diff options
Diffstat (limited to 'meta/recipes-kernel')
48 files changed, 10622 insertions, 120 deletions
diff --git a/meta/recipes-kernel/blktrace/blktrace_git.bb b/meta/recipes-kernel/blktrace/blktrace_git.bb index 6903053b5b..2110bc75fa 100644 --- a/meta/recipes-kernel/blktrace/blktrace_git.bb +++ b/meta/recipes-kernel/blktrace/blktrace_git.bb @@ -1,4 +1,9 @@ SUMMARY = "Generates traces of I/O traffic on block devices" +DESCRIPTION = "blktrace is a block layer IO tracing mechanism which provides \ +detailed information about request queue operations up to user space. There \ +are three major components: a kernel component, a utility to record the i/o \ +trace information for the kernel to user space, and utilities to analyse and \ +view the trace information." HOMEPAGE = "http://brick.kernel.dk/snaps/" LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" @@ -9,7 +14,7 @@ SRCREV = "cca113f2fe0759b91fd6a0e10fdcda2c28f18a7e" PV = "1.2.0+git${SRCPV}" -SRC_URI = "git://git.kernel.dk/blktrace.git \ +SRC_URI = "git://git.kernel.dk/blktrace.git;branch=master \ file://ldflags.patch \ file://CVE-2018-10689.patch \ file://make-btt-scripts-python3-ready.patch \ diff --git a/meta/recipes-kernel/cryptodev/cryptodev-module_1.10.bb b/meta/recipes-kernel/cryptodev/cryptodev-module_1.10.bb index 552eb6abaa..d7c7918515 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-module_1.10.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-module_1.10.bb @@ -9,6 +9,9 @@ DEPENDS += "cryptodev-linux" SRC_URI += " \ file://0001-Disable-installing-header-file-provided-by-another-p.patch \ +file://0001-Fix-build-for-Linux-5.8-rc1.patch \ +file://0001-Fix-build-for-Linux-5.9-rc1.patch \ +file://fix-build-for-Linux-5.11-rc1.patch \ " EXTRA_OEMAKE='KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' diff --git a/meta/recipes-kernel/cryptodev/cryptodev.inc b/meta/recipes-kernel/cryptodev/cryptodev.inc index f99f8bc9f0..f02619cabe 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev.inc +++ b/meta/recipes-kernel/cryptodev/cryptodev.inc @@ -1,9 +1,14 @@ HOMEPAGE = "http://cryptodev-linux.org/" +DESCRIPTION = "Cryptodev-linux is a device that allows access to Linux kernel \ +cryptographic drivers; thus allowing of userspace applications to take advantage \ +of hardware accelerators. Cryptodev-linux is implemented as a standalone \ +module that requires no dependencies other than a stock linux kernel. Its \ +API is compatible with OpenBSD's cryptodev userspace API (/dev/crypto)." LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" -SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux \ +SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ " SRCREV = "a87053bee5680878c295b7d23cf0d7065576ac2b" diff --git a/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.8-rc1.patch b/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.8-rc1.patch new file mode 100644 index 0000000000..02c721a4f3 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.8-rc1.patch @@ -0,0 +1,49 @@ +From 9e765068582aae3696520346a7500322ca6cc2de Mon Sep 17 00:00:00 2001 +From: Joan Bruguera <joanbrugueram@gmail.com> +Date: Sat, 13 Jun 2020 19:46:44 +0200 +Subject: [PATCH] Fix build for Linux 5.8-rc1 + +See also: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9740ca4e95b43b91a4a848694a20d01ba6818f7b + https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da1c55f1b272f4bd54671d459b39ea7b54944ef9 + https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d8ed45c5dcd455fc5848d47f86883a1b872ac0d0 + +Signed-off-by: Joan Bruguera <joanbrugueram@gmail.com> + +Upstream-Status: Backport [9e765068582aae3696520346a7500322ca6cc2de] + +Signed-off-by: He Zhe <zhe.he@windriver.com> +--- + zc.c | 8 ++++++++ + 1 file changed, 8 insertions(+) + +diff --git a/zc.c b/zc.c +index ae464ff..2c286bb 100644 +--- a/zc.c ++++ b/zc.c +@@ -58,7 +58,11 @@ int __get_userbuf(uint8_t __user *addr, uint32_t len, int write, + return 0; + } + ++#if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 8, 0)) + down_read(&mm->mmap_sem); ++#else ++ mmap_read_lock(mm); ++#endif + #if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 6, 0)) + ret = get_user_pages(task, mm, + (unsigned long)addr, pgcount, write, 0, pg, NULL); +@@ -74,7 +78,11 @@ int __get_userbuf(uint8_t __user *addr, uint32_t len, int write, + (unsigned long)addr, pgcount, write ? FOLL_WRITE : 0, + pg, NULL, NULL); + #endif ++#if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 8, 0)) + up_read(&mm->mmap_sem); ++#else ++ mmap_read_unlock(mm); ++#endif + if (ret != pgcount) + return -EINVAL; + +-- +2.17.1 + diff --git a/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.9-rc1.patch b/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.9-rc1.patch new file mode 100644 index 0000000000..cf1c04df9e --- /dev/null +++ b/meta/recipes-kernel/cryptodev/files/0001-Fix-build-for-Linux-5.9-rc1.patch @@ -0,0 +1,42 @@ +From 2f5e08aebf9229599aae7f25db752f74221cd71d Mon Sep 17 00:00:00 2001 +From: Joan Bruguera <joanbrugueram@gmail.com> +Date: Fri, 14 Aug 2020 00:13:38 +0200 +Subject: [PATCH] Fix build for Linux 5.9-rc1 + +See also: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=64019a2e467a288a16b65ab55ddcbf58c1b00187 + https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bce617edecada007aee8610fbe2c14d10b8de2f6 + https://lore.kernel.org/lkml/CAHk-=wj_V2Tps2QrMn20_W0OJF9xqNh52XSGA42s-ZJ8Y+GyKw@mail.gmail.com/ + +Signed-off-by: Joan Bruguera <joanbrugueram@gmail.com> + +Upstream-Status: Backport [https://github.com/cryptodev-linux/cryptodev-linux/commit/2f5e08aebf9229599aae7f25db752f74221cd71d] + +Signed-off-by: Naveen Saini <naveen.kumar.saini@intel.com> + +--- + zc.c | 6 +++++- + 1 file changed, 5 insertions(+), 1 deletion(-) + +diff --git a/zc.c b/zc.c +index a560db5..fdf7da1 100644 +--- a/zc.c ++++ b/zc.c +@@ -76,10 +76,14 @@ int __get_userbuf(uint8_t __user *addr, uint32_t len, int write, + ret = get_user_pages_remote(task, mm, + (unsigned long)addr, pgcount, write ? FOLL_WRITE : 0, + pg, NULL); +-#else ++#elif (LINUX_VERSION_CODE < KERNEL_VERSION(5, 9, 0)) + ret = get_user_pages_remote(task, mm, + (unsigned long)addr, pgcount, write ? FOLL_WRITE : 0, + pg, NULL, NULL); ++#else ++ ret = get_user_pages_remote(mm, ++ (unsigned long)addr, pgcount, write ? FOLL_WRITE : 0, ++ pg, NULL, NULL); + #endif + #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 8, 0)) + up_read(&mm->mmap_sem); +-- +2.17.1 + diff --git a/meta/recipes-kernel/cryptodev/files/fix-build-for-Linux-5.11-rc1.patch b/meta/recipes-kernel/cryptodev/files/fix-build-for-Linux-5.11-rc1.patch new file mode 100644 index 0000000000..3ae77cb9d6 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/files/fix-build-for-Linux-5.11-rc1.patch @@ -0,0 +1,32 @@ +From 55c6315058fc0dd189ffd116f2cc27ba4fa84cb6 Mon Sep 17 00:00:00 2001 +From: Joan Bruguera <joanbrugueram@gmail.com> +Date: Mon, 28 Dec 2020 01:41:31 +0100 +Subject: [PATCH] Fix build for Linux 5.11-rc1 + +ksys_close was removed, as far as I can tell, close_fd replaces it. + +See also: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8760c909f54a82aaa6e76da19afe798a0c77c3c3 + https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1572bfdf21d4d50e51941498ffe0b56c2289f783 + +Upstream-Status: Backport [https://github.com/cryptodev-linux/cryptodev-linux/commit/55c6315058fc0dd189ffd116f2cc27ba4fa84cb6] +Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> +--- + ioctl.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +diff --git a/ioctl.c b/ioctl.c +index 3d332380..95481d4f 100644 +--- a/ioctl.c ++++ b/ioctl.c +@@ -871,8 +871,10 @@ cryptodev_ioctl(struct file *filp, unsigned int cmd, unsigned long arg_) + if (unlikely(ret)) { + #if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 17, 0)) + sys_close(fd); +-#else ++#elif (LINUX_VERSION_CODE < KERNEL_VERSION(5, 11, 0)) + ksys_close(fd); ++#else ++ close_fd(fd); + #endif + return ret; + } diff --git a/meta/recipes-kernel/dtc/dtc.inc b/meta/recipes-kernel/dtc/dtc.inc index 0650e3c82e..461ab8fbd3 100644 --- a/meta/recipes-kernel/dtc/dtc.inc +++ b/meta/recipes-kernel/dtc/dtc.inc @@ -5,9 +5,11 @@ SECTION = "bootloader" LICENSE = "GPLv2 | BSD" DEPENDS = "flex-native bison-native" -SRC_URI = "git://git.kernel.org/pub/scm/utils/dtc/dtc.git \ +SRC_URI = "git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=master \ file://make_install.patch \ + file://0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch \ " + UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" EXTRA_OEMAKE='NO_PYTHON=1 PREFIX="${prefix}" LIBDIR="${libdir}" DESTDIR="${D}"' diff --git a/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch b/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch new file mode 100644 index 0000000000..a2deb12d4b --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch @@ -0,0 +1,36 @@ +From f0119060ef1b9bd80e2cae487df1e4aedffb0e9b Mon Sep 17 00:00:00 2001 +From: Oleksiy Obitotskyy <oobitots@cisco.com> +Date: Fri, 22 Jan 2021 09:12:48 +0200 +Subject: [PATCH] dtc: Fix Makefile to add CFLAGS not override + +Makefile override CFLAGS not extend them, so some of them +missing. Sources builds out of kernel tree and probably not all +options could be used (?). We need at least -fmacro-prefix-map/ +debug-prefix-map to eliminate absolute path in binaries. + +Upstream-Status: Pending +Signed-off-by: Oleksiy Obitotskyy <oobitots@cisco.com> +--- + Makefile | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/Makefile b/Makefile +index 35d936f..b5b13cf 100644 +--- a/Makefile ++++ b/Makefile +@@ -20,10 +20,10 @@ CONFIG_LOCALVERSION = + # See libfdt_internal.h for details + ASSUME_MASK ?= 0 + +-CPPFLAGS = -I libfdt -I . -DFDT_ASSUME_MASK=$(ASSUME_MASK) ++CPPFLAGS += -I libfdt -I . -DFDT_ASSUME_MASK=$(ASSUME_MASK) + WARNINGS = -Wall -Wpointer-arith -Wcast-qual -Wnested-externs \ + -Wstrict-prototypes -Wmissing-prototypes -Wredundant-decls -Wshadow +-CFLAGS = -g -Os $(SHAREDLIB_CFLAGS) -Werror $(WARNINGS) $(EXTRA_CFLAGS) ++CFLAGS += -g -Os $(SHAREDLIB_CFLAGS) -Werror $(WARNINGS) $(EXTRA_CFLAGS) + + BISON = bison + LEX = flex +-- +2.25.1 + diff --git a/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch b/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch new file mode 100644 index 0000000000..ec825cbf7b --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch @@ -0,0 +1,35 @@ +From 4827e0db6c4f7dea7f4094f49d3bb48ef6dfdc2d Mon Sep 17 00:00:00 2001 +From: David Gibson <david@gibson.dropbear.id.au> +Date: Wed, 6 Jan 2021 14:52:26 +1100 +Subject: [PATCH] fdtdump: Fix gcc11 warning + +In one place, fdtdump abuses fdt_set_magic(), passing it just a small char +array instead of the full fdt header it expects. That's relying on the +fact that in fact fdt_set_magic() will only actually access the first 4 +bytes of the buffer. + +This trips a new warning in GCC 11 - and it's entirely possible it was +always UB. So, don't do that. + +Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/patch/?id=ca16a723fa9dde9c5da80dba567f48715000e77c] +Signed-off-by: David Gibson <david@gibson.dropbear.id.au> +--- + fdtdump.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/fdtdump.c b/fdtdump.c +index 9613bef..d9fb374 100644 +--- a/fdtdump.c ++++ b/fdtdump.c +@@ -217,7 +217,7 @@ int main(int argc, char *argv[]) + char *p = buf; + char *endp = buf + len; + +- fdt_set_magic(smagic, FDT_MAGIC); ++ fdt32_st(smagic, FDT_MAGIC); + + /* poor man's memmem */ + while ((endp - p) >= FDT_MAGIC_SIZE) { +-- +2.30.1 + diff --git a/meta/recipes-kernel/dtc/dtc_1.6.0.bb b/meta/recipes-kernel/dtc/dtc_1.6.0.bb index 92df70d9fc..a407137859 100644 --- a/meta/recipes-kernel/dtc/dtc_1.6.0.bb +++ b/meta/recipes-kernel/dtc/dtc_1.6.0.bb @@ -5,6 +5,8 @@ LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ SRCREV = "2525da3dba9beceb96651dc2986581871dbeca30" +SRC_URI += "file://0001-fdtdump-Fix-gcc11-warning.patch" + S = "${WORKDIR}/git" BBCLASSEXTEND = "native nativesdk" diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate new file mode 100644 index 0000000000..2aa57851c7 --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate @@ -0,0 +1,20 @@ +#!/bin/sh +# dt-doc-validate wrapper to allow kernel dt-validation to pass +# +# Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> +# License: MIT (see COPYING.MIT at the root of the repository for terms) + +for arg; do + case "$arg" in + --version) + echo "v2021.10" + ;; + esac +done + +# TBD: left for future consideration +# exec dt-doc-validate.real "$@" + +# we always succeed +exit 0 + diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema new file mode 100644 index 0000000000..24b89d8619 --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema @@ -0,0 +1,20 @@ +#!/bin/sh +# dt-mk-schema wrapper to allow kernel dt-validation to pass +# +# Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> +# License: MIT (see COPYING.MIT at the root of the repository for terms) + +for arg; do + case "$arg" in + --version) + echo "v2021.10" + ;; + esac +done + +# TBD: left for future consideration +# exec dt-mk-schema.real "$@" + +# we always succeed +exit 0 + diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate new file mode 100644 index 0000000000..8a4710a7ed --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate @@ -0,0 +1,20 @@ +#!/bin/sh +# dt-validate wrapper to allow kernel dt-validation to pass +# +# Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> +# License: MIT (see COPYING.MIT at the root of the repository for terms) + +for arg; do + case "$arg" in + --version) + echo "v2021.10" + ;; + esac +done + +# TBD: left for future consideration +# exec dt-validate.real "$@" + +# we always succeed +exit 0 + diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb new file mode 100644 index 0000000000..c869274d09 --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb @@ -0,0 +1,17 @@ +DESCRIPTION = "Wrapper for tooling for devicetree validation using YAML and jsonschema" +HOMEPAGE = "https://yoctoproject.org" +LICENSE = "MIT" +LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" + +SRC_URI = "file://dt-doc-validate \ + file://dt-mk-schema \ + file://dt-validate" + +do_install() { + install -d ${D}${bindir}/ + install -m 755 ${WORKDIR}/dt-doc-validate ${D}${bindir}/ + install -m 755 ${WORKDIR}/dt-mk-schema ${D}${bindir}/ + install -m 755 ${WORKDIR}/dt-validate ${D}${bindir}/ +} + +BBCLASSEXTEND = "native nativesdk" diff --git a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb index 4f1af731d6..82d678e509 100644 --- a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb +++ b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb @@ -1,4 +1,8 @@ SUMMARY = "Tools for managing Yocto Project style branched kernels" +DESCRIPTION = "Powerful set of tools or managing Yocto Linux kernel sources \ +and configuration data. You can use these tools to make a single configuration \ +change, apply multiple patches, or work with your own kernel sources." +HOMEPAGE = "https://www.yoctoproject.org/" LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://tools/kgit;beginline=5;endline=9;md5=9c30e971d435e249624278c3e343e501" @@ -10,7 +14,7 @@ PV = "0.2+git${SRCPV}" inherit native -SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git" +SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master" S = "${WORKDIR}/git" UPSTREAM_CHECK_COMMITS = "1" diff --git a/meta/recipes-kernel/kexec/kexec-tools_2.0.20.bb b/meta/recipes-kernel/kexec/kexec-tools_2.0.20.bb index 871b36440f..206c6ccae7 100644 --- a/meta/recipes-kernel/kexec/kexec-tools_2.0.20.bb +++ b/meta/recipes-kernel/kexec/kexec-tools_2.0.20.bb @@ -30,6 +30,9 @@ inherit autotools update-rc.d systemd export LDFLAGS = "-L${STAGING_LIBDIR}" EXTRA_OECONF = " --with-zlib=yes" +# affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47. +CVE_CHECK_WHITELIST += "CVE-2021-20269" + do_compile_prepend() { # Remove the prepackaged config.h from the source tree as it overrides # the same file generated by configure and placed in the build tree diff --git a/meta/recipes-kernel/kmod/kmod.inc b/meta/recipes-kernel/kmod/kmod.inc index 334453838e..631b50658a 100644 --- a/meta/recipes-kernel/kmod/kmod.inc +++ b/meta/recipes-kernel/kmod/kmod.inc @@ -4,7 +4,7 @@ SUMMARY = "Tools for managing Linux kernel modules" DESCRIPTION = "kmod is a set of tools to handle common tasks with Linux kernel modules like \ insert, remove, list, check properties, resolve dependencies and aliases." -HOMEPAGE = "http://packages.profusion.mobi/kmod/" +HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kmod/" LICENSE = "GPL-2.0+ & LGPL-2.1+" LICENSE_libkmod = "LGPL-2.1+" SECTION = "base" @@ -18,7 +18,7 @@ SRCREV = "58133a96c894c043e48c74ddf0bfe8db90bac62f" # Lookout for PV bump too when SRCREV is changed PV = "26" -SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git \ +SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;branch=master \ file://depmod-search.conf \ file://0001-build-Stop-using-dolt.patch \ file://avoid_parallel_tests.patch \ @@ -26,7 +26,6 @@ SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git \ S = "${WORKDIR}/git" -EXTRA_AUTORECONF += "--install --symlink" EXTRA_OECONF +=" --enable-tools --with-zlib" PACKAGECONFIG[debug] = "--enable-debug,--disable-debug" diff --git a/meta/recipes-kernel/kmod/kmod/ptest.patch b/meta/recipes-kernel/kmod/kmod/ptest.patch deleted file mode 100644 index 831dbcb909..0000000000 --- a/meta/recipes-kernel/kmod/kmod/ptest.patch +++ /dev/null @@ -1,25 +0,0 @@ -Add 'install-ptest' rule. - -Signed-off-by: Tudor Florea <tudor.florea@enea.com> -Upstream-Status: Pending - -diff -ruN a/Makefile.am b/Makefile.am ---- a/Makefile.am 2013-07-12 17:11:05.278331557 +0200 -+++ b/Makefile.am 2013-07-12 17:14:27.033788016 +0200 -@@ -204,6 +204,16 @@ - - distclean-local: $(DISTCLEAN_LOCAL_HOOKS) - -+install-ptest: -+ @$(MKDIR_P) $(DESTDIR)/testsuite -+ @for file in $(TESTSUITE); do \ -+ install $$file $(DESTDIR)/testsuite; \ -+ done; -+ @sed -e 's/^Makefile/_Makefile/' < Makefile > $(DESTDIR)/Makefile -+ @$(MKDIR_P) $(DESTDIR)/tools -+ @cp $(noinst_SCRIPTS) $(noinst_PROGRAMS) $(DESTDIR)/tools -+ @cp -r testsuite/rootfs testsuite/.libs $(DESTDIR)/testsuite -+ - # ------------------------------------------------------------------------------ - # custom release helpers - # ------------------------------------------------------------------------------ diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20200619.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20240220.bb index bf25ff8b70..873ba9cdf0 100644 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20200619.bb +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20240220.bb @@ -1,4 +1,8 @@ SUMMARY = "Firmware files for use with Linux kernel" +HOMEPAGE = "https://www.kernel.org/" +DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ +that contains firmware binary blobs necessary for partial or full functionality \ +of certain hardware devices." SECTION = "kernel" LICENSE = "\ @@ -23,7 +27,6 @@ LICENSE = "\ & Firmware-go7007 \ & Firmware-GPLv2 \ & Firmware-hfi1_firmware \ - & Firmware-i2400m \ & Firmware-i915 \ & Firmware-ibt_firmware \ & Firmware-ice \ @@ -31,6 +34,7 @@ LICENSE = "\ & Firmware-iwlwifi_firmware \ & Firmware-IntcSST2 \ & Firmware-kaweth \ + & Firmware-Lontium \ & Firmware-Marvell \ & Firmware-moxa \ & Firmware-myri10ge_firmware \ @@ -41,6 +45,7 @@ LICENSE = "\ & Firmware-phanfw \ & Firmware-qat \ & Firmware-qcom \ + & Firmware-qcom-yamato \ & Firmware-qla1280 \ & Firmware-qla2xxx \ & Firmware-qualcommAthos_ar3k \ @@ -52,7 +57,6 @@ LICENSE = "\ & Firmware-rtlwifi_firmware \ & Firmware-imx-sdma_firmware \ & Firmware-siano \ - & Firmware-tda7706-firmware \ & Firmware-ti-connectivity \ & Firmware-ti-keystone \ & Firmware-ueagle-atm4-firmware \ @@ -67,8 +71,8 @@ LICENSE = "\ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ - file://LICENSE.amdgpu;md5=d357524f5099e2a3db3c1838921c593f \ - file://LICENSE.amd-ucode;md5=3c5399dc9148d7f0e1f41e34b69cf14f \ + file://LICENSE.amdgpu;md5=a2589a05ea5b6bd2b7f4f623c7e7a649 \ + file://LICENSE.amd-ucode;md5=6ca90c57f7b248de1e25c7f68ffc4698 \ file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ file://LICENCE.atheros_firmware;md5=30a14c7823beedac9fa39c64fdd01a13 \ file://LICENSE.atmel;md5=aa74ac0c60595dee4d4e239107ea77a3 \ @@ -86,14 +90,14 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ file://LICENCE.go7007;md5=c0bb9f6aaaba55b0529ee9b30aa66beb \ file://GPL-2;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ file://LICENSE.hfi1_firmware;md5=5e7b6e586ce7339d12689e49931ad444 \ - file://LICENCE.i2400m;md5=14b901969e23c41881327c0d9e4b7d36 \ file://LICENSE.i915;md5=2b0b2e0d20984affd4490ba2cba02570 \ file://LICENCE.ibt_firmware;md5=fdbee1ddfe0fb7ab0b2fcd6b454a366b \ file://LICENSE.ice;md5=742ab4850f2670792940e6d15c974b2f \ file://LICENCE.IntcSST2;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ file://LICENCE.it913x;md5=1fbf727bfb6a949810c4dbfa7e6ce4f8 \ - file://LICENCE.iwlwifi_firmware;md5=3fd842911ea93c29cd32679aa23e1c88 \ + file://LICENCE.iwlwifi_firmware;md5=2ce6786e0fc11ac6e36b54bb9b799f1b \ file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ + file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ file://LICENCE.moxa;md5=1086614767d8ccf744a923289d3d4261 \ @@ -104,8 +108,9 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ file://LICENCE.OLPC;md5=5b917f9d8c061991be4f6f5f108719cd \ file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ file://LICENCE.phanfw;md5=954dcec0e051f9409812b561ea743bfa \ - file://LICENCE.qat_firmware;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ + file://LICENCE.qat_firmware;md5=72de83dfd9b87be7685ed099a39fbea4 \ file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ + file://LICENSE.qcom_yamato;md5=d0de0eeccaf1843a850bf7a6777eec5c \ file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ file://LICENSE.QualcommAtheros_ar3k;md5=b5fe244fb2b532311de1472a3bc06da5 \ @@ -117,7 +122,6 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ - file://LICENCE.tda7706-firmware.txt;md5=835997cf5e3c131d0dddd695c7d9103e \ file://LICENCE.ti-connectivity;md5=c5e02be633f1499c109d1652514d85ec \ file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ @@ -126,8 +130,11 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ - file://WHENCE;md5=d373d30188c38dabffec0d3cc87abbfd \ + file://WHENCE;md5=${WHENCE_CHKSUM} \ " +# WHENCE checksum is defined separately to ease overriding it if +# class-devupstream is selected. +WHENCE_CHKSUM = "a344e6c28970fc7daafa81c10247aeb6" # These are not common licenses, set NO_GENERIC_LICENSE for them # so that the license files will be copied from fetched source @@ -153,7 +160,6 @@ NO_GENERIC_LICENSE[Firmware-fw_sst_0f28] = "LICENCE.fw_sst_0f28" NO_GENERIC_LICENSE[Firmware-go7007] = "LICENCE.go7007" NO_GENERIC_LICENSE[Firmware-GPLv2] = "GPL-2" NO_GENERIC_LICENSE[Firmware-hfi1_firmware] = "LICENSE.hfi1_firmware" -NO_GENERIC_LICENSE[Firmware-i2400m] = "LICENCE.i2400m" NO_GENERIC_LICENSE[Firmware-i915] = "LICENSE.i915" NO_GENERIC_LICENSE[Firmware-ibt_firmware] = "LICENCE.ibt_firmware" NO_GENERIC_LICENSE[Firmware-ice] = "LICENSE.ice" @@ -161,6 +167,7 @@ NO_GENERIC_LICENSE[Firmware-IntcSST2] = "LICENCE.IntcSST2" NO_GENERIC_LICENSE[Firmware-it913x] = "LICENCE.it913x" NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" +NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" NO_GENERIC_LICENSE[Firmware-moxa] = "LICENCE.moxa" @@ -172,6 +179,7 @@ NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" +NO_GENERIC_LICENSE[Firmware-qcom-yamato] = "LICENSE.qcom_yamato" NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" NO_GENERIC_LICENSE[Firmware-qualcommAthos_ar3k] = "LICENSE.QualcommAtheros_ar3k" @@ -183,7 +191,6 @@ NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" NO_GENERIC_LICENSE[Firmware-rtlwifi_firmware] = "LICENCE.rtlwifi_firmware.txt" NO_GENERIC_LICENSE[Firmware-siano] = "LICENCE.siano" NO_GENERIC_LICENSE[Firmware-imx-sdma_firmware] = "LICENSE.sdma_firmware" -NO_GENERIC_LICENSE[Firmware-tda7706-firmware] = "LICENCE.tda7706-firmware.txt" NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" @@ -196,9 +203,16 @@ NO_GENERIC_LICENSE[WHENCE] = "WHENCE" PE = "1" -SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz" +SRC_URI = "\ + ${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz \ +" + +BBCLASSEXTEND = "devupstream:target" +SRC_URI:class-devupstream = "git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git;protocol=https;branch=main" +# Pin this to the 20220509 release, override this in local.conf +SRCREV:class-devupstream ?= "b19cbdca78ab2adfd210c91be15a22568e8b8cae" -SRC_URI[sha256sum] = "962d3ae197d226c8259f9cc7746f7ef12a9d23787cd56bd27302021ba6339722" +SRC_URI[sha256sum] = "bf0f239dc0801e9d6bf5d5fb3e2f549575632cf4688f4348184199cb02c2bcd7" inherit allarch @@ -209,7 +223,8 @@ do_compile() { } do_install() { - oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install + # install-nodedup avoids rdfind dependency + oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install-nodedup cp GPL-2 LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ } @@ -218,12 +233,14 @@ PACKAGES =+ "${PN}-ralink-license ${PN}-ralink \ ${PN}-mt7601u-license ${PN}-mt7601u \ ${PN}-radeon-license ${PN}-radeon \ ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ - ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 ${PN}-sd8887 ${PN}-sd8897 \ - ${PN}-usb8997 \ + ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ + ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx \ ${PN}-vt6656-license ${PN}-vt6656 \ + ${PN}-rs9113 ${PN}-rs9116 \ ${PN}-rtl-license ${PN}-rtl8188 ${PN}-rtl8192cu ${PN}-rtl8192ce ${PN}-rtl8192su ${PN}-rtl8723 ${PN}-rtl8821 \ ${PN}-rtl8168 \ + ${PN}-rtl8822 \ ${PN}-cypress-license \ ${PN}-broadcom-license \ ${PN}-bcm-0bb4-0306 \ @@ -261,7 +278,7 @@ PACKAGES =+ "${PN}-ralink-license ${PN}-ralink \ ${PN}-bcm43xx-hdr \ ${PN}-atheros-license ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k \ ${PN}-gplv2-license ${PN}-carl9170 \ - ${PN}-ar3k-license ${PN}-ar3k ${PN}-ath10k-license ${PN}-ath10k ${PN}-qca \ + ${PN}-ar3k-license ${PN}-ar3k ${PN}-ath10k-license ${PN}-ath10k ${PN}-ath11k ${PN}-qca \ \ ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ \ @@ -288,12 +305,27 @@ PACKAGES =+ "${PN}-ralink-license ${PN}-ralink \ ${PN}-adsp-sst-license ${PN}-adsp-sst \ ${PN}-bnx2-mips \ ${PN}-liquidio \ + ${PN}-nvidia-license \ + ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ + ${PN}-nvidia-gpu \ ${PN}-netronome-license ${PN}-netronome \ ${PN}-qat ${PN}-qat-license \ - ${PN}-qcom-license \ - ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 \ - ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a530 ${PN}-qcom-adreno-a630 \ - ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute ${PN}-qcom-sdm845-modem \ + ${PN}-qcom-license ${PN}-qcom-yamato-license \ + ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 \ + ${PN}-qcom-vpu-1.0 ${PN}-qcom-vpu-2.0 \ + ${PN}-qcom-adreno-a2xx ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a4xx ${PN}-qcom-adreno-a530 \ + ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 \ + ${PN}-qcom-apq8016-modem ${PN}-qcom-apq8016-wifi \ + ${PN}-qcom-apq8096-adreno ${PN}-qcom-apq8096-audio ${PN}-qcom-apq8096-modem \ + ${PN}-qcom-sc8280xp-lenovo-x13s-compat \ + ${PN}-qcom-sc8280xp-lenovo-x13s-audio \ + ${PN}-qcom-sc8280xp-lenovo-x13s-adreno \ + ${PN}-qcom-sc8280xp-lenovo-x13s-compute \ + ${PN}-qcom-sc8280xp-lenovo-x13s-sensors \ + ${PN}-qcom-sdm845-adreno ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute ${PN}-qcom-sdm845-modem \ + ${PN}-qcom-sm8250-adreno ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ + ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ + ${PN}-lt9611uxc ${PN}-lontium-license \ ${PN}-whence-license \ ${PN}-license \ " @@ -336,7 +368,7 @@ FILES_${PN}-carl9170 = " \ RDEPENDS_${PN}-carl9170 += "${PN}-gplv2-license" # For QualCommAthos -LICENSE_${PN}-ar3k = "Firmware-qualcommAthos_ar3k" +LICENSE_${PN}-ar3k = "Firmware-qualcommAthos_ar3k & Firmware-atheros_firmware" LICENSE_${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" LICENSE_${PN}-ath10k = "Firmware-qualcommAthos_ath10k" LICENSE_${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" @@ -352,12 +384,17 @@ FILES_${PN}-ath10k = " \ ${nonarch_base_libdir}/firmware/ath10k \ " +FILES_${PN}-ath11k = " \ + ${nonarch_base_libdir}/firmware/ath11k \ +" + FILES_${PN}-qca = " \ ${nonarch_base_libdir}/firmware/qca \ " -RDEPENDS_${PN}-ar3k += "${PN}-ar3k-license" +RDEPENDS_${PN}-ar3k += "${PN}-ar3k-license ${PN}-atheros-license" RDEPENDS_${PN}-ath10k += "${PN}-ath10k-license" +RDEPENDS_${PN}-ath11k += "${PN}-ath10k-license" RDEPENDS_${PN}-qca += "${PN}-ath10k-license" # For ralink @@ -377,7 +414,7 @@ LICENSE_${PN}-mt7601u-license = "Firmware-ralink_a_mediatek_company_firmware" FILES_${PN}-mt7601u-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_mediatek_company_firmware" FILES_${PN}-mt7601u = " \ - ${nonarch_base_libdir}/firmware/mt7601u.bin \ + ${nonarch_base_libdir}/firmware/mediatek/mt7601u.bin \ " RDEPENDS_${PN}-mt7601u += "${PN}-mt7601u-license" @@ -393,6 +430,12 @@ FILES_${PN}-radeon = " \ RDEPENDS_${PN}-radeon += "${PN}-radeon-license" +# For lontium +LICENSE_${PN}-lt9611uxc = "Firmware-Lontium" + +FILES_${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" +FILES_${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin" + # For marvell LICENSE_${PN}-pcie8897 = "Firmware-Marvell" LICENSE_${PN}-pcie8997 = "Firmware-Marvell" @@ -403,6 +446,7 @@ LICENSE_${PN}-sd8797 = "Firmware-Marvell" LICENSE_${PN}-sd8801 = "Firmware-Marvell" LICENSE_${PN}-sd8887 = "Firmware-Marvell" LICENSE_${PN}-sd8897 = "Firmware-Marvell" +LICENSE_${PN}-sd8997 = "Firmware-Marvell" LICENSE_${PN}-usb8997 = "Firmware-Marvell" LICENSE_${PN}-marvell-license = "Firmware-Marvell" @@ -438,6 +482,15 @@ FILES_${PN}-sd8887 = " \ FILES_${PN}-sd8897 = " \ ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin \ " +do_install_append() { + # The kernel 5.6.x driver still uses the old name, provide a symlink for + # older kernels + ln -fs sdsd8997_combo_v4.bin ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin +} +FILES_${PN}-sd8997 = " \ + ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin \ + ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin \ +" FILES_${PN}-usb8997 = " \ ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin \ " @@ -449,6 +502,7 @@ RDEPENDS_${PN}-sd8797 += "${PN}-marvell-license" RDEPENDS_${PN}-sd8801 += "${PN}-marvell-license" RDEPENDS_${PN}-sd8887 += "${PN}-marvell-license" RDEPENDS_${PN}-sd8897 += "${PN}-marvell-license" +RDEPENDS_${PN}-sd8997 += "${PN}-marvell-license" RDEPENDS_${PN}-usb8997 += "${PN}-marvell-license" # For netronome @@ -462,10 +516,49 @@ FILES_${PN}-netronome = " \ ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw \ ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw \ ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw \ + ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw \ + ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw \ + ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw \ + ${nonarch_base_libdir}/firmware/netronome/bpf \ + ${nonarch_base_libdir}/firmware/netronome/flower \ + ${nonarch_base_libdir}/firmware/netronome/nic \ + ${nonarch_base_libdir}/firmware/netronome/nic-sriov \ " RDEPENDS_${PN}-netronome += "${PN}-netronome-license" +# For Nvidia +LICENSE_${PN}-nvidia-gpu = "Firmware-nvidia" +LICENSE_${PN}-nvidia-tegra = "Firmware-nvidia" +LICENSE_${PN}-nvidia-tegra-k1 = "Firmware-nvidia" +LICENSE_${PN}-nvidia-license = "Firmware-nvidia" + +FILES_${PN}-nvidia-gpu = "${nonarch_base_libdir}/firmware/nvidia" +FILES_${PN}-nvidia-tegra = " \ + ${nonarch_base_libdir}/firmware/nvidia/tegra* \ + ${nonarch_base_libdir}/firmware/nvidia/gm20b \ + ${nonarch_base_libdir}/firmware/nvidia/gp10b \ +" +FILES_${PN}-nvidia-tegra-k1 = " \ + ${nonarch_base_libdir}/firmware/nvidia/tegra124 \ + ${nonarch_base_libdir}/firmware/nvidia/gk20a \ +" +FILES_${PN}-nvidia-license = "${nonarch_base_libdir}/firmware/LICENCE.nvidia" + +RDEPENDS_${PN}-nvidia-gpu += "${PN}-nvidia-license" +RDEPENDS_${PN}-nvidia-tegra += "${PN}-nvidia-license" +RDEPENDS_${PN}-nvidia-tegra-k1 += "${PN}-nvidia-license" + +# For RSI RS911x WiFi +LICENSE_${PN}-rs9113 = "WHENCE" +LICENSE_${PN}-rs9116 = "WHENCE" + +FILES_${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps " +FILES_${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps " + +RDEPENDS_${PN}-rs9113 += "${PN}-whence-license" +RDEPENDS_${PN}-rs9116 += "${PN}-whence-license" + # For rtl LICENSE_${PN}-rtl8188 = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl8192cu = "Firmware-rtlwifi_firmware" @@ -473,6 +566,7 @@ LICENSE_${PN}-rtl8192ce = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl8192su = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl8723 = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl8821 = "Firmware-rtlwifi_firmware" +LICENSE_${PN}-rtl8822 = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl-license = "Firmware-rtlwifi_firmware" LICENSE_${PN}-rtl8168 = "WHENCE" @@ -500,6 +594,11 @@ FILES_${PN}-rtl8821 = " \ FILES_${PN}-rtl8168 = " \ ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw \ " +FILES_${PN}-rtl8822 = " \ + ${nonarch_base_libdir}/firmware/rtl_bt/rtl8822*.bin \ + ${nonarch_base_libdir}/firmware/rtw88/rtw8822*.bin \ + ${nonarch_base_libdir}/firmware/rtlwifi/rtl8822*.bin \ +" RDEPENDS_${PN}-rtl8188 += "${PN}-rtl-license" RDEPENDS_${PN}-rtl8192ce += "${PN}-rtl-license" @@ -507,6 +606,7 @@ RDEPENDS_${PN}-rtl8192cu += "${PN}-rtl-license" RDEPENDS_${PN}-rtl8192su = "${PN}-rtl-license" RDEPENDS_${PN}-rtl8723 += "${PN}-rtl-license" RDEPENDS_${PN}-rtl8821 += "${PN}-rtl-license" +RDEPENDS_${PN}-rtl8822 += "${PN}-rtl-license" RDEPENDS_${PN}-rtl8168 += "${PN}-whence-license" # For ti-connectivity @@ -566,7 +666,9 @@ FILES_${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bi FILES_${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" FILES_${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin" FILES_${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin" -FILES_${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin" +FILES_${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin \ +" FILES_${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin" FILES_${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin" FILES_${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin" @@ -575,12 +677,18 @@ FILES_${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin \ ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin \ " FILES_${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" -FILES_${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.*" +FILES_${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ +" FILES_${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin" FILES_${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin" -FILES_${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.bin" +FILES_${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ +" FILES_${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin" -FILES_${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin" +FILES_${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin \ +" FILES_${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin" FILES_${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin \ ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin \ @@ -651,13 +759,22 @@ LICENSE_${PN}-cypress-license = "Firmware-cypress" FILES_${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" FILES_${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd" -FILES_${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.*" -FILES_${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.*" -FILES_${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.*" -FILES_${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin" -FILES_${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.*" +FILES_${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" +FILES_${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" +FILES_${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" +FILES_${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin \ +" +FILES_${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ +" FILES_${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin \ ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin \ + ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin \ + ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.clm_blob \ " LICENSE_${PN}-bcm-0bb4-0306 = "Firmware-cypress" @@ -857,26 +974,109 @@ RDEPENDS_${PN}-qat = "${PN}-qat-license" # For QCOM VPU/GPU and SDM845 LICENSE_${PN}-qcom-license = "Firmware-qcom" +LICENSE_${PN}-qcom-yamato-license = "Firmware-qcom-yamato" +LICENSE_${PN}-qcom-venus-1.8 = "Firmware-qcom" +LICENSE_${PN}-qcom-venus-4.2 = "Firmware-qcom" +LICENSE_${PN}-qcom-venus-5.2 = "Firmware-qcom" +LICENSE_${PN}-qcom-venus-5.4 = "Firmware-qcom" +LICENSE_${PN}-qcom-vpu-1.0 = "Firmware-qcom" +LICENSE_${PN}-qcom-vpu-2.0 = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a2xx = "Firmware-qcom Firmware-qcom-yamato" +LICENSE_${PN}-qcom-adreno-a3xx = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a4xx = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a530 = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a630 = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a650 = "Firmware-qcom" +LICENSE_${PN}-qcom-adreno-a660 = "Firmware-qcom" +LICENSE_${PN}-qcom-apq8016-modem = "Firmware-qcom" +LICENSE_${PN}-qcom-apq8016-wifi = "Firmware-qcom" +LICENSE_${PN}-qcom-apq8096-audio = "Firmware-qcom" +LICENSE_${PN}-qcom-apq8096-adreno = "Firmware-qcom" +LICENSE_${PN}-qcom-apq8096-modem = "Firmware-qcom" +LICENSE_${PN}-qcom-sc8280xp-lenovo-x13s-audio = "Firmware-qcom" +LICENSE_${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "Firmware-qcom" +LICENSE_${PN}-qcom-sc8280xp-lenovo-x13s-compute = "Firmware-qcom" +LICENSE_${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "Firmware-qcom" +LICENSE_${PN}-qcom-sdm845-audio = "Firmware-qcom" +LICENSE_${PN}-qcom-sdm845-adreno = "Firmware-qcom" +LICENSE_${PN}-qcom-sdm845-compute = "Firmware-qcom" +LICENSE_${PN}-qcom-sdm845-modem = "Firmware-qcom" +LICENSE_${PN}-qcom-sm8250-audio = "Firmware-qcom" +LICENSE_${PN}-qcom-sm8250-adreno = "Firmware-qcom" +LICENSE_${PN}-qcom-sm8250-compute = "Firmware-qcom" + FILES_${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" +FILES_${PN}-qcom-yamato-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom_yamato" FILES_${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" FILES_${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" -FILES_${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a300_*.fw ${nonarch_base_libdir}/firmware/a300_*.fw" -FILES_${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.