summaryrefslogtreecommitdiffstats
path: root/documentation/migration-guides
diff options
context:
space:
mode:
Diffstat (limited to 'documentation/migration-guides')
-rw-r--r--documentation/migration-guides/index.rst3
-rw-r--r--documentation/migration-guides/migration-1.5.rst4
-rw-r--r--documentation/migration-guides/migration-1.6.rst2
-rw-r--r--documentation/migration-guides/migration-2.1.rst2
-rw-r--r--documentation/migration-guides/migration-4.0.rst20
-rw-r--r--documentation/migration-guides/migration-4.2.rst2
-rw-r--r--documentation/migration-guides/migration-5.0.rst101
-rw-r--r--documentation/migration-guides/migration-5.1.rst216
-rw-r--r--documentation/migration-guides/migration-5.2.rst297
-rw-r--r--documentation/migration-guides/migration-5.3.rst160
-rw-r--r--documentation/migration-guides/release-4.0.rst10
-rw-r--r--documentation/migration-guides/release-4.3.rst1
-rw-r--r--documentation/migration-guides/release-5.0.rst10
-rw-r--r--documentation/migration-guides/release-5.1.rst13
-rw-r--r--documentation/migration-guides/release-5.2.rst10
-rw-r--r--documentation/migration-guides/release-5.3.rst9
-rw-r--r--documentation/migration-guides/release-notes-3.4.1.rst14
-rw-r--r--documentation/migration-guides/release-notes-3.4.2.rst40
-rw-r--r--documentation/migration-guides/release-notes-3.4.3.rst10
-rw-r--r--documentation/migration-guides/release-notes-3.4.4.rst6
-rw-r--r--documentation/migration-guides/release-notes-3.4.rst56
-rw-r--r--documentation/migration-guides/release-notes-4.0.1.rst10
-rw-r--r--documentation/migration-guides/release-notes-4.0.10.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.11.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.0.12.rst48
-rw-r--r--documentation/migration-guides/release-notes-4.0.13.rst68
-rw-r--r--documentation/migration-guides/release-notes-4.0.14.rst56
-rw-r--r--documentation/migration-guides/release-notes-4.0.15.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.0.16.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.0.17.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.18.rst191
-rw-r--r--documentation/migration-guides/release-notes-4.0.19.rst159
-rw-r--r--documentation/migration-guides/release-notes-4.0.2.rst14
-rw-r--r--documentation/migration-guides/release-notes-4.0.20.rst130
-rw-r--r--documentation/migration-guides/release-notes-4.0.21.rst166
-rw-r--r--documentation/migration-guides/release-notes-4.0.22.rst196
-rw-r--r--documentation/migration-guides/release-notes-4.0.23.rst209
-rw-r--r--documentation/migration-guides/release-notes-4.0.24.rst383
-rw-r--r--documentation/migration-guides/release-notes-4.0.25.rst167
-rw-r--r--documentation/migration-guides/release-notes-4.0.26.rst263
-rw-r--r--documentation/migration-guides/release-notes-4.0.27.rst153
-rw-r--r--documentation/migration-guides/release-notes-4.0.3.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.0.4.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.0.5.rst12
-rw-r--r--documentation/migration-guides/release-notes-4.0.6.rst44
-rw-r--r--documentation/migration-guides/release-notes-4.0.7.rst40
-rw-r--r--documentation/migration-guides/release-notes-4.0.8.rst20
-rw-r--r--documentation/migration-guides/release-notes-4.0.9.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.rst80
-rw-r--r--documentation/migration-guides/release-notes-4.1.1.rst22
-rw-r--r--documentation/migration-guides/release-notes-4.1.2.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.1.3.rst36
-rw-r--r--documentation/migration-guides/release-notes-4.1.4.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.1.rst60
-rw-r--r--documentation/migration-guides/release-notes-4.2.1.rst14
-rw-r--r--documentation/migration-guides/release-notes-4.2.2.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.2.3.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.2.4.rst72
-rw-r--r--documentation/migration-guides/release-notes-4.2.rst70
-rw-r--r--documentation/migration-guides/release-notes-4.3.1.rst16
-rw-r--r--documentation/migration-guides/release-notes-4.3.2.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.3.3.rst22
-rw-r--r--documentation/migration-guides/release-notes-4.3.4.rst206
-rw-r--r--documentation/migration-guides/release-notes-4.3.rst86
-rw-r--r--documentation/migration-guides/release-notes-5.0.1.rst134
-rw-r--r--documentation/migration-guides/release-notes-5.0.10.rst208
-rw-r--r--documentation/migration-guides/release-notes-5.0.2.rst245
-rw-r--r--documentation/migration-guides/release-notes-5.0.3.rst314
-rw-r--r--documentation/migration-guides/release-notes-5.0.4.rst212
-rw-r--r--documentation/migration-guides/release-notes-5.0.5.rst227
-rw-r--r--documentation/migration-guides/release-notes-5.0.6.rst223
-rw-r--r--documentation/migration-guides/release-notes-5.0.7.rst331
-rw-r--r--documentation/migration-guides/release-notes-5.0.8.rst226
-rw-r--r--documentation/migration-guides/release-notes-5.0.9.rst206
-rw-r--r--documentation/migration-guides/release-notes-5.0.rst931
-rw-r--r--documentation/migration-guides/release-notes-5.1.1.rst289
-rw-r--r--documentation/migration-guides/release-notes-5.1.2.rst312
-rw-r--r--documentation/migration-guides/release-notes-5.1.3.rst160
-rw-r--r--documentation/migration-guides/release-notes-5.1.4.rst137
-rw-r--r--documentation/migration-guides/release-notes-5.1.rst1076
-rw-r--r--documentation/migration-guides/release-notes-5.2.1.rst161
-rw-r--r--documentation/migration-guides/release-notes-5.2.rst2300
-rw-r--r--documentation/migration-guides/release-notes-5.3.rst126
83 files changed, 11547 insertions, 684 deletions
diff --git a/documentation/migration-guides/index.rst b/documentation/migration-guides/index.rst
index d8edd05b89..81227ad569 100644
--- a/documentation/migration-guides/index.rst
+++ b/documentation/migration-guides/index.rst
@@ -12,6 +12,9 @@ to move to one release of the Yocto Project from the previous one.
12.. toctree:: 12.. toctree::
13 13
14 migration-general 14 migration-general
15 release-5.3
16 release-5.2
17 release-5.1
15 release-5.0 18 release-5.0
16 release-4.3 19 release-4.3
17 release-4.2 20 release-4.2
diff --git a/documentation/migration-guides/migration-1.5.rst b/documentation/migration-guides/migration-1.5.rst
index c8f3cbc165..da26cca63d 100644
--- a/documentation/migration-guides/migration-1.5.rst
+++ b/documentation/migration-guides/migration-1.5.rst
@@ -248,8 +248,8 @@ A new automated image testing framework has been added through the
248framework replaces the older ``imagetest-qemu`` framework. 248framework replaces the older ``imagetest-qemu`` framework.
249 249
250You can learn more about performing automated image tests in the 250You can learn more about performing automated image tests in the
251":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 251":ref:`test-manual/runtime-testing:performing automated runtime testing`"
252section in the Yocto Project Development Tasks Manual. 252section in the Yocto Project Test Environment Manual.
253 253
254.. _migration-1.5-build-history: 254.. _migration-1.5-build-history:
255 255
diff --git a/documentation/migration-guides/migration-1.6.rst b/documentation/migration-guides/migration-1.6.rst
index 916169e836..b052a43a31 100644
--- a/documentation/migration-guides/migration-1.6.rst
+++ b/documentation/migration-guides/migration-1.6.rst
@@ -221,7 +221,7 @@ Package Test (ptest)
221 221
222Package Tests (ptest) are built but not installed by default. For 222Package Tests (ptest) are built but not installed by default. For
223information on using Package Tests, see the 223information on using Package Tests, see the
224":ref:`dev-manual/packages:testing packages with ptest`" section in the 224":ref:`test-manual/ptest:testing packages with ptest`" section in the
225Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`" 225Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`"
226section. 226section.
227 227
diff --git a/documentation/migration-guides/migration-2.1.rst b/documentation/migration-guides/migration-2.1.rst
index 18b05b52cc..4d7aa15af5 100644
--- a/documentation/migration-guides/migration-2.1.rst
+++ b/documentation/migration-guides/migration-2.1.rst
@@ -382,7 +382,7 @@ These additional changes exist:
382 removed at runtime). 382 removed at runtime).
383 383
384- The 384- The
385 :ref:`devtool modify <sdk-manual/extensible:use \`\`devtool modify\`\` to modify the source of an existing component>` 385 :ref:`devtool modify <dev-manual/devtool:use \`\`devtool modify\`\` to modify the source of an existing component>`
386 command now defaults to extracting the source since that is most 386 command now defaults to extracting the source since that is most
387 commonly expected. The ``-x`` or ``--extract`` options are now no-ops. If 387 commonly expected. The ``-x`` or ``--extract`` options are now no-ops. If
388 you wish to provide your own existing source tree, you will now need 388 you wish to provide your own existing source tree, you will now need
diff --git a/documentation/migration-guides/migration-4.0.rst b/documentation/migration-guides/migration-4.0.rst
index b5bd57c312..0e9e741458 100644
--- a/documentation/migration-guides/migration-4.0.rst
+++ b/documentation/migration-guides/migration-4.0.rst
@@ -68,7 +68,7 @@ changes and you need to review them before committing. An example warning
68looks like:: 68looks like::
69 69
70 poky/scripts/lib/devtool/upgrade.py needs further work at line 275 since it contains abort 70 poky/scripts/lib/devtool/upgrade.py needs further work at line 275 since it contains abort
71 71
72Fetching changes 72Fetching changes
73~~~~~~~~~~~~~~~~ 73~~~~~~~~~~~~~~~~
74 74
@@ -111,7 +111,7 @@ License changes
111 If they do not, by default a warning will be shown. A 111 If they do not, by default a warning will be shown. A
112 :oe_git:`convert-spdx-licenses.py </openembedded-core/tree/scripts/contrib/convert-spdx-licenses.py>` 112 :oe_git:`convert-spdx-licenses.py </openembedded-core/tree/scripts/contrib/convert-spdx-licenses.py>`
113 script can be used to update your recipes. 113 script can be used to update your recipes.
114 114
115- :term:`INCOMPATIBLE_LICENSE` should now use `SPDX identifiers <https://spdx.org/licenses/>`__. 115- :term:`INCOMPATIBLE_LICENSE` should now use `SPDX identifiers <https://spdx.org/licenses/>`__.
116 Additionally, wildcarding is now limited to specifically supported values - 116 Additionally, wildcarding is now limited to specifically supported values -
117 see the :term:`INCOMPATIBLE_LICENSE` documentation for further information. 117 see the :term:`INCOMPATIBLE_LICENSE` documentation for further information.
@@ -121,7 +121,7 @@ License changes
121 which can cause signature issues for users. In addition the ``available_licenses()`` 121 which can cause signature issues for users. In addition the ``available_licenses()``
122 function has been removed from the :ref:`ref-classes-license` class as 122 function has been removed from the :ref:`ref-classes-license` class as
123 it is no longer needed. 123 it is no longer needed.
