summaryrefslogtreecommitdiffstats
path: root/documentation/migration-guides/release-notes-4.0.rst
diff options
context:
space:
mode:
Diffstat (limited to 'documentation/migration-guides/release-notes-4.0.rst')
-rw-r--r--documentation/migration-guides/release-notes-4.0.rst80
1 files changed, 40 insertions, 40 deletions
diff --git a/documentation/migration-guides/release-notes-4.0.rst b/documentation/migration-guides/release-notes-4.0.rst
index 6eb5f807de..e9e6949527 100644
--- a/documentation/migration-guides/release-notes-4.0.rst
+++ b/documentation/migration-guides/release-notes-4.0.rst
@@ -25,7 +25,7 @@ New Features / Enhancements in 4.0
25 25
26 BB_SIGNATURE_HANDLER = "OEEquivHash" 26 BB_SIGNATURE_HANDLER = "OEEquivHash"
27 BB_HASHSERVE = "auto" 27 BB_HASHSERVE = "auto"
28 BB_HASHSERVE_UPSTREAM = "hashserv.yocto.io:8687" 28 BB_HASHSERVE_UPSTREAM = "hashserv.yoctoproject.org:8686"
29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" 29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH"
30 30
31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__ 31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__
@@ -38,7 +38,7 @@ New Features / Enhancements in 4.0
38 38
39- Inclusive language adjustments to some variable names - see the 39- Inclusive language adjustments to some variable names - see the
40 :ref:`4.0 migration guide <migration-4.0-inclusive-language>` for details. 40 :ref:`4.0 migration guide <migration-4.0-inclusive-language>` for details.
41 41
42- New recipes: 42- New recipes:
43 43
44 - ``buildtools-docs-tarball`` 44 - ``buildtools-docs-tarball``
@@ -114,7 +114,7 @@ New Features / Enhancements in 4.0
114- BitBake enhancements: 114- BitBake enhancements:
115 115
116 - Fetcher enhancements: 116 - Fetcher enhancements:
117 117
118 - New :ref:`bitbake-user-manual/bitbake-user-manual-fetching:crate fetcher (\`\`crate://\`\`)` for Rust packages 118 - New :ref:`bitbake-user-manual/bitbake-user-manual-fetching:crate fetcher (\`\`crate://\`\`)` for Rust packages
119 - Added striplevel support to unpack 119 - Added striplevel support to unpack
120 - git: Add a warning asking users to set a branch in git urls 120 - git: Add a warning asking users to set a branch in git urls
@@ -127,7 +127,7 @@ New Features / Enhancements in 4.0
127 - ssh: now supports checkstatus, allows : in URLs (both required for use with sstate) and no longer requires username 127 - ssh: now supports checkstatus, allows : in URLs (both required for use with sstate) and no longer requires username
128 - wget: add redirectauth parameter 128 - wget: add redirectauth parameter
129 - wget: add 30s timeout for checkstatus calls 129 - wget: add 30s timeout for checkstatus calls
130 130
131 - Show warnings for append/prepend/remove operators combined with +=/.= 131 - Show warnings for append/prepend/remove operators combined with +=/.=
132 - Add bb.warnonce() and bb.erroronce() log methods 132 - Add bb.warnonce() and bb.erroronce() log methods
133 - Improved setscene task display 133 - Improved setscene task display
@@ -140,7 +140,7 @@ New Features / Enhancements in 4.0
140- Architecture-specific enhancements: 140- Architecture-specific enhancements:
141 141
142 - ARM: 142 - ARM:
143 143
144 - tune-cortexa72: Enable the crc extension by default for cortexa72 144 - tune-cortexa72: Enable the crc extension by default for cortexa72
145 - qemuarm64: Add tiny ktype to qemuarm64 bsp 145 - qemuarm64: Add tiny ktype to qemuarm64 bsp
146 - armv9a/tune: Add the support for the Neoverse N2 core 146 - armv9a/tune: Add the support for the Neoverse N2 core