*" -FILES_${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" +FILES_${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" +FILES_${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" +FILES_${PN}-qcom-vpu-1.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-1.0/*" +FILES_${PN}-qcom-vpu-2.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-2.0/*" +FILES_${PN}-qcom-adreno-a2xx = "${nonarch_base_libdir}/firmware/qcom/leia_*.fw ${nonarch_base_libdir}/firmware/qcom/yamato_*.fw" +FILES_${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a3*_*.fw ${nonarch_base_libdir}/firmware/a300_*.fw" +FILES_${PN}-qcom-adreno-a4xx = "${nonarch_base_libdir}/firmware/qcom/a4*_*.fw" +FILES_${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.fw*" +FILES_${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.*" +FILES_${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.*" +FILES_${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" +FILES_${PN}-qcom-apq8016-modem = "${nonarch_base_libdir}/firmware/qcom/apq8016/mba.mbn ${nonarch_base_libdir}/firmware/qcom/apq8016/modem.mbn" +FILES_${PN}-qcom-apq8016-wifi = "${nonarch_base_libdir}/firmware/qcom/apq8016/wcnss.mbn ${nonarch_base_libdir}/firmware/qcom/apq8016/WCNSS*" +FILES_${PN}-qcom-apq8096-adreno = "${nonarch_base_libdir}/firmware/qcom/apq8096/a530_zap.mbn ${nonarch_base_libdir}/firmware/qcom/a530_zap.mdt" +FILES_${PN}-qcom-apq8096-audio = "${nonarch_base_libdir}/firmware/qcom/apq8096/adsp*.*" +FILES_${PN}-qcom-apq8096-modem = "${nonarch_base_libdir}/firmware/qcom/apq8096/mba.mbn ${nonarch_base_libdir}/firmware/qcom/apq8096/modem*.* ${nonarch_base_libdir}/firmware/qcom/apq8096/wlanmdsp.mbn" +FILES_${PN}-qcom-sc8280xp-lenovo-x13s-compat = "${nonarch_base_libdir}/firmware/qcom/LENOVO/21BX" +FILES_${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/battmgr.jsn" +FILES_${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcdxkmsuc8280.mbn" +FILES_${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*cdsp*.*" +FILES_${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*slpi*.*" +FILES_${PN}-qcom-sdm845-adreno = "${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" FILES_${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" FILES_${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" FILES_${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn" +FILES_${PN}-qcom-sm8250-adreno = "${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" +FILES_${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" +FILES_${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" RDEPENDS_${PN}-qcom-venus-1.8 = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-venus-4.2 = "${PN}-qcom-license" -RDEPENDS_${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-venus-5.2 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-venus-5.4 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-vpu-1.0 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-vpu-2.0 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-adreno-a2xx = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-adreno-a2xx = "${PN}-qcom-license ${PN}-qcom-yamato-license" +RDEPENDS_${PN}-qcom-adreno-a4xx = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-adreno-a530 = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-adreno-a630 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-adreno-a650 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-adreno-a660 = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-apq8016-modem = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-apq8016-wifi = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-apq8096-audio = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-apq8096-modem = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-sdm845-audio = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-sdm845-compute = "${PN}-qcom-license" RDEPENDS_${PN}-qcom-sdm845-modem = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sm8250-audio = "${PN}-qcom-license" +RDEPENDS_${PN}-qcom-sm8250-compute = "${PN}-qcom-license" + +RRECOMMENDS_${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" +RRECOMMENDS_${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" +RRECOMMENDS_${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" +RRECOMMENDS_${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" FILES_${PN}-liquidio = "${nonarch_base_libdir}/firmware/liquidio" +# For Amlogic VDEC +LICENSE_${PN}-amlogic-vdec = "Firmware-amlogic_vdec" +FILES_${PN}-amlogic-vdec-license = "${nonarch_base_libdir}/firmware/LICENSE.amlogic_vdec" +FILES_${PN}-amlogic-vdec = "${nonarch_base_libdir}/firmware/meson/vdec/*" +RDEPENDS_${PN}-amlogic-vdec = "${PN}-amlogic-vdec-license" + # For other firmwares # Maybe split out to separate packages when needed. LICENSE_${PN} = "\ @@ -884,6 +1084,7 @@ LICENSE_${PN} = "\ & Firmware-agere \ & Firmware-amdgpu \ & Firmware-amd-ucode \ + & Firmware-amlogic_vdec \ & Firmware-atmel \ & Firmware-ca0132 \ & Firmware-cavium \ @@ -895,7 +1096,6 @@ LICENSE_${PN} = "\ & Firmware-fw_sst_0f28 \ & Firmware-go7007 \ & Firmware-hfi1_firmware \ - & Firmware-i2400m \ & Firmware-ibt_firmware \ & Firmware-it913x \ & Firmware-IntcSST2 \ @@ -916,7 +1116,6 @@ LICENSE_${PN} = "\ & Firmware-ralink-firmware \ & Firmware-imx-sdma_firmware \ & Firmware-siano \ - & Firmware-tda7706-firmware \ & Firmware-ti-connectivity \ & Firmware-ti-keystone \ & Firmware-ueagle-atm4-firmware \ @@ -949,3 +1148,6 @@ python populate_packages_prepend () { # Firmware files are generally not ran on the CPU, so they can be # allarch despite being architecture specific INSANE_SKIP = "arch" + +# Don't warn about already stripped files +INSANE_SKIP:${PN} = "already-stripped" diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc index 4481aa430c..2d4429b6b4 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc @@ -1,4 +1,6 @@ SUMMARY = "Sanitized set of kernel headers for the C library's use" +HOMEPAGE = "https://www.kernel.org/" +DESCRIPTION = "Designed to maintain an Application Programming Interface (API) stable version of the Linux headers" SECTION = "devel" LICENSE = "GPLv2" @@ -16,7 +18,7 @@ LICENSE = "GPLv2" # and have a machine specific libc. # # But you have some kernel headers you need for some driver? That is fine -# but get them from STAGING_KERNEL_DIR where the kernel installs itself. +# but get them from STAGING_KERNEL_BUILDDIR where the kernel installs itself. # This will make the package using them machine specific but this is much # better than having a machine specific C library. This does mean your # recipe needs a diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc new file mode 100644 index 0000000000..efc8b09475 --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion.inc @@ -0,0 +1,13 @@ +# Kernel CVE exclusion file + +# https://nvd.nist.gov/vuln/detail/CVE-2020-29373 +# Patched in kernel since v5.6 ff002b30181d30cdfbca316dadd099c3ca0d739c +# Backported in version v5.4.24 cac68d12c531aa3010509a5a55a5dfd18dedaa80 +CVE_CHECK_WHITELIST += "CVE-2020-29373" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-39188 +# Patched in kernel since v5.19 b67fbebd4cf980aecbcc750e1462128bffe8ae15 +# Backported in version v5.4.212 c9c5501e815132530d741ec9fdd22657f91656bc +# Backported in version v5.10.141 895428ee124ad70b9763259308354877b725c31d +# Backported in version v5.15.65 3ffb97fce282df03723995f5eed6a559d008078e +CVE_CHECK_WHITELIST += "CVE-2022-39188" diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.4.inc b/meta/recipes-kernel/linux/cve-exclusion_5.4.inc new file mode 100644 index 0000000000..b0b33bcc1d --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_5.4.inc @@ -0,0 +1,9445 @@ + +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at 2024-04-14 04:45:05.585211 for version 5.4.273 + +python check_kernel_cve_status_version() { + this_version = "5.4.273" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_WHITELIST += "CVE-2003-1604" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2004-0230" + +# CVE-2005-3660 has no known resolution + +# fixed-version: Fixed after version 2.6.26rc5 +CVE_CHECK_WHITELIST += "CVE-2006-3635" + +# fixed-version: Fixed after version 2.6.19rc3 +CVE_CHECK_WHITELIST += "CVE-2006-5331" + +# fixed-version: Fixed after version 2.6.19rc2 +CVE_CHECK_WHITELIST += "CVE-2006-6128" + +# CVE-2007-3719 has no known resolution + +# fixed-version: Fixed after version 2.6.12rc2 +CVE_CHECK_WHITELIST += "CVE-2007-4774" + +# fixed-version: Fixed after version 2.6.24rc6 +CVE_CHECK_WHITELIST += "CVE-2007-6761" + +# fixed-version: Fixed after version 2.6.20rc5 +CVE_CHECK_WHITELIST += "CVE-2007-6762" + +# CVE-2008-2544 has no known resolution + +# CVE-2008-4609 has no known resolution + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_WHITELIST += "CVE-2008-7316" + +# fixed-version: Fixed after version 2.6.31rc6 +CVE_CHECK_WHITELIST += "CVE-2009-2692" + +# fixed-version: Fixed after version 2.6.23rc9 +CVE_CHECK_WHITELIST += "CVE-2010-0008" + +# fixed-version: Fixed after version 2.6.36rc5 +CVE_CHECK_WHITELIST += "CVE-2010-3432" + +# CVE-2010-4563 has no known resolution + +# fixed-version: Fixed after version 2.6.37rc6 +CVE_CHECK_WHITELIST += "CVE-2010-4648" + +# fixed-version: Fixed after version 2.6.38rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5313" + +# CVE-2010-5321 has no known resolution + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5328" + +# fixed-version: Fixed after version 2.6.39rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5329" + +# fixed-version: Fixed after version 2.6.34rc7 +CVE_CHECK_WHITELIST += "CVE-2010-5331" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_WHITELIST += "CVE-2010-5332" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4098" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4131" + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-4915" + +# CVE-2011-4916 has no known resolution + +# CVE-2011-4917 has no known resolution + +# fixed-version: Fixed after version 3.2rc1 +CVE_CHECK_WHITELIST += "CVE-2011-5321" + +# fixed-version: Fixed after version 3.1rc1 +CVE_CHECK_WHITELIST += "CVE-2011-5327" + +# fixed-version: Fixed after version 3.7rc2 +CVE_CHECK_WHITELIST += "CVE-2012-0957" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2119" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2136" + +# fixed-version: Fixed after version 3.5rc2 +CVE_CHECK_WHITELIST += "CVE-2012-2137" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_WHITELIST += "CVE-2012-2313" + +# fixed-version: Fixed after version 3.4rc6 +CVE_CHECK_WHITELIST += "CVE-2012-2319" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2012-2372" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2375" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2390" + +# fixed-version: Fixed after version 3.5rc4 +CVE_CHECK_WHITELIST += "CVE-2012-2669" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_WHITELIST += "CVE-2012-2744" + +# fixed-version: Fixed after version 3.4rc3 +CVE_CHECK_WHITELIST += "CVE-2012-2745" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_WHITELIST += "CVE-2012-3364" + +# fixed-version: Fixed after version 3.4rc5 +CVE_CHECK_WHITELIST += "CVE-2012-3375" + +# fixed-version: Fixed after version 3.5rc5 +CVE_CHECK_WHITELIST += "CVE-2012-3400" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_WHITELIST += "CVE-2012-3412" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-3430" + +# fixed-version: Fixed after version 2.6.19rc4 +CVE_CHECK_WHITELIST += "CVE-2012-3510" + +# fixed-version: Fixed after version 3.5rc6 +CVE_CHECK_WHITELIST += "CVE-2012-3511" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-3520" + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_WHITELIST += "CVE-2012-3552" + +# Skipping CVE-2012-4220, no affected_versions + +# Skipping CVE-2012-4221, no affected_versions + +# Skipping CVE-2012-4222, no affected_versions + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-4398" + +# fixed-version: Fixed after version 2.6.36rc4 +CVE_CHECK_WHITELIST += "CVE-2012-4444" + +# fixed-version: Fixed after version 3.7rc6 +CVE_CHECK_WHITELIST += "CVE-2012-4461" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_WHITELIST += "CVE-2012-4467" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_WHITELIST += "CVE-2012-4508" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-4530" + +# CVE-2012-4542 has no known resolution + +# fixed-version: Fixed after version 3.7rc4 +CVE_CHECK_WHITELIST += "CVE-2012-4565" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5374" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5375" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-5517" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6536" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6537" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2012-6538" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6539" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6540" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6541" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6542" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6543" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6544" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6545" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2012-6546" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6547" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6548" + +# fixed-version: Fixed after version 3.6rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6549" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6638" + +# fixed-version: Fixed after version 3.6rc2 +CVE_CHECK_WHITELIST += "CVE-2012-6647" + +# fixed-version: Fixed after version 3.6 +CVE_CHECK_WHITELIST += "CVE-2012-6657" + +# fixed-version: Fixed after version 3.6rc5 +CVE_CHECK_WHITELIST += "CVE-2012-6689" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6701" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6703" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6704" + +# fixed-version: Fixed after version 3.4rc1 +CVE_CHECK_WHITELIST += "CVE-2012-6712" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-0160" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0190" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0216" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0217" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_WHITELIST += "CVE-2013-0228" + +# fixed-version: Fixed after version 3.8rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0231" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-0268" + +# fixed-version: Fixed after version 3.8 +CVE_CHECK_WHITELIST += "CVE-2013-0290" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2013-0309" + +# fixed-version: Fixed after version 3.5 +CVE_CHECK_WHITELIST += "CVE-2013-0310" + +# fixed-version: Fixed after version 3.7rc8 +CVE_CHECK_WHITELIST += "CVE-2013-0311" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0313" + +# fixed-version: Fixed after version 3.11rc7 +CVE_CHECK_WHITELIST += "CVE-2013-0343" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-0349" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-0871" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-0913" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-0914" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1059" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1763" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1767" + +# fixed-version: Fixed after version 3.5rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1772" + +# fixed-version: Fixed after version 3.3rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1773" + +# fixed-version: Fixed after version 3.8rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1774" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1792" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1796" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1797" + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-1798" + +# fixed-version: Fixed after version 3.8rc6 +CVE_CHECK_WHITELIST += "CVE-2013-1819" + +# fixed-version: Fixed after version 3.6rc7 +CVE_CHECK_WHITELIST += "CVE-2013-1826" + +# fixed-version: Fixed after version 3.6rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1827" + +# fixed-version: Fixed after version 3.9rc2 +CVE_CHECK_WHITELIST += "CVE-2013-1828" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1848" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1858" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1860" + +# fixed-version: Fixed after version 3.7rc3 +CVE_CHECK_WHITELIST += "CVE-2013-1928" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_WHITELIST += "CVE-2013-1929" + +# Skipping CVE-2013-1935, no affected_versions + +# fixed-version: Fixed after version 3.0rc1 +CVE_CHECK_WHITELIST += "CVE-2013-1943" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1956" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1957" + +# fixed-version: Fixed after version 3.9rc5 +CVE_CHECK_WHITELIST += "CVE-2013-1958" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-1959" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-1979" + +# fixed-version: Fixed after version 3.8rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2015" + +# fixed-version: Fixed after version 2.6.34 +CVE_CHECK_WHITELIST += "CVE-2013-2017" + +# fixed-version: Fixed after version 3.8rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2058" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2094" + +# fixed-version: Fixed after version 2.6.34rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2128" + +# fixed-version: Fixed after version 3.11rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2140" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2141" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2146" + +# fixed-version: Fixed after version 3.12rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2147" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2148" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2164" + +# Skipping CVE-2013-2188, no affected_versions + +# fixed-version: Fixed after version 3.9rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2206" + +# Skipping CVE-2013-2224, no affected_versions + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_WHITELIST += "CVE-2013-2232" + +# fixed-version: Fixed after version 3.10 +CVE_CHECK_WHITELIST += "CVE-2013-2234" + +# fixed-version: Fixed after version 3.9rc6 +CVE_CHECK_WHITELIST += "CVE-2013-2237" + +# Skipping CVE-2013-2239, no affected_versions + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2546" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2547" + +# fixed-version: Fixed after version 3.9rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2548" + +# fixed-version: Fixed after version 3.9rc8 +CVE_CHECK_WHITELIST += "CVE-2013-2596" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2634" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2635" + +# fixed-version: Fixed after version 3.9rc3 +CVE_CHECK_WHITELIST += "CVE-2013-2636" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_WHITELIST += "CVE-2013-2850" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2851" + +# fixed-version: Fixed after version 3.10rc6 +CVE_CHECK_WHITELIST += "CVE-2013-2852" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2888" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2889" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2890" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2891" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2892" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2893" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2894" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2895" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2896" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-2897" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2898" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2899" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2929" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-2930" + +# fixed-version: Fixed after version 3.9 +CVE_CHECK_WHITELIST += "CVE-2013-3076" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3222" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3223" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3224" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3225" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3226" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3227" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3228" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3229" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3230" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3231" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3232" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3233" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3234" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3235" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3236" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3237" + +# fixed-version: Fixed after version 3.9rc7 +CVE_CHECK_WHITELIST += "CVE-2013-3301" + +# fixed-version: Fixed after version 3.8rc3 +CVE_CHECK_WHITELIST += "CVE-2013-3302" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4125" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4127" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4129" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4162" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4163" + +# fixed-version: Fixed after version 3.11rc5 +CVE_CHECK_WHITELIST += "CVE-2013-4205" + +# fixed-version: Fixed after version 3.10rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4220" + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_WHITELIST += "CVE-2013-4247" + +# fixed-version: Fixed after version 3.11rc6 +CVE_CHECK_WHITELIST += "CVE-2013-4254" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4270" + +# fixed-version: Fixed after version 3.12rc6 +CVE_CHECK_WHITELIST += "CVE-2013-4299" + +# fixed-version: Fixed after version 3.11 +CVE_CHECK_WHITELIST += "CVE-2013-4300" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4312" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4343" + +# fixed-version: Fixed after version 3.13rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4345" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4348" + +# fixed-version: Fixed after version 3.12rc2 +CVE_CHECK_WHITELIST += "CVE-2013-4350" + +# fixed-version: Fixed after version 3.12rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4387" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-4470" + +# fixed-version: Fixed after version 3.10rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4483" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4511" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4512" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4513" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4514" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4515" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-4516" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4563" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2013-4579" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4587" + +# fixed-version: Fixed after version 2.6.33rc4 +CVE_CHECK_WHITELIST += "CVE-2013-4588" + +# fixed-version: Fixed after version 3.8rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4591" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2013-4592" + +# Skipping CVE-2013-4737, no affected_versions + +# Skipping CVE-2013-4738, no affected_versions + +# Skipping CVE-2013-4739, no affected_versions + +# fixed-version: Fixed after version 3.10rc5 +CVE_CHECK_WHITELIST += "CVE-2013-5634" + +# fixed-version: Fixed after version 3.6rc6 +CVE_CHECK_WHITELIST += "CVE-2013-6282" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6367" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6368" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6376" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6378" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6380" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6381" + +# fixed-version: Fixed after version 3.13rc4 +CVE_CHECK_WHITELIST += "CVE-2013-6382" + +# fixed-version: Fixed after version 3.12 +CVE_CHECK_WHITELIST += "CVE-2013-6383" + +# Skipping CVE-2013-6392, no affected_versions + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6431" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6432" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2013-6885" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7026" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7027" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7263" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7264" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7265" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7266" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7267" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7268" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7269" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7270" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7271" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7281" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7339" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7348" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2013-7421" + +# CVE-2013-7445 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2013-7446" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2013-7470" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-0038" + +# fixed-version: Fixed after version 3.14rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0049" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-0055" + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_WHITELIST += "CVE-2014-0069" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-0077" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-0100" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-0101" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-0102" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-0131" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-0155" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0181" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0196" + +# fixed-version: Fixed after version 2.6.33rc5 +CVE_CHECK_WHITELIST += "CVE-2014-0203" + +# fixed-version: Fixed after version 2.6.37rc1 +CVE_CHECK_WHITELIST += "CVE-2014-0205" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-0206" + +# Skipping CVE-2014-0972, no affected_versions + +# fixed-version: Fixed after version 3.13 +CVE_CHECK_WHITELIST += "CVE-2014-1438" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1444" + +# fixed-version: Fixed after version 3.12rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1445" + +# fixed-version: Fixed after version 3.13rc7 +CVE_CHECK_WHITELIST += "CVE-2014-1446" + +# fixed-version: Fixed after version 3.13rc8 +CVE_CHECK_WHITELIST += "CVE-2014-1690" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-1737" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2014-1738" + +# fixed-version: Fixed after version 3.15rc6 +CVE_CHECK_WHITELIST += "CVE-2014-1739" + +# fixed-version: Fixed after version 3.14rc2 +CVE_CHECK_WHITELIST += "CVE-2014-1874" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2038" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_WHITELIST += "CVE-2014-2039" + +# fixed-version: Fixed after version 3.14rc7 +CVE_CHECK_WHITELIST += "CVE-2014-2309" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2523" + +# fixed-version: Fixed after version 3.14 +CVE_CHECK_WHITELIST += "CVE-2014-2568" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2580" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2672" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2673" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2678" + +# fixed-version: Fixed after version 3.14rc6 +CVE_CHECK_WHITELIST += "CVE-2014-2706" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-2739" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-2851" + +# fixed-version: Fixed after version 3.2rc7 +CVE_CHECK_WHITELIST += "CVE-2014-2889" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3122" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3144" + +# fixed-version: Fixed after version 3.15rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3145" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_WHITELIST += "CVE-2014-3153" + +# fixed-version: Fixed after version 3.17rc4 +CVE_CHECK_WHITELIST += "CVE-2014-3180" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3181" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3182" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3183" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3184" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3185" + +# fixed-version: Fixed after version 3.17rc3 +CVE_CHECK_WHITELIST += "CVE-2014-3186" + +# Skipping CVE-2014-3519, no affected_versions + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_WHITELIST += "CVE-2014-3534" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3535" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3601" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3610" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3611" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-3631" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3645" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3646" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-3647" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3673" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3687" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3688" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3690" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-3917" + +# fixed-version: Fixed after version 3.15 +CVE_CHECK_WHITELIST += "CVE-2014-3940" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4014" + +# fixed-version: Fixed after version 3.14rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4027" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4157" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4171" + +# Skipping CVE-2014-4322, no affected_versions + +# Skipping CVE-2014-4323, no affected_versions + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4508" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4608" + +# fixed-version: Fixed after version 3.16rc3 +CVE_CHECK_WHITELIST += "CVE-2014-4611" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4652" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4653" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4654" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4655" + +# fixed-version: Fixed after version 3.16rc2 +CVE_CHECK_WHITELIST += "CVE-2014-4656" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-4667" + +# fixed-version: Fixed after version 3.16rc4 +CVE_CHECK_WHITELIST += "CVE-2014-4699" + +# fixed-version: Fixed after version 3.16rc6 +CVE_CHECK_WHITELIST += "CVE-2014-4943" + +# fixed-version: Fixed after version 3.16rc7 +CVE_CHECK_WHITELIST += "CVE-2014-5045" + +# fixed-version: Fixed after version 3.16 +CVE_CHECK_WHITELIST += "CVE-2014-5077" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-5206" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-5207" + +# Skipping CVE-2014-5332, no affected_versions + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-5471" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-5472" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6410" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6416" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6417" + +# fixed-version: Fixed after version 3.17rc5 +CVE_CHECK_WHITELIST += "CVE-2014-6418" + +# fixed-version: Fixed after version 3.17rc2 +CVE_CHECK_WHITELIST += "CVE-2014-7145" + +# Skipping CVE-2014-7207, no affected_versions + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7283" + +# fixed-version: Fixed after version 3.15rc7 +CVE_CHECK_WHITELIST += "CVE-2014-7284" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7822" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-7825" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-7826" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_WHITELIST += "CVE-2014-7841" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7842" + +# fixed-version: Fixed after version 3.18rc5 +CVE_CHECK_WHITELIST += "CVE-2014-7843" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7970" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-7975" + +# fixed-version: Fixed after version 3.18rc3 +CVE_CHECK_WHITELIST += "CVE-2014-8086" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8133" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8134" + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_WHITELIST += "CVE-2014-8159" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8160" + +# fixed-version: Fixed after version 3.12rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8171" + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8172" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_WHITELIST += "CVE-2014-8173" + +# Skipping CVE-2014-8181, no affected_versions + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8369" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8480" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-8481" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8559" + +# fixed-version: Fixed after version 3.14rc3 +CVE_CHECK_WHITELIST += "CVE-2014-8709" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8884" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-8989" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_WHITELIST += "CVE-2014-9090" + +# fixed-version: Fixed after version 3.18rc6 +CVE_CHECK_WHITELIST += "CVE-2014-9322" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9419" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9420" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9428" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9529" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9584" + +# fixed-version: Fixed after version 3.19rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9585" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9644" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9683" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9710" + +# fixed-version: Fixed after version 3.15rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9715" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9717" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9728" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9729" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9730" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2014-9731" + +# Skipping CVE-2014-9777, no affected_versions + +# Skipping CVE-2014-9778, no affected_versions + +# Skipping CVE-2014-9779, no affected_versions + +# Skipping CVE-2014-9780, no affected_versions + +# Skipping CVE-2014-9781, no affected_versions + +# Skipping CVE-2014-9782, no affected_versions + +# Skipping CVE-2014-9783, no affected_versions + +# Skipping CVE-2014-9784, no affected_versions + +# Skipping CVE-2014-9785, no affected_versions + +# Skipping CVE-2014-9786, no affected_versions + +# Skipping CVE-2014-9787, no affected_versions + +# Skipping CVE-2014-9788, no affected_versions + +# Skipping CVE-2014-9789, no affected_versions + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9803" + +# Skipping CVE-2014-9863, no affected_versions + +# Skipping CVE-2014-9864, no affected_versions + +# Skipping CVE-2014-9865, no affected_versions + +# Skipping CVE-2014-9866, no affected_versions + +# Skipping CVE-2014-9867, no affected_versions + +# Skipping CVE-2014-9868, no affected_versions + +# Skipping CVE-2014-9869, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9870" + +# Skipping CVE-2014-9871, no affected_versions + +# Skipping CVE-2014-9872, no affected_versions + +# Skipping CVE-2014-9873, no affected_versions + +# Skipping CVE-2014-9874, no affected_versions + +# Skipping