124 124
125Removed recipes 125Removed recipes
126~~~~~~~~~~~~~~~ 126~~~~~~~~~~~~~~~
127 127
@@ -136,11 +136,11 @@ The following recipes have been removed in this release:
136 136
137Python changes 137Python changes
138~~~~~~~~~~~~~~ 138~~~~~~~~~~~~~~
139 139
140- ``distutils`` has been deprecated upstream in Python 3.10 and thus the ``distutils*`` 140- ``distutils`` has been deprecated upstream in Python 3.10 and thus the ``distutils*``
141 classes have been moved to ``meta-python``. Recipes that inherit the ``distutils*`` 141 classes have been moved to ``meta-python``. Recipes that inherit the ``distutils*``
142 classes should be updated to inherit ``setuptools*`` equivalents instead. 142 classes should be updated to inherit ``setuptools*`` equivalents instead.
143 143
144- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__. 144- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__.
145 The new Python packaging classes that should be used are 145 The new Python packaging classes that should be used are
146 :ref:`ref-classes-python_flit_core`, :ref:`ref-classes-python_setuptools_build_meta` 146 :ref:`ref-classes-python_flit_core`, :ref:`ref-classes-python_setuptools_build_meta`
@@ -159,7 +159,7 @@ Prelink removed
159Prelink has been dropped by ``glibc`` upstream in 2.36. It already caused issues with 159Prelink has been dropped by ``glibc`` upstream in 2.36. It already caused issues with
160binary corruption, has a number of open bugs and is of questionable benefit 160binary corruption, has a number of open bugs and is of questionable benefit
161without disabling load address randomization and PIE executables. 161without disabling load address randomization and PIE executables.
162 162
163We disabled prelinking by default in the honister (3.4) release, but left it able 163We disabled prelinking by default in the honister (3.4) release, but left it able
164to be enabled if desired. However, without glibc support it cannot be maintained 164to be enabled if desired. However, without glibc support it cannot be maintained
165any further, so all of the prelinking functionality has been removed in this release. 165any further, so all of the prelinking functionality has been removed in this release.
@@ -170,7 +170,7 @@ reference(s).
170Reproducible as standard 170Reproducible as standard
171~~~~~~~~~~~~~~~~~~~~~~~~ 171~~~~~~~~~~~~~~~~~~~~~~~~
172 172
173Reproducibility is now considered as standard functionality, thus the 173Reproducibility is now considered as standard functionality, thus the
174``reproducible`` class has been removed and its previous contents merged into the 174``reproducible`` class has been removed and its previous contents merged into the
175:ref:`ref-classes-base` class. If you have references in your configuration to 175:ref:`ref-classes-base` class. If you have references in your configuration to
176``reproducible`` in :term:`INHERIT`, :term:`USER_CLASSES` etc. then they should be 176``reproducible`` in :term:`INHERIT`, :term:`USER_CLASSES` etc. then they should be
@@ -212,7 +212,7 @@ and :ref:`bitbake-user-manual/bitbake-user-manual-metadata:removal (override sty
212 212
213Miscellaneous changes 213Miscellaneous changes
214~~~~~~~~~~~~~~~~~~~~~ 214~~~~~~~~~~~~~~~~~~~~~
215 215
216- ``blacklist.bbclass`` is removed and the functionality moved to the 216- ``blacklist.bbclass`` is removed and the functionality moved to the
217 :ref:`ref-classes-base` class with a more descriptive 217 :ref:`ref-classes-base` class with a more descriptive
218 ``varflag`` variable named :term:`SKIP_RECIPE` which will use the `bb.parse.SkipRecipe()` 218 ``varflag`` variable named :term:`SKIP_RECIPE` which will use the `bb.parse.SkipRecipe()`
@@ -252,7 +252,7 @@ Miscellaneous changes
252- The ``cortexa72-crc`` and ``cortexa72-crc-crypto`` tunes have been removed since 252- The ``cortexa72-crc`` and ``cortexa72-crc-crypto`` tunes have been removed since
253 the crc extension is now enabled by default for cortexa72. Replace any references to 253 the crc extension is now enabled by default for cortexa72. Replace any references to
254 these with ``cortexa72`` and ``cortexa72-crypto`` respectively. 254 these with ``cortexa72`` and ``cortexa72-crypto`` respectively.
255 255
256- The Python development shell (previously known as ``devpyshell``) feature has been 256- The Python development shell (previously known as ``devpyshell``) feature has been
257 renamed to ``pydevshell``. To start it you should now run:: 257 renamed to ``pydevshell``. To start it you should now run::
258 258
@@ -261,7 +261,7 @@ Miscellaneous changes
261- The ``packagegroups-core-full-cmdline-libs`` packagegroup is no longer produced, as 261- The ``packagegroups-core-full-cmdline-libs`` packagegroup is no longer produced, as
262 libraries should normally be brought in via dependencies. If you have any references 262 libraries should normally be brought in via dependencies. If you have any references
263 to this then remove them. 263 to this then remove them.
264 264
265- The :term:`TOPDIR` variable and the current working directory are no longer modified 265- The :term:`TOPDIR` variable and the current working directory are no longer modified
266 when parsing recipes. Any code depending on the previous behaviour will no longer 266 when parsing recipes. Any code depending on the previous behaviour will no longer
267 work - change any such code to explicitly use appropriate path variables instead. 267 work - change any such code to explicitly use appropriate path variables instead.
diff --git a/documentation/migration-guides/migration-4.2.rst b/documentation/migration-guides/migration-4.2.rst
index 1db6fbca42..f5f12c8871 100644
--- a/documentation/migration-guides/migration-4.2.rst
+++ b/documentation/migration-guides/migration-4.2.rst
@@ -121,7 +121,7 @@ Removed variables
121The following variables have been removed: 121The following variables have been removed:
122 122
123- ``SERIAL_CONSOLE``, deprecated since version 2.6, replaced by :term:`SERIAL_CONSOLES`. 123- ``SERIAL_CONSOLE``, deprecated since version 2.6, replaced by :term:`SERIAL_CONSOLES`.
124- ``PACKAGEBUILDPKGD``, a mostly internal variable in the ref:`ref-classes-package` 124- ``PACKAGEBUILDPKGD``, a mostly internal variable in the :ref:`ref-classes-package`
125 class was rarely used to customise packaging. If you were using this in your custom 125 class was rarely used to customise packaging. If you were using this in your custom
126 recipes or bbappends, you will need to switch to using :term:`PACKAGE_PREPROCESS_FUNCS` 126 recipes or bbappends, you will need to switch to using :term:`PACKAGE_PREPROCESS_FUNCS`
127 or :term:`PACKAGESPLITFUNCS` instead. 127 or :term:`PACKAGESPLITFUNCS` instead.
diff --git a/documentation/migration-guides/migration-5.0.rst b/documentation/migration-guides/migration-5.0.rst
index 32581d750b..cf413300c2 100644
--- a/documentation/migration-guides/migration-5.0.rst
+++ b/documentation/migration-guides/migration-5.0.rst
@@ -52,11 +52,21 @@ See :ref:`all supported distributions <system-requirements-supported-distros>`.
52Go language changes 52Go language changes
53~~~~~~~~~~~~~~~~~~~ 53~~~~~~~~~~~~~~~~~~~
54 54
55The ``linkmode`` flag was dropped from ``GO_LDFLAGS`` for ``nativesdk`` and
56``cross-canadian``. Also, dynamic linking was disabled for the whole set of
57(previously) supported architectures in the ``goarch`` class.
58
55.. _migration-5.0-systemd-changes: 59.. _migration-5.0-systemd-changes:
56 60
57systemd changes 61systemd changes
58~~~~~~~~~~~~~~~ 62~~~~~~~~~~~~~~~
59 63
64Systemd's nss-resolve plugin is now supported and can be added via the
65``nss-resolve`` :term:`PACKAGECONFIG` option , which is from now on required
66(along with ``resolved``) by the ``systemd-resolved`` feature. Related to that
67(i.e., Systemd's network name resolution), an option to use ``stub-resolv.conf``
68was added as well.
69
60.. _migration-5.0-recipe-changes: 70.. _migration-5.0-recipe-changes:
61 71
62Recipe changes 72Recipe changes
@@ -70,7 +80,8 @@ Recipe changes
70Deprecated variables 80Deprecated variables
71~~~~~~~~~~~~~~~~~~~~ 81~~~~~~~~~~~~~~~~~~~~
72 82
73The following variables have been deprecated: 83- ``CVE_CHECK_IGNORE`` should be replaced with :term:`CVE_STATUS`
84
74 85
75.. _migration-5.0-removed-variables: 86.. _migration-5.0-removed-variables:
76 87
@@ -79,6 +90,15 @@ Removed variables
79 90
80The following variables have been removed: 91The following variables have been removed:
81 92
93- ``DEPLOY_DIR_TAR``: no longer needed since the package_tar class was removed in 4.2.
94- ``PYTHON_PN``: Python 2 has previously been removed, leaving Python 3 as the sole
95 major version. Therefore, this abstraction to differentiate both versions is
96 no longer needed.
97- ``oldincludedir``
98- ``USE_L10N``: previously deprecated, and now removed.
99- ``CVE_SOCKET_TIMEOUT``
100- ``SERIAL_CONSOLES_CHECK`` - use :term:`SERIAL_CONSOLES` instead as all consoles specified in the latter are checked for their existence before a ``getty`` is started.
101
82.. _migration-5.0-removed-recipes: 102.. _migration-5.0-removed-recipes:
83 103
84Removed recipes 104Removed recipes
@@ -86,20 +106,97 @@ Removed recipes
86 106
87The following recipes have been removed in this release: 107The following recipes have been removed in this release:
88 108
109- ``libcroco``: deprecated and archived by the Gnome Project.
110- ``liberror-perl``: unmaintained and no longer needed - moved to meta-perl.
111- ``linux-yocto``: version 6.1 (version 6.6 provided instead).
112- ``systemtap-uprobes``: obsolete.
113- ``zvariant``: fails to build with newer Rust.
114
89.. _migration-5.0-removed-classes: 115.. _migration-5.0-removed-classes:
90 116
91Removed classes 117Removed classes
92~~~~~~~~~~~~~~~ 118~~~~~~~~~~~~~~~
93 119
94The following classes have been removed in this release: 120No classes have been removed in this release.
95 121
96.. _migration-5.0-qemu-changes: 122.. _migration-5.0-qemu-changes:
97 123
98QEMU changes 124QEMU changes
99~~~~~~~~~~~~ 125~~~~~~~~~~~~
100 126
127In ``tune-core2``, the cpu models ``n270`` and ``core2duo`` are no longer
128passed to QEMU, since its documentation recommends not using them with ``-cpu``
129option. Therefore, from now on, ``Nehalem`` model is used instead.
130
131
132ipk packaging changes
133~~~~~~~~~~~~~~~~~~~~~
134
135ipk packaging (using ``opkg``) now uses ``zstd`` compression instead of ``xz``
136for better compression and performance. This does mean that ``.ipk`` packages
137built using the 5.0 release requires Opkg built with zstd enabled --- naturally
138this is the case in 5.0, but at least by default these packages will not be
139usable on older systems where Opkg does not have zstd enabled at build time.
140
141Additionally, the internal dependency solver in Opkg is now deprecated --- it
142is still available in this release but will trigger a warning if selected.
143The default has been the external ``libsolv`` solver for some time, but if you
144have explicitly removed that from :term:`PACKAGECONFIG` for Opkg to
145select the internal solver, you should plan to switch to ``libsolv`` in the
146near future (by including ``libsolv`` your custom :term:`PACKAGECONFIG` value
147for Opkg, or reverting to the default value).