@@ -163,7 +163,7 @@ New Features / Enhancements in 4.0
163 - linux-yocto-dev: add qemuriscv32 163 - linux-yocto-dev: add qemuriscv32
164 - packagegroup-core-tools-profile: Enable systemtap for riscv64 164 - packagegroup-core-tools-profile: Enable systemtap for riscv64
165 - qemuriscv: Use virtio-tablet-pci for mouse 165 - qemuriscv: Use virtio-tablet-pci for mouse
166 166
167 - x86: 167 - x86:
168 168
169 - kernel-yocto: conditionally enable stack protection checking on x86-64 169 - kernel-yocto: conditionally enable stack protection checking on x86-64
@@ -199,7 +199,7 @@ New Features / Enhancements in 4.0
199- yocto-check-layer: improved README checks 199- yocto-check-layer: improved README checks
200- cve-check: add json output format 200- cve-check: add json output format
201- cve-check: add coverage statistics on recipes with/without CVEs 201- cve-check: add coverage statistics on recipes with/without CVEs
202- Added mirrors for kernel sources and uninative binaries on kernel.org 202- Added mirrors for kernel sources and uninative binaries on kernel.org
203- glibc and binutils recipes now use shallow mirror tarballs for faster fetching 203- glibc and binutils recipes now use shallow mirror tarballs for faster fetching
204- When patching fails, show more information on the fatal error 204- When patching fails, show more information on the fatal error
205 205
@@ -234,7 +234,7 @@ New Features / Enhancements in 4.0
234 - Detect more known licenses in Python code 234 - Detect more known licenses in Python code
235 - Move license md5sums data into CSV files 235 - Move license md5sums data into CSV files
236 - npm: Use README as license fallback 236 - npm: Use README as license fallback
237 237
238- SDK-related enhancements: 238- SDK-related enhancements:
239 239
240 - Extended recipes to :ref:`ref-classes-nativesdk`: ``cargo``, 240 - Extended recipes to :ref:`ref-classes-nativesdk`: ``cargo``,
@@ -244,7 +244,7 @@ New Features / Enhancements in 4.0
244 - Support creating per-toolchain cmake file in SDK 244 - Support creating per-toolchain cmake file in SDK
245 245
246- Rust enhancements: 246- Rust enhancements:
247 247
248 - New python_setuptools3_rust class to enable building python extensions in Rust 248 - New python_setuptools3_rust class to enable building python extensions in Rust
249 - classes/meson: Add optional rust definitions 249 - classes/meson: Add optional rust definitions
250 250
@@ -337,37 +337,37 @@ Other license-related notes:
337Security Fixes in 4.0 337Security Fixes in 4.0
338~~~~~~~~~~~~~~~~~~~~~ 338~~~~~~~~~~~~~~~~~~~~~
339 339
340- binutils: :cve:`2021-42574`, :cve:`2021-45078` 340- binutils: :cve_nist:`2021-42574`, :cve_nist:`2021-45078`
341- curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947` 341- curl: :cve_nist:`2021-22945`, :cve_nist:`2021-22946`, :cve_nist:`2021-22947`
342- epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088` 342- epiphany: :cve_nist:`2021-45085`, :cve_nist:`2021-45086`, :cve_nist:`2021-45087`, :cve_nist:`2021-45088`
343- expat: :cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve:`2022-22825`, :cve:`2022-22826`, :cve:`2022-22827`, :cve:`2022-23852`, :cve:`2022-23990`, :cve:`2022-25235`, :cve:`2022-25236`, :cve:`2022-25313`, :cve:`2022-25314`, :cve:`2022-25315` 343- expat: :cve_nist:`2021-45960`, :cve_nist:`2021-46143`, :cve_nist:`2022-22822`, :cve_nist:`2022-22823`, :cve_nist:`2022-22824`, :cve_nist:`2022-22825`, :cve_nist:`2022-22826`, :cve_nist:`2022-22827`, :cve_nist:`2022-23852`, :cve_nist:`2022-23990`, :cve_nist:`2022-25235`, :cve_nist:`2022-25236`, :cve_nist:`2022-25313`, :cve_nist:`2022-25314`, :cve_nist:`2022-25315`