CVE-2014-9875, no affected_versions + +# Skipping CVE-2014-9876, no affected_versions + +# Skipping CVE-2014-9877, no affected_versions + +# Skipping CVE-2014-9878, no affected_versions + +# Skipping CVE-2014-9879, no affected_versions + +# Skipping CVE-2014-9880, no affected_versions + +# Skipping CVE-2014-9881, no affected_versions + +# Skipping CVE-2014-9882, no affected_versions + +# Skipping CVE-2014-9883, no affected_versions + +# Skipping CVE-2014-9884, no affected_versions + +# Skipping CVE-2014-9885, no affected_versions + +# Skipping CVE-2014-9886, no affected_versions + +# Skipping CVE-2014-9887, no affected_versions + +# fixed-version: Fixed after version 3.13rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9888" + +# Skipping CVE-2014-9889, no affected_versions + +# Skipping CVE-2014-9890, no affected_versions + +# Skipping CVE-2014-9891, no affected_versions + +# Skipping CVE-2014-9892, no affected_versions + +# Skipping CVE-2014-9893, no affected_versions + +# Skipping CVE-2014-9894, no affected_versions + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9895" + +# Skipping CVE-2014-9896, no affected_versions + +# Skipping CVE-2014-9897, no affected_versions + +# Skipping CVE-2014-9898, no affected_versions + +# Skipping CVE-2014-9899, no affected_versions + +# Skipping CVE-2014-9900, no affected_versions + +# fixed-version: Fixed after version 3.14rc4 +CVE_CHECK_WHITELIST += "CVE-2014-9903" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9904" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9914" + +# fixed-version: Fixed after version 3.18rc2 +CVE_CHECK_WHITELIST += "CVE-2014-9922" + +# fixed-version: Fixed after version 3.19rc1 +CVE_CHECK_WHITELIST += "CVE-2014-9940" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_WHITELIST += "CVE-2015-0239" + +# fixed-version: Fixed after version 3.15rc5 +CVE_CHECK_WHITELIST += "CVE-2015-0274" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-0275" + +# Skipping CVE-2015-0777, no affected_versions + +# Skipping CVE-2015-1328, no affected_versions + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1333" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1339" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1350" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1420" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1421" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-1465" + +# fixed-version: Fixed after version 3.19rc5 +CVE_CHECK_WHITELIST += "CVE-2015-1573" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1593" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2015-1805" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-2041" + +# fixed-version: Fixed after version 3.19 +CVE_CHECK_WHITELIST += "CVE-2015-2042" + +# fixed-version: Fixed after version 4.0rc4 +CVE_CHECK_WHITELIST += "CVE-2015-2150" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-2666" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-2672" + +# fixed-version: Fixed after version 4.0rc6 +CVE_CHECK_WHITELIST += "CVE-2015-2686" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-2830" + +# CVE-2015-2877 has no known resolution + +# fixed-version: Fixed after version 4.0rc7 +CVE_CHECK_WHITELIST += "CVE-2015-2922" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-2925" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-3212" + +# fixed-version: Fixed after version 2.6.33rc8 +CVE_CHECK_WHITELIST += "CVE-2015-3214" + +# fixed-version: Fixed after version 4.2rc2 +CVE_CHECK_WHITELIST += "CVE-2015-3288" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-3290" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-3291" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_WHITELIST += "CVE-2015-3331" + +# Skipping CVE-2015-3332, no affected_versions + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-3339" + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_WHITELIST += "CVE-2015-3636" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4001" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4002" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-4003" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4004" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4036" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4167" + +# fixed-version: Fixed after version 3.13rc5 +CVE_CHECK_WHITELIST += "CVE-2015-4170" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4176" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4177" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4178" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-4692" + +# fixed-version: Fixed after version 4.1rc6 +CVE_CHECK_WHITELIST += "CVE-2015-4700" + +# fixed-version: Fixed after version 4.2rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5156" + +# fixed-version: Fixed after version 4.2rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5157" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5257" + +# fixed-version: Fixed after version 4.3rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5283" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5307" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5327" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5364" + +# fixed-version: Fixed after version 4.1rc7 +CVE_CHECK_WHITELIST += "CVE-2015-5366" + +# fixed-version: Fixed after version 4.2rc6 +CVE_CHECK_WHITELIST += "CVE-2015-5697" + +# fixed-version: Fixed after version 4.1rc3 +CVE_CHECK_WHITELIST += "CVE-2015-5706" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-5707" + +# fixed-version: Fixed after version 4.2rc5 +CVE_CHECK_WHITELIST += "CVE-2015-6252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-6526" + +# CVE-2015-6619 has no known resolution + +# CVE-2015-6646 has no known resolution + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-6937" + +# Skipping CVE-2015-7312, no affected_versions + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7509" + +# fixed-version: Fixed after version 4.4rc7 +CVE_CHECK_WHITELIST += "CVE-2015-7513" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-7515" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_WHITELIST += "CVE-2015-7550" + +# Skipping CVE-2015-7553, no affected_versions + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2015-7566" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_WHITELIST += "CVE-2015-7613" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7799" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2015-7833" + +# Skipping CVE-2015-7837, no affected_versions + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2015-7872" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7884" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-7885" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2015-7990" + +# Skipping CVE-2015-8019, no affected_versions + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8104" + +# fixed-version: Fixed after version 4.0rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8215" + +# fixed-version: Fixed after version 2.6.34rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8324" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8374" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8539" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8543" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8550" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8551" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8552" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8553" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8569" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8575" + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2015-8660" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8709" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8746" + +# fixed-version: Fixed after version 4.3rc4 +CVE_CHECK_WHITELIST += "CVE-2015-8767" + +# fixed-version: Fixed after version 4.4rc5 +CVE_CHECK_WHITELIST += "CVE-2015-8785" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8787" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8812" + +# fixed-version: Fixed after version 4.4rc6 +CVE_CHECK_WHITELIST += "CVE-2015-8816" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8830" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8839" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8844" + +# fixed-version: Fixed after version 4.4rc3 +CVE_CHECK_WHITELIST += "CVE-2015-8845" + +# Skipping CVE-2015-8937, no affected_versions + +# Skipping CVE-2015-8938, no affected_versions + +# Skipping CVE-2015-8939, no affected_versions + +# Skipping CVE-2015-8940, no affected_versions + +# Skipping CVE-2015-8941, no affected_versions + +# Skipping CVE-2015-8942, no affected_versions + +# Skipping CVE-2015-8943, no affected_versions + +# Skipping CVE-2015-8944, no affected_versions + +# fixed-version: Fixed after version 4.1rc2 +CVE_CHECK_WHITELIST += "CVE-2015-8950" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8952" + +# fixed-version: Fixed after version 4.3 +CVE_CHECK_WHITELIST += "CVE-2015-8953" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8955" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8956" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8961" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8962" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_WHITELIST += "CVE-2015-8963" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8964" + +# fixed-version: Fixed after version 4.4rc8 +CVE_CHECK_WHITELIST += "CVE-2015-8966" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8967" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2015-8970" + +# fixed-version: Fixed after version 3.19rc7 +CVE_CHECK_WHITELIST += "CVE-2015-9004" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2015-9016" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2015-9289" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0617" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2016-0723" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0728" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-0758" + +# Skipping CVE-2016-0774, no affected_versions + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2016-0821" + +# fixed-version: Fixed after version 4.0rc5 +CVE_CHECK_WHITELIST += "CVE-2016-0823" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-10044" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10088" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-10147" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-10150" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10153" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10154" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-10200" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10208" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10229" + +# fixed-version: Fixed after version 4.8rc6 +CVE_CHECK_WHITELIST += "CVE-2016-10318" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10723" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10741" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10764" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10905" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_WHITELIST += "CVE-2016-10906" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-10907" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_WHITELIST += "CVE-2016-1237" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-1575" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-1576" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-1583" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2053" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2069" + +# fixed-version: Fixed after version 4.4 +CVE_CHECK_WHITELIST += "CVE-2016-2070" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2085" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-2117" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-2143" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2184" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2185" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2186" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-2187" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2016-2188" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2383" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2384" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2543" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2544" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2545" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2546" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2547" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2548" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2549" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2016-2550" + +# fixed-version: Fixed after version 4.5rc2 +CVE_CHECK_WHITELIST += "CVE-2016-2782" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2016-2847" + +# Skipping CVE-2016-2853, no affected_versions + +# Skipping CVE-2016-2854, no affected_versions + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-3044" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3070" + +# fixed-version: Fixed after version 4.6rc2 +CVE_CHECK_WHITELIST += "CVE-2016-3134" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3135" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3136" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3137" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3138" + +# fixed-version: Fixed after version 3.17rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3139" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3140" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3156" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3157" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3672" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3689" + +# Skipping CVE-2016-3695, no affected_versions + +# Skipping CVE-2016-3699, no affected_versions + +# Skipping CVE-2016-3707, no affected_versions + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-3713" + +# CVE-2016-3775 has no known resolution + +# CVE-2016-3802 has no known resolution + +# CVE-2016-3803 has no known resolution + +# fixed-version: Fixed after version 4.4rc4 +CVE_CHECK_WHITELIST += "CVE-2016-3841" + +# fixed-version: Fixed after version 4.8rc2 +CVE_CHECK_WHITELIST += "CVE-2016-3857" + +# fixed-version: Fixed after version 4.5 +CVE_CHECK_WHITELIST += "CVE-2016-3951" + +# fixed-version: Fixed after version 4.6rc3 +CVE_CHECK_WHITELIST += "CVE-2016-3955" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-3961" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4440" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_WHITELIST += "CVE-2016-4470" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4482" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4485" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4486" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4557" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-4558" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4565" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-4568" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4569" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4578" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4580" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-4581" + +# fixed-version: Fixed after version 4.7rc4 +CVE_CHECK_WHITELIST += "CVE-2016-4794" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4805" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-4913" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4951" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4997" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-4998" + +# fixed-version: Fixed after version 4.9rc2 +CVE_CHECK_WHITELIST += "CVE-2016-5195" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-5243" + +# fixed-version: Fixed after version 4.7rc3 +CVE_CHECK_WHITELIST += "CVE-2016-5244" + +# Skipping CVE-2016-5340, no affected_versions + +# Skipping CVE-2016-5342, no affected_versions + +# Skipping CVE-2016-5343, no affected_versions + +# Skipping CVE-2016-5344, no affected_versions + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-5400" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-5412" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-5696" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-5728" + +# fixed-version: Fixed after version 4.7rc6 +CVE_CHECK_WHITELIST += "CVE-2016-5828" + +# fixed-version: Fixed after version 4.7rc5 +CVE_CHECK_WHITELIST += "CVE-2016-5829" + +# CVE-2016-5870 has no known resolution + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2016-6130" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6136" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-6156" + +# fixed-version: Fixed after version 4.7 +CVE_CHECK_WHITELIST += "CVE-2016-6162" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-6187" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6197" + +# fixed-version: Fixed after version 4.6 +CVE_CHECK_WHITELIST += "CVE-2016-6198" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6213" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6327" + +# fixed-version: Fixed after version 4.8rc3 +CVE_CHECK_WHITELIST += "CVE-2016-6480" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6516" + +# Skipping CVE-2016-6753, no affected_versions + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6786" + +# fixed-version: Fixed after version 4.0rc1 +CVE_CHECK_WHITELIST += "CVE-2016-6787" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_WHITELIST += "CVE-2016-6828" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-7039" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_WHITELIST += "CVE-2016-7042" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7097" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7117" + +# Skipping CVE-2016-7118, no affected_versions + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7425" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7910" + +# fixed-version: Fixed after version 4.7rc7 +CVE_CHECK_WHITELIST += "CVE-2016-7911" + +# fixed-version: Fixed after version 4.6rc5 +CVE_CHECK_WHITELIST += "CVE-2016-7912" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7913" + +# fixed-version: Fixed after version 4.6rc4 +CVE_CHECK_WHITELIST += "CVE-2016-7914" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-7915" + +# fixed-version: Fixed after version 4.6rc7 +CVE_CHECK_WHITELIST += "CVE-2016-7916" + +# fixed-version: Fixed after version 4.5rc6 +CVE_CHECK_WHITELIST += "CVE-2016-7917" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-8399" + +# Skipping CVE-2016-8401, no affected_versions + +# Skipping CVE-2016-8402, no affected_versions + +# Skipping CVE-2016-8403, no affected_versions + +# Skipping CVE-2016-8404, no affected_versions + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2016-8405" + +# Skipping CVE-2016-8406, no affected_versions + +# Skipping CVE-2016-8407, no affected_versions + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-8630" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8632" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-8633" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8636" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_WHITELIST += "CVE-2016-8645" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2016-8646" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-8650" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-8655" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-8658" + +# CVE-2016-8660 has no known resolution + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-8666" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9083" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9084" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9120" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9178" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9191" + +# fixed-version: Fixed after version 4.9rc3 +CVE_CHECK_WHITELIST += "CVE-2016-9313" + +# fixed-version: Fixed after version 4.9rc4 +CVE_CHECK_WHITELIST += "CVE-2016-9555" + +# fixed-version: Fixed after version 4.9 +CVE_CHECK_WHITELIST += "CVE-2016-9576" + +# fixed-version: Fixed after version 4.10rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9588" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9604" + +# Skipping CVE-2016-9644, no affected_versions + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9685" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9754" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9755" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9756" + +# fixed-version: Fixed after version 4.9rc7 +CVE_CHECK_WHITELIST += "CVE-2016-9777" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9793" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9794" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2016-9806" + +# fixed-version: Fixed after version 4.9rc8 +CVE_CHECK_WHITELIST += "CVE-2016-9919" + +# Skipping CVE-2017-0403, no affected_versions + +# Skipping CVE-2017-0404, no affected_versions + +# Skipping CVE-2017-0426, no affected_versions + +# Skipping CVE-2017-0427, no affected_versions + +# CVE-2017-0507 has no known resolution + +# CVE-2017-0508 has no known resolution + +# Skipping CVE-2017-0510, no affected_versions + +# Skipping CVE-2017-0528, no affected_versions + +# Skipping CVE-2017-0537, no affected_versions + +# CVE-2017-0564 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0605" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0627" + +# CVE-2017-0630 has no known resolution + +# CVE-2017-0749 has no known resolution + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2017-0750" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-0786" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-0861" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000111" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000112" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000251" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000252" + +# fixed-version: Fixed after version 4.1rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000253" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000255" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-1000363" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_WHITELIST += "CVE-2017-1000364" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-1000365" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000370" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-1000371" + +# fixed-version: Fixed after version 4.12rc6 +CVE_CHECK_WHITELIST += "CVE-2017-1000379" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-1000380" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-1000405" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-1000407" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-1000410" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10661" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10662" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10663" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-10810" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-10911" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11089" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11176" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-11472" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_WHITELIST += "CVE-2017-11473" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-11600" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-12134" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-12146" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2017-12153" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-12154" + +# fixed-version: Fixed after version 4.9rc6 +CVE_CHECK_WHITELIST += "CVE-2017-12168" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-12188" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-12190" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-12192" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-12193" + +# fixed-version: Fixed after version 4.13rc4 +CVE_CHECK_WHITELIST += "CVE-2017-12762" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-13080" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13166" + +# fixed-version: Fixed after version 4.5rc4 +CVE_CHECK_WHITELIST += "CVE-2017-13167" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2017-13168" + +# fixed-version: Fixed after version 4.5rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13215" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-13216" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2017-13220" + +# CVE-2017-13221 has no known resolution + +# CVE-2017-13222 has no known resolution + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-13305" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-13686" + +# CVE-2017-13693 has no known resolution + +# CVE-2017-13694 has no known resolution + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13695" + +# fixed-version: Fixed after version 4.3rc1 +CVE_CHECK_WHITELIST += "CVE-2017-13715" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14051" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14106" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-14140" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14156" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-14340" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14489" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-14497" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-14954" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2017-14991" + +# fixed-version: Fixed after version 4.9rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15102" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15115" + +# fixed-version: Fixed after version 4.2rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15116" + +# fixed-version: Fixed after version 3.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-15121" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-15126" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15127" + +# fixed-version: Fixed after version 4.14rc8 +CVE_CHECK_WHITELIST += "CVE-2017-15128" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15129" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15265" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-15274" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15299" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-15306" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-15537" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-15649" + +# fixed-version: Fixed after version 3.19rc3 +CVE_CHECK_WHITELIST += "CVE-2017-15868" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-15951" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16525" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16526" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16527" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16528" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16529" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16530" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16531" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16532" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16533" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16534" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-16535" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16536" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16537" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16538" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-16643" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16644" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2017-16645" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16646" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16647" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16648" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16649" + +# fixed-version: Fixed after version 4.14 +CVE_CHECK_WHITELIST += "CVE-2017-16650" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16911" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16912" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16913" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-16914" + +# fixed-version: Fixed after version 4.14rc7 +CVE_CHECK_WHITELIST += "CVE-2017-16939" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-16994" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16995" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-16996" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-17052" + +# fixed-version: Fixed after version 4.13rc7 +CVE_CHECK_WHITELIST += "CVE-2017-17053" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17448" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17449" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17450" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17558" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17712" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17741" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17805" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-17806" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-17807" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17852" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17853" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17854" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17855" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17856" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17857" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-17862" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17863" + +# fixed-version: Fixed after version 4.15rc5 +CVE_CHECK_WHITELIST += "CVE-2017-17864" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2017-17975" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_WHITELIST += "CVE-2017-18017" + +# fixed-version: Fixed after version 4.15rc7 +CVE_CHECK_WHITELIST += "CVE-2017-18075" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18079" + +# CVE-2017-18169 has no known resolution + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18174" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18193" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-18200" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18202" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18203" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18204" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18208" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18216" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18218" + +# fixed-version: Fixed after version 4.12rc4 +CVE_CHECK_WHITELIST += "CVE-2017-18221" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18222" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18224" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18232" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18241" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18249" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18255" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18257" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2017-18261" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-18270" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2017-18344" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-18360" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2017-18379" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18509" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18549" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18550" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2017-18551" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-18552" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2017-18595" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-2583" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-2584" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2596" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-2618" + +# fixed-version: Fixed after version 2.6.25rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2634" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-2636" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2017-2647" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-2671" + +# fixed-version: Fixed after version 4.14rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5123" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5546" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5547" + +# fixed-version: Fixed after version 4.10rc5 +CVE_CHECK_WHITELIST += "CVE-2017-5548" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5549" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5550" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-5551" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2017-5576" + +# fixed-version: Fixed after version 4.10rc6 +CVE_CHECK_WHITELIST += "CVE-2017-5577" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5669" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5715" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5753" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5754" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5897" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5967" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5970" + +# fixed-version: Fixed after version 4.4rc1 +CVE_CHECK_WHITELIST += "CVE-2017-5972" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-5986" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-6001" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6074" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-6214" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6345" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6346" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6347" + +# fixed-version: Fixed after version 4.10 +CVE_CHECK_WHITELIST += "CVE-2017-6348" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6353" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-6874" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2017-6951" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7184" + +# fixed-version: Fixed after version 4.11rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7187" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7261" + +# fixed-version: Fixed after version 4.10rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7273" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7277" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7294" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7308" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-7346" + +# CVE-2017-7369 has no known resolution + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-7374" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7472" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7477" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7482" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7487" + +# fixed-version: Fixed after version 4.7rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7495" + +# fixed-version: Fixed after version 4.12rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7518" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7533" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-7541" + +# fixed-version: Fixed after version 4.13rc2 +CVE_CHECK_WHITELIST += "CVE-2017-7542" + +# fixed-version: Fixed after version 4.13 +CVE_CHECK_WHITELIST += "CVE-2017-7558" + +# fixed-version: Fixed after version 4.11rc6 +CVE_CHECK_WHITELIST += "CVE-2017-7616" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7618" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7645" + +# fixed-version: Fixed after version 4.11rc7 +CVE_CHECK_WHITELIST += "CVE-2017-7889" + +# fixed-version: Fixed after version 4.11 +CVE_CHECK_WHITELIST += "CVE-2017-7895" + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2017-7979" + +# fixed-version: Fixed after version 4.11rc4 +CVE_CHECK_WHITELIST += "CVE-2017-8061" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8062" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8063" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8064" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8066" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8067" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8068" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8069" + +# fixed-version: Fixed after version 4.10rc8 +CVE_CHECK_WHITELIST += "CVE-2017-8070" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_WHITELIST += "CVE-2017-8071" + +# fixed-version: Fixed after version 4.10rc7 +CVE_CHECK_WHITELIST += "CVE-2017-8072" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8106" + +# fixed-version: Fixed after version 3.19rc6 +CVE_CHECK_WHITELIST += "CVE-2017-8240" + +# CVE-2017-8242 has no known resolution + +# CVE-2017-8244 has no known resolution + +# CVE-2017-8245 has no known resolution + +# CVE-2017-8246 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8797" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2017-8824" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8831" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-8890" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8924" + +# fixed-version: Fixed after version 4.11rc2 +CVE_CHECK_WHITELIST += "CVE-2017-8925" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9059" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9074" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9075" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9076" + +# fixed-version: Fixed after version 4.12rc2 +CVE_CHECK_WHITELIST += "CVE-2017-9077" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9150" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-9211" + +# fixed-version: Fixed after version 4.12rc3 +CVE_CHECK_WHITELIST += "CVE-2017-9242" + +# fixed-version: Fixed after version 4.12rc5 +CVE_CHECK_WHITELIST += "CVE-2017-9605" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2017-9725" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9984" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9985" + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2017-9986" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-1000004" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1000026" + +# fixed-version: Fixed after version 4.15 +CVE_CHECK_WHITELIST += "CVE-2018-1000028" + +# fixed-version: Fixed after version 4.16 +CVE_CHECK_WHITELIST += "CVE-2018-1000199" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2018-1000200" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1000204" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-10021" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-10074" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10087" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10124" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10322" + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10323" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-1065" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1066" + +# fixed-version: Fixed after version 4.13rc6 +CVE_CHECK_WHITELIST += "CVE-2018-10675" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-1068" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10840" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10853" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1087" + +# CVE-2018-10872 has no known resolution + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10876" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10877" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10878" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10879" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10880" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10881" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10882" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-10883" + +# fixed-version: Fixed after version 2.6.36rc1 +CVE_CHECK_WHITELIST += "CVE-2018-10901" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_WHITELIST += "CVE-2018-10902" + +# fixed-version: Fixed after version 4.14rc2 +CVE_CHECK_WHITELIST += "CVE-2018-1091" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1092" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1093" + +# fixed-version: Fixed after version 4.13rc5 +CVE_CHECK_WHITELIST += "CVE-2018-10938" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1094" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-10940" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1095" + +# fixed-version: Fixed after version 4.17rc2 +CVE_CHECK_WHITELIST += "CVE-2018-1108" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1118" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_WHITELIST += "CVE-2018-1120" + +# CVE-2018-1121 has no known resolution + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-11232" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1128" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-1129" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-1130" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-11412" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-11506" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2018-11508" + +# CVE-2018-11987 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12126" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12127" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12130" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12207" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12232" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12233" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12633" + +# fixed-version: Fixed after version 4.18rc2 +CVE_CHECK_WHITELIST += "CVE-2018-12714" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12896" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-12904" + +# CVE-2018-12928 has no known resolution + +# CVE-2018-12929 has no known resolution + +# CVE-2018-12930 has no known resolution + +# CVE-2018-12931 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13053" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13093" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13094" + +# fixed-version: Fixed after version 4.18rc3 +CVE_CHECK_WHITELIST += "CVE-2018-13095" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13096" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13097" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13098" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13099" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13100" + +# fixed-version: Fixed after version 4.18rc4 +CVE_CHECK_WHITELIST += "CVE-2018-13405" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-13406" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14609" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14610" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14611" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14612" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14613" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14614" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14615" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14616" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14617" + +# fixed-version: Fixed after version 4.15rc4 +CVE_CHECK_WHITELIST += "CVE-2018-14619" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-14625" + +# fixed-version: Fixed after version 4.19rc6 +CVE_CHECK_WHITELIST += "CVE-2018-14633" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14634" + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_WHITELIST += "CVE-2018-14641" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-14646" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_WHITELIST += "CVE-2018-14656" + +# fixed-version: Fixed after version 4.18rc8 +CVE_CHECK_WHITELIST += "CVE-2018-14678" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-14734" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-15471" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-15572" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-15594" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16276" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2018-16597" + +# fixed-version: Fixed after version 4.19rc2 +CVE_CHECK_WHITELIST += "CVE-2018-16658" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16862" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_WHITELIST += "CVE-2018-16871" + +# fixed-version: Fixed after version 5.0rc5 +CVE_CHECK_WHITELIST += "CVE-2018-16880" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2018-16882" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-16884" + +# CVE-2018-16885 has no known resolution + +# fixed-version: Fixed after version 4.19rc4 +CVE_CHECK_WHITELIST += "CVE-2018-17182" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-17972" + +# CVE-2018-17977 has no known resolution + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-18021" + +# fixed-version: Fixed after version 4.19 +CVE_CHECK_WHITELIST += "CVE-2018-18281" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2018-18386" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-18397" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2018-18445" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-18559" + +# CVE-2018-18653 has no known resolution + +# fixed-version: Fixed after version 4.17rc4 +CVE_CHECK_WHITELIST += "CVE-2018-18690" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-18710" + +# fixed-version: Fixed after version 4.20rc2 +CVE_CHECK_WHITELIST += "CVE-2018-18955" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-19406" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2018-19407" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-19824" + +# fixed-version: Fixed after version 4.20rc3 +CVE_CHECK_WHITELIST += "CVE-2018-19854" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2018-19985" + +# fixed-version: Fixed after version 4.20rc6 +CVE_CHECK_WHITELIST += "CVE-2018-20169" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-20449" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20509" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-20510" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_WHITELIST += "CVE-2018-20511" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20669" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20784" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20836" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20854" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20855" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20856" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20961" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-20976" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2018-21008" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-25015" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-25020" + +# CVE-2018-3574 has no known resolution + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3620" + +# fixed-version: Fixed after version 4.17rc7 +CVE_CHECK_WHITELIST += "CVE-2018-3639" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3646" + +# fixed-version: Fixed after version 3.7rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3665" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-3693" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5332" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5333" + +# fixed-version: Fixed after version 4.15rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5344" + +# fixed-version: Fixed after version 4.18rc7 +CVE_CHECK_WHITELIST += "CVE-2018-5390" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5391" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-5703" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5750" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5803" + +# fixed-version: Fixed after version 4.17rc6 +CVE_CHECK_WHITELIST += "CVE-2018-5814" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-5848" + +# Skipping CVE-2018-5856, no affected_versions + +# fixed-version: Fixed after version 4.11rc8 +CVE_CHECK_WHITELIST += "CVE-2018-5873" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-5953" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-5995" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-6412" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-6554" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2018-6555" + +# CVE-2018-6559 has no known resolution + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2018-6927" + +# fixed-version: Fixed after version 4.14rc6 +CVE_CHECK_WHITELIST += "CVE-2018-7191" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7273" + +# fixed-version: Fixed after version 4.11rc1 +CVE_CHECK_WHITELIST += "CVE-2018-7480" + +# fixed-version: Fixed after version 4.15rc3 +CVE_CHECK_WHITELIST += "CVE-2018-7492" + +# fixed-version: Fixed after version 4.16rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7566" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-7740" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2018-7754" + +# fixed-version: Fixed after version 4.19rc5 +CVE_CHECK_WHITELIST += "CVE-2018-7755" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-7757" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2018-7995" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-8043" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2018-8087" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8781" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8822" + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2018-8897" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9363" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9385" + +# fixed-version: Fixed after version 4.17rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9415" + +# fixed-version: Fixed after version 4.6rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9422" + +# fixed-version: Fixed after version 4.15rc6 +CVE_CHECK_WHITELIST += "CVE-2018-9465" + +# fixed-version: Fixed after version 4.18rc5 +CVE_CHECK_WHITELIST += "CVE-2018-9516" + +# fixed-version: Fixed after version 4.14rc1 +CVE_CHECK_WHITELIST += "CVE-2018-9517" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2018-9518" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2018-9568" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-0136" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0145" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0146" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0147" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0148" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-0149" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-0154" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-0155" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10124" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-10126" + +# CVE-2019-10140 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10142" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_WHITELIST += "CVE-2019-10207" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-10220" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-10638" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-10639" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-11085" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11091" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-11135" + +# fixed-version: Fixed after version 4.8rc5 +CVE_CHECK_WHITELIST += "CVE-2019-11190" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11191" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-1125" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11477" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11478" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11479" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-11486" + +# fixed-version: Fixed after version 5.1rc5 +CVE_CHECK_WHITELIST += "CVE-2019-11487" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-11599" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-11683" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11810" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11811" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-11815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11833" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-11884" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12378" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12379" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12380" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-12381" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12382" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12454" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12455" + +# CVE-2019-12456 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12614" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-12615" + +# fixed-version: Fixed after version 5.2rc7 +CVE_CHECK_WHITELIST += "CVE-2019-12817" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-12818" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_WHITELIST += "CVE-2019-12819" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2019-12881" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-12984" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-13233" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-13272" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-13631" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-13648" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14283" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14284" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-14615" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14763" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14814" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14815" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-14821" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-14835" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-14895" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2019-14896" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2019-14897" + +# CVE-2019-14898 has no known resolution + +# cpe-stable-backport: Backported in 5.4.11 +CVE_CHECK_WHITELIST += "CVE-2019-14901" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_WHITELIST += "CVE-2019-15030" + +# fixed-version: Fixed after version 5.3rc8 +CVE_CHECK_WHITELIST += "CVE-2019-15031" + +# fixed-version: Fixed after version 5.2rc2 +CVE_CHECK_WHITELIST += "CVE-2019-15090" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15098" + +# cpe-stable-backport: Backported in 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15099" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-15117" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-15118" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15211" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15212" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15213" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15214" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15215" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-15216" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15217" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15218" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15219" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15220" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-15221" + +# fixed-version: Fixed after version 5.3rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15222" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15223" + +# CVE-2019-15239 has no known resolution + +# CVE-2019-15290 has no known resolution + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-15291" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15292" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-15504" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15505" + +# fixed-version: Fixed after version 5.3rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15538" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-15666" + +# CVE-2019-15791 has no known resolution + +# CVE-2019-15792 has no known resolution + +# CVE-2019-15793 has no known resolution + +# CVE-2019-15794 needs backporting (fixed from 5.12) + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15807" + +# CVE-2019-15902 has no known resolution + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15916" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15917" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15918" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15919" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-15920" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-15921" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15922" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15923" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-15924" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15925" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-15926" + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_WHITELIST += "CVE-2019-15927" + +# CVE-2019-16089 has no known resolution + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16229" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16230" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-16231" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-16232" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_WHITELIST += "CVE-2019-16233" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-16234" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16413" + +# fixed-version: Fixed after version 5.3rc7 +CVE_CHECK_WHITELIST += "CVE-2019-16714" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-16746" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16921" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-16994" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-16995" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17052" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17053" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17054" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17055" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17056" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-17075" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-17133" + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-17351" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-17666" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-18198" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-18282" + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-18660" + +# fixed-version: Fixed after version 4.17rc5 +CVE_CHECK_WHITELIST += "CVE-2019-18675" + +# CVE-2019-18680 has no known resolution + +# cpe-stable-backport: Backported in 5.4.1 +CVE_CHECK_WHITELIST += "CVE-2019-18683" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-18786" + +# fixed-version: Fixed after version 5.1rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18805" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18806" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18807" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2019-18808" + +# cpe-stable-backport: Backported in 5.4.9 +CVE_CHECK_WHITELIST += "CVE-2019-18809" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-18810" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18811" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-18812" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-18813" + +# cpe-stable-backport: Backported in 5.4.43 +CVE_CHECK_WHITELIST += "CVE-2019-18814" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-18885" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19036" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19037" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2019-19039" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2019-19043" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19044" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19045" + +# cpe-stable-backport: Backported in 5.4.15 +CVE_CHECK_WHITELIST += "CVE-2019-19046" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19047" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19048" + +# fixed-version: Fixed after version 5.4rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19049" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19050" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19051" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19052" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19053" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2019-19054" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19055" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19056" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19057" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19058" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19059" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19060" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19061" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19062" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19063" + +# cpe-stable-backport: Backported in 5.4.13 +CVE_CHECK_WHITELIST += "CVE-2019-19064" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19065" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19066" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19067" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19068" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19069" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19070" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19071" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19072" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19073" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19074" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19075" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19076" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19077" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-19078" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-19079" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19080" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19081" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19082" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19083" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19227" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2019-19241" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19252" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19318" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19319" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19332" + +# cpe-stable-backport: Backported in 5.4.3 +CVE_CHECK_WHITELIST += "CVE-2019-19338" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2019-19377" + +# CVE-2019-19378 has no known resolution + +# cpe-stable-backport: Backported in 5.4.4 +CVE_CHECK_WHITELIST += "CVE-2019-19447" + +# cpe-stable-backport: Backported in 5.4.60 +CVE_CHECK_WHITELIST += "CVE-2019-19448" + +# CVE-2019-19449 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.45 +CVE_CHECK_WHITELIST += "CVE-2019-19462" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19523" + +# fixed-version: Fixed after version 5.4rc8 +CVE_CHECK_WHITELIST += "CVE-2019-19524" + +# fixed-version: Fixed after version 5.4rc2 +CVE_CHECK_WHITELIST += "CVE-2019-19525" + +# fixed-version: Fixed after version 5.4rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19526" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19527" + +# fixed-version: Fixed after version 5.4rc3 +CVE_CHECK_WHITELIST += "CVE-2019-19528" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19529" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19530" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19531" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19532" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19533" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19534" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19535" + +# fixed-version: Fixed after version 5.3rc4 +CVE_CHECK_WHITELIST += "CVE-2019-19536" + +# fixed-version: Fixed after version 5.3rc5 +CVE_CHECK_WHITELIST += "CVE-2019-19537" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19543" + +# cpe-stable-backport: Backported in 5.4.2 +CVE_CHECK_WHITELIST += "CVE-2019-19602" + +# cpe-stable-backport: Backported in 5.4.2 +CVE_CHECK_WHITELIST += "CVE-2019-19767" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2019-19768" + +# cpe-stable-backport: Backported in 5.4.28 +CVE_CHECK_WHITELIST += "CVE-2019-19769" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2019-19770" + +# fixed-version: Fixed after version 5.4rc7 +CVE_CHECK_WHITELIST += "CVE-2019-19807" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19813" + +# CVE-2019-19814 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19815" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19816" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19922" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-19927" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-19947" + +# cpe-stable-backport: Backported in 5.4.9 +CVE_CHECK_WHITELIST += "CVE-2019-19965" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-19966" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-1999" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-20054" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20095" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-20096" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2024" + +# fixed-version: Fixed after version 4.20rc5 +CVE_CHECK_WHITELIST += "CVE-2019-2025" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20422" + +# fixed-version: Fixed after version 4.8rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2054" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2019-20636" + +# CVE-2019-20794 has no known resolution + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20806" + +# cpe-stable-backport: Backported in 5.4.48 +CVE_CHECK_WHITELIST += "CVE-2019-20810" + +# fixed-version: Fixed after version 5.1rc3 +CVE_CHECK_WHITELIST += "CVE-2019-20811" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2019-20812" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2019-20908" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-20934" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2101" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2181" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2019-2182" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-2213" + +# fixed-version: Fixed after version 5.3rc2 +CVE_CHECK_WHITELIST += "CVE-2019-2214" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2019-2215" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-25044" + +# fixed-version: Fixed after version 5.1 +CVE_CHECK_WHITELIST += "CVE-2019-25045" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-25160" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2019-25162" + +# cpe-stable-backport: Backported in 5.4.19 +CVE_CHECK_WHITELIST += "CVE-2019-3016" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3459" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3460" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-3701" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3819" + +# fixed-version: Fixed after version 3.18rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3837" + +# fixed-version: Fixed after version 5.2rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3846" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3874" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3882" + +# fixed-version: Fixed after version 5.1rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3887" + +# fixed-version: Fixed after version 5.1rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3892" + +# fixed-version: Fixed after version 2.6.35rc1 +CVE_CHECK_WHITELIST += "CVE-2019-3896" + +# fixed-version: Fixed after version 5.2rc4 +CVE_CHECK_WHITELIST += "CVE-2019-3900" + +# fixed-version: Fixed after version 4.6rc6 +CVE_CHECK_WHITELIST += "CVE-2019-3901" + +# fixed-version: Fixed after version 5.3 +CVE_CHECK_WHITELIST += "CVE-2019-5108" + +# Skipping CVE-2019-5489, no affected_versions + +# fixed-version: Fixed after version 5.0rc2 +CVE_CHECK_WHITELIST += "CVE-2019-6133" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-6974" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-7221" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-7222" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2019-7308" + +# fixed-version: Fixed after version 5.0rc8 +CVE_CHECK_WHITELIST += "CVE-2019-8912" + +# fixed-version: Fixed after version 5.0rc6 +CVE_CHECK_WHITELIST += "CVE-2019-8956" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-8980" + +# fixed-version: Fixed after version 5.0rc4 +CVE_CHECK_WHITELIST += "CVE-2019-9003" + +# fixed-version: Fixed after version 5.0rc7 +CVE_CHECK_WHITELIST += "CVE-2019-9162" + +# fixed-version: Fixed after version 5.0 +CVE_CHECK_WHITELIST += "CVE-2019-9213" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9245" + +# fixed-version: Fixed after version 4.15rc2 +CVE_CHECK_WHITELIST += "CVE-2019-9444" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9445" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9453" + +# fixed-version: Fixed after version 4.15rc9 +CVE_CHECK_WHITELIST += "CVE-2019-9454" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9455" + +# fixed-version: Fixed after version 4.16rc6 +CVE_CHECK_WHITELIST += "CVE-2019-9456" + +# fixed-version: Fixed after version 4.13rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9457" + +# fixed-version: Fixed after version 4.19rc7 +CVE_CHECK_WHITELIST += "CVE-2019-9458" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9466" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9500" + +# fixed-version: Fixed after version 5.1rc1 +CVE_CHECK_WHITELIST += "CVE-2019-9503" + +# fixed-version: Fixed after version 5.2 +CVE_CHECK_WHITELIST += "CVE-2019-9506" + +# fixed-version: Fixed after version 5.1rc2 +CVE_CHECK_WHITELIST += "CVE-2019-9857" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-0009" + +# fixed-version: Fixed after version 4.16rc3 +CVE_CHECK_WHITELIST += "CVE-2020-0030" + +# cpe-stable-backport: Backported in 5.4.4 +CVE_CHECK_WHITELIST += "CVE-2020-0041" + +# fixed-version: Fixed after version 4.3rc7 +CVE_CHECK_WHITELIST += "CVE-2020-0066" + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-0067" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-0110" + +# cpe-stable-backport: Backported in 5.4.39 +CVE_CHECK_WHITELIST += "CVE-2020-0255" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2020-0305" + +# CVE-2020-0347 has no known resolution + +# cpe-stable-backport: Backported in 5.4.19 +CVE_CHECK_WHITELIST += "CVE-2020-0404" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-0423" + +# cpe-stable-backport: Backported in 5.4.7 +CVE_CHECK_WHITELIST += "CVE-2020-0427" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2020-0429" + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0430" + +# cpe-stable-backport: Backported in 5.4.12 +CVE_CHECK_WHITELIST += "CVE-2020-0431" + +# cpe-stable-backport: Backported in 5.4.17 +CVE_CHECK_WHITELIST += "CVE-2020-0432" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0433" + +# fixed-version: Fixed after version 4.19rc1 +CVE_CHECK_WHITELIST += "CVE-2020-0435" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-0444" + +# cpe-stable-backport: Backported in 5.4.63 +CVE_CHECK_WHITELIST += "CVE-2020-0465" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-0466" + +# cpe-stable-backport: Backported in 5.4.46 +CVE_CHECK_WHITELIST += "CVE-2020-0543" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-10135" + +# cpe-stable-backport: Backported in 5.4.8 +CVE_CHECK_WHITELIST += "CVE-2020-10690" + +# CVE-2020-10708 has no known resolution + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-10711" + +# fixed-version: Fixed after version 5.2rc3 +CVE_CHECK_WHITELIST += "CVE-2020-10720" + +# cpe-stable-backport: Backported in 5.4.44 +CVE_CHECK_WHITELIST += "CVE-2020-10732" + +# fixed-version: Fixed after version 3.16rc1 +CVE_CHECK_WHITELIST += "CVE-2020-10742" + +# cpe-stable-backport: Backported in 5.4.39 +CVE_CHECK_WHITELIST += "CVE-2020-10751" + +# cpe-stable-backport: Backported in 5.4.45 +CVE_CHECK_WHITELIST += "CVE-2020-10757" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10766" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10767" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-10768" + +# fixed-version: Fixed after version 5.0rc3 +CVE_CHECK_WHITELIST += "CVE-2020-10769" + +# fixed-version: Fixed after version 5.4rc6 +CVE_CHECK_WHITELIST += "CVE-2020-10773" + +# CVE-2020-10774 has no known resolution + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2020-10781" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-10942" + +# cpe-stable-backport: Backported in 5.4.32 +CVE_CHECK_WHITELIST += "CVE-2020-11494" + +# cpe-stable-backport: Backported in 5.4.31 +CVE_CHECK_WHITELIST += "CVE-2020-11565" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11608" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11609" + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-11668" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2020-11669" + +# CVE-2020-11725 has no known resolution + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-11884" + +# CVE-2020-11935 has no known resolution + +# fixed-version: Fixed after version 5.3rc1 +CVE_CHECK_WHITELIST += "CVE-2020-12114" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-12351" + +# cpe-stable-backport: Backported in 5.4.72 +CVE_CHECK_WHITELIST += "CVE-2020-12352" + +# CVE-2020-12362 needs backporting (fixed from 5.11rc1) + +# CVE-2020-12363 needs backporting (fixed from 5.11rc1) + +# CVE-2020-12364 needs backporting (fixed from 5.11rc1) + +# cpe-stable-backport: Backported in 5.4.36 +CVE_CHECK_WHITELIST += "CVE-2020-12464" + +# cpe-stable-backport: Backported in 5.4.26 +CVE_CHECK_WHITELIST += "CVE-2020-12465" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2020-12652" + +# cpe-stable-backport: Backported in 5.4.20 +CVE_CHECK_WHITELIST += "CVE-2020-12653" + +# cpe-stable-backport: Backported in 5.4.20 +CVE_CHECK_WHITELIST += "CVE-2020-12654" + +# cpe-stable-backport: Backported in 5.4.50 +CVE_CHECK_WHITELIST += "CVE-2020-12655" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2020-12656" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2020-12657" + +# cpe-stable-backport: Backported in 5.4.35 +CVE_CHECK_WHITELIST += "CVE-2020-12659" + +# cpe-stable-backport: Backported in 5.4.43 +CVE_CHECK_WHITELIST += "CVE-2020-12768" + +# cpe-stable-backport: Backported in 5.4.17 +CVE_CHECK_WHITELIST += "CVE-2020-12769" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-12770" + +# cpe-stable-backport: Backported in 5.4.49 +CVE_CHECK_WHITELIST += "CVE-2020-12771" + +# cpe-stable-backport: Backported in 5.4.33 +CVE_CHECK_WHITELIST += "CVE-2020-12826" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-12888" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-12912" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-13143" + +# cpe-stable-backport: Backported in 5.4.46 +CVE_CHECK_WHITELIST += "CVE-2020-13974" + +# CVE-2020-14304 has no known resolution + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2020-14305" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-14314" + +# cpe-stable-backport: Backported in 5.4.58 +CVE_CHECK_WHITELIST += "CVE-2020-14331" + +# cpe-stable-backport: Backported in 5.4.78 +CVE_CHECK_WHITELIST += "CVE-2020-14351" + +# fixed-version: Fixed after version 4.14rc3 +CVE_CHECK_WHITELIST += "CVE-2020-14353" + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2020-14356" + +# cpe-stable-backport: Backported in 5.4.28 +CVE_CHECK_WHITELIST += "CVE-2020-14381" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-14385" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-14386" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-14390" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2020-14416" + +# cpe-stable-backport: Backported in 5.4.51 +CVE_CHECK_WHITELIST += "CVE-2020-15393" + +# cpe-stable-backport: Backported in 5.4.49 +CVE_CHECK_WHITELIST += "CVE-2020-15436" + +# cpe-stable-backport: Backported in 5.4.54 +CVE_CHECK_WHITELIST += "CVE-2020-15437" + +# cpe-stable-backport: Backported in 5.4.50 +CVE_CHECK_WHITELIST += "CVE-2020-15780" + +# CVE-2020-15802 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-15852" + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2020-16119" + +# CVE-2020-16120 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.57 +CVE_CHECK_WHITELIST += "CVE-2020-16166" + +# cpe-stable-backport: Backported in 5.4.5 +CVE_CHECK_WHITELIST += "CVE-2020-1749" + +# cpe-stable-backport: Backported in 5.4.51 +CVE_CHECK_WHITELIST += "CVE-2020-24394" + +# cpe-stable-backport: Backported in 5.4.56 +CVE_CHECK_WHITELIST += "CVE-2020-24490" + +# CVE-2020-24502 has no known resolution + +# CVE-2020-24503 has no known resolution + +# CVE-2020-24504 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24586" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24587" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-24588" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2020-25211" + +# cpe-stable-backport: Backported in 5.4.60 +CVE_CHECK_WHITELIST += "CVE-2020-25212" + +# CVE-2020-25220 has no known resolution + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-25221" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-25284" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-25285" + +# cpe-stable-backport: Backported in 5.4.102 +CVE_CHECK_WHITELIST += "CVE-2020-25639" + +# cpe-stable-backport: Backported in 5.4.64 +CVE_CHECK_WHITELIST += "CVE-2020-25641" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2020-25643" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2020-25645" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-25656" + +# CVE-2020-25661 has no known resolution + +# CVE-2020-25662 has no known resolution + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-25668" + +# cpe-stable-backport: Backported in 5.4.79 +CVE_CHECK_WHITELIST += "CVE-2020-25669" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25670" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25671" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25672" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2020-25673" + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-25704" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-25705" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2020-26088" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26139" + +# CVE-2020-26140 has no known resolution + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26141" + +# CVE-2020-26142 has no known resolution + +# CVE-2020-26143 has no known resolution + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26145" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2020-26147" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2020-26541" + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2020-26555" + +# CVE-2020-26556 has no known resolution + +# CVE-2020-26557 has no known resolution + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2020-26558" + +# CVE-2020-26559 has no known resolution + +# CVE-2020-26560 has no known resolution + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2020-27066" + +# fixed-version: Fixed after version 4.14rc4 +CVE_CHECK_WHITELIST += "CVE-2020-27067" + +# cpe-stable-backport: Backported in 5.4.24 +CVE_CHECK_WHITELIST += "CVE-2020-27068" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27152" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27170" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27171" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-27194" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-2732" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-27418" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27673" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27675" + +# cpe-stable-backport: Backported in 5.4.75 +CVE_CHECK_WHITELIST += "CVE-2020-27777" + +# cpe-stable-backport: Backported in 5.4.73 +CVE_CHECK_WHITELIST += "CVE-2020-27784" + +# cpe-stable-backport: Backported in 5.4.42 +CVE_CHECK_WHITELIST += "CVE-2020-27786" + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-27815" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2020-27820" + +# cpe-stable-backport: Backported in 5.4.94 +CVE_CHECK_WHITELIST += "CVE-2020-27825" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-27830" + +# CVE-2020-27835 needs backporting (fixed from 5.10rc6) + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-28097" + +# cpe-stable-backport: Backported in 5.4.89 +CVE_CHECK_WHITELIST += "CVE-2020-28374" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-28588" + +# cpe-stable-backport: Backported in 5.4.71 +CVE_CHECK_WHITELIST += "CVE-2020-28915" + +# cpe-stable-backport: Backported in 5.4.80 +CVE_CHECK_WHITELIST += "CVE-2020-28941" + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-28974" + +# cpe-stable-backport: Backported in 5.4.48 +CVE_CHECK_WHITELIST += "CVE-2020-29368" + +# cpe-stable-backport: Backported in 5.4.54 +CVE_CHECK_WHITELIST += "CVE-2020-29369" + +# cpe-stable-backport: Backported in 5.4.27 +CVE_CHECK_WHITELIST += "CVE-2020-29370" + +# cpe-stable-backport: Backported in 5.4.61 +CVE_CHECK_WHITELIST += "CVE-2020-29371" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-29372" + +# CVE-2020-29373 needs backporting (fixed from 5.6rc2) + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2020-29374" + +# CVE-2020-29534 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-29568" + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-29569" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-29660" + +# cpe-stable-backport: Backported in 5.4.83 +CVE_CHECK_WHITELIST += "CVE-2020-29661" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-35499" + +# CVE-2020-35501 has no known resolution + +# cpe-stable-backport: Backported in 5.4.76 +CVE_CHECK_WHITELIST += "CVE-2020-35508" + +# fixed-version: Fixed after version 4.17rc1 +CVE_CHECK_WHITELIST += "CVE-2020-35513" + +# cpe-stable-backport: Backported in 5.4.82 +CVE_CHECK_WHITELIST += "CVE-2020-35519" + +# cpe-stable-backport: Backported in 5.4.88 +CVE_CHECK_WHITELIST += "CVE-2020-36158" + +# CVE-2020-36310 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.131 +CVE_CHECK_WHITELIST += "CVE-2020-36311" + +# cpe-stable-backport: Backported in 5.4.66 +CVE_CHECK_WHITELIST += "CVE-2020-36312" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36313" + +# cpe-stable-backport: Backported in 5.4.88 +CVE_CHECK_WHITELIST += "CVE-2020-36322" + +# CVE-2020-36385 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.58 +CVE_CHECK_WHITELIST += "CVE-2020-36386" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36387" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2020-36516" + +# cpe-stable-backport: Backported in 5.4.30 +CVE_CHECK_WHITELIST += "CVE-2020-36557" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-36558" + +# CVE-2020-36691 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.86 +CVE_CHECK_WHITELIST += "CVE-2020-36694" + +# cpe-stable-backport: Backported in 5.4.62 +CVE_CHECK_WHITELIST += "CVE-2020-36766" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2020-36775" + +# fixed-version: only affects 5.8rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36776" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2020-36777" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36778" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36779" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2020-36780" + +# CVE-2020-36781 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2020-36782" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2020-36783" + +# CVE-2020-36784 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36785" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-36786" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2020-36787" + +# cpe-stable-backport: Backported in 5.4.143 +CVE_CHECK_WHITELIST += "CVE-2020-3702" + +# cpe-stable-backport: Backported in 5.4.79 +CVE_CHECK_WHITELIST += "CVE-2020-4788" + +# fixed-version: Fixed after version 5.2rc1 +CVE_CHECK_WHITELIST += "CVE-2020-7053" + +# cpe-stable-backport: Backported in 5.4.16 +CVE_CHECK_WHITELIST += "CVE-2020-8428" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8647" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8648" + +# cpe-stable-backport: Backported in 5.4.25 +CVE_CHECK_WHITELIST += "CVE-2020-8649" + +# cpe-stable-backport: Backported in 5.4.77 +CVE_CHECK_WHITELIST += "CVE-2020-8694" + +# CVE-2020-8832 has no known resolution + +# fixed-version: Fixed after version 4.18rc1 +CVE_CHECK_WHITELIST += "CVE-2020-8834" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2020-8835" + +# cpe-stable-backport: Backported in 5.4.21 +CVE_CHECK_WHITELIST += "CVE-2020-8992" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-9383" + +# cpe-stable-backport: Backported in 5.4.23 +CVE_CHECK_WHITELIST += "CVE-2020-9391" + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2021-0129" + +# cpe-stable-backport: Backported in 5.4.47 +CVE_CHECK_WHITELIST += "CVE-2021-0342" + +# CVE-2021-0399 has no known resolution + +# fixed-version: Fixed after version 4.15rc1 +CVE_CHECK_WHITELIST += "CVE-2021-0447" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2021-0448" + +# cpe-stable-backport: Backported in 5.4.101 +CVE_CHECK_WHITELIST += "CVE-2021-0512" + +# cpe-stable-backport: Backported in 5.4.68 +CVE_CHECK_WHITELIST += "CVE-2021-0605" + +# CVE-2021-0606 has no known resolution + +# CVE-2021-0695 has no known resolution + +# fixed-version: only affects 5.8rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-0707" + +# cpe-stable-backport: Backported in 5.4.137 +CVE_CHECK_WHITELIST += "CVE-2021-0920" + +# CVE-2021-0924 has no known resolution + +# CVE-2021-0929 needs backporting (fixed from 5.6rc1) + +# fixed-version: Fixed after version 4.16rc7 +CVE_CHECK_WHITELIST += "CVE-2021-0935" + +# CVE-2021-0936 has no known resolution + +# cpe-stable-backport: Backported in 5.4.113 +CVE_CHECK_WHITELIST += "CVE-2021-0937" + +# cpe-stable-backport: Backported in 5.4.84 +CVE_CHECK_WHITELIST += "CVE-2021-0938" + +# cpe-stable-backport: Backported in 5.4.110 +CVE_CHECK_WHITELIST += "CVE-2021-0941" + +# CVE-2021-0961 has no known resolution + +# fixed-version: only affects 5.9rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2021-1048" + +# CVE-2021-20177 needs backporting (fixed from 5.5rc1) + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20194" + +# CVE-2021-20219 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20226" + +# CVE-2021-20239 needs backporting (fixed from 5.9rc1) + +# fixed-version: Fixed after version 4.5rc5 +CVE_CHECK_WHITELIST += "CVE-2021-20261" + +# fixed-version: Fixed after version 4.5rc3 +CVE_CHECK_WHITELIST += "CVE-2021-20265" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-20268" + +# cpe-stable-backport: Backported in 5.4.59 +CVE_CHECK_WHITELIST += "CVE-2021-20292" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2021-20317" + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2021-20320" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-20321" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-20322" + +# cpe-stable-backport: Backported in 5.4.99 +CVE_CHECK_WHITELIST += "CVE-2021-21781" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2021-22543" + +# cpe-stable-backport: Backported in 5.4.113 +CVE_CHECK_WHITELIST += "CVE-2021-22555" + +# fixed-version: only affects 5.6 onwards +CVE_CHECK_WHITELIST += "CVE-2021-22600" + +# cpe-stable-backport: Backported in 5.4.114 +CVE_CHECK_WHITELIST += "CVE-2021-23133" + +# fixed-version: only affects 5.12rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-23134" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2021-26401" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-26708" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26930" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26931" + +# cpe-stable-backport: Backported in 5.4.100 +CVE_CHECK_WHITELIST += "CVE-2021-26932" + +# CVE-2021-26934 has no known resolution + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27363" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27364" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-27365" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-28038" + +# fixed-version: only affects 5.9rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28039" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-28375" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-28660" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-28688" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28691" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28711" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28712" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28713" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28714" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-28715" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28950" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28951" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-28952" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28964" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28971" + +# cpe-stable-backport: Backported in 5.4.108 +CVE_CHECK_WHITELIST += "CVE-2021-28972" + +# cpe-stable-backport: Backported in 5.4.111 +CVE_CHECK_WHITELIST += "CVE-2021-29154" + +# CVE-2021-29155 needs backporting (fixed from 5.12rc8) + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29264" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-29265" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29266" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29646" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29647" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29648" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29649" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-29650" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-29657" + +# cpe-stable-backport: Backported in 5.4.103 +CVE_CHECK_WHITELIST += "CVE-2021-30002" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-30178" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-31440" + +# cpe-stable-backport: Backported in 5.4.92 +CVE_CHECK_WHITELIST += "CVE-2021-3178" + +# cpe-stable-backport: Backported in 5.4.117 +CVE_CHECK_WHITELIST += "CVE-2021-31829" + +# cpe-stable-backport: Backported in 5.4.109 +CVE_CHECK_WHITELIST += "CVE-2021-31916" + +# CVE-2021-32078 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-32399" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-32606" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-33033" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-33034" + +# CVE-2021-33061 needs backporting (fixed from 5.18rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-33098" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-33135" + +# fixed-version: only affects 5.12rc8 onwards +CVE_CHECK_WHITELIST += "CVE-2021-33200" + +# cpe-stable-backport: Backported in 5.4.94 +CVE_CHECK_WHITELIST += "CVE-2021-3347" + +# cpe-stable-backport: Backported in 5.4.95 +CVE_CHECK_WHITELIST += "CVE-2021-3348" + +# cpe-stable-backport: Backported in 5.4.139 +CVE_CHECK_WHITELIST += "CVE-2021-33624" + +# fixed-version: Fixed after version 5.4rc1 +CVE_CHECK_WHITELIST += "CVE-2021-33630" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2021-33631" + +# cpe-stable-backport: Backported in 5.4.205 +CVE_CHECK_WHITELIST += "CVE-2021-33655" + +# cpe-stable-backport: Backported in 5.4.202 +CVE_CHECK_WHITELIST += "CVE-2021-33656" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-33909" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3411" + +# cpe-stable-backport: Backported in 5.4.62 +CVE_CHECK_WHITELIST += "CVE-2021-3428" + +# cpe-stable-backport: Backported in 5.4.101 +CVE_CHECK_WHITELIST += "CVE-2021-3444" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-34556" + +# cpe-stable-backport: Backported in 5.4.128 +CVE_CHECK_WHITELIST += "CVE-2021-34693" + +# cpe-stable-backport: Backported in 5.4.110 +CVE_CHECK_WHITELIST += "CVE-2021-3483" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-34866" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3489" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3490" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3491" + +# CVE-2021-3492 has no known resolution + +# CVE-2021-3493 needs backporting (fixed from 5.11rc1) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-34981" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3501" + +# cpe-stable-backport: Backported in 5.4.129 +CVE_CHECK_WHITELIST += "CVE-2021-35039" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-3506" + +# CVE-2021-3542 has no known resolution + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3543" + +# cpe-stable-backport: Backported in 5.4.146 +CVE_CHECK_WHITELIST += "CVE-2021-35477" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3564" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3573" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-3587" + +# cpe-stable-backport: Backported in 5.4.98 +CVE_CHECK_WHITELIST += "CVE-2021-3600" + +# cpe-stable-backport: Backported in 5.4.132 +CVE_CHECK_WHITELIST += "CVE-2021-3609" + +# cpe-stable-backport: Backported in 5.4.102 +CVE_CHECK_WHITELIST += "CVE-2021-3612" + +# cpe-stable-backport: Backported in 5.4.14 +CVE_CHECK_WHITELIST += "CVE-2021-3635" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-3640" + +# cpe-stable-backport: Backported in 5.4.142 +CVE_CHECK_WHITELIST += "CVE-2021-3653" + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2021-3655" + +# cpe-stable-backport: Backported in 5.4.142 +CVE_CHECK_WHITELIST += "CVE-2021-3656" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2021-3659" + +# CVE-2021-3669 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-3679" + +# CVE-2021-3714 has no known resolution + +# cpe-stable-backport: Backported in 5.4.29 +CVE_CHECK_WHITELIST += "CVE-2021-3715" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-37159" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-3732" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-3736" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-3739" + +# cpe-stable-backport: Backported in 5.4.128 +CVE_CHECK_WHITELIST += "CVE-2021-3743" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-3744" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-3752" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-3753" + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-37576" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2021-3759" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-3760" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-3764" + +# cpe-stable-backport: Backported in 5.4.157 +CVE_CHECK_WHITELIST += "CVE-2021-3772" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-38160" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38166" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-38198" + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-38199" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38200" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38201" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38202" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38203" + +# cpe-stable-backport: Backported in 5.4.136 +CVE_CHECK_WHITELIST += "CVE-2021-38204" + +# cpe-stable-backport: Backported in 5.4.141 +CVE_CHECK_WHITELIST += "CVE-2021-38205" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38206" + +# fixed-version: only affects 5.6rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38207" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-38208" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-38209" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-38300" + +# CVE-2021-3847 has no known resolution + +# CVE-2021-3864 has no known resolution + +# CVE-2021-3892 has no known resolution + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2021-3894" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-3896" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-3923" + +# cpe-stable-backport: Backported in 5.4.144 +CVE_CHECK_WHITELIST += "CVE-2021-39633" + +# cpe-stable-backport: Backported in 5.4.70 +CVE_CHECK_WHITELIST += "CVE-2021-39634" + +# fixed-version: Fixed after version 4.16rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39636" + +# cpe-stable-backport: Backported in 5.4.89 +CVE_CHECK_WHITELIST += "CVE-2021-39648" + +# cpe-stable-backport: Backported in 5.4.106 +CVE_CHECK_WHITELIST += "CVE-2021-39656" + +# cpe-stable-backport: Backported in 5.4.93 +CVE_CHECK_WHITELIST += "CVE-2021-39657" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2021-39685" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-39686" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2021-39698" + +# fixed-version: Fixed after version 4.18rc6 +CVE_CHECK_WHITELIST += "CVE-2021-39711" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39713" + +# fixed-version: Fixed after version 4.12rc1 +CVE_CHECK_WHITELIST += "CVE-2021-39714" + +# CVE-2021-39800 has no known resolution + +# CVE-2021-39801 has no known resolution + +# CVE-2021-39802 has no known resolution + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4001" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2021-4002" + +# CVE-2021-4023 needs backporting (fixed from 5.15rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4028" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4032" + +# cpe-stable-backport: Backported in 5.4.241 +CVE_CHECK_WHITELIST += "CVE-2021-4037" + +# cpe-stable-backport: Backported in 5.4.145 +CVE_CHECK_WHITELIST += "CVE-2021-40490" + +# cpe-stable-backport: Backported in 5.4.164 +CVE_CHECK_WHITELIST += "CVE-2021-4083" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4090" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4093" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4095" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-41073" + +# cpe-stable-backport: Backported in 5.4.168 +CVE_CHECK_WHITELIST += "CVE-2021-4135" + +# CVE-2021-4148 needs backporting (fixed from 5.15) + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2021-4149" + +# CVE-2021-4150 needs backporting (fixed from 5.15rc7) + +# cpe-stable-backport: Backported in 5.4.134 +CVE_CHECK_WHITELIST += "CVE-2021-4154" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-4155" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-4157" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2021-4159" + +# cpe-stable-backport: Backported in 5.4.153 +CVE_CHECK_WHITELIST += "CVE-2021-41864" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2021-4197" + +# cpe-stable-backport: Backported in 5.4.143 +CVE_CHECK_WHITELIST += "CVE-2021-42008" + +# cpe-stable-backport: Backported in 5.4.162 +CVE_CHECK_WHITELIST += "CVE-2021-4202" + +# cpe-stable-backport: Backported in 5.4.151 +CVE_CHECK_WHITELIST += "CVE-2021-4203" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-4204" + +# CVE-2021-4218 needs backporting (fixed from 5.8rc1) + +# cpe-stable-backport: Backported in 5.4.148 +CVE_CHECK_WHITELIST += "CVE-2021-42252" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-42327" + +# cpe-stable-backport: Backported in 5.4.158 +CVE_CHECK_WHITELIST += "CVE-2021-42739" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-43056" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-43057" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-43267" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2021-43389" + +# cpe-stable-backport: Backported in 5.4.164 +CVE_CHECK_WHITELIST += "CVE-2021-43975" + +# cpe-stable-backport: Backported in 5.4.174 +CVE_CHECK_WHITELIST += "CVE-2021-43976" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-44733" + +# cpe-stable-backport: Backported in 5.4.260 +CVE_CHECK_WHITELIST += "CVE-2021-44879" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2021-45095" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45100" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45402" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-45469" + +# fixed-version: only affects 5.13rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-45480" + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2021-45485" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-45486" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2021-45868" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46283" + +# cpe-stable-backport: Backported in 5.4.112 +CVE_CHECK_WHITELIST += "CVE-2021-46904" + +# fixed-version: only affects 5.12rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46905" + +# cpe-stable-backport: Backported in 5.4.127 +CVE_CHECK_WHITELIST += "CVE-2021-46906" + +# CVE-2021-46908 needs backporting (fixed from 5.12rc8) + +# cpe-stable-backport: Backported in 5.4.114 +CVE_CHECK_WHITELIST += "CVE-2021-46909" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46910" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46911" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46912" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46913" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46914" + +# cpe-stable-backport: Backported in 5.4.114 +CVE_CHECK_WHITELIST += "CVE-2021-46915" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46916" + +# fixed-version: only affects 5.8rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46917" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46918" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46919" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46920" + +# cpe-stable-backport: Backported in 5.4.115 +CVE_CHECK_WHITELIST += "CVE-2021-46921" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46922" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46923" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46924" + +# CVE-2021-46925 needs backporting (fixed from 5.16rc8) + +# CVE-2021-46926 needs backporting (fixed from 5.16rc7) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46927" + +# CVE-2021-46928 needs backporting (fixed from 5.16rc7) + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46929" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46930" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46931" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46932" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46933" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46934" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46935" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2021-46936" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46937" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46938" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46939" + +# fixed-version: only affects 5.10rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46940" + +# CVE-2021-46941 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46942" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46943" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46944" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46945" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46947" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46948" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46949" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46950" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46951" + +# CVE-2021-46952 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46953" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46954" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46955" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46956" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46957" + +# fixed-version: only affects 5.7rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46958" + +# CVE-2021-46959 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46960" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46961" + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46962" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46963" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46964" + +# CVE-2021-46965 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.118 +CVE_CHECK_WHITELIST += "CVE-2021-46966" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46967" + +# fixed-version: only affects 5.10rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46968" + +# CVE-2021-46969 needs backporting (fixed from 5.13rc1) + +# CVE-2021-46970 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.117 +CVE_CHECK_WHITELIST += "CVE-2021-46971" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46972" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46973" + +# cpe-stable-backport: Backported in 5.4.117 +CVE_CHECK_WHITELIST += "CVE-2021-46974" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46976" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46977" + +# fixed-version: only affects 5.11rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46978" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46979" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46980" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46981" + +# CVE-2021-46982 needs backporting (fixed from 5.13rc2) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46983" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46984" + +# fixed-version: only affects 5.12rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46985" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46986" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46987" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46988" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46989" + +# fixed-version: only affects 5.10rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46990" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46991" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46992" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46993" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46994" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46995" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46996" + +# fixed-version: only affects 5.10rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46997" + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-46998" + +# fixed-version: only affects 5.7rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2021-46999" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47000" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47001" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47002" + +# fixed-version: only affects 5.11 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47003" + +# CVE-2021-47004 needs backporting (fixed from 5.13rc1) + +# CVE-2021-47005 needs backporting (fixed from 5.13rc1) + +# cpe-stable-backport: Backported in 5.4.120 +CVE_CHECK_WHITELIST += "CVE-2021-47006" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47007" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47008" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47009" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47010" + +# fixed-version: only affects 5.11rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47011" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47012" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47013" + +# fixed-version: only affects 5.8rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47014" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47015" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47016" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47017" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47018" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47019" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47020" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47021" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47022" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47023" + +# CVE-2021-47024 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47025" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47026" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47027" + +# CVE-2021-47028 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47029" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47030" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47031" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47032" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47033" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47034" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47035" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47036" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47037" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47038" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47039" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47040" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47041" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47042" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47043" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47044" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47045" + +# CVE-2021-47046 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47047" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47048" + +# CVE-2021-47049 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47050" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47051" + +# CVE-2021-47052 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47053" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47054" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47055" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47056" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47057" + +# fixed-version: only affects 5.11rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47058" + +# CVE-2021-47059 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.9rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47060" + +# fixed-version: only affects 5.9rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47061" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47062" + +# CVE-2021-47063 needs backporting (fixed from 5.13rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47064" + +# cpe-stable-backport: Backported in 5.4.119 +CVE_CHECK_WHITELIST += "CVE-2021-47065" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47066" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47067" + +# fixed-version: only affects 5.12rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47068" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47069" + +# CVE-2021-47070 needs backporting (fixed from 5.13rc3) + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2021-47071" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47072" + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2021-47073" + +# CVE-2021-47074 needs backporting (fixed from 5.13rc3) + +# CVE-2021-47075 needs backporting (fixed from 5.13rc3) + +# CVE-2021-47076 needs backporting (fixed from 5.13rc3) + +# CVE-2021-47077 needs backporting (fixed from 5.13rc3) + +# cpe-stable-backport: Backported in 5.4.122 +CVE_CHECK_WHITELIST += "CVE-2021-47078" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47079" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47080" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47081" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2021-47082" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-47083" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-47086" + +# fixed-version: only affects 