148
149
150motd message when using ``DISTRO = "poky"``
151~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
152
153The default ``poky`` :term:`DISTRO` is explicitly a *reference* distribution
154for testing and development purposes. It enables most hardware and software
155features so that they can be tested, but this also means that
156from a security point of view the attack surface is very large.
157
158We encourage anyone using the Yocto Project for production use to create
159their own distribution and not use Poky. To encourage this behaviour
160further, in 5.0 a warning has been added to ``/etc/motd`` when Poky is used
161so that the developer will see it when they log in. If you are creating your
162own distribution this message will not show up.
163
164For information on how to create your own distribution, see
165":ref:`dev-manual/custom-distribution:creating your own distribution`".
166
101.. _migration-5.0-misc-changes: 167.. _migration-5.0-misc-changes:
102 168
103Miscellaneous changes 169Miscellaneous changes
104~~~~~~~~~~~~~~~~~~~~~ 170~~~~~~~~~~~~~~~~~~~~~
105 171
172- ``bitbake-whatchanged`` script was removed as it was broken and unmaintained.
173
174- ``scripts/sstate-cache-management.sh`` has been replaced by
175 ``scripts/sstate-cache-management.py``, a more performant Python-based version.
176
177- The ``bmap-tools`` recipe has been renamed to ``bmaptool``.
178
179- ``gpgme`` has had Python binding support disabled since upstream does not
180 support Python 3.12 yet. This will be fixed in future once it is fixed upstream.)
181
182- A warning will now be shown if the ``virtual/`` prefix is used in runtime
183 contexts (:term:`RDEPENDS` / :term:`RPROVIDES`) ---
184 See :ref:`virtual-slash <qa-check-virtual-slash>` for details.
185
186- ``recipetool`` now prefixes the names of recipes created for Python modules
187 with ``python3-``.
188
189- The :ref:`ref-classes-cve-check` class no longer produces a warning for
190 remote patches --- it only logs a note and does not try to fetch the patch
191 in order to scan it for issues or CVE numbers. However, CVE number
192 references in remote patch file names will now be picked up.
193
194- The values of :term:`PE` and :term:`PR` have been dropped from
195 ``-f{file,macro,debug}-prefix-map``, in order to avoid unnecessary churn
196 in debugging symbol paths when the version is bumped. This is unlikely to
197 cause issues, but if you are paying attention to the debugging source path
198 (e.g. in recipes that need to manipulate these files during packaging) then
199 you will notice the difference. A new :term:`TARGET_DBGSRC_DIR` variable is
200 provided to make this easier.
201
202- ``ccache`` no longer supports FORTRAN.
diff --git a/documentation/migration-guides/migration-5.1.rst b/documentation/migration-guides/migration-5.1.rst
new file mode 100644
index 0000000000..94b527bdcb
--- /dev/null
+++ b/documentation/migration-guides/migration-5.1.rst
@@ -0,0 +1,216 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release 5.1 (styhead)
4=====================
5
6Migration notes for 5.1 (styhead)
7---------------------------------
8
9This section provides migration information for moving to the Yocto
10Project 5.1 Release (codename "styhead") from the prior release.
11
12.. _migration-5.1-workdir-changes:
13
14:term:`WORKDIR` changes
15~~~~~~~~~~~~~~~~~~~~~~~
16
17S = ${WORKDIR} no longer supported
18^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
19
20If a recipe has :term:`S` set to be :term:`WORKDIR`, this is no longer
21supported, and an error will be issued. The recipe should be changed to::
22
23 S = "${UNPACKDIR}"
24
25Any :term:`WORKDIR` references where files from :term:`SRC_URI` are referenced
26should be changed to :term:`S`. These are commonly in :ref:`ref-tasks-compile`,
27:ref:`ref-tasks-compile`, :ref:`ref-tasks-install` and :term:`LIC_FILES_CHKSUM`.
28
29:term:`WORKDIR` references in recipes
30^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
31
32:term:`WORKDIR` references in other recipes need auditing. If they reference
33files from :term:`SRC_URI`, they likely need changing to :term:`UNPACKDIR`.
34These are commonly in :ref:`ref-tasks-compile` and :ref:`ref-tasks-install`
35for things like service or configuration files. One unusual case is
36``${WORKDIR}/${BP}`` which should probably be set to ``${S}``.
37
38References to ``../`` in :term:`LIC_FILES_CHKSUM` or elsewhere may need changing
39to :term:`UNPACKDIR`. References to :term:`WORKDIR` in ``sed`` commands are
40usually left as they are.
41
42General notes
43^^^^^^^^^^^^^
44
45Files from :ref:`ref-tasks-unpack` now unpack to ``WORKDIR/sources-unpack/``
46rather than ``WORKDIR/``.
47
48If :term:`S` is set to a subdirectory under :term:`WORKDIR` and that
49subdirectory exists in ``sources-unpack`` after :ref:`ref-tasks-unpack` runs,
50it is moved to :term:`WORKDIR`. This means that ``S = "${WORKDIR}/${BP}"``,
51``S = "${WORKDIR}/git"`` and also deeper paths continue to work as expected
52without changes. We cannot use symlinks to do this as it breaks autotools
53based recipes. Keeping all sources under ``sources-unpack`` wasn't considered
54as it meant more invasive recipes changes. The key objective was separating the
55:ref:`ref-tasks-unpack` task output from :term:`WORKDIR`.
56
57Previously, :term:`S` was always created but after the recent changes it is no
58longer the case. This means the check in ``do_unpack_qa`` triggers where
59:term:`S` is not created by a recipe while it didn't happen before. This can
60require to add an :term:`S` definition to a recipe that only uses
61``file://`` :term:`SRC_URI` entries. To be consistent, the following pattern is
62recommended::
63
64 S = "${UNPACKDIR}"
65
66Building C files from :term:`UNPACKDIR` without setting :term:`S` to point at
67it does not work as the debug prefix mapping doesn't handle that.
68
69``devtool`` and ``recipetool`` have been updated to handle this and their
70support for ``S = WORKDIR`` and ``oe-local-files`` has been removed.
71
72.. _migration-5.1-supported-kernel-versions:
73
74Supported kernel versions
75~~~~~~~~~~~~~~~~~~~~~~~~~
76
77The :term:`OLDEST_KERNEL` setting is still "5.15" in this release, meaning that
78out the box, older kernels are not supported. See :ref:`4.3 migration notes
79<migration-4.3-supported-kernel-versions>` for details.
80
81.. _migration-5.1-supported-distributions:
82
83Supported distributions
84~~~~~~~~~~~~~~~~~~~~~~~
85
86Compared to the previous releases, running BitBake is supported on new
87GNU/Linux distributions:
88
89- Ubuntu 24.10
90- Fedora 40
91- OpenSUSE Leap 15.5
92- OpenSUSE Leap 15.6
93
94On the other hand, some earlier distributions are no longer supported:
95
96- Ubuntu 23.04
97
98See :ref:`all supported distributions <system-requirements-supported-distros>`.
99
100.. _migration-5.1-go-changes:
101
102Go language changes
103~~~~~~~~~~~~~~~~~~~
104
105- After dropping the custom :ref:`ref-tasks-unpack` from the
106 :ref:`ref-classes-go` class, go recipes should now add
107 ``destsuffix=${GO_SRCURI_DESTSUFFIX}`` to their :term:`SRC_URI` to extract
108 them in the appropriate path. An example would be::
109
110 SRC_URI = "git://go.googlesource.com/example;branch=master;protocol=https;destsuffix=${GO_SRCURI_DESTSUFFIX}"
111
112- Go modules are no longer compiled with ``--linkmode=external``.
113
114.. _migration-5.1-systemd-changes:
115
116systemd changes
117~~~~~~~~~~~~~~~
118
119- New :term:`PACKAGECONFIG` value ``bpf-framework`` used to pre-compile eBPFs
120 that are required for the systemd.resource-control features
121 ``RestrictFileSystems`` and ``RestrictNetworkInterfaces``.
122
123.. _migration-5.1-recipe-changes:
124
125Recipe changes
126~~~~~~~~~~~~~~
127
128- ``gobject-introspection``: the ``giscanner`` utility is now shipped as a
129 separate package in ``gobject-introspection-tools``.
130
131- ``perf`` no longer uses ``libnewt`` for compiling its TUI.
132
133- ``openssl``: do not build the test suite unless ptests are enabled.
134
135.. _migration-5.1-removed-variables:
136
137Removed variables
138~~~~~~~~~~~~~~~~~
139
140The following variables have been removed:
141
142- ``TCLIBCAPPEND`` is now removed as sharing :term:`TMPDIR` for multiple libc
143 providers has been supported for years.
144
145- ``VOLATILE_LOG_DIR``: :term:`FILESYSTEM_PERMS_TABLES` is now used instead.
146 By default, :term:`FILESYSTEM_PERMS_TABLES` now contains the value
147 ``files/fs-perms-volatile-log.txt``, which means that volatile log is
148 enabled. Users can disable the volatile log by removing the value
149 ``files/fs-perms-volatile-log.txt`` from :term:`FILESYSTEM_PERMS_TABLES`.
150
151- ``VOLATILE_TMP_DIR``: :term:`FILESYSTEM_PERMS_TABLES` is now used instead.
152 By default, :term:`FILESYSTEM_PERMS_TABLES` now contains the value
153 ``files/fs-perms-volatile-tmp.txt``, which means that volatile tmp is
154 enabled. Users can disable the volatile tmp by removing the value
155 ``files/fs-perms-volatile-tmp.txt`` from :term:`FILESYSTEM_PERMS_TABLES`.
156
157.. _migration-5.1-removed-recipes:
158
159Removed recipes
160~~~~~~~~~~~~~~~
161
162The following recipes have been removed in this release:
163
164- ``liba52``: superseded by ``ffmpeg``
165- ``libomxil``: recipe removed as its only consumer, the gstreamer omx plugin,
166 was removed and has not been developed for several years
167- ``libnewt``: moved to meta-oe
168- ``mpeg2dec``: inactive for 10 years and superseded by ``ffmpeg``
169- ``pytest-runner``: moved to meta-python
170- ``python3-importlib-metadata``: moved to meta-python
171- ``python3-pathlib2``: moved to meta-python
172- ``python3-py``: moved to meta-python
173- ``python3-rfc3986-validator``: moved to meta-python
174- ``python3-toml``: moved to meta-python
175- ``python3-tomli``: moved to meta-python
176- ``usbinit``: recipe was poorly named as it is a gadget Ethernet driver.
177 Gadget Ethernet is of questionable use now and usbinit isn't referenced/used
178 anywhere within OE-Core.
179
180
181.. _migration-5.1-removed-classes:
182
183Removed classes
184~~~~~~~~~~~~~~~
185
186The following classes have been removed in this release:
187
188- ``siteconfig``: removed as it was only used by ``ncurses`` and ``zlib`` and
189 adding minimal added-value for a considerable amount of added runtime.
190
191
192.. _migration-5.1-misc-changes:
193
194Miscellaneous changes
195~~~~~~~~~~~~~~~~~~~~~
196
197- `oe-selftest` now only rewrites environment variable paths that absolutely
198 point to builddir (i.e ``X=$BUILDDIR/conf/`` is still rewritten to point to
199 the `oe-selftest` ``conf/`` directory but not ``Y=$BUILDDIR/../bitbake/`` which
200 still point to the ``bitbake/`` directory)
201
202 For example (taken from :yocto_ab:`autobuilder <>` environment):
203 :term:`BB_LOGCONFIG` is set as:
204 ``BB_LOGCONFIG="${BUILDDIR}/../bitbake/contrib/autobuilderlog.json"``.