344- ffmpeg: :cve:`2021-38114` 344- ffmpeg: :cve_nist:`2021-38114`
345- gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765` 345- gcc: :cve_nist:`2021-35465`, :cve_nist:`2021-42574`, :cve_nist:`2021-46195`, :cve_nist:`2022-24765`
346- glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219` 346- glibc: :cve_nist:`2021-3998`, :cve_nist:`2021-3999`, :cve_nist:`2021-43396`, :cve_nist:`2022-23218`, :cve_nist:`2022-23219`
347- gmp: :cve:`2021-43618` 347- gmp: :cve_nist:`2021-43618`
348- go: :cve:`2021-41771` and :cve:`2021-41772` 348- go: :cve_nist:`2021-41771` and :cve_nist:`2021-41772`
349- grub2: :cve:`2021-3981` 349- grub2: :cve_nist:`2021-3981`
350- gzip: :cve:`2022-1271` 350- gzip: :cve_nist:`2022-1271`
351- libarchive : :cve:`2021-31566`, :cve:`2021-36976` 351- libarchive : :cve_nist:`2021-31566`, :cve_nist:`2021-36976`
352- libxml2: :cve:`2022-23308` 352- libxml2: :cve_nist:`2022-23308`
353- libxslt: :cve:`2021-30560` 353- libxslt: :cve_nist:`2021-30560`
354- lighttpd: :cve:`2022-22707` 354- lighttpd: :cve_nist:`2022-22707`
355- linux-yocto/5.10: amdgpu: :cve:`2021-42327` 355- linux-yocto/5.10: amdgpu: :cve_nist:`2021-42327`
356- lua: :cve:`2021-43396` 356- lua: :cve_nist:`2021-43396`
357- openssl: :cve:`2021-4044`, :cve:`2022-0778` 357- openssl: :cve_nist:`2021-4044`, :cve_nist:`2022-0778`
358- qemu: :cve:`2022-1050`, :cve:`2022-26353`, :cve:`2022-26354` 358- qemu: :cve_nist:`2022-1050`, :cve_nist:`2022-26353`, :cve_nist:`2022-26354`
359- rpm: :cve:`2021-3521` 359- rpm: :cve_nist:`2021-3521`
360- seatd: :cve:`2022-25643` 360- seatd: :cve_nist:`2022-25643`
361- speex: :cve:`2020-23903` 361- speex: :cve_nist:`2020-23903`
362- squashfs-tools: :cve:`2021-41072` 362- squashfs-tools: :cve_nist:`2021-41072`
363- systemd: :cve:`2021-4034` 363- systemd: :cve_nist:`2021-4034`
364- tiff: :cve:`2022-0561`, :cve:`2022-0562`, :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909`, :cve:`2022-0924`, :cve:`2022-1056`, :cve:`2022-22844` 364- tiff: :cve_nist:`2022-0561`, :cve_nist:`2022-0562`, :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909`, :cve_nist:`2022-0924`, :cve_nist:`2022-1056`, :cve_nist:`2022-22844`
365- unzip: :cve:`2021-4217` 365- unzip: :cve_nist:`2021-4217`
366- vim: :cve:`2021-3796`, :cve:`2021-3872`, :cve:`2021-3875`, :cve:`2021-3927`, :cve:`2021-3928`, :cve:`2021-3968`, :cve:`2021-3973`, :cve:`2021-4187`, :cve:`2022-0128`, :cve:`2022-0156`, :cve:`2022-0158`, :cve:`2022-0261`, :cve:`2022-0318`, :cve:`2022-0319`, :cve:`2022-0554`, :cve:`2022-0696`, :cve:`2022-0714`, :cve:`2022-0729`, :cve:`2022-0943` 366- vim: :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, :cve_nist:`2021-3875`, :cve_nist:`2021-3927`, :cve_nist:`2021-3928`, :cve_nist:`2021-3968`, :cve_nist:`2021-3973`, :cve_nist:`2021-4187`, :cve_nist:`2022-0128`, :cve_nist:`2022-0156`, :cve_nist:`2022-0158`, :cve_nist:`2022-0261`, :cve_nist:`2022-0318`, :cve_nist:`2022-0319`, :cve_nist:`2022-0554`, :cve_nist:`2022-0696`, :cve_nist:`2022-0714`, :cve_nist:`2022-0729`, :cve_nist:`2022-0943`
367- virglrenderer: :cve:`2022-0135`, :cve:`2022-0175` 367- virglrenderer: :cve_nist:`2022-0135`, :cve_nist:`2022-0175`
368- webkitgtk: :cve:`2022-22589`, :cve:`2022-22590`, :cve:`2022-22592` 368- webkitgtk: :cve_nist:`2022-22589`, :cve_nist:`2022-22590`, :cve_nist:`2022-22592`
369- xz: :cve:`2022-1271` 369- xz: :cve_nist:`2022-1271`
370- zlib: :cve:`2018-25032` 370- zlib: :cve_nist:`2018-25032`
371 371
372 372
373 373