5.14rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47087" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47088" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47089" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47090" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47091" + +# fixed-version: only affects 5.15rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47092" + +# fixed-version: only affects 5.9 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47093" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47094" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-47095" + +# fixed-version: only affects 5.15rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47096" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47097" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47098" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47099" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2021-47100" + +# CVE-2021-47101 needs backporting (fixed from 5.16rc7) + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47102" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2021-47103" + +# fixed-version: only affects 5.15 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47104" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47105" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47106" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47107" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47108" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47109" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47110" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47111" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47112" + +# CVE-2021-47113 needs backporting (fixed from 5.13rc5) + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47114" + +# CVE-2021-47116 needs backporting (fixed from 5.13rc5) + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47117" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47118" + +# CVE-2021-47119 needs backporting (fixed from 5.13rc5) + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47120" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47121" + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47122" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47123" + +# CVE-2021-47124 needs backporting (fixed from 5.13rc2) + +# CVE-2021-47125 needs backporting (fixed from 5.13rc5) + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47126" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47127" + +# CVE-2021-47128 needs backporting (fixed from 5.13rc5) + +# cpe-stable-backport: Backported in 5.4.125 +CVE_CHECK_WHITELIST += "CVE-2021-47129" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47130" + +# CVE-2021-47131 needs backporting (fixed from 5.13rc5) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47132" + +# CVE-2021-47133 needs backporting (fixed from 5.13rc5) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47134" + +# CVE-2021-47135 needs backporting (fixed from 5.13rc5) + +# CVE-2021-47136 needs backporting (fixed from 5.13rc4) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47137" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47138" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47139" + +# CVE-2021-47140 needs backporting (fixed from 5.13rc4) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47141" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47142" + +# CVE-2021-47143 needs backporting (fixed from 5.13rc4) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47144" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47145" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47146" + +# CVE-2021-47147 needs backporting (fixed from 5.13rc4) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47148" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47149" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47150" + +# CVE-2021-47151 needs backporting (fixed from 5.13rc4) + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47152" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47153" + +# CVE-2021-47158 needs backporting (fixed from 5.13rc4) + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47159" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47160" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47161" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47162" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47163" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47164" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47165" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47166" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47167" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47168" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47169" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47170" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47171" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47172" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47173" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47174" + +# CVE-2021-47175 needs backporting (fixed from 5.13rc4) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47176" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47177" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2021-47178" + +# cpe-stable-backport: Backported in 5.4.124 +CVE_CHECK_WHITELIST += "CVE-2021-47179" + +# cpe-stable-backport: Backported in 5.4.123 +CVE_CHECK_WHITELIST += "CVE-2021-47180" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-0001" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-0002" + +# CVE-2022-0168 needs backporting (fixed from 5.18rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0171" + +# cpe-stable-backport: Backported in 5.4.173 +CVE_CHECK_WHITELIST += "CVE-2022-0185" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0264" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0286" + +# cpe-stable-backport: Backported in 5.4.155 +CVE_CHECK_WHITELIST += "CVE-2022-0322" + +# cpe-stable-backport: Backported in 5.4.175 +CVE_CHECK_WHITELIST += "CVE-2022-0330" + +# CVE-2022-0382 needs backporting (fixed from 5.16) + +# CVE-2022-0400 has no known resolution + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0433" + +# cpe-stable-backport: Backported in 5.4.179 +CVE_CHECK_WHITELIST += "CVE-2022-0435" + +# CVE-2022-0480 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.179 +CVE_CHECK_WHITELIST += "CVE-2022-0487" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-0492" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-0494" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0500" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0516" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-0617" + +# cpe-stable-backport: Backported in 5.4.156 +CVE_CHECK_WHITELIST += "CVE-2022-0644" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0646" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0742" + +# cpe-stable-backport: Backported in 5.4.53 +CVE_CHECK_WHITELIST += "CVE-2022-0812" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0847" + +# cpe-stable-backport: Backported in 5.4.132 +CVE_CHECK_WHITELIST += "CVE-2022-0850" + +# fixed-version: only affects 5.17rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0854" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0995" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-0998" + +# cpe-stable-backport: Backported in 5.4.185 +CVE_CHECK_WHITELIST += "CVE-2022-1011" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-1012" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1015" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-1016" + +# fixed-version: only affects 5.12rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1043" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1048" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-1055" + +# CVE-2022-1116 has no known resolution + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1158" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-1184" + +# cpe-stable-backport: Backported in 5.4.169 +CVE_CHECK_WHITELIST += "CVE-2022-1195" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1198" + +# cpe-stable-backport: Backported in 5.4.185 +CVE_CHECK_WHITELIST += "CVE-2022-1199" + +# cpe-stable-backport: Backported in 5.4.190 +CVE_CHECK_WHITELIST += "CVE-2022-1204" + +# fixed-version: only affects 5.17rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1205" + +# CVE-2022-1247 has no known resolution + +# CVE-2022-1263 needs backporting (fixed from 5.18rc3) + +# CVE-2022-1280 needs backporting (fixed from 5.15rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-1353" + +# cpe-stable-backport: Backported in 5.4.21 +CVE_CHECK_WHITELIST += "CVE-2022-1419" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-1462" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1508" + +# fixed-version: only affects 5.7rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1516" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1651" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-1652" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1671" + +# fixed-version: Fixed after version 4.20rc1 +CVE_CHECK_WHITELIST += "CVE-2022-1678" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-1679" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-1729" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1734" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1786" + +# CVE-2022-1789 needs backporting (fixed from 5.18) + +# cpe-stable-backport: Backported in 5.4.192 +CVE_CHECK_WHITELIST += "CVE-2022-1836" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1852" + +# fixed-version: only affects 5.17rc8 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1882" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1943" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-1966" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1972" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1973" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1974" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2022-1975" + +# fixed-version: only affects 5.18rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1976" + +# fixed-version: only affects 5.13rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-1998" + +# cpe-stable-backport: Backported in 5.4.181 +CVE_CHECK_WHITELIST += "CVE-2022-20008" + +# cpe-stable-backport: Backported in 5.4.165 +CVE_CHECK_WHITELIST += "CVE-2022-20132" + +# cpe-stable-backport: Backported in 5.4.145 +CVE_CHECK_WHITELIST += "CVE-2022-20141" + +# CVE-2022-20148 needs backporting (fixed from 5.16rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20153" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2022-20154" + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-20158" + +# CVE-2022-20166 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-20368" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2022-20369" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20409" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-20421" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-20422" + +# fixed-version: only affects 5.17rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20423" + +# CVE-2022-20424 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.63 +CVE_CHECK_WHITELIST += "CVE-2022-20565" + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2022-20566" + +# fixed-version: Fixed after version 4.16rc5 +CVE_CHECK_WHITELIST += "CVE-2022-20567" + +# fixed-version: only affects 5.7rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2022-20568" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-20572" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2078" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21123" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21125" + +# cpe-stable-backport: Backported in 5.4.199 +CVE_CHECK_WHITELIST += "CVE-2022-21166" + +# fixed-version: Fixed after version 4.20 +CVE_CHECK_WHITELIST += "CVE-2022-21385" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-21499" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-21505" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2153" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2196" + +# CVE-2022-2209 has no known resolution + +# cpe-stable-backport: Backported in 5.4.175 +CVE_CHECK_WHITELIST += "CVE-2022-22942" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23036" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23037" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23038" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23039" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23040" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23041" + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23042" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2308" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-2318" + +# CVE-2022-23222 needs backporting (fixed from 5.17rc1) + +# CVE-2022-2327 needs backporting (fixed from 5.12rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-2380" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-23816" + +# CVE-2022-23825 has no known resolution + +# cpe-stable-backport: Backported in 5.4.184 +CVE_CHECK_WHITELIST += "CVE-2022-23960" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-24122" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-24448" + +# cpe-stable-backport: Backported in 5.4.183 +CVE_CHECK_WHITELIST += "CVE-2022-24958" + +# cpe-stable-backport: Backported in 5.4.176 +CVE_CHECK_WHITELIST += "CVE-2022-24959" + +# cpe-stable-backport: Backported in 5.4.197 +CVE_CHECK_WHITELIST += "CVE-2022-2503" + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-25258" + +# CVE-2022-25265 has no known resolution + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-25375" + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-25636" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2585" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2586" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-2588" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2590" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-2602" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-26365" + +# cpe-stable-backport: Backported in 5.4.210 +CVE_CHECK_WHITELIST += "CVE-2022-26373" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-2639" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-26490" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-2663" + +# CVE-2022-26878 has no known resolution + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-26966" + +# cpe-stable-backport: Backported in 5.4.182 +CVE_CHECK_WHITELIST += "CVE-2022-27223" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-27666" + +# CVE-2022-27672 needs backporting (fixed from 6.2) + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2785" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-27950" + +# cpe-stable-backport: Backported in 5.4.188 +CVE_CHECK_WHITELIST += "CVE-2022-28356" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-28388" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-28389" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-28390" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2873" + +# fixed-version: only affects 5.17rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2022-28796" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-28893" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2905" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29156" + +# cpe-stable-backport: Backported in 5.4.177 +CVE_CHECK_WHITELIST += "CVE-2022-2938" + +# cpe-stable-backport: Backported in 5.4.191 +CVE_CHECK_WHITELIST += "CVE-2022-29581" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29582" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-2959" + +# CVE-2022-2961 has no known resolution + +# cpe-stable-backport: Backported in 5.4.180 +CVE_CHECK_WHITELIST += "CVE-2022-2964" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-2977" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-2978" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-29900" + +# cpe-stable-backport: Backported in 5.4.217 +CVE_CHECK_WHITELIST += "CVE-2022-29901" + +# CVE-2022-2991 needs backporting (fixed from 5.15rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-29968" + +# cpe-stable-backport: Backported in 5.4.212 +CVE_CHECK_WHITELIST += "CVE-2022-3028" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-30594" + +# CVE-2022-3061 needs backporting (fixed from 5.18rc5) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3077" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3078" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3103" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3104" + +# cpe-stable-backport: Backported in 5.4.171 +CVE_CHECK_WHITELIST += "CVE-2022-3105" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3106" + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-3107" + +# CVE-2022-3108 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3110" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3111" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3112" + +# fixed-version: only affects 5.10rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3113" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3114" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-3115" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2022-3169" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3170" + +# CVE-2022-3176 needs backporting (fixed from 5.17rc1) + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3202" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-32250" + +# cpe-stable-backport: Backported in 5.4.201 +CVE_CHECK_WHITELIST += "CVE-2022-32296" + +# CVE-2022-3238 has no known resolution + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2022-3239" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-32981" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-3303" + +# CVE-2022-3344 needs backporting (fixed from 6.1rc7) + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33740" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33741" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33742" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-33743" + +# cpe-stable-backport: Backported in 5.4.204 +CVE_CHECK_WHITELIST += "CVE-2022-33744" + +# cpe-stable-backport: Backported in 5.4.192 +CVE_CHECK_WHITELIST += "CVE-2022-33981" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-3424" + +# fixed-version: only affects 5.18rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3435" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-34494" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-34495" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2022-34918" + +# cpe-stable-backport: Backported in 5.4.225 +CVE_CHECK_WHITELIST += "CVE-2022-3521" + +# CVE-2022-3522 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3523 needs backporting (fixed from 6.1rc1) + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3524" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3526" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3531" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3532" + +# CVE-2022-3533 has no known resolution + +# CVE-2022-3534 needs backporting (fixed from 6.2rc1) + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3535" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3541" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3542" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3543" + +# CVE-2022-3544 has no known resolution + +# cpe-stable-backport: Backported in 5.4.228 +CVE_CHECK_WHITELIST += "CVE-2022-3545" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3564" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3565" + +# CVE-2022-3566 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3567 needs backporting (fixed from 6.1rc1) + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2022-3577" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-3586" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3594" + +# CVE-2022-3595 needs backporting (fixed from 6.1rc1) + +# CVE-2022-3606 has no known resolution + +# cpe-stable-backport: Backported in 5.4.207 +CVE_CHECK_WHITELIST += "CVE-2022-36123" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3619" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-3621" + +# cpe-stable-backport: Backported in 5.4.228 +CVE_CHECK_WHITELIST += "CVE-2022-3623" + +# CVE-2022-3624 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3625" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-3628" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-36280" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3629" + +# fixed-version: only affects 5.19rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3630" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3633" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-3635" + +# CVE-2022-3636 needs backporting (fixed from 5.19rc1) + +# fixed-version: only affects 5.19 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3640" + +# CVE-2022-36402 needs backporting (fixed from 6.5) + +# CVE-2022-3642 has no known resolution + +# cpe-stable-backport: Backported in 5.4.227 +CVE_CHECK_WHITELIST += "CVE-2022-3643" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-3646" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-3649" + +# cpe-stable-backport: Backported in 5.4.208 +CVE_CHECK_WHITELIST += "CVE-2022-36879" + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2022-36946" + +# cpe-stable-backport: Backported in 5.4.233 +CVE_CHECK_WHITELIST += "CVE-2022-3707" + +# CVE-2022-38096 has no known resolution + +# CVE-2022-38457 needs backporting (fixed from 6.2rc4) + +# CVE-2022-3903 needs backporting (fixed from 6.1rc2) + +# fixed-version: only affects 5.18 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3910" + +# CVE-2022-39188 needs backporting (fixed from 5.19rc8) + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2022-39189" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-39190" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-3977" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-39842" + +# CVE-2022-40133 needs backporting (fixed from 6.2rc4) + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-40307" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-40476" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-40768" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-4095" + +# cpe-stable-backport: Backported in 5.4.252 +CVE_CHECK_WHITELIST += "CVE-2022-40982" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-41218" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2022-41222" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4127" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4128" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2022-4129" + +# fixed-version: only affects 5.17rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4139" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-41674" + +# CVE-2022-41848 has no known resolution + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-41849" + +# cpe-stable-backport: Backported in 5.4.220 +CVE_CHECK_WHITELIST += "CVE-2022-41850" + +# cpe-stable-backport: Backported in 5.4.190 +CVE_CHECK_WHITELIST += "CVE-2022-41858" + +# fixed-version: only affects 5.16rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42328" + +# fixed-version: only affects 5.16rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42329" + +# cpe-stable-backport: Backported in 5.4.215 +CVE_CHECK_WHITELIST += "CVE-2022-42432" + +# CVE-2022-4269 needs backporting (fixed from 6.3rc1) + +# cpe-stable-backport: Backported in 5.4.212 +CVE_CHECK_WHITELIST += "CVE-2022-42703" + +# cpe-stable-backport: Backported in 5.4.219 +CVE_CHECK_WHITELIST += "CVE-2022-42719" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-42720" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-42721" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-42722" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2022-42895" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2022-42896" + +# cpe-stable-backport: Backported in 5.4.218 +CVE_CHECK_WHITELIST += "CVE-2022-43750" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4378" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4379" + +# cpe-stable-backport: Backported in 5.4.230 +CVE_CHECK_WHITELIST += "CVE-2022-4382" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-43945" + +# CVE-2022-44032 needs backporting (fixed from 6.4rc1) + +# CVE-2022-44033 needs backporting (fixed from 6.4rc1) + +# CVE-2022-44034 needs backporting (fixed from 6.4rc1) + +# CVE-2022-4543 has no known resolution + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-45869" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +# cpe-stable-backport: Backported in 5.4.246 +CVE_CHECK_WHITELIST += "CVE-2022-45886" + +# cpe-stable-backport: Backported in 5.4.246 +CVE_CHECK_WHITELIST += "CVE-2022-45887" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-45888" + +# cpe-stable-backport: Backported in 5.4.246 +CVE_CHECK_WHITELIST += "CVE-2022-45919" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-45934" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2022-4662" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4696" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2022-4744" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47518" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47519" + +# CVE-2022-47520 needs backporting (fixed from 6.1rc8) + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47521" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2022-47929" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47938" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47939" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47940" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47941" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47942" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-47943" + +# CVE-2022-47946 needs backporting (fixed from 5.12rc2) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-4842" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48423" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48424" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48425" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48502" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2022-48619" + +# cpe-stable-backport: Backported in 5.4.179 +CVE_CHECK_WHITELIST += "CVE-2022-48626" + +# CVE-2022-48627 needs backporting (fixed from 5.19rc7) + +# CVE-2022-48628 needs backporting (fixed from 6.6rc1) + +# cpe-stable-backport: Backported in 5.4.187 +CVE_CHECK_WHITELIST += "CVE-2022-48629" + +# fixed-version: only affects 5.17 onwards +CVE_CHECK_WHITELIST += "CVE-2022-48630" + +# fixed-version: Fixed after version 5.0rc1 +CVE_CHECK_WHITELIST += "CVE-2023-0030" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0045" + +# cpe-stable-backport: Backported in 5.4.160 +CVE_CHECK_WHITELIST += "CVE-2023-0047" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0122" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-0160" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0179" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0210" + +# CVE-2023-0240 needs backporting (fixed from 5.10rc1) + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0266" + +# CVE-2023-0386 needs backporting (fixed from 6.2rc6) + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0394" + +# cpe-stable-backport: Backported in 5.4.230 +CVE_CHECK_WHITELIST += "CVE-2023-0458" + +# cpe-stable-backport: Backported in 5.4.233 +CVE_CHECK_WHITELIST += "CVE-2023-0459" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-0461" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0468" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-0469" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-0590" + +# CVE-2023-0597 needs backporting (fixed from 6.2rc1) + +# cpe-stable-backport: Backported in 5.4.223 +CVE_CHECK_WHITELIST += "CVE-2023-0615" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1032" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-1073" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-1074" + +# CVE-2023-1075 needs backporting (fixed from 6.2rc7) + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1076" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1077" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-1078" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1079" + +# cpe-stable-backport: Backported in 5.4.211 +CVE_CHECK_WHITELIST += "CVE-2023-1095" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1118" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1192" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1193" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1194" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1195" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-1206" + +# CVE-2023-1249 needs backporting (fixed from 5.18rc1) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1252" + +# CVE-2023-1281 needs backporting (fixed from 6.2) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1295" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-1380" + +# cpe-stable-backport: Backported in 5.4.226 +CVE_CHECK_WHITELIST += "CVE-2023-1382" + +# cpe-stable-backport: Backported in 5.4.92 +CVE_CHECK_WHITELIST += "CVE-2023-1390" + +# CVE-2023-1476 has no known resolution + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-1513" + +# CVE-2023-1582 needs backporting (fixed from 5.17rc4) + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1583" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-1611" + +# cpe-stable-backport: Backported in 5.4.189 +CVE_CHECK_WHITELIST += "CVE-2023-1637" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1652" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-1670" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-1829" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2023-1838" + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-1855" + +# cpe-stable-backport: Backported in 5.4.241 +CVE_CHECK_WHITELIST += "CVE-2023-1859" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1872" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-1989" + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-1990" + +# fixed-version: only affects 5.19rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2023-1998" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-2002" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2006" + +# CVE-2023-2007 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.202 +CVE_CHECK_WHITELIST += "CVE-2023-2008" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2019" + +# cpe-stable-backport: Backported in 5.4.252 +CVE_CHECK_WHITELIST += "CVE-2023-20569" + +# CVE-2023-20588 needs backporting (fixed from 6.5rc6) + +# cpe-stable-backport: Backported in 5.4.250 +CVE_CHECK_WHITELIST += "CVE-2023-20593" + +# CVE-2023-20928 needs backporting (fixed from 6.0rc1) + +# CVE-2023-20937 has no known resolution + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-20938" + +# CVE-2023-20941 has no known resolution + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21102" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21106" + +# cpe-stable-backport: Backported in 5.4.249 +CVE_CHECK_WHITELIST += "CVE-2023-2124" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21255" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-21264" + +# CVE-2023-21400 has no known resolution + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2156" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-2162" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2163" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2166" + +# CVE-2023-2176 needs backporting (fixed from 6.3rc1) + +# cpe-stable-backport: Backported in 5.4.209 +CVE_CHECK_WHITELIST += "CVE-2023-2177" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-2194" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2235" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2236" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2248" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-2269" + +# CVE-2023-22995 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22996" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22997" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22998" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-22999" + +# CVE-2023-23000 needs backporting (fixed from 5.17rc1) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23001" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23002" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23003" + +# CVE-2023-23004 needs backporting (fixed from 5.19rc1) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23005" + +# cpe-stable-backport: Backported in 5.4.170 +CVE_CHECK_WHITELIST += "CVE-2023-23006" + +# CVE-2023-23039 has no known resolution + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-23454" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-23455" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-23559" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-23586" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2430" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-2483" + +# fixed-version: only affects 5.6rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2023-25012" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-2513" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-25775" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2598" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26544" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-26545" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26605" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-26606" + +# cpe-stable-backport: Backported in 5.4.225 +CVE_CHECK_WHITELIST += "CVE-2023-26607" + +# cpe-stable-backport: Backported in 5.4.227 +CVE_CHECK_WHITELIST += "CVE-2023-28327" + +# cpe-stable-backport: Backported in 5.4.229 +CVE_CHECK_WHITELIST += "CVE-2023-28328" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28410" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28464" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-28466" + +# cpe-stable-backport: Backported in 5.4.213 +CVE_CHECK_WHITELIST += "CVE-2023-2860" + +# CVE-2023-28746 needs backporting (fixed from 6.9rc1) + +# cpe-stable-backport: Backported in 5.4.133 +CVE_CHECK_WHITELIST += "CVE-2023-28772" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-28866" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-2898" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-2985" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-3006" + +# Skipping CVE-2023-3022, no affected_versions + +# cpe-stable-backport: Backported in 5.4.238 +CVE_CHECK_WHITELIST += "CVE-2023-30456" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-30772" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2023-3090" + +# fixed-version: Fixed after version 4.8rc7 +CVE_CHECK_WHITELIST += "CVE-2023-3106" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +# CVE-2023-31083 needs backporting (fixed from 6.6rc1) + +# CVE-2023-31084 needs backporting (fixed from 6.4rc3) + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-31085" + +# cpe-stable-backport: Backported in 5.4.247 +CVE_CHECK_WHITELIST += "CVE-2023-3111" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3117" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-31248" + +# cpe-stable-backport: Backported in 5.4.244 +CVE_CHECK_WHITELIST += "CVE-2023-3141" + +# cpe-stable-backport: Backported in 5.4.242 +CVE_CHECK_WHITELIST += "CVE-2023-31436" + +# cpe-stable-backport: Backported in 5.4.193 +CVE_CHECK_WHITELIST += "CVE-2023-3159" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-3161" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3212" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-3220" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-32233" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32247" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32248" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32250" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32252" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32254" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32257" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-32258" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-32269" + +# CVE-2023-32629 has no known resolution + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-3268" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3269" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3312" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3317" + +# cpe-stable-backport: Backported in 5.4.240 +CVE_CHECK_WHITELIST += "CVE-2023-33203" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-33250" + +# CVE-2023-33288 needs backporting (fixed from 6.3rc4) + +# cpe-stable-backport: Backported in 5.4.248 +CVE_CHECK_WHITELIST += "CVE-2023-3338" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3355" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3357" + +# cpe-stable-backport: Backported in 5.4.231 +CVE_CHECK_WHITELIST += "CVE-2023-3358" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3359" + +# CVE-2023-3389 needs backporting (fixed from 