205 Note the relative path starting from the build directory to outside of it.
206 This path is not changed by `oe-selftest` anymore.
207
208 Environment variables containing relative paths from tested build directory
209 to outside of the original build directory may need to be updated as they
210 won't be changed by `oe-selftest`.
211
212- Several sanity checks from the :ref:`ref-classes-insane` class, such as
213 ``buildpaths``, have been promoted to errors instead of warnings.
214
215- The ``license-incompatible`` :term:`ERROR_QA` sanity check was renamed to
216 ``license-exception``.
diff --git a/documentation/migration-guides/migration-5.2.rst b/documentation/migration-guides/migration-5.2.rst
new file mode 100644
index 0000000000..77a11fe270
--- /dev/null
+++ b/documentation/migration-guides/migration-5.2.rst
@@ -0,0 +1,297 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3.. |yocto-codename| replace:: walnascar
4.. |yocto-ver| replace:: 5.2
5.. Note: anchors id below cannot contain substitutions so replace them with the
6 value of |yocto-ver| above.
7
8Release |yocto-ver| (|yocto-codename|)
9======================================
10
11Migration notes for |yocto-ver| (|yocto-codename|)
12--------------------------------------------------
13
14This section provides migration information for moving to the Yocto
15Project |yocto-ver| Release (codename "|yocto-codename|") from the prior release.
16
17``debug-tweaks`` removed from :term:`IMAGE_FEATURES`
18~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
19
20The ``debug-tweaks`` image feature is now removed because it was too vague about
21what it achieved: an image on which the ``root`` user can login without a
22password.
23
24To achieve the same result, the features previously added by ``debug-tweaks``
25should be manually added to the :term:`IMAGE_FEATURES` variable. These are:
26
27- ``allow-empty-password``
28- ``allow-root-login``
29- ``empty-root-password``
30- ``post-install-logging``
31
32Such a statement would be::
33
34 IMAGE_FEATURES += "allow-empty-password allow-root-login empty-root-password post-install-logging"
35
36See the list of available image features in the :ref:`ref-features-image`
37section of the Yocto Project Reference Manual.
38
39Supported kernel versions
40~~~~~~~~~~~~~~~~~~~~~~~~~
41
42The :term:`OLDEST_KERNEL` setting is 5.15 in this release, meaning that
43out the box, older kernels are not supported. See :ref:`4.3 migration notes
44<migration-4.3-supported-kernel-versions>` for details.
45
46Supported distributions
47~~~~~~~~~~~~~~~~~~~~~~~
48
49Compared to the previous releases, running BitBake is supported on new
50GNU/Linux distributions:
51
52- Fedora 41
53- CentOS Stream 9
54
55On the other hand, some earlier distributions are no longer supported:
56
57- CentOS Stream 8
58- Fedora 38
59- OpenSUSE Leap 15.4
60- Ubuntu 20.04
61
62See :ref:`all supported distributions <system-requirements-supported-distros>`.
63
64Rust language changes
65~~~~~~~~~~~~~~~~~~~~~
66
67- Recipes inheriting the :ref:`ref-classes-cargo` do not install libraries by
68 default anymore. This behavior can be controlled by the
69 :term:`CARGO_INSTALL_LIBRARIES` variable.
70
71systemd changes
72~~~~~~~~~~~~~~~
73
74- Support for ``split-usr`` and ``unmerged-usr`` are now removed after Systemd
75 was updated to version 255. This option allowed installing Systemd in a
76 system where directories such as ``/lib``, ``/sbin`` or ``/bin`` are *not*
77 merged into ``/usr``.
78
79 As a consequence, the ``systemd`` recipe no longer contains the ``usrmerge``
80 :term:`PACKAGECONFIG` option as it is now implied by default.
81
82- ``systemd.bbclass``: If a ``systemd`` service file had referred to other service
83 files by starting them via
84 `Also <https://www.freedesktop.org/software/systemd/man/latest/systemd.unit.html#Also=>`__,
85 the other service files were automatically added to the :term:`FILES` variable of
86 the same package. Example:
87
88 a.service contains::
89
90 [Install]
91 Also=b.service
92
93 If ``a.service`` is packaged in package ``A``, ``b.service`` was
94 automatically packaged into package ``A`` as well. This happened even if
95 ``b.service`` was explicitly added to package ``B`` using :term:`FILES` and
96 :term:`SYSTEMD_SERVICE` variables.
97 This prevented such services from being packaged into different packages.
98 Therefore, this automatic behavior has been removed for service files (but
99 not for socket files).
100 Now all service files must be explicitly added to :term:`FILES`.
101
102- Add ``create-log-dirs`` back to the configuration options. To enable
103 persistent logging a user can now set the "Storage" option of
104 ``journald.conf`` to "persistent". The ``/var/log/journal`` directory is now
105 used for logging instead of ``/run/log``.
106
107- If ``pni-names`` is not in the :term:`DISTRO_FEATURES`, the `Predictable
108 Network Interface names <https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/>`__
109 systemd feature will now be disabled. Previously the feature was still
110 enabled even if ``pni-names`` was not part of :term:`DISTRO_FEATURES`. Make
111 sure to add the feature to :term:`DISTRO_FEATURES` if you want to keep this
112 systemd behavior.
113
114Multiconfig changes
115~~~~~~~~~~~~~~~~~~~
116
117The value of :term:`BB_CURRENT_MC` was changed from ``default`` to an empty string
118for the default multiconfig configuration to avoid needing to map the values
119within BitBake. This was already not happening in some cases so this fixes
120some obscure bugs.
121
122Any logic based on :term:`BB_CURRENT_MC` equalling to ``default`` by default should
123be changed to be equal to an empty string.
124
125Virtual toolchain provider changes
126~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
127
128Support was added for virtual providers on a per-recipe basis for specific
129key toolchain providers listed in ``BB_VIRTUAL_RECIPE_PROVIDERS``. As part of
130that support, the ``cross`` providers were simplified to remove the triplet
131prefix (:term:`TARGET_PREFIX`, :term:`SDK_PREFIX` and :term:`HOST_PREFIX`) and
132generalise the naming. Here are examples of how references to these variables
133can be changed to use the new ``cross`` syntax::
134
135 virtual/${HOST_PREFIX}binutils -> virtual/cross-binutils
136 virtual/${TARGET_PREFIX}binutils -> virtual/cross-binutils
137
138 virtual/${HOST_PREFIX}gcc -> virtual/cross-cc
139 virtual/${TARGET_PREFIX}gcc -> virtual/cross-cc
140 virtual/${SDK_PREFIX}gcc -> virtual/nativesdk-cross-cc
141
142 virtual/${HOST_PREFIX}compilerlibs -> virtual/compilerlibs
143 virtual/${TARGET_PREFIX}compilerlibs -> virtual/compilerlibs
144 virtual/nativesdk-${SDK_PREFIX}compilerlibs -> virtual/nativesdk-compilerlibs
145
146 virtual/${TARGET_PREFIX}g++ -> virtual/cross-c++
147
148A :term:`PREFERRED_PROVIDER` assignment can be transformed as follows::
149
150 PREFERRED_PROVIDER_virtual/${TARGET_PREFIX}binutils -> PREFERRED_PROVIDER_virtual/cross-binutils
151 PREFERRED_PROVIDER_virtual/${SDK_PREFIX}binutils -> PREFERRED_PROVIDER_virtual/cross-binutils:class-nativesdk
152 PREFERRED_PROVIDER_virtual/${SDK_PREFIX}g++ -> PREFERRED_PROVIDER_virtual/nativesdk-cross-c++
153
154The above examples should cover most cases, but there might be situations where
155replacing is not as straightforward. For more examples, see the commit
156:oe_git:`"classes/recipes: Switch virtual/XXX-gcc to virtual/cross-cc (and
157c++/binutils)" </openembedded-core/commit/?id=4ccc3bc8266c>` in
158:term:`OpenEmbedded-Core (OE-Core)`.
159
160:ref:`ref-classes-autotools` changes
161~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
162
163- Changes to how ``aclocal`` is invoked means that ``ACLOCALDIR`` and
164 ``ACLOCALEXTRAPATH`` are no longer used.
165
166- Directories containing m4 files are no longer found automatically and
167 passed to ``autoreconf``. If a recipe fails to configure because it cannot
168 find m4 macros, then usually the solution is to set ``EXTRA_AUTORECONF += "-I
169 path/to/m4"`` in the recipe.
170
171- The :ref:`ref-classes-autotools` class now requires any recipe that inherits
172 the class to have a ``configure`` script. The configuration script location
173 is stored in the :term:`CONFIGURE_SCRIPT` variable. The
174 :ref:`ref-tasks-configure` task will fail if the script is missing.
175
176:term:`UBOOT_ENTRYPOINT` changes
177~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
178
179The :term:`UBOOT_ENTRYPOINT` variable should now be defined with a leading
180``0x`` to its value. For example, consider the following assignment::
181
182 UBOOT_ENTRYPOINT ?= "20008000"
183
184This should now be replaced by::
185
186 UBOOT_ENTRYPOINT ?= "0x20008000"
187
188
189Git fetcher: support for multiple revisions per URL removed
190~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
191
192The support for having multiple Git revisions per URL in :term:`SRC_URI` was
193removed from BitBake, which means the following syntax is not supported
194anymore::
195
196 SRC_URI = "git://some.host/somepath;bareclone=1;branch=branchX,branchY;name=nameX,nameY"
197 SRCREV_nameX = "xxxxxxxxxxxxxxxxxxxx"
198 SRCREV_nameY = "yyyyyyyyyyyyyyyyyyyy"
199
200This was rarely used in the core repositories because it would only ever make
201sense for bare clones (the ``bareclone=1`` :term:`SRC_URI` option) where recipes
202take care of the Git checkout. This removal simplifies the code logic in several
203places.
204
205If one of your recipes is using this mechanism, you can split the code source
206fetching into two separate entries::
207
208 SRC_URI = "git://some.host/somepath;bareclone=1;branch=branchX;name=nameX \
209 git://some.host/somepath;bareclone=1;branch=branchY;name=nameY"
210 SRCREV_nameX = "xxxxxxxxxxxxxxxxxxxx"
211 SRCREV_nameY = "yyyyyyyyyyyyyyyyyyyy"
212
213Git fetcher: Branch parameter now required in :term:`SRC_URI`
214~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
215
216The ``branch`` parameter is now required when specifying a Git repository in
217:term:`SRC_URI`, for example::
218
219 SRC_URI = "git://some.host/somepath;branch=branchX"
220
221A missing ``branch`` parameter used to produce a warning, and will now produce
222an error.
223
224Recipe changes
225~~~~~~~~~~~~~~
226
227- The ``libnss-mdns`` recipe is now renamed to ``avahi-libnss-mdns`` to avoid a
228 conflict with meta-networking.
229
230- :ref:`ref-classes-ptest` support for the ``valgrind`` recipe was removed, due
231 to regressions occurring after updating Glibc to 2.41.
232
233Removed variables
234~~~~~~~~~~~~~~~~~
235
236The following variables have been removed:
237
238- ``PACKAGE_SNAP_LIB_SYMLINKS``: related to an unmaintained and obsolete
239 "micro" :term:`distro <DISTRO>`.
240
241- ``SETUPTOOLS_INSTALL_ARGS``: obsolete and unused variable.
