdei: abort running SDEI handlers during crash e95d7a8a6edd pstore/ram: Check start of empty przs during init 351705a44621 mmc: renesas_sdhi: register irqs before registering controller a3f6c1447db8 platform/chrome: chromeos_acpi: print hex string for ACPI_TYPE_BUFFER e6e6a5f50f58 x86/MCE: Always save CS register on AMD Zen IF Poison errors d08b39bb3dff fsverity: skip PKCS#7 parser when keyring is empty 40a1ef4bb092 net: handle ARPHRD_PPP in dev_is_mac_header_xmit() 342d130205f1 X.509: if signature is unsupported skip validation 3d5fed8c79d9 r8169: fix ASPM-related issues on a number of systems with NIC version from RTL8168h ba50e7773a99 x86/sev: Make enc_dec_hypercall() accept a size instead of npages f8a7f10a1dcc dccp: Fix out of bounds access in DCCP error handler 9667854e69a7 dlm: fix plock lookup when using multiple lockspaces c96c67991aac bpf: Fix issue in verifying allow_ptr_leaks b23c96589ff7 drm/amd/display: Add smu write msg id fail retry process 5ad3e534605e parisc: Fix /proc/cpuinfo output for lscpu 316a4a329a4d procfs: block chmod on /proc/thread-self/comm 5e4e9900e6fa block: don't add or resize partition on the disk with GENHD_FL_NO_PART 1654635bed83 Revert "PCI: Mark NVIDIA T4 GPUs to avoid bus reset" 5a3e327dc3fd ntb: Fix calculation ntb_transport_tx_free_entry() 88c7931f81d8 ntb: Clean up tx tail index on link down 4f4af6b8b7a2 ntb: Drop packets when qp link is down e95e31a8607d PCI/PM: Only read PCI_PM_CTRL register when available 223fc5352054 PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation 4443f3695d58 PCI: Free released resource after coalescing 316f3984298a scsi: mpt3sas: Perform additional retries if doorbell read returns 0 6c4f87e52331 Revert "scsi: qla2xxx: Fix buffer overrun" ab8c52977fe0 media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts 25934d8f6eb2 media: dvb: symbol fixup for dvb_attach() fd4d61f85e76 ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs. ba0b46166b8e arm64: csum: Fix OoB access in IP checksum code for negative lengths ad661951a98f i3c: master: svc: fix probe failure when no i3c device exist cc9bf2d62f19 LoongArch: mm: Add p?d_leaf() definitions 5a8b2c1665ca xtensa: PMU: fix base address for the newer hardware 9a9b8596c3dc drm/amd/display: register edp_backlight_control() for DCN301 47636d32a0ee backlight/lv5207lp: Compare against struct fb_info.device 83166d03a5b7 backlight/bd6107: Compare against struct fb_info.device b4ab337aad09 backlight/gpio_backlight: Compare against struct fb_info.device 8fa9cb58445d io_uring: break iopolling on signal 4a3e0d51c3e1 XArray: Do not return sibling entries from xa_load() 7a7f11283392 ARM: OMAP2+: Fix -Warray-bounds warning in _pwrdm_state_switch() 09cb2a71b2e9 ipmi_si: fix a memleak in try_smi_init() dafe7acfedfb PCI: rockchip: Use 64-bit mask on MSI 64-bit PCI address 823f52daef12 media: i2c: Add a camera sensor top level menu ceedc62a3bc8 media: i2c: ccs: Check rules is non-NULL fea9dd8653ff cpu/hotplug: Prevent self deadlock on CPU hot-unplug 4245ca8f4051 mm/vmalloc: add a safer version of find_vm_area() for debug 157c46360cf3 scsi: core: Fix the scsi_set_resid() documentation 2344b1397651 printk: ringbuffer: Fix truncating buffer size min_t cast 3f7a4e88e40e rcu: dump vmalloc memory info safely 8ad2e7efb2ce ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl 8918025feb2f PM / devfreq: Fix leak in devfreq_dev_release() d2e906c72597 igb: set max size RX buffer when store bad packet is enabled 04c3eee4e13f skbuff: skb_segment, Call zero copy functions before using skbuff frags 4921f9349b66 netfilter: xt_sctp: validate the flag_info count 1c164c1e9e93 netfilter: xt_u32: validate user space input bcdb4a5c42b0 netfilter: nft_exthdr: Fix non-linear header modification 7ca0706c68ad netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c 6678912b4df1 igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU ad8900dd8a56 virtio_ring: fix avail_wrap_counter in virtqueue_add_packed 4927edc23edc cpufreq: Fix the race condition while updating the transition_task of policy 96db43aced39 Drivers: hv: vmbus: Don't dereference ACPI root object handle e351933e4a14 dmaengine: ste_dma40: Add missing IRQ check in d40_probe 43a57ca7dd90 um: Fix hostaudio build errors 222b85e748eb mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() eaf4c78982ae mtd: spi-nor: Check bus width while setting QE bit 3e313b6c470d leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead f741121a2251 leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false a253c416e67d leds: multicolor: Use rounded division when calculating color components 2804cc350804 leds: pwm: Fix error code in led_pwm_create_fwnode() cae0787e408c rpmsg: glink: Add check for kstrdup f309ac8a4db9 phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write 8f0f5452cb1b phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate 0d86292e3fbb phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 50fa01243dd5 dmaengine: idxd: Modify the dependence of attribute pasid_enabled 6453a2fbc804 mtd: rawnand: brcmnand: Fix mtd oobsize 74c85396bd73 tracing: Fix race issue between cpu buffer write and swap fb34716c9ee6 tracing: Remove extra space at the end of hwlat_detector/mode ca5e8427e20d x86/speculation: Mark all Skylake CPUs as vulnerable to GDS 55a448e8d863 tick/rcu: Fix false positive "softirq work is pending" messages 69b8d7bf834c platform/x86/amd/pmf: Fix a missing cleanup path 2763732ec1e6 HID: multitouch: Correct devm device reference for hidinput input_dev name f283805d9843 HID: uclogic: Correct devm device reference for hidinput input_dev name 6e5960954151 HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() cf38960386f3 RDMA/efa: Fix wrong resources deallocation order 9d9a40530383 RDMA/siw: Correct wrong debug message bbd1b1b5082c RDMA/siw: Balance the reference of cep->kref in the error path 3f39698e7e84 Revert "IB/isert: Fix incorrect release of isert connection" 81ff633a88be amba: bus: fix refcount leak db18d5e3eee4 serial: tegra: handle clk prepare error in tegra_uart_hw_init() 93e908545361 interconnect: qcom: bcm-voter: Use enable_maks for keepalive voting e9ef8b5099d5 interconnect: qcom: bcm-voter: Improve enable_mask handling 1d085c6a25fa interconnect: qcom: sm8450: Enable sync_state 5a5fb3b1754f scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock f06c7d823ab5 scsi: core: Use 32-bit hostnum in scsi_host_lookup() f01cfec8d345 RDMA/irdma: Prevent zero-length STAG registration 5fa1552877ce coresight: trbe: Fix TRBE potential sleep in atomic context 848cd6f24aa7 cgroup:namespace: Remove unused cgroup_namespaces_init() 0d545a8e77cb Revert "f2fs: fix to do sanity check on extent cache correctly" 3f60a36ed6e3 f2fs: Only lfs mode is allowed with zoned block device feature 33d4c00725b0 f2fs: judge whether discard_unit is section only when have CONFIG_BLK_DEV_ZONED 4d7e804f49a0 f2fs: fix to avoid mmap vs set_compress_option case 3a2cf76cfb8f media: i2c: rdacm21: Fix uninitialized value 86a41ad0128a media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors 85fb0b963f2b media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working 0790c0914059 media: ov2680: Add ov2680_fill_format() helper function 90fbf01c8080 media: ov2680: Don't take the lock for try_fmt calls e0b6edf4a346 media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s 6d51cdf66b9f media: ov2680: Fix vflip / hflip set functions 7263c39fd711 media: ov2680: Fix ov2680_bayer_order() ef9055e9a768 media: ov2680: Remove auto-gain and auto-exposure controls 9e6e509c08f6 media: i2c: ov2680: Set V4L2_CTRL_FLAG_MODIFY_LAYOUT on flips 2b9d0a65d133 media: ov5640: Fix initial RESETB state and annotate timings 5074c70795d4 media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() a4cd2c3eff18 HID: input: Support devices sending Eraser without Invert 297992e5c635 drivers: base: Free devm resources when unregistering a device 66eb45e7d5fc USB: gadget: f_mass_storage: Fix unused variable warning 324da2f3ee73 USB: gadget: core: Add missing kerneldoc for vbus_work 365ce3f86bb1 docs: ABI: fix spelling/grammar in SBEFIFO timeout interface c90182cffbff media: venus: hfi_venus: Only consider sys_idle_indicator on V1 d52509fdb29c media: go7007: Remove redundant if statement 0294e2475092 media: cec: core: add adap_unconfigured() callback d6610151ae22 media: cec: core: add adap_nb_transmit_canceled() callback 6ced15ff1746 platform/x86: dell-sysman: Fix reference leak 45e3181d7995 iommu/vt-d: Fix to flush cache of PASID directory table d9c47d2bf307 iommu/qcom: Disable and reset context bank before programming a30f26dc3ad9 fsi: aspeed: Reset master errors after CFAM reset d020963638f2 IB/uverbs: Fix an potential error pointer dereference 4dca13c30b9e RDMA/hns: Fix CQ and QP cache affinity 2368ce8cd5ad RDMA/hns: Fix inaccurate error label name in init instance 93c986805f4e RDMA/hns: Fix incorrect post-send with direct wqe of wr-list c48b0b30ac92 RDMA/hns: Fix port active speed 117a1b903baf iommu/sprd: Add missing force_aperture fadc62aa82d2 iommu/mediatek: Fix two IOMMU share pagetable issue f81325a709dd iommu/mediatek: Remove unused "mapping" member from mtk_iommu_data 343ccde5ade7 extcon: cht_wc: add POWER_SUPPLY dependency d3e075a3f099 kernfs: add stub helper for kernfs_generic_poll() 91a05d4c12ce driver core: Call dma_cleanup() on the test_remove path 58a3b87be681 driver core: test_async: fix an error code 636f5b8a6601 dma-buf/sync_file: Fix docs syntax ae867cab6bc9 interconnect: qcom: qcm2290: Enable sync state 7e1476f27751 coresight: tmc: Explicit type conversions to prevent integer overflow ee8f58b40e4a RDMA/irdma: Replace one-element array with flexible-array member af6fd0b3bccf scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly dd8ce1c9ff49 scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly 472f2497a4c8 scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly 70518f3aaf5a RDMA/rxe: Fix incomplete state save in rxe_requester 59a4f61feccf RDMA/rxe: Split rxe_run_task() into two subroutines 0ad56bf59dc3 x86/APM: drop the duplicate APM_MINOR_DEV macro 6d209ed70f9c serial: sprd: Fix DMA buffer leak issue 70f7513342f4 serial: sprd: Assign sprd_port after initialized to avoid wrong access 21608d2ba565 iio: accel: adxl313: Fix adxl313_i2c_id[] table 25feffb3fbd5 scsi: qla4xxx: Add length check when parsing nlattrs 1806edae979f scsi: be2iscsi: Add length check when parsing nlattrs 85b8c282d185 scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() bb8d101b835a scsi: iscsi: Add length check for nlattr payload 2737d82760ae scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() bdc4f8f68171 scsi: RDMA/srp: Fix residual handling 67b02818e209 usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() 858322c409e0 media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init() bdc00039fd1b media: mediatek: vcodec: fix potential double free a356b60031d1 media: mediatek: vcodec: Return NULL if no vdec_fb is found b4ee61e5a110 media: amphion: ensure the bitops don't cross boundaries 932d84a8a808 media: amphion: fix UNUSED_VALUE issue reported by coverity 60f6392bdede media: amphion: fix UNINIT issues reported by coverity bddd678fd286 media: amphion: fix REVERSE_INULL issues reported by coverity 3930d62f5d7c media: amphion: fix CHECKED_RETURN issues reported by coverity 9ada33ee83dd media: rkvdec: increase max supported height for H.264 715c0200b480 media: mtk-jpeg: Fix use after free bug due to uncanceled work 62ea218a7e7f media: amphion: add helper function to get id name 745f40a96c7f media: amphion: reinit vpu if reqbufs output 0 6f0d0f5613d7 dt-bindings: extcon: maxim,max77843: restrict connector properties dd0dadb93844 scsi: hisi_sas: Fix normally completed I/O analysed as failed ab0719d7b6e4 scsi: hisi_sas: Fix warnings detected by sparse 79a1a8f83869 RDMA/siw: Fabricate a GID on tun and loopback devices a96892a40fce media: cx24120: Add retval check for cx24120_message_send() 2b6e20ef0585 media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 323ee5fc980b media: dib7000p: Fix potential division by zero 90e0ea8e9b26 drivers: usb: smsusb: fix error handling code in smsusb_init_device 92e2dcf9412f iommu: rockchip: Fix directory table address encoding 13ed255248df iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind 25afb3e03bf8 media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() aeb79a1778cb media: i2c: tvp5150: check return value of devm_kasprintf() d7d47edf78c9 media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables 79e2cc5c4c10 media: ov5640: fix low resolution image abnormal issue 5643c936d1b8 RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() 8199a46af2ea cgroup/cpuset: Inherit parent's load balance state in v2 590b45e5cd12 pNFS: Fix assignment of xprtdata.cred 4030ace74d8b NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ fdbc9637bf82 NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN 6d08bd22fa29 NFSD: da_addr_body field missing in some GETDEVICEINFO replies 02a29a2455b0 fs: lockd: avoid possible wrong NULL parameter f27f759f4cd4 jfs: validate max amount of blocks before allocation. b648f5717581 ext4: fix unttached inode after power cut with orphan file feature enabled f17d5efaafba powerpc/iommu: Fix notifiers being shared by PCI and VIO buses e83f5e21089b powerpc/mpc5xxx: Add missing fwnode_handle_put() 4515f1676d8d powerpc/pseries: Fix hcall tracepoints with JUMP_LABEL=n ebbfe48dd15f nfs/blocklayout: Use the passed in gfp flags 4c8568cf4c45 powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT a5b6b008e358 powerpc: Don't include lppaca.h in paca.h 18d51547fe2f NFSv4.2: Fix READ_PLUS size calculations fccdafa51de0 NFSv4.2: Fix up READ_PLUS alignment 5c47974263e8 NFSv4.2: Fix READ_PLUS smatch warnings 886959f425b6 NFSv4.2: Rework scratch handling for READ_PLUS e12e13952b0c wifi: ath10k: Use RMW accessors for changing LNKCTL 811ec8bc68f3 wifi: ath11k: Use RMW accessors for changing LNKCTL 7f4c9c44d1b9 net/mlx5: Use RMW accessors for changing LNKCTL 433330fb1296 drm/radeon: Use RMW accessors for changing LNKCTL a0f0daf60bc1 drm/amdgpu: Use RMW accessors for changing LNKCTL ed6483fac428 powerpc/perf: Convert fsl_emb notifier to state machine callbacks 1d58a9246989 powerpc/fadump: reset dump area size if fadump memory reserve fails ab8094db59e1 nvdimm: Fix dereference after free in register_nvdimm_pmu() 500a6ff9c2a8 nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() f6f300ecc196 vfio/type1: fix cap_migration information leak aae5a866d397 powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE dd9241fc4b19 clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op cc7e04d7ff92 clk: imx8mp: fix sai4 clock fcaf148b20f0 clk: imx: imx8ulp: update SPLL2 type e1139dea2c02 clk: imx: pllv4: Fix SPLL2 MULT range 402e73f64597 clk: qcom: gcc-sm8450: Use floor ops for SDCC RCGs 6c88c9d9c630 PCI/ASPM: Use RMW accessors for changing LNKCTL 952da7c6e199 PCI: pciehp: Use RMW accessors for changing LNKCTL f2d7da8fafed PCI: Add locking to RMW PCI Express Capability Register accessors 3108f7c78884 PCI: Allow drivers to request exclusive config regions 8a5e87f9e93c pinctrl: mcp23s08: check return value of devm_kasprintf() 8562df72cff2 PCI: Mark NVIDIA T4 GPUs to avoid bus reset f3229c9cb634 PCI: microchip: Correct the DED and SEC interrupt bit offsets 9daefd22756e clk: qcom: gcc-sm6350: Fix gcc_sdcc2_apps_clk_src a1801d14a891 clk: qcom: reset: Use the correct type of sleep/delay based on length a4ff4b54f388 kvm/vfio: ensure kvg instance stays around in kvm_vfio_group_add() fef33ca5e28c kvm/vfio: Prepare for accepting vfio device fd cc16a50d5088 clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src e0f5698757ab ext4: avoid potential data overflow in next_linear_group 772ca4bc1d0d ext4: correct grp validation in ext4_mb_good_group d5fc7d681320 EDAC/igen6: Fix the issue of no error events 8f43c4000cdf clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src d1a5f22abab4 clk: sunxi-ng: Modify mismatched function name d96799ee3b78 PCI/DOE: Fix destroy_work_on_stack() race 4a43285900cd drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() d96da888dcd7 PCI: qcom-ep: Switch MHI bus master clock off during L1SS c53d53006d7f PCI: apple: Initialize pcie->nvecs before use 7618133eda26 clk: rockchip: rk3568: Fix PLL rate setting for 78.75MHz eb613f81d034 clk: qcom: gcc-sc8280xp: Add missing GDSCs 57fc62c50690 dt-bindings: clock: qcom,gcc-sc8280xp: Add missing GDSCs 06d3a7e03c61 clk: qcom: gcc-sc8280xp: Add missing GDSC flags 747848b4afea clk: qcom: gcc-sc8280xp: Add EMAC GDSCs 9cba16beca66 clk: qcom: gpucc-sm6350: Fix clock source names 6ace98cb617b clk: qcom: gpucc-sm6350: Introduce index-based clk lookup 74a1194cce60 ipmi:ssif: Fix a memory leak when scanning for an adapter 2e7d90a81b9c ipmi:ssif: Add check for kstrdup abbd28d04c36 ALSA: ac97: Fix possible error value of *rac97 53996463f8c3 of: unittest: Fix overlay type in apply/revert check 3fb210cd521c of: overlay: Call of_changeset_init() early b13b0c84a4af ASoC: SOF: amd: clear dsp to host interrupt status c4b06324fc44 md: raid0: account for split bio in iostat accounting cc54fa43de67 md/raid0: Fix performance regression for large sequential writes cd1dd83888d7 md/raid0: Factor out helper for mapping and submitting a bio c227aa141660 md: add error_handlers for raid0 and linear bc82cd1e7ff2 firmware: cs_dsp: Fix new control name check 711fb9260620 md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() ac9e103f282a md/raid5-cache: fix a deadlock in r5l_exit_log() 26bf790b8e99 bus: ti-sysc: Fix cast to enum warning 5abfee5e4076 arm64: dts: qcom: sc8280xp-x13s: Unreserve NC pins b386c3e16956 arm64: dts: qcom: msm8996: Fix dsi1 interrupts c6035ee015b9 arm64: dts: qcom: msm8998: Add missing power domain to MMSS SMMU cab4cdb2a4bd arm64: dts: qcom: msm8998: Drop bus clock reference from MMSS SMMU 67b4726cb87e arm64: dts: qcom: apq8016-sbc: Fix ov5640 regulator supply names 867aa88c9efa drm/mediatek: Fix potential memory leak if vmap() fail 1e47d1ac20e3 ARM: dts: qcom: ipq4019: correct SDHCI XO clock 4d6a25792fc1 drm/mediatek: Remove freeing not dynamic allocated memory 635051576f0e bus: ti-sysc: Fix build warning for 64-bit build b625a6eaf2bf drm/mediatek: dp: Add missing error checks in mtk_dp_parse_capabilities 0c323430e470 io_uring: fix drain stalls by invalid SQE 9183c4fe9141 block/mq-deadline: use correct way to throttling write requests 9ca08adb75fb audit: fix possible soft lockup in __audit_inode_child() 607eda339b60 drm/msm/a2xx: Call adreno_gpu_init() earlier f27dff881f0b drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() d41ceafe3d24 smackfs: Prevent underflow in smk_set_cipso() d1994bb5947c drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done bd3a6b6d5dd8 firmware: meson_sm: fix to avoid potential NULL pointer dereference 2965015006ef drm/msm/mdp5: Don't leak some plane state 0cd481c27b03 soc: qcom: smem: Fix incompatible types in comparison 3b1f1999a300 drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask 9b372d2fdc44 ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig 92eaa1840301 drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 4174f889c4c1 drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() d544c89bb1cd drm/armada: Fix off-by-one error in armada_overlay_get_property() 0ef736fec614 ARM: dts: BCM53573: Fix Tenda AC9 switch CPU port 976eca4cbd37 arm64: dts: qcom: sm8150: Fix the I2C7 interrupt 43cc228099c5 of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name() 4ab834ff9fbf drm/tegra: dpaux: Fix incorrect return value of platform_get_irq 508383dc278c drm/msm: Update dev core dump to not print backwards f9b9c6b0d451 md/md-bitmap: hold 'reconfig_mutex' in backlog_store() e970bc3828b7 md/md-bitmap: remove unnecessary local variable in backlog_store() 3829cb3caeda md/raid10: use dereference_rdev_and_rrdev() to get devices 27acd8c13183 md/raid10: factor out dereference_rdev_and_rrdev() 097f30f0cef8 md: restore 'noio_flag' for the last mddev_resume() 835cbfebc1c5 md: Change active_io to percpu 3db392257008 md: Factor out is_md_suspended helper 8dcc23191a6d drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' 13f5c43e0921 arm64: dts: qcom: msm8996-gemini: fix touchscreen VIO supply 5ccd294df265 arm64: dts: qcom: sdm845: Fix the min frequency of "ice_core_clk" 4aaced381c69 arm64: dts: qcom: sdm845: Add missing RPMh power domain to GCC a80621bb23dc ARM: dts: BCM53573: Fix Ethernet info for Luxul devices b9fa4e10b5cf drm: adv7511: Fix low refresh rate register for ADV7533/5 1a7314734743 ARM: dts: samsung: s5pv210-smdkv210: correct ethernet reg addresses (split) 9a91a5466ab1 ARM: dts: s5pv210: add dummy 5V regulator for backlight on SMDKv210 4e184a73203c ARM: dts: samsung: s3c6410-mini6410: correct ethernet reg addresses (split) 075ee661ba67 drm/bridge: anx7625: Use common macros for HDCP capabilities ba1ca2cf4d00 drm/bridge: anx7625: Use common macros for DP power sequencing commands d309b170ea70 x86/mm: Fix PAT bit missing from page protection modify mask 00c0b2825bb5 block: don't allow enabling a cache on devices that don't support it e5e0ec8ff160 block: cleanup queue_wc_store 7db90dd1c5a4 drm/etnaviv: fix dumping of active MMU context 800bf8a2226e arm64: tegra: Fix HSUART for Smaug ee5e1d6480ef arm64: dts: qcom: pmi8994: Add missing OVP interrupt 31fe89ccf5a0 arm64: dts: qcom: pm660l: Add missing short interrupt cd1ba241d21e arm64: dts: qcom: pm6150l: Add missing short interrupt 6fd913f0f63f arm64: dts: qcom: sm8250-sony-xperia: correct GPIO keys wakeup again 0f0e6963705a arm64: tegra: Fix HSUART for Jetson AGX Orin f5ff6897094f ARM: dts: BCM53573: Use updated "spi-gpio" binding properties ab5154ae26c4 ARM: dts: BCM53573: Add cells sizes to PCIe node ee1d740374aa ARM: dts: BCM53573: Drop nonexistent #usb-cells fd28ce30b525 drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() 1f3b03863ef5 firmware: ti_sci: Use system_state to determine polling 0765a80c160d ARM: dts: stm32: Add missing detach mailbox for DHCOM SoM e3c7b7ce7cd6 ARM: dts: stm32: Update to generic ADC channel binding on DHSOM systems 9d77a7fc5d04 ARM: dts: stm32: Add missing detach mailbox for Odyssey SoM c0929f2bbd68 ARM: dts: stm32: YAML validation fails for Odyssey Boards aa72079a1952 ARM: dts: stm32: Add missing detach mailbox for emtrion emSBC-Argon 0746cab4768d ARM: dts: stm32: adopt generic iio bindings for adc channels on emstamp-argon a5274a79ef3a ARM: dts: stm32: YAML validation fails for Argon Boards e62c091b6dfa ARM: dts: stm32: Rename mdio0 to mdio e8d6e54daf1a arm64: dts: qcom: sm8250: Mark PCIe hosts as DMA coherent c755b194d793 arm64: dts: qcom: pmk8350: fix ADC-TM compatible string 5aa1969ce7c4 arm64: dts: qcom: pmr735b: fix thermal zone name de4688dcc0f6 arm64: dts: qcom: pm8350b: fix thermal zone name 0f52060fa1db arm64: dts: qcom: pm8350: fix thermal zone name 8fd3533f4bce arm64: dts: qcom: sm8350: Use proper CPU compatibles db336dcb0127 arm64: dts: qcom: sm8350: Add missing LMH interrupts to cpufreq 0c32fba73549 arm64: dts: qcom: sm8350: Fix CPU idle state residency times c97633eaf571 arm64: dts: qcom: sdm845-tama: Set serial indices and stdout-path 8622340505dc arm64: dts: qcom: msm8996: Add missing interrupt to the USB2 controller 82c3d3490b6b arm64: dts: qcom: sc8280xp: Add missing SCM interconnect e5bf98ceac1e arm64: dts: qcom: sc8280xp-crd: Correct vreg_misc_3p3 GPIO 4c7477d0daaa arm64: dts: qcom: sm8250-edo: Rectify gpio-keys 7852d207882c arm64: dts: qcom: sm8250-edo: Add GPIO line names for PMIC GPIOs 4a36d16cdf3c arm64: dts: qcom: sm8250-edo: Add gpio line names for TLMM 537346ff2a60 arm64: dts: qcom: msm8916-l8150: correct light sensor VDDIO supply d244c92988ab arm64: dts: qcom: sm8250: correct dynamic power coefficients e2040c110138 arm64: dts: qcom: sm6350: Fix ZAP region ba7ff6085b80 soc: qcom: ocmem: Fix NUM_PORTS & NUM_MACROS macros fb4a774a6627 soc: qcom: ocmem: Add OCMEM hardware version print 7bdeb7679f4c ASoC: stac9766: fix build errors with REGMAP_AC97 c2c6dfc04237 drm/hyperv: Fix a compilation issue because of not including screen_info.h a9fa161b8356 drm/amd/display: Do not set drr on pipe commit 3027e200dd58 quota: fix dqput() to follow the guarantees dquot_srcu should provide d57af071cf40 quota: add new helper dquot_active() fdcc50d506f3 quota: rename dquot_active() to inode_quota_active() 622789ebe197 quota: factor out dquot_write_dquot() 25193037e083 ASoC: cs43130: Fix numerator/denominator mixup aa449fa41e10 drm/bridge: tc358764: Fix debug print parameter order 45107f9ca863 netrom: Deny concurrent connect(). a1e820fc7808 net/sched: sch_hfsc: Ensure inner classes have fsc curve 85da5ec0681e sfc: Check firmware supports Ethernet PTP filter ea701e0eba7e cteonxt2-pf: Fix backpressure config for multiple PFC priorities to work simultaneously 1b7f266e0219 octeontx2-pf: Fix PFC TX scheduler free 80de42d9af97 octeontx2-pf: Refactor schedular queue alloc/free calls 23a7b872898b hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() 8b2fb4b671b3 mlxsw: core_hwmon: Adjust module label names based on MTCAP sensor counter 6406a95c4a5e mlxsw: i2c: Limit single transaction buffer size 2fc240094031 mlxsw: i2c: Fix chunk size setting in output mailbox buffer ec9538da6ce4 net: arcnet: Do not call kfree_skb() under local_irq_disable() cb09afe905cb ice: avoid executing commands on other ports when driving sync 90e7778660c9 wifi: ath9k: use IS_ERR() with debugfs_create_dir() 4a8fadcf3748 arm64: mm: use ptep_clear() instead of pte_clear() in clear_flush() a33ae132eec2 Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() 7e7197e4d6a1 wifi: mwifiex: avoid possible NULL skb pointer dereference 7930fa4ca871 mac80211: make ieee80211_tx_info padding explicit 4381d6083254 wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute 4c340bfddce6 wifi: ath9k: protect WMI command response buffer replacement with a lock 8ba31f946a6d wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx 7984c381bbc1 samples/bpf: fix broken map lookup probe c813db76bc15 samples/bpf: fix bio latency check with tracepoint ef67f3a959a7 ARM: dts: Add .dts files missing from the build cde525d61178 wifi: mwifiex: Fix missed return in oob checks failed path 84081b4baafb wifi: mwifiex: fix memory leak in mwifiex_histogram_read() 9257a1d6f272 net: annotate data-races around sk->sk_lingertime 844d60cc5efc fs: ocfs2: namei: check return value of ocfs2_add_entry() a485a4bd8238 lwt: Check LWTUNNEL_XMIT_CONTINUE strictly 065d5f17096e lwt: Fix return values of BPF xmit ops 0159a21b9d8e hwrng: iproc-rng200 - Implement suspend and resume calls 92651ce45ba1 crypto: caam - fix unchecked return value error 841d2fffd09f ice: ice_aq_check_events: fix off-by-one check when filling buffer 0f50641222f5 net-memcg: Fix scope of sockmem pressure indicators 8d61adfb5918 selftests/bpf: Clean up fmod_ret in bench_rename test script eafa3465c8d9 selftests/bpf: Fix repeat option when kfunc_call verification fails d6702008fc9c net: tcp: fix unexcepted socket die when snd_wnd is 0 81d8e9f59df6 Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() bd39b5524047 Bluetooth: hci_sync: Don't double print name in add/remove adv_monitor 94617b736c25 Bluetooth: Fix potential use-after-free when clear keys 9246d9310cd6 Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() c4cb61c5f976 crypto: api - Use work queue in crypto_destroy_instance 501f77cfce8a crypto: stm32 - Properly handle pm_runtime_get failing 6fc09c8d765e kbuild: rust_is_available: fix confusion when a version appears in the path 4f8c55ae5d58 kbuild: rust_is_available: add check for `bindgen` invocation bb15fb4e497e kbuild: rust_is_available: fix version check when CC has multiple arguments 6c7182b9c87e kbuild: rust_is_available: remove -v option 90978b2ff422 selftests/bpf: fix static assert compilation issue for test_cls_*.c c015029dfc89 wifi: mwifiex: fix error recovery in PCIE buffer descriptor management 3975e21d4d01 wifi: mwifiex: Fix OOB and integer underflow when rx packets 49b6db89ab28 wifi: mt76: mt7915: fix power-limits while chan_switch 2dd5c7f4200a can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM ce60bfc24c88 spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() f5f7aa2b6b8f wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH c0ce0fb76610 bpf: reject unhashed sockets in bpf_sk_assign 99331d7c6ee2 udp: re-score reuseport groups when connected sockets are present 328b85e7b14f wifi: mt76: mt7921: fix non-PSC channel scan fail 6bf4ccafb356 wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() 39a6b4bbc573 regmap: rbtree: Use alloc_flags for memory allocations 684431894e06 hwrng: pic32 - use devm_clk_get_enabled 79a8ea5bf421 hwrng: nomadik - keep clock enabled while hwrng is registered 73d97508ab11 tcp: tcp_enter_quickack_mode() should be static 01964c630824 crypto: qat - change value of default idle filter 912310dd841b bpf: Fix an error in verifying a field in a union 780f072f4fad bpf: Clear the probe_addr for uprobe 0cfbadb15351 libbpf: Fix realloc API handling in zero-sized edge cases fc7ed36a31b1 bpftool: Use a local bpf_perf_event_value to fix accessing its fields 0b20dc1edd88 bpftool: Use a local copy of BPF_LINK_TYPE_PERF_EVENT in pid_iter.bpf.c 840c64d96e39 bpftool: Define a local bpf_perf_link to fix accessing its fields 4d5f00b2fa2c bpftool: use a local copy of perf_event to fix accessing :: Bpf_cookie 010c6a02e6e1 selftests/bpf: Fix bpf_nf failure upon test rerun 6f2b84248bab cpufreq: powernow-k8: Use related_cpus instead of cpus in driver.exit() 91f76271ec43 x86/efistub: Fix PCI ROM preservation in mixed mode fcf78a17bbb9 cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver 14920fb907f0 cpufreq: amd-pstate-ut: Remove module parameter access 7da6250d2967 thermal/of: Fix potential uninitialized value access 7c7093256806 ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table a99f32b81ca1 ACPI: x86: s2idle: Post-increment variables when getting constraints 8ee6d04ef24b irqchip/loongson-eiointc: Fix return value checking of eiointc_index 14e37e08b4e1 s390/paes: fix PKEY_TYPE_EP11_AES handling for secure keyblobs f326e37a210e s390/pkey: fix PKEY_TYPE_EP11_AES handling for sysfs attributes f98ea9abc1f7 s390/pkey: fix PKEY_TYPE_EP11_AES handling in PKEY_GENSECK2 IOCTL 87d452a076d1 s390/pkey: fix/harmonize internal keyblob headers 7d31730c5d81 selftests/futex: Order calls to futex_lock_pi 048d1a8b9da8 perf/imx_ddr: don't enable counter0 if none of 4 counters are used 5fce29ab20cb sched/rt: Fix sysctl_sched_rr_timeslice intial value dfadde169774 arm64/fpsimd: Only provide the length to cpufeature for xCR registers 8efd0420290e arm64/sme: Don't use streaming mode to probe the maximum SME VL 1d9a735d4e45 x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved be361e5ec4b2 sched/psi: Select KERNFS as needed 287aeeb731e9 arm64/ptrace: Clean up error handling path in sve_set_common() 9d8f66d6de83 selftests/resctrl: Close perf value read fd on errors f046a88cbadd selftests/resctrl: Unmount resctrl FS if child fails to run benchmark d4b1f43944c5 selftests/resctrl: Don't leak buffer in fill_cache() 1051a1c5dd26 selftests/resctrl: Add resctrl.h into build deps 5d343b49078d OPP: Fix passing 0 to PTR_ERR in _opp_attach_genpd() e0322a255a22 refscale: Fix uninitalized use of wait_queue_head_t 085fe4323841 ARM: ptrace: Restore syscall skipping for tracers 916ca8192201 ARM: ptrace: Restore syscall restart tracing ed134f284b4e vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing 1cdf51b4e5ef selftests/harness: Actually report SKIP for signal tests c13e6edbad1a tmpfs: verify {g,u}id mount options correctly 254c396da3a2 iomap: Remove large folio handling in iomap_invalidate_folio() b553ac4894e7 fs: Fix error checking for d_hash_and_lookup() e12214c7ad13 eventfd: prevent underflow for eventfd semaphores 9720f894286e reiserfs: Check the return value from __getblk() 0c7e6ff75e6c tools/resolve_btfids: Fix setting HOSTCFLAGS 1ad863e91af8 tools/resolve_btfids: Pass HOSTCFLAGS as EXTRA_CFLAGS to prepare targets a2a9f5bcccab tools/resolve_btfids: Tidy HOST_OVERRIDES b3f1d78c672e tools/resolve_btfids: Compile resolve_btfids as host program 833a654b510b tools/resolve_btfids: Alter how HOSTCC is forced 2457021a4f07 tools/resolve_btfids: Install subcmd headers d35187340a8a tools/resolve_btfids: Use pkg-config to locate libelf 05026e944bd2 tools lib subcmd: Add dependency test to install_headers 424fd5693246 tools lib subcmd: Make install_headers clearer a07388d1a773 tools lib subcmd: Add install target b9c54fd37668 Revert "net: macsec: preserve ingress frame ordering" 786e09ae59f0 Revert "PCI: tegra194: Enable support for 256 Byte payload" f725ae7f0e2b Input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN b990ac56447c udf: Handle error when adding extent to a file 6ac8f2c8362a udf: Check consistency of Space Bitmap Descriptor 7ac1467f9472 drm/amd/display: ensure async flips are only accepted for fast updates 8f965b5b525d net: Avoid address overwrite in kernel_connect 8c737d950c2b KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages 45e3dfbf0e0c KVM: x86/mmu: Use kstrtobool() instead of strtobool() 181831df9de8 tpm: Enable hwrng only for Pluton on AMD CPUs 9c8dab18f830 crypto: rsa-pkcs1pad - Use helper to set reqsize 63f1117db590 cpufreq: intel_pstate: set stale CPU frequency to minimum c50fdd533448 of: property: Simplify of_link_to_phandle() 8f647ac91a22 platform/mellanox: Fix mlxbf-tmfifo not handling all virtio CONSOLE notifications 10f358cd4b0e tracing: Introduce pipe_cpumask to avoid race on trace_pipes 41103f7f688a net: sfp: handle 100G/25G active optical cables in sfp_parse_support f24681b8162b ALSA: seq: oss: Fix racy open/close of MIDI devices ab5c5c10d066 LoongArch: Fix the write_fcsr() macro 9920a52362a0 LoongArch: Let pmd_present() return true when splitting pmd 790587097c01 scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path 1a7f80f33a59 scsi: storvsc: Always set no_report_opcodes 7d1ac3c2eb70 scsi: aacraid: Reply queue mapping to CPUs based on IRQ affinity dcfd75bca8cf sctp: handle invalid error codes without calling BUG() fbd3ae6997fb cifs: fix max_credits implementation 8a424afa08c5 cifs: fix sockaddr comparison in iface_cmp ea13eff14ef2 bnx2x: fix page fault following EEH recovery 179b9b062fe8 netlabel: fix shift wrapping bug in netlbl_catmap_setlong() 78ef22febd68 wifi: mac80211: Use active_links instead of valid_links in Tx 41b446e4904a wifi: cfg80211: remove links only on AP 5251c835324b drm/amdgpu: Match against exact bootloader status f20bee49dc2a net: hns3: restore user pause configure when disable autoneg c61d10461279 scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock 24d9cc933597 scsi: lpfc: Remove reftag check in DIF paths c70b9758eebe platform/x86/amd/pmf: Fix unsigned comparison with less than zero acf4ec3b4244 idmaengine: make FSL_EDMA and INTEL_IDMA64 depends on HAS_IOMEM 59c4b9a2caf4 powerpc/powermac: Use early_* IO variants in via_calibrate_decr() 54d3fba7d8c5 wifi: brcmfmac: Fix field-spanning write in brcmf_scan_params_v2_to_v1() 71f5a7f1745c net: usb: qmi_wwan: add Quectel EM05GV2 a2b5a9654a1d net: annotate data-races around sk->sk_{rcv|snd}timeo 94515e9aa84c net: dsa: microchip: KSZ9477 register regmap alignment to 32 bit boundaries 848477e08391 Revert "wifi: ath6k: silence false positive -Wno-dangling-pointer warning on GCC 12" 51edd7383b1e vmbus_testing: fix wrong python syntax for integer value comparison 98f933716a52 clk: fixed-mmio: make COMMON_CLK_FIXED_MMIO depend on HAS_IOMEM 473a55cfc131 kprobes: Prohibit probing on CFI preamble symbol 896e9e57784c security: keys: perform capable check only on privileged operations 0ffed24af577 staging: fbtft: ili9341: use macro FBTFT_REGISTER_SPI_DRIVER 55954eea708f ALSA: usb-audio: Update for native DSD support quirks d676d02be8e2 ata: pata_arasan_cf: Use dev_err_probe() instead dev_err() in data_xfer() fbf4048d8fba ovl: Always reevaluate the file signature for IMA ae1cb9656ef4 drm/amd/display: Exit idle optimizations before attempt to access PHY faa77cf5f28f drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family d7b1aa3e2098 drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock 7c2d13fb9bab platform/x86: huawei-wmi: Silence ambient light sensor 5c5628287bac platform/x86: asus-wmi: Fix setting RGB mode on some TUF laptops aeee50c15291 platform/x86: think-lmi: Use kfree_sensitive instead of kfree dea41980d793 platform/x86/intel/hid: Add HP Dragonfly G2 to VGBS DMI quirks 7d0f7924ef61 platform/x86: intel: hid: Always call BTNL ACPI method eb54ad1ed620 ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset 9c1263320163 ASoC: atmel: Fix the 8K sample parameter in I2SC master 2e780a9f4ac1 ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 a1fbf45a24d3 ASoC: rt711: fix for JD event handling in ClockStop Mode0 82e17577b66f ASoc: codecs: ES8316: Fix DMIC config 10999df817cb ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 952af5cfd5b4 fs/nls: make load_nls() take a const parameter d28f76be7952 s390/dasd: fix hanging device after request requeue d563f679a268 s390/dasd: use correct number of retries for ERP requests a41f2f6aff5e m68k: Fix invalid .section syntax 328fcde050ff ethernet: atheros: fix return value check in atl1c_tso_csum() 0f7b43a5776b ASoC: nau8821: Add DMI quirk mechanism for active-high jack-detect eb746c4750a8 ASoC: da7219: Check for failure reading AAD IRQ events 3c59ad8d6e8e ASoC: da7219: Flush pending AAD IRQ when suspending 330d900620df ksmbd: fix out of bounds in init_smb2_rsp_hdr() 99a2426b135e ksmbd: no response from compound read becb5191d1d5 ksmbd: validate session id and tree id in compound request 9776024ee06b ksmbd: fix out of bounds in smb3_decrypt_req() 513eac8b8530 9p: virtio: make sure 'offs' is initialized in zc_request 05d88512e833 9p: virtio: fix unlikely null pointer deref in handle_rerror 72c90ebb2dc5 media: pci: cx23885: fix error handling for cx23885 ATSC boards eb3c2b3519bf media: pulse8-cec: handle possible ping error 0b6e7170ccdf media: amphion: use dev_err_probe 026e918b3670 phy: qcom-snps-femto-v2: use qcom_snps_hsphy_suspend/resume error code 2981ff271d52 Revert "MIPS: unhide PATA_PLATFORM" b60802573357 media: uapi: HEVC: Add num_delta_pocs_of_ref_rps_idx field 36148a9b144c powerpc/boot: Disable power10 features after BOOTAFLAGS assignment 4e005f5dd5b0 ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform f4bd9a43152e ARM: dts: imx: Set default tuning step for imx7d usdhc 7f483ce4699a Revert "Revert drm/amd/display: Enable Freesync Video Mode by default" 6ab081571f6a scsi: ufs: Try harder to change the power mode 9fc3adc6d0fe Partially revert "drm/amd/display: Fix possible underflow for displays with large vblank" 918639847212 Revert "bridge: Add extack warning when enabling STP in netns." Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit f4a68ccbd2d4cf3209328e6a800aa9fbaadca172) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 503732c1c6..9e94fc5255 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7327e7ab3b5508182380405a51f2657f5bf669b4" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine ?= "af2faa46d440ee11170ba8233eec0f818988f256" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 61175d5c6f..04ae601e69 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index e95848ff76..567e0154bd 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -17,25 +17,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "3028542fe5ece9dd32c8e3b9b14b2c9f4c9cafac" -SRCREV_machine:qemuarm64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuloongarch64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemumips ?= "33c0b5a0c1af6abb4dee11ffa5ece66ffd01d3c8" -SRCREV_machine:qemuppc ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuriscv64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuriscv32 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemux86 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemux86-64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemumips64 ?= "ee418f38dbc9794b7976ad11fd74f5a3490c7c5e" -SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine:qemuarm ?= "b11af7d1c8b4337347747977173c878e7672eb15" +SRCREV_machine:qemuarm64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuloongarch64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemumips ?= "81af09853cc4318fad59e780c830c9cc8ccdc898" +SRCREV_machine:qemuppc ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuriscv64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuriscv32 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemux86 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemux86-64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemumips64 ?= "6ec5ef2f6fa90a5823e131805845738453bc553a" +SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "59b13c2b647e464dd85622c89d7f16c15d681e96" +SRCREV_machine:class-devupstream ?= "09045dae0d902f9f78901a26c7ff1714976a38f9" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -43,7 +43,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" PV = "${LINUX_VERSION}+git${SRCPV}" From patchwork Wed Oct 11 00:01:19 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31960 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D060CD98DB for ; Wed, 11 Oct 2023 00:02:07 +0000 (UTC) Received: from mail-io1-f50.google.com (mail-io1-f50.google.com [209.85.166.50]) by mx.groups.io with SMTP id smtpd.web10.5120.1696982519237635875 for ; Tue, 10 Oct 2023 17:01:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=buT/wmzy; spf=softfail (domain: sakoman.com, ip: 209.85.166.50, mailfrom: steve@sakoman.com) Received: by mail-io1-f50.google.com with SMTP id ca18e2360f4ac-7a25040faffso282757539f.1 for ; Tue, 10 Oct 2023 17:01:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982518; x=1697587318; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZLtSaBbeHsdYTCatOuF8crDbbiC/JWdmFrs7OFutmd8=; b=buT/wmzy9C8JeeAKU7RYifJDVmL5B49HqqyX5saLXKY3HQQiP4su8trVSjUPQN33Mm pOudq6ng584kxWe8PYi6FbypXjyNlAh+gIQlCSql/VVgzQBxzCTqxyrZe2+oK0IqLJu+ 8Omq1+hL+AG1+V9sPdFJFtSwOIxGlGV5Wl4F7Is0eIzjBJP7J0qtroRv83qwrhisK3PT mordNGW3SYiaadXAmz5XpgTUZi9lBKxEIimve8HDuPtGHoG6LRk9r/sfs8NIqQGERWBL UBlHaP9oD89b42uG3X1BuN0G6mqWHm6x0/kqDAzYd6BV3gLkS0MWnZU+AQY+b8m7QVZl rQxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982518; x=1697587318; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZLtSaBbeHsdYTCatOuF8crDbbiC/JWdmFrs7OFutmd8=; b=ChrT6Gz1xI9yk9jMwtq+Lqd3bzMfZcXWRur/QIm/YB3g6buhNBK9ZUKSyPL/nOyoxx I96Tn+eSTcOZjp/1OIqjRir0S/pW1C9hR+4H3r3qnfSiWHPCBb1l4PeMyFYT8c1CzHcO BZ6EZtEZ699J08vmGgnbcaVklDYVpPk4Rz5EYOLbxZJ9aiK1ikRRzlnq9LHagGWcyw3G Q2blqK/dTzJhR6CDg3SI727ZD6UgPONRXjolsUwxV1bK/CyJxc3R4bqRpxnz5Yi/79Ep btVJN+bghHNNzdfubYK7yzn0K/qTw2x6l1E+XQHiDDupbDXKjvY2/7eL2+vJZpPtLXUP 4enw== X-Gm-Message-State: AOJu0YykAsMd/OegpE+O5mhXtbbAnRMMJYnLh/LXuBSvI+gh+rJgs8Aq 3VTUJ01A8Lu1vYi+rMpNJP1OUT3wSUjo7a0fQeY= X-Google-Smtp-Source: AGHT+IF7Jj/hBic3l+SOcHo9UH+T8wNMouhJqFxXhjLwqkaDCph/OSCXKPuXjjOT81WOoEj+x1XlKA== X-Received: by 2002:a05:6e02:20c4:b0:34a:c61f:9e99 with SMTP id 4-20020a056e0220c400b0034ac61f9e99mr23591662ilq.9.1696982518185; Tue, 10 Oct 2023 17:01:58 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:57 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 06/20] linux/generate-cve-exclusions: fix mishandling of boundary values Date: Tue, 10 Oct 2023 14:01:19 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188924 From: Yuta Hayama affected_versions in kernel_cves.json does not mean "first affected version to last affected version" but actually "first affected version to fixed version". Therefore, the variable names, conditional expressions, and CVE_STATUS descriptions should be fixed. For example, when the script was run against v6.1, if affected_versions was "xxx to 6.1", the output was "cpe-stable-backport: Backported in 6.1", but this should be "fixed-version: Fixed from version 6.1". Signed-off-by: Yuta Hayama Signed-off-by: Alexandre Belloni (cherry picked from commit 2064b2f9b92e2dff45dab633598b5ed37145d0b6) Signed-off-by: Steve Sakoman --- .../linux/generate-cve-exclusions.py | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py index ef47f39c1b..b52c75c18c 100755 --- a/meta/recipes-kernel/linux/generate-cve-exclusions.py +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py @@ -62,18 +62,18 @@ do_cve_check[prefuncs] += "check_kernel_cve_status_version" continue affected = data["affected_versions"] - first_affected, last_affected = re.search(r"(.+) to (.+)", affected).groups() + first_affected, fixed = re.search(r"(.+) to (.+)", affected).groups() first_affected = parse_version(first_affected) - last_affected = parse_version(last_affected) + fixed = parse_version(fixed) handled = False - if not last_affected: + if not fixed: print(f"# {cve} has no known resolution") elif first_affected and version < first_affected: print(f"# fixed-version: only affects {first_affected} onwards") handled = True - elif last_affected < version: - print(f"# fixed-version: Fixed after version {last_affected}") + elif fixed <= version: + print(f"# fixed-version: Fixed from version {fixed}") handled = True else: if cve in stream_data: @@ -87,9 +87,9 @@ do_cve_check[prefuncs] += "check_kernel_cve_status_version" # TODO print a note that the kernel needs bumping print(f"# {cve} needs backporting (fixed from {backport_ver})") else: - print(f"# {cve} needs backporting (fixed from {last_affected})") + print(f"# {cve} needs backporting (fixed from {fixed})") else: - print(f"# {cve} needs backporting (fixed from {last_affected})") + print(f"# {cve} needs backporting (fixed from {fixed})") if handled: print(f'CVE_CHECK_IGNORE += "{cve}"') From patchwork Wed Oct 11 00:01:20 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31969 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1B400CD98D5 for ; Wed, 11 Oct 2023 00:02:07 +0000 (UTC) Received: from mail-oo1-f44.google.com (mail-oo1-f44.google.com [209.85.161.44]) by mx.groups.io with SMTP id smtpd.web11.5181.1696982523832586992 for ; Tue, 10 Oct 2023 17:02:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=buNyYHfg; spf=softfail (domain: sakoman.com, ip: 209.85.161.44, mailfrom: steve@sakoman.com) Received: by mail-oo1-f44.google.com with SMTP id 006d021491bc7-57b811a6ce8so3522756eaf.3 for ; Tue, 10 Oct 2023 17:02:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982522; x=1697587322; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=90QSn4V4xQslxknkPXV29mFPpWdQ/dPwryOHN+8siZk=; b=buNyYHfguxv7ZyOgzrmXwmblzyMyovG08iQY2JdjpgxnHg4m6qiHdZni+Okb/r+OAY a7lsr8iIQV0LWWdlxMKqZfxst4bPFrgbLWPIDry6qmD3RnhS/CDWmZkGw5Qyf+1N5rb3 2EsYowcAYyuF2ht5xxfk207xm7CiuF4mBTzFiNaIE6ns0aOj0CwyLiHBEkkQS/ISYG4z 3FL1EP1tq0RDrn5DMwxqHeJgByp2L8kjHar1VmC4MJnr65DegnOvQrkdSR46SvXffUlj f1X+83Nv+1+73d3I31d/kNvzhRkZhROoRGRlivSPBQ1MoWHWe54gRCGjlL+mzsCBrKBJ HtlQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982522; x=1697587322; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=90QSn4V4xQslxknkPXV29mFPpWdQ/dPwryOHN+8siZk=; b=RH+ffWqnZA1+anIYcX3GFyz6VI4kt6SMelkIIfn0sI4hSr0rXCfCLMOqXozFAucuu0 JEF/R1ct66deZPrYIqGmYCPcptjefF3U8WEmZevMPj4LDNqDFUPpNmZndLwSxuYnNkmh DNdHtBCoKRi4NCFZtcndwuG586aZTRNvMCGdoOji5M6oFBTMfVtKmAJRI5ItOB4t0OEI GBo2c5qbmkDCq8LWGA2DuH8qnTH74wNkDfSzKSf6KxFr6jwYMKhkBTMGw35uIfArrChX ChvfppS4JR49yrLnCVO0WxT6orRRJKQt5NljpqdG1OaKdHCpUsuNLL5XR7OfI5PhZ78D AUlA== X-Gm-Message-State: AOJu0YwVc5qjXIqVIgXDX0FuWUObYilYrZTZtt+4stZJ5V2LYvP8sDcO cZKIyvSOn+MXUcgDTBHtpQvRVw7056GHAslFQP4= X-Google-Smtp-Source: AGHT+IG8Gj4ud6/R0Hrhc4Y2rI2kk5HzPAwg856WliO6D3SsmOlWw8yizbffUOCkD+XgRzK3r8UssA== X-Received: by 2002:a05:6358:3421:b0:14d:bad5:6adf with SMTP id h33-20020a056358342100b0014dbad56adfmr22086437rwd.21.1696982520117; Tue, 10 Oct 2023 17:02:00 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.01.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:01:59 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 07/20] linux-yocto: update kernel exclusions for 6.1 Date: Tue, 10 Oct 2023 14:01:20 -1000 Message-Id: <20f4a9538f80bcc61d8e786cf12c556ab54d2c0a.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188926 Signed-off-by: Steve Sakoman --- .../linux/cve-exclusion_6.1.inc | 4226 +++++++++-------- 1 file changed, 2124 insertions(+), 2102 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 1656ffc8b5..173bff2813 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,161 +1,161 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-23 10:45:45.248445 for version 6.1.46 +# Generated at 2023-10-09 16:39:52.745283+00:00 for version 6.1.53 python check_kernel_cve_status_version() { - this_version = "6.1.46" + this_version = "6.1.53" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) } do_cve_check[prefuncs] += "check_kernel_cve_status_version" -# fixed-version: Fixed after version 2.6.12rc2 +# fixed-version: Fixed from version 2.6.12rc2 CVE_CHECK_IGNORE += "CVE-2003-1604" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2004-0230" # CVE-2005-3660 has no known resolution -# fixed-version: Fixed after version 2.6.26rc5 +# fixed-version: Fixed from version 2.6.26rc5 CVE_CHECK_IGNORE += "CVE-2006-3635" -# fixed-version: Fixed after version 2.6.19rc3 +# fixed-version: Fixed from version 2.6.19rc3 CVE_CHECK_IGNORE += "CVE-2006-5331" -# fixed-version: Fixed after version 2.6.19rc2 +# fixed-version: Fixed from version 2.6.19rc2 CVE_CHECK_IGNORE += "CVE-2006-6128" # CVE-2007-3719 has no known resolution -# fixed-version: Fixed after version 2.6.12rc2 +# fixed-version: Fixed from version 2.6.12rc2 CVE_CHECK_IGNORE += "CVE-2007-4774" -# fixed-version: Fixed after version 2.6.24rc6 +# fixed-version: Fixed from version 2.6.24rc6 CVE_CHECK_IGNORE += "CVE-2007-6761" -# fixed-version: Fixed after version 2.6.20rc5 +# fixed-version: Fixed from version 2.6.20rc5 CVE_CHECK_IGNORE += "CVE-2007-6762" # CVE-2008-2544 has no known resolution # CVE-2008-4609 has no known resolution -# fixed-version: Fixed after version 2.6.25rc1 +# fixed-version: Fixed from version 2.6.25rc1 CVE_CHECK_IGNORE += "CVE-2008-7316" -# fixed-version: Fixed after version 2.6.31rc6 +# fixed-version: Fixed from version 2.6.31rc6 CVE_CHECK_IGNORE += "CVE-2009-2692" -# fixed-version: Fixed after version 2.6.23rc9 +# fixed-version: Fixed from version 2.6.23rc9 CVE_CHECK_IGNORE += "CVE-2010-0008" -# fixed-version: Fixed after version 2.6.36rc5 +# fixed-version: Fixed from version 2.6.36rc5 CVE_CHECK_IGNORE += "CVE-2010-3432" # CVE-2010-4563 has no known resolution -# fixed-version: Fixed after version 2.6.37rc6 +# fixed-version: Fixed from version 2.6.37rc6 CVE_CHECK_IGNORE += "CVE-2010-4648" -# fixed-version: Fixed after version 2.6.38rc1 +# fixed-version: Fixed from version 2.6.38rc1 CVE_CHECK_IGNORE += "CVE-2010-5313" # CVE-2010-5321 has no known resolution -# fixed-version: Fixed after version 2.6.35rc1 +# fixed-version: Fixed from version 2.6.35rc1 CVE_CHECK_IGNORE += "CVE-2010-5328" -# fixed-version: Fixed after version 2.6.39rc1 +# fixed-version: Fixed from version 2.6.39rc1 CVE_CHECK_IGNORE += "CVE-2010-5329" -# fixed-version: Fixed after version 2.6.34rc7 +# fixed-version: Fixed from version 2.6.34rc7 CVE_CHECK_IGNORE += "CVE-2010-5331" -# fixed-version: Fixed after version 2.6.37rc1 +# fixed-version: Fixed from version 2.6.37rc1 CVE_CHECK_IGNORE += "CVE-2010-5332" -# fixed-version: Fixed after version 3.2rc1 +# fixed-version: Fixed from version 3.2rc1 CVE_CHECK_IGNORE += "CVE-2011-4098" -# fixed-version: Fixed after version 3.3rc1 +# fixed-version: Fixed from version 3.3rc1 CVE_CHECK_IGNORE += "CVE-2011-4131" -# fixed-version: Fixed after version 3.2rc1 +# fixed-version: Fixed from version 3.2rc1 CVE_CHECK_IGNORE += "CVE-2011-4915" # CVE-2011-4916 has no known resolution # CVE-2011-4917 has no known resolution -# fixed-version: Fixed after version 3.2rc1 +# fixed-version: Fixed from version 3.2rc1 CVE_CHECK_IGNORE += "CVE-2011-5321" -# fixed-version: Fixed after version 3.1rc1 +# fixed-version: Fixed from version 3.1rc1 CVE_CHECK_IGNORE += "CVE-2011-5327" -# fixed-version: Fixed after version 3.7rc2 +# fixed-version: Fixed from version 3.7rc2 CVE_CHECK_IGNORE += "CVE-2012-0957" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2012-2119" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2012-2136" -# fixed-version: Fixed after version 3.5rc2 +# fixed-version: Fixed from version 3.5rc2 CVE_CHECK_IGNORE += "CVE-2012-2137" -# fixed-version: Fixed after version 3.4rc6 +# fixed-version: Fixed from version 3.4rc6 CVE_CHECK_IGNORE += "CVE-2012-2313" -# fixed-version: Fixed after version 3.4rc6 +# fixed-version: Fixed from version 3.4rc6 CVE_CHECK_IGNORE += "CVE-2012-2319" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2012-2372" -# fixed-version: Fixed after version 3.4rc1 +# fixed-version: Fixed from version 3.4rc1 CVE_CHECK_IGNORE += "CVE-2012-2375" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2012-2390" -# fixed-version: Fixed after version 3.5rc4 +# fixed-version: Fixed from version 3.5rc4 CVE_CHECK_IGNORE += "CVE-2012-2669" -# fixed-version: Fixed after version 2.6.34rc1 +# fixed-version: Fixed from version 2.6.34rc1 CVE_CHECK_IGNORE += "CVE-2012-2744" -# fixed-version: Fixed after version 3.4rc3 +# fixed-version: Fixed from version 3.4rc3 CVE_CHECK_IGNORE += "CVE-2012-2745" -# fixed-version: Fixed after version 3.5rc6 +# fixed-version: Fixed from version 3.5rc6 CVE_CHECK_IGNORE += "CVE-2012-3364" -# fixed-version: Fixed after version 3.4rc5 +# fixed-version: Fixed from version 3.4rc5 CVE_CHECK_IGNORE += "CVE-2012-3375" -# fixed-version: Fixed after version 3.5rc5 +# fixed-version: Fixed from version 3.5rc5 CVE_CHECK_IGNORE += "CVE-2012-3400" -# fixed-version: Fixed after version 3.6rc2 +# fixed-version: Fixed from version 3.6rc2 CVE_CHECK_IGNORE += "CVE-2012-3412" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2012-3430" -# fixed-version: Fixed after version 2.6.19rc4 +# fixed-version: Fixed from version 2.6.19rc4 CVE_CHECK_IGNORE += "CVE-2012-3510" -# fixed-version: Fixed after version 3.5rc6 +# fixed-version: Fixed from version 3.5rc6 CVE_CHECK_IGNORE += "CVE-2012-3511" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-3520" -# fixed-version: Fixed after version 3.0rc1 +# fixed-version: Fixed from version 3.0rc1 CVE_CHECK_IGNORE += "CVE-2012-3552" # Skipping CVE-2012-4220, no affected_versions @@ -164,506 +164,506 @@ CVE_CHECK_IGNORE += "CVE-2012-3552" # Skipping CVE-2012-4222, no affected_versions -# fixed-version: Fixed after version 3.4rc1 +# fixed-version: Fixed from version 3.4rc1 CVE_CHECK_IGNORE += "CVE-2012-4398" -# fixed-version: Fixed after version 2.6.36rc4 +# fixed-version: Fixed from version 2.6.36rc4 CVE_CHECK_IGNORE += "CVE-2012-4444" -# fixed-version: Fixed after version 3.7rc6 +# fixed-version: Fixed from version 3.7rc6 CVE_CHECK_IGNORE += "CVE-2012-4461" -# fixed-version: Fixed after version 3.6rc5 +# fixed-version: Fixed from version 3.6rc5 CVE_CHECK_IGNORE += "CVE-2012-4467" -# fixed-version: Fixed after version 3.7rc3 +# fixed-version: Fixed from version 3.7rc3 CVE_CHECK_IGNORE += "CVE-2012-4508" -# fixed-version: Fixed after version 3.8rc1 +# fixed-version: Fixed from version 3.8rc1 CVE_CHECK_IGNORE += "CVE-2012-4530" # CVE-2012-4542 has no known resolution -# fixed-version: Fixed after version 3.7rc4 +# fixed-version: Fixed from version 3.7rc4 CVE_CHECK_IGNORE += "CVE-2012-4565" -# fixed-version: Fixed after version 3.8rc1 +# fixed-version: Fixed from version 3.8rc1 CVE_CHECK_IGNORE += "CVE-2012-5374" -# fixed-version: Fixed after version 3.8rc1 +# fixed-version: Fixed from version 3.8rc1 CVE_CHECK_IGNORE += "CVE-2012-5375" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2012-5517" -# fixed-version: Fixed after version 3.6rc7 +# fixed-version: Fixed from version 3.6rc7 CVE_CHECK_IGNORE += "CVE-2012-6536" -# fixed-version: Fixed after version 3.6rc7 +# fixed-version: Fixed from version 3.6rc7 CVE_CHECK_IGNORE += "CVE-2012-6537" -# fixed-version: Fixed after version 3.6rc7 +# fixed-version: Fixed from version 3.6rc7 CVE_CHECK_IGNORE += "CVE-2012-6538" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6539" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6540" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6541" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6542" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6543" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6544" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6545" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2012-6546" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2012-6547" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2012-6548" -# fixed-version: Fixed after version 3.6rc1 +# fixed-version: Fixed from version 3.6rc1 CVE_CHECK_IGNORE += "CVE-2012-6549" -# fixed-version: Fixed after version 3.3rc1 +# fixed-version: Fixed from version 3.3rc1 CVE_CHECK_IGNORE += "CVE-2012-6638" -# fixed-version: Fixed after version 3.6rc2 +# fixed-version: Fixed from version 3.6rc2 CVE_CHECK_IGNORE += "CVE-2012-6647" -# fixed-version: Fixed after version 3.6 +# fixed-version: Fixed from version 3.6 CVE_CHECK_IGNORE += "CVE-2012-6657" -# fixed-version: Fixed after version 3.6rc5 +# fixed-version: Fixed from version 3.6rc5 CVE_CHECK_IGNORE += "CVE-2012-6689" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2012-6701" -# fixed-version: Fixed after version 3.7rc1 +# fixed-version: Fixed from version 3.7rc1 CVE_CHECK_IGNORE += "CVE-2012-6703" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2012-6704" -# fixed-version: Fixed after version 3.4rc1 +# fixed-version: Fixed from version 3.4rc1 CVE_CHECK_IGNORE += "CVE-2012-6712" -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-0160" -# fixed-version: Fixed after version 3.8rc5 +# fixed-version: Fixed from version 3.8rc5 CVE_CHECK_IGNORE += "CVE-2013-0190" -# fixed-version: Fixed after version 3.8rc7 +# fixed-version: Fixed from version 3.8rc7 CVE_CHECK_IGNORE += "CVE-2013-0216" -# fixed-version: Fixed after version 3.8rc7 +# fixed-version: Fixed from version 3.8rc7 CVE_CHECK_IGNORE += "CVE-2013-0217" -# fixed-version: Fixed after version 3.8 +# fixed-version: Fixed from version 3.8 CVE_CHECK_IGNORE += "CVE-2013-0228" -# fixed-version: Fixed after version 3.8rc7 +# fixed-version: Fixed from version 3.8rc7 CVE_CHECK_IGNORE += "CVE-2013-0231" -# fixed-version: Fixed after version 3.8rc6 +# fixed-version: Fixed from version 3.8rc6 CVE_CHECK_IGNORE += "CVE-2013-0268" -# fixed-version: Fixed after version 3.8 +# fixed-version: Fixed from version 3.8 CVE_CHECK_IGNORE += "CVE-2013-0290" -# fixed-version: Fixed after version 3.7rc1 +# fixed-version: Fixed from version 3.7rc1 CVE_CHECK_IGNORE += "CVE-2013-0309" -# fixed-version: Fixed after version 3.5 +# fixed-version: Fixed from version 3.5 CVE_CHECK_IGNORE += "CVE-2013-0310" -# fixed-version: Fixed after version 3.7rc8 +# fixed-version: Fixed from version 3.7rc8 CVE_CHECK_IGNORE += "CVE-2013-0311" -# fixed-version: Fixed after version 3.8rc5 +# fixed-version: Fixed from version 3.8rc5 CVE_CHECK_IGNORE += "CVE-2013-0313" -# fixed-version: Fixed after version 3.11rc7 +# fixed-version: Fixed from version 3.11rc7 CVE_CHECK_IGNORE += "CVE-2013-0343" -# fixed-version: Fixed after version 3.8rc6 +# fixed-version: Fixed from version 3.8rc6 CVE_CHECK_IGNORE += "CVE-2013-0349" -# fixed-version: Fixed after version 3.8rc5 +# fixed-version: Fixed from version 3.8rc5 CVE_CHECK_IGNORE += "CVE-2013-0871" -# fixed-version: Fixed after version 3.9rc4 +# fixed-version: Fixed from version 3.9rc4 CVE_CHECK_IGNORE += "CVE-2013-0913" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-0914" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-1059" -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-1763" -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-1767" -# fixed-version: Fixed after version 3.5rc1 +# fixed-version: Fixed from version 3.5rc1 CVE_CHECK_IGNORE += "CVE-2013-1772" -# fixed-version: Fixed after version 3.3rc1 +# fixed-version: Fixed from version 3.3rc1 CVE_CHECK_IGNORE += "CVE-2013-1773" -# fixed-version: Fixed after version 3.8rc5 +# fixed-version: Fixed from version 3.8rc5 CVE_CHECK_IGNORE += "CVE-2013-1774" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-1792" -# fixed-version: Fixed after version 3.9rc4 +# fixed-version: Fixed from version 3.9rc4 CVE_CHECK_IGNORE += "CVE-2013-1796" -# fixed-version: Fixed after version 3.9rc4 +# fixed-version: Fixed from version 3.9rc4 CVE_CHECK_IGNORE += "CVE-2013-1797" -# fixed-version: Fixed after version 3.9rc4 +# fixed-version: Fixed from version 3.9rc4 CVE_CHECK_IGNORE += "CVE-2013-1798" -# fixed-version: Fixed after version 3.8rc6 +# fixed-version: Fixed from version 3.8rc6 CVE_CHECK_IGNORE += "CVE-2013-1819" -# fixed-version: Fixed after version 3.6rc7 +# fixed-version: Fixed from version 3.6rc7 CVE_CHECK_IGNORE += "CVE-2013-1826" -# fixed-version: Fixed after version 3.6rc3 +# fixed-version: Fixed from version 3.6rc3 CVE_CHECK_IGNORE += "CVE-2013-1827" -# fixed-version: Fixed after version 3.9rc2 +# fixed-version: Fixed from version 3.9rc2 CVE_CHECK_IGNORE += "CVE-2013-1828" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-1848" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-1858" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-1860" -# fixed-version: Fixed after version 3.7rc3 +# fixed-version: Fixed from version 3.7rc3 CVE_CHECK_IGNORE += "CVE-2013-1928" -# fixed-version: Fixed after version 3.9rc6 +# fixed-version: Fixed from version 3.9rc6 CVE_CHECK_IGNORE += "CVE-2013-1929" # Skipping CVE-2013-1935, no affected_versions -# fixed-version: Fixed after version 3.0rc1 +# fixed-version: Fixed from version 3.0rc1 CVE_CHECK_IGNORE += "CVE-2013-1943" -# fixed-version: Fixed after version 3.9rc5 +# fixed-version: Fixed from version 3.9rc5 CVE_CHECK_IGNORE += "CVE-2013-1956" -# fixed-version: Fixed after version 3.9rc5 +# fixed-version: Fixed from version 3.9rc5 CVE_CHECK_IGNORE += "CVE-2013-1957" -# fixed-version: Fixed after version 3.9rc5 +# fixed-version: Fixed from version 3.9rc5 CVE_CHECK_IGNORE += "CVE-2013-1958" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-1959" -# fixed-version: Fixed after version 3.9rc8 +# fixed-version: Fixed from version 3.9rc8 CVE_CHECK_IGNORE += "CVE-2013-1979" -# fixed-version: Fixed after version 3.8rc2 +# fixed-version: Fixed from version 3.8rc2 CVE_CHECK_IGNORE += "CVE-2013-2015" -# fixed-version: Fixed after version 2.6.34 +# fixed-version: Fixed from version 2.6.34 CVE_CHECK_IGNORE += "CVE-2013-2017" -# fixed-version: Fixed after version 3.8rc4 +# fixed-version: Fixed from version 3.8rc4 CVE_CHECK_IGNORE += "CVE-2013-2058" -# fixed-version: Fixed after version 3.9rc8 +# fixed-version: Fixed from version 3.9rc8 CVE_CHECK_IGNORE += "CVE-2013-2094" -# fixed-version: Fixed after version 2.6.34rc4 +# fixed-version: Fixed from version 2.6.34rc4 CVE_CHECK_IGNORE += "CVE-2013-2128" -# fixed-version: Fixed after version 3.11rc3 +# fixed-version: Fixed from version 3.11rc3 CVE_CHECK_IGNORE += "CVE-2013-2140" -# fixed-version: Fixed after version 3.9rc8 +# fixed-version: Fixed from version 3.9rc8 CVE_CHECK_IGNORE += "CVE-2013-2141" -# fixed-version: Fixed after version 3.9rc8 +# fixed-version: Fixed from version 3.9rc8 CVE_CHECK_IGNORE += "CVE-2013-2146" -# fixed-version: Fixed after version 3.12rc3 +# fixed-version: Fixed from version 3.12rc3 CVE_CHECK_IGNORE += "CVE-2013-2147" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-2148" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-2164" # Skipping CVE-2013-2188, no affected_versions -# fixed-version: Fixed after version 3.9rc4 +# fixed-version: Fixed from version 3.9rc4 CVE_CHECK_IGNORE += "CVE-2013-2206" # Skipping CVE-2013-2224, no affected_versions -# fixed-version: Fixed after version 3.10 +# fixed-version: Fixed from version 3.10 CVE_CHECK_IGNORE += "CVE-2013-2232" -# fixed-version: Fixed after version 3.10 +# fixed-version: Fixed from version 3.10 CVE_CHECK_IGNORE += "CVE-2013-2234" -# fixed-version: Fixed after version 3.9rc6 +# fixed-version: Fixed from version 3.9rc6 CVE_CHECK_IGNORE += "CVE-2013-2237" # Skipping CVE-2013-2239, no affected_versions -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-2546" -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-2547" -# fixed-version: Fixed after version 3.9rc1 +# fixed-version: Fixed from version 3.9rc1 CVE_CHECK_IGNORE += "CVE-2013-2548" -# fixed-version: Fixed after version 3.9rc8 +# fixed-version: Fixed from version 3.9rc8 CVE_CHECK_IGNORE += "CVE-2013-2596" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-2634" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-2635" -# fixed-version: Fixed after version 3.9rc3 +# fixed-version: Fixed from version 3.9rc3 CVE_CHECK_IGNORE += "CVE-2013-2636" -# fixed-version: Fixed after version 3.10rc4 +# fixed-version: Fixed from version 3.10rc4 CVE_CHECK_IGNORE += "CVE-2013-2850" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-2851" -# fixed-version: Fixed after version 3.10rc6 +# fixed-version: Fixed from version 3.10rc6 CVE_CHECK_IGNORE += "CVE-2013-2852" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-2888" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2889" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2890" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2891" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-2892" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2893" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2894" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2895" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-2896" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-2897" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-2898" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-2899" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-2929" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-2930" -# fixed-version: Fixed after version 3.9 +# fixed-version: Fixed from version 3.9 CVE_CHECK_IGNORE += "CVE-2013-3076" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3222" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3223" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3224" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3225" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3226" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3227" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3228" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3229" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3230" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3231" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3232" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3233" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3234" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3235" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3236" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3237" -# fixed-version: Fixed after version 3.9rc7 +# fixed-version: Fixed from version 3.9rc7 CVE_CHECK_IGNORE += "CVE-2013-3301" -# fixed-version: Fixed after version 3.8rc3 +# fixed-version: Fixed from version 3.8rc3 CVE_CHECK_IGNORE += "CVE-2013-3302" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-4125" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-4127" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-4129" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-4162" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2013-4163" -# fixed-version: Fixed after version 3.11rc5 +# fixed-version: Fixed from version 3.11rc5 CVE_CHECK_IGNORE += "CVE-2013-4205" -# fixed-version: Fixed after version 3.10rc4 +# fixed-version: Fixed from version 3.10rc4 CVE_CHECK_IGNORE += "CVE-2013-4220" -# fixed-version: Fixed after version 3.10rc5 +# fixed-version: Fixed from version 3.10rc5 CVE_CHECK_IGNORE += "CVE-2013-4247" -# fixed-version: Fixed after version 3.11rc6 +# fixed-version: Fixed from version 3.11rc6 CVE_CHECK_IGNORE += "CVE-2013-4254" -# fixed-version: Fixed after version 3.12rc4 +# fixed-version: Fixed from version 3.12rc4 CVE_CHECK_IGNORE += "CVE-2013-4270" -# fixed-version: Fixed after version 3.12rc6 +# fixed-version: Fixed from version 3.12rc6 CVE_CHECK_IGNORE += "CVE-2013-4299" -# fixed-version: Fixed after version 3.11 +# fixed-version: Fixed from version 3.11 CVE_CHECK_IGNORE += "CVE-2013-4300" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2013-4312" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-4343" -# fixed-version: Fixed after version 3.13rc2 +# fixed-version: Fixed from version 3.13rc2 CVE_CHECK_IGNORE += "CVE-2013-4345" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-4348" -# fixed-version: Fixed after version 3.12rc2 +# fixed-version: Fixed from version 3.12rc2 CVE_CHECK_IGNORE += "CVE-2013-4350" -# fixed-version: Fixed after version 3.12rc4 +# fixed-version: Fixed from version 3.12rc4 CVE_CHECK_IGNORE += "CVE-2013-4387" -# fixed-version: Fixed after version 3.12rc7 +# fixed-version: Fixed from version 3.12rc7 CVE_CHECK_IGNORE += "CVE-2013-4470" -# fixed-version: Fixed after version 3.10rc1 +# fixed-version: Fixed from version 3.10rc1 CVE_CHECK_IGNORE += "CVE-2013-4483" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4511" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4512" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4513" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4514" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4515" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-4516" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-4563" -# fixed-version: Fixed after version 3.13rc7 +# fixed-version: Fixed from version 3.13rc7 CVE_CHECK_IGNORE += "CVE-2013-4579" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2013-4587" -# fixed-version: Fixed after version 2.6.33rc4 +# fixed-version: Fixed from version 2.6.33rc4 CVE_CHECK_IGNORE += "CVE-2013-4588" -# fixed-version: Fixed after version 3.8rc1 +# fixed-version: Fixed from version 3.8rc1 CVE_CHECK_IGNORE += "CVE-2013-4591" -# fixed-version: Fixed after version 3.7rc1 +# fixed-version: Fixed from version 3.7rc1 CVE_CHECK_IGNORE += "CVE-2013-4592" # Skipping CVE-2013-4737, no affected_versions @@ -672,505 +672,505 @@ CVE_CHECK_IGNORE += "CVE-2013-4592" # Skipping CVE-2013-4739, no affected_versions -# fixed-version: Fixed after version 3.10rc5 +# fixed-version: Fixed from version 3.10rc5 CVE_CHECK_IGNORE += "CVE-2013-5634" -# fixed-version: Fixed after version 3.6rc6 +# fixed-version: Fixed from version 3.6rc6 CVE_CHECK_IGNORE += "CVE-2013-6282" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2013-6367" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2013-6368" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2013-6376" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-6378" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-6380" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-6381" -# fixed-version: Fixed after version 3.13rc4 +# fixed-version: Fixed from version 3.13rc4 CVE_CHECK_IGNORE += "CVE-2013-6382" -# fixed-version: Fixed after version 3.12 +# fixed-version: Fixed from version 3.12 CVE_CHECK_IGNORE += "CVE-2013-6383" # Skipping CVE-2013-6392, no affected_versions -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2013-6431" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-6432" -# fixed-version: Fixed after version 3.14rc1 +# fixed-version: Fixed from version 3.14rc1 CVE_CHECK_IGNORE += "CVE-2013-6885" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7026" -# fixed-version: Fixed after version 3.12rc7 +# fixed-version: Fixed from version 3.12rc7 CVE_CHECK_IGNORE += "CVE-2013-7027" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7263" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7264" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7265" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7266" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7267" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7268" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7269" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7270" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7271" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7281" -# fixed-version: Fixed after version 3.13rc7 +# fixed-version: Fixed from version 3.13rc7 CVE_CHECK_IGNORE += "CVE-2013-7339" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2013-7348" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2013-7421" # CVE-2013-7445 has no known resolution -# fixed-version: Fixed after version 4.4rc4 +# fixed-version: Fixed from version 4.4rc4 CVE_CHECK_IGNORE += "CVE-2013-7446" -# fixed-version: Fixed after version 3.12rc7 +# fixed-version: Fixed from version 3.12rc7 CVE_CHECK_IGNORE += "CVE-2013-7470" -# fixed-version: Fixed after version 3.14rc1 +# fixed-version: Fixed from version 3.14rc1 CVE_CHECK_IGNORE += "CVE-2014-0038" -# fixed-version: Fixed after version 3.14rc5 +# fixed-version: Fixed from version 3.14rc5 CVE_CHECK_IGNORE += "CVE-2014-0049" -# fixed-version: Fixed after version 3.14 +# fixed-version: Fixed from version 3.14 CVE_CHECK_IGNORE += "CVE-2014-0055" -# fixed-version: Fixed after version 3.14rc4 +# fixed-version: Fixed from version 3.14rc4 CVE_CHECK_IGNORE += "CVE-2014-0069" -# fixed-version: Fixed after version 3.14 +# fixed-version: Fixed from version 3.14 CVE_CHECK_IGNORE += "CVE-2014-0077" -# fixed-version: Fixed after version 3.14rc7 +# fixed-version: Fixed from version 3.14rc7 CVE_CHECK_IGNORE += "CVE-2014-0100" -# fixed-version: Fixed after version 3.14rc6 +# fixed-version: Fixed from version 3.14rc6 CVE_CHECK_IGNORE += "CVE-2014-0101" -# fixed-version: Fixed after version 3.14rc6 +# fixed-version: Fixed from version 3.14rc6 CVE_CHECK_IGNORE += "CVE-2014-0102" -# fixed-version: Fixed after version 3.14rc7 +# fixed-version: Fixed from version 3.14rc7 CVE_CHECK_IGNORE += "CVE-2014-0131" -# fixed-version: Fixed after version 3.15rc2 +# fixed-version: Fixed from version 3.15rc2 CVE_CHECK_IGNORE += "CVE-2014-0155" -# fixed-version: Fixed after version 3.15rc5 +# fixed-version: Fixed from version 3.15rc5 CVE_CHECK_IGNORE += "CVE-2014-0181" -# fixed-version: Fixed after version 3.15rc5 +# fixed-version: Fixed from version 3.15rc5 CVE_CHECK_IGNORE += "CVE-2014-0196" -# fixed-version: Fixed after version 2.6.33rc5 +# fixed-version: Fixed from version 2.6.33rc5 CVE_CHECK_IGNORE += "CVE-2014-0203" -# fixed-version: Fixed after version 2.6.37rc1 +# fixed-version: Fixed from version 2.6.37rc1 CVE_CHECK_IGNORE += "CVE-2014-0205" -# fixed-version: Fixed after version 3.16rc3 +# fixed-version: Fixed from version 3.16rc3 CVE_CHECK_IGNORE += "CVE-2014-0206" # Skipping CVE-2014-0972, no affected_versions -# fixed-version: Fixed after version 3.13 +# fixed-version: Fixed from version 3.13 CVE_CHECK_IGNORE += "CVE-2014-1438" -# fixed-version: Fixed after version 3.12rc7 +# fixed-version: Fixed from version 3.12rc7 CVE_CHECK_IGNORE += "CVE-2014-1444" -# fixed-version: Fixed after version 3.12rc7 +# fixed-version: Fixed from version 3.12rc7 CVE_CHECK_IGNORE += "CVE-2014-1445" -# fixed-version: Fixed after version 3.13rc7 +# fixed-version: Fixed from version 3.13rc7 CVE_CHECK_IGNORE += "CVE-2014-1446" -# fixed-version: Fixed after version 3.13rc8 +# fixed-version: Fixed from version 3.13rc8 CVE_CHECK_IGNORE += "CVE-2014-1690" -# fixed-version: Fixed after version 3.15rc5 +# fixed-version: Fixed from version 3.15rc5 CVE_CHECK_IGNORE += "CVE-2014-1737" -# fixed-version: Fixed after version 3.15rc5 +# fixed-version: Fixed from version 3.15rc5 CVE_CHECK_IGNORE += "CVE-2014-1738" -# fixed-version: Fixed after version 3.15rc6 +# fixed-version: Fixed from version 3.15rc6 CVE_CHECK_IGNORE += "CVE-2014-1739" -# fixed-version: Fixed after version 3.14rc2 +# fixed-version: Fixed from version 3.14rc2 CVE_CHECK_IGNORE += "CVE-2014-1874" -# fixed-version: Fixed after version 3.14rc1 +# fixed-version: Fixed from version 3.14rc1 CVE_CHECK_IGNORE += "CVE-2014-2038" -# fixed-version: Fixed after version 3.14rc3 +# fixed-version: Fixed from version 3.14rc3 CVE_CHECK_IGNORE += "CVE-2014-2039" -# fixed-version: Fixed after version 3.14rc7 +# fixed-version: Fixed from version 3.14rc7 CVE_CHECK_IGNORE += "CVE-2014-2309" -# fixed-version: Fixed after version 3.14rc1 +# fixed-version: Fixed from version 3.14rc1 CVE_CHECK_IGNORE += "CVE-2014-2523" -# fixed-version: Fixed after version 3.14 +# fixed-version: Fixed from version 3.14 CVE_CHECK_IGNORE += "CVE-2014-2568" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-2580" -# fixed-version: Fixed after version 3.14rc6 +# fixed-version: Fixed from version 3.14rc6 CVE_CHECK_IGNORE += "CVE-2014-2672" -# fixed-version: Fixed after version 3.14rc6 +# fixed-version: Fixed from version 3.14rc6 CVE_CHECK_IGNORE += "CVE-2014-2673" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-2678" -# fixed-version: Fixed after version 3.14rc6 +# fixed-version: Fixed from version 3.14rc6 CVE_CHECK_IGNORE += "CVE-2014-2706" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-2739" -# fixed-version: Fixed after version 3.15rc2 +# fixed-version: Fixed from version 3.15rc2 CVE_CHECK_IGNORE += "CVE-2014-2851" -# fixed-version: Fixed after version 3.2rc7 +# fixed-version: Fixed from version 3.2rc7 CVE_CHECK_IGNORE += "CVE-2014-2889" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-3122" -# fixed-version: Fixed after version 3.15rc2 +# fixed-version: Fixed from version 3.15rc2 CVE_CHECK_IGNORE += "CVE-2014-3144" -# fixed-version: Fixed after version 3.15rc2 +# fixed-version: Fixed from version 3.15rc2 CVE_CHECK_IGNORE += "CVE-2014-3145" -# fixed-version: Fixed after version 3.15 +# fixed-version: Fixed from version 3.15 CVE_CHECK_IGNORE += "CVE-2014-3153" -# fixed-version: Fixed after version 3.17rc4 +# fixed-version: Fixed from version 3.17rc4 CVE_CHECK_IGNORE += "CVE-2014-3180" -# fixed-version: Fixed after version 3.17rc3 +# fixed-version: Fixed from version 3.17rc3 CVE_CHECK_IGNORE += "CVE-2014-3181" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-3182" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-3183" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-3184" -# fixed-version: Fixed after version 3.17rc3 +# fixed-version: Fixed from version 3.17rc3 CVE_CHECK_IGNORE += "CVE-2014-3185" -# fixed-version: Fixed after version 3.17rc3 +# fixed-version: Fixed from version 3.17rc3 CVE_CHECK_IGNORE += "CVE-2014-3186" # Skipping CVE-2014-3519, no affected_versions -# fixed-version: Fixed after version 3.16rc7 +# fixed-version: Fixed from version 3.16rc7 CVE_CHECK_IGNORE += "CVE-2014-3534" -# fixed-version: Fixed after version 2.6.36rc1 +# fixed-version: Fixed from version 2.6.36rc1 CVE_CHECK_IGNORE += "CVE-2014-3535" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-3601" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-3610" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-3611" -# fixed-version: Fixed after version 3.17rc5 +# fixed-version: Fixed from version 3.17rc5 CVE_CHECK_IGNORE += "CVE-2014-3631" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2014-3645" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-3646" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-3647" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-3673" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-3687" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-3688" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-3690" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-3917" -# fixed-version: Fixed after version 3.15 +# fixed-version: Fixed from version 3.15 CVE_CHECK_IGNORE += "CVE-2014-3940" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-4014" -# fixed-version: Fixed after version 3.14rc1 +# fixed-version: Fixed from version 3.14rc1 CVE_CHECK_IGNORE += "CVE-2014-4027" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-4157" -# fixed-version: Fixed after version 3.16rc3 +# fixed-version: Fixed from version 3.16rc3 CVE_CHECK_IGNORE += "CVE-2014-4171" # Skipping CVE-2014-4322, no affected_versions # Skipping CVE-2014-4323, no affected_versions -# fixed-version: Fixed after version 3.16rc3 +# fixed-version: Fixed from version 3.16rc3 CVE_CHECK_IGNORE += "CVE-2014-4508" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-4608" -# fixed-version: Fixed after version 3.16rc3 +# fixed-version: Fixed from version 3.16rc3 CVE_CHECK_IGNORE += "CVE-2014-4611" -# fixed-version: Fixed after version 3.16rc2 +# fixed-version: Fixed from version 3.16rc2 CVE_CHECK_IGNORE += "CVE-2014-4652" -# fixed-version: Fixed after version 3.16rc2 +# fixed-version: Fixed from version 3.16rc2 CVE_CHECK_IGNORE += "CVE-2014-4653" -# fixed-version: Fixed after version 3.16rc2 +# fixed-version: Fixed from version 3.16rc2 CVE_CHECK_IGNORE += "CVE-2014-4654" -# fixed-version: Fixed after version 3.16rc2 +# fixed-version: Fixed from version 3.16rc2 CVE_CHECK_IGNORE += "CVE-2014-4655" -# fixed-version: Fixed after version 3.16rc2 +# fixed-version: Fixed from version 3.16rc2 CVE_CHECK_IGNORE += "CVE-2014-4656" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-4667" -# fixed-version: Fixed after version 3.16rc4 +# fixed-version: Fixed from version 3.16rc4 CVE_CHECK_IGNORE += "CVE-2014-4699" -# fixed-version: Fixed after version 3.16rc6 +# fixed-version: Fixed from version 3.16rc6 CVE_CHECK_IGNORE += "CVE-2014-4943" -# fixed-version: Fixed after version 3.16rc7 +# fixed-version: Fixed from version 3.16rc7 CVE_CHECK_IGNORE += "CVE-2014-5045" -# fixed-version: Fixed after version 3.16 +# fixed-version: Fixed from version 3.16 CVE_CHECK_IGNORE += "CVE-2014-5077" -# fixed-version: Fixed after version 3.17rc1 +# fixed-version: Fixed from version 3.17rc1 CVE_CHECK_IGNORE += "CVE-2014-5206" -# fixed-version: Fixed after version 3.17rc1 +# fixed-version: Fixed from version 3.17rc1 CVE_CHECK_IGNORE += "CVE-2014-5207" # Skipping CVE-2014-5332, no affected_versions -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-5471" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-5472" -# fixed-version: Fixed after version 3.17rc5 +# fixed-version: Fixed from version 3.17rc5 CVE_CHECK_IGNORE += "CVE-2014-6410" -# fixed-version: Fixed after version 3.17rc5 +# fixed-version: Fixed from version 3.17rc5 CVE_CHECK_IGNORE += "CVE-2014-6416" -# fixed-version: Fixed after version 3.17rc5 +# fixed-version: Fixed from version 3.17rc5 CVE_CHECK_IGNORE += "CVE-2014-6417" -# fixed-version: Fixed after version 3.17rc5 +# fixed-version: Fixed from version 3.17rc5 CVE_CHECK_IGNORE += "CVE-2014-6418" -# fixed-version: Fixed after version 3.17rc2 +# fixed-version: Fixed from version 3.17rc2 CVE_CHECK_IGNORE += "CVE-2014-7145" # Skipping CVE-2014-7207, no affected_versions -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-7283" -# fixed-version: Fixed after version 3.15rc7 +# fixed-version: Fixed from version 3.15rc7 CVE_CHECK_IGNORE += "CVE-2014-7284" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-7822" -# fixed-version: Fixed after version 3.18rc3 +# fixed-version: Fixed from version 3.18rc3 CVE_CHECK_IGNORE += "CVE-2014-7825" -# fixed-version: Fixed after version 3.18rc3 +# fixed-version: Fixed from version 3.18rc3 CVE_CHECK_IGNORE += "CVE-2014-7826" -# fixed-version: Fixed after version 3.18rc5 +# fixed-version: Fixed from version 3.18rc5 CVE_CHECK_IGNORE += "CVE-2014-7841" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-7842" -# fixed-version: Fixed after version 3.18rc5 +# fixed-version: Fixed from version 3.18rc5 CVE_CHECK_IGNORE += "CVE-2014-7843" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-7970" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-7975" -# fixed-version: Fixed after version 3.18rc3 +# fixed-version: Fixed from version 3.18rc3 CVE_CHECK_IGNORE += "CVE-2014-8086" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-8133" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-8134" -# fixed-version: Fixed after version 4.0rc7 +# fixed-version: Fixed from version 4.0rc7 CVE_CHECK_IGNORE += "CVE-2014-8159" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-8160" -# fixed-version: Fixed after version 3.12rc1 +# fixed-version: Fixed from version 3.12rc1 CVE_CHECK_IGNORE += "CVE-2014-8171" -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2014-8172" -# fixed-version: Fixed after version 3.13rc5 +# fixed-version: Fixed from version 3.13rc5 CVE_CHECK_IGNORE += "CVE-2014-8173" # Skipping CVE-2014-8181, no affected_versions -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-8369" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-8480" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-8481" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-8559" -# fixed-version: Fixed after version 3.14rc3 +# fixed-version: Fixed from version 3.14rc3 CVE_CHECK_IGNORE += "CVE-2014-8709" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2014-8884" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-8989" -# fixed-version: Fixed after version 3.18rc6 +# fixed-version: Fixed from version 3.18rc6 CVE_CHECK_IGNORE += "CVE-2014-9090" -# fixed-version: Fixed after version 3.18rc6 +# fixed-version: Fixed from version 3.18rc6 CVE_CHECK_IGNORE += "CVE-2014-9322" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9419" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9420" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9428" -# fixed-version: Fixed after version 3.19rc4 +# fixed-version: Fixed from version 3.19rc4 CVE_CHECK_IGNORE += "CVE-2014-9529" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9584" -# fixed-version: Fixed after version 3.19rc4 +# fixed-version: Fixed from version 3.19rc4 CVE_CHECK_IGNORE += "CVE-2014-9585" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9644" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9683" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9710" -# fixed-version: Fixed after version 3.15rc1 +# fixed-version: Fixed from version 3.15rc1 CVE_CHECK_IGNORE += "CVE-2014-9715" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2014-9717" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9728" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9729" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9730" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2014-9731" # Skipping CVE-2014-9777, no affected_versions @@ -1199,7 +1199,7 @@ CVE_CHECK_IGNORE += "CVE-2014-9731" # Skipping CVE-2014-9789, no affected_versions -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-9803" # Skipping CVE-2014-9863, no affected_versions @@ -1216,7 +1216,7 @@ CVE_CHECK_IGNORE += "CVE-2014-9803" # Skipping CVE-2014-9869, no affected_versions -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2014-9870" # Skipping CVE-2014-9871, no affected_versions @@ -1253,7 +1253,7 @@ CVE_CHECK_IGNORE += "CVE-2014-9870" # Skipping CVE-2014-9887, no affected_versions -# fixed-version: Fixed after version 3.13rc1 +# fixed-version: Fixed from version 3.13rc1 CVE_CHECK_IGNORE += "CVE-2014-9888" # Skipping CVE-2014-9889, no affected_versions @@ -1268,7 +1268,7 @@ CVE_CHECK_IGNORE += "CVE-2014-9888" # Skipping CVE-2014-9894, no affected_versions -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2014-9895" # Skipping CVE-2014-9896, no affected_versions @@ -1281,312 +1281,312 @@ CVE_CHECK_IGNORE += "CVE-2014-9895" # Skipping CVE-2014-9900, no affected_versions -# fixed-version: Fixed after version 3.14rc4 +# fixed-version: Fixed from version 3.14rc4 CVE_CHECK_IGNORE += "CVE-2014-9903" -# fixed-version: Fixed after version 3.17rc1 +# fixed-version: Fixed from version 3.17rc1 CVE_CHECK_IGNORE += "CVE-2014-9904" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2014-9914" -# fixed-version: Fixed after version 3.18rc2 +# fixed-version: Fixed from version 3.18rc2 CVE_CHECK_IGNORE += "CVE-2014-9922" -# fixed-version: Fixed after version 3.19rc1 +# fixed-version: Fixed from version 3.19rc1 CVE_CHECK_IGNORE += "CVE-2014-9940" -# fixed-version: Fixed after version 3.19rc6 +# fixed-version: Fixed from version 3.19rc6 CVE_CHECK_IGNORE += "CVE-2015-0239" -# fixed-version: Fixed after version 3.15rc5 +# fixed-version: Fixed from version 3.15rc5 CVE_CHECK_IGNORE += "CVE-2015-0274" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-0275" # Skipping CVE-2015-0777, no affected_versions # Skipping CVE-2015-1328, no affected_versions -# fixed-version: Fixed after version 4.2rc5 +# fixed-version: Fixed from version 4.2rc5 CVE_CHECK_IGNORE += "CVE-2015-1333" -# fixed-version: Fixed after version 4.4rc5 +# fixed-version: Fixed from version 4.4rc5 CVE_CHECK_IGNORE += "CVE-2015-1339" -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2015-1350" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-1420" -# fixed-version: Fixed after version 3.19rc7 +# fixed-version: Fixed from version 3.19rc7 CVE_CHECK_IGNORE += "CVE-2015-1421" -# fixed-version: Fixed after version 3.19rc7 +# fixed-version: Fixed from version 3.19rc7 CVE_CHECK_IGNORE += "CVE-2015-1465" -# fixed-version: Fixed after version 3.19rc5 +# fixed-version: Fixed from version 3.19rc5 CVE_CHECK_IGNORE += "CVE-2015-1573" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2015-1593" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2015-1805" -# fixed-version: Fixed after version 3.19rc7 +# fixed-version: Fixed from version 3.19rc7 CVE_CHECK_IGNORE += "CVE-2015-2041" -# fixed-version: Fixed after version 3.19 +# fixed-version: Fixed from version 3.19 CVE_CHECK_IGNORE += "CVE-2015-2042" -# fixed-version: Fixed after version 4.0rc4 +# fixed-version: Fixed from version 4.0rc4 CVE_CHECK_IGNORE += "CVE-2015-2150" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2015-2666" -# fixed-version: Fixed after version 4.0rc3 +# fixed-version: Fixed from version 4.0rc3 CVE_CHECK_IGNORE += "CVE-2015-2672" -# fixed-version: Fixed after version 4.0rc6 +# fixed-version: Fixed from version 4.0rc6 CVE_CHECK_IGNORE += "CVE-2015-2686" -# fixed-version: Fixed after version 4.0rc3 +# fixed-version: Fixed from version 4.0rc3 CVE_CHECK_IGNORE += "CVE-2015-2830" # CVE-2015-2877 has no known resolution -# fixed-version: Fixed after version 4.0rc7 +# fixed-version: Fixed from version 4.0rc7 CVE_CHECK_IGNORE += "CVE-2015-2922" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2015-2925" -# fixed-version: Fixed after version 4.2rc1 +# fixed-version: Fixed from version 4.2rc1 CVE_CHECK_IGNORE += "CVE-2015-3212" -# fixed-version: Fixed after version 2.6.33rc8 +# fixed-version: Fixed from version 2.6.33rc8 CVE_CHECK_IGNORE += "CVE-2015-3214" -# fixed-version: Fixed after version 4.2rc2 +# fixed-version: Fixed from version 4.2rc2 CVE_CHECK_IGNORE += "CVE-2015-3288" -# fixed-version: Fixed after version 4.2rc3 +# fixed-version: Fixed from version 4.2rc3 CVE_CHECK_IGNORE += "CVE-2015-3290" -# fixed-version: Fixed after version 4.2rc3 +# fixed-version: Fixed from version 4.2rc3 CVE_CHECK_IGNORE += "CVE-2015-3291" -# fixed-version: Fixed after version 4.0rc5 +# fixed-version: Fixed from version 4.0rc5 CVE_CHECK_IGNORE += "CVE-2015-3331" # Skipping CVE-2015-3332, no affected_versions -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-3339" -# fixed-version: Fixed after version 4.1rc2 +# fixed-version: Fixed from version 4.1rc2 CVE_CHECK_IGNORE += "CVE-2015-3636" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-4001" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-4002" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-4003" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2015-4004" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2015-4036" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2015-4167" -# fixed-version: Fixed after version 3.13rc5 +# fixed-version: Fixed from version 3.13rc5 CVE_CHECK_IGNORE += "CVE-2015-4170" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-4176" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-4177" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-4178" -# fixed-version: Fixed after version 4.2rc1 +# fixed-version: Fixed from version 4.2rc1 CVE_CHECK_IGNORE += "CVE-2015-4692" -# fixed-version: Fixed after version 4.1rc6 +# fixed-version: Fixed from version 4.1rc6 CVE_CHECK_IGNORE += "CVE-2015-4700" -# fixed-version: Fixed after version 4.2rc7 +# fixed-version: Fixed from version 4.2rc7 CVE_CHECK_IGNORE += "CVE-2015-5156" -# fixed-version: Fixed after version 4.2rc3 +# fixed-version: Fixed from version 4.2rc3 CVE_CHECK_IGNORE += "CVE-2015-5157" -# fixed-version: Fixed after version 4.3rc3 +# fixed-version: Fixed from version 4.3rc3 CVE_CHECK_IGNORE += "CVE-2015-5257" -# fixed-version: Fixed after version 4.3rc3 +# fixed-version: Fixed from version 4.3rc3 CVE_CHECK_IGNORE += "CVE-2015-5283" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-5307" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-5327" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-5364" -# fixed-version: Fixed after version 4.1rc7 +# fixed-version: Fixed from version 4.1rc7 CVE_CHECK_IGNORE += "CVE-2015-5366" -# fixed-version: Fixed after version 4.2rc6 +# fixed-version: Fixed from version 4.2rc6 CVE_CHECK_IGNORE += "CVE-2015-5697" -# fixed-version: Fixed after version 4.1rc3 +# fixed-version: Fixed from version 4.1rc3 CVE_CHECK_IGNORE += "CVE-2015-5706" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-5707" -# fixed-version: Fixed after version 4.2rc5 +# fixed-version: Fixed from version 4.2rc5 CVE_CHECK_IGNORE += "CVE-2015-6252" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-6526" # CVE-2015-6619 has no known resolution # CVE-2015-6646 has no known resolution -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2015-6937" # Skipping CVE-2015-7312, no affected_versions -# fixed-version: Fixed after version 3.7rc1 +# fixed-version: Fixed from version 3.7rc1 CVE_CHECK_IGNORE += "CVE-2015-7509" -# fixed-version: Fixed after version 4.4rc7 +# fixed-version: Fixed from version 4.4rc7 CVE_CHECK_IGNORE += "CVE-2015-7513" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-7515" -# fixed-version: Fixed after version 4.4rc8 +# fixed-version: Fixed from version 4.4rc8 CVE_CHECK_IGNORE += "CVE-2015-7550" # Skipping CVE-2015-7553, no affected_versions -# fixed-version: Fixed after version 4.5rc2 +# fixed-version: Fixed from version 4.5rc2 CVE_CHECK_IGNORE += "CVE-2015-7566" -# fixed-version: Fixed after version 4.3rc4 +# fixed-version: Fixed from version 4.3rc4 CVE_CHECK_IGNORE += "CVE-2015-7613" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-7799" -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2015-7833" # Skipping CVE-2015-7837, no affected_versions -# fixed-version: Fixed after version 4.3rc7 +# fixed-version: Fixed from version 4.3rc7 CVE_CHECK_IGNORE += "CVE-2015-7872" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-7884" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-7885" -# fixed-version: Fixed after version 4.4rc4 +# fixed-version: Fixed from version 4.4rc4 CVE_CHECK_IGNORE += "CVE-2015-7990" # Skipping CVE-2015-8019, no affected_versions -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-8104" -# fixed-version: Fixed after version 4.0rc3 +# fixed-version: Fixed from version 4.0rc3 CVE_CHECK_IGNORE += "CVE-2015-8215" -# fixed-version: Fixed after version 2.6.34rc1 +# fixed-version: Fixed from version 2.6.34rc1 CVE_CHECK_IGNORE += "CVE-2015-8324" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-8374" -# fixed-version: Fixed after version 4.4rc3 +# fixed-version: Fixed from version 4.4rc3 CVE_CHECK_IGNORE += "CVE-2015-8539" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8543" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8550" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8551" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8552" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8553" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8569" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8575" -# fixed-version: Fixed after version 4.4rc4 +# fixed-version: Fixed from version 4.4rc4 CVE_CHECK_IGNORE += "CVE-2015-8660" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2015-8709" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2015-8746" -# fixed-version: Fixed after version 4.3rc4 +# fixed-version: Fixed from version 4.3rc4 CVE_CHECK_IGNORE += "CVE-2015-8767" -# fixed-version: Fixed after version 4.4rc5 +# fixed-version: Fixed from version 4.4rc5 CVE_CHECK_IGNORE += "CVE-2015-8785" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-8787" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2015-8812" -# fixed-version: Fixed after version 4.4rc6 +# fixed-version: Fixed from version 4.4rc6 CVE_CHECK_IGNORE += "CVE-2015-8816" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-8830" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2015-8839" -# fixed-version: Fixed after version 4.4rc3 +# fixed-version: Fixed from version 4.4rc3 CVE_CHECK_IGNORE += "CVE-2015-8844" -# fixed-version: Fixed after version 4.4rc3 +# fixed-version: Fixed from version 4.4rc3 CVE_CHECK_IGNORE += "CVE-2015-8845" # Skipping CVE-2015-8937, no affected_versions @@ -1605,241 +1605,241 @@ CVE_CHECK_IGNORE += "CVE-2015-8845" # Skipping CVE-2015-8944, no affected_versions -# fixed-version: Fixed after version 4.1rc2 +# fixed-version: Fixed from version 4.1rc2 CVE_CHECK_IGNORE += "CVE-2015-8950" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2015-8952" -# fixed-version: Fixed after version 4.3 +# fixed-version: Fixed from version 4.3 CVE_CHECK_IGNORE += "CVE-2015-8953" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2015-8955" -# fixed-version: Fixed after version 4.2rc1 +# fixed-version: Fixed from version 4.2rc1 CVE_CHECK_IGNORE += "CVE-2015-8956" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-8961" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2015-8962" -# fixed-version: Fixed after version 4.4 +# fixed-version: Fixed from version 4.4 CVE_CHECK_IGNORE += "CVE-2015-8963" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2015-8964" -# fixed-version: Fixed after version 4.4rc8 +# fixed-version: Fixed from version 4.4rc8 CVE_CHECK_IGNORE += "CVE-2015-8966" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2015-8967" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2015-8970" -# fixed-version: Fixed after version 3.19rc7 +# fixed-version: Fixed from version 3.19rc7 CVE_CHECK_IGNORE += "CVE-2015-9004" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2015-9016" -# fixed-version: Fixed after version 4.2rc1 +# fixed-version: Fixed from version 4.2rc1 CVE_CHECK_IGNORE += "CVE-2015-9289" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-0617" -# fixed-version: Fixed after version 4.5rc2 +# fixed-version: Fixed from version 4.5rc2 CVE_CHECK_IGNORE += "CVE-2016-0723" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-0728" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-0758" # Skipping CVE-2016-0774, no affected_versions -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2016-0821" -# fixed-version: Fixed after version 4.0rc5 +# fixed-version: Fixed from version 4.0rc5 CVE_CHECK_IGNORE += "CVE-2016-0823" -# fixed-version: Fixed after version 4.8rc7 +# fixed-version: Fixed from version 4.8rc7 CVE_CHECK_IGNORE += "CVE-2016-10044" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10088" -# fixed-version: Fixed after version 4.9 +# fixed-version: Fixed from version 4.9 CVE_CHECK_IGNORE += "CVE-2016-10147" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-10150" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10153" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10154" -# fixed-version: Fixed after version 4.9rc7 +# fixed-version: Fixed from version 4.9rc7 CVE_CHECK_IGNORE += "CVE-2016-10200" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10208" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-10229" -# fixed-version: Fixed after version 4.8rc6 +# fixed-version: Fixed from version 4.8rc6 CVE_CHECK_IGNORE += "CVE-2016-10318" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2016-10723" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10741" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-10764" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2016-10905" -# fixed-version: Fixed after version 4.5rc6 +# fixed-version: Fixed from version 4.5rc6 CVE_CHECK_IGNORE += "CVE-2016-10906" -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2016-10907" -# fixed-version: Fixed after version 4.7rc5 +# fixed-version: Fixed from version 4.7rc5 CVE_CHECK_IGNORE += "CVE-2016-1237" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-1575" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-1576" -# fixed-version: Fixed after version 4.7rc3 +# fixed-version: Fixed from version 4.7rc3 CVE_CHECK_IGNORE += "CVE-2016-1583" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2016-2053" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2069" -# fixed-version: Fixed after version 4.4 +# fixed-version: Fixed from version 4.4 CVE_CHECK_IGNORE += "CVE-2016-2070" -# fixed-version: Fixed after version 4.5rc4 +# fixed-version: Fixed from version 4.5rc4 CVE_CHECK_IGNORE += "CVE-2016-2085" -# fixed-version: Fixed after version 4.6rc5 +# fixed-version: Fixed from version 4.6rc5 CVE_CHECK_IGNORE += "CVE-2016-2117" -# fixed-version: Fixed after version 4.5 +# fixed-version: Fixed from version 4.5 CVE_CHECK_IGNORE += "CVE-2016-2143" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-2184" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-2185" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-2186" -# fixed-version: Fixed after version 4.6rc5 +# fixed-version: Fixed from version 4.6rc5 CVE_CHECK_IGNORE += "CVE-2016-2187" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2016-2188" -# fixed-version: Fixed after version 4.5rc4 +# fixed-version: Fixed from version 4.5rc4 CVE_CHECK_IGNORE += "CVE-2016-2383" -# fixed-version: Fixed after version 4.5rc4 +# fixed-version: Fixed from version 4.5rc4 CVE_CHECK_IGNORE += "CVE-2016-2384" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2543" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2544" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2545" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2546" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2547" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2548" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2549" -# fixed-version: Fixed after version 4.5rc4 +# fixed-version: Fixed from version 4.5rc4 CVE_CHECK_IGNORE += "CVE-2016-2550" -# fixed-version: Fixed after version 4.5rc2 +# fixed-version: Fixed from version 4.5rc2 CVE_CHECK_IGNORE += "CVE-2016-2782" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2016-2847" # Skipping CVE-2016-2853, no affected_versions # Skipping CVE-2016-2854, no affected_versions -# fixed-version: Fixed after version 4.5 +# fixed-version: Fixed from version 4.5 CVE_CHECK_IGNORE += "CVE-2016-3044" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2016-3070" -# fixed-version: Fixed after version 4.6rc2 +# fixed-version: Fixed from version 4.6rc2 CVE_CHECK_IGNORE += "CVE-2016-3134" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3135" -# fixed-version: Fixed after version 4.6rc3 +# fixed-version: Fixed from version 4.6rc3 CVE_CHECK_IGNORE += "CVE-2016-3136" -# fixed-version: Fixed after version 4.6rc3 +# fixed-version: Fixed from version 4.6rc3 CVE_CHECK_IGNORE += "CVE-2016-3137" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3138" -# fixed-version: Fixed after version 3.17rc1 +# fixed-version: Fixed from version 3.17rc1 CVE_CHECK_IGNORE += "CVE-2016-3139" -# fixed-version: Fixed after version 4.6rc3 +# fixed-version: Fixed from version 4.6rc3 CVE_CHECK_IGNORE += "CVE-2016-3140" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3156" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3157" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3672" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-3689" # Skipping CVE-2016-3695, no affected_versions @@ -1848,7 +1848,7 @@ CVE_CHECK_IGNORE += "CVE-2016-3689" # Skipping CVE-2016-3707, no affected_versions -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-3713" # CVE-2016-3775 has no known resolution @@ -1857,85 +1857,85 @@ CVE_CHECK_IGNORE += "CVE-2016-3713" # CVE-2016-3803 has no known resolution -# fixed-version: Fixed after version 4.4rc4 +# fixed-version: Fixed from version 4.4rc4 CVE_CHECK_IGNORE += "CVE-2016-3841" -# fixed-version: Fixed after version 4.8rc2 +# fixed-version: Fixed from version 4.8rc2 CVE_CHECK_IGNORE += "CVE-2016-3857" -# fixed-version: Fixed after version 4.5 +# fixed-version: Fixed from version 4.5 CVE_CHECK_IGNORE += "CVE-2016-3951" -# fixed-version: Fixed after version 4.6rc3 +# fixed-version: Fixed from version 4.6rc3 CVE_CHECK_IGNORE += "CVE-2016-3955" -# fixed-version: Fixed after version 4.6rc5 +# fixed-version: Fixed from version 4.6rc5 CVE_CHECK_IGNORE += "CVE-2016-3961" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4440" -# fixed-version: Fixed after version 4.7rc4 +# fixed-version: Fixed from version 4.7rc4 CVE_CHECK_IGNORE += "CVE-2016-4470" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4482" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-4485" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-4486" -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2016-4557" -# fixed-version: Fixed after version 4.6rc7 +# fixed-version: Fixed from version 4.6rc7 CVE_CHECK_IGNORE += "CVE-2016-4558" -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2016-4565" -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2016-4568" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4569" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4578" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-4580" -# fixed-version: Fixed after version 4.6rc7 +# fixed-version: Fixed from version 4.6rc7 CVE_CHECK_IGNORE += "CVE-2016-4581" -# fixed-version: Fixed after version 4.7rc4 +# fixed-version: Fixed from version 4.7rc4 CVE_CHECK_IGNORE += "CVE-2016-4794" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-4805" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-4913" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4951" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4997" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-4998" -# fixed-version: Fixed after version 4.9rc2 +# fixed-version: Fixed from version 4.9rc2 CVE_CHECK_IGNORE += "CVE-2016-5195" -# fixed-version: Fixed after version 4.7rc3 +# fixed-version: Fixed from version 4.7rc3 CVE_CHECK_IGNORE += "CVE-2016-5243" -# fixed-version: Fixed after version 4.7rc3 +# fixed-version: Fixed from version 4.7rc3 CVE_CHECK_IGNORE += "CVE-2016-5244" # Skipping CVE-2016-5340, no affected_versions @@ -1946,112 +1946,112 @@ CVE_CHECK_IGNORE += "CVE-2016-5244" # Skipping CVE-2016-5344, no affected_versions -# fixed-version: Fixed after version 4.7 +# fixed-version: Fixed from version 4.7 CVE_CHECK_IGNORE += "CVE-2016-5400" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2016-5412" -# fixed-version: Fixed after version 4.7 +# fixed-version: Fixed from version 4.7 CVE_CHECK_IGNORE += "CVE-2016-5696" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-5728" -# fixed-version: Fixed after version 4.7rc6 +# fixed-version: Fixed from version 4.7rc6 CVE_CHECK_IGNORE += "CVE-2016-5828" -# fixed-version: Fixed after version 4.7rc5 +# fixed-version: Fixed from version 4.7rc5 CVE_CHECK_IGNORE += "CVE-2016-5829" # CVE-2016-5870 has no known resolution -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2016-6130" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2016-6136" -# fixed-version: Fixed after version 4.7rc7 +# fixed-version: Fixed from version 4.7rc7 CVE_CHECK_IGNORE += "CVE-2016-6156" -# fixed-version: Fixed after version 4.7 +# fixed-version: Fixed from version 4.7 CVE_CHECK_IGNORE += "CVE-2016-6162" -# fixed-version: Fixed after version 4.7rc7 +# fixed-version: Fixed from version 4.7rc7 CVE_CHECK_IGNORE += "CVE-2016-6187" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-6197" -# fixed-version: Fixed after version 4.6 +# fixed-version: Fixed from version 4.6 CVE_CHECK_IGNORE += "CVE-2016-6198" -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2016-6213" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-6327" -# fixed-version: Fixed after version 4.8rc3 +# fixed-version: Fixed from version 4.8rc3 CVE_CHECK_IGNORE += "CVE-2016-6480" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2016-6516" # Skipping CVE-2016-6753, no affected_versions -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2016-6786" -# fixed-version: Fixed after version 4.0rc1 +# fixed-version: Fixed from version 4.0rc1 CVE_CHECK_IGNORE += "CVE-2016-6787" -# fixed-version: Fixed after version 4.8rc5 +# fixed-version: Fixed from version 4.8rc5 CVE_CHECK_IGNORE += "CVE-2016-6828" -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-7039" -# fixed-version: Fixed after version 4.9rc3 +# fixed-version: Fixed from version 4.9rc3 CVE_CHECK_IGNORE += "CVE-2016-7042" -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2016-7097" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-7117" # Skipping CVE-2016-7118, no affected_versions -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2016-7425" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2016-7910" -# fixed-version: Fixed after version 4.7rc7 +# fixed-version: Fixed from version 4.7rc7 CVE_CHECK_IGNORE += "CVE-2016-7911" -# fixed-version: Fixed after version 4.6rc5 +# fixed-version: Fixed from version 4.6rc5 CVE_CHECK_IGNORE += "CVE-2016-7912" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-7913" -# fixed-version: Fixed after version 4.6rc4 +# fixed-version: Fixed from version 4.6rc4 CVE_CHECK_IGNORE += "CVE-2016-7914" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-7915" -# fixed-version: Fixed after version 4.6rc7 +# fixed-version: Fixed from version 4.6rc7 CVE_CHECK_IGNORE += "CVE-2016-7916" -# fixed-version: Fixed after version 4.5rc6 +# fixed-version: Fixed from version 4.5rc6 CVE_CHECK_IGNORE += "CVE-2016-7917" -# fixed-version: Fixed after version 4.9 +# fixed-version: Fixed from version 4.9 CVE_CHECK_IGNORE += "CVE-2016-8399" # Skipping CVE-2016-8401, no affected_versions @@ -2062,102 +2062,102 @@ CVE_CHECK_IGNORE += "CVE-2016-8399" # Skipping CVE-2016-8404, no affected_versions -# fixed-version: Fixed after version 4.10rc6 +# fixed-version: Fixed from version 4.10rc6 CVE_CHECK_IGNORE += "CVE-2016-8405" # Skipping CVE-2016-8406, no affected_versions # Skipping CVE-2016-8407, no affected_versions -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-8630" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-8632" -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-8633" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2016-8636" -# fixed-version: Fixed after version 4.9rc6 +# fixed-version: Fixed from version 4.9rc6 CVE_CHECK_IGNORE += "CVE-2016-8645" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2016-8646" -# fixed-version: Fixed after version 4.9rc7 +# fixed-version: Fixed from version 4.9rc7 CVE_CHECK_IGNORE += "CVE-2016-8650" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-8655" -# fixed-version: Fixed after version 4.8rc7 +# fixed-version: Fixed from version 4.8rc7 CVE_CHECK_IGNORE += "CVE-2016-8658" # CVE-2016-8660 has no known resolution -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-8666" -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-9083" -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-9084" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-9120" -# fixed-version: Fixed after version 4.8rc7 +# fixed-version: Fixed from version 4.8rc7 CVE_CHECK_IGNORE += "CVE-2016-9178" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2016-9191" -# fixed-version: Fixed after version 4.9rc3 +# fixed-version: Fixed from version 4.9rc3 CVE_CHECK_IGNORE += "CVE-2016-9313" -# fixed-version: Fixed after version 4.9rc4 +# fixed-version: Fixed from version 4.9rc4 CVE_CHECK_IGNORE += "CVE-2016-9555" -# fixed-version: Fixed after version 4.9 +# fixed-version: Fixed from version 4.9 CVE_CHECK_IGNORE += "CVE-2016-9576" -# fixed-version: Fixed after version 4.10rc1 +# fixed-version: Fixed from version 4.10rc1 CVE_CHECK_IGNORE += "CVE-2016-9588" -# fixed-version: Fixed