6.0rc1) + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3390" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-33951" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-33952" + +# CVE-2023-3397 has no known resolution + +# cpe-stable-backport: Backported in 5.4.249 +CVE_CHECK_WHITELIST += "CVE-2023-34255" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-34256" + +# fixed-version: only affects 6.1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-34319" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-34324" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3439" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-35001" + +# cpe-stable-backport: Backported in 5.4.232 +CVE_CHECK_WHITELIST += "CVE-2023-3567" + +# CVE-2023-35693 has no known resolution + +# cpe-stable-backport: Backported in 5.4.246 +CVE_CHECK_WHITELIST += "CVE-2023-35788" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35823" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35824" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-35826" + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-35827" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2023-35828" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-35829" + +# cpe-stable-backport: Backported in 5.4.248 +CVE_CHECK_WHITELIST += "CVE-2023-3609" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3610" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-3611" + +# CVE-2023-3640 has no known resolution + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-37453" + +# CVE-2023-37454 has no known resolution + +# cpe-stable-backport: Backported in 5.4.255 +CVE_CHECK_WHITELIST += "CVE-2023-3772" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3773" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3776" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3777" + +# cpe-stable-backport: Backported in 5.4.224 +CVE_CHECK_WHITELIST += "CVE-2023-3812" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38409" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38426" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38427" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38428" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38429" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38430" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38431" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-38432" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-3863" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3865" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3866" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-3867" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-39189" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-39191" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-39192" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-39193" + +# cpe-stable-backport: Backported in 5.4.255 +CVE_CHECK_WHITELIST += "CVE-2023-39194" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-39197" + +# CVE-2023-39198 needs backporting (fixed from 6.5rc7) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4004" + +# CVE-2023-4010 has no known resolution + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4015" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-40283" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-40791" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-4128" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-4132" + +# CVE-2023-4133 needs backporting (fixed from 6.3) + +# CVE-2023-4134 needs backporting (fixed from 6.5rc1) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4147" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4155" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4194" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-4206" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-4207" + +# cpe-stable-backport: Backported in 5.4.253 +CVE_CHECK_WHITELIST += "CVE-2023-4208" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4244" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4273" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-42752" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-42753" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-42754" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-42755" + +# fixed-version: only affects 6.4rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2023-42756" + +# cpe-stable-backport: Backported in 5.4.198 +CVE_CHECK_WHITELIST += "CVE-2023-4385" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2023-4387" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4389" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4394" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-44466" + +# cpe-stable-backport: Backported in 5.4.196 +CVE_CHECK_WHITELIST += "CVE-2023-4459" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4563" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4569" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-45862" + +# cpe-stable-backport: Backported in 5.4.260 +CVE_CHECK_WHITELIST += "CVE-2023-45863" + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-45871" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-45898" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4610" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4611" + +# CVE-2023-4622 needs backporting (fixed from 6.5rc1) + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-4623" + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-46343" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-46813" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-46838" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-46862" + +# CVE-2023-47233 needs backporting (fixed from 6.9rc1) + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-4732" + +# CVE-2023-4881 needs backporting (fixed from 6.6rc1) + +# cpe-stable-backport: Backported in 5.4.257 +CVE_CHECK_WHITELIST += "CVE-2023-4921" + +# CVE-2023-50431 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5090" + +# cpe-stable-backport: Backported in 5.4.255 +CVE_CHECK_WHITELIST += "CVE-2023-51042" + +# cpe-stable-backport: Backported in 5.4.251 +CVE_CHECK_WHITELIST += "CVE-2023-51043" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5158" + +# CVE-2023-51779 needs backporting (fixed from 6.7rc7) + +# cpe-stable-backport: Backported in 5.4.260 +CVE_CHECK_WHITELIST += "CVE-2023-5178" + +# cpe-stable-backport: Backported in 5.4.265 +CVE_CHECK_WHITELIST += "CVE-2023-51780" + +# cpe-stable-backport: Backported in 5.4.265 +CVE_CHECK_WHITELIST += "CVE-2023-51781" + +# cpe-stable-backport: Backported in 5.4.265 +CVE_CHECK_WHITELIST += "CVE-2023-51782" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5197" + +# cpe-stable-backport: Backported in 5.4.267 +CVE_CHECK_WHITELIST += "CVE-2023-52340" + +# CVE-2023-52429 needs backporting (fixed from 6.8rc3) + +# fixed-version: only affects 6.5rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52433" + +# CVE-2023-52434 needs backporting (fixed from 6.7rc6) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52435" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52436" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52438" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52439" + +# fixed-version: only affects 5.17rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52440" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52441" + +# CVE-2023-52442 needs backporting (fixed from 6.5rc4) + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52443" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52444" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52445" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52446" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52447" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52448" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52449" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52450" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52451" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52452" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52453" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52454" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52455" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52456" + +# fixed-version: only affects 6.1rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52457" + +# CVE-2023-52458 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52459" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52460" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52461" + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52462" + +# fixed-version: only affects 5.8rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52463" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52464" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52465" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52467" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52468" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52469" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52470" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52471" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52472" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52473" + +# CVE-2023-52474 needs backporting (fixed from 6.4rc1) + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52475" + +# CVE-2023-52476 needs backporting (fixed from 6.6rc6) + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52477" + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52478" + +# CVE-2023-52479 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52480 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52481 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52482 needs backporting (fixed from 6.6rc4) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52483" + +# CVE-2023-52484 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52485 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52486" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52487" + +# CVE-2023-52488 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52489 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52490" + +# CVE-2023-52491 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52492" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52493" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52494" + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52495" + +# CVE-2023-52497 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52498 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52499" + +# CVE-2023-52500 needs backporting (fixed from 6.6rc2) + +# CVE-2023-52501 needs backporting (fixed from 6.6rc2) + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52502" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52503" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2023-52504" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52505" + +# CVE-2023-52506 needs backporting (fixed from 6.6rc3) + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52507" + +# CVE-2023-52508 needs backporting (fixed from 6.6rc2) + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52509" + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-52510" + +# CVE-2023-52511 needs backporting (fixed from 6.6rc1) + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52512" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52513" + +# CVE-2023-52515 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52516 needs backporting (fixed from 6.6rc1) + +# CVE-2023-52517 needs backporting (fixed from 6.6rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52518" + +# CVE-2023-52519 needs backporting (fixed from 6.6rc5) + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52520" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52522" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52523" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52524" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52525" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52526" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52527" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52528" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52529" + +# CVE-2023-52530 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52531 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52532 needs backporting (fixed from 6.6rc5) + +# CVE-2023-52559 needs backporting (fixed from 6.6rc5) + +# fixed-version: only affects 5.16rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52560" + +# CVE-2023-52561 needs backporting (fixed from 6.6rc1) + +# fixed-version: only affects 6.0rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52562" + +# CVE-2023-52563 needs backporting (fixed from 6.6rc3) + +# fixed-version: only affects 6.5rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52564" + +# CVE-2023-52565 needs backporting (fixed from 6.6rc3) + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52566" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52567" + +# CVE-2023-52568 needs backporting (fixed from 6.6rc4) + +# CVE-2023-52569 needs backporting (fixed from 6.6rc2) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52570" + +# CVE-2023-52571 needs backporting (fixed from 6.6rc4) + +# CVE-2023-52572 needs backporting (fixed from 6.6rc3) + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52573" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52574" + +# fixed-version: only affects 6.5rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52575" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52576" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52577" + +# cpe-stable-backport: Backported in 5.4.258 +CVE_CHECK_WHITELIST += "CVE-2023-52578" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52580" + +# fixed-version: only affects 6.5rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52581" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52582" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52583" + +# CVE-2023-52584 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52585 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52586 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52587" + +# CVE-2023-52588 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52589 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52590 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52591 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52593 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52594" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52595" + +# CVE-2023-52596 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52597" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52598" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52599" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52600" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52601" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52602" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52603" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52604" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52606" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52607" + +# fixed-version: only affects 5.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52608" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52609" + +# CVE-2023-52610 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52611" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-52612" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52613" + +# CVE-2023-52614 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52615" + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52616" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52617" + +# CVE-2023-52618 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52619" + +# CVE-2023-52620 needs backporting (fixed from 6.4) + +# CVE-2023-52621 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52622" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52623" + +# CVE-2023-52624 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52625 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.7rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52626" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52627" + +# CVE-2023-52628 needs backporting (fixed from 6.6rc1) + +# CVE-2023-52629 needs backporting (fixed from 6.6rc1) + +# fixed-version: only affects 5.10rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52630" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52631" + +# CVE-2023-52632 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52633 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52634 needs backporting (fixed from 6.8rc1) + +# CVE-2023-52635 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-52636" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2023-52637" + +# CVE-2023-52638 needs backporting (fixed from 6.8rc5) + +# CVE-2023-52639 needs backporting (fixed from 6.8rc4) + +# CVE-2023-52640 needs backporting (fixed from 6.8rc4) + +# CVE-2023-52641 needs backporting (fixed from 6.8rc4) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5345" + +# fixed-version: only affects 6.2 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5633" + +# cpe-stable-backport: Backported in 5.4.259 +CVE_CHECK_WHITELIST += "CVE-2023-5717" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-5972" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6039" + +# cpe-stable-backport: Backported in 5.4.267 +CVE_CHECK_WHITELIST += "CVE-2023-6040" + +# fixed-version: only affects 6.6rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6111" + +# cpe-stable-backport: Backported in 5.4.263 +CVE_CHECK_WHITELIST += "CVE-2023-6121" + +# fixed-version: only affects 5.7rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6176" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6200" + +# CVE-2023-6238 has no known resolution + +# CVE-2023-6240 has no known resolution + +# cpe-stable-backport: Backported in 5.4.273 +CVE_CHECK_WHITELIST += "CVE-2023-6270" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-6356" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6531" + +# CVE-2023-6535 has no known resolution + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-6536" + +# CVE-2023-6546 needs backporting (fixed from 6.5rc7) + +# CVE-2023-6560 needs backporting (fixed from 6.7rc4) + +# cpe-stable-backport: Backported in 5.4.266 +CVE_CHECK_WHITELIST += "CVE-2023-6606" + +# CVE-2023-6610 needs backporting (fixed from 6.7rc7) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6622" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6679" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2023-6817" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2023-6915" + +# cpe-stable-backport: Backported in 5.4.264 +CVE_CHECK_WHITELIST += "CVE-2023-6931" + +# cpe-stable-backport: Backported in 5.4.263 +CVE_CHECK_WHITELIST += "CVE-2023-6932" + +# cpe-stable-backport: Backported in 5.4.273 +CVE_CHECK_WHITELIST += "CVE-2023-7042" + +# cpe-stable-backport: Backported in 5.4.235 +CVE_CHECK_WHITELIST += "CVE-2023-7192" + +# fixed-version: only affects 6.5rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0193" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-0340" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0443" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0562" + +# CVE-2024-0564 has no known resolution + +# CVE-2024-0565 needs backporting (fixed from 6.7rc6) + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0582" + +# cpe-stable-backport: Backported in 5.4.263 +CVE_CHECK_WHITELIST += "CVE-2024-0584" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-0607" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0639" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-0641" + +# cpe-stable-backport: Backported in 5.4.267 +CVE_CHECK_WHITELIST += "CVE-2024-0646" + +# cpe-stable-backport: Backported in 5.4.243 +CVE_CHECK_WHITELIST += "CVE-2024-0775" + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-0841" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-1085" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-1086" + +# CVE-2024-1151 needs backporting (fixed from 6.8rc5) + +# CVE-2024-1312 needs backporting (fixed from 6.5rc4) + +# CVE-2024-21803 has no known resolution + +# CVE-2024-2193 has no known resolution + +# cpe-stable-backport: Backported in 5.4.273 +CVE_CHECK_WHITELIST += "CVE-2024-22099" + +# CVE-2024-22386 has no known resolution + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-22705" + +# cpe-stable-backport: Backported in 5.4.255 +CVE_CHECK_WHITELIST += "CVE-2024-23196" + +# CVE-2024-23307 needs backporting (fixed from 6.9rc1) + +# CVE-2024-23848 has no known resolution + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-23849" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-23850" + +# CVE-2024-23851 needs backporting (fixed from 6.8rc3) + +# CVE-2024-24855 needs backporting (fixed from 6.5rc2) + +# CVE-2024-24857 has no known resolution + +# CVE-2024-24858 has no known resolution + +# CVE-2024-24859 has no known resolution + +# CVE-2024-24860 needs backporting (fixed from 6.8rc1) + +# CVE-2024-24861 needs backporting (fixed from 6.9rc1) + +# CVE-2024-24864 has no known resolution + +# CVE-2024-25739 has no known resolution + +# CVE-2024-25740 has no known resolution + +# CVE-2024-25741 has no known resolution + +# CVE-2024-25744 needs backporting (fixed from 6.7rc5) + +# fixed-version: only affects 6.5rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26581" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26582" + +# fixed-version: only affects 5.7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26583" + +# CVE-2024-26584 needs backporting (fixed from 6.8rc5) + +# CVE-2024-26585 needs backporting (fixed from 6.8rc5) + +# CVE-2024-26586 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26587" + +# fixed-version: only affects 6.1rc3 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26588" + +# CVE-2024-26589 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 5.16rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26590" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26591" + +# CVE-2024-26592 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26593" + +# CVE-2024-26594 needs backporting (fixed from 6.8rc1) + +# CVE-2024-26595 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26596" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2024-26597" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26598" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26599" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26600" + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26601" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26602" + +# fixed-version: only affects 5.14rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26603" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26604" + +# fixed-version: only affects 6.7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26605" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26606" + +# CVE-2024-26607 needs backporting (fixed from 6.8rc2) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26608" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26610" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26611" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26612" + +# CVE-2024-26614 needs backporting (fixed from 6.8rc2) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26615" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26616" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26617" + +# fixed-version: only affects 6.5rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26618" + +# fixed-version: only affects 6.7rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26619" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26620" + +# fixed-version: only affects 6.7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26621" + +# CVE-2024-26622 needs backporting (fixed from 6.8rc7) + +# CVE-2024-26623 needs backporting (fixed from 6.8rc3) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26625" + +# fixed-version: only affects 6.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26626" + +# CVE-2024-26627 needs backporting (fixed from 6.8rc3) + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26629" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26630" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26631" + +# fixed-version: only affects 5.17rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26632" + +# cpe-stable-backport: Backported in 5.4.268 +CVE_CHECK_WHITELIST += "CVE-2024-26633" + +# fixed-version: only affects 6.6rc7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26634" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26635" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26636" + +# fixed-version: only affects 6.7 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26637" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26638" + +# fixed-version: only affects 6.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26639" + +# CVE-2024-26640 needs backporting (fixed from 6.8rc3) + +# CVE-2024-26641 needs backporting (fixed from 6.8rc3) + +# CVE-2024-26642 needs backporting (fixed from 6.8) + +# fixed-version: only affects 6.5rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26643" + +# CVE-2024-26644 needs backporting (fixed from 6.8rc2) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26645" + +# CVE-2024-26646 needs backporting (fixed from 6.8rc1) + +# CVE-2024-26647 needs backporting (fixed from 6.8rc1) + +# CVE-2024-26648 needs backporting (fixed from 6.8rc1) + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26649" + +# CVE-2024-26650 needs backporting (fixed from 6.8rc2) + +# cpe-stable-backport: Backported in 5.4.273 +CVE_CHECK_WHITELIST += "CVE-2024-26651" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26652" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26653" + +# CVE-2024-26654 needs backporting (fixed from 6.9rc2) + +# CVE-2024-26655 needs backporting (fixed from 6.9rc2) + +# CVE-2024-26656 needs backporting (fixed from 6.9rc1) + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26657" + +# CVE-2024-26658 needs backporting (fixed from 6.8rc1) + +# CVE-2024-26659 needs backporting (fixed from 6.8rc3) + +# fixed-version: only affects 5.11rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26660" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26661" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26662" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26663" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26664" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26665" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26666" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26667" + +# CVE-2024-26668 needs backporting (fixed from 6.8rc2) + +# CVE-2024-26669 needs backporting (fixed from 6.8rc2) + +# fixed-version: only affects 6.6rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26670" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26671" + +# CVE-2024-26672 needs backporting (fixed from 6.8rc1) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26673" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26674" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26675" + +# CVE-2024-26676 needs backporting (fixed from 6.8rc4) + +# CVE-2024-26677 needs backporting (fixed from 6.8rc4) + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26678" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26679" + +# fixed-version: only affects 5.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26680" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26681" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26682" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26683" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26684" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26685" + +# CVE-2024-26686 needs backporting (fixed from 6.8rc4) + +# CVE-2024-26687 needs backporting (fixed from 6.8rc5) + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26688" + +# CVE-2024-26689 needs backporting (fixed from 6.8rc4) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26690" + +# CVE-2024-26691 needs backporting (fixed from 6.8rc5) + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26692" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26693" + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26694" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26695" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26696" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26697" + +# fixed-version: only affects 5.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26698" + +# CVE-2024-26699 needs backporting (fixed from 6.8rc5) + +# CVE-2024-26700 needs backporting (fixed from 6.8rc4) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26702" + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26703" + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26704" + +# fixed-version: only affects 6.6rc2 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26705" + +# CVE-2024-26706 needs backporting (fixed from 6.8rc3) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26707" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26708" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26709" + +# fixed-version: only affects 6.8rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26710" + +# fixed-version: only affects 6.2rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26711" + +# CVE-2024-26712 needs backporting (fixed from 6.8rc5) + +# CVE-2024-26713 needs backporting (fixed from 6.8rc5) + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26714" + +# CVE-2024-26715 needs backporting (fixed from 6.8rc3) + +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26716" + +# fixed-version: only affects 5.12rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26717" + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26718" + +# CVE-2024-26719 needs backporting (fixed from 6.8rc3) + +# cpe-stable-backport: Backported in 5.4.269 +CVE_CHECK_WHITELIST += "CVE-2024-26720" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26721" + +# fixed-version: only affects 6.7rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26722" + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26723" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26724" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26725" + +# CVE-2024-26726 needs backporting (fixed from 6.8rc5) + +# fixed-version: only affects 5.9rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26727" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26728" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26729" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26730" + +# fixed-version: only affects 6.4rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26731" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26732" + +# CVE-2024-26733 needs backporting (fixed from 6.8rc6) + +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26734" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26735" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26736" + +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26737" + +# CVE-2024-26738 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26739 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26740 needs backporting (fixed from 6.8rc6) + +# fixed-version: only affects 6.1rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26741" + +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26742" + +# CVE-2024-26743 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26744 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26745 needs backporting (fixed from 6.8rc7) + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26746" + +# CVE-2024-26747 needs backporting (fixed from 6.8rc6) + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26748" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26749" + +# fixed-version: only affects 6.8rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26750" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26751" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26752" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26753" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26754" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26755" + +# CVE-2024-26756 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26757 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26758 needs backporting (fixed from 6.8rc6) + +# CVE-2024-26759 needs backporting (fixed from 6.8rc6) + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26760" + +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26761" + +# fixed-version: only affects 6.7rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26762" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26763" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26764" + +# CVE-2024-26765 needs backporting (fixed from 6.8rc6) + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26766" + +# CVE-2024-26767 needs backporting (fixed from 6.8rc5) + +# CVE-2024-26768 needs backporting (fixed from 6.8rc4) + +# CVE-2024-26769 needs backporting (fixed from 6.8rc3) + +# CVE-2024-26770 needs backporting (fixed from 6.8rc3) + +# CVE-2024-26771 needs backporting (fixed from 6.8rc3) + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26772" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26773" + +# CVE-2024-26774 needs backporting (fixed from 6.8rc3) + +# CVE-2024-26775 needs backporting (fixed from 6.8rc2) + +# CVE-2024-26776 needs backporting (fixed from 6.8rc2) + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26777" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26778" + +# cpe-stable-backport: Backported in 5.4.270 +CVE_CHECK_WHITELIST += "CVE-2024-26779" + +# fixed-version: only affects 6.8rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26780" + +# fixed-version: only affects 6.8rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26781" + +# fixed-version: only affects 5.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26782" + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26783" + +# CVE-2024-26784 needs backporting (fixed from 6.8rc7) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26785" + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26786" + +# CVE-2024-26787 needs backporting (fixed from 6.8rc7) + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26788" + +# CVE-2024-26789 needs backporting (fixed from 6.8rc7) + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26790" + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26791" + +# fixed-version: only affects 6.8rc4 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26792" + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26793" + +# fixed-version: only affects 6.8rc6 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26794" + +# CVE-2024-26795 needs backporting (fixed from 6.8rc7) + +# fixed-version: only affects 6.6rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26796" + +# CVE-2024-26797 needs backporting (fixed from 6.8rc7) + +# CVE-2024-26798 needs backporting (fixed from 6.8rc7) + +# fixed-version: only affects 5.18rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26799" + +# fixed-version: only affects 6.8rc5 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26800" + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26801" + +# CVE-2024-26802 needs backporting (fixed from 6.8rc7) + +# CVE-2024-26803 needs backporting (fixed from 6.8rc7) + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26804" + +# cpe-stable-backport: Backported in 5.4.271 +CVE_CHECK_WHITELIST += "CVE-2024-26805" + +# CVE-2024-26806 needs backporting (fixed from 6.8rc7) + +# fixed-version: only affects 6.4rc1 onwards +CVE_CHECK_WHITELIST += "CVE-2024-26807" + +# CVE-2024-26808 needs backporting (fixed from 6.8rc2) + +# CVE-2024-26809 needs backporting (fixed from 6.9rc1) + diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py new file mode 100755 index 0000000000..12ae3b0b1d --- /dev/null +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py @@ -0,0 +1,101 @@ +#! /usr/bin/env python3 + +# Generate granular CVE status metadata for a specific version of the kernel +# using data from linuxkernelcves.com. +# +# SPDX-License-Identifier: GPL-2.0-only + +import argparse +import datetime +import json +import pathlib +import re + +from packaging.version import Version + + +def parse_version(s): + """ + Parse the version string and either return a packaging.version.Version, or + None if the string was unset or "unk". + """ + if s and s != "unk": + # packaging.version.Version doesn't approve of versions like v5.12-rc1-dontuse + s = s.replace("-dontuse", "") + return Version(s) + return None + + +def main(argp=None): + parser = argparse.ArgumentParser() + parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves") + parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") + + args = parser.parse_args(argp) + datadir = args.datadir + version = args.version + base_version = f"{version.major}.