242
243- ``BB_DANGLINGAPPENDS_WARNONLY``: support for only warning the user when a
244 ``.bbappend`` file doesn't apply to the original recipe has been dropped. See
245 the :ref:`dev-manual/layers:Appending Other Layers Metadata With Your Layer`
246 section of the Yocto Project Development Tasks Manual for alternatives to
247 this variable.
248
249Removed recipes
250~~~~~~~~~~~~~~~
251
252The following recipes have been removed in this release:
253
254- ``liburi-perl``: moved to :oe_git:`meta-perl </meta-openembedded/tree/meta-perl>`.
255
256- ``python3-isodate``: moved to :oe_git:`meta-python </meta-openembedded/tree/meta-python>`.
257
258- ``python3-iniparse``: removed as there are no consumers of this recipe in
259 :oe_git:`openembedded-core </openembedded-core>` or :oe_git:`meta-openembedded </meta-openembedded>`.
260
261- ``blktool``: It was created in 2004 as an alternative to hdparm and never
262 updated since (while :wikipedia:`hdparm <Hdparm>` remains active).
263
264- ``cargo-c-native``: converted to a target recipe and renamed to ``cargo-c``.
265
266- ``libnss-mdns``: renamed to ``avahi-libnss-mdns``
267
268Removed classes
269~~~~~~~~~~~~~~~
270
271The following classes have been removed in this release:
272
273- ``migrate_localcount.bbclass``: obsolete class for which code was already
274 removed in 2012.
275
276Removed features
277~~~~~~~~~~~~~~~~
278
279- The ``ld-is-gold`` distro feature was removed from the
280 :term:`DISTRO_FEATURES`.
281
282Miscellaneous changes
283~~~~~~~~~~~~~~~~~~~~~
284
285- :term:`ZSTD_COMPRESSION_LEVEL` is now a plain integer number instead of a dash-prefixed
286 command-line option (e.g. it should be set to ``3`` rather than ``-3``).
287
288- Until now, the variable :term:`UBOOT_ENV` was processed both by the U-Boot
289 recipe and by the ``kernel-fitimage.bbclass``. However, adding a U-Boot
290 script to the kernel FIT image is a different and independent thing, which
291 also requires an independent variable.
292 Therefore, the :term:`UBOOT_ENV` is no longer handled by the
293 ``kernel-fitimage.bbclass``. There is a new variable :term:`FIT_UBOOT_ENV`
294 which should be used for adding a U-Boot script to a FIT image.
295
296- The ``devtool ide-sdk`` utility has been removed from the :doc:`eSDK
297 </sdk-manual/extensible>` (but remains available in the BitBake environment).
diff --git a/documentation/migration-guides/migration-5.3.rst b/documentation/migration-guides/migration-5.3.rst
new file mode 100644
index 0000000000..4d2e1763ce
--- /dev/null
+++ b/documentation/migration-guides/migration-5.3.rst
@@ -0,0 +1,160 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3.. |yocto-codename| replace:: whinlatter
4.. |yocto-ver| replace:: 5.3
5.. Note: anchors id below cannot contain substitutions so replace them with the
6 value of |yocto-ver| above.
7
8Release |yocto-ver| (|yocto-codename|)
9======================================
10
11Migration notes for |yocto-ver| (|yocto-codename|)
12--------------------------------------------------
13
14This section provides migration information for moving to the Yocto
15Project |yocto-ver| Release (codename "|yocto-codename|") from the prior release.
16
17:term:`WORKDIR` changes
18~~~~~~~~~~~~~~~~~~~~~~~
19
20``S = ${WORKDIR}/something`` no longer supported
21^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
22
23If a recipe has :term:`S` set to be ``${``\ :term:`WORKDIR`\ ``}/something``,
24this is no longer supported, and an error will be issued. The recipe should be
25changed to::
26
27 S = "${UNPACKDIR}/something"
28
29``S = ${WORKDIR}/git`` and ``S = ${UNPACKDIR}/git`` should be removed
30^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
31
32The Git fetcher now unpacks into the :term:`BB_GIT_DEFAULT_DESTSUFFIX` directory
33rather than the ``git/`` directory under :term:`UNPACKDIR`.
34:term:`BB_GIT_DEFAULT_DESTSUFFIX` is set in :term:`OpenEmbedded-Core
35(OE-Core)`'s :oe_git:`bitbake.conf
36</openembedded-core/tree/meta/conf/bitbake.conf>` to :term:`BP`.
37
38This location matches the default value of :term:`S` set by bitbake.conf, so :term:`S`
39setting in recipes can and should be removed.
40
41Note that when :term:`S` is set to a subdirectory of the git checkout, then it
42should be instead adjusted according to the previous point::
43
44 S = "${UNPACKDIR}/${BP}/something"
45
46Note that "git" as the source checkout location can be hardcoded
47in other places in recipes; when it's in :term:`SRC_URI`, replace with
48:term:`BB_GIT_DEFAULT_DESTSUFFIX`, otherwise replace with :term:`BP`.
49
50How to make those adjustments without tedious manual editing
51^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
52
53The following sed command can be used to remove S = "${WORKDIR}/git
54across a whole layer::
55
56 sed -i "/^S = \"\${WORKDIR}\/git\"/d" `find . -name *.bb -o -name *.inc -o -name *.bbclass`
57
58Then, the following command can tweak the remaining :term:`S` assignments to
59refer to :term:`UNPACKDIR` instead of :term:`WORKDIR`::
60
61 sed -i "s/^S = \"\${WORKDIR}\//S = \"\${UNPACKDIR}\//g" `find . -name *.bb -o -name *.inc -o -name *.bbclass`
62
63The first change can introduce a lot of consecutive empty lines, so those can be removed with::
64
65 sed -i -z -E 's/([ \t\f\v\r]*\n){3,}/\n\n/g' `find . -name *.bb -o -name *.inc`
66
67Supported kernel versions
68~~~~~~~~~~~~~~~~~~~~~~~~~
69
70The :term:`OLDEST_KERNEL` setting is XXX in this release, meaning that
71out the box, older kernels are not supported. See :ref:`4.3 migration notes
72<migration-4.3-supported-kernel-versions>` for details.
73
74Supported distributions
75~~~~~~~~~~~~~~~~~~~~~~~
76
77Compared to the previous releases, running BitBake is supported on new
78GNU/Linux distributions:
79
80- XXX
81
82On the other hand, some earlier distributions are no longer supported:
83
84- XXX
85
86See :ref:`all supported distributions <system-requirements-supported-distros>`.
87
88Rust language changes
89~~~~~~~~~~~~~~~~~~~~~
90
91systemd changes
92~~~~~~~~~~~~~~~
93
94Recipe changes
95~~~~~~~~~~~~~~
96
97Removed variables
98~~~~~~~~~~~~~~~~~
99
100The following variables have been removed:
101
102Removed recipes
103~~~~~~~~~~~~~~~
104
105The following recipes have been removed in this release:
106
107Removed classes
108~~~~~~~~~~~~~~~
109
110The following classes have been removed in this release:
111
112- ``kernel-fitimage.bbclass``: the class has been replaced by the
113 :ref:`ref-classes-kernel-fit-image` class. The new implementation resolves
114 the long-standing :yocto_bugs:`bug 12912</show_bug.cgi?id=12912>`.
115
116 If you are using the kernel FIT image support, you will need to:
117
118 #. Make sure to include ``kernel-fit-extra-artifacts`` in your :term:`KERNEL_CLASSES`
119 variable to ensure the required files are exposed to the :term:`DEPLOY_DIR_IMAGE`
120 directory::
121
122 KERNEL_CLASSES += "kernel-fit-extra-artifacts"
123
124 #. Use the specific FIT image recipe rather than the base kernel recipe.
125 For example, instead of::
126
127 bitbake linux-yocto
128
129 the FIT image is now build by::
130
131 bitbake linux-yocto-fitimage
132
133 For custom kernel recipes, creating a corresponding custom FIT image recipe
134 is usually a good approach.
135
136 #. If a FIT image is used as a replacement for the kernel image in the root
137 filesystem, add the following configuration to your machine configuration
138 file::
139
140 # Create and deploy the vmlinux artifact which gets included into the FIT image