after version 4.11rc8 +# fixed-version: Fixed from version 4.11rc8 CVE_CHECK_IGNORE += "CVE-2016-9604" # Skipping CVE-2016-9644, no affected_versions -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2016-9685" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-9754" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-9755" -# fixed-version: Fixed after version 4.9rc7 +# fixed-version: Fixed from version 4.9rc7 CVE_CHECK_IGNORE += "CVE-2016-9756" -# fixed-version: Fixed after version 4.9rc7 +# fixed-version: Fixed from version 4.9rc7 CVE_CHECK_IGNORE += "CVE-2016-9777" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-9793" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-9794" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2016-9806" -# fixed-version: Fixed after version 4.9rc8 +# fixed-version: Fixed from version 4.9rc8 CVE_CHECK_IGNORE += "CVE-2016-9919" # Skipping CVE-2017-0403, no affected_versions @@ -2180,725 +2180,725 @@ CVE_CHECK_IGNORE += "CVE-2016-9919" # CVE-2017-0564 has no known resolution -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-0605" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-0627" # CVE-2017-0630 has no known resolution # CVE-2017-0749 has no known resolution -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2017-0750" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-0786" -# fixed-version: Fixed after version 4.15rc3 +# fixed-version: Fixed from version 4.15rc3 CVE_CHECK_IGNORE += "CVE-2017-0861" -# fixed-version: Fixed after version 4.13rc5 +# fixed-version: Fixed from version 4.13rc5 CVE_CHECK_IGNORE += "CVE-2017-1000" -# fixed-version: Fixed after version 4.13rc5 +# fixed-version: Fixed from version 4.13rc5 CVE_CHECK_IGNORE += "CVE-2017-1000111" -# fixed-version: Fixed after version 4.13rc5 +# fixed-version: Fixed from version 4.13rc5 CVE_CHECK_IGNORE += "CVE-2017-1000112" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-1000251" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-1000252" -# fixed-version: Fixed after version 4.1rc1 +# fixed-version: Fixed from version 4.1rc1 CVE_CHECK_IGNORE += "CVE-2017-1000253" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-1000255" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-1000363" -# fixed-version: Fixed after version 4.12rc6 +# fixed-version: Fixed from version 4.12rc6 CVE_CHECK_IGNORE += "CVE-2017-1000364" -# fixed-version: Fixed after version 4.12rc7 +# fixed-version: Fixed from version 4.12rc7 CVE_CHECK_IGNORE += "CVE-2017-1000365" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-1000370" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-1000371" -# fixed-version: Fixed after version 4.12rc6 +# fixed-version: Fixed from version 4.12rc6 CVE_CHECK_IGNORE += "CVE-2017-1000379" -# fixed-version: Fixed after version 4.12rc5 +# fixed-version: Fixed from version 4.12rc5 CVE_CHECK_IGNORE += "CVE-2017-1000380" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2017-1000405" -# fixed-version: Fixed after version 4.15rc3 +# fixed-version: Fixed from version 4.15rc3 CVE_CHECK_IGNORE += "CVE-2017-1000407" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2017-1000410" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-10661" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-10662" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-10663" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-10810" -# fixed-version: Fixed after version 4.12rc7 +# fixed-version: Fixed from version 4.12rc7 CVE_CHECK_IGNORE += "CVE-2017-10911" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-11089" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-11176" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-11472" -# fixed-version: Fixed after version 4.13rc2 +# fixed-version: Fixed from version 4.13rc2 CVE_CHECK_IGNORE += "CVE-2017-11473" -# fixed-version: Fixed after version 4.13 +# fixed-version: Fixed from version 4.13 CVE_CHECK_IGNORE += "CVE-2017-11600" -# fixed-version: Fixed after version 4.13rc6 +# fixed-version: Fixed from version 4.13rc6 CVE_CHECK_IGNORE += "CVE-2017-12134" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-12146" -# fixed-version: Fixed after version 4.14rc2 +# fixed-version: Fixed from version 4.14rc2 CVE_CHECK_IGNORE += "CVE-2017-12153" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-12154" -# fixed-version: Fixed after version 4.9rc6 +# fixed-version: Fixed from version 4.9rc6 CVE_CHECK_IGNORE += "CVE-2017-12168" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-12188" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-12190" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-12192" -# fixed-version: Fixed after version 4.14rc7 +# fixed-version: Fixed from version 4.14rc7 CVE_CHECK_IGNORE += "CVE-2017-12193" -# fixed-version: Fixed after version 4.13rc4 +# fixed-version: Fixed from version 4.13rc4 CVE_CHECK_IGNORE += "CVE-2017-12762" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-13080" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2017-13166" -# fixed-version: Fixed after version 4.5rc4 +# fixed-version: Fixed from version 4.5rc4 CVE_CHECK_IGNORE += "CVE-2017-13167" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2017-13168" -# fixed-version: Fixed after version 4.5rc1 +# fixed-version: Fixed from version 4.5rc1 CVE_CHECK_IGNORE += "CVE-2017-13215" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2017-13216" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2017-13220" # CVE-2017-13221 has no known resolution # CVE-2017-13222 has no known resolution -# fixed-version: Fixed after version 4.12rc5 +# fixed-version: Fixed from version 4.12rc5 CVE_CHECK_IGNORE += "CVE-2017-13305" -# fixed-version: Fixed after version 4.13rc7 +# fixed-version: Fixed from version 4.13rc7 CVE_CHECK_IGNORE += "CVE-2017-13686" # CVE-2017-13693 has no known resolution # CVE-2017-13694 has no known resolution -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2017-13695" -# fixed-version: Fixed after version 4.3rc1 +# fixed-version: Fixed from version 4.3rc1 CVE_CHECK_IGNORE += "CVE-2017-13715" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-14051" -# fixed-version: Fixed after version 4.12rc3 +# fixed-version: Fixed from version 4.12rc3 CVE_CHECK_IGNORE += "CVE-2017-14106" -# fixed-version: Fixed after version 4.13rc6 +# fixed-version: Fixed from version 4.13rc6 CVE_CHECK_IGNORE += "CVE-2017-14140" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-14156" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-14340" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-14489" -# fixed-version: Fixed after version 4.13 +# fixed-version: Fixed from version 4.13 CVE_CHECK_IGNORE += "CVE-2017-14497" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-14954" -# fixed-version: Fixed after version 4.14rc2 +# fixed-version: Fixed from version 4.14rc2 CVE_CHECK_IGNORE += "CVE-2017-14991" -# fixed-version: Fixed after version 4.9rc1 +# fixed-version: Fixed from version 4.9rc1 CVE_CHECK_IGNORE += "CVE-2017-15102" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-15115" -# fixed-version: Fixed after version 4.2rc1 +# fixed-version: Fixed from version 4.2rc1 CVE_CHECK_IGNORE += "CVE-2017-15116" -# fixed-version: Fixed after version 3.11rc1 +# fixed-version: Fixed from version 3.11rc1 CVE_CHECK_IGNORE += "CVE-2017-15121" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-15126" -# fixed-version: Fixed after version 4.13rc5 +# fixed-version: Fixed from version 4.13rc5 CVE_CHECK_IGNORE += "CVE-2017-15127" -# fixed-version: Fixed after version 4.14rc8 +# fixed-version: Fixed from version 4.14rc8 CVE_CHECK_IGNORE += "CVE-2017-15128" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-15129" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-15265" -# fixed-version: Fixed after version 4.12rc5 +# fixed-version: Fixed from version 4.12rc5 CVE_CHECK_IGNORE += "CVE-2017-15274" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-15299" -# fixed-version: Fixed after version 4.14rc7 +# fixed-version: Fixed from version 4.14rc7 CVE_CHECK_IGNORE += "CVE-2017-15306" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-15537" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-15649" -# fixed-version: Fixed after version 3.19rc3 +# fixed-version: Fixed from version 3.19rc3 CVE_CHECK_IGNORE += "CVE-2017-15868" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-15951" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-16525" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-16526" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-16527" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2017-16528" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-16529" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-16530" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-16531" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-16532" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-16533" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2017-16534" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-16535" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-16536" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-16537" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2017-16538" -# fixed-version: Fixed after version 4.14rc7 +# fixed-version: Fixed from version 4.14rc7 CVE_CHECK_IGNORE += "CVE-2017-16643" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2017-16644" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2017-16645" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-16646" -# fixed-version: Fixed after version 4.14 +# fixed-version: Fixed from version 4.14 CVE_CHECK_IGNORE += "CVE-2017-16647" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-16648" -# fixed-version: Fixed after version 4.14 +# fixed-version: Fixed from version 4.14 CVE_CHECK_IGNORE += "CVE-2017-16649" -# fixed-version: Fixed after version 4.14 +# fixed-version: Fixed from version 4.14 CVE_CHECK_IGNORE += "CVE-2017-16650" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-16911" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-16912" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-16913" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-16914" -# fixed-version: Fixed after version 4.14rc7 +# fixed-version: Fixed from version 4.14rc7 CVE_CHECK_IGNORE += "CVE-2017-16939" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-16994" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-16995" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-16996" -# fixed-version: Fixed after version 4.13rc7 +# fixed-version: Fixed from version 4.13rc7 CVE_CHECK_IGNORE += "CVE-2017-17052" -# fixed-version: Fixed after version 4.13rc7 +# fixed-version: Fixed from version 4.13rc7 CVE_CHECK_IGNORE += "CVE-2017-17053" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17448" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17449" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17450" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17558" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17712" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17741" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17805" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-17806" -# fixed-version: Fixed after version 4.15rc3 +# fixed-version: Fixed from version 4.15rc3 CVE_CHECK_IGNORE += "CVE-2017-17807" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17852" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17853" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17854" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17855" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17856" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17857" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-17862" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17863" -# fixed-version: Fixed after version 4.15rc5 +# fixed-version: Fixed from version 4.15rc5 CVE_CHECK_IGNORE += "CVE-2017-17864" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2017-17975" -# fixed-version: Fixed after version 4.11rc7 +# fixed-version: Fixed from version 4.11rc7 CVE_CHECK_IGNORE += "CVE-2017-18017" -# fixed-version: Fixed after version 4.15rc7 +# fixed-version: Fixed from version 4.15rc7 CVE_CHECK_IGNORE += "CVE-2017-18075" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18079" # CVE-2017-18169 has no known resolution -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2017-18174" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18193" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-18200" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2017-18202" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-18203" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-18204" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2017-18208" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-18216" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18218" -# fixed-version: Fixed after version 4.12rc4 +# fixed-version: Fixed from version 4.12rc4 CVE_CHECK_IGNORE += "CVE-2017-18221" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-18222" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-18224" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2017-18232" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18241" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-18249" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-18255" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-18257" -# fixed-version: Fixed after version 4.13rc6 +# fixed-version: Fixed from version 4.13rc6 CVE_CHECK_IGNORE += "CVE-2017-18261" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-18270" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2017-18344" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-18360" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2017-18379" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-18509" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18549" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-18550" -# fixed-version: Fixed after version 4.15rc9 +# fixed-version: Fixed from version 4.15rc9 CVE_CHECK_IGNORE += "CVE-2017-18551" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-18552" -# fixed-version: Fixed after version 4.15rc6 +# fixed-version: Fixed from version 4.15rc6 CVE_CHECK_IGNORE += "CVE-2017-18595" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-2583" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-2584" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-2596" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-2618" -# fixed-version: Fixed after version 2.6.25rc1 +# fixed-version: Fixed from version 2.6.25rc1 CVE_CHECK_IGNORE += "CVE-2017-2634" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2017-2636" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2017-2647" -# fixed-version: Fixed after version 4.11rc6 +# fixed-version: Fixed from version 4.11rc6 CVE_CHECK_IGNORE += "CVE-2017-2671" -# fixed-version: Fixed after version 4.14rc5 +# fixed-version: Fixed from version 4.14rc5 CVE_CHECK_IGNORE += "CVE-2017-5123" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-5546" -# fixed-version: Fixed after version 4.10rc5 +# fixed-version: Fixed from version 4.10rc5 CVE_CHECK_IGNORE += "CVE-2017-5547" -# fixed-version: Fixed after version 4.10rc5 +# fixed-version: Fixed from version 4.10rc5 CVE_CHECK_IGNORE += "CVE-2017-5548" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-5549" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-5550" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-5551" -# fixed-version: Fixed after version 4.10rc6 +# fixed-version: Fixed from version 4.10rc6 CVE_CHECK_IGNORE += "CVE-2017-5576" -# fixed-version: Fixed after version 4.10rc6 +# fixed-version: Fixed from version 4.10rc6 CVE_CHECK_IGNORE += "CVE-2017-5577" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-5669" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2017-5715" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2017-5753" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2017-5754" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-5897" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-5967" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-5970" -# fixed-version: Fixed after version 4.4rc1 +# fixed-version: Fixed from version 4.4rc1 CVE_CHECK_IGNORE += "CVE-2017-5972" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-5986" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-6001" -# fixed-version: Fixed after version 4.10 +# fixed-version: Fixed from version 4.10 CVE_CHECK_IGNORE += "CVE-2017-6074" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-6214" -# fixed-version: Fixed after version 4.10 +# fixed-version: Fixed from version 4.10 CVE_CHECK_IGNORE += "CVE-2017-6345" -# fixed-version: Fixed after version 4.10 +# fixed-version: Fixed from version 4.10 CVE_CHECK_IGNORE += "CVE-2017-6346" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-6347" -# fixed-version: Fixed after version 4.10 +# fixed-version: Fixed from version 4.10 CVE_CHECK_IGNORE += "CVE-2017-6348" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-6353" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2017-6874" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2017-6951" -# fixed-version: Fixed after version 4.11rc5 +# fixed-version: Fixed from version 4.11rc5 CVE_CHECK_IGNORE += "CVE-2017-7184" -# fixed-version: Fixed after version 4.11rc5 +# fixed-version: Fixed from version 4.11rc5 CVE_CHECK_IGNORE += "CVE-2017-7187" -# fixed-version: Fixed after version 4.11rc6 +# fixed-version: Fixed from version 4.11rc6 CVE_CHECK_IGNORE += "CVE-2017-7261" -# fixed-version: Fixed after version 4.10rc4 +# fixed-version: Fixed from version 4.10rc4 CVE_CHECK_IGNORE += "CVE-2017-7273" -# fixed-version: Fixed after version 4.11rc4 +# fixed-version: Fixed from version 4.11rc4 CVE_CHECK_IGNORE += "CVE-2017-7277" -# fixed-version: Fixed after version 4.11rc6 +# fixed-version: Fixed from version 4.11rc6 CVE_CHECK_IGNORE += "CVE-2017-7294" -# fixed-version: Fixed after version 4.11rc6 +# fixed-version: Fixed from version 4.11rc6 CVE_CHECK_IGNORE += "CVE-2017-7308" -# fixed-version: Fixed after version 4.12rc5 +# fixed-version: Fixed from version 4.12rc5 CVE_CHECK_IGNORE += "CVE-2017-7346" # CVE-2017-7369 has no known resolution -# fixed-version: Fixed after version 4.11rc4 +# fixed-version: Fixed from version 4.11rc4 CVE_CHECK_IGNORE += "CVE-2017-7374" -# fixed-version: Fixed after version 4.11rc8 +# fixed-version: Fixed from version 4.11rc8 CVE_CHECK_IGNORE += "CVE-2017-7472" -# fixed-version: Fixed after version 4.11 +# fixed-version: Fixed from version 4.11 CVE_CHECK_IGNORE += "CVE-2017-7477" -# fixed-version: Fixed after version 4.12rc7 +# fixed-version: Fixed from version 4.12rc7 CVE_CHECK_IGNORE += "CVE-2017-7482" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-7487" -# fixed-version: Fixed after version 4.7rc1 +# fixed-version: Fixed from version 4.7rc1 CVE_CHECK_IGNORE += "CVE-2017-7495" -# fixed-version: Fixed after version 4.12rc7 +# fixed-version: Fixed from version 4.12rc7 CVE_CHECK_IGNORE += "CVE-2017-7518" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-7533" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-7541" -# fixed-version: Fixed after version 4.13rc2 +# fixed-version: Fixed from version 4.13rc2 CVE_CHECK_IGNORE += "CVE-2017-7542" -# fixed-version: Fixed after version 4.13 +# fixed-version: Fixed from version 4.13 CVE_CHECK_IGNORE += "CVE-2017-7558" -# fixed-version: Fixed after version 4.11rc6 +# fixed-version: Fixed from version 4.11rc6 CVE_CHECK_IGNORE += "CVE-2017-7616" -# fixed-version: Fixed after version 4.11rc8 +# fixed-version: Fixed from version 4.11rc8 CVE_CHECK_IGNORE += "CVE-2017-7618" -# fixed-version: Fixed after version 4.11 +# fixed-version: Fixed from version 4.11 CVE_CHECK_IGNORE += "CVE-2017-7645" -# fixed-version: Fixed after version 4.11rc7 +# fixed-version: Fixed from version 4.11rc7 CVE_CHECK_IGNORE += "CVE-2017-7889" -# fixed-version: Fixed after version 4.11 +# fixed-version: Fixed from version 4.11 CVE_CHECK_IGNORE += "CVE-2017-7895" -# fixed-version: Fixed after version 4.11rc8 +# fixed-version: Fixed from version 4.11rc8 CVE_CHECK_IGNORE += "CVE-2017-7979" -# fixed-version: Fixed after version 4.11rc4 +# fixed-version: Fixed from version 4.11rc4 CVE_CHECK_IGNORE += "CVE-2017-8061" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2017-8062" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-8063" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-8064" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-8065" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-8066" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2017-8067" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-8068" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-8069" -# fixed-version: Fixed after version 4.10rc8 +# fixed-version: Fixed from version 4.10rc8 CVE_CHECK_IGNORE += "CVE-2017-8070" -# fixed-version: Fixed after version 4.10rc7 +# fixed-version: Fixed from version 4.10rc7 CVE_CHECK_IGNORE += "CVE-2017-8071" -# fixed-version: Fixed after version 4.10rc7 +# fixed-version: Fixed from version 4.10rc7 CVE_CHECK_IGNORE += "CVE-2017-8072" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2017-8106" -# fixed-version: Fixed after version 3.19rc6 +# fixed-version: Fixed from version 3.19rc6 CVE_CHECK_IGNORE += "CVE-2017-8240" # CVE-2017-8242 has no known resolution @@ -2909,235 +2909,235 @@ CVE_CHECK_IGNORE += "CVE-2017-8240" # CVE-2017-8246 has no known resolution -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-8797" -# fixed-version: Fixed after version 4.15rc3 +# fixed-version: Fixed from version 4.15rc3 CVE_CHECK_IGNORE += "CVE-2017-8824" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-8831" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-8890" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2017-8924" -# fixed-version: Fixed after version 4.11rc2 +# fixed-version: Fixed from version 4.11rc2 CVE_CHECK_IGNORE += "CVE-2017-8925" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-9059" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-9074" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-9075" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-9076" -# fixed-version: Fixed after version 4.12rc2 +# fixed-version: Fixed from version 4.12rc2 CVE_CHECK_IGNORE += "CVE-2017-9077" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2017-9150" -# fixed-version: Fixed after version 4.12rc3 +# fixed-version: Fixed from version 4.12rc3 CVE_CHECK_IGNORE += "CVE-2017-9211" -# fixed-version: Fixed after version 4.12rc3 +# fixed-version: Fixed from version 4.12rc3 CVE_CHECK_IGNORE += "CVE-2017-9242" -# fixed-version: Fixed after version 4.12rc5 +# fixed-version: Fixed from version 4.12rc5 CVE_CHECK_IGNORE += "CVE-2017-9605" -# fixed-version: Fixed after version 4.3rc7 +# fixed-version: Fixed from version 4.3rc7 CVE_CHECK_IGNORE += "CVE-2017-9725" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-9984" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2017-9985" -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2017-9986" -# fixed-version: Fixed after version 4.15rc9 +# fixed-version: Fixed from version 4.15rc9 CVE_CHECK_IGNORE += "CVE-2018-1000004" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-1000026" -# fixed-version: Fixed after version 4.15 +# fixed-version: Fixed from version 4.15 CVE_CHECK_IGNORE += "CVE-2018-1000028" -# fixed-version: Fixed after version 4.16 +# fixed-version: Fixed from version 4.16 CVE_CHECK_IGNORE += "CVE-2018-1000199" -# fixed-version: Fixed after version 4.17rc5 +# fixed-version: Fixed from version 4.17rc5 CVE_CHECK_IGNORE += "CVE-2018-1000200" -# fixed-version: Fixed after version 4.17rc7 +# fixed-version: Fixed from version 4.17rc7 CVE_CHECK_IGNORE += "CVE-2018-1000204" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-10021" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-10074" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2018-10087" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2018-10124" -# fixed-version: Fixed after version 4.17rc4 +# fixed-version: Fixed from version 4.17rc4 CVE_CHECK_IGNORE += "CVE-2018-10322" -# fixed-version: Fixed after version 4.17rc4 +# fixed-version: Fixed from version 4.17rc4 CVE_CHECK_IGNORE += "CVE-2018-10323" -# fixed-version: Fixed after version 4.16rc3 +# fixed-version: Fixed from version 4.16rc3 CVE_CHECK_IGNORE += "CVE-2018-1065" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2018-1066" -# fixed-version: Fixed after version 4.13rc6 +# fixed-version: Fixed from version 4.13rc6 CVE_CHECK_IGNORE += "CVE-2018-10675" -# fixed-version: Fixed after version 4.16rc5 +# fixed-version: Fixed from version 4.16rc5 CVE_CHECK_IGNORE += "CVE-2018-1068" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-10840" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-10853" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-1087" # CVE-2018-10872 has no known resolution -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10876" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10877" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10878" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10879" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10880" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10881" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10882" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-10883" -# fixed-version: Fixed after version 2.6.36rc1 +# fixed-version: Fixed from version 2.6.36rc1 CVE_CHECK_IGNORE += "CVE-2018-10901" -# fixed-version: Fixed after version 4.18rc6 +# fixed-version: Fixed from version 4.18rc6 CVE_CHECK_IGNORE += "CVE-2018-10902" -# fixed-version: Fixed after version 4.14rc2 +# fixed-version: Fixed from version 4.14rc2 CVE_CHECK_IGNORE += "CVE-2018-1091" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-1092" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-1093" -# fixed-version: Fixed after version 4.13rc5 +# fixed-version: Fixed from version 4.13rc5 CVE_CHECK_IGNORE += "CVE-2018-10938" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-1094" -# fixed-version: Fixed after version 4.17rc3 +# fixed-version: Fixed from version 4.17rc3 CVE_CHECK_IGNORE += "CVE-2018-10940" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-1095" -# fixed-version: Fixed after version 4.17rc2 +# fixed-version: Fixed from version 4.17rc2 CVE_CHECK_IGNORE += "CVE-2018-1108" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-1118" -# fixed-version: Fixed after version 4.17rc6 +# fixed-version: Fixed from version 4.17rc6 CVE_CHECK_IGNORE += "CVE-2018-1120" # CVE-2018-1121 has no known resolution -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2018-11232" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-1128" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-1129" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-1130" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-11412" -# fixed-version: Fixed after version 4.17rc7 +# fixed-version: Fixed from version 4.17rc7 CVE_CHECK_IGNORE += "CVE-2018-11506" -# fixed-version: Fixed after version 4.17rc5 +# fixed-version: Fixed from version 4.17rc5 CVE_CHECK_IGNORE += "CVE-2018-11508" # CVE-2018-11987 has no known resolution -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2018-12126" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2018-12127" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2018-12130" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2018-12207" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-12232" -# fixed-version: Fixed after version 4.18rc2 +# fixed-version: Fixed from version 4.18rc2 CVE_CHECK_IGNORE += "CVE-2018-12233" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-12633" -# fixed-version: Fixed after version 4.18rc2 +# fixed-version: Fixed from version 4.18rc2 CVE_CHECK_IGNORE += "CVE-2018-12714" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-12896" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-12904" # CVE-2018-12928 has no known resolution @@ -3148,653 +3148,653 @@ CVE_CHECK_IGNORE += "CVE-2018-12904" # CVE-2018-12931 has no known resolution -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13053" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-13093" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-13094" -# fixed-version: Fixed after version 4.18rc3 +# fixed-version: Fixed from version 4.18rc3 CVE_CHECK_IGNORE += "CVE-2018-13095" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13096" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13097" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13098" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13099" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-13100" -# fixed-version: Fixed after version 4.18rc4 +# fixed-version: Fixed from version 4.18rc4 CVE_CHECK_IGNORE += "CVE-2018-13405" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-13406" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14609" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14610" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14611" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14612" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14613" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14614" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14615" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14616" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-14617" -# fixed-version: Fixed after version 4.15rc4 +# fixed-version: Fixed from version 4.15rc4 CVE_CHECK_IGNORE += "CVE-2018-14619" -# fixed-version: Fixed after version 4.20rc6 +# fixed-version: Fixed from version 4.20rc6 CVE_CHECK_IGNORE += "CVE-2018-14625" -# fixed-version: Fixed after version 4.19rc6 +# fixed-version: Fixed from version 4.19rc6 CVE_CHECK_IGNORE += "CVE-2018-14633" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2018-14634" -# fixed-version: Fixed after version 4.19rc4 +# fixed-version: Fixed from version 4.19rc4 CVE_CHECK_IGNORE += "CVE-2018-14641" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2018-14646" -# fixed-version: Fixed after version 4.19rc2 +# fixed-version: Fixed from version 4.19rc2 CVE_CHECK_IGNORE += "CVE-2018-14656" -# fixed-version: Fixed after version 4.18rc8 +# fixed-version: Fixed from version 4.18rc8 CVE_CHECK_IGNORE += "CVE-2018-14678" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-14734" -# fixed-version: Fixed after version 4.19rc7 +# fixed-version: Fixed from version 4.19rc7 CVE_CHECK_IGNORE += "CVE-2018-15471" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-15572" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-15594" -# fixed-version: Fixed after version 4.18rc5 +# fixed-version: Fixed from version 4.18rc5 CVE_CHECK_IGNORE += "CVE-2018-16276" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2018-16597" -# fixed-version: Fixed after version 4.19rc2 +# fixed-version: Fixed from version 4.19rc2 CVE_CHECK_IGNORE += "CVE-2018-16658" -# fixed-version: Fixed after version 4.20rc5 +# fixed-version: Fixed from version 4.20rc5 CVE_CHECK_IGNORE += "CVE-2018-16862" -# fixed-version: Fixed after version 4.20rc3 +# fixed-version: Fixed from version 4.20rc3 CVE_CHECK_IGNORE += "CVE-2018-16871" -# fixed-version: Fixed after version 5.0rc5 +# fixed-version: Fixed from version 5.0rc5 CVE_CHECK_IGNORE += "CVE-2018-16880" -# fixed-version: Fixed after version 4.20 +# fixed-version: Fixed from version 4.20 CVE_CHECK_IGNORE += "CVE-2018-16882" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2018-16884" # CVE-2018-16885 has no known resolution -# fixed-version: Fixed after version 4.19rc4 +# fixed-version: Fixed from version 4.19rc4 CVE_CHECK_IGNORE += "CVE-2018-17182" -# fixed-version: Fixed after version 4.19rc7 +# fixed-version: Fixed from version 4.19rc7 CVE_CHECK_IGNORE += "CVE-2018-17972" # CVE-2018-17977 has no known resolution -# fixed-version: Fixed after version 4.19rc7 +# fixed-version: Fixed from version 4.19rc7 CVE_CHECK_IGNORE += "CVE-2018-18021" -# fixed-version: Fixed after version 4.19 +# fixed-version: Fixed from version 4.19 CVE_CHECK_IGNORE += "CVE-2018-18281" -# fixed-version: Fixed after version 4.15rc6 +# fixed-version: Fixed from version 4.15rc6 CVE_CHECK_IGNORE += "CVE-2018-18386" -# fixed-version: Fixed after version 4.20rc5 +# fixed-version: Fixed from version 4.20rc5 CVE_CHECK_IGNORE += "CVE-2018-18397" -# fixed-version: Fixed after version 4.19rc7 +# fixed-version: Fixed from version 4.19rc7 CVE_CHECK_IGNORE += "CVE-2018-18445" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-18559" # CVE-2018-18653 has no known resolution -# fixed-version: Fixed after version 4.17rc4 +# fixed-version: Fixed from version 4.17rc4 CVE_CHECK_IGNORE += "CVE-2018-18690" -# fixed-version: Fixed after version 4.20rc1 +# fixed-version: Fixed from version 4.20rc1 CVE_CHECK_IGNORE += "CVE-2018-18710" -# fixed-version: Fixed after version 4.20rc2 +# fixed-version: Fixed from version 4.20rc2 CVE_CHECK_IGNORE += "CVE-2018-18955" -# fixed-version: Fixed after version 4.20rc5 +# fixed-version: Fixed from version 4.20rc5 CVE_CHECK_IGNORE += "CVE-2018-19406" -# fixed-version: Fixed after version 4.20rc5 +# fixed-version: Fixed from version 4.20rc5 CVE_CHECK_IGNORE += "CVE-2018-19407" -# fixed-version: Fixed after version 4.20rc6 +# fixed-version: Fixed from version 4.20rc6 CVE_CHECK_IGNORE += "CVE-2018-19824" -# fixed-version: Fixed after version 4.20rc3 +# fixed-version: Fixed from version 4.20rc3 CVE_CHECK_IGNORE += "CVE-2018-19854" -# fixed-version: Fixed after version 4.20 +# fixed-version: Fixed from version 4.20 CVE_CHECK_IGNORE += "CVE-2018-19985" -# fixed-version: Fixed after version 4.20rc6 +# fixed-version: Fixed from version 4.20rc6 CVE_CHECK_IGNORE += "CVE-2018-20169" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-20449" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2018-20509" -# fixed-version: Fixed after version 4.16rc3 +# fixed-version: Fixed from version 4.16rc3 CVE_CHECK_IGNORE += "CVE-2018-20510" -# fixed-version: Fixed after version 4.19rc5 +# fixed-version: Fixed from version 4.19rc5 CVE_CHECK_IGNORE += "CVE-2018-20511" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2018-20669" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2018-20784" -# fixed-version: Fixed after version 4.20rc1 +# fixed-version: Fixed from version 4.20rc1 CVE_CHECK_IGNORE += "CVE-2018-20836" -# fixed-version: Fixed after version 4.20rc1 +# fixed-version: Fixed from version 4.20rc1 CVE_CHECK_IGNORE += "CVE-2018-20854" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-20855" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-20856" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-20961" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-20976" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2018-21008" -# fixed-version: Fixed after version 4.15rc9 +# fixed-version: Fixed from version 4.15rc9 CVE_CHECK_IGNORE += "CVE-2018-25015" -# fixed-version: Fixed after version 4.17rc7 +# fixed-version: Fixed from version 4.17rc7 CVE_CHECK_IGNORE += "CVE-2018-25020" # CVE-2018-3574 has no known resolution -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-3620" -# fixed-version: Fixed after version 4.17rc7 +# fixed-version: Fixed from version 4.17rc7 CVE_CHECK_IGNORE += "CVE-2018-3639" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-3646" -# fixed-version: Fixed after version 3.7rc1 +# fixed-version: Fixed from version 3.7rc1 CVE_CHECK_IGNORE += "CVE-2018-3665" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-3693" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2018-5332" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2018-5333" -# fixed-version: Fixed after version 4.15rc8 +# fixed-version: Fixed from version 4.15rc8 CVE_CHECK_IGNORE += "CVE-2018-5344" -# fixed-version: Fixed after version 4.18rc7 +# fixed-version: Fixed from version 4.18rc7 CVE_CHECK_IGNORE += "CVE-2018-5390" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-5391" -# fixed-version: Fixed after version 4.16rc5 +# fixed-version: Fixed from version 4.16rc5 CVE_CHECK_IGNORE += "CVE-2018-5703" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-5750" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-5803" -# fixed-version: Fixed after version 4.17rc6 +# fixed-version: Fixed from version 4.17rc6 CVE_CHECK_IGNORE += "CVE-2018-5814" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-5848" # Skipping CVE-2018-5856, no affected_versions -# fixed-version: Fixed after version 4.11rc8 +# fixed-version: Fixed from version 4.11rc8 CVE_CHECK_IGNORE += "CVE-2018-5873" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-5953" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-5995" -# fixed-version: Fixed after version 4.16rc5 +# fixed-version: Fixed from version 4.16rc5 CVE_CHECK_IGNORE += "CVE-2018-6412" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-6554" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2018-6555" # CVE-2018-6559 has no known resolution -# fixed-version: Fixed after version 4.15rc9 +# fixed-version: Fixed from version 4.15rc9 CVE_CHECK_IGNORE += "CVE-2018-6927" -# fixed-version: Fixed after version 4.14rc6 +# fixed-version: Fixed from version 