{version.minor}" + + with open(datadir / "data" / "kernel_cves.json", "r") as f: + cve_data = json.load(f) + + with open(datadir / "data" / "stream_fixes.json", "r") as f: + stream_data = json.load(f) + + print(f""" +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at {datetime.datetime.now()} for version {version} + +python check_kernel_cve_status_version() {{ + this_version = "{version}" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +}} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" +""") + + for cve, data in cve_data.items(): + if "affected_versions" not in data: + print(f"# Skipping {cve}, no affected_versions") + print() + continue + + affected = data["affected_versions"] + first_affected, last_affected = re.search(r"(.+) to (.+)", affected).groups() + first_affected = parse_version(first_affected) + last_affected = parse_version(last_affected) + + handled = False + if not last_affected: + print(f"# {cve} has no known resolution") + elif first_affected and version < first_affected: + print(f"# fixed-version: only affects {first_affected} onwards") + handled = True + elif last_affected < version: + print(f"# fixed-version: Fixed after version {last_affected}") + handled = True + else: + if cve in stream_data: + backport_data = stream_data[cve] + if base_version in backport_data: + backport_ver = Version(backport_data[base_version]["fixed_version"]) + if backport_ver <= version: + print(f"# cpe-stable-backport: Backported in {backport_ver}") + handled = True + else: + # TODO print a note that the kernel needs bumping + print(f"# {cve} needs backporting (fixed from {backport_ver})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + else: + print(f"# {cve} needs backporting (fixed from {last_affected})") + + if handled: + print(f'CVE_CHECK_WHITELIST += "{cve}"') + + print() + + +if __name__ == "__main__": + main() diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index 5940cc90ea..887e1e2430 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb @@ -86,6 +86,12 @@ do_install() { # be dealt with. # cp -a scripts $kerneldir/build + # although module.lds can be regenerated on target via 'make modules_prepare' + # there are several places where 'makes scripts prepare' is done, and that won't + # regenerate the file. So we copy it onto the target as a migration to using + # modules_prepare + cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || : + if [ -d arch/${ARCH}/scripts ]; then cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH} fi @@ -171,7 +177,7 @@ do_install() { cp -a --parents $SYSCALL_TOOLS $kerneldir/build/ fi - cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ + cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || : fi if [ -d arch/${ARCH}/include ]; then diff --git a/meta/recipes-kernel/linux/linux-dummy.bb b/meta/recipes-kernel/linux/linux-dummy.bb index 62cf6f5ea6..c56f8990de 100644 --- a/meta/recipes-kernel/linux/linux-dummy.bb +++ b/meta/recipes-kernel/linux/linux-dummy.bb @@ -5,10 +5,12 @@ where you wish to build the kernel externally from the build system." SECTION = "kernel" LICENSE = "GPLv2" -LIC_FILES_CHKSUM = "file://${WORKDIR}/COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" +LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" PROVIDES += "virtual/kernel" +inherit deploy linux-dummy + PACKAGES_DYNAMIC += "^kernel-module-.*" PACKAGES_DYNAMIC += "^kernel-image-.*" PACKAGES_DYNAMIC += "^kernel-firmware-.*" @@ -24,7 +26,7 @@ DESCRIPTION_kernel-vmlinux = "Kernel vmlinux meta package" INHIBIT_DEFAULT_DEPS = "1" -#COMPATIBLE_MACHINE = "your_machine" +COMPATIBLE_HOST = ".*-linux" PR = "r1" diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index 06a9108fab..a1c0de9981 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb @@ -10,8 +10,6 @@ inherit kernel require recipes-kernel/linux/linux-yocto.inc -# for ncurses tests -inherit pkgconfig # provide this .inc to set specific revisions include recipes-kernel/linux/linux-yocto-dev-revisions.inc diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb index caa5b4ef53..f912304858 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "508b4e6ada7f78b3ef5a9dbdd182d13dffe00123" -SRCREV_meta ?= "caafbdfe382bf22a4786d871af097acd49d0867a" +SRCREV_machine ?= "c93e75bc334ba00df2d66411a0d79c4378cf4af8" +SRCREV_meta ?= "ecd382f3477fae022ad1881e4c39e810cdc3c760" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.4.51" +LINUX_VERSION ?= "5.4.273" LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb index 86e133f9f2..2f94782471 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.4.51" +LINUX_VERSION ?= "5.4.273" LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine_qemuarm ?= "d4c9ad88abadd22f7b2785e8a101523fe9a74dc0" -SRCREV_machine ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_meta ?= "caafbdfe382bf22a4786d871af097acd49d0867a" +SRCREV_machine_qemuarm ?= "d29f3f3a932319053ad24d84b087b0a57908c1bc" +SRCREV_machine ?= "b6480d09d84d09e7560daa5c1d73917292ae30c0" +SRCREV_meta ?= "ecd382f3477fae022ad1881e4c39e810cdc3c760" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto.inc b/meta/recipes-kernel/linux/linux-yocto.inc index 91df9c1cd5..2978c2fb90 100644 --- a/meta/recipes-kernel/linux/linux-yocto.inc +++ b/meta/recipes-kernel/linux/linux-yocto.inc @@ -1,6 +1,7 @@ SUMMARY = "Linux kernel" SECTION = "kernel" LICENSE = "GPLv2" +HOMEPAGE = "https://www.yoctoproject.org/" LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" @@ -55,3 +56,6 @@ do_install_append(){ # enable kernel-sample for oeqa/runtime/cases's ksample.py test KERNEL_FEATURES_append_qemuall=" features/kernel-sample/kernel-sample.scc" + +# CVE exclusion +include recipes-kernel/linux/cve-exclusion.inc diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb index e79793b5f0..108043bd98 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb @@ -1,6 +1,7 @@ KBRANCH ?= "v5.4/standard/base" require recipes-kernel/linux/linux-yocto.inc +include recipes-kernel/linux/cve-exclusion_5.4.inc # board specific branches KBRANCH_qemuarm ?= "v5.4/standard/arm-versatile-926ejs" @@ -12,16 +13,16 @@ KBRANCH_qemux86 ?= "v5.4/standard/base" KBRANCH_qemux86-64 ?= "v5.4/standard/base" KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64" -SRCREV_machine_qemuarm ?= "601e67d37274e4a0890bcdbe6660c2dbd08d3b97" -SRCREV_machine_qemuarm64 ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_machine_qemumips ?= "c8543a84037b88da45d0d825216187b42d0c509a" -SRCREV_machine_qemuppc ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_machine_qemuriscv64 ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_machine_qemux86 ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_machine_qemux86-64 ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_machine_qemumips64 ?= "c741fec6daabb449d08c9f96052be1477fe3c968" -SRCREV_machine ?= "fed60f1c8e56095647fa8497270ecacea4c45dbc" -SRCREV_meta ?= "caafbdfe382bf22a4786d871af097acd49d0867a" +SRCREV_machine_qemuarm ?= "b7e0891bf4b281c4e29b86f708e10a3339670acc" +SRCREV_machine_qemuarm64 ?= "ff75f0c7beb167391f0285dd2993394cd143a8a7" +SRCREV_machine_qemumips ?= "650e43a19e625d1db9d8245cda27db7b86990398" +SRCREV_machine_qemuppc ?= "0fb6546a09f90befecb11cd0f10274276e8a3021" +SRCREV_machine_qemuriscv64 ?= "fe901e2f4b156e9cf7ddb03f479f7339d28e398b" +SRCREV_machine_qemux86 ?= "fe901e2f4b156e9cf7ddb03f479f7339d28e398b" +SRCREV_machine_qemux86-64 ?= "fe901e2f4b156e9cf7ddb03f479f7339d28e398b" +SRCREV_machine_qemumips64 ?= "f59947f338319b1741db5dfac34f08399561ab25" +SRCREV_machine ?= "fe901e2f4b156e9cf7ddb03f479f7339d28e398b" +SRCREV_meta ?= "ecd382f3477fae022ad1881e4c39e810cdc3c760" # remap qemuarm to qemuarma15 for the 5.4 kernel # KMACHINE_qemuarm ?= "qemuarma15" @@ -30,7 +31,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" -LINUX_VERSION ?= "5.4.51" +LINUX_VERSION ?= "5.4.273" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" diff --git a/meta/recipes-kernel/lttng/lttng-modules/0017-fix-random-remove-unused-tracepoints-v5.18.patch b/meta/recipes-kernel/lttng/lttng-modules/0017-fix-random-remove-unused-tracepoints-v5.18.patch new file mode 100644 index 0000000000..3fc7fd733d --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0017-fix-random-remove-unused-tracepoints-v5.18.patch @@ -0,0 +1,46 @@ +From 25b70c486bb96de0caf7cea1da42ed07801cca84 Mon Sep 17 00:00:00 2001 +From: Michael Jeanson <mjeanson@efficios.com> +Date: Mon, 4 Apr 2022 14:33:42 -0400 +Subject: [PATCH 17/19] fix: random: remove unused tracepoints (v5.18) + +See upstream commit : + + commit 14c174633f349cb41ea90c2c0aaddac157012f74 + Author: Jason A. Donenfeld <Jason@zx2c4.com> + Date: Thu Feb 10 16:40:44 2022 +0100 + + random: remove unused tracepoints + + These explicit tracepoints aren't really used and show sign of aging. + It's work to keep these up to date, and before I attempted to keep them + up to date, they weren't up to date, which indicates that they're not + really used. These days there are better ways of introspecting anyway. + +Upstream-Status: Backport [369d82bb1746447514c877088d7c5fd0f39140f8] +Change-Id: I3b8c3e2732e7efdd76ce63204ac53a48784d0df6 +Signed-off-by: Michael Jeanson <mjeanson@efficios.com> +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +--- + probes/Kbuild | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/probes/Kbuild b/probes/Kbuild +index 3ae2d39e..58da82b8 100644 +--- a/probes/Kbuild ++++ b/probes/Kbuild +@@ -215,8 +215,11 @@ ifneq ($(CONFIG_FRAME_WARN),0) + CFLAGS_lttng-probe-printk.o += -Wframe-larger-than=2200 + endif + ++# Introduced in v3.6, remove in v5.18 + obj-$(CONFIG_LTTNG) += $(shell \ +- if [ $(VERSION) -ge 4 \ ++ if [ \( ! \( $(VERSION) -ge 6 -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -ge 18 \) \) \) \ ++ -a \ ++ $(VERSION) -ge 4 \ + -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -ge 6 \) \ + -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -eq 5 -a $(SUBLEVEL) -ge 2 \) \ + -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -eq 4 -a $(SUBLEVEL) -ge 9 \) \ +-- +2.35.1 + diff --git a/meta/recipes-kernel/lttng/lttng-modules/0018-fix-random-remove-unused-tracepoints-v5.10-v5.15.patch b/meta/recipes-kernel/lttng/lttng-modules/0018-fix-random-remove-unused-tracepoints-v5.10-v5.15.patch new file mode 100644 index 0000000000..5c324a9bde --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0018-fix-random-remove-unused-tracepoints-v5.10-v5.15.patch @@ -0,0 +1,45 @@ +From da956d1444139883f5d01078d945078738ffade4 Mon Sep 17 00:00:00 2001 +From: He Zhe <zhe.he@windriver.com> +Date: Thu, 2 Jun 2022 06:36:08 +0000 +Subject: [PATCH 18/19] fix: random: remove unused tracepoints (v5.10, v5.15) + +The following kernel commit has been back ported to v5.10.119 and v5.15.44. + +commit 14c174633f349cb41ea90c2c0aaddac157012f74 +Author: Jason A. Donenfeld <Jason@zx2c4.com> +Date: Thu Feb 10 16:40:44 2022 +0100 + + random: remove unused tracepoints + + These explicit tracepoints aren't really used and show sign of aging. + It's work to keep these up to date, and before I attempted to keep them + up to date, they weren't up to date, which indicates that they're not + really used. These days there are better ways of introspecting anyway. + +Upstream-Status: Backport [1901e0eb58795e850e8fdcb5e1c235e4397b470d] +Signed-off-by: He Zhe <zhe.he@windriver.com> +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +Change-Id: I0b7eb8aa78b5bd2039e20ae3e1da4c5eb9018789 +--- + probes/Kbuild | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/probes/Kbuild b/probes/Kbuild +index 58da82b8..87f2d681 100644 +--- a/probes/Kbuild ++++ b/probes/Kbuild +@@ -217,7 +217,10 @@ endif + + # Introduced in v3.6, remove in v5.18 + obj-$(CONFIG_LTTNG) += $(shell \ +- if [ \( ! \( $(VERSION) -ge 6 -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -ge 18 \) \) \) \ ++ if [ \( ! \( $(VERSION) -ge 6 \ ++ -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -ge 18 \) \ ++ -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -eq 15 -a $(SUBLEVEL) -ge 44 \) \ ++ -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -eq 10 -a $(SUBLEVEL) -ge 119\) \) \) \ + -a \ + $(VERSION) -ge 4 \ + -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -ge 6 \) \ +-- +2.35.1 + diff --git a/meta/recipes-kernel/lttng/lttng-modules/0019-fix-random-tracepoints-removed-in-stable-kernels.patch b/meta/recipes-kernel/lttng/lttng-modules/0019-fix-random-tracepoints-removed-in-stable-kernels.patch new file mode 100644 index 0000000000..73ba4d06bc --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0019-fix-random-tracepoints-removed-in-stable-kernels.patch @@ -0,0 +1,51 @@ +From 2c98e0cd03eba0aa935796bc7413c51b5e4b055c Mon Sep 17 00:00:00 2001 +From: Michael Jeanson <mjeanson@efficios.com> +Date: Tue, 31 May 2022 15:24:48 -0400 +Subject: [PATCH 19/19] fix: 'random' tracepoints removed in stable kernels + +The upstream commit 14c174633f349cb41ea90c2c0aaddac157012f74 removing +the 'random' tracepoints is being backported to multiple stable kernel +branches, I don't see how that qualifies as a fix but here we are. + +Use the presence of 'include/trace/events/random.h' in the kernel source +tree instead of the rather tortuous version check to determine if we +need to build 'lttng-probe-random.ko'. + +Upstream-Status: Backport [ed1149ef88fb62c365ac66cf62c58ac6abd8d7e8] +Change-Id: I8f5f2f4c9e09c61127c49c7949b22dd3fab0460d +Signed-off-by: Michael Jeanson <mjeanson@efficios.com> +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +--- + probes/Kbuild | 16 ++++------------ + 1 file changed, 4 insertions(+), 12 deletions(-) + +diff --git a/probes/Kbuild b/probes/Kbuild +index 87f2d681..f09d6b65 100644 +--- a/probes/Kbuild ++++ b/probes/Kbuild +@@ -216,18 +216,10 @@ ifneq ($(CONFIG_FRAME_WARN),0) + endif + + # Introduced in v3.6, remove in v5.18 +-obj-$(CONFIG_LTTNG) += $(shell \ +- if [ \( ! \( $(VERSION) -ge 6 \ +- -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -ge 18 \) \ +- -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -eq 15 -a $(SUBLEVEL) -ge 44 \) \ +- -o \( $(VERSION) -eq 5 -a $(PATCHLEVEL) -eq 10 -a $(SUBLEVEL) -ge 119\) \) \) \ +- -a \ +- $(VERSION) -ge 4 \ +- -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -ge 6 \) \ +- -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -eq 5 -a $(SUBLEVEL) -ge 2 \) \ +- -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -eq 4 -a $(SUBLEVEL) -ge 9 \) \ +- -o \( $(VERSION) -eq 3 -a $(PATCHLEVEL) -eq 0 -a $(SUBLEVEL) -ge 41 \) ] ; then \ +- echo "lttng-probe-random.o" ; fi;) ++random_dep = $(srctree)/include/trace/events/random.h ++ifneq ($(wildcard $(random_dep)),) ++ obj-$(CONFIG_LTTNG) += lttng-probe-random.o ++endif + + obj-$(CONFIG_LTTNG) += $(shell \ + if [ $(VERSION) -ge 4 \ +-- +2.35.1 + diff --git a/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format.patch b/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format.patch new file mode 100644 index 0000000000..b4939188cc --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format.patch @@ -0,0 +1,147 @@ +fix: jbd2: use the correct print format +See upstream commit : + + commit d87a7b4c77a997d5388566dd511ca8e6b8e8a0a8 + Author: Bixuan Cui <cuibixuan@linux.alibaba.com> + Date: Tue Oct 11 19:33:44 2022 +0800 + + jbd2: use the correct print format + + The print format error was found when using ftrace event: + <...>-1406 [000] .... 23599442.895823: jbd2_end_commit: dev 252,8 transaction -1866216965 sync 0 head -1866217368 + <...>-1406 [000] .... 23599442.896299: jbd2_start_commit: dev 252,8 transaction -1866216964 sync 0 + + Use the correct print format for transaction, head and tid. + +Change-Id: Ic053f0e0c1e24ebc75bae51d07696aaa5e1c0094 +Signed-off-by: Michael Jeanson <mjeanson@efficios.com> +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> + +Upstream-status: Backport +Signed-off-by: Steve Sakoman <steve@sakoman.com> +Note: combines three upstream commits: +https://github.com/lttng/lttng-modules/commit/b28830a0dcdf95ec3e6b390b4d032667deaad0c0 +https://github.com/lttng/lttng-modules/commit/4fd2615b87b3cac0fd5bdc5fc82db05f6fcfdecf +https://github.com/lttng/lttng-modules/commit/612c99eb24bf72f4d47d02025e92de8c35ece14e + +diff --git a/instrumentation/events/lttng-module/jbd2.h b/instrumentation/events/lttng-module/jbd2.h +--- a/instrumentation/events/lttng-module/jbd2.h ++++ b/instrumentation/events/lttng-module/jbd2.h +@@ -29,6 +29,25 @@ LTTNG_TRACEPOINT_EVENT(jbd2_checkpoint, + ) + ) + ++#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ ++ || LTTNG_KERNEL_RANGE(5,4,229, 5,5,0) \ ++ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ ++ || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ ++ || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ ++ || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) ++LTTNG_TRACEPOINT_EVENT_CLASS(jbd2_commit, ++ ++ TP_PROTO(journal_t *journal, transaction_t *commit_transaction), ++ ++ TP_ARGS(journal, commit_transaction), ++ ++ TP_FIELDS( ++ ctf_integer(dev_t, dev, journal->j_fs_dev->bd_dev) ++ ctf_integer(char, sync_commit, commit_transaction->t_synchronous_commit) ++ ctf_integer(tid_t, transaction, commit_transaction->t_tid) ++ ) ++) ++#else + LTTNG_TRACEPOINT_EVENT_CLASS(jbd2_commit, + + TP_PROTO(journal_t *journal, transaction_t *commit_transaction), +@@ -41,6 +60,7 @@ LTTNG_TRACEPOINT_EVENT_CLASS(jbd2_commit + ctf_integer(int, transaction, commit_transaction->t_tid) + ) + ) ++#endif + + LTTNG_TRACEPOINT_EVENT_INSTANCE(jbd2_commit, jbd2_start_commit, + +@@ -79,6 +99,25 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(jbd2_com + ) + #endif + ++#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ ++ || LTTNG_KERNEL_RANGE(5,4,229, 5,5,0) \ ++ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ ++ || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ ++ || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ ++ || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) ++LTTNG_TRACEPOINT_EVENT(jbd2_end_commit, ++ TP_PROTO(journal_t *journal, transaction_t *commit_transaction), ++ ++ TP_ARGS(journal, commit_transaction), ++ ++ TP_FIELDS( ++ ctf_integer(dev_t, dev, journal->j_fs_dev->bd_dev) ++ ctf_integer(char, sync_commit, commit_transaction->t_synchronous_commit) ++ ctf_integer(tid_t, transaction, commit_transaction->t_tid) ++ ctf_integer(tid_t, head, journal->j_tail_sequence) ++ ) ++) ++#else + LTTNG_TRACEPOINT_EVENT(jbd2_end_commit, + TP_PROTO(journal_t *journal, transaction_t *commit_transaction), + +@@ -91,6 +130,7 @@ LTTNG_TRACEPOINT_EVENT(jbd2_end_commit, + ctf_integer(int, head, journal->j_tail_sequence) + ) + ) ++#endif + + LTTNG_TRACEPOINT_EVENT(jbd2_submit_inode_data, + TP_PROTO(struct inode *inode), +@@ -103,7 +143,48 @@ LTTNG_TRACEPOINT_EVENT(jbd2_submit_inode + ) + ) + +-#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(2,6,32)) ++#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ ++ || LTTNG_KERNEL_RANGE(5,4,229, 5,5,0) \ ++ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ ++ || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ ++ || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ ++ || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) ++LTTNG_TRACEPOINT_EVENT(jbd2_run_stats, ++ TP_PROTO(dev_t dev, tid_t tid, ++ struct transaction_run_stats_s *stats), ++ ++ TP_ARGS(dev, tid, stats), ++ ++ TP_FIELDS( ++ ctf_integer(dev_t, dev, dev) ++ ctf_integer(tid_t, tid, tid) ++ ctf_integer(unsigned long, wait, stats->rs_wait) ++ ctf_integer(unsigned long, running, stats->rs_running) ++ ctf_integer(unsigned long, locked, stats->rs_locked) ++ ctf_integer(unsigned long, flushing, stats->rs_flushing) ++ ctf_integer(unsigned long, logging, stats->rs_logging) ++ ctf_integer(__u32, handle_count, stats->rs_handle_count) ++ ctf_integer(__u32, blocks, stats->rs_blocks) ++ ctf_integer(__u32, blocks_logged, stats->rs_blocks_logged) ++ ) ++) ++ ++LTTNG_TRACEPOINT_EVENT(jbd2_checkpoint_stats, ++ TP_PROTO(dev_t dev, tid_t tid, ++ struct transaction_chp_stats_s *stats), ++ ++ TP_ARGS(dev, tid, stats), ++ ++ TP_FIELDS( ++ ctf_integer(dev_t, dev, dev) ++ ctf_integer(tid_t, tid, tid) ++ ctf_integer(unsigned long, chp_time, stats->cs_chp_time) ++ ctf_integer(__u32, forced_to_close, stats->cs_forced_to_close) ++ ctf_integer(__u32, written, stats->cs_written) ++ ctf_integer(__u32, dropped, stats->cs_dropped) ++ ) ++) ++#else + LTTNG_TRACEPOINT_EVENT(jbd2_run_stats, + TP_PROTO(dev_t dev, unsigned long tid, + struct transaction_run_stats_s *stats), diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.11.2.bb b/meta/recipes-kernel/lttng/lttng-modules_2.11.9.bb index 6fff096a37..8e9c44241b 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.11.2.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.11.9.bb @@ -1,6 +1,7 @@ SECTION = "devel" SUMMARY = "Linux Trace Toolkit KERNEL MODULE" DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" +HOMEPAGE = "https://lttng.org/" LICENSE = "LGPLv2.1 & GPLv2 & MIT" LIC_FILES_CHKSUM = "file://LICENSE;md5=3f882d431dc0f32f1f44c0707aa41128" @@ -11,10 +12,14 @@ COMPATIBLE_HOST = '(x86_64|i.86|powerpc|aarch64|mips|nios2|arm|riscv).*-linux' SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ file://Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch \ file://BUILD_RUNTIME_BUG_ON-vs-gcc7.patch \ + file://0017-fix-random-remove-unused-tracepoints-v5.18.patch \ + file://0018-fix-random-remove-unused-tracepoints-v5.10-v5.15.patch \ + file://0019-fix-random-tracepoints-removed-in-stable-kernels.patch \ + file://fix-jbd2-use-the-correct-print-format.patch \ " -SRC_URI[md5sum] = "2e3bc8cfb264fa13f374618b46f170e7" -SRC_URI[sha256sum] = "8a42240813b8fd1d001835cd6f5ec687f7d7f3b26070d4e21604c35a51a6441d" +SRC_URI[md5sum] = "cfb23ea6bdaf1ad40c7f9ac098b4016d" +SRC_URI[sha256sum] = "0c5fe9f8d8dbd1411a3c1c643dcbd0a55577bd15845758b73948e00bc7c387a6" export INSTALL_MOD_DIR="kernel/lttng-modules" @@ -22,7 +27,9 @@ EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" do_install_append() { # Delete empty directories to avoid QA failures if no modules were built - find ${D}/${nonarch_base_libdir} -depth -type d -empty -exec rmdir {} \; + if [ -d ${D}/${nonarch_base_libdir} ]; then + find ${D}/${nonarch_base_libdir} -depth -type d -empty -exec rmdir {} \; + fi } python do_package_prepend() { diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.11.2.bb b/meta/recipes-kernel/lttng/lttng-tools_2.11.5.bb index 36a19ec18d..6306193809 100644 --- a/meta/recipes-kernel/lttng/lttng-tools_2.11.2.bb +++ b/meta/recipes-kernel/lttng/lttng-tools_2.11.5.bb @@ -3,13 +3,14 @@ SUMMARY = "Linux Trace Toolkit Control" DESCRIPTION = "The Linux trace toolkit is a suite of tools designed \ to extract program execution details from the Linux operating system \ and interpret them." +HOMEPAGE = "https://github.com/lttng/lttng-tools" LICENSE = "GPLv2 & LGPLv2.1" LIC_FILES_CHKSUM = "file://LICENSE;md5=01d7fc4496aacf37d90df90b90b0cac1 \ file://gpl-2.0.txt;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ file://lgpl-2.1.txt;md5=0f0d71500e6a57fd24d825f33242b9ca" -DEPENDS = "liburcu popt libxml2 util-linux" +DEPENDS = "liburcu popt libxml2 util-linux bison-native" RDEPENDS_${PN} = "libgcc" RDEPENDS_${PN}-ptest += "make perl bash gawk babeltrace procps perl-module-overloading coreutils util-linux kmod lttng-modules sed python3-core" RDEPENDS_${PN}-ptest_append_libc-glibc = " glibc-utils" @@ -36,8 +37,8 @@ SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \ file://0001-tests-regression-disable-the-tools-live-tests.patch \ " -SRC_URI[md5sum] = "68ed78f7fa4235477ea577e48b3cd245" -SRC_URI[sha256sum] = "936477305b25f65c5dd22db9161287d30a309ce868b6180857b1fd1fb5e6a56b" +SRC_URI[md5sum] = "4bd983891f642d4139f80251f209ef81" +SRC_URI[sha256sum] = "38167b49e4d1bf78fdd5c3156d411123713fd8f04b0067d4b1cd03742d0edfaa" inherit autotools ptest pkgconfig useradd python3-dir manpages systemd diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.11.1.bb b/meta/recipes-kernel/lttng/lttng-ust_2.11.2.bb index 3bd0dfad61..8968728dae 100644 --- a/meta/recipes-kernel/lttng/lttng-ust_2.11.1.bb +++ b/meta/recipes-kernel/lttng/lttng-ust_2.11.2.bb @@ -31,8 +31,8 @@ SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ " -SRC_URI[md5sum] = "7de04a8ff1f0a4effa09a42620ec4081" -SRC_URI[sha256sum] = "7fbab963d60741ffd4d8dd0a246f6cf168cdfe3b2385798bd90550f5f0bba869" +SRC_URI[md5sum] = "82556e4ab28c818c80db84296fc28bb3" +SRC_URI[sha256sum] = "6b481cec7fe748503c827319e3356137bceef4cce8adecbda3a94c6effcdd161" CVE_PRODUCT = "ust" diff --git a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb index c7edb20ee4..32b89bb5ea 100644 --- a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb +++ b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb @@ -1,8 +1,9 @@ SUMMARY = "Build tools needed by external modules" +HOMEPAGE = "https://www.yoctoproject.org/" LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" -inherit kernel-arch +inherit kernel-arch linux-kernel-base inherit pkgconfig PACKAGE_ARCH = "${MACHINE_ARCH}" @@ -15,8 +16,10 @@ do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" RDEPENDS_${PN}-dev = "" DEPENDS += "bc-native bison-native" +DEPENDS += "gmp-native" EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}"" +EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" # Build some host tools under work-shared. CC, LD, and AR are probably # not used, but this is the historical way of invoking "make scripts". diff --git a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh index a78adf5729..df37bfe7a1 100755 --- a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh +++ b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh @@ -18,7 +18,7 @@ LOAD_MODULE=modprobe if [ ! -f /lib/modules/`uname -r`/modules.dep ]; then [ "$VERBOSE" != no ] && echo "Calculating module dependencies ..." - depmod -Ae + depmod -a fi loaded_modules=" " diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb index c4b7b77e99..42621e47d3 100644 --- a/meta/recipes-kernel/perf/perf.bb +++ b/meta/recipes-kernel/perf/perf.bb @@ -9,11 +9,11 @@ HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" LICENSE = "GPLv2" -PR = "r9" +PR = "r10" PACKAGECONFIG ??= "scripting tui libunwind" PACKAGECONFIG[dwarf] = ",NO_DWARF=1" -PACKAGECONFIG[scripting] = ",NO_LIBPERL=1 NO_LIBPYTHON=1,perl python3" +PACKAGECONFIG[scripting] = ",NO_LIBPERL=1 NO_LIBPYTHON=1,perl python3 python3-setuptools-native" # gui support was added with kernel 3.6.35 # since 3.10 libnewt was replaced by slang # to cover a wide range of kernel we add both dependencies @@ -45,7 +45,7 @@ PROVIDES = "virtual/perf" inherit linux-kernel-base kernel-arch manpages # needed for building the tools/perf Python bindings -inherit ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'python3native', '', d)} +inherit ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'python3targetconfig', '', d)} inherit python3-dir export PYTHON_SITEPACKAGES_DIR @@ -68,6 +68,7 @@ SPDX_S = "${S}/tools/perf" LDFLAGS="-ldl -lutil" EXTRA_OEMAKE = '\ + V=1 \ -C ${S}/tools/perf \ O=${B} \ CROSS_COMPILE=${TARGET_PREFIX} \ @@ -199,6 +200,9 @@ do_configure_prepend () { ${S}/tools/perf/Makefile.perf sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ ${S}/tools/perf/Makefile.perf + # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 + sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ + ${S}/tools/perf/Makefile.perf fi sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ ${S}/tools/perf/Makefile* @@ -261,9 +265,9 @@ PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" RDEPENDS_${PN} += "elfutils bash" RDEPENDS_${PN}-archive =+ "bash" -RDEPENDS_${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python3', '', d)}" +RDEPENDS_${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" RDEPENDS_${PN}-perl =+ "bash perl perl-modules" -RDEPENDS_${PN}-tests =+ "python3" +RDEPENDS_${PN}-tests =+ "python3 bash" RSUGGESTS_SCRIPTING = "${@bb.utils.contains('PACKAGECONFIG', 'scripting', '${PN}-perl ${PN}-python', '',d)}" RSUGGESTS_${PN} += "${PN}-archive ${PN}-tests ${RSUGGESTS_SCRIPTING}" diff --git a/meta/recipes-kernel/powertop/powertop/0002-configure.ac-ax_add_fortify_source.patch b/meta/recipes-kernel/powertop/powertop/0002-configure.ac-ax_add_fortify_source.patch new file mode 100644 index 0000000000..4ccbdbfcd1 --- /dev/null +++ b/meta/recipes-kernel/powertop/powertop/0002-configure.ac-ax_add_fortify_source.patch @@ -0,0 +1,70 @@ +From 0d833743954ac1c58773cbf7a78fe0dc8105ae4a Mon Sep 17 00:00:00 2001 +From: Joe Konno <joe.konno@linux.intel.com> +Date: Tue, 11 Feb 2020 14:15:42 -0800 +Subject: [PATCH] configure.ac: ax_add_fortify_source + +Use a maintained autoconf-archive macro to determine whether we need to +add -D_FORTIFY_SOURCE=3D2, or if the underlying OS (or toolchain) has it +baked in. + +Signed-off-by: Joe Konno <joe.konno@intel.com> + +Fixes: + aclocal: error: too many loops + +Upstream-Status: Backport from 2.12 +Signed-off-by: Tim Orling <timothy.t.orling@intel.com> +--- + configure.ac | 2 +- + m4/gcc_fortify_source_cc.m4 | 29 ----------------------------- + 2 files changed, 1 insertion(+), 30 deletions(-) + delete mode 100644 m4/gcc_fortify_source_cc.m4 + +diff --git a/configure.ac b/configure.ac +index d6a15e1..d68369c 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -36,7 +36,7 @@ AC_PROG_LIBTOOL + AC_PROG_CC + AC_PROG_INSTALL + AM_PROG_CC_C_O +-GCC_FORTIFY_SOURCE_CC ++AX_ADD_FORTIFY_SOURCE + AX_CXX_COMPILE_STDCXX_11([noext], [mandatory]) + + # Checks for libraries. +diff --git a/m4/gcc_fortify_source_cc.m4 b/m4/gcc_fortify_source_cc.m4 +deleted file mode 100644 +index 1206672..0000000 +--- a/m4/gcc_fortify_source_cc.m4 ++++ /dev/null +@@ -1,29 +0,0 @@ +-dnl GCC_FORTIFY_SOURCE_CC +-dnl checks -D_FORTIFY_SOURCE with the C++ compiler, if it exists then +-dnl updates CXXCPP +-AC_DEFUN([GCC_FORTIFY_SOURCE_CC],[ +- AC_LANG_ASSERT([C++]) +- AS_IF([test "X$CXX" != "X"], [ +- AC_MSG_CHECKING([for FORTIFY_SOURCE support]) +- fs_old_cxxcpp="$CXXCPP" +- fs_old_cxxflags="$CXXFLAGS" +- CXXCPP="$CXXCPP -D_FORTIFY_SOURCE=2" +- CXXFLAGS="$CXXFLAGS -Werror" +- AC_COMPILE_IFELSE([ +- AC_LANG_PROGRAM([[]], [[ +- int main(void) { +- #if !(__GNUC_PREREQ (4, 1) ) +- #error No FORTIFY_SOURCE support +- #endif +- return 0; +- } +- ]], [ +- AC_MSG_RESULT([yes]) +- ], [ +- AC_MSG_RESULT([no]) +- CXXCPP="$fs_old_cxxcpp" +- ]) +- ]) +- CXXFLAGS="$fs_old_cxxflags" +- ]) +-]) diff --git a/meta/recipes-kernel/powertop/powertop/0003-configure-Use-AX_REQUIRE_DEFINED.patch b/meta/recipes-kernel/powertop/powertop/0003-configure-Use-AX_REQUIRE_DEFINED.patch new file mode 100644 index 0000000000..ac728f4a39 --- /dev/null +++ b/meta/recipes-kernel/powertop/powertop/0003-configure-Use-AX_REQUIRE_DEFINED.patch @@ -0,0 +1,29 @@ +From fbf74492236676e844b021b0dbb45b1ca43a0410 Mon Sep 17 00:00:00 2001 +From: David King <amigadave@amigadave.com> +Date: Thu, 15 Apr 2021 11:45:13 +0100 +Subject: [PATCH] configure: Use AX_REQUIRE_DEFINED + +Require additional macros to be defined early, to avoid an aclocal +"too many loops" error when copying macros. + +Upstream-Status: Backport from tip + +Signed-off-by: Tim Orling <ticotimo@gmail.com> +--- + configure.ac | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/configure.ac b/configure.ac +index d68369c..b90831b 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -29,6 +29,9 @@ AM_GNU_GETTEXT([external]) + AM_GNU_GETTEXT_VERSION([0.18.2]) + + m4_ifdef([AM_PROG_AR], [AM_PROG_AR]) ++AX_REQUIRE_DEFINED([AX_ADD_FORTIFY_SOURCE]) ++AX_REQUIRE_DEFINED([AX_CXX_COMPILE_STDCXX]) ++AX_REQUIRE_DEFINED([AX_PTHREAD]) + # Checks for programs. + AC_PROG_CPP + AC_PROG_CXX diff --git a/meta/recipes-kernel/powertop/powertop_2.10.bb b/meta/recipes-kernel/powertop/powertop_2.10.bb index f1b0e92b2b..dcbba2fd5c 100644 --- a/meta/recipes-kernel/powertop/powertop_2.10.bb +++ b/meta/recipes-kernel/powertop/powertop_2.10.bb @@ -2,13 +2,15 @@ SUMMARY = "Power usage tool" DESCRIPTION = "Linux tool to diagnose issues with power consumption and power management." HOMEPAGE = "https://01.org/powertop/" BUGTRACKER = "https://app.devzing.com/powertopbugs/bugzilla" -DEPENDS = "ncurses libnl pciutils" +DEPENDS = "ncurses libnl pciutils autoconf-archive" LICENSE = "GPLv2" LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" -SRC_URI = "git://github.com/fenrus75/powertop;protocol=https \ - file://0001-wakeup_xxx.h-include-limits.h.patch \ -" +SRC_URI = "git://github.com/fenrus75/powertop;protocol=https;branch=master \ + file://0001-wakeup_xxx.h-include-limits.h.patch \ + file://0002-configure.ac-ax_add_fortify_source.patch \ + file://0003-configure-Use-AX_REQUIRE_DEFINED.patch \ + " SRCREV = "e8765b5475b22b7a2b6e9e8a031c68a268a0b0b3" S = "${WORKDIR}/git" diff --git a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb b/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb index 46820ef489..6ee0be5e3e 100644 --- a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb @@ -1,5 +1,5 @@ SUMMARY = "UProbes kernel module for SystemTap" - +HOMEPAGE = "https://sourceware.org/systemtap/" require systemtap_git.inc DEPENDS = "systemtap virtual/kernel" diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-gcc12-c-compatibility-re-tweak-for-rhel6-use-functio.patch b/meta/recipes-kernel/systemtap/systemtap/0001-gcc12-c-compatibility-re-tweak-for-rhel6-use-functio.patch new file mode 100644 index 0000000000..f885c44460 --- /dev/null +++ b/meta/recipes-kernel/systemtap/systemtap/0001-gcc12-c-compatibility-re-tweak-for-rhel6-use-functio.patch @@ -0,0 +1,49 @@ +From f199d1982ef8a6c6d5c06c082d057b8793bcc6aa Mon Sep 17 00:00:00 2001 +From: Serhei Makarov <serhei@serhei.io> +Date: Fri, 21 Jan 2022 18:21:46 -0500 +Subject: [PATCH] gcc12 c++ compatibility re-tweak for rhel6: use function + pointer instead of lambdas instead of ptr_fun<> + +Saving 2 lines in ltrim/rtrim is probably not a good reason to drop +compatibility with the RHEL6 system compiler. Actually declaring a +named function and passing the function pointer is compatible with +everything. + +Upstream-Status: Backport [https://sourceware.org/git/?p=systemtap.git;a=commit;h=f199d1982ef8a6c6d5c06c082d057b8793bcc6aa] +Signed-off-by: Khem Raj <raj.khem@gmail.com> +--- + util.cxx | 13 ++++++++----- + 1 file changed, 8 insertions(+), 5 deletions(-) + +--- a/util.cxx ++++ b/util.cxx +@@ -1757,21 +1757,24 @@ flush_to_stream (const string &fname, os + return 1; // Failure + } + ++int ++not_isspace(unsigned char c) ++{ ++ return !std::isspace(c); ++} ++ + // trim from start (in place) + void + ltrim(std::string &s) + { +- s.erase(s.begin(), +- std::find_if(s.begin(), s.end(), +- std::not1(std::ptr_fun<int, int>(std::isspace)))); ++ s.erase(s.begin(), std::find_if(s.begin(), s.end(), not_isspace)); + } + + // trim from end (in place) + void + rtrim(std::string &s) + { +- s.erase(std::find_if(s.rbegin(), s.rend(), +- std::not1(std::ptr_fun<int, int>(std::isspace))).base(), s.end()); ++ s.erase(std::find_if(s.rbegin(), s.rend(), not_isspace).base(), s.end()); + } + + // trim from both ends (in place) diff --git a/meta/recipes-kernel/systemtap/systemtap_git.bb b/meta/recipes-kernel/systemtap/systemtap_git.bb index 1c9f2aed16..a8b2cf1eac 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap_git.bb @@ -1,9 +1,14 @@ SUMMARY = "Script-directed dynamic tracing and performance analysis tool for Linux" +DESCRIPTION = "It provides free software infrastructure to simplify the \ +gathering of information about the running Linux system. This assists \ +diagnosis of a performance or functional problem." HOMEPAGE = "https://sourceware.org/systemtap/" require systemtap_git.inc -SRC_URI += "file://0001-improve-reproducibility-for-c-compiling.patch" +SRC_URI += "file://0001-improve-reproducibility-for-c-compiling.patch \ + file://0001-gcc12-c-compatibility-re-tweak-for-rhel6-use-functio.patch \ + " DEPENDS = "elfutils" diff --git a/meta/recipes-kernel/systemtap/systemtap_git.inc b/meta/recipes-kernel/systemtap/systemtap_git.inc index 116e83fe0f..af55f15fd4 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.inc +++ b/meta/recipes-kernel/systemtap/systemtap_git.inc @@ -3,7 +3,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" SRCREV = "044a0640985ef007c0b2fb6eaf660d9d51800cda" PV = "4.2" -SRC_URI = "git://sourceware.org/git/systemtap.git \ +SRC_URI = "git://sourceware.org/git/systemtap.git;branch=master \ file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ file://0001-Install-python-modules-to-correct-library-dir.patch \ file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2020.04.29.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2024.01.23.bb index a5827b9ef0..6489bc90d9 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2020.04.29.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2024.01.23.bb @@ -1,11 +1,11 @@ SUMMARY = "Wireless Central Regulatory Domain Database" -HOMEPAGE = "http://wireless.kernel.org/en/developers/Regulatory/CRDA" +HOMEPAGE = "https://wireless.wiki.kernel.org/en/developers/regulatory/crda" SECTION = "net" LICENSE = "ISC" LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" -SRC_URI[sha256sum] = "89fd031aed5977c219a71501e144375a10e7c90d1005d5d086ea7972886a2c7a" +SRC_URI[sha256sum] = "c8a61c9acf76fa7eb4239e89f640dee3e87098d9f69b4d3518c9c60fc6d20c55" inherit bin_package allarch @@ -13,7 +13,7 @@ do_install() { install -d -m0755 ${D}${nonarch_libdir}/crda install -d -m0755 ${D}${sysconfdir}/wireless-regdb/pubkeys install -m 0644 regulatory.bin ${D}${nonarch_libdir}/crda/regulatory.bin - install -m 0644 sforshee.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/sforshee.key.pub.pem + install -m 0644 wens.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/wens.key.pub.pem install -m 0644 -D regulatory.db ${D}${nonarch_base_libdir}/firmware/regulatory.db install -m 0644 regulatory.db.p7s ${D}${nonarch_base_libdir}/firmware/regulatory.db.p7s |