141 KERNEL_CLASSES += "kernel-fit-extra-artifacts"
142
143 # Do not install the kernel image package
144 RRECOMMENDS:${KERNEL_PACKAGE_NAME}-base = ""
145 # Install the FIT image package
146 MACHINE_ESSENTIAL_EXTRA_RDEPENDS += "linux-yocto-fitimage"
147
148 # Configure the image.bbclass to depend on the FIT image instead of only
149 # the kernel to ensure the FIT image is built and deployed with the image
150 KERNEL_DEPLOY_DEPEND = "linux-yocto-fitimage:do_deploy"
151
152 See the :ref:`ref-classes-kernel-fit-image` section for more information.
153
154Removed features
155~~~~~~~~~~~~~~~~
156
157The following features have been removed in this release:
158
159Miscellaneous changes
160~~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-4.0.rst b/documentation/migration-guides/release-4.0.rst
index 685799e268..1053ec4c0b 100644
--- a/documentation/migration-guides/release-4.0.rst
+++ b/documentation/migration-guides/release-4.0.rst
@@ -24,3 +24,13 @@ Release 4.0 (kirkstone)
24 release-notes-4.0.15 24 release-notes-4.0.15
25 release-notes-4.0.16 25 release-notes-4.0.16
26 release-notes-4.0.17 26 release-notes-4.0.17
27 release-notes-4.0.18
28 release-notes-4.0.19
29 release-notes-4.0.20
30 release-notes-4.0.21
31 release-notes-4.0.22
32 release-notes-4.0.23
33 release-notes-4.0.24
34 release-notes-4.0.25
35 release-notes-4.0.26
36 release-notes-4.0.27
diff --git a/documentation/migration-guides/release-4.3.rst b/documentation/migration-guides/release-4.3.rst
index fa5653c467..1f07d229a7 100644
--- a/documentation/migration-guides/release-4.3.rst
+++ b/documentation/migration-guides/release-4.3.rst
@@ -10,3 +10,4 @@ Release 4.3 (nanbield)
10 release-notes-4.3.1 10 release-notes-4.3.1
11 release-notes-4.3.2 11 release-notes-4.3.2
12 release-notes-4.3.3 12 release-notes-4.3.3
13 release-notes-4.3.4
diff --git a/documentation/migration-guides/release-5.0.rst b/documentation/migration-guides/release-5.0.rst
index bd19b707f6..b3e7a67912 100644
--- a/documentation/migration-guides/release-5.0.rst
+++ b/documentation/migration-guides/release-5.0.rst
@@ -7,3 +7,13 @@ Release 5.0 (scarthgap)
7 7
8 migration-5.0 8 migration-5.0
9 release-notes-5.0 9 release-notes-5.0
10 release-notes-5.0.1
11 release-notes-5.0.2
12 release-notes-5.0.3
13 release-notes-5.0.4
14 release-notes-5.0.5
15 release-notes-5.0.6
16 release-notes-5.0.7
17 release-notes-5.0.8
18 release-notes-5.0.9
19 release-notes-5.0.10
diff --git a/documentation/migration-guides/release-5.1.rst b/documentation/migration-guides/release-5.1.rst
new file mode 100644
index 0000000000..820b918e00
--- /dev/null
+++ b/documentation/migration-guides/release-5.1.rst
@@ -0,0 +1,13 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release 5.1 (styhead)
4=======================
5
6.. toctree::
7
8 migration-5.1
9 release-notes-5.1
10 release-notes-5.1.1
11 release-notes-5.1.2
12 release-notes-5.1.3
13 release-notes-5.1.4
diff --git a/documentation/migration-guides/release-5.2.rst b/documentation/migration-guides/release-5.2.rst
new file mode 100644
index 0000000000..68c524c29d
--- /dev/null
+++ b/documentation/migration-guides/release-5.2.rst
@@ -0,0 +1,10 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release 5.2 (walnascar)
4=======================
5
6.. toctree::
7
8 migration-5.2
9 release-notes-5.2
10 release-notes-5.2.1
diff --git a/documentation/migration-guides/release-5.3.rst b/documentation/migration-guides/release-5.3.rst
new file mode 100644
index 0000000000..cbc4f13a7a
--- /dev/null
+++ b/documentation/migration-guides/release-5.3.rst
@@ -0,0 +1,9 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release 5.3 (whinlatter)
4========================
5
6.. toctree::
7
8 migration-5.3
9 release-notes-5.3
diff --git a/documentation/migration-guides/release-notes-3.4.1.rst b/documentation/migration-guides/release-notes-3.4.1.rst
index 097c249a90..c4b99a269b 100644
--- a/documentation/migration-guides/release-notes-3.4.1.rst
+++ b/documentation/migration-guides/release-notes-3.4.1.rst
@@ -11,14 +11,14 @@ Known Issues in 3.4.1
11Security Fixes in 3.4.1 11Security Fixes in 3.4.1
12~~~~~~~~~~~~~~~~~~~~~~~ 12~~~~~~~~~~~~~~~~~~~~~~~
13 13
14- glibc: Backport fix for :cve:`2021-43396` 14- glibc: Backport fix for :cve_nist:`2021-43396`
15- vim: add patch number to :cve:`2021-3778` patch 15- vim: add patch number to :cve_nist:`2021-3778` patch
16- vim: fix :cve:`2021-3796`, :cve:`2021-3872`, and :cve:`2021-3875` 16- vim: fix :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, and :cve_nist:`2021-3875`
17- squashfs-tools: follow-up fix for :cve:`2021-41072` 17- squashfs-tools: follow-up fix for :cve_nist:`2021-41072`
18- avahi: update CVE id fixed by local-ping.patch 18- avahi: update CVE id fixed by local-ping.patch
19- squashfs-tools: fix :cve:`2021-41072` 19- squashfs-tools: fix :cve_nist:`2021-41072`
20- ffmpeg: fix :cve:`2021-38114` 20- ffmpeg: fix :cve_nist:`2021-38114`
21- curl: fix :cve:`2021-22945`, :cve:`2021-22946` and :cve:`2021-22947` 21- curl: fix :cve_nist:`2021-22945`, :cve_nist:`2021-22946` and :cve_nist:`2021-22947`
22 22
23Fixes in 3.4.1 23Fixes in 3.4.1
24~~~~~~~~~~~~~~ 24~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.2.rst b/documentation/migration-guides/release-notes-3.4.2.rst
index 5ff42d3900..94dffcb79e 100644
--- a/documentation/migration-guides/release-notes-3.4.2.rst
+++ b/documentation/migration-guides/release-notes-3.4.2.rst
@@ -6,29 +6,29 @@ Release notes for 3.4.2 (honister)
6Security Fixes in 3.4.2 6Security Fixes in 3.4.2
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- tiff: backport fix for :cve:`2022-22844` 9- tiff: backport fix for :cve_nist:`2022-22844`
10- glibc : Fix :cve:`2021-3999` 10- glibc : Fix :cve_nist:`2021-3999`
11- glibc : Fix :cve:`2021-3998` 11- glibc : Fix :cve_nist:`2021-3998`
12- glibc : Fix :cve:`2022-23219` 12- glibc : Fix :cve_nist:`2022-23219`
13- glibc : Fix :cve:`2022-23218` 13- glibc : Fix :cve_nist:`2022-23218`
14- lighttpd: backport a fix for :cve:`2022-22707` 14- lighttpd: backport a fix for :cve_nist:`2022-22707`
15- speex: fix :cve:`2020-23903` 15- speex: fix :cve_nist:`2020-23903`
16- linux-yocto/5.10: amdgpu: updates for :cve:`2021-42327` 16- linux-yocto/5.10: amdgpu: updates for :cve_nist:`2021-42327`
17- libsndfile1: fix :cve:`2021-4156` 17- libsndfile1: fix :cve_nist:`2021-4156`
18- xserver-xorg: whitelist two CVEs 18- xserver-xorg: whitelist two CVEs
19- grub2: fix :cve:`2021-3981` 19- grub2: fix :cve_nist:`2021-3981`
20- xserver-xorg: update :term:`CVE_PRODUCT` 20- xserver-xorg: update :term:`CVE_PRODUCT`
21- binutils: :cve:`2021-42574` 21- binutils: :cve_nist:`2021-42574`
22- gcc: Fix :cve:`2021-42574` 22- gcc: Fix :cve_nist:`2021-42574`
23- gcc: Fix :cve:`2021-35465` 23- gcc: Fix :cve_nist:`2021-35465`
24- cve-extra-exclusions: add db CVEs to exclusion list 24- cve-extra-exclusions: add db CVEs to exclusion list
25- gcc: Add :cve:`2021-37322` to the list of CVEs to ignore 25- gcc: Add :cve_nist:`2021-37322` to the list of CVEs to ignore
26- bind: fix :cve:`2021-25219` 26- bind: fix :cve_nist:`2021-25219`
27- openssh: fix :cve:`2021-41617` 27- openssh: fix :cve_nist:`2021-41617`
28- ncurses: fix :cve:`2021-39537` 28- ncurses: fix :cve_nist:`2021-39537`
29- vim: fix :cve:`2021-3968` and :cve:`2021-3973` 29- vim: fix :cve_nist:`2021-3968` and :cve_nist:`2021-3973`
30- vim: fix :cve:`2021-3927` and :cve:`2021-3928` 30- vim: fix :cve_nist:`2021-3927` and :cve_nist:`2021-3928`
31- gmp: fix :cve:`2021-43618` 31- gmp: fix :cve_nist:`2021-43618`
32 32
33Fixes in 3.4.2 33Fixes in 3.4.2
34~~~~~~~~~~~~~~ 34~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.3.rst b/documentation/migration-guides/release-notes-3.4.3.rst
index 2af802307d..cd9698d0e8 100644
--- a/documentation/migration-guides/release-notes-3.4.3.rst
+++ b/documentation/migration-guides/release-notes-3.4.3.rst
@@ -6,12 +6,12 @@ Release notes for 3.4.3 (honister)
6Security Fixes in 3.4.3 6Security Fixes in 3.4.3
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- ghostscript: fix :cve:`2021-3781` 9- ghostscript: fix :cve_nist:`2021-3781`
10- ghostscript: fix :cve:`2021-45949` 10- ghostscript: fix :cve_nist:`2021-45949`
11- tiff: Add backports for two CVEs from upstream (:cve:`2022-0561` & :cve:`2022-0562`) 11- tiff: Add backports for two CVEs from upstream (:cve_nist:`2022-0561` & :cve_nist:`2022-0562`)
12- gcc : Fix :cve:`2021-46195` 12- gcc : Fix :cve_nist:`2021-46195`
13- virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__ 13- virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__
14- binutils: Add fix for :cve:`2021-45078` 14- binutils: Add fix for :cve_nist:`2021-45078`
15 15
16 16
17Fixes in 3.4.3 17Fixes in 3.4.3
diff --git a/documentation/migration-guides/release-notes-3.4.4.rst b/documentation/migration-guides/release-notes-3.4.4.rst
index 0bf9a16209..3ab858b0b9 100644
--- a/documentation/migration-guides/release-notes-3.4.4.rst
+++ b/documentation/migration-guides/release-notes-3.4.4.rst
@@ -6,11 +6,11 @@ Release notes for 3.4.4 (honister)
6Security Fixes in 3.4.4 6Security Fixes in 3.4.4
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- tiff: fix :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909` and :cve:`2022-0924` 9- tiff: fix :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909` and :cve_nist:`2022-0924`
10- xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__ 10- xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__
11- unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__ 11- unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__
12- zlib: fix :cve:`2018-25032` 12- zlib: fix :cve_nist:`2018-25032`
13- grub: ignore :cve:`2021-46705` 13- grub: ignore :cve_nist:`2021-46705`
14 14
15Fixes in 3.4.4 15Fixes in 3.4.4
16~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.rst b/documentation/migration-guides/release-notes-3.4.rst
index d76bb004b1..6eca9956be 100644
--- a/documentation/migration-guides/release-notes-3.4.rst
+++ b/documentation/migration-guides/release-notes-3.4.rst
@@ -220,34 +220,34 @@ Other license-related notes:
220Security Fixes in 3.4 220Security Fixes in 3.4
221~~~~~~~~~~~~~~~~~~~~~ 221~~~~~~~~~~~~~~~~~~~~~
222 222
223- apr: :cve:`2021-35940` 223- apr: :cve_nist:`2021-35940`
224- aspell: :cve:`2019-25051` 224- aspell: :cve_nist:`2019-25051`