4.14rc6 CVE_CHECK_IGNORE += "CVE-2018-7191" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-7273" -# fixed-version: Fixed after version 4.11rc1 +# fixed-version: Fixed from version 4.11rc1 CVE_CHECK_IGNORE += "CVE-2018-7480" -# fixed-version: Fixed after version 4.15rc3 +# fixed-version: Fixed from version 4.15rc3 CVE_CHECK_IGNORE += "CVE-2018-7492" -# fixed-version: Fixed after version 4.16rc2 +# fixed-version: Fixed from version 4.16rc2 CVE_CHECK_IGNORE += "CVE-2018-7566" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-7740" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2018-7754" -# fixed-version: Fixed after version 4.19rc5 +# fixed-version: Fixed from version 4.19rc5 CVE_CHECK_IGNORE += "CVE-2018-7755" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-7757" -# fixed-version: Fixed after version 4.16rc5 +# fixed-version: Fixed from version 4.16rc5 CVE_CHECK_IGNORE += "CVE-2018-7995" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-8043" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2018-8087" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-8781" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-8822" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2018-8897" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2018-9363" -# fixed-version: Fixed after version 4.17rc3 +# fixed-version: Fixed from version 4.17rc3 CVE_CHECK_IGNORE += "CVE-2018-9385" -# fixed-version: Fixed after version 4.17rc3 +# fixed-version: Fixed from version 4.17rc3 CVE_CHECK_IGNORE += "CVE-2018-9415" -# fixed-version: Fixed after version 4.6rc1 +# fixed-version: Fixed from version 4.6rc1 CVE_CHECK_IGNORE += "CVE-2018-9422" -# fixed-version: Fixed after version 4.15rc6 +# fixed-version: Fixed from version 4.15rc6 CVE_CHECK_IGNORE += "CVE-2018-9465" -# fixed-version: Fixed after version 4.18rc5 +# fixed-version: Fixed from version 4.18rc5 CVE_CHECK_IGNORE += "CVE-2018-9516" -# fixed-version: Fixed after version 4.14rc1 +# fixed-version: Fixed from version 4.14rc1 CVE_CHECK_IGNORE += "CVE-2018-9517" -# fixed-version: Fixed after version 4.16rc3 +# fixed-version: Fixed from version 4.16rc3 CVE_CHECK_IGNORE += "CVE-2018-9518" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2018-9568" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-0136" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-0145" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-0146" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-0147" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-0148" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-0149" -# fixed-version: Fixed after version 5.4rc8 +# fixed-version: Fixed from version 5.4rc8 CVE_CHECK_IGNORE += "CVE-2019-0154" -# fixed-version: Fixed after version 5.4rc8 +# fixed-version: Fixed from version 5.4rc8 CVE_CHECK_IGNORE += "CVE-2019-0155" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-10124" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-10125" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-10126" # CVE-2019-10140 has no known resolution -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-10142" -# fixed-version: Fixed after version 5.3rc3 +# fixed-version: Fixed from version 5.3rc3 CVE_CHECK_IGNORE += "CVE-2019-10207" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-10220" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-10638" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-10639" -# fixed-version: Fixed after version 5.0rc3 +# fixed-version: Fixed from version 5.0rc3 CVE_CHECK_IGNORE += "CVE-2019-11085" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-11091" -# fixed-version: Fixed after version 5.4rc8 +# fixed-version: Fixed from version 5.4rc8 CVE_CHECK_IGNORE += "CVE-2019-11135" -# fixed-version: Fixed after version 4.8rc5 +# fixed-version: Fixed from version 4.8rc5 CVE_CHECK_IGNORE += "CVE-2019-11190" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-11191" -# fixed-version: Fixed after version 5.3rc4 +# fixed-version: Fixed from version 5.3rc4 CVE_CHECK_IGNORE += "CVE-2019-1125" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-11477" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-11478" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-11479" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-11486" -# fixed-version: Fixed after version 5.1rc5 +# fixed-version: Fixed from version 5.1rc5 CVE_CHECK_IGNORE += "CVE-2019-11487" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-11599" -# fixed-version: Fixed after version 5.1 +# fixed-version: Fixed from version 5.1 CVE_CHECK_IGNORE += "CVE-2019-11683" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-11810" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-11811" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-11815" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-11833" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-11884" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-12378" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-12379" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-12380" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-12381" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-12382" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-12454" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-12455" # CVE-2019-12456 has no known resolution -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-12614" -# fixed-version: Fixed after version 5.2rc4 +# fixed-version: Fixed from version 5.2rc4 CVE_CHECK_IGNORE += "CVE-2019-12615" -# fixed-version: Fixed after version 5.2rc7 +# fixed-version: Fixed from version 5.2rc7 CVE_CHECK_IGNORE += "CVE-2019-12817" -# fixed-version: Fixed after version 5.0 +# fixed-version: Fixed from version 5.0 CVE_CHECK_IGNORE += "CVE-2019-12818" -# fixed-version: Fixed after version 5.0rc8 +# fixed-version: Fixed from version 5.0rc8 CVE_CHECK_IGNORE += "CVE-2019-12819" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2019-12881" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-12984" -# fixed-version: Fixed after version 5.2rc4 +# fixed-version: Fixed from version 5.2rc4 CVE_CHECK_IGNORE += "CVE-2019-13233" -# fixed-version: Fixed after version 5.2 +# fixed-version: Fixed from version 5.2 CVE_CHECK_IGNORE += "CVE-2019-13272" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-13631" -# fixed-version: Fixed after version 5.3rc2 +# fixed-version: Fixed from version 5.3rc2 CVE_CHECK_IGNORE += "CVE-2019-13648" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-14283" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-14284" -# fixed-version: Fixed after version 5.5rc7 +# fixed-version: Fixed from version 5.5rc7 CVE_CHECK_IGNORE += "CVE-2019-14615" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2019-14763" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-14814" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-14815" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-14816" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-14821" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-14835" -# fixed-version: Fixed after version 5.5rc3 +# fixed-version: Fixed from version 5.5rc3 CVE_CHECK_IGNORE += "CVE-2019-14895" -# fixed-version: Fixed after version 5.5 +# fixed-version: Fixed from version 5.5 CVE_CHECK_IGNORE += "CVE-2019-14896" -# fixed-version: Fixed after version 5.5 +# fixed-version: Fixed from version 5.5 CVE_CHECK_IGNORE += "CVE-2019-14897" # CVE-2019-14898 has no known resolution -# fixed-version: Fixed after version 5.5rc3 +# fixed-version: Fixed from version 5.5rc3 CVE_CHECK_IGNORE += "CVE-2019-14901" -# fixed-version: Fixed after version 5.3rc8 +# fixed-version: Fixed from version 5.3rc8 CVE_CHECK_IGNORE += "CVE-2019-15030" -# fixed-version: Fixed after version 5.3rc8 +# fixed-version: Fixed from version 5.3rc8 CVE_CHECK_IGNORE += "CVE-2019-15031" -# fixed-version: Fixed after version 5.2rc2 +# fixed-version: Fixed from version 5.2rc2 CVE_CHECK_IGNORE += "CVE-2019-15090" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-15098" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-15099" -# fixed-version: Fixed after version 5.3rc5 +# fixed-version: Fixed from version 5.3rc5 CVE_CHECK_IGNORE += "CVE-2019-15117" -# fixed-version: Fixed after version 5.3rc5 +# fixed-version: Fixed from version 5.3rc5 CVE_CHECK_IGNORE += "CVE-2019-15118" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15211" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-15212" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15213" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-15214" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15215" -# fixed-version: Fixed after version 5.1 +# fixed-version: Fixed from version 5.1 CVE_CHECK_IGNORE += "CVE-2019-15216" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15217" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-15218" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-15219" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15220" -# fixed-version: Fixed after version 5.2 +# fixed-version: Fixed from version 5.2 CVE_CHECK_IGNORE += "CVE-2019-15221" -# fixed-version: Fixed after version 5.3rc3 +# fixed-version: Fixed from version 5.3rc3 CVE_CHECK_IGNORE += "CVE-2019-15222" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-15223" # CVE-2019-15239 has no known resolution # CVE-2019-15290 has no known resolution -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-15291" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-15292" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-15504" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-15505" -# fixed-version: Fixed after version 5.3rc6 +# fixed-version: Fixed from version 5.3rc6 CVE_CHECK_IGNORE += "CVE-2019-15538" -# fixed-version: Fixed after version 5.1 +# fixed-version: Fixed from version 5.1 CVE_CHECK_IGNORE += "CVE-2019-15666" # CVE-2019-15791 has no known resolution @@ -3803,1692 +3803,1695 @@ CVE_CHECK_IGNORE += "CVE-2019-15666" # CVE-2019-15793 has no known resolution -# fixed-version: Fixed after version 5.12 +# fixed-version: Fixed from version 5.12 CVE_CHECK_IGNORE += "CVE-2019-15794" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2019-15807" # CVE-2019-15902 has no known resolution -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-15916" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-15917" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-15918" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-15919" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-15920" -# fixed-version: Fixed after version 5.1rc3 +# fixed-version: Fixed from version 5.1rc3 CVE_CHECK_IGNORE += "CVE-2019-15921" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-15922" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-15923" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-15924" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15925" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-15926" -# fixed-version: Fixed after version 5.0rc2 +# fixed-version: Fixed from version 5.0rc2 CVE_CHECK_IGNORE += "CVE-2019-15927" # CVE-2019-16089 has no known resolution -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-16229" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-16230" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-16231" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-16232" -# fixed-version: Fixed after version 5.4rc5 +# fixed-version: Fixed from version 5.4rc5 CVE_CHECK_IGNORE += "CVE-2019-16233" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-16234" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-16413" -# fixed-version: Fixed after version 5.3rc7 +# fixed-version: Fixed from version 5.3rc7 CVE_CHECK_IGNORE += "CVE-2019-16714" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-16746" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2019-16921" -# fixed-version: Fixed after version 5.0 +# fixed-version: Fixed from version 5.0 CVE_CHECK_IGNORE += "CVE-2019-16994" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-16995" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-17052" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-17053" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-17054" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-17055" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-17056" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-17075" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-17133" -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-17351" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-17666" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-18198" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-18282" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-18660" -# fixed-version: Fixed after version 4.17rc5 +# fixed-version: Fixed from version 4.17rc5 CVE_CHECK_IGNORE += "CVE-2019-18675" # CVE-2019-18680 has no known resolution -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-18683" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-18786" -# fixed-version: Fixed after version 5.1rc7 +# fixed-version: Fixed from version 5.1rc7 CVE_CHECK_IGNORE += "CVE-2019-18805" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-18806" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-18807" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-18808" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-18809" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-18810" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-18811" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-18812" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-18813" -# fixed-version: Fixed after version 5.7rc7 +# fixed-version: Fixed from version 5.7rc7 CVE_CHECK_IGNORE += "CVE-2019-18814" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-18885" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19036" -# fixed-version: Fixed after version 5.5rc3 +# fixed-version: Fixed from version 5.5rc3 CVE_CHECK_IGNORE += "CVE-2019-19037" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2019-19039" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19043" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-19044" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-19045" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19046" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-19047" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19048" -# fixed-version: Fixed after version 5.4rc5 +# fixed-version: Fixed from version 5.4rc5 CVE_CHECK_IGNORE += "CVE-2019-19049" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19050" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-19051" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-19052" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19053" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19054" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-19055" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19056" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19057" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-19058" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-19059" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19060" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19061" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19062" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19063" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19064" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19065" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19066" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-19067" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19068" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19069" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19070" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19071" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19072" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19073" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19074" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-19075" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19076" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19077" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19078" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-19079" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19080" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19081" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19082" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-19083" -# fixed-version: Fixed after version 5.1rc3 +# fixed-version: Fixed from version 5.1rc3 CVE_CHECK_IGNORE += "CVE-2019-19227" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19241" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19252" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19318" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-19319" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19332" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19338" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2019-19377" # CVE-2019-19378 has no known resolution -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19447" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2019-19448" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2019-19449" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2019-19462" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19523" -# fixed-version: Fixed after version 5.4rc8 +# fixed-version: Fixed from version 5.4rc8 CVE_CHECK_IGNORE += "CVE-2019-19524" -# fixed-version: Fixed after version 5.4rc2 +# fixed-version: Fixed from version 5.4rc2 CVE_CHECK_IGNORE += "CVE-2019-19525" -# fixed-version: Fixed after version 5.4rc4 +# fixed-version: Fixed from version 5.4rc4 CVE_CHECK_IGNORE += "CVE-2019-19526" -# fixed-version: Fixed after version 5.3rc4 +# fixed-version: Fixed from version 5.3rc4 CVE_CHECK_IGNORE += "CVE-2019-19527" -# fixed-version: Fixed after version 5.4rc3 +# fixed-version: Fixed from version 5.4rc3 CVE_CHECK_IGNORE += "CVE-2019-19528" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-19529" -# fixed-version: Fixed after version 5.3rc5 +# fixed-version: Fixed from version 5.3rc5 CVE_CHECK_IGNORE += "CVE-2019-19530" -# fixed-version: Fixed after version 5.3rc4 +# fixed-version: Fixed from version 5.3rc4 CVE_CHECK_IGNORE += "CVE-2019-19531" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2019-19532" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19533" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-19534" -# fixed-version: Fixed after version 5.3rc4 +# fixed-version: Fixed from version 5.3rc4 CVE_CHECK_IGNORE += "CVE-2019-19535" -# fixed-version: Fixed after version 5.3rc4 +# fixed-version: Fixed from version 5.3rc4 CVE_CHECK_IGNORE += "CVE-2019-19536" -# fixed-version: Fixed after version 5.3rc5 +# fixed-version: Fixed from version 5.3rc5 CVE_CHECK_IGNORE += "CVE-2019-19537" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-19543" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19602" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2019-19767" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2019-19768" -# fixed-version: Fixed after version 5.6rc5 +# fixed-version: Fixed from version 5.6rc5 CVE_CHECK_IGNORE += "CVE-2019-19769" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2019-19770" -# fixed-version: Fixed after version 5.4rc7 +# fixed-version: Fixed from version 5.4rc7 CVE_CHECK_IGNORE += "CVE-2019-19807" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-19813" # CVE-2019-19814 has no known resolution -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2019-19815" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-19816" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-19922" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-19927" -# fixed-version: Fixed after version 5.5rc3 +# fixed-version: Fixed from version 5.5rc3 CVE_CHECK_IGNORE += "CVE-2019-19947" -# fixed-version: Fixed after version 5.5rc2 +# fixed-version: Fixed from version 5.5rc2 CVE_CHECK_IGNORE += "CVE-2019-19965" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-19966" -# fixed-version: Fixed after version 5.1rc3 +# fixed-version: Fixed from version 5.1rc3 CVE_CHECK_IGNORE += "CVE-2019-1999" -# fixed-version: Fixed after version 5.1rc3 +# fixed-version: Fixed from version 5.1rc3 CVE_CHECK_IGNORE += "CVE-2019-20054" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-20095" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-20096" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2019-2024" -# fixed-version: Fixed after version 4.20rc5 +# fixed-version: Fixed from version 4.20rc5 CVE_CHECK_IGNORE += "CVE-2019-2025" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-20422" -# fixed-version: Fixed after version 4.8rc1 +# fixed-version: Fixed from version 4.8rc1 CVE_CHECK_IGNORE += "CVE-2019-2054" -# fixed-version: Fixed after version 5.5rc6 +# fixed-version: Fixed from version 5.5rc6 CVE_CHECK_IGNORE += "CVE-2019-20636" # CVE-2019-20794 has no known resolution -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-20806" -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2019-20810" -# fixed-version: Fixed after version 5.1rc3 +# fixed-version: Fixed from version 5.1rc3 CVE_CHECK_IGNORE += "CVE-2019-20811" -# fixed-version: Fixed after version 5.5rc3 +# fixed-version: Fixed from version 5.5rc3 CVE_CHECK_IGNORE += "CVE-2019-20812" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2019-20908" -# fixed-version: Fixed after version 5.3rc2 +# fixed-version: Fixed from version 5.3rc2 CVE_CHECK_IGNORE += "CVE-2019-20934" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-2101" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-2181" -# fixed-version: Fixed after version 4.16rc3 +# fixed-version: Fixed from version 4.16rc3 CVE_CHECK_IGNORE += "CVE-2019-2182" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-2213" -# fixed-version: Fixed after version 5.3rc2 +# fixed-version: Fixed from version 5.3rc2 CVE_CHECK_IGNORE += "CVE-2019-2214" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2019-2215" -# fixed-version: Fixed after version 5.2rc4 +# fixed-version: Fixed from version 5.2rc4 CVE_CHECK_IGNORE += "CVE-2019-25044" -# fixed-version: Fixed after version 5.1 +# fixed-version: Fixed from version 5.1 CVE_CHECK_IGNORE += "CVE-2019-25045" -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2019-3016" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-3459" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-3460" -# fixed-version: Fixed after version 5.0rc3 +# fixed-version: Fixed from version 5.0rc3 CVE_CHECK_IGNORE += "CVE-2019-3701" -# fixed-version: Fixed after version 5.0rc6 +# fixed-version: Fixed from version 5.0rc6 CVE_CHECK_IGNORE += "CVE-2019-3819" -# fixed-version: Fixed after version 3.18rc1 +# fixed-version: Fixed from version 3.18rc1 CVE_CHECK_IGNORE += "CVE-2019-3837" -# fixed-version: Fixed after version 5.2rc6 +# fixed-version: Fixed from version 5.2rc6 CVE_CHECK_IGNORE += "CVE-2019-3846" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-3874" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-3882" -# fixed-version: Fixed after version 5.1rc4 +# fixed-version: Fixed from version 5.1rc4 CVE_CHECK_IGNORE += "CVE-2019-3887" -# fixed-version: Fixed after version 5.1rc6 +# fixed-version: Fixed from version 5.1rc6 CVE_CHECK_IGNORE += "CVE-2019-3892" -# fixed-version: Fixed after version 2.6.35rc1 +# fixed-version: Fixed from version 2.6.35rc1 CVE_CHECK_IGNORE += "CVE-2019-3896" -# fixed-version: Fixed after version 5.2rc4 +# fixed-version: Fixed from version 5.2rc4 CVE_CHECK_IGNORE += "CVE-2019-3900" -# fixed-version: Fixed after version 4.6rc6 +# fixed-version: Fixed from version 4.6rc6 CVE_CHECK_IGNORE += "CVE-2019-3901" -# fixed-version: Fixed after version 5.3 +# fixed-version: Fixed from version 5.3 CVE_CHECK_IGNORE += "CVE-2019-5108" # Skipping CVE-2019-5489, no affected_versions -# fixed-version: Fixed after version 5.0rc2 +# fixed-version: Fixed from version 5.0rc2 CVE_CHECK_IGNORE += "CVE-2019-6133" -# fixed-version: Fixed after version 5.0rc6 +# fixed-version: Fixed from version 5.0rc6 CVE_CHECK_IGNORE += "CVE-2019-6974" -# fixed-version: Fixed after version 5.0rc6 +# fixed-version: Fixed from version 5.0rc6 CVE_CHECK_IGNORE += "CVE-2019-7221" -# fixed-version: Fixed after version 5.0rc6 +# fixed-version: Fixed from version 5.0rc6 CVE_CHECK_IGNORE += "CVE-2019-7222" -# fixed-version: Fixed after version 5.0rc3 +# fixed-version: Fixed from version 5.0rc3 CVE_CHECK_IGNORE += "CVE-2019-7308" -# fixed-version: Fixed after version 5.0rc8 +# fixed-version: Fixed from version 5.0rc8 CVE_CHECK_IGNORE += "CVE-2019-8912" -# fixed-version: Fixed after version 5.0rc6 +# fixed-version: Fixed from version 5.0rc6 CVE_CHECK_IGNORE += "CVE-2019-8956" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-8980" -# fixed-version: Fixed after version 5.0rc4 +# fixed-version: Fixed from version 5.0rc4 CVE_CHECK_IGNORE += "CVE-2019-9003" -# fixed-version: Fixed after version 5.0rc7 +# fixed-version: Fixed from version 5.0rc7 CVE_CHECK_IGNORE += "CVE-2019-9162" -# fixed-version: Fixed after version 5.0 +# fixed-version: Fixed from version 5.0 CVE_CHECK_IGNORE += "CVE-2019-9213" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2019-9245" -# fixed-version: Fixed after version 4.15rc2 +# fixed-version: Fixed from version 4.15rc2 CVE_CHECK_IGNORE += "CVE-2019-9444" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-9445" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2019-9453" -# fixed-version: Fixed after version 4.15rc9 +# fixed-version: Fixed from version 4.15rc9 CVE_CHECK_IGNORE += "CVE-2019-9454" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2019-9455" -# fixed-version: Fixed after version 4.16rc6 +# fixed-version: Fixed from version 4.16rc6 CVE_CHECK_IGNORE += "CVE-2019-9456" -# fixed-version: Fixed after version 4.13rc1 +# fixed-version: Fixed from version 4.13rc1 CVE_CHECK_IGNORE += "CVE-2019-9457" -# fixed-version: Fixed after version 4.19rc7 +# fixed-version: Fixed from version 4.19rc7 CVE_CHECK_IGNORE += "CVE-2019-9458" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-9466" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-9500" -# fixed-version: Fixed after version 5.1rc1 +# fixed-version: Fixed from version 5.1rc1 CVE_CHECK_IGNORE += "CVE-2019-9503" -# fixed-version: Fixed after version 5.2 +# fixed-version: Fixed from version 5.2 CVE_CHECK_IGNORE += "CVE-2019-9506" -# fixed-version: Fixed after version 5.1rc2 +# fixed-version: Fixed from version 5.1rc2 CVE_CHECK_IGNORE += "CVE-2019-9857" -# fixed-version: Fixed after version 5.6rc3 +# fixed-version: Fixed from version 5.6rc3 CVE_CHECK_IGNORE += "CVE-2020-0009" -# fixed-version: Fixed after version 4.16rc3 +# fixed-version: Fixed from version 4.16rc3 CVE_CHECK_IGNORE += "CVE-2020-0030" -# fixed-version: Fixed after version 5.5rc2 +# fixed-version: Fixed from version 5.5rc2 CVE_CHECK_IGNORE += "CVE-2020-0041" -# fixed-version: Fixed after version 4.3rc7 +# fixed-version: Fixed from version 4.3rc7 CVE_CHECK_IGNORE += "CVE-2020-0066" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2020-0067" -# fixed-version: Fixed after version 5.6rc2 +# fixed-version: Fixed from version 5.6rc2 CVE_CHECK_IGNORE += "CVE-2020-0110" -# fixed-version: Fixed after version 5.7rc4 +# fixed-version: Fixed from version 5.7rc4 CVE_CHECK_IGNORE += "CVE-2020-0255" -# fixed-version: Fixed after version 5.5rc6 +# fixed-version: Fixed from version 5.5rc6 CVE_CHECK_IGNORE += "CVE-2020-0305" # CVE-2020-0347 has no known resolution -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2020-0404" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-0423" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2020-0427" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2020-0429" -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2020-0430" -# fixed-version: Fixed after version 5.5rc6 +# fixed-version: Fixed from version 5.5rc6 CVE_CHECK_IGNORE += "CVE-2020-0431" -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2020-0432" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2020-0433" -# fixed-version: Fixed after version 4.19rc1 +# fixed-version: Fixed from version 4.19rc1 CVE_CHECK_IGNORE += "CVE-2020-0435" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-0444" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-0465" -# fixed-version: Fixed after version 5.9rc2 +# fixed-version: Fixed from version 5.9rc2 CVE_CHECK_IGNORE += "CVE-2020-0466" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-0543" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-10135" -# fixed-version: Fixed after version 5.5rc5 +# fixed-version: Fixed from version 5.5rc5 CVE_CHECK_IGNORE += "CVE-2020-10690" # CVE-2020-10708 has no known resolution -# fixed-version: Fixed after version 5.7rc6 +# fixed-version: Fixed from version 5.7rc6 CVE_CHECK_IGNORE += "CVE-2020-10711" -# fixed-version: Fixed after version 5.2rc3 +# fixed-version: Fixed from version 5.2rc3 CVE_CHECK_IGNORE += "CVE-2020-10720" -# fixed-version: Fixed after version 5.7 +# fixed-version: Fixed from version 5.7 CVE_CHECK_IGNORE += "CVE-2020-10732" -# fixed-version: Fixed after version 3.16rc1 +# fixed-version: Fixed from version 3.16rc1 CVE_CHECK_IGNORE += "CVE-2020-10742" -# fixed-version: Fixed after version 5.7rc4 +# fixed-version: Fixed from version 5.7rc4 CVE_CHECK_IGNORE += "CVE-2020-10751" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-10757" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-10766" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-10767" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-10768" -# fixed-version: Fixed after version 5.0rc3 +# fixed-version: Fixed from version 5.0rc3 CVE_CHECK_IGNORE += "CVE-2020-10769" -# fixed-version: Fixed after version 5.4rc6 +# fixed-version: Fixed from version 5.4rc6 CVE_CHECK_IGNORE += "CVE-2020-10773" # CVE-2020-10774 has no known resolution -# fixed-version: Fixed after version 5.8rc6 +# fixed-version: Fixed from version 5.8rc6 CVE_CHECK_IGNORE += "CVE-2020-10781" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-10942" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-11494" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-11565" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-11608" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-11609" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-11668" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2020-11669" # CVE-2020-11725 has no known resolution -# fixed-version: Fixed after version 5.7rc4 +# fixed-version: Fixed from version 5.7rc4 CVE_CHECK_IGNORE += "CVE-2020-11884" # CVE-2020-11935 has no known resolution -# fixed-version: Fixed after version 5.3rc1 +# fixed-version: Fixed from version 5.3rc1 CVE_CHECK_IGNORE += "CVE-2020-12114" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-12351" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-12352" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-12362" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-12363" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-12364" -# fixed-version: Fixed after version 5.7rc3 +# fixed-version: Fixed from version 5.7rc3 CVE_CHECK_IGNORE += "CVE-2020-12464" -# fixed-version: Fixed after version 5.6rc6 +# fixed-version: Fixed from version 5.6rc6 CVE_CHECK_IGNORE += "CVE-2020-12465" -# fixed-version: Fixed after version 5.5rc7 +# fixed-version: Fixed from version 5.5rc7 CVE_CHECK_IGNORE += "CVE-2020-12652" -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2020-12653" -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2020-12654" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-12655" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-12656" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-12657" -# fixed-version: Fixed after version 5.7rc2 +# fixed-version: Fixed from version 5.7rc2 CVE_CHECK_IGNORE += "CVE-2020-12659" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-12768" -# fixed-version: Fixed after version 5.5rc6 +# fixed-version: Fixed from version 5.5rc6 CVE_CHECK_IGNORE += "CVE-2020-12769" -# fixed-version: Fixed after version 5.7rc3 +# fixed-version: Fixed from version 5.7rc3 CVE_CHECK_IGNORE += "CVE-2020-12770" -# fixed-version: Fixed after version 5.8rc2 +# fixed-version: Fixed from version 5.8rc2 CVE_CHECK_IGNORE += "CVE-2020-12771" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-12826" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-12888" -# fixed-version: Fixed after version 5.10rc4 +# fixed-version: Fixed from version 5.10rc4 CVE_CHECK_IGNORE += "CVE-2020-12912" -# fixed-version: Fixed after version 5.7rc6 +# fixed-version: Fixed from version 5.7rc6 CVE_CHECK_IGNORE += "CVE-2020-13143" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-13974" # CVE-2020-14304 has no known resolution -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2020-14305" -# fixed-version: Fixed after version 5.9rc2 +# fixed-version: Fixed from version 5.9rc2 CVE_CHECK_IGNORE += "CVE-2020-14314" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2020-14331" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-14351" -# fixed-version: Fixed after version 4.14rc3 +# fixed-version: Fixed from version 4.14rc3 CVE_CHECK_IGNORE += "CVE-2020-14353" -# fixed-version: Fixed after version 5.8rc5 +# fixed-version: Fixed from version 5.8rc5 CVE_CHECK_IGNORE += "CVE-2020-14356" -# fixed-version: Fixed after version 5.6rc6 +# fixed-version: Fixed from version 5.6rc6 CVE_CHECK_IGNORE += "CVE-2020-14381" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-14385" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-14386" -# fixed-version: Fixed after version 5.9rc6 +# fixed-version: Fixed from version 5.9rc6 CVE_CHECK_IGNORE += "CVE-2020-14390" -# fixed-version: Fixed after version 5.5 +# fixed-version: Fixed from version 5.5 CVE_CHECK_IGNORE += "CVE-2020-14416" -# fixed-version: Fixed after version 5.8rc3 +# fixed-version: Fixed from version 5.8rc3 CVE_CHECK_IGNORE += "CVE-2020-15393" -# fixed-version: Fixed after version 5.8rc2 +# fixed-version: Fixed from version 5.8rc2 CVE_CHECK_IGNORE += "CVE-2020-15436" -# fixed-version: Fixed after version 5.8rc7 +# fixed-version: Fixed from version 5.8rc7 CVE_CHECK_IGNORE += "CVE-2020-15437" -# fixed-version: Fixed after version 5.8rc3 +# fixed-version: Fixed from version 5.8rc3 CVE_CHECK_IGNORE += "CVE-2020-15780" # CVE-2020-15802 has no known resolution -# fixed-version: Fixed after version 5.8rc6 +# fixed-version: Fixed from version 5.8rc6 CVE_CHECK_IGNORE += "CVE-2020-15852" -# fixed-version: Fixed after version 5.15rc2 +# fixed-version: Fixed from version 5.15rc2 CVE_CHECK_IGNORE += "CVE-2020-16119" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-16120" -# fixed-version: Fixed after version 5.8 +# fixed-version: Fixed from version 5.8 CVE_CHECK_IGNORE += "CVE-2020-16166" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2020-1749" -# fixed-version: Fixed after version 5.8rc4 +# fixed-version: Fixed from version 5.8rc4 CVE_CHECK_IGNORE += "CVE-2020-24394" -# fixed-version: Fixed after version 5.8 +# fixed-version: Fixed from version 5.8 CVE_CHECK_IGNORE += "CVE-2020-24490" # CVE-2020-24502 has no known resolution # CVE-2020-24503 has no known resolution -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2020-24504" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-24586" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-24587" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-24588" -# fixed-version: Fixed after version 5.9rc7 +# fixed-version: Fixed from version 5.9rc7 CVE_CHECK_IGNORE += "CVE-2020-25211" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2020-25212" # CVE-2020-25220 has no known resolution -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-25221" -# fixed-version: Fixed after version 5.9rc5 +# fixed-version: Fixed from version 5.9rc5 CVE_CHECK_IGNORE += "CVE-2020-25284" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-25285" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2020-25639" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2020-25641" -# fixed-version: Fixed after version 5.9rc7 +# fixed-version: Fixed from version 5.9rc7 CVE_CHECK_IGNORE += "CVE-2020-25643" -# fixed-version: Fixed after version 5.9rc7 +# fixed-version: Fixed from version 5.9rc7 CVE_CHECK_IGNORE += "CVE-2020-25645" -# fixed-version: Fixed after version 5.10rc2 +# fixed-version: Fixed from version 5.10rc2 CVE_CHECK_IGNORE += "CVE-2020-25656" # CVE-2020-25661 has no known resolution # CVE-2020-25662 has no known resolution -# fixed-version: Fixed after version 5.10rc3 +# fixed-version: Fixed from version 5.10rc3 CVE_CHECK_IGNORE += "CVE-2020-25668" -# fixed-version: Fixed after version 5.10rc5 +# fixed-version: Fixed from version 5.10rc5 CVE_CHECK_IGNORE += "CVE-2020-25669" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2020-25670" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2020-25671" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2020-25672" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2020-25673" -# fixed-version: Fixed after version 5.10rc3 +# fixed-version: Fixed from version 5.10rc3 CVE_CHECK_IGNORE += "CVE-2020-25704" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-25705" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2020-26088" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-26139" # CVE-2020-26140 has no known resolution -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-26141" # CVE-2020-26142 has no known resolution # CVE-2020-26143 has no known resolution -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-26145" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2020-26147" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2020-26541" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2020-26555" # CVE-2020-26556 has no known resolution # CVE-2020-26557 has no known resolution -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2020-26558" # CVE-2020-26559 has no known resolution # CVE-2020-26560 has no known resolution -# fixed-version: Fixed after version 5.6 +# fixed-version: Fixed from version 5.6 CVE_CHECK_IGNORE += "CVE-2020-27066" -# fixed-version: Fixed after version 4.14rc4 +# fixed-version: Fixed from version 4.14rc4 CVE_CHECK_IGNORE += "CVE-2020-27067" -# fixed-version: Fixed after version 5.6rc2 +# fixed-version: Fixed from version 5.6rc2 CVE_CHECK_IGNORE += "CVE-2020-27068" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27152" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2020-27170" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2020-27171" -# fixed-version: Fixed after version 5.9 +# fixed-version: Fixed from version 5.9 CVE_CHECK_IGNORE += "CVE-2020-27194" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-2732" # CVE-2020-27418 has no known resolution -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27673" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27675" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27777" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27784" -# fixed-version: Fixed after version 5.7rc6 +# fixed-version: Fixed from version 5.7rc6 CVE_CHECK_IGNORE += "CVE-2020-27786" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-27815" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2020-27820" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27825" -# fixed-version: Fixed after version 5.10rc7 +# fixed-version: Fixed from version 5.10rc7 CVE_CHECK_IGNORE += "CVE-2020-27830" -# fixed-version: Fixed after version 5.10rc6 +# fixed-version: Fixed from version 5.10rc6 CVE_CHECK_IGNORE += "CVE-2020-27835" -# fixed-version: Fixed after version 5.9rc6 +# fixed-version: Fixed from version 5.9rc6 CVE_CHECK_IGNORE += "CVE-2020-28097" -# fixed-version: Fixed after version 5.11rc4 +# fixed-version: Fixed from version 5.11rc4 CVE_CHECK_IGNORE += "CVE-2020-28374" -# fixed-version: Fixed after version 5.10rc7 +# fixed-version: Fixed from version 5.10rc7 CVE_CHECK_IGNORE += "CVE-2020-28588" -# fixed-version: Fixed after version 5.9 +# fixed-version: Fixed from version 5.9 CVE_CHECK_IGNORE += "CVE-2020-28915" -# fixed-version: Fixed after version 5.10rc5 +# fixed-version: Fixed from version 5.10rc5 CVE_CHECK_IGNORE += "CVE-2020-28941" -# fixed-version: Fixed after version 5.10rc3 +# fixed-version: Fixed from version 5.10rc3 CVE_CHECK_IGNORE += "CVE-2020-28974" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-29368" -# fixed-version: Fixed after version 5.8rc7 +# fixed-version: Fixed from version 5.8rc7 CVE_CHECK_IGNORE += "CVE-2020-29369" -# fixed-version: Fixed after version 5.6rc7 +# fixed-version: Fixed from version 5.6rc7 CVE_CHECK_IGNORE += "CVE-2020-29370" -# fixed-version: Fixed after version 5.9rc2 +# fixed-version: Fixed from version 5.9rc2 CVE_CHECK_IGNORE += "CVE-2020-29371" -# fixed-version: Fixed after version 5.7rc3 +# fixed-version: Fixed from version 5.7rc3 CVE_CHECK_IGNORE += "CVE-2020-29372" -# fixed-version: Fixed after version 5.6rc2 +# fixed-version: Fixed from version 5.6rc2 CVE_CHECK_IGNORE += "CVE-2020-29373" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-29374" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-29534" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-29568" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-29569" -# fixed-version: Fixed after version 5.10rc7 +# fixed-version: Fixed from version 5.10rc7 CVE_CHECK_IGNORE += "CVE-2020-29660" -# fixed-version: Fixed after version 5.10rc7 +# fixed-version: Fixed from version 5.10rc7 CVE_CHECK_IGNORE += "CVE-2020-29661" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-35499" # CVE-2020-35501 has no known resolution -# fixed-version: Fixed after version 5.10rc3 +# fixed-version: Fixed from version 5.10rc3 CVE_CHECK_IGNORE += "CVE-2020-35508" -# fixed-version: Fixed after version 4.17rc1 +# fixed-version: Fixed from version 4.17rc1 CVE_CHECK_IGNORE += "CVE-2020-35513" -# fixed-version: Fixed after version 5.10rc7 +# fixed-version: Fixed from version 5.10rc7 CVE_CHECK_IGNORE += "CVE-2020-35519" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-36158" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-36310" -# fixed-version: Fixed after version 5.9rc5 +# fixed-version: Fixed from version 5.9rc5 CVE_CHECK_IGNORE += "CVE-2020-36311" -# fixed-version: Fixed after version 5.9rc5 +# fixed-version: Fixed from version 5.9rc5 CVE_CHECK_IGNORE += "CVE-2020-36312" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-36313" -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2020-36322" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-36385" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2020-36386" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2020-36387" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2020-36516" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-36557" -# fixed-version: Fixed after version 5.6rc3 +# fixed-version: Fixed from version 5.6rc3 CVE_CHECK_IGNORE += "CVE-2020-36558" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2020-36691" -# fixed-version: Fixed after version 5.10 +# fixed-version: Fixed from version 5.10 CVE_CHECK_IGNORE += "CVE-2020-36694" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.9rc1 +CVE_CHECK_IGNORE += "CVE-2020-36766" + +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2020-3702" -# fixed-version: Fixed after version 5.10rc5 +# fixed-version: Fixed from version 5.10rc5 CVE_CHECK_IGNORE += "CVE-2020-4788" -# fixed-version: Fixed after version 5.2rc1 +# fixed-version: Fixed from version 5.2rc1 CVE_CHECK_IGNORE += "CVE-2020-7053" -# fixed-version: Fixed after version 5.5 +# fixed-version: Fixed from version 5.5 CVE_CHECK_IGNORE += "CVE-2020-8428" -# fixed-version: Fixed after version 5.6rc5 +# fixed-version: Fixed from version 5.6rc5 CVE_CHECK_IGNORE += "CVE-2020-8647" -# fixed-version: Fixed after version 5.6rc3 +# fixed-version: Fixed from version 5.6rc3 CVE_CHECK_IGNORE += "CVE-2020-8648" -# fixed-version: Fixed after version 5.6rc5 +# fixed-version: Fixed from version 5.6rc5 CVE_CHECK_IGNORE += "CVE-2020-8649" -# fixed-version: Fixed after version 5.10rc4 +# fixed-version: Fixed from version 5.10rc4 CVE_CHECK_IGNORE += "CVE-2020-8694" # CVE-2020-8832 has no known resolution -# fixed-version: Fixed after version 4.18rc1 +# fixed-version: Fixed from version 4.18rc1 CVE_CHECK_IGNORE += "CVE-2020-8834" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2020-8835" -# fixed-version: Fixed after version 5.6rc2 +# fixed-version: Fixed from version 5.6rc2 CVE_CHECK_IGNORE += "CVE-2020-8992" -# fixed-version: Fixed after version 5.6rc4 +# fixed-version: Fixed from version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-9383" -# fixed-version: Fixed after version 5.6rc3 +# fixed-version: Fixed from version 5.6rc3 CVE_CHECK_IGNORE += "CVE-2020-9391" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-0129" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2021-0342" # CVE-2021-0399 has no known resolution -# fixed-version: Fixed after version 4.15rc1 +# fixed-version: Fixed from version 4.15rc1 CVE_CHECK_IGNORE += "CVE-2021-0447" -# fixed-version: Fixed after version 5.9rc7 +# fixed-version: Fixed from version 5.9rc7 CVE_CHECK_IGNORE += "CVE-2021-0448" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-0512" -# fixed-version: Fixed after version 5.8 +# fixed-version: Fixed from version 5.8 CVE_CHECK_IGNORE += "CVE-2021-0605" # CVE-2021-0606 has no known resolution # CVE-2021-0695 has no known resolution -# fixed-version: Fixed after version 5.11rc3 +# fixed-version: Fixed from version 5.11rc3 CVE_CHECK_IGNORE += "CVE-2021-0707" -# fixed-version: Fixed after version 5.14rc4 +# fixed-version: Fixed from version 5.14rc4 CVE_CHECK_IGNORE += "CVE-2021-0920" # CVE-2021-0924 has no known resolution -# fixed-version: Fixed after version 5.6rc1 +# fixed-version: Fixed from version 5.6rc1 CVE_CHECK_IGNORE += "CVE-2021-0929" -# fixed-version: Fixed after version 4.16rc7 +# fixed-version: Fixed from version 4.16rc7 CVE_CHECK_IGNORE += "CVE-2021-0935" # CVE-2021-0936 has no known resolution -# fixed-version: Fixed after version 5.12rc8 +# fixed-version: Fixed from version 5.12rc8 CVE_CHECK_IGNORE += "CVE-2021-0937" -# fixed-version: Fixed after version 5.10rc4 +# fixed-version: Fixed from version 5.10rc4 CVE_CHECK_IGNORE += "CVE-2021-0938" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-0941" # CVE-2021-0961 has no known resolution -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2021-1048" -# fixed-version: Fixed after version 5.5rc1 +# fixed-version: Fixed from version 5.5rc1 CVE_CHECK_IGNORE += "CVE-2021-20177" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2021-20194" # CVE-2021-20219 has no known resolution -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2021-20226" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2021-20239" -# fixed-version: Fixed after version 4.5rc5 +# fixed-version: Fixed from version 4.5rc5 CVE_CHECK_IGNORE += "CVE-2021-20261" -# fixed-version: Fixed after version 4.5rc3 +# fixed-version: Fixed from version 4.5rc3 CVE_CHECK_IGNORE += "CVE-2021-20265" -# fixed-version: Fixed after version 5.11rc5 +# fixed-version: Fixed from version 5.11rc5 CVE_CHECK_IGNORE += "CVE-2021-20268" -# fixed-version: Fixed after version 5.9rc1 +# fixed-version: Fixed from version 5.9rc1 CVE_CHECK_IGNORE += "CVE-2021-20292" -# fixed-version: Fixed after version 5.4rc1 +# fixed-version: Fixed from version 5.4rc1 CVE_CHECK_IGNORE += "CVE-2021-20317" -# fixed-version: Fixed after version 5.15rc3 +# fixed-version: Fixed from version 5.15rc3 CVE_CHECK_IGNORE += "CVE-2021-20320" -# fixed-version: Fixed after version 5.15rc5 +# fixed-version: Fixed from version 5.15rc5 CVE_CHECK_IGNORE += "CVE-2021-20321" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-20322" -# fixed-version: Fixed after version 5.11rc7 +# fixed-version: Fixed from version 5.11rc7 CVE_CHECK_IGNORE += "CVE-2021-21781" -# fixed-version: Fixed after version 5.13 +# fixed-version: Fixed from version 5.13 CVE_CHECK_IGNORE += "CVE-2021-22543" -# fixed-version: Fixed after version 5.12rc8 +# fixed-version: Fixed from version 5.12rc8 CVE_CHECK_IGNORE += "CVE-2021-22555" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2021-22600" -# fixed-version: Fixed after version 5.12rc8 +# fixed-version: Fixed from version 5.12rc8 CVE_CHECK_IGNORE += "CVE-2021-23133" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-23134" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2021-26401" -# fixed-version: Fixed after version 5.11rc7 +# fixed-version: Fixed from version 5.11rc7 CVE_CHECK_IGNORE += "CVE-2021-26708" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-26930" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-26931" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-26932" # CVE-2021-26934 has no known resolution -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-27363" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-27364" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-27365" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-28038" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-28039" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-28375" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-28660" -# fixed-version: Fixed after version 5.12rc6 +# fixed-version: Fixed from version 5.12rc6 CVE_CHECK_IGNORE += "CVE-2021-28688" -# fixed-version: Fixed after version 5.13rc6 +# fixed-version: Fixed from version 5.13rc6 CVE_CHECK_IGNORE += "CVE-2021-28691" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-28711" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-28712" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-28713" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-28714" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-28715" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-28950" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-28951" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-28952" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-28964" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-28971" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-28972" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2021-29154" -# fixed-version: Fixed after version 5.12rc8 +# fixed-version: Fixed from version 5.12rc8 CVE_CHECK_IGNORE += "CVE-2021-29155" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-29264" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-29265" -# fixed-version: Fixed after version 5.12rc4 +# fixed-version: Fixed from version 5.12rc4 CVE_CHECK_IGNORE += "CVE-2021-29266" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-29646" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-29647" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-29648" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-29649" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-29650" -# fixed-version: Fixed after version 5.12rc6 +# fixed-version: Fixed from version 5.12rc6 CVE_CHECK_IGNORE += "CVE-2021-29657" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-30002" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2021-30178" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-31440" -# fixed-version: Fixed after version 5.11rc5 +# fixed-version: Fixed from version 5.11rc5 CVE_CHECK_IGNORE += "CVE-2021-3178" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-31829" -# fixed-version: Fixed after version 5.12rc5 +# fixed-version: Fixed from version 5.12rc5 CVE_CHECK_IGNORE += "CVE-2021-31916" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-32078" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-32399" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2021-32606" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-33033" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-33034" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2021-33061" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2021-33098" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2021-33135" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2021-33200" -# fixed-version: Fixed after version 5.11rc6 +# fixed-version: Fixed from version 5.11rc6 CVE_CHECK_IGNORE += "CVE-2021-3347" -# fixed-version: Fixed after version 5.11rc6 +# fixed-version: Fixed from version 5.11rc6 CVE_CHECK_IGNORE += "CVE-2021-3348" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-33624" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2021-33655" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-33656" -# fixed-version: Fixed after version 5.14rc3 +# fixed-version: Fixed from version 5.14rc3 CVE_CHECK_IGNORE += "CVE-2021-33909" -# fixed-version: Fixed after version 5.10 +# fixed-version: Fixed from version 5.10 CVE_CHECK_IGNORE += "CVE-2021-3411" -# fixed-version: Fixed after version 5.9rc2 +# fixed-version: Fixed from version 5.9rc2 CVE_CHECK_IGNORE += "CVE-2021-3428" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-3444" -# fixed-version: Fixed after version 5.14rc4 +# fixed-version: Fixed from version 5.14rc4 CVE_CHECK_IGNORE += "CVE-2021-34556" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-34693" -# fixed-version: Fixed after version 5.12rc6 +# fixed-version: Fixed from version 5.12rc6 CVE_CHECK_IGNORE += "CVE-2021-3483" -# fixed-version: Fixed after version 5.14 +# fixed-version: Fixed from version 5.14 CVE_CHECK_IGNORE += "CVE-2021-34866" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2021-3489" -# fixed-version: Fixed after version 5.13rc4 +# fixed-version: Fixed from version 5.13rc4 CVE_CHECK_IGNORE += "CVE-2021-3490" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-3491" # CVE-2021-3492 has no known resolution -# fixed-version: Fixed after version 5.11rc1 +# fixed-version: Fixed from version 5.11rc1 CVE_CHECK_IGNORE += "CVE-2021-3493" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-34981" -# fixed-version: Fixed after version 5.12rc8 +# fixed-version: Fixed from version 5.12rc8 CVE_CHECK_IGNORE += "CVE-2021-3501" -# fixed-version: Fixed after version 5.13 +# fixed-version: Fixed from version 5.13 CVE_CHECK_IGNORE += "CVE-2021-35039" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-3506" # CVE-2021-3542 has no known resolution -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-3543" -# fixed-version: Fixed after version 5.14rc4 +# fixed-version: Fixed from version 5.14rc4 CVE_CHECK_IGNORE += "CVE-2021-35477" -# fixed-version: Fixed after version 5.13rc5 +# fixed-version: Fixed from version 5.13rc5 CVE_CHECK_IGNORE += "CVE-2021-3564" -# fixed-version: Fixed after version 5.13rc5 +# fixed-version: Fixed from version 5.13rc5 CVE_CHECK_IGNORE += "CVE-2021-3573" -# fixed-version: Fixed after version 5.13rc5 +# fixed-version: Fixed from version 5.13rc5 CVE_CHECK_IGNORE += "CVE-2021-3587" -# fixed-version: Fixed after version 5.11 +# fixed-version: Fixed from version 5.11 CVE_CHECK_IGNORE += "CVE-2021-3600" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-3609" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-3612" -# fixed-version: Fixed after version 5.5rc7 +# fixed-version: Fixed from version 5.5rc7 CVE_CHECK_IGNORE += "CVE-2021-3635" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2021-3640" -# fixed-version: Fixed after version 5.14rc7 +# fixed-version: Fixed from version 5.14rc7 CVE_CHECK_IGNORE += "CVE-2021-3653" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-3655" -# fixed-version: Fixed after version 5.14rc7 +# fixed-version: Fixed from version 5.14rc7 CVE_CHECK_IGNORE += "CVE-2021-3656" -# fixed-version: Fixed after version 5.12rc7 +# fixed-version: Fixed from version 5.12rc7 CVE_CHECK_IGNORE += "CVE-2021-3659" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-3669" -# fixed-version: Fixed after version 5.14rc3 +# fixed-version: Fixed from version 5.14rc3 CVE_CHECK_IGNORE += "CVE-2021-3679" # CVE-2021-3714 has no known resolution -# fixed-version: Fixed after version 5.6 +# fixed-version: Fixed from version 5.6 CVE_CHECK_IGNORE += "CVE-2021-3715" -# fixed-version: Fixed after version 5.14rc3 +# fixed-version: Fixed from version 5.14rc3 CVE_CHECK_IGNORE += "CVE-2021-37159" -# fixed-version: Fixed after version 5.14rc6 +# fixed-version: Fixed from version 5.14rc6 CVE_CHECK_IGNORE += "CVE-2021-3732" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-3736" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-3739" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-3743" -# fixed-version: Fixed after version 5.15rc4 +# fixed-version: Fixed from version 5.15rc4 CVE_CHECK_IGNORE += "CVE-2021-3744" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2021-3752" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-3753" -# fixed-version: Fixed after version 5.14rc3 +# fixed-version: Fixed from version 5.14rc3 CVE_CHECK_IGNORE += "CVE-2021-37576" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-3759" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-3760" -# fixed-version: Fixed after version 5.15rc4 +# fixed-version: Fixed from version 5.15rc4 CVE_CHECK_IGNORE += "CVE-2021-3764" -# fixed-version: Fixed after version 5.15 +# fixed-version: Fixed from version 5.15 CVE_CHECK_IGNORE += "CVE-2021-3772" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-38160" -# fixed-version: Fixed after version 5.14rc6 +# fixed-version: Fixed from version 5.14rc6 CVE_CHECK_IGNORE += "CVE-2021-38166" -# fixed-version: Fixed after version 5.13rc6 +# fixed-version: Fixed from version 5.13rc6 CVE_CHECK_IGNORE += "CVE-2021-38198" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-38199" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-38200" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-38201" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-38202" -# fixed-version: Fixed after version 5.14rc2 +# fixed-version: Fixed from version 5.14rc2 CVE_CHECK_IGNORE += "CVE-2021-38203" -# fixed-version: Fixed after version 5.14rc3 +# fixed-version: Fixed from version 5.14rc3 CVE_CHECK_IGNORE += "CVE-2021-38204" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-38205" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-38206" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-38207" -# fixed-version: Fixed after version 5.13rc5 +# fixed-version: Fixed from version 5.13rc5 CVE_CHECK_IGNORE += "CVE-2021-38208" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-38209" -# fixed-version: Fixed after version 5.15rc4 +# fixed-version: Fixed from version 5.15rc4 CVE_CHECK_IGNORE += "CVE-2021-38300" # CVE-2021-3847 has no known resolution @@ -5497,49 +5500,49 @@ CVE_CHECK_IGNORE += "CVE-2021-38300" # CVE-2021-3892 has no known resolution -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-3894" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-3896" -# fixed-version: Fixed after version 5.16 +# fixed-version: Fixed from version 5.16 CVE_CHECK_IGNORE += "CVE-2021-3923" -# fixed-version: Fixed after version 5.14 +# fixed-version: Fixed from version 5.14 CVE_CHECK_IGNORE += "CVE-2021-39633" -# fixed-version: Fixed after version 5.9rc8 +# fixed-version: Fixed from version 5.9rc8 CVE_CHECK_IGNORE += "CVE-2021-39634" -# fixed-version: Fixed after version 4.16rc1 +# fixed-version: Fixed from version 4.16rc1 CVE_CHECK_IGNORE += "CVE-2021-39636" -# fixed-version: Fixed after version 5.11rc3 +# fixed-version: Fixed from version 5.11rc3 CVE_CHECK_IGNORE += "CVE-2021-39648" -# fixed-version: Fixed after version 5.12rc3 +# fixed-version: Fixed from version 5.12rc3 CVE_CHECK_IGNORE += "CVE-2021-39656" -# fixed-version: Fixed after version 5.11rc4 +# fixed-version: Fixed from version 5.11rc4 CVE_CHECK_IGNORE += "CVE-2021-39657" -# fixed-version: Fixed after version 5.16rc5 +# fixed-version: Fixed from version 5.16rc5 CVE_CHECK_IGNORE += "CVE-2021-39685" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2021-39686" -# fixed-version: Fixed after version 5.16rc5 +# fixed-version: Fixed from version 5.16rc5 CVE_CHECK_IGNORE += "CVE-2021-39698" -# fixed-version: Fixed after version 4.18rc6 +# fixed-version: Fixed from version 4.18rc6 CVE_CHECK_IGNORE += "CVE-2021-39711" -# fixed-version: Fixed after version 4.20rc1 +# fixed-version: Fixed from version 4.20rc1 CVE_CHECK_IGNORE += "CVE-2021-39713" -# fixed-version: Fixed after version 4.12rc1 +# fixed-version: Fixed from version 4.12rc1 CVE_CHECK_IGNORE += "CVE-2021-39714" # CVE-2021-39800 has no known resolution @@ -5548,442 +5551,442 @@ CVE_CHECK_IGNORE += "CVE-2021-39714" # CVE-2021-39802 has no known resolution -# fixed-version: Fixed after version 5.16rc2 +# fixed-version: Fixed from version 5.16rc2 CVE_CHECK_IGNORE += "CVE-2021-4001" -# fixed-version: Fixed after version 5.16rc3 +# fixed-version: Fixed from version 5.16rc3 CVE_CHECK_IGNORE += "CVE-2021-4002" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-4023" -# fixed-version: Fixed after version 5.15rc4 +# fixed-version: Fixed from version 5.15rc4 CVE_CHECK_IGNORE += "CVE-2021-4028" -# fixed-version: Fixed after version 5.15rc7 +# fixed-version: Fixed from version 5.15rc7 CVE_CHECK_IGNORE += "CVE-2021-4032" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2021-4037" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-40490" -# fixed-version: Fixed after version 5.16rc4 +# fixed-version: Fixed from version 5.16rc4 CVE_CHECK_IGNORE += "CVE-2021-4083" -# fixed-version: Fixed after version 5.16rc2 +# fixed-version: Fixed from version 5.16rc2 CVE_CHECK_IGNORE += "CVE-2021-4090" -# fixed-version: Fixed after version 5.15rc7 +# fixed-version: Fixed from version 5.15rc7 CVE_CHECK_IGNORE += "CVE-2021-4093" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2021-4095" -# fixed-version: Fixed after version 5.15rc2 +# fixed-version: Fixed from version 5.15rc2 CVE_CHECK_IGNORE += "CVE-2021-41073" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2021-4135" -# fixed-version: Fixed after version 5.15 +# fixed-version: Fixed from version 5.15 CVE_CHECK_IGNORE += "CVE-2021-4148" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-4149" -# fixed-version: Fixed after version 5.15rc7 +# fixed-version: Fixed from version 5.15rc7 CVE_CHECK_IGNORE += "CVE-2021-4150" -# fixed-version: Fixed after version 5.14rc2 +# fixed-version: Fixed from version 5.14rc2 CVE_CHECK_IGNORE += "CVE-2021-4154" -# fixed-version: Fixed after version 5.16 +# fixed-version: Fixed from version 5.16 CVE_CHECK_IGNORE += "CVE-2021-4155" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-4157" -# fixed-version: Fixed after version 5.7rc1 +# fixed-version: Fixed from version 5.7rc1 CVE_CHECK_IGNORE += "CVE-2021-4159" -# fixed-version: Fixed after version 5.15rc5 +# fixed-version: Fixed from version 5.15rc5 CVE_CHECK_IGNORE += "CVE-2021-41864" -# fixed-version: Fixed after version 5.16 +# fixed-version: Fixed from version 5.16 CVE_CHECK_IGNORE += "CVE-2021-4197" -# fixed-version: Fixed after version 5.14rc7 +# fixed-version: Fixed from version 5.14rc7 CVE_CHECK_IGNORE += "CVE-2021-42008" -# fixed-version: Fixed after version 5.16rc2 +# fixed-version: Fixed from version 5.16rc2 CVE_CHECK_IGNORE += "CVE-2021-4202" -# fixed-version: Fixed after version 5.15rc4 +# fixed-version: Fixed from version 5.15rc4 CVE_CHECK_IGNORE += "CVE-2021-4203" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2021-4204" -# fixed-version: Fixed after version 5.8rc1 +# fixed-version: Fixed from version 5.8rc1 CVE_CHECK_IGNORE += "CVE-2021-4218" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2021-42252" -# fixed-version: Fixed after version 5.15 +# fixed-version: Fixed from version 5.15 CVE_CHECK_IGNORE += "CVE-2021-42327" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2021-42739" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-43056" -# fixed-version: Fixed after version 5.15rc3 +# fixed-version: Fixed from version 5.15rc3 CVE_CHECK_IGNORE += "CVE-2021-43057" -# fixed-version: Fixed after version 5.15 +# fixed-version: Fixed from version 5.15 CVE_CHECK_IGNORE += "CVE-2021-43267" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2021-43389" -# fixed-version: Fixed after version 5.16rc2 +# fixed-version: Fixed from version 5.16rc2 CVE_CHECK_IGNORE += "CVE-2021-43975" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2021-43976" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-44733" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2021-44879" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2021-45095" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2021-45100" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2021-45402" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2021-45469" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2021-45480" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2021-45485" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2021-45486" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2021-45868" -# fixed-version: Fixed after version 5.13rc7 +# fixed-version: Fixed from version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-46283" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-0001" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-0002" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-0168" -# fixed-version: Fixed after version 5.18rc4 +# fixed-version: Fixed from version 5.18rc4 CVE_CHECK_IGNORE += "CVE-2022-0171" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-0185" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2022-0264" -# fixed-version: Fixed after version 5.14rc2 +# fixed-version: Fixed from version 5.14rc2 CVE_CHECK_IGNORE += "CVE-2022-0286" -# fixed-version: Fixed after version 5.15rc6 +# fixed-version: Fixed from version 5.15rc6 CVE_CHECK_IGNORE += "CVE-2022-0322" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-0330" -# fixed-version: Fixed after version 5.16 +# fixed-version: Fixed from version 5.16 CVE_CHECK_IGNORE += "CVE-2022-0382" # CVE-2022-0400 has no known resolution -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-0433" -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-0435" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2022-0480" -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-0487" -# fixed-version: Fixed after version 5.17rc3 +# fixed-version: Fixed from version 5.17rc3 CVE_CHECK_IGNORE += "CVE-2022-0492" -# fixed-version: Fixed after version 5.17rc5 +# fixed-version: Fixed from version 5.17rc5 CVE_CHECK_IGNORE += "CVE-2022-0494" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-0500" -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-0516" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-0617" -# fixed-version: Fixed after version 5.15rc7 +# fixed-version: Fixed from version 5.15rc7 CVE_CHECK_IGNORE += "CVE-2022-0644" -# fixed-version: Fixed after version 5.17rc5 +# fixed-version: Fixed from version 5.17rc5 CVE_CHECK_IGNORE += "CVE-2022-0646" -# fixed-version: Fixed after version 5.17rc7 +# fixed-version: Fixed from version 5.17rc7 CVE_CHECK_IGNORE += "CVE-2022-0742" -# fixed-version: Fixed after version 5.8rc6 +# fixed-version: Fixed from version 5.8rc6 CVE_CHECK_IGNORE += "CVE-2022-0812" -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-0847" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2022-0850" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-0854" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-0995" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-0998" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-1011" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-1012" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1015" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1016" -# fixed-version: Fixed after version 5.14rc7 +# fixed-version: Fixed from version 5.14rc7 CVE_CHECK_IGNORE += "CVE-2022-1043" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1048" -# fixed-version: Fixed after version 5.17rc3 +# fixed-version: Fixed from version 5.17rc3 CVE_CHECK_IGNORE += "CVE-2022-1055" # CVE-2022-1116 has no known resolution -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1158" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1184" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2022-1195" -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-1198" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-1199" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1204" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1205" # CVE-2022-1247 has no known resolution -# fixed-version: Fixed after version 5.18rc3 +# fixed-version: Fixed from version 5.18rc3 CVE_CHECK_IGNORE += "CVE-2022-1263" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2022-1280" -# fixed-version: Fixed after version 5.17 +# fixed-version: Fixed from version 5.17 CVE_CHECK_IGNORE += "CVE-2022-1353" -# fixed-version: Fixed after version 5.6rc2 +# fixed-version: Fixed from version 5.6rc2 CVE_CHECK_IGNORE += "CVE-2022-1419" -# fixed-version: Fixed after version 5.19rc7 +# fixed-version: Fixed from version 5.19rc7 CVE_CHECK_IGNORE += "CVE-2022-1462" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2022-1508" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1516" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1651" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-1652" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-1671" -# fixed-version: Fixed after version 4.20rc1 +# fixed-version: Fixed from version 4.20rc1 CVE_CHECK_IGNORE += "CVE-2022-1678" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-1679" -# fixed-version: Fixed after version 5.18 +# fixed-version: Fixed from version 5.18 CVE_CHECK_IGNORE += "CVE-2022-1729" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-1734" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-1786" -# fixed-version: Fixed after version 5.18 +# fixed-version: Fixed from version 5.18 CVE_CHECK_IGNORE += "CVE-2022-1789" -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2022-1836" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1852" -# fixed-version: Fixed after version 5.19rc8 +# fixed-version: Fixed from version 5.19rc8 CVE_CHECK_IGNORE += "CVE-2022-1882" -# fixed-version: Fixed after version 5.18rc7 +# fixed-version: Fixed from version 5.18rc7 CVE_CHECK_IGNORE += "CVE-2022-1943" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1966" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1972" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1973" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-1974" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-1975" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-1976" -# fixed-version: Fixed after version 5.17rc3 +# fixed-version: Fixed from version 5.17rc3 CVE_CHECK_IGNORE += "CVE-2022-1998" -# fixed-version: Fixed after version 5.17rc5 +# fixed-version: Fixed from version 5.17rc5 CVE_CHECK_IGNORE += "CVE-2022-20008" -# fixed-version: Fixed after version 5.16rc5 +# fixed-version: Fixed from version 5.16rc5 CVE_CHECK_IGNORE += "CVE-2022-20132" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2022-20141" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2022-20148" -# fixed-version: Fixed after version 5.13rc1 +# fixed-version: Fixed from version 5.13rc1 CVE_CHECK_IGNORE += "CVE-2022-20153" -# fixed-version: Fixed after version 5.16rc8 +# fixed-version: Fixed from version 5.16rc8 CVE_CHECK_IGNORE += "CVE-2022-20154" -# fixed-version: Fixed after version 5.17 +# fixed-version: Fixed from version 5.17 CVE_CHECK_IGNORE += "CVE-2022-20158" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2022-20166" -# fixed-version: Fixed after version 5.17 +# fixed-version: Fixed from version 5.17 CVE_CHECK_IGNORE += "CVE-2022-20368" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-20369" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-20409" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-20421" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-20422" -# fixed-version: Fixed after version 5.17 +# fixed-version: Fixed from version 5.17 CVE_CHECK_IGNORE += "CVE-2022-20423" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-20424" -# fixed-version: Fixed after version 5.9rc4 +# fixed-version: Fixed from version 5.9rc4 CVE_CHECK_IGNORE += "CVE-2022-20565" -# fixed-version: Fixed after version 5.19 +# fixed-version: Fixed from version 5.19 CVE_CHECK_IGNORE += "CVE-2022-20566" -# fixed-version: Fixed after version 4.16rc5 +# fixed-version: Fixed from version 4.16rc5 CVE_CHECK_IGNORE += "CVE-2022-20567" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-20568" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-20572" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-2078" -# fixed-version: Fixed after version 5.19rc3 +# fixed-version: Fixed from version 5.19rc3 CVE_CHECK_IGNORE += "CVE-2022-21123" -# fixed-version: Fixed after version 5.19rc3 +# fixed-version: Fixed from version 5.19rc3 CVE_CHECK_IGNORE += "CVE-2022-21125" -# fixed-version: Fixed after version 5.19rc3 +# fixed-version: Fixed from version 5.19rc3 CVE_CHECK_IGNORE += "CVE-2022-21166" -# fixed-version: Fixed after version 4.20 +# fixed-version: Fixed from version 4.20 CVE_CHECK_IGNORE += "CVE-2022-21385" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-21499" -# fixed-version: Fixed after version 5.19rc8 +# fixed-version: Fixed from version 5.19rc8 CVE_CHECK_IGNORE += "CVE-2022-21505" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-2153" # cpe-stable-backport: Backported in 6.1.14 @@ -5991,320 +5994,320 @@ CVE_CHECK_IGNORE += "CVE-2022-2196" # CVE-2022-2209 has no known resolution -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-22942" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23036" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23037" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23038" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23039" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23040" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23041" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23042" -# fixed-version: Fixed after version 6.0 +# fixed-version: Fixed from version 6.0 CVE_CHECK_IGNORE += "CVE-2022-2308" -# fixed-version: Fixed after version 5.19rc5 +# fixed-version: Fixed from version 5.19rc5 CVE_CHECK_IGNORE += "CVE-2022-2318" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-23222" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-2327" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-2380" -# fixed-version: Fixed after version 5.19rc7 +# fixed-version: Fixed from version 5.19rc7 CVE_CHECK_IGNORE += "CVE-2022-23816" # CVE-2022-23825 has no known resolution -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-23960" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-24122" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-24448" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-24958" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-24959" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-2503" -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-25258" # CVE-2022-25265 has no known resolution -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-25375" -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-25636" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-2585" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-2586" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-2588" -# fixed-version: Fixed after version 6.0rc3 +# fixed-version: Fixed from version 6.0rc3 CVE_CHECK_IGNORE += "CVE-2022-2590" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-2602" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-26365" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-26373" -# fixed-version: Fixed after version 5.18rc4 +# fixed-version: Fixed from version 5.18rc4 CVE_CHECK_IGNORE += "CVE-2022-2639" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-26490" -# fixed-version: Fixed after version 6.0rc5 +# fixed-version: Fixed from version 6.0rc5 CVE_CHECK_IGNORE += "CVE-2022-2663" # CVE-2022-26878 has no known resolution -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-26966" -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-27223" -# fixed-version: Fixed after version 5.17rc8 +# fixed-version: Fixed from version 5.17rc8 CVE_CHECK_IGNORE += "CVE-2022-27666" # cpe-stable-backport: Backported in 6.1.12 CVE_CHECK_IGNORE += "CVE-2022-27672" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-2785" -# fixed-version: Fixed after version 5.17rc5 +# fixed-version: Fixed from version 5.17rc5 CVE_CHECK_IGNORE += "CVE-2022-27950" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-28356" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-28388" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-28389" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-28390" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-2873" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-28796" -# fixed-version: Fixed after version 5.18rc2 +# fixed-version: Fixed from version 5.18rc2 CVE_CHECK_IGNORE += "CVE-2022-28893" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-2905" -# fixed-version: Fixed after version 5.17rc6 +# fixed-version: Fixed from version 5.17rc6 CVE_CHECK_IGNORE += "CVE-2022-29156" -# fixed-version: Fixed after version 5.17rc2 +# fixed-version: Fixed from version 5.17rc2 CVE_CHECK_IGNORE += "CVE-2022-2938" -# fixed-version: Fixed after version 5.18rc4 +# fixed-version: Fixed from version 5.18rc4 CVE_CHECK_IGNORE += "CVE-2022-29581" -# fixed-version: Fixed after version 5.18rc2 +# fixed-version: Fixed from version 5.18rc2 CVE_CHECK_IGNORE += "CVE-2022-29582" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-2959" # CVE-2022-2961 has no known resolution -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2022-2964" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-2977" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-2978" -# fixed-version: Fixed after version 5.19rc7 +# fixed-version: Fixed from version 5.19rc7 CVE_CHECK_IGNORE += "CVE-2022-29900" -# fixed-version: Fixed after version 5.19rc7 +# fixed-version: Fixed from version 5.19rc7 CVE_CHECK_IGNORE += "CVE-2022-29901" -# fixed-version: Fixed after version 5.15rc1 +# fixed-version: Fixed from version 5.15rc1 CVE_CHECK_IGNORE += "CVE-2022-2991" -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2022-29968" -# fixed-version: Fixed after version 6.0rc3 +# fixed-version: Fixed from version 6.0rc3 CVE_CHECK_IGNORE += "CVE-2022-3028" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-30594" -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2022-3061" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3077" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3078" -# fixed-version: Fixed after version 6.0rc3 +# fixed-version: Fixed from version 6.0rc3 CVE_CHECK_IGNORE += "CVE-2022-3103" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3104" -# fixed-version: Fixed after version 5.16 +# fixed-version: Fixed from version 5.16 CVE_CHECK_IGNORE += "CVE-2022-3105" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2022-3106" -# fixed-version: Fixed after version 5.17 +# fixed-version: Fixed from version 5.17 CVE_CHECK_IGNORE += "CVE-2022-3107" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-3108" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3110" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3111" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3112" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3113" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3114" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3115" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3169" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-3170" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2022-3176" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3202" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-32250" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2022-32296" # CVE-2022-3238 has no known resolution -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2022-3239" -# fixed-version: Fixed after version 5.19rc2 +# fixed-version: Fixed from version 5.19rc2 CVE_CHECK_IGNORE += "CVE-2022-32981" -# fixed-version: Fixed after version 6.0rc5 +# fixed-version: Fixed from version 6.0rc5 CVE_CHECK_IGNORE += "CVE-2022-3303" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2022-3344" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-33740" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-33741" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-33742" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-33743" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-33744" -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2022-33981" # cpe-stable-backport: Backported in 6.1.2 CVE_CHECK_IGNORE += "CVE-2022-3424" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3435" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-34494" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-34495" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-34918" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3521" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3522" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3523" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3524" -# fixed-version: Fixed after version 5.18rc3 +# fixed-version: Fixed from version 5.18rc3 CVE_CHECK_IGNORE += "CVE-2022-3526" # cpe-stable-backport: Backported in 6.1.2 @@ -6318,108 +6321,108 @@ CVE_CHECK_IGNORE += "CVE-2022-3532" # cpe-stable-backport: Backported in 6.1.2 CVE_CHECK_IGNORE += "CVE-2022-3534" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3535" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3541" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3542" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3543" # CVE-2022-3544 has no known resolution -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3545" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2022-3564" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3565" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3566" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3567" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3577" -# fixed-version: Fixed after version 6.0rc5 +# fixed-version: Fixed from version 6.0rc5 CVE_CHECK_IGNORE += "CVE-2022-3586" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3594" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3595" # CVE-2022-3606 has no known resolution -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-36123" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2022-3619" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3621" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3623" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3624" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3625" -# fixed-version: Fixed after version 6.1rc5 +# fixed-version: Fixed from version 6.1rc5 CVE_CHECK_IGNORE += "CVE-2022-3628" # cpe-stable-backport: Backported in 6.1.4 CVE_CHECK_IGNORE += "CVE-2022-36280" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3629" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3630" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3633" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-3635" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-3636" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2022-3640" # CVE-2022-36402 has no known resolution # CVE-2022-3642 has no known resolution -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2022-3643" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3646" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3649" -# fixed-version: Fixed after version 5.19rc8 +# fixed-version: Fixed from version 5.19rc8 CVE_CHECK_IGNORE += "CVE-2022-36879" -# fixed-version: Fixed after version 5.19 +# fixed-version: Fixed from version 5.19 CVE_CHECK_IGNORE += "CVE-2022-36946" # cpe-stable-backport: Backported in 6.1.5 @@ -6430,40 +6433,40 @@ CVE_CHECK_IGNORE += "CVE-2022-3707" # cpe-stable-backport: Backported in 6.1.7 CVE_CHECK_IGNORE += "CVE-2022-38457" -# fixed-version: Fixed after version 6.1rc2 +# fixed-version: Fixed from version 6.1rc2 CVE_CHECK_IGNORE += "CVE-2022-3903" -# fixed-version: Fixed after version 6.0rc6 +# fixed-version: Fixed from version 6.0rc6 CVE_CHECK_IGNORE += "CVE-2022-3910" -# fixed-version: Fixed after version 5.19rc8 +# fixed-version: Fixed from version 5.19rc8 CVE_CHECK_IGNORE += "CVE-2022-39188" -# fixed-version: Fixed after version 5.19rc2 +# fixed-version: Fixed from version 5.19rc2 CVE_CHECK_IGNORE += "CVE-2022-39189" -# fixed-version: Fixed after version 6.0rc3 +# fixed-version: Fixed from version 6.0rc3 CVE_CHECK_IGNORE += "CVE-2022-39190" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-3977" -# fixed-version: Fixed after version 5.19rc4 +# fixed-version: Fixed from version 5.19rc4 CVE_CHECK_IGNORE += "CVE-2022-39842" # cpe-stable-backport: Backported in 6.1.7 CVE_CHECK_IGNORE += "CVE-2022-40133" -# fixed-version: Fixed after version 6.0rc5 +# fixed-version: Fixed from version 6.0rc5 CVE_CHECK_IGNORE += "CVE-2022-40307" -# fixed-version: Fixed after version 5.19rc4 +# fixed-version: Fixed from version 5.19rc4 CVE_CHECK_IGNORE += "CVE-2022-40476" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-40768" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-4095" # cpe-stable-backport: Backported in 6.1.44 @@ -6472,72 +6475,72 @@ CVE_CHECK_IGNORE += "CVE-2022-40982" # cpe-stable-backport: Backported in 6.1.4 CVE_CHECK_IGNORE += "CVE-2022-41218" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2022-41222" -# fixed-version: Fixed after version 5.19rc6 +# fixed-version: Fixed from version 5.19rc6 CVE_CHECK_IGNORE += "CVE-2022-4127" -# fixed-version: Fixed after version 5.19rc7 +# fixed-version: Fixed from version 5.19rc7 CVE_CHECK_IGNORE += "CVE-2022-4128" -# fixed-version: Fixed after version 6.1rc6 +# fixed-version: Fixed from version 6.1rc6 CVE_CHECK_IGNORE += "CVE-2022-4129" -# fixed-version: Fixed after version 6.1rc8 +# fixed-version: Fixed from version 6.1rc8 CVE_CHECK_IGNORE += "CVE-2022-4139" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-41674" # CVE-2022-41848 has no known resolution -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-41849" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-41850" -# fixed-version: Fixed after version 5.18rc2 +# fixed-version: Fixed from version 5.18rc2 CVE_CHECK_IGNORE += "CVE-2022-41858" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2022-42328" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2022-42329" -# fixed-version: Fixed after version 6.0rc7 +# fixed-version: Fixed from version 6.0rc7 CVE_CHECK_IGNORE += "CVE-2022-42432" # cpe-stable-backport: Backported in 6.1.22 CVE_CHECK_IGNORE += "CVE-2022-4269" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-42703" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-42719" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-42720" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-42721" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-42722" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2022-42895" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2022-42896" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-43750" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2022-4378" # cpe-stable-backport: Backported in 6.1.3 @@ -6546,7 +6549,7 @@ CVE_CHECK_IGNORE += "CVE-2022-4379" # cpe-stable-backport: Backported in 6.1.8 CVE_CHECK_IGNORE += "CVE-2022-4382" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2022-43945" # CVE-2022-44032 needs backporting (fixed from 6.4rc1) @@ -6557,7 +6560,7 @@ CVE_CHECK_IGNORE += "CVE-2022-43945" # CVE-2022-4543 has no known resolution -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2022-45869" # CVE-2022-45884 has no known resolution @@ -6575,52 +6578,52 @@ CVE_CHECK_IGNORE += "CVE-2022-45887" # cpe-stable-backport: Backported in 6.1.33 CVE_CHECK_IGNORE += "CVE-2022-45919" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2022-45934" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2022-4662" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2022-4696" -# fixed-version: Fixed after version 5.16rc7 +# fixed-version: Fixed from version 5.16rc7 CVE_CHECK_IGNORE += "CVE-2022-4744" -# fixed-version: Fixed after version 6.1rc8 +# fixed-version: Fixed from version 6.1rc8 CVE_CHECK_IGNORE += "CVE-2022-47518" -# fixed-version: Fixed after version 6.1rc8 +# fixed-version: Fixed from version 6.1rc8 CVE_CHECK_IGNORE += "CVE-2022-47519" -# fixed-version: Fixed after version 6.1rc8 +# fixed-version: Fixed from version 6.1rc8 CVE_CHECK_IGNORE += "CVE-2022-47520" -# fixed-version: Fixed after version 6.1rc8 +# fixed-version: Fixed from version 6.1rc8 CVE_CHECK_IGNORE += "CVE-2022-47521" # cpe-stable-backport: Backported in 6.1.6 CVE_CHECK_IGNORE += "CVE-2022-47929" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-47938" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-47939" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2022-47940" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-47941" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-47942" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2022-47943" -# fixed-version: Fixed after version 5.12rc2 +# fixed-version: Fixed from version 5.12rc2 CVE_CHECK_IGNORE += "CVE-2022-47946" # cpe-stable-backport: Backported in 6.1.8 @@ -6638,16 +6641,16 @@ CVE_CHECK_IGNORE += "CVE-2022-48425" # cpe-stable-backport: Backported in 6.1.40 CVE_CHECK_IGNORE += "CVE-2022-48502" -# fixed-version: Fixed after version 5.0rc1 +# fixed-version: Fixed from version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2023-0030" # cpe-stable-backport: Backported in 6.1.5 CVE_CHECK_IGNORE += "CVE-2023-0045" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2023-0047" -# fixed-version: Fixed after version 6.0rc4 +# fixed-version: Fixed from version 6.0rc4 CVE_CHECK_IGNORE += "CVE-2023-0122" # cpe-stable-backport: Backported in 6.1.28 @@ -6659,7 +6662,7 @@ CVE_CHECK_IGNORE += "CVE-2023-0179" # cpe-stable-backport: Backported in 6.1.5 CVE_CHECK_IGNORE += "CVE-2023-0210" -# fixed-version: Fixed after version 5.10rc1 +# fixed-version: Fixed from version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2023-0240" # cpe-stable-backport: Backported in 6.1.6 @@ -6680,18 +6683,18 @@ CVE_CHECK_IGNORE += "CVE-2023-0459" # cpe-stable-backport: Backported in 6.1.5 CVE_CHECK_IGNORE += "CVE-2023-0461" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-0468" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-0469" -# fixed-version: Fixed after version 6.1rc2 +# fixed-version: Fixed from version 6.1rc2 CVE_CHECK_IGNORE += "CVE-2023-0590" # CVE-2023-0597 needs backporting (fixed from 6.2rc1) -# fixed-version: Fixed after version 6.1rc3 +# fixed-version: Fixed from version 6.1rc3 CVE_CHECK_IGNORE += "CVE-2023-0615" # cpe-stable-backport: Backported in 6.1.16 @@ -6718,7 +6721,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1078" # cpe-stable-backport: Backported in 6.1.16 CVE_CHECK_IGNORE += "CVE-2023-1079" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-1095" # cpe-stable-backport: Backported in 6.1.16 @@ -6729,39 +6732,40 @@ CVE_CHECK_IGNORE += "CVE-2023-1192" # CVE-2023-1193 has no known resolution -# CVE-2023-1194 has no known resolution +# cpe-stable-backport: Backported in 6.1.34 +CVE_CHECK_IGNORE += "CVE-2023-1194" -# fixed-version: Fixed after version 6.1rc3 +# fixed-version: Fixed from version 6.1rc3 CVE_CHECK_IGNORE += "CVE-2023-1195" # cpe-stable-backport: Backported in 6.1.43 CVE_CHECK_IGNORE += "CVE-2023-1206" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2023-1249" -# fixed-version: Fixed after version 5.16rc1 +# fixed-version: Fixed from version 5.16rc1 CVE_CHECK_IGNORE += "CVE-2023-1252" # cpe-stable-backport: Backported in 6.1.13 CVE_CHECK_IGNORE += "CVE-2023-1281" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2023-1295" # cpe-stable-backport: Backported in 6.1.27 CVE_CHECK_IGNORE += "CVE-2023-1380" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-1382" -# fixed-version: Fixed after version 5.11rc4 +# fixed-version: Fixed from version 5.11rc4 CVE_CHECK_IGNORE += "CVE-2023-1390" # cpe-stable-backport: Backported in 6.1.13 CVE_CHECK_IGNORE += "CVE-2023-1513" -# fixed-version: Fixed after version 5.17rc4 +# fixed-version: Fixed from version 5.17rc4 CVE_CHECK_IGNORE += "CVE-2023-1582" # cpe-stable-backport: Backported in 6.1.22 @@ -6770,7 +6774,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1583" # cpe-stable-backport: Backported in 6.1.23 CVE_CHECK_IGNORE += "CVE-2023-1611" -# fixed-version: Fixed after version 5.18rc2 +# fixed-version: Fixed from version 5.18rc2 CVE_CHECK_IGNORE += "CVE-2023-1637" # cpe-stable-backport: Backported in 6.1.9 @@ -6782,7 +6786,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1670" # cpe-stable-backport: Backported in 6.1.18 CVE_CHECK_IGNORE += "CVE-2023-1829" -# fixed-version: Fixed after version 5.18 +# fixed-version: Fixed from version 5.18 CVE_CHECK_IGNORE += "CVE-2023-1838" # cpe-stable-backport: Backported in 6.1.21 @@ -6791,7 +6795,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1855" # cpe-stable-backport: Backported in 6.1.25 CVE_CHECK_IGNORE += "CVE-2023-1859" -# fixed-version: Fixed after version 5.18rc2 +# fixed-version: Fixed from version 5.18rc2 CVE_CHECK_IGNORE += "CVE-2023-1872" # cpe-stable-backport: Backported in 6.1.22 @@ -6806,16 +6810,16 @@ CVE_CHECK_IGNORE += "CVE-2023-1998" # cpe-stable-backport: Backported in 6.1.27 CVE_CHECK_IGNORE += "CVE-2023-2002" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-2006" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-2007" -# fixed-version: Fixed after version 5.19rc4 +# fixed-version: Fixed from version 5.19rc4 CVE_CHECK_IGNORE += "CVE-2023-2008" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-2019" # cpe-stable-backport: Backported in 6.1.44 @@ -6827,12 +6831,12 @@ CVE_CHECK_IGNORE += "CVE-2023-20588" # cpe-stable-backport: Backported in 6.1.41 CVE_CHECK_IGNORE += "CVE-2023-20593" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-20928" # CVE-2023-20937 has no known resolution -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2023-20938" # CVE-2023-20941 has no known resolution @@ -6862,12 +6866,12 @@ CVE_CHECK_IGNORE += "CVE-2023-2162" # cpe-stable-backport: Backported in 6.1.26 CVE_CHECK_IGNORE += "CVE-2023-2163" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2023-2166" # CVE-2023-2176 needs backporting (fixed from 6.3rc1) -# fixed-version: Fixed after version 5.19 +# fixed-version: Fixed from version 5.19 CVE_CHECK_IGNORE += "CVE-2023-2177" # cpe-stable-backport: Backported in 6.1.22 @@ -6876,7 +6880,7 @@ CVE_CHECK_IGNORE += "CVE-2023-2194" # cpe-stable-backport: Backported in 6.1.21 CVE_CHECK_IGNORE += "CVE-2023-2235" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-2236" # cpe-stable-backport: Backported in 6.1.26 @@ -6885,39 +6889,39 @@ CVE_CHECK_IGNORE += "CVE-2023-2248" # cpe-stable-backport: Backported in 6.1.28 CVE_CHECK_IGNORE += "CVE-2023-2269" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2023-22995" -# fixed-version: Fixed after version 5.18rc1 +# fixed-version: Fixed from version 5.18rc1 CVE_CHECK_IGNORE += "CVE-2023-22996" # cpe-stable-backport: Backported in 6.1.2 CVE_CHECK_IGNORE += "CVE-2023-22997" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-22998" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2023-22999" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2023-23000" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2023-23001" -# fixed-version: Fixed after version 5.17rc1 +# fixed-version: Fixed from version 5.17rc1 CVE_CHECK_IGNORE += "CVE-2023-23002" -# fixed-version: Fixed after version 5.16rc6 +# fixed-version: Fixed from version 5.16rc6 CVE_CHECK_IGNORE += "CVE-2023-23003" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2023-23004" # CVE-2023-23005 needs backporting (fixed from 6.2rc1) -# fixed-version: Fixed after version 5.16rc8 +# fixed-version: Fixed from version 5.16rc8 CVE_CHECK_IGNORE += "CVE-2023-23006" # CVE-2023-23039 has no known resolution @@ -6931,10 +6935,11 @@ CVE_CHECK_IGNORE += "CVE-2023-23455" # cpe-stable-backport: Backported in 6.1.9 CVE_CHECK_IGNORE += "CVE-2023-23559" -# fixed-version: Fixed after version 5.12rc1 +# fixed-version: Fixed from version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2023-23586" -# CVE-2023-2430 needs backporting (fixed from 6.1.50) +# cpe-stable-backport: Backported in 6.1.50 +CVE_CHECK_IGNORE += "CVE-2023-2430" # cpe-stable-backport: Backported in 6.1.22 CVE_CHECK_IGNORE += "CVE-2023-2483" @@ -6942,10 +6947,11 @@ CVE_CHECK_IGNORE += "CVE-2023-2483" # cpe-stable-backport: Backported in 6.1.16 CVE_CHECK_IGNORE += "CVE-2023-25012" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-2513" -# CVE-2023-25775 needs backporting (fixed from 6.1.53) +# cpe-stable-backport: Backported in 6.1.53 +CVE_CHECK_IGNORE += "CVE-2023-25775" # fixed-version: only affects 6.3rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-2598" @@ -6960,22 +6966,22 @@ CVE_CHECK_IGNORE += "CVE-2023-26544" # cpe-stable-backport: Backported in 6.1.13 CVE_CHECK_IGNORE += "CVE-2023-26545" -# fixed-version: Fixed after version 6.1rc7 +# fixed-version: Fixed from version 6.1rc7 CVE_CHECK_IGNORE += "CVE-2023-26605" # cpe-stable-backport: Backported in 6.1.2 CVE_CHECK_IGNORE += "CVE-2023-26606" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2023-26607" -# fixed-version: Fixed after version 6.1 +# fixed-version: Fixed from version 6.1 CVE_CHECK_IGNORE += "CVE-2023-28327" # cpe-stable-backport: Backported in 6.1.2 CVE_CHECK_IGNORE += "CVE-2023-28328" -# fixed-version: Fixed after version 5.19rc1 +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2023-28410" # fixed-version: only affects 6.3rc1 onwards @@ -6984,10 +6990,10 @@ CVE_CHECK_IGNORE += "CVE-2023-28464" # cpe-stable-backport: Backported in 6.1.20 CVE_CHECK_IGNORE += "CVE-2023-28466" -# fixed-version: Fixed after version 6.0rc5 +# fixed-version: Fixed from version 6.0rc5 CVE_CHECK_IGNORE += "CVE-2023-2860" -# fixed-version: Fixed after version 5.14rc1 +# fixed-version: Fixed from version 5.14rc1 CVE_CHECK_IGNORE += "CVE-2023-28772" # cpe-stable-backport: Backported in 6.1.22 @@ -6999,7 +7005,7 @@ CVE_CHECK_IGNORE += "CVE-2023-2898" # cpe-stable-backport: Backported in 6.1.16 CVE_CHECK_IGNORE += "CVE-2023-2985" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2023-3006" # Skipping CVE-2023-3022, no affected_versions @@ -7013,7 +7019,7 @@ CVE_CHECK_IGNORE += "CVE-2023-30772" # cpe-stable-backport: Backported in 6.1.30 CVE_CHECK_IGNORE += "CVE-2023-3090" -# fixed-version: Fixed after version 4.8rc7 +# fixed-version: Fixed from version 4.8rc7 CVE_CHECK_IGNORE += "CVE-2023-3106" # Skipping CVE-2023-3108, no affected_versions @@ -7028,7 +7034,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3106" # CVE-2023-31085 has no known resolution -# fixed-version: Fixed after version 6.0rc2 +# fixed-version: Fixed from version 6.0rc2 CVE_CHECK_IGNORE += "CVE-2023-3111" # cpe-stable-backport: Backported in 6.1.35 @@ -7043,7 +7049,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3141" # cpe-stable-backport: Backported in 6.1.26 CVE_CHECK_IGNORE += "CVE-2023-31436" -# fixed-version: Fixed after version 5.18rc6 +# fixed-version: Fixed from version 5.18rc6 CVE_CHECK_IGNORE += "CVE-2023-3159" # cpe-stable-backport: Backported in 6.1.11 @@ -7105,7 +7111,7 @@ CVE_CHECK_IGNORE += "CVE-2023-33250" # cpe-stable-backport: Backported in 6.1.22 CVE_CHECK_IGNORE += "CVE-2023-33288" -# fixed-version: Fixed after version 6.1rc1 +# fixed-version: Fixed from version 6.1rc1 CVE_CHECK_IGNORE += "CVE-2023-3338" # cpe-stable-backport: Backported in 6.1.16 @@ -7120,7 +7126,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3358" # cpe-stable-backport: Backported in 6.1.11 CVE_CHECK_IGNORE += "CVE-2023-3359" -# fixed-version: Fixed after version 6.0rc1 +# fixed-version: Fixed from version 6.0rc1 CVE_CHECK_IGNORE += "CVE-2023-3389" # cpe-stable-backport: Backported in 6.1.35 @@ -7143,7 +7149,7 @@ CVE_CHECK_IGNORE += "CVE-2023-34256" # cpe-stable-backport: Backported in 6.1.44 CVE_CHECK_IGNORE += "CVE-2023-34319" -# fixed-version: Fixed after version 5.18rc5 +# fixed-version: Fixed from version 5.18rc5 CVE_CHECK_IGNORE += "CVE-2023-3439" # cpe-stable-backport: Backported in 6.1.39 @@ -7190,9 +7196,11 @@ CVE_CHECK_IGNORE += "CVE-2023-37453" # CVE-2023-37454 has no known resolution -# CVE-2023-3772 needs backporting (fixed from 6.1.47) +# cpe-stable-backport: Backported in 6.1.47 +CVE_CHECK_IGNORE += "CVE-2023-3772" -# CVE-2023-3773 needs backporting (fixed from 6.1.47) +# cpe-stable-backport: Backported in 6.1.47 +CVE_CHECK_IGNORE += "CVE-2023-3773" # cpe-stable-backport: Backported in 6.1.40 CVE_CHECK_IGNORE += "CVE-2023-3776" @@ -7200,7 +7208,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3776" # cpe-stable-backport: Backported in 6.1.42 CVE_CHECK_IGNORE += "CVE-2023-3777" -# fixed-version: Fixed after version 6.1rc4 +# fixed-version: Fixed from version 6.1rc4 CVE_CHECK_IGNORE += "CVE-2023-3812" # cpe-stable-backport: Backported in 6.1.25 @@ -7283,33 +7291,47 @@ CVE_CHECK_IGNORE += "CVE-2023-4208" # cpe-stable-backport: Backported in 6.1.45 CVE_CHECK_IGNORE += "CVE-2023-4273" -# fixed-version: Fixed after version 5.19rc1 +# cpe-stable-backport: Backported in 6.1.53 +CVE_CHECK_IGNORE += "CVE-2023-42752" + +# cpe-stable-backport: Backported in 6.1.53 +CVE_CHECK_IGNORE += "CVE-2023-42753" + +# CVE-2023-42755 needs backporting (fixed from 6.1.55) + +# fixed-version: Fixed from version 5.19rc1 CVE_CHECK_IGNORE += "CVE-2023-4385" -# fixed-version: Fixed after version 5.18 +# fixed-version: Fixed from version 5.18 CVE_CHECK_IGNORE += "CVE-2023-4387" -# fixed-version: Fixed after version 5.18rc3 +# fixed-version: Fixed from version 5.18rc3 CVE_CHECK_IGNORE += "CVE-2023-4389" -# fixed-version: Fixed after version 6.0rc3 +# fixed-version: Fixed from version 6.0rc3 CVE_CHECK_IGNORE += "CVE-2023-4394" -# fixed-version: Fixed after version 5.18 +# fixed-version: Fixed from version 5.18 CVE_CHECK_IGNORE += "CVE-2023-4459" # CVE-2023-4563 needs backporting (fixed from 6.5rc6) -# CVE-2023-4569 needs backporting (fixed from 6.1.47) +# cpe-stable-backport: Backported in 6.1.47 +CVE_CHECK_IGNORE += "CVE-2023-4569" # fixed-version: only affects 6.4rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4611" # CVE-2023-4622 needs backporting (fixed from 6.5rc1) -# CVE-2023-4623 needs backporting (fixed from 6.1.53) +# cpe-stable-backport: Backported in 6.1.53 +CVE_CHECK_IGNORE += "CVE-2023-4623" + +# CVE-2023-4881 needs backporting (fixed from 6.1.54) + +# CVE-2023-4921 needs backporting (fixed from 6.1.54) -# CVE-2023-4881 needs backporting (fixed from 6.6rc1) +# CVE-2023-5158 has no known resolution -# CVE-2023-4921 needs backporting (fixed from 6.6rc1) +# CVE-2023-5197 needs backporting (fixed from 6.6rc3) From patchwork Wed Oct 11 00:01:21 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31957 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F050DCD98D1 for ; Wed, 11 Oct 2023 00:02:06 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.5123.1696982522993414615 for ; Tue, 10 Oct 2023 17:02:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=mKwdPlae; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1bf55a81eeaso43470015ad.0 for ; Tue, 10 Oct 2023 17:02:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982522; x=1697587322; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=H16AVy4mxItTzlG3ugFvilgunjOyMd8scCcEx6GdYmY=; b=mKwdPlae/o1yuNZi4Z/GvskmIUexiKq+xWF7/M3TIbNuCjXG8UPgK5uTdIWaTyWEp4 YIgNiGddwavj4n21qQb07fwvbMjoZ9YX2aZEkoYLXXXRvOHsnxKZCfcmfic/tpx4KWR3 GSw7jTPV4oG1PDj6MG4CAz2x2MyGfBONaL7jpkgg5WRCFghq8wqMFAshgnRzIfeOx0Ja d/IBwqBzSen6oO7Idm1xbMkMU8oJ8nr4x6mWdRdqco0hjmA4knOGYYt/AFhRS3ek0O8p qP98gsRId2qpQMksx/sJLOud8RmM3jcMjwHNlIcLxudiIQu4YwnWxWFReYgAzUQ5o1RQ EQrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982522; x=1697587322; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=H16AVy4mxItTzlG3ugFvilgunjOyMd8scCcEx6GdYmY=; b=DzXjWkYum+lV/3UtWpGMlYhWIA5bUd/xFMM2P2aafBHYYNiYoOOkX3Y4SXY8Zg6krC 9SABDP8CQ2HKV57HhW6pRzB5BmEjrnDaqDfqJodFHJKmBY390LfP95ylVOIkyPj0OP9F L5kLf2XX4kTljiJzkof4RPEWP3Q1lDMNfQjDUPrvZ0KQf4WF3IDxCcINZKkhRjWSYe5l 9lpEX3Wldcs8dqsFqd0BUlzIZnCcZqesj4GbsS+FtEHgUMFHpNkhNqKx5lF7FZWQttHr /6fvXtS+EdLBydAX0vTu3V7Y8mMYSj7ROvZQF3uNHdqiL38okcG+jMLhTs7gG5x7BAgw dvmw== X-Gm-Message-State: AOJu0Ywks/oNoORa6qn+p6sYs4co8IlLyduuUu4yAqNR4yhfyzM3VrB0 tY3RYcznnB90TQh6VDztjao2hUeQtRejkfYrSk4= X-Google-Smtp-Source: AGHT+IHxxeApocCBnKwaxJZzfaj8sht+09U2nRq3W5svKqL0SiS2PeLdNozd8CeLVO6ucWM3TRV1Sg== X-Received: by 2002:a17:90a:8804:b0:274:111c:c14d with SMTP id s4-20020a17090a880400b00274111cc14dmr16503041pjn.13.1696982522039; Tue, 10 Oct 2023 17:02:02 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:01 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 08/20] mdadm: Disable further tests due to intermittent failures Date: Tue, 10 Oct 2023 14:01:21 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188925 From: Richard Purdie I took the mdadm ptest enabling as I was told the tests were fine now. They're not. Disable more of them as having intermittent issues. Signed-off-by: Richard Purdie (cherry picked from commit 2993a0bd6aca81d4382c3de5ac2fd9b5dac94868) Signed-off-by: Steve Sakoman --- meta/recipes-extended/mdadm/mdadm_4.2.bb | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/meta/recipes-extended/mdadm/mdadm_4.2.bb b/meta/recipes-extended/mdadm/mdadm_4.2.bb index c367b633a3..e914d31341 100644 --- a/meta/recipes-extended/mdadm/mdadm_4.2.bb +++ b/meta/recipes-extended/mdadm/mdadm_4.2.bb @@ -105,6 +105,11 @@ do_install_ptest() { do install -D -m 755 $prg ${D}${PTEST_PATH}/ done + + # Disable tests causing intermittent autobuilder failures + echo "intermittent failure on autobuilder" > ${D}${PTEST_PATH}/tests/19raid6check.broken + echo "intermittent failure on autobuilder" > ${D}${PTEST_PATH}/tests/20raid5journal.broken + echo "intermittent failure on autobuilder" > ${D}${PTEST_PATH}/tests/21raid5cache.broken } RDEPENDS:${PN} += "bash" From patchwork Wed Oct 11 00:01:22 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31958 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E939CD98D9 for ; Wed, 11 Oct 2023 00:02:07 +0000 (UTC) Received: from mail-pg1-f176.google.com (mail-pg1-f176.google.com [209.85.215.176]) by mx.groups.io with SMTP id smtpd.web10.5124.1696982524570990478 for ; Tue, 10 Oct 2023 17:02:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=B6DPVuMd; spf=softfail (domain: sakoman.com, ip: 209.85.215.176, mailfrom: steve@sakoman.com) Received: by mail-pg1-f176.google.com with SMTP id 41be03b00d2f7-578b4997decso4726347a12.0 for ; Tue, 10 Oct 2023 17:02:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982523; x=1697587323; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3lBjtYDZnpjWReMkVIpMjHc163Egf0K9JEyeTrCgfXU=; b=B6DPVuMd4zxmctvqWFy3MWbZ5fVkr4LsGPj5jQtDgPoxcOhWjjTCc9BnAIXUCkhrim RqsWCE67npWXAPlBPEfP428luYhxipEwmmnsYKxP+KJgzDWwlXNl9J6f5Kk0iQR6qDDQ A80jEYJL6zEkrWhHB3fHNuttwx98QOD9v7Qrb49osI9GvtkF+AnCB4eoljIH2sFKEb3m +lodcmhYd9tAoPTvwTEX/+/x4TEP0VhLw8khtHyXBseTs5M39jJVexIPWQsPi1hD+wlK YCjbAK1DuvcwUJmaSNn3qpHKJYi8Z2bhz6OJX+WxKQiZiAlI6VEvUZujzKFcbO7/U3ks TbhA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982523; x=1697587323; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=3lBjtYDZnpjWReMkVIpMjHc163Egf0K9JEyeTrCgfXU=; b=e/UUBsZjT/1BMa7NLD9dVnz6eMHiNtREPfsbEMMmVAZ+sX5uJIvKiu6clVh72w6cFk vzbvOt9/lxzKoTBd20VC/GyrTtBM80cXPmpQ7G3adLOe+/Z4x31dGX5h5+3OIBRG/uEg 1B2ChUllBaoOh3mP9dytiE5l2KsL/qPI9ui0JjfIi06XvFsgXLBv/1celozOIWi7CnOP QVjs0orv3xQeQ/5km3swEAygJFUmsNOF9C/H4DyWTkIcu52A7WBbTVFFgAmtHvpOLo9o 7eCBGkwlt9Oh7lrQofSTWu72lEIEOTD2GoerA9VvR4qGasM4LvO9Vo9WA3WFN8oO9m2d tx4g== X-Gm-Message-State: AOJu0YzuvovM41733iU+vLWuAa1cbvycUNKcoSr7E4w+qpRcifdxTalX roEscSBWOBn5wJyad0vyUKBKjlUU2FTSz8wfNZY= X-Google-Smtp-Source: AGHT+IESIQT1fkkSfXJuWnf5VQOIZ63w1xJfOuEbjsZ64kCTryLHWeG16Za9BwhVZQBS2Y7kimKjqA== X-Received: by 2002:a17:90a:fb41:b0:263:72fe:3ef7 with SMTP id iq1-20020a17090afb4100b0026372fe3ef7mr17598970pjb.42.1696982523505; Tue, 10 Oct 2023 17:02:03 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:03 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 09/20] openssl: build and install manpages only if they are enabled Date: Tue, 10 Oct 2023 14:01:22 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188927 From: Alexander Kanavin This significantly speeds up the build by default. Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit 2b5ee583c62dbe381cd429da14ecbba5ea32d506) Signed-off-by: Steve Sakoman --- meta/recipes-connectivity/openssl/openssl_3.1.3.bb | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/meta/recipes-connectivity/openssl/openssl_3.1.3.bb b/meta/recipes-connectivity/openssl/openssl_3.1.3.bb index e41bb78812..ff9df693b8 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.1.3.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.1.3.bb @@ -20,7 +20,7 @@ SRC_URI:append:class-nativesdk = " \ SRC_URI[sha256sum] = "f0316a2ebd89e7f2352976445458689f80302093788c466692fb2a188b2eacf6" -inherit lib_package multilib_header multilib_script ptest perlnative +inherit lib_package multilib_header multilib_script ptest perlnative manpages MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" PACKAGECONFIG ?= "" @@ -30,6 +30,7 @@ PACKAGECONFIG:class-nativesdk = "" PACKAGECONFIG[cryptodev-linux] = "enable-devcryptoeng,disable-devcryptoeng,cryptodev-linux,,cryptodev-module" PACKAGECONFIG[no-tls1] = "no-tls1" PACKAGECONFIG[no-tls1_1] = "no-tls1_1" +PACKAGECONFIG[manpages] = "" B = "${WORKDIR}/build" do_configure[cleandirs] = "${B}" @@ -145,7 +146,7 @@ do_configure () { } do_install () { - oe_runmake DESTDIR="${D}" MANDIR="${mandir}" MANSUFFIX=ssl install + oe_runmake DESTDIR="${D}" MANDIR="${mandir}" MANSUFFIX=ssl install_sw install_ssldirs ${@bb.utils.contains('PACKAGECONFIG', 'manpages', 'install_docs', '', d)} oe_multilib_header openssl/opensslconf.h oe_multilib_header openssl/configuration.h From patchwork Wed Oct 11 00:01:23 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31959 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2EE7ACD98DA for ; Wed, 11 Oct 2023 00:02:07 +0000 (UTC) Received: from mail-il1-f177.google.com (mail-il1-f177.google.com [209.85.166.177]) by mx.groups.io with SMTP id smtpd.web10.5125.1696982526134568628 for ; Tue, 10 Oct 2023 17:02:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=aKbis6pR; spf=softfail (domain: sakoman.com, ip: 209.85.166.177, mailfrom: steve@sakoman.com) Received: by mail-il1-f177.google.com with SMTP id e9e14a558f8ab-35747150a2aso2559015ab.3 for ; Tue, 10 Oct 2023 17:02:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982525; x=1697587325; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=iJzJOr71TgxzYfvUFzzDvgK+S7BRtX0WX2L1oF2xq5o=; b=aKbis6pR2b+en3yYSVAujfyhSEbgnMlIxYCovs0PQnyfA1v90g/LIG3Zkkzw4+P0J9 JjkXk0+hlnhafV1HzTPQCiaZh7ZgmXfmYOCyMsuy5S7/xWefPat3jkRMcyEBM7uHKwQA qV8HFa8eNB4xR0ZlQz+dH4woXJickSpExDePfPnfT6rphuJvmTWKWd9IYAY2k3f/FBVw soDUAPl38XUS3TjBLaL5yZc7iW01TBtZREyAu24x9X7UDaE26tWk4uI8amAWG+CjjuZe ygNQHE7VL2jjnuhJxCIeJGbLsI1qulYM0gXq44U2WKLcq1r6jRxNf7ajE3rMRA+66Lqe llrw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982525; x=1697587325; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=iJzJOr71TgxzYfvUFzzDvgK+S7BRtX0WX2L1oF2xq5o=; b=E15019e4Y/UV0RhCzQ50FaMrd4Q18LKOmZl1NO38ajAF4/GJV4pqGbDQ042Zx/LSsh DBGKbbNEj+Ar56O+p6F2a4t0qBmA2MdM97M7zktEa1ol0OZGRMyyaQ/VuwX1Bm4Rd6iM MTX7ebiJCMoJwcRDOmSa+B4qlNxCU06wGe+GDu0YhKyO5Nh13X+umf6oo1hjyQNUYS2F 86SEGsq6z2hJAgQsvfECuFdB3v62BjRoKkjeiL+w5yzHG9S4xIQ8vgd23m5W9gmcVfZY /NV7mye3oxUDjzhQbHcseLWA1kdUmI80UbPMAWfvR8r68NP4/v+Xp9baJfFOiYWWlQ+N eOhQ== X-Gm-Message-State: AOJu0YxlzOF12r0O9CUux6heepEeQV2DEQeXlXjpHP3NZzI2swy3d5v9 WPrzNKNcmzxx3JwlC1TQ0PQ2yKZzGZ9ArqQv5xU= X-Google-Smtp-Source: AGHT+IFrnH2IjFlt8iZGWzOo/0GQ1xSepCUlYDhkTAG3rb8O1pUiM3PZloJkc5yAp6/Fgpy++J7cLw== X-Received: by 2002:a05:6e02:1a6f:b0:34f:bac9:f53d with SMTP id w15-20020a056e021a6f00b0034fbac9f53dmr25248960ilv.17.1696982525053; Tue, 10 Oct 2023 17:02:05 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:04 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 10/20] glib-2.0: libelf has a configure option now, specify it Date: Tue, 10 Oct 2023 14:01:23 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188928 From: Ross Burton GLib has had an option to control libelf since 2.67.0, so use it. Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit d2f028c53a2390c28685b373841c9a600e91819a) Signed-off-by: Steve Sakoman --- meta/recipes-core/glib-2.0/glib.inc | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/meta/recipes-core/glib-2.0/glib.inc b/meta/recipes-core/glib-2.0/glib.inc index 843b6bd29b..878dd107de 100644 --- a/meta/recipes-core/glib-2.0/glib.inc +++ b/meta/recipes-core/glib-2.0/glib.inc @@ -40,8 +40,7 @@ PACKAGECONFIG ??= "libmount \ ${@bb.utils.contains('PTEST_ENABLED', '1', 'tests', '', d)}" PACKAGECONFIG[libmount] = "-Dlibmount=enabled,-Dlibmount=disabled,util-linux" PACKAGECONFIG[manpages] = "-Dman=true, -Dman=false, libxslt-native xmlto-native" -# libelf is auto-detected without a configuration option -PACKAGECONFIG[libelf] = ",,elfutils" +PACKAGECONFIG[libelf] = "-Dlibelf=enabled,-Dlibelf=disabled,elfutils" PACKAGECONFIG[tests] = "-Dinstalled_tests=true,-Dinstalled_tests=false," PACKAGECONFIG[selinux] = "-Dselinux=enabled,-Dselinux=disabled,libselinux" From patchwork Wed Oct 11 00:01:24 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31962 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 38487CD98CC for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-oo1-f52.google.com (mail-oo1-f52.google.com [209.85.161.52]) by mx.groups.io with SMTP id smtpd.web10.5126.1696982529166257752 for ; Tue, 10 Oct 2023 17:02:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=vaQIoqkD; spf=softfail (domain: sakoman.com, ip: 209.85.161.52, mailfrom: steve@sakoman.com) Received: by mail-oo1-f52.google.com with SMTP id 006d021491bc7-57bab4e9e1aso3757932eaf.3 for ; Tue, 10 Oct 2023 17:02:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982528; x=1697587328; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=aHwHuE4psNZIeB1/wIElhYaJ/V9neSBht5nTmRmFK58=; b=vaQIoqkD+YlYih3Ec3RAOhaNxNTYh4bUizLTgAL0D6TPjfHwR3XAddO0iXZQZ65YL/ f4vWxaxg30b41XBCs+RVUpFRldUyxsoPo2nKEEnOId/ZF5OgcSdiZ9QGn0YRzZR5hKla oOpYvu2w4of4VN+2aAzYA5ORxiVqt/Zz3SbiYHkCMW1tYEDxbvZtDRoDRbRt5DocvCCH QphhXtA+ocjrEiWK1xmdeTjrbgERXUv5Id4GG7OTpeV5XkcmztnBE1CatEGVcyKD36Nb HyacL9WxQ0IAs96tvVtxz1P6IVuDR+eHZZenJ3gFmOp39l3tRFNl/RPuNh0arDCOGfeY MxBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982528; x=1697587328; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=aHwHuE4psNZIeB1/wIElhYaJ/V9neSBht5nTmRmFK58=; b=t7VjxUeOAu1iqoKZFSBLjPpTKlh98sQEdJza+rjloccehoQfZLUsq1hMiK/oy1vD+T V69mgujuduOmcLguX15aJV7fZUks2rUYdzj45OuMoh1ChVeQzqXI6PMazHB8Wi+cMFb1 uMgaKvTIe0zAad9Gi+9KlZf4Ipzb54y7VjpbJxp2lN39xo5+DFu4PQN7bKGlkCTT/Db2 s79T3YFGdY1zpW+KkAswi2kra5KY6C2VVpw7Jr2TE8JmhPfgzwIhWdG1WX2anboP8gez AHp2VtEyAred1c64/+D1BakCujXisj4PQkprNMtOiFfX211tyToDqPZAnZ8MtJ8aITQn DEQA== X-Gm-Message-State: AOJu0YxFOnk+RJfJZBaBadZWBBLM6Qgp1sNHi9uKMFRpfMcbKu56XIBP FAZAUnptUs/pEuJO+PtkAq9YoV0wpUn8Rs65DSA= X-Google-Smtp-Source: AGHT+IGYYDGIu3RTN8fWpGwY+RTJDOxs8xOJ4j82YUgneSUU/+Ohwi+8yCGj5jByRstvIOMtIo+wGQ== X-Received: by 2002:a05:6358:9218:b0:142:fd2b:d30c with SMTP id d24-20020a056358921800b00142fd2bd30cmr22937485rwb.23.1696982526608; Tue, 10 Oct 2023 17:02:06 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:06 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 11/20] pango: explictly enable/disable libthai Date: Tue, 10 Oct 2023 14:01:24 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188929 From: Ross Burton Pango has had an explicit option since 1.46.2 Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit 42755f135d2d015e564d783996fbb3ef860f2bf7) Signed-off-by: Steve Sakoman --- meta/recipes-graphics/pango/pango_1.50.14.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-graphics/pango/pango_1.50.14.bb b/meta/recipes-graphics/pango/pango_1.50.14.bb index ec7a913009..b254caca50 100644 --- a/meta/recipes-graphics/pango/pango_1.50.14.bb +++ b/meta/recipes-graphics/pango/pango_1.50.14.bb @@ -33,7 +33,7 @@ PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'x11', d)} \ PACKAGECONFIG[x11] = ",,virtual/libx11 libxft" PACKAGECONFIG[tests] = "-Dinstall-tests=true, -Dinstall-tests=false" -PACKAGECONFIG[thai] = ",,libthai" +PACKAGECONFIG[thai] = "-Dlibthai=enabled,-Dlibthai=disabled,libthai" GIR_MESON_OPTION = 'introspection' From patchwork Wed Oct 11 00:01:25 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31966 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 615C9CD98E3 for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-oo1-f46.google.com (mail-oo1-f46.google.com [209.85.161.46]) by mx.groups.io with SMTP id smtpd.web10.5127.1696982529331697006 for ; Tue, 10 Oct 2023 17:02:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Eeb6F1u5; spf=softfail (domain: sakoman.com, ip: 209.85.161.46, mailfrom: steve@sakoman.com) Received: by mail-oo1-f46.google.com with SMTP id 006d021491bc7-57b811a6ce8so3522806eaf.3 for ; Tue, 10 Oct 2023 17:02:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982528; x=1697587328; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=P3p+GOm2CZ7u8g69/d2uNrzllODFutlBbrkYJCCHE+g=; b=Eeb6F1u5wp46ZkIAlO/GJnVU2TrV0zxusoztposlwNbJNU0TPKOHkasWjoafPrqKHS RDl/f8ecZ9RszcRCUWM8oHbrA/kRa7WqhZKA7sqa40pbA1oAhoU3XdSPmjwY/fGgkds3 MydKRLoXJiYnRI3KS11Tr/hitFZ8oJb7ZLynPtIvxFbJhqsYX7J8Xer4VfW1MJPOIwkF 56KXBAOaDwZg6BEzTDNKWV+dTG+l1vEil4s2GrcAxsFYu6KtPqPUSvGRoQesX7IrH8lx O1wrNwgkdFxdZosEazGI/mfdvsrEyRXPaZH8LOWQ83RlZpu0y5nYivmeX/sNkTwOLE4P eH0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982528; x=1697587328; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=P3p+GOm2CZ7u8g69/d2uNrzllODFutlBbrkYJCCHE+g=; b=d/LqYz6NnYqCzCn2IptwZ6XokuVfdPg/WfU5W/hJ/0DT3mh04hihTpJwzhjn9vnv7V +u8bi80x9ZMdmSCGeILQWIU1ykNFgx0sSwcSGcn3QjUGYbPO3bvllrUTFjIrn3DWyUyz e1qAyzBRZoUzOMvfuIXHoHCTUqHapSOm6yG8vB4S1ZGp0PbJDNIxFbWF/VTVvUsrRcco 0FB5FyFuecSXSUXkv6tyTC1+qI4CUhq9CIHJTM3D5ur7P+KUAcG++Kj5pBei/D0N64oa lTkQuyuMqZdfgghytveLQjg0xuZB1wQWbFH5UZ18UKDQv92ZHyJ1Tn9sLFMYwxvIEw4y y8qA== X-Gm-Message-State: AOJu0YzLIC6KBj3uXlyh+Aug6Pg28I8uO7Ao82NdZ7ZCpXSu2NDupRfU Q7XgGO/K1A3yfAsjWK69De88yjkXnSolyGn/RqM= X-Google-Smtp-Source: AGHT+IEE3yx2aI5BtrjVXnLbCWpU4Hhr5627occtwi7QUlACV69iBQKJDJtZZsmH332qH8AH/94c5g== X-Received: by 2002:a05:6358:33a5:b0:143:5180:1700 with SMTP id i37-20020a05635833a500b0014351801700mr19735990rwd.27.1696982528117; Tue, 10 Oct 2023 17:02:08 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:07 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 12/20] libsoup-2.4: update PACKAGECONFIG Date: Tue, 10 Oct 2023 14:01:25 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188930 From: Ross Burton Add explicit PACKAGECONFIGs for brotli,ntlm, and sysprof. libsoup needs to be told where ntlm_auth will be on the target, so write a cross file to do so. Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit 54b6ea078daeb58a3bb20bb4275d1140640a77d2) Signed-off-by: Steve Sakoman --- .../libsoup/libsoup-2.4_2.74.3.bb | 18 +++++++++++++++--- 1 file changed, 15 insertions(+), 3 deletions(-) diff --git a/meta/recipes-support/libsoup/libsoup-2.4_2.74.3.bb b/meta/recipes-support/libsoup/libsoup-2.4_2.74.3.bb index 79281fbf5b..5abeced30b 100644 --- a/meta/recipes-support/libsoup/libsoup-2.4_2.74.3.bb +++ b/meta/recipes-support/libsoup/libsoup-2.4_2.74.3.bb @@ -25,12 +25,24 @@ UPSTREAM_CHECK_REGEX = "libsoup-(?P2(\.(?!99)\d+)+)\.tar" GIR_MESON_ENABLE_FLAG = 'enabled' GIR_MESON_DISABLE_FLAG = 'disabled' -# libsoup-gnome is entirely deprecated and just stubs in 2.42 onwards. Disable by default. PACKAGECONFIG ??= "" +PACKAGECONFIG[brotli] = "-Dbrotli=enabled,-Dbrotli=disabled,brotli" +# libsoup-gnome is entirely deprecated and just stubs in 2.42 onwards PACKAGECONFIG[gnome] = "-Dgnome=true,-Dgnome=false" PACKAGECONFIG[gssapi] = "-Dgssapi=enabled,-Dgssapi=disabled,krb5" - -EXTRA_OEMESON:append = " -Dvapi=disabled -Dtls_check=false" +PACKAGECONFIG[ntlm] = "-Dntlm=enabled,-Dntlm=disabled" +PACKAGECONFIG[sysprof] = "-Dsysprof=enabled,-Dsysprof=disabled,sysprof" + +# Tell libsoup where the target ntlm_auth is installed +do_write_config:append:class-target() { + cat >${WORKDIR}/soup.cross < X-Patchwork-Id: 31963 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3234CCD98D9 for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-oi1-f180.google.com (mail-oi1-f180.google.com [209.85.167.180]) by mx.groups.io with SMTP id smtpd.web11.5189.1696982531017314847 for ; Tue, 10 Oct 2023 17:02:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=1WrvzVVU; spf=softfail (domain: sakoman.com, ip: 209.85.167.180, mailfrom: steve@sakoman.com) Received: by mail-oi1-f180.google.com with SMTP id 5614622812f47-3af5fd13004so4567266b6e.0 for ; Tue, 10 Oct 2023 17:02:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982530; x=1697587330; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UKhH69PDxcgIdiAq6nEDbobkvMnSlGtq+adE+CZgsq0=; b=1WrvzVVUeCKkfeMATci3CtdbSPe07v2lcit8s8q/P84qY7BoO7CPFsFEM1J1kQOHQR Kvtsc2PVQSyjfzG9tlb+GS5CY/lWbdZhiBqqruMGiRUyMzr27IdPy6zhvLnEDWczlUTm AYeVPmmc5f4IIqnh/A9BKSSL7V0e3QrYTUbqvowKNbBNlGa/XtqRR0cCzIMpcLebJ2PU 0oo9KWIdCrobDVde/DT2/t7AtzVcJsZguIFty5qqY5YX7YsS2OFb2/N1pR676J3qYvAR 2Yr1T1QqrC7YpG/Qj+kuMdHW9fWOpGS7e4kejUQMWZoRY0jPcsA8K7H3/fpwgYNUnbMf 0QiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982530; x=1697587330; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=UKhH69PDxcgIdiAq6nEDbobkvMnSlGtq+adE+CZgsq0=; b=CtRadt6lb5IJvVL6LWTiTqlSdc+mgMaX+ftjuF0MAZgID8zDJziz6HaiMgPMgpequg 3RNrS5xPf2iOJVVZBx/A134fnAXvIUQqi4I1LuQtkappdzJT1RpoDbP9MRsBbmyREeXM 7crN3340XqPRyvmlkfLlZSztAluv+FfHlygixUci7/yf8CSpn0nGDaa2K2mZr860NAQU Z9jA6iwgHm49e0HcXJcvqbdKQYhig0cwLqRq6QRew48v9w4Sb6W3SrM0jhL+Q1v21b/p O6sJu5UltTKMt13diZO3CNvG0khVLNMLmi3V61RfMQF9XJxR9m1nxU8Rmdp6rOodBVRJ AFcg== X-Gm-Message-State: AOJu0YxqiNS80O14m1m5Qx9vZNLQEjsXvXGvVUWkkJ+KwSS+w0KcP10+ 5CzUigH5SjNOerT1ifdiczXw43v2rV5ZvmVtN9g= X-Google-Smtp-Source: AGHT+IFnFuV1+dOZfKZi9mm8GYeaBlNQE1K/ow+EJ9OnDVlEjMI+gZlIZSvymt28k+J3Ld2Y6Vm9YA== X-Received: by 2002:a05:6808:1306:b0:3ae:1e08:4209 with SMTP id y6-20020a056808130600b003ae1e084209mr27667318oiv.39.1696982529678; Tue, 10 Oct 2023 17:02:09 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:09 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 13/20] wayland-utils: add libdrm PACKAGECONFIG Date: Tue, 10 Oct 2023 14:01:26 -1000 Message-Id: <0ba10930f73e4b0c2896afd326229fc6ae460f51.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188931 From: Ross Burton wayland-utils has optional libdrm support, so add a PACKAGECONFIG and enable it. Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit c6c488c259d1f38a05a71e576ca2f32d412413f1) Signed-off-by: Steve Sakoman --- meta/recipes-graphics/wayland/wayland-utils_1.1.0.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta/recipes-graphics/wayland/wayland-utils_1.1.0.bb b/meta/recipes-graphics/wayland/wayland-utils_1.1.0.bb index dcee87e2cd..48e1409be8 100644 --- a/meta/recipes-graphics/wayland/wayland-utils_1.1.0.bb +++ b/meta/recipes-graphics/wayland/wayland-utils_1.1.0.bb @@ -19,3 +19,6 @@ UPSTREAM_CHECK_URI = "https://wayland.freedesktop.org/releases.html" inherit meson pkgconfig DEPENDS += "wayland wayland-native wayland-protocols" + +PACKAGECONFIG ??= "drm" +PACKAGECONFIG[drm] = "-Ddrm=enabled,-Ddrm=disabled,libdrm" From patchwork Wed Oct 11 00:01:27 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31964 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 42244CD98DB for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web11.5190.1696982532168097186 for ; Tue, 10 Oct 2023 17:02:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=dpnGOrVz; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-690bf8fdd1aso4649254b3a.2 for ; Tue, 10 Oct 2023 17:02:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982531; x=1697587331; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=YFYqEa3Ya9vZORWR+02Hf4PElKQVXE988uVJkKhNv1E=; b=dpnGOrVzeG6WeOlfE/55fT/UJXIS6eO0E7v06utFEzKrQnC9FS45bZEqrglhWFfUTp hK9C3PBNfswTghaPRD0mfJJX15ZAoUEbKzNetUSvLTHfXBaAv33X0fWiYKXk7NqyBW2B bWa7tFGZwzOwcOmRc8rSSXbgT3whclb4fH6Z0ybJWP7mWXsi9gO/OtXDt2CV9Y2ESFV3 0eF5quAHlEYZORgp0sICS3BNYlbfrXQ1ZOfwyZI9QmetaZOCp1YhbZrjvK6eAaVp243b jNdvAqHGrbhnAwe6dnepNNJoLXAyBD+qndsGhlGSMeBiBsiV5tas3f3Qz9v6WrywPuGD r2LA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982531; x=1697587331; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YFYqEa3Ya9vZORWR+02Hf4PElKQVXE988uVJkKhNv1E=; b=EO6vpS+wlQiFO3zlanXtG7Heu/bODinkbLbk514iJ4JILXRp2jpkX/q+aCy0yUThQc nZuKSALXahCqCor/ES2+bSS6p85TCC1/HGn3pgh39lQMiNFGtLjMFAWZO15T88ywQVA1 MHgp61r/61zQhJvJSdXT5k2hb+fRU652WLGJ3CDBfSgFl+/b0F2proLMZ9IPm1Fa132/ oW9VVXqEjdedcXJMs8TngwSVgk/8UPnTQX2dVLI2nGBjmgFyxuv6pIUD2OnS3POXXy2N yCiFP3+uJMQj57pcZiQA0tWPG4616LCHNoE+Hj+0VEeHVsiJBSoaTJQwUL1BJoC6gjxo TL+g== X-Gm-Message-State: AOJu0Yw1RCMoNc9lSsjqeQwtAk7e5EeuPcX7e2oUNya0jx3NA+ixmZw/ niL/gWMm3uQ4tya5JUuJ63p00yGnez76kbUwBjY= X-Google-Smtp-Source: AGHT+IEVV35CxukEiFQn/cYmyxU6BEdfE34XZ1aZx013D1BEiRn0N8mzvE0KYceG6ruCP6GwAij5FA== X-Received: by 2002:a05:6a00:1996:b0:68a:3b25:50cc with SMTP id d22-20020a056a00199600b0068a3b2550ccmr18516916pfl.30.1696982531191; Tue, 10 Oct 2023 17:02:11 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 14/20] dbus: add additional entries to CVE_PRODUCT Date: Tue, 10 Oct 2023 14:01:27 -1000 Message-Id: <0329ca7bb29cdd77cca93c4354e8e0e5de5e37d8.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188932 From: Emil Kronborg Andersen Signed-off-by: Emil Kronborg Andersen (cherry picked from commit d50b395ceff3f30c30a10dba94fb340a547e434f) Signed-off-by: Steve Sakoman --- meta/recipes-core/dbus/dbus_1.14.8.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/dbus/dbus_1.14.8.bb b/meta/recipes-core/dbus/dbus_1.14.8.bb index b6c245d40b..2dcbadd50b 100644 --- a/meta/recipes-core/dbus/dbus_1.14.8.bb +++ b/meta/recipes-core/dbus/dbus_1.14.8.bb @@ -184,4 +184,4 @@ do_install:class-nativesdk() { } BBCLASSEXTEND = "native nativesdk" -CVE_PRODUCT += "d-bus_project:d-bus" +CVE_PRODUCT += "d-bus_project:d-bus freedesktop:dbus freedesktop:libdbus" From patchwork Wed Oct 11 00:01:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31967 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4BBE0CD98E0 for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-oi1-f171.google.com (mail-oi1-f171.google.com [209.85.167.171]) by mx.groups.io with SMTP id smtpd.web10.5129.1696982533861301655 for ; Tue, 10 Oct 2023 17:02:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=bGSNrZ1n; spf=softfail (domain: sakoman.com, ip: 209.85.167.171, mailfrom: steve@sakoman.com) Received: by mail-oi1-f171.google.com with SMTP id 5614622812f47-3af608eb367so4550876b6e.2 for ; Tue, 10 Oct 2023 17:02:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982533; x=1697587333; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=l45FllrHOs2ubLJNLB93qEbYTMYiyJANMAToegzS1+s=; b=bGSNrZ1nKvok0gmpD1kgHuUH1LlVfCWCqwpgVThQmfDBg5hNqerk0XMci5QVOAvFmC JZNWa0QHLfFJ7aG+H6rHVggOMWCE5kwWIGRmjRcVYtmYbT2camcOqlpxsQJgK5Z1WE2p blOAB38OY5cFFYMzX+n57859b0RkvQV7QlMhWZSAlAVmn3BL1wc2Rw/Pe7UtFGVnTA5/ tcO1hJoP8hfGy7X/jcfIikdgNeGLD4dwSem0h9KZx63s7UBfIJD8niI1WLtSlXYKZkh7 63YutNyB/TTOAYhywTUrYBkFezKSD9lzvHjtA4SZHiG5Hr4enEZlT2ulPmAiE5aeWUi3 LBaQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982533; x=1697587333; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=l45FllrHOs2ubLJNLB93qEbYTMYiyJANMAToegzS1+s=; b=jW1kYALX5bm7f3G8+ImnkWMqkp4Lt/Z1vkpNT7rKVk6iXLHjlZB/EwG9X0BSCUfLwH guS246cqGnpEnl9rXhrsuq4B4bnmHkVdmU5i/MootDAkHps8FB4J0kMhPHg/bG7snKJX Pvass7SH2C+AcR20x6wXG89iPR9Gh0X6xtNGL0ukMzEswzpfQasUpfLJctVg7ojBvKiA J0Hgo9H9caJoaVUd8WyUjCPyCe++fCkZkBbTO1BqzCcRjF5SkbQLom6DhEUQXjG+oo8p RysHYI05o0GJHInIsyRa6urfOpWSP+31Wpga2WLv4z/PKi34y+695CC96wSYDL6EuQay v3xw== X-Gm-Message-State: AOJu0YwbzB44ZMdFpb6YpJ2dSX1IN2nDb1F/NHWnh5BD8GLyP1QzBF8x /n6NYWN0np7SIGB1fNfFhdDxnL1rwekseiZ+dJ0= X-Google-Smtp-Source: AGHT+IHPlgkpPMbA1Xfyvk/gtD0APMHrwBMjE85J+ubN3oxR3sqZLB4sJWX2u7sH+RFgAqraf/Q9hQ== X-Received: by 2002:a05:6358:880e:b0:143:8e40:917b with SMTP id hv14-20020a056358880e00b001438e40917bmr21329586rwb.9.1696982532809; Tue, 10 Oct 2023 17:02:12 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:12 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 15/20] libxkbcommon: add CVE_PRODUCT Date: Tue, 10 Oct 2023 14:01:28 -1000 Message-Id: <7d395b97e864bb081866eb029168aee7335ed98e.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188933 From: Emil Kronborg Andersen Signed-off-by: Emil Kronborg Andersen (cherry picked from commit a23a4a3f156f5758dc4d9dcf1ab27c74302eb2a8) Signed-off-by: Steve Sakoman --- meta/recipes-graphics/xorg-lib/libxkbcommon_1.5.0.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-graphics/xorg-lib/libxkbcommon_1.5.0.bb b/meta/recipes-graphics/xorg-lib/libxkbcommon_1.5.0.bb index 01966c8973..62e9b158e4 100644 --- a/meta/recipes-graphics/xorg-lib/libxkbcommon_1.5.0.bb +++ b/meta/recipes-graphics/xorg-lib/libxkbcommon_1.5.0.bb @@ -36,3 +36,5 @@ python populate_packages:prepend () { RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'x11', 'libx11-locale', 'libx11-compose-data', d)}" BBCLASSEXTEND += "native" + +CVE_PRODUCT += "xkbcommon:libxkbcommon" From patchwork Wed Oct 11 00:01:29 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31965 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 519A1CD98DD for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.5130.1696982535236758832 for ; Tue, 10 Oct 2023 17:02:15 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=FnSljOS1; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-692eed30152so4727068b3a.1 for ; Tue, 10 Oct 2023 17:02:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982534; x=1697587334; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qvvG4lvVQ3uKfKvRJgP6xLB/fkwWJe4dx/D0ewP4TEw=; b=FnSljOS16/ZE8yaGs4i4IK5EdV6zDLGVCfIPXIskkHnHNNaYVXKRA2x92JdS+/O0Lo kjmZM5EbpwXC9g2Vxc5+3QYocqG4R8ChwTC9dXaAF/s6Av6x8ksRHOSFbk8TwWdvA2F7 rfrCsM3GGZ0u471JSnFcEx8NO+U8gqukTfMg69V3eErEbxUPP9xy9eLaiEizdvyXqPvz Z4pMMYSbIs3Ptzh1M7web+QZJsnuOy39JdRe5jk6Nn5IUxGIsNVsMoyttn+n8EnqAcLG 2EVN9unJ2g7Tp90P6pBhieHPLPKlKQgIStKfo/Ah+Nfklk5Q4YFl9f8VhrSmutvlVY/V R+Kw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982534; x=1697587334; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qvvG4lvVQ3uKfKvRJgP6xLB/fkwWJe4dx/D0ewP4TEw=; b=LgyfpbHj+cRPZqGlj0mXDONh0n+AIUnpsxRWrXjeon2UW2irZkHeVMBddpG19I66Iv tdnfpAdoU5Hk4QCkT889oMuuU6z90lrDfm0B5UwKaPHHBdQhMeCHLLaFEhnQlaKI1F0+ OsFlwO+ojVjXy+Tf8WhNHctV1HzUDs0J5EAfFw2PNX4EhYwKBBeZBPzMkJDx7XZAMrVC ObkiJ6manbe1Q+23k5yiFRPLNP8XZv7AFmVnUj/Zbgpa85HU3f/bgaeMibMjz+YcqmMC 7VJVbk1MAYDhnvikr78bqOAfXp9Ewj0Vq7u/vqxKq71Hzy8Wv8OLDln5h63eZGHC551d BpXw== X-Gm-Message-State: AOJu0YzHO7c4HurvqrV+C6BJP+54efqTW/oJxOvCvPkS8vHZWp27K+7D zZVE7Ol2A0yxz55MENokX17/gSsKWi3QpBZ2e+M= X-Google-Smtp-Source: AGHT+IFvxAx7av0eEsfy0vxXn0jkvrLC6sn5osKEGy5zsTLSwVzioTJ4PYtrqtXh4+Vx29fqc6EGuA== X-Received: by 2002:a05:6a00:26d9:b0:68f:cf6f:e228 with SMTP id p25-20020a056a0026d900b0068fcf6fe228mr14578777pfw.23.1696982534353; Tue, 10 Oct 2023 17:02:14 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:14 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 16/20] oeqa selftest context.py: whitespace fix Date: Tue, 10 Oct 2023 14:01:29 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188934 From: Mikko Rapeli Signed-off-by: Mikko Rapeli (cherry picked from commit 8aed3ca405cb3cc5d346eb8da8b3307d93f75d5b) Signed-off-by: Steve Sakoman --- meta/lib/oeqa/selftest/context.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/context.py b/meta/lib/oeqa/selftest/context.py index 0a7a9da72a..6cf1bef212 100644 --- a/meta/lib/oeqa/selftest/context.py +++ b/meta/lib/oeqa/selftest/context.py @@ -216,14 +216,14 @@ class OESelftestTestContextExecutor(OETestContextExecutor): machines = [] bbpath = self.tc_kwargs['init']['td']['BBPATH'].split(':') - + for path in bbpath: found_machines = glob.glob(os.path.join(path, 'conf', 'machine', '*.conf')) if found_machines: for i in found_machines: # eg: '/home//poky/meta-intel/conf/machine/intel-core2-32.conf' machines.append(os.path.splitext(os.path.basename(i))[0]) - + return machines def _get_cases_paths(self, bbpath): From patchwork Wed Oct 11 00:01:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31968 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71D42CD98E5 for ; Wed, 11 Oct 2023 00:02:17 +0000 (UTC) Received: from mail-oo1-f50.google.com (mail-oo1-f50.google.com [209.85.161.50]) by mx.groups.io with SMTP id smtpd.web11.5193.1696982537106459953 for ; Tue, 10 Oct 2023 17:02:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=JZqyfm5G; spf=softfail (domain: sakoman.com, ip: 209.85.161.50, mailfrom: steve@sakoman.com) Received: by mail-oo1-f50.google.com with SMTP id 006d021491bc7-57bab4e9e1aso3758018eaf.3 for ; Tue, 10 Oct 2023 17:02:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982536; x=1697587336; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SIZVhHIKz+QCpP9yRSDz0KoUDKZkLN6GW5uUfkAaSgU=; b=JZqyfm5GnuHhnu00FLtzPrw+i4ftJAo67bdFCXa46IYQa+sbYd9R60hYoMIaIWwJ+9 OdtQkt86fnrOmDWAJRALq+Rc28RbFq0rh30bajHV95+Cs6sldJYWD1e0fbC+znSEgnJN Nxy2fTayU7dZVxQvpb66AOjSk0Q0DY1vbyJlIq34+l3ww2/tk+zW2uzJE6gY8SvU1whI XQmENL+Uv/+4/fZGA5yIY8Vsp7IEjC+tsjQHqv62u9ixRsGoRPEEDQoYz85zOOYDWwV+ zNytC84p2ROBVrBFsywqCBML1hLSKXD9aARtOl6aja3QQa4XzIuHFnnQqM97JH5cCPmP EeXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982536; x=1697587336; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=SIZVhHIKz+QCpP9yRSDz0KoUDKZkLN6GW5uUfkAaSgU=; b=Jh9nZWrCm640urRYCJMtqstk/sjSQiUKN/5gGWhbBGHYaXdt+8Rj3bqObkFYRFrODo cIENPboxrls6Vxl4KdNNe9IUdxRVR8p/NWu4QCUviOn9YNB+LVPdCJV3s0Pj0TUxgOfu NkPjusZP2xJh/wcfNg4LT9QuBt/KPz6+SXMRle0en2ID0Km661U4B3Fu9bs0JZHGleQb 4ZcTfy2WdU2GJs8NjsJlPy8lsXETtPwfnSKu8wij5FiRlTtwfr24CZekUCId52Pok7K8 W2f2c7+1Kx1HL+RxBuAeqO2LpjbnZYoaKVdWHKb47E9UwtNd8AG83HE6wfyVZQ9LevX/ EKdw== X-Gm-Message-State: AOJu0YwtKrbDtQScqSiVvZmMN7XDGUt6AMBgSc9xP2MUOzdfPTfG8nmZ rbtUajOuVWUCTvSzxcKuvNYrPzGn1i3jWWgJ3jQ= X-Google-Smtp-Source: AGHT+IFWXZssUOXVHaUAbH1ej7OpFCJOrBEanQ40cboe/vSQ8McU2m33BtALhysAwGfTE8XNZneZIg== X-Received: by 2002:a05:6358:919a:b0:143:5826:dece with SMTP id j26-20020a056358919a00b001435826decemr20501825rwa.25.1696982536081; Tue, 10 Oct 2023 17:02:16 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 17/20] oeqa selftest context.py: remove warning from missing meta-selftest Date: Tue, 10 Oct 2023 14:01:30 -1000 Message-Id: <70d2ceea48ef6ec04675e4e6a9c48ebc5bb78f52.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188935 From: Mikko Rapeli It's not a warning but a handled case and layer gets added automatically. Very few build configs have this layer enabled by default. Signed-off-by: Mikko Rapeli (cherry picked from commit 9a2493ea83f0b30578a819de05108502aaadc7f5) Signed-off-by: Steve Sakoman --- meta/lib/oeqa/selftest/context.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/selftest/context.py b/meta/lib/oeqa/selftest/context.py index 6cf1bef212..c98763735f 100644 --- a/meta/lib/oeqa/selftest/context.py +++ b/meta/lib/oeqa/selftest/context.py @@ -296,7 +296,7 @@ class OESelftestTestContextExecutor(OETestContextExecutor): os.chdir(builddir) if not "meta-selftest" in self.tc.td["BBLAYERS"]: - self.tc.logger.warning("meta-selftest layer not found in BBLAYERS, adding it") + self.tc.logger.info("meta-selftest layer not found in BBLAYERS, adding it") meta_selftestdir = os.path.join( self.tc.td["BBLAYERS_FETCH_DIR"], 'meta-selftest') if os.path.isdir(meta_selftestdir): From patchwork Wed Oct 11 00:01:31 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31971 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 64505CD98DD for ; Wed, 11 Oct 2023 00:02:27 +0000 (UTC) Received: from mail-pf1-f181.google.com (mail-pf1-f181.google.com [209.85.210.181]) by mx.groups.io with SMTP id smtpd.web10.5132.1696982538679369946 for ; Tue, 10 Oct 2023 17:02:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=pJV33uBM; spf=softfail (domain: sakoman.com, ip: 209.85.210.181, mailfrom: steve@sakoman.com) Received: by mail-pf1-f181.google.com with SMTP id d2e1a72fcca58-690fa0eea3cso5612840b3a.0 for ; Tue, 10 Oct 2023 17:02:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982538; x=1697587338; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=iH0dog1SzlDF8H1IUqNSBMKGDQMdim8qfQjv1HWmBOI=; b=pJV33uBMBW4BN7L5Gd9KSf4DdH9TwoYSuJYnWcyQeui2s0AIckPXZJrK1K7noYg3P2 alc8VQOWXweAE8ltLOaZf6Z32fS8VQXGDXUQRWvTY7MM9o3lD59IRF6NobZ+J8haJJk1 iiAU3Y7LnLLuFc6Sb6ybF65Orp3jnTzBz6+snFSZ6DqSoONSFcVztb2SbuSdwpBU7Oxk k0ApbFsNvtfefEtB93IQ0SPYc/IKOe2A3Nzp5N/aLyfBEWGRMw8P8f9kzr2tf9t6MIaO rTM7sW7oYCb2V62hsE4cSGIpJvxsaVhPecS/7/MmPBjULGk6BByQZ9pCuMRCWJuyVV0b LKnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982538; x=1697587338; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=iH0dog1SzlDF8H1IUqNSBMKGDQMdim8qfQjv1HWmBOI=; b=OWjejUIc7TLcw16gV5GzBzdcObbnjrW4+HR0mJylgag0c+bOoTym9CHjEZf50v0/rH S2Eu8/YzrYUEYMkX9nq9K+yAJrOkCpTduJ3a1txtqJ1l7JBlI4WsfRixzgoBZ2L42YqX ntj2JOq5chxml7LzlINgkhENrb2qkrIpZzS0IZqjIYvUvguyF1/5VdUVnY7gMQAxMygu sK7Z0/5igNcbWGyDoqs69x1NodnUhAIj7ol4OANIq/le5x+24e8qV0T4gAIKs+ngLvPM g1Y5MMdSDcU37pfkiS9NHFObNiFOAYf9nhs0EJAptcHfBUHYMTEXnuhYGhU4FhcJO4ib C13w== X-Gm-Message-State: AOJu0YyYoQmDrTZTqNkQtN9cRx26gmqI1Y7+OY8/HpCPnqk07YUxZ7fl WTyLMsBRpmxzo7Rxz5HlHDzN9HLjuDA3SkRKlTk= X-Google-Smtp-Source: AGHT+IH/73wEg2gXUxiGSn7C6IsqF3Gn6A32l4peL/TTpui9GmW+VJiq7RwqcOxsVvMr58oJHvIyYw== X-Received: by 2002:a05:6a00:1506:b0:693:3fa0:5ffb with SMTP id q6-20020a056a00150600b006933fa05ffbmr23763884pfu.21.1696982537684; Tue, 10 Oct 2023 17:02:17 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:17 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 18/20] oeqa selftest context.py: fix git commands and set branch name Date: Tue, 10 Oct 2023 14:01:31 -1000 Message-Id: <6461d37260ced7fd26a986878cc641f3d3937cff.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188936 From: Mikko Rapeli Check return values of each git command and set initial branch name to avoid this warning on every test run: NOTE: Starting bitbake server... hint: Using 'master' as the name for the initial branch. This default branch name hint: is subject to change. To configure the initial branch name to use in all hint: of your new repositories, which will suppress this warning, call: hint: hint: git config --global init.defaultBranch hint: hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and hint: 'development'. The just-created branch can be renamed via this command: hint: hint: git branch -m Signed-off-by: Mikko Rapeli (cherry picked from commit 5ec557467dda29309e25102b507bb919275bedbb) Signed-off-by: Steve Sakoman --- meta/lib/oeqa/selftest/context.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/selftest/context.py b/meta/lib/oeqa/selftest/context.py index c98763735f..8d864a0368 100644 --- a/meta/lib/oeqa/selftest/context.py +++ b/meta/lib/oeqa/selftest/context.py @@ -97,7 +97,7 @@ class OESelftestTestContext(OETestContext): oe.path.copytree(builddir + "/cache", newbuilddir + "/cache") oe.path.copytree(selftestdir, newselftestdir) - subprocess.check_output("git init; git add *; git commit -a -m 'initial'", cwd=newselftestdir, shell=True) + subprocess.check_output("git init -b main && git add * && git commit -a -m 'initial'", cwd=newselftestdir, shell=True) # Tried to used bitbake-layers add/remove but it requires recipe parsing and hence is too slow subprocess.check_output("sed %s/conf/bblayers.conf -i -e 's#%s#%s#g'" % (newbuilddir, selftestdir, newselftestdir), cwd=newbuilddir, shell=True) From patchwork Wed Oct 11 00:01:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31972 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 70114CD98E3 for ; Wed, 11 Oct 2023 00:02:27 +0000 (UTC) Received: from mail-oi1-f175.google.com (mail-oi1-f175.google.com [209.85.167.175]) by mx.groups.io with SMTP id smtpd.web11.5196.1696982540370986661 for ; Tue, 10 Oct 2023 17:02:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=jSRnjqZa; spf=softfail (domain: sakoman.com, ip: 209.85.167.175, mailfrom: steve@sakoman.com) Received: by mail-oi1-f175.google.com with SMTP id 5614622812f47-3af8b498d31so4785807b6e.1 for ; Tue, 10 Oct 2023 17:02:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982539; x=1697587339; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xpvDPDSWHJH6e50O68yVQVx7laM1nW4jmTMxpZlNpoY=; b=jSRnjqZaRk3LbtBc9dFDxcM8g8F3Mwahb1gtcqjMk/ONd7My219iI1U3n/f70oLhAD DePhvAlUSYZmsGUNPMgB5BotdEyet6VFhC5UdPNvZuGOALtfMSmWo2QgC1buTK3pPr4J PvJMK1kPJZbYW1OCO/oT6Cgul86wB4+tefctZUElUXKiRFkQMPYn7odqSU8BETZqv4b1 6NI4ppI/pQbcj+8AFrV0Qa8MHYAmY2OEjmYZzoIB9JehJ0p0AdO7Fo5TtjAtNeH7xsZv qvW1NjtOc64YiDZY4Rs1ujxe/h/IC7t49Tw8J4EV0gI6ozf4qU2yBs/qOKYkqZ1ucLqO E/DA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982539; x=1697587339; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=xpvDPDSWHJH6e50O68yVQVx7laM1nW4jmTMxpZlNpoY=; b=AwPaF321MJmohnRPFMF+ltCk+0+NfUm0NykkWV55Qe9NHzdmtaebaVKYAqKnu2sxxl 1yo5UOCfjxjKTl4C3Va+xhSGWRNpew6LbJca+0tbypIE6T+Kq8uVVIShHey81rLFuHJ7 lZfZ42Q+/CbID1RRBQsRvoFeCrRHuzqrMaW75aaR7XfG5s6n0NhxeoKh78vscmFlAE4m IyJx76qJU+YVH3NWRsAdmutEJ/6hppo+ST6n9xDbsc3YzIXfEGcjpGI6kmVWg9BZJKwJ LzYc5ryrDFQKI9FnavKySiJFptf001gg5oWHM1HO4+mldT4bA0Z4mAxNV4X5ZM8ZdEBo P+7A== X-Gm-Message-State: AOJu0Yy3rAlwiarxMHsecRDr3VBaPxAu9Wx9UmG6XApy09lV/jbcnHSr BKWARmtMJ0iwXk35LChUqUJ2xA1Rc0HJEmbYnTY= X-Google-Smtp-Source: AGHT+IHSg7NCn0VepJYZ7tDp8xt2278y+LpcLagvsAfnino8xUV2Eb9cG7YRmo38cMllwlQYZbwX0Q== X-Received: by 2002:a05:6358:94a6:b0:135:73b0:cc6c with SMTP id i38-20020a05635894a600b0013573b0cc6cmr22905064rwb.28.1696982539220; Tue, 10 Oct 2023 17:02:19 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:18 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 19/20] busybox: remove coreutils dependency in busybox-ptest Date: Tue, 10 Oct 2023 14:01:32 -1000 Message-Id: <0aa56e54e504d5bfd64ec31347fd5112840c05ec.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188937 From: Ross Burton A dependency on coreutils was added to busybox-ptest in oe-core 658c5ed to fix a test failure. The failure is because one of the start-stop-daemon tests is known to fail if /bin/false is busybox. Instead of failing, we can check if /bin/false is a symlink to busybox and skip the test if so. [ YOCTO #15068 ] Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 37482e404cf4dcf9360c29986ced8db78baf249b) Signed-off-by: Steve Sakoman --- meta/recipes-core/busybox/busybox.inc | 2 +- .../busybox/busybox/start-stop-false.patch | 35 +++++++++++++++++++ meta/recipes-core/busybox/busybox_1.36.1.bb | 1 + 3 files changed, 37 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-core/busybox/busybox/start-stop-false.patch diff --git a/meta/recipes-core/busybox/busybox.inc b/meta/recipes-core/busybox/busybox.inc index 582d87949e..f5d7c3f9c8 100644 --- a/meta/recipes-core/busybox/busybox.inc +++ b/meta/recipes-core/busybox/busybox.inc @@ -56,7 +56,7 @@ RDEPENDS:${PN} = "${@["", "busybox-inittab"][(d.getVar('VIRTUAL-RUNTIME_init_man inherit cml1 systemd update-rc.d ptest # busybox's unzip test case needs zip command, which busybox itself does not provide -RDEPENDS:${PN}-ptest = "zip coreutils" +RDEPENDS:${PN}-ptest = "zip" # internal helper def busybox_cfg(feature, tokens, cnf, rem): diff --git a/meta/recipes-core/busybox/busybox/start-stop-false.patch b/meta/recipes-core/busybox/busybox/start-stop-false.patch new file mode 100644 index 0000000000..3aef68329c --- /dev/null +++ b/meta/recipes-core/busybox/busybox/start-stop-false.patch @@ -0,0 +1,35 @@ +It's known that the final start-stop-daemon test fails if /bin/false is +actually a busybox symlink. Instead of failing, check if false is +busybox and adapt the expected output to match. + +Upstream-Status: Submitted [http://lists.busybox.net/pipermail/busybox/2023-August/090416.html] +Signed-off-by: Ross Burton + +diff --git a/testsuite/start-stop-daemon.tests b/testsuite/start-stop-daemon.tests +index 0757b1288..aa6e9cc41 100755 +--- a/testsuite/start-stop-daemon.tests ++++ b/testsuite/start-stop-daemon.tests +@@ -27,10 +27,18 @@ testing "start-stop-daemon without -x and -a" \ + # but at least it checks that pathname to exec() is correct + # + # NB: this fails if /bin/false is a busybox symlink: +-# busybox looks at argv[0] and says "qwerty: applet not found" +-testing "start-stop-daemon with both -x and -a" \ +- 'start-stop-daemon -S -x /bin/false -a qwerty false 2>&1; echo $?' \ +- "1\n" \ +- "" "" ++# busybox looks at argv[0] and says "qwerty: applet not found", so ++# skip the test if false is busybox. ++case $(readlink /bin/false) in ++ *busybox*) ++ echo "SKIPPED: start-stop-daemon with both -x and -a (need non-busybox false)" ++ ;; ++ *) ++ testing "start-stop-daemon with both -x and -a" \ ++ 'start-stop-daemon -S -x /bin/false -a qwerty false 2>&1; echo $?' \ ++ "1\n" \ ++ "" "" ++ ;; ++esac + + exit $FAILCOUNT diff --git a/meta/recipes-core/busybox/busybox_1.36.1.bb b/meta/recipes-core/busybox/busybox_1.36.1.bb index 968dce65e4..06eb9eb999 100644 --- a/meta/recipes-core/busybox/busybox_1.36.1.bb +++ b/meta/recipes-core/busybox/busybox_1.36.1.bb @@ -49,6 +49,7 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://0001-sysctl-ignore-EIO-of-stable_secret-below-proc-sys-ne.patch \ file://0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch \ file://0002-nslookup-sanitize-all-printed-strings-with-printable.patch \ + file://start-stop-false.patch \ " SRC_URI:append:libc-musl = " file://musl.cfg " # TODO http://lists.busybox.net/pipermail/busybox/2023-January/090078.html From patchwork Wed Oct 11 00:01:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 31970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 64569CD98E0 for ; Wed, 11 Oct 2023 00:02:27 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web11.5199.1696982542597088984 for ; Tue, 10 Oct 2023 17:02:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=e1mEdfdl; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-690bc3f82a7so4767993b3a.0 for ; Tue, 10 Oct 2023 17:02:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1696982542; x=1697587342; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Zc4UKL3dzwBPOrWwWnPHnDGaZZfQt0D9yISdIPSnz8Y=; b=e1mEdfdlDYJcmC9U7cWSPYX3hmmc8W2wf+GWJppFNIXuaykOQS48K5hXFA51Ql0DMV oI04uTd/Xp6ZC8N4pm4Tkc+HGiVusqhoXW0LcfQrPsHT/lQhx8JFFyGIj9nRoGFgvRbq ip3IguDAQpUB7xE3HRAh0jVLy1cdXkU3GTzUXGGfzOvk9Io+WRUcutCy6WFekitmRLVj o92VvEe2+IkfErJkgfIql6Lc6s54rT8tbcnoR0OBLY9rwsscJowM9U9fJAI4+vY3fSWV kDCQHj5URAAyEhs0NrzUxDNS9MNR8K0xeuPUETTK2HnBfwXscTAQ3fr0P4uoZkgm6hPi e4gg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696982542; x=1697587342; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Zc4UKL3dzwBPOrWwWnPHnDGaZZfQt0D9yISdIPSnz8Y=; b=lP69QSSQ9chkpv5u8xcExpMVg1hfh9qMXEbFsBYc3g8oivdB4/LoeHsXSHH9lO11pb srruuZdN78YhKvoQQ1TgZptpMMWHGlLGcAV4XnJmiKZSxtODdK+SleuXrA1kzn7+izR9 mLQ3sIgxKytJHeO/0eIzSWURpiw2E+c2h6K1m9JtM0SJQCzxWKO5rn1F58yLd2kZt3To 39xCLGMBqmO3VYNHuQJybvGR/e0v01aY2n/1G9SgGxy/q+SPDCMRuLRIJbmZqbPPQAqf JbGoTQ54+srYcUEE7wbzyQHx4mAZIYJjI/ONB23J2GSSZ+lwajypSOgE2qJHJAsw5aXQ Fs1w== X-Gm-Message-State: AOJu0YwXppknNt2BCFe1a3Nb3GhFrF7nSdDzxdfTIrjQt0B+yehWIbRS cmSUR4zuhw6VLVeRfGQ3MpklKbXpwiaRU/FDOR0= X-Google-Smtp-Source: AGHT+IHBDxb0Ri7sy1vpoewwc9zf+Z/Fo/woH2Mp0MGzGAYk/ZgaGCCrnWqkdydVg4JFLz7m9xTLrw== X-Received: by 2002:a05:6a21:197:b0:16b:cc6c:d728 with SMTP id le23-20020a056a21019700b0016bcc6cd728mr12972799pzb.44.1696982540892; Tue, 10 Oct 2023 17:02:20 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a9-20020a63bd09000000b005891f3af36asm10758222pgf.87.2023.10.10.17.02.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 17:02:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][mickledore 20/20] libgudev: explicitly disable tests and vapi Date: Tue, 10 Oct 2023 14:01:33 -1000 Message-Id: <24b711439bac3ed2c76711d2d562afae1e8eaea0.1696982312.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 11 Oct 2023 00:02:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188938 From: Ross Burton Explicitly disable the tests and vapi support instead of relying on defaults and missing dependencies. Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 575e2e29e00bb4492e7ee7f10b753e3f17982caa) Signed-off-by: Steve Sakoman --- meta/recipes-gnome/libgudev/libgudev_237.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-gnome/libgudev/libgudev_237.bb b/meta/recipes-gnome/libgudev/libgudev_237.bb index 5aa94e58f5..d3122de8a0 100644 --- a/meta/recipes-gnome/libgudev/libgudev_237.bb +++ b/meta/recipes-gnome/libgudev/libgudev_237.bb @@ -25,6 +25,8 @@ GTKDOC_MESON_OPTION = "gtk_doc" UPSTREAM_CHECK_URI = "http://ftp.gnome.org/pub/GNOME/sources/libgudev/" UPSTREAM_CHECK_REGEX = "(?P(\d+))" +EXTRA_OEMESON += "-Dtests=disabled -Dvapi=disabled" + # This isn't a GNOME-style version do gnome_verdir fails. Just return the # version as that is how the directory is structured. def gnome_verdir(v):