225- avahi: :cve:`2021-3468`, :cve:`2021-36217` 225- avahi: :cve_nist:`2021-3468`, :cve_nist:`2021-36217`
226- binutils: :cve:`2021-20197` 226- binutils: :cve_nist:`2021-20197`
227- bluez: :cve:`2021-3658` 227- bluez: :cve_nist:`2021-3658`
228- busybox: :cve:`2021-28831` 228- busybox: :cve_nist:`2021-28831`
229- cairo: :cve:`2020-35492` 229- cairo: :cve_nist:`2020-35492`
230- cpio: :cve:`2021-38185` 230- cpio: :cve_nist:`2021-38185`
231- expat: :cve:`2013-0340` 231- expat: :cve_nist:`2013-0340`
232- ffmpeg: :cve:`2020-20446`, :cve:`2020-22015`, :cve:`2020-22021`, :cve:`2020-22033`, :cve:`2020-22019`, :cve:`2021-33815`, :cve:`2021-38171`, :cve:`2020-20453` 232- ffmpeg: :cve_nist:`2020-20446`, :cve_nist:`2020-22015`, :cve_nist:`2020-22021`, :cve_nist:`2020-22033`, :cve_nist:`2020-22019`, :cve_nist:`2021-33815`, :cve_nist:`2021-38171`, :cve_nist:`2020-20453`
233- glibc: :cve:`2021-33574`, :cve:`2021-38604` 233- glibc: :cve_nist:`2021-33574`, :cve_nist:`2021-38604`
234- inetutils: :cve:`2021-40491` 234- inetutils: :cve_nist:`2021-40491`
235- libgcrypt: :cve:`2021-40528` 235- libgcrypt: :cve_nist:`2021-40528`
236- linux-yocto/5.10, 5.14: :cve:`2021-3653`, :cve:`2021-3656` 236- linux-yocto/5.10, 5.14: :cve_nist:`2021-3653`, :cve_nist:`2021-3656`
237- lz4: :cve:`2021-3520` 237- lz4: :cve_nist:`2021-3520`
238- nettle: :cve:`2021-20305` 238- nettle: :cve_nist:`2021-20305`
239- openssl: :cve:`2021-3711`, :cve:`2021-3712` 239- openssl: :cve_nist:`2021-3711`, :cve_nist:`2021-3712`
240- perl: :cve:`2021-36770` 240- perl: :cve_nist:`2021-36770`
241- python3: :cve:`2021-29921` 241- python3: :cve_nist:`2021-29921`
242- python3-pip: :cve:`2021-3572` 242- python3-pip: :cve_nist:`2021-3572`
243- qemu: :cve:`2020-27821`, :cve:`2020-29443`, :cve:`2020-35517`, :cve:`2021-3392`, :cve:`2021-3409`, :cve:`2021-3416`, :cve:`2021-3527`, :cve:`2021-3544`, :cve:`2021-3545`, :cve:`2021-3546`, :cve:`2021-3682`, :cve:`2021-20181`, :cve:`2021-20221`, :cve:`2021-20257`, :cve:`2021-20263` 243- qemu: :cve_nist:`2020-27821`, :cve_nist:`2020-29443`, :cve_nist:`2020-35517`, :cve_nist:`2021-3392`, :cve_nist:`2021-3409`, :cve_nist:`2021-3416`, :cve_nist:`2021-3527`, :cve_nist:`2021-3544`, :cve_nist:`2021-3545`, :cve_nist:`2021-3546`, :cve_nist:`2021-3682`, :cve_nist:`2021-20181`, :cve_nist:`2021-20221`, :cve_nist:`2021-20257`, :cve_nist:`2021-20263`
244- rpm: :cve:`2021-3421`, :cve:`2021-20271` 244- rpm: :cve_nist:`2021-3421`, :cve_nist:`2021-20271`
245- rsync: :cve:`2020-14387` 245- rsync: :cve_nist:`2020-14387`
246- util-linux: :cve:`2021-37600` 246- util-linux: :cve_nist:`2021-37600`
247- vim: :cve:`2021-3770`, :cve:`2021-3778` 247- vim: :cve_nist:`2021-3770`, :cve_nist:`2021-3778`
248- wpa-supplicant: :cve:`2021-30004` 248- wpa-supplicant: :cve_nist:`2021-30004`
249- xdg-utils: :cve:`2020-27748` 249- xdg-utils: :cve_nist:`2020-27748`
250- xserver-xorg: :cve:`2021-3472` 250- xserver-xorg: :cve_nist:`2021-3472`
251 251
252Recipe Upgrades in 3.4 252Recipe Upgrades in 3.4
253~~~~~~~~~~~~~~~~~~~~~~ 253~~~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.1.rst b/documentation/migration-guides/release-notes-4.0.1.rst
index 5529f71c6f..5b972f899e 100644
--- a/documentation/migration-guides/release-notes-4.0.1.rst
+++ b/documentation/migration-guides/release-notes-4.0.1.rst
@@ -6,11 +6,11 @@ Release notes for 4.0.1 (kirkstone)
6Security Fixes in 4.0.1 6Security Fixes in 4.0.1
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- linux-yocto/5.15: fix :cve:`2022-28796` 9- linux-yocto/5.15: fix :cve_nist:`2022-28796`
10- python3: ignore :cve:`2015-20107` 10- python3: ignore :cve_nist:`2015-20107`
11- e2fsprogs: fix :cve:`2022-1304` 11- e2fsprogs: fix :cve_nist:`2022-1304`
12- lua: fix :cve:`2022-28805` 12- lua: fix :cve_nist:`2022-28805`
13- busybox: fix :cve:`2022-28391` 13- busybox: fix :cve_nist:`2022-28391`
14 14
15Fixes in 4.0.1 15Fixes in 4.0.1
16~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.10.rst b/documentation/migration-guides/release-notes-4.0.10.rst
index f37c3471ea..4e88bafe8a 100644
--- a/documentation/migration-guides/release-notes-4.0.10.rst
+++ b/documentation/migration-guides/release-notes-4.0.10.rst
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.10 (Kirkstone)
6Security Fixes in Yocto-4.0.10 6Security Fixes in Yocto-4.0.10
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-1579`, :cve:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588` 9- binutils: Fix :cve_nist:`2023-1579`, :cve_nist:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588`
10- cargo : Ignore :cve:`2022-46176` 10- cargo : Ignore :cve_nist:`2022-46176`
11- connman: Fix :cve:`2023-28488` 11- connman: Fix :cve_nist:`2023-28488`
12- curl: Fix :cve:`2023-27533`, :cve:`2023-27534`, :cve:`2023-27535`, :cve:`2023-27536` and :cve:`2023-27538` 12- curl: Fix :cve_nist:`2023-27533`, :cve_nist:`2023-27534`, :cve_nist:`2023-27535`, :cve_nist:`2023-27536` and :cve_nist:`2023-27538`
13- ffmpeg: Fix :cve:`2022-48434` 13- ffmpeg: Fix :cve_nist:`2022-48434`
14- freetype: Fix :cve:`2023-2004` 14- freetype: Fix :cve_nist:`2023-2004`
15- ghostscript: Fix :cve_mitre:`2023-29979` 15- ghostscript: Fix :cve_mitre:`2023-29979`
16- git: Fix :cve:`2023-25652` and :cve:`2023-29007` 16- git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007`
17- go: Fix :cve:`2022-41722`, :cve:`2022-41724`, :cve:`2022-41725`, :cve:`2023-24534`, :cve:`2023-24537` and :cve:`2023-24538` 17- go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725`, :cve_nist:`2023-24534`, :cve_nist:`2023-24537` and :cve_nist:`2023-24538`
18- go: Ignore :cve:`2022-41716` 18- go: Ignore :cve_nist:`2022-41716`
19- libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` 19- libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469`
20- libxpm: Fix :cve:`2022-44617`, :cve:`2022-46285` and :cve:`2022-4883` 20- libxpm: Fix :cve_nist:`2022-44617`, :cve_nist:`2022-46285` and :cve_nist:`2022-4883`
21- linux-yocto: Ignore :cve:`2021-3759`, :cve:`2021-4135`, :cve:`2021-4155`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-1016`, :cve:`2022-1184`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1462`, :cve:`2022-1734`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1998`, :cve:`2022-2078`, :cve:`2022-2196`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-2503`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2873`, :cve:`2022-2905`, :cve:`2022-2959`, :cve:`2022-3028`, :cve:`2022-3078`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3115`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3629`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-39188`, :cve:`2022-39190`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-41218`, :cve:`2022-4139`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42703`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-4382`, :cve:`2022-4662`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47929`, :cve:`2023-0179`, :cve:`2023-0394`, :cve:`2023-0461`, :cve:`2023-0590`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1382`, :cve:`2023-1513`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1998`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2162`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-22999`, :cve:`2023-23002`, :cve:`2023-23004`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-25012`, :cve:`2023-26545`, :cve:`2023-28327` and :cve:`2023-28328` 21- linux-yocto: Ignore :cve_nist:`2021-3759`, :cve_nist:`2021-4135`, :cve_nist:`2021-4155`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-1016`, :cve_nist:`2022-1184`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1462`, :cve_nist:`2022-1734`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1998`, :cve_nist:`2022-2078`, :cve_nist:`2022-2196`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-2503`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2873`, :cve_nist:`2022-2905`, :cve_nist:`2022-2959`, :cve_nist:`2022-3028`, :cve_nist:`2022-3078`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3115`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3629`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-39188`, :cve_nist:`2022-39190`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-41218`, :cve_nist:`2022-4139`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42703`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-4382`, :cve_nist:`2022-4662`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47929`, :cve_nist:`2023-0179`, :cve_nist:`2023-0394`, :cve_nist:`2023-0461`, :cve_nist:`2023-0590`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1382`, :cve_nist:`2023-1513`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1998`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2162`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-22999`, :cve_nist:`2023-23002`, :cve_nist:`2023-23004`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-25012`, :cve_nist:`2023-26545`, :cve_nist:`2023-28327` and :cve_nist:`2023-28328`
22- nasm: Fix :cve:`2022-44370` 22- nasm: Fix :cve_nist:`2022-44370`
23- python3-cryptography: Fix :cve:`2023-23931` 23- python3-cryptography: Fix :cve_nist:`2023-23931`
24- qemu: Ignore :cve:`2023-0664` 24- qemu: Ignore :cve_nist:`2023-0664`
25- ruby: Fix :cve:`2023-28755` and :cve:`2023-28756` 25- ruby: Fix :cve_nist:`2023-28755` and :cve_nist:`2023-28756`
26- screen: Fix :cve:`2023-24626` 26- screen: Fix :cve_nist:`2023-24626`
27- shadow: Fix :cve:`2023-29383` 27- shadow: Fix :cve_nist:`2023-29383`
28- tiff: Fix :cve:`2022-4645` 28- tiff: Fix :cve_nist:`2022-4645`
29- webkitgtk: Fix :cve:`2022-32888` and :cve:`2022-32923` 29- webkitgtk: Fix :cve_nist:`2022-32888` and :cve_nist:`2022-32923`
30- xserver-xorg: Fix :cve:`2023-1393` 30- xserver-xorg: Fix :cve_nist:`2023-1393`
31 31
32 32
33Fixes in Yocto-4.0.10 33Fixes in Yocto-4.0.10
diff --git a/documentation/migration-guides/release-notes-4.0.11.rst b/documentation/migration-guides/release-notes-4.0.11.rst
index 8a15884908..baef380586 100644
--- a/documentation/migration-guides/release-notes-4.0.11.rst
+++ b/documentation/migration-guides/release-notes-4.0.11.rst
@@ -6,18 +6,18 @@ Release notes for Yocto-4.0.11 (Kirkstone)
6Security Fixes in Yocto-4.0.11 6Security Fixes in Yocto-4.0.11
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- cups: Fix :cve:`2023-32324` 9- cups: Fix :cve_nist:`2023-32324`
10- curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` 10- curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322`
11- git: Ignore :cve:`2023-25815` 11- git: Ignore :cve_nist:`2023-25815`
12- go: Fix :cve:`2023-24539` and :cve:`2023-24540` 12- go: Fix :cve_nist:`2023-24539` and :cve_nist:`2023-24540`
13- nasm: Fix :cve:`2022-46457` 13- nasm: Fix :cve_nist:`2022-46457`
14- openssh: Fix :cve:`2023-28531` 14- openssh: Fix :cve_nist:`2023-28531`
15- openssl: Fix :cve:`2023-1255` and :cve:`2023-2650` 15- openssl: Fix :cve_nist:`2023-1255` and :cve_nist:`2023-2650`
16- perl: Fix :cve:`2023-31484` 16- perl: Fix :cve_nist:`2023-31484`
17- python3-requests: Fix for :cve:`2023-32681` 17- python3-requests: Fix for :cve_nist:`2023-32681`
18- sysstat: Fix :cve:`2023-33204` 18- sysstat: Fix :cve_nist:`2023-33204`
19- vim: Fix :cve:`2023-2426` 19- vim: Fix :cve_nist:`2023-2426`
20- webkitgtk: fix :cve:`2022-42867`, :cve:`2022-46691`, :cve:`2022-46699` and :cve:`2022-46700` 20- webkitgtk: fix :cve_nist:`2022-42867`, :cve_nist:`2022-46691`, :cve_nist:`2022-46699` and :cve_nist:`2022-46700`
21 21
22 22
23Fixes in Yocto-4.0.11 23Fixes in Yocto-4.0.11
diff --git a/documentation/migration-guides/release-notes-4.0.12.rst b/documentation/migration-guides/release-notes-4.0.12.rst
index 0ea92a453d..ead33e1854 100644
--- a/documentation/migration-guides/release-notes-4.0.12.rst
+++ b/documentation/migration-guides/release-notes-4.0.12.rst
@@ -6,30 +6,30 @@ Release notes for Yocto-4.0.12 (Kirkstone)
6Security Fixes in Yocto-4.0.12 6Security Fixes in Yocto-4.0.12
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2828` and :cve:`2023-2911` 9- bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911`
10- cups: Fix :cve:`2023-34241` 10- cups: Fix :cve_nist:`2023-34241`
11- curl: Added :cve:`2023-28320` Follow-up patch 11- curl: Added :cve_nist:`2023-28320` Follow-up patch
12- dbus: Fix :cve:`2023-34969` 12- dbus: Fix :cve_nist:`2023-34969`
13- dmidecode: fix :cve:`2023-30630` 13- dmidecode: fix :cve_nist:`2023-30630`
14- ghostscript: fix :cve:`2023-36664` 14- ghostscript: fix :cve_nist:`2023-36664`
15- go: fix :cve_mitre:`2023-24531`, :cve:`2023-24536`, :cve:`2023-29400`, :cve:`2023-29402`, :cve:`2023-29404`, :cve:`2023-29405` and :cve:`2023-29406` 15- go: fix :cve_mitre:`2023-24531`, :cve_nist:`2023-24536`, :cve_nist:`2023-29400`, :cve_nist:`2023-29402`, :cve_nist:`2023-29404`, :cve_nist:`2023-29405` and :cve_nist:`2023-29406`
16- libarchive: Ignore :cve:`2023-30571` 16- libarchive: Ignore :cve_nist:`2023-30571`
17- libcap: Fix :cve:`2023-2602` and :cve:`2023-2603` 17- libcap: Fix :cve_nist:`2023-2602` and :cve_nist:`2023-2603`
18- libjpeg-turbo: Fix :cve:`2023-2804` 18- libjpeg-turbo: Fix :cve_nist:`2023-2804`
19- libpcre2: Fix :cve:`2022-41409` 19- libpcre2: Fix :cve_nist:`2022-41409`
20- libtiff: fix :cve:`2023-26965` 20- libtiff: fix :cve_nist:`2023-26965`
21- libwebp: Fix :cve:`2023-1999` 21- libwebp: Fix :cve_nist:`2023-1999`
22- libx11: Fix :cve:`2023-3138` 22- libx11: Fix :cve_nist:`2023-3138`
23- libxpm: Fix :cve:`2022-44617` 23- libxpm: Fix :cve_nist:`2022-44617`
24- ninja: Ignore :cve:`2021-4336` 24- ninja: Ignore :cve_nist:`2021-4336`
25- openssh: Fix :cve:`2023-38408` 25- openssh: Fix :cve_nist:`2023-38408`
26- openssl: Fix :cve:`2023-2975`, :cve:`2023-3446` and :cve:`2023-3817` 26- openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446` and :cve_nist:`2023-3817`
27- perl: Fix :cve:`2023-31486` 27- perl: Fix :cve_nist:`2023-31486`
28- python3: Ignore :cve:`2023-36632` 28- python3: Ignore :cve_nist:`2023-36632`
29- qemu: Fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` 29- qemu: Fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301`
30- sqlite3: Fix :cve:`2023-36191` 30- sqlite3: Fix :cve_nist:`2023-36191`
31- tiff: Fix :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-25433`, :cve:`2023-25434` and :cve:`2023-25435` 31- tiff: Fix :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-25433`, :cve_nist:`2023-25434` and :cve_nist:`2023-25435`
32- vim: :cve:`2023-2609` and :cve:`2023-2610` 32- vim: :cve_nist:`2023-2609` and :cve_nist:`2023-2610`
33 33
34 34
35Fixes in Yocto-4.0.12 35Fixes in Yocto-4.0.12
diff --git a/documentation/migration-guides/release-notes-4.0.13.rst b/documentation/migration-guides/release-notes-4.0.13.rst
index 3c096c356f..641c9d1f05 100644
--- a/documentation/migration-guides/release-notes-4.0.13.rst
+++ b/documentation/migration-guides/release-notes-4.0.13.rst
@@ -6,43 +6,43 @@ Release notes for Yocto-4.0.13 (Kirkstone)
6Security Fixes in Yocto-4.0.13 6Security Fixes in Yocto-4.0.13
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2829` 9- bind: Fix :cve_nist:`2023-2829`
10- binutils: Fix :cve:`2022-48065` 10- binutils: Fix :cve_nist:`2022-48065`
11- busybox: Fix :cve:`2022-48174` 11- busybox: Fix :cve_nist:`2022-48174`
12- cups: Fix :cve:`2023-32360` 12- cups: Fix :cve_nist:`2023-32360`
13- curl: Fix :cve:`2023-32001` 13- curl: Fix :cve_nist:`2023-32001`
14- dmidecode: Fix :cve:`2023-30630` 14- dmidecode: Fix :cve_nist:`2023-30630`
15- dropbear: Fix :cve:`2023-36328` 15- dropbear: Fix :cve_nist:`2023-36328`
16- ffmpeg: Ignored :cve:`2023-39018` 16- ffmpeg: Ignored :cve_nist:`2023-39018`
17- file: Fix :cve:`2022-48554` 17- file: Fix :cve_nist:`2022-48554`
18- flac: Fix :cve:`2020-22219` 18- flac: Fix :cve_nist:`2020-22219`
19- gcc: Fix :cve:`2023-4039` 19- gcc: Fix :cve_nist:`2023-4039`
20- gdb: Fix :cve:`2023-39128` 20- gdb: Fix :cve_nist:`2023-39128`
21- ghostscript: Fix :cve:`2023-38559` 21- ghostscript: Fix :cve_nist:`2023-38559`
22- glib-2.0: Fix :cve:`2023-29499`, :cve:`2023-32611`, :cve:`2023-32636`, :cve:`2023-32643` and :cve:`2023-32665` 22- glib-2.0: Fix :cve_nist:`2023-29499`, :cve_nist:`2023-32611`, :cve_nist:`2023-32636`, :cve_nist:`2023-32643` and :cve_nist:`2023-32665`
23- go: Fix :cve:`2023-29409` and :cve:`2023-39319` 23- go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39319`
24- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329` 24- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329`
25- gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328` 25- gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328`
26- gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327` 26- gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327`
27- inetutils: Fix :cve:`2023-40303` 27- inetutils: Fix :cve_nist:`2023-40303`
28- json-c: Fix :cve:`2021-32292` 28- json-c: Fix :cve_nist:`2021-32292`
29- librsvg: Fix :cve:`2023-38633` 29- librsvg: Fix :cve_nist:`2023-38633`
30- libssh2: Fix :cve:`2020-22218` 30- libssh2: Fix :cve_nist:`2020-22218`
31- libtiff: Fix :cve:`2023-26966` 31- libtiff: Fix :cve_nist:`2023-26966`
32- libxml2: Fix :cve:`2023-39615` 32- libxml2: Fix :cve_nist:`2023-39615`
33- linux-yocto/5.15: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965` and :cve:`2019-1999` 33- linux-yocto/5.15: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965` and :cve_nist:`2019-1999`
34- nasm: Fix :cve:`2020-21528` 34- nasm: Fix :cve_nist:`2020-21528`
35- ncurses: Fix :cve:`2023-29491` 35- ncurses: Fix :cve_nist:`2023-29491`
36- nghttp2: Fix :cve:`2023-35945` 36- nghttp2: Fix :cve_nist:`2023-35945`
37- procps: Fix :cve:`2023-4016` 37- procps: Fix :cve_nist:`2023-4016`
38- python3-certifi: Fix :cve:`2023-37920` 38- python3-certifi: Fix :cve_nist:`2023-37920`
39- python3-git: Fix :cve:`2022-24439` and :cve:`2023-40267` 39- python3-git: Fix :cve_nist:`2022-24439` and :cve_nist:`2023-40267`
40- python3-pygments: Fix :cve:`2022-40896` 40- python3-pygments: Fix :cve_nist:`2022-40896`
41- python3: Fix :cve:`2023-40217` 41- python3: Fix :cve_nist:`2023-40217`
42- qemu: Fix :cve:`2020-14394`, :cve:`2021-3638`, :cve_mitre:`2023-2861`, :cve:`2023-3180` and :cve:`2023-3354` 42- qemu: Fix :cve_nist:`2020-14394`, :cve_nist:`2021-3638`, :cve_mitre:`2023-2861`, :cve_nist:`2023-3180` and :cve_nist:`2023-3354`
43- tiff: fix :cve:`2023-2908`, :cve:`2023-3316` and :cve:`2023-3618` 43- tiff: fix :cve_nist:`2023-2908`, :cve_nist:`2023-3316` and :cve_nist:`2023-3618`
44- vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750` and :cve:`2023-4752` 44- vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750` and :cve_nist:`2023-4752`
45- webkitgtk: fix :cve:`2022-48503` and :cve:`2023-23529` 45- webkitgtk: fix :cve_nist:`2022-48503` and :cve_nist:`2023-23529`
46 46
47 47
48 48
diff --git a/documentation/migration-guides/release-notes-4.0.14.rst b/documentation/migration-guides/release-notes-4.0.14.rst
index 02253f33f7..ad6590a887 100644
--- a/documentation/migration-guides/release-notes-4.0.14.rst
+++ b/documentation/migration-guides/release-notes-4.0.14.rst
@@ -6,37 +6,37 @@ Release notes for Yocto-4.0.14 (Kirkstone)
6Security Fixes in Yocto-4.0.14 6Security Fixes in Yocto-4.0.14
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-3341` and :cve:`2023-4236` 9- bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236`
10- binutils: Fix :cve:`2022-44840`, :cve:`2022-45703`, :cve:`2022-47008`, :cve:`2022-47011`, :cve:`2022-47673`, :cve:`2022-47695`, :cve:`2022-47696` and :cve:`2022-48063` 10- binutils: Fix :cve_nist:`2022-44840`, :cve_nist:`2022-45703`, :cve_nist:`2022-47008`, :cve_nist:`2022-47011`, :cve_nist:`2022-47673`, :cve_nist:`2022-47695`, :cve_nist:`2022-47696` and :cve_nist:`2022-48063`
11- cups: Fix :cve:`2023-4504` 11- cups: Fix :cve_nist:`2023-4504`
12- curl: Fix :cve:`2023-38545` and :cve:`2023-38546` 12- curl: Fix :cve_nist:`2023-38545` and :cve_nist:`2023-38546`
13- gawk: Fix :cve:`2023-4156` 13- gawk: Fix :cve_nist:`2023-4156`
14- ghostscript: Fix :cve:`2023-43115` 14- ghostscript: Fix :cve_nist:`2023-43115`
15- glibc: Fix :cve:`2023-4806`, :cve:`2023-4813`, :cve:`2023-4911` and :cve:`2023-5156` 15- glibc: Fix :cve_nist:`2023-4806`, :cve_nist:`2023-4813`, :cve_nist:`2023-4911` and :cve_nist:`2023-5156`
16- glibc: Ignore :cve:`2023-4527` 16- glibc: Ignore :cve_nist:`2023-4527`
17- go: Fix :cve:`2023-24538` and :cve:`2023-39318` 17- go: Fix :cve_nist:`2023-24538` and :cve_nist:`2023-39318`
18- gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` 18- gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476`
19- libtiff: Fix :cve:`2022-40090` and :cve:`2023-1916` 19- libtiff: Fix :cve_nist:`2022-40090` and :cve_nist:`2023-1916`
20- libwebp: Fix :cve:`2023-5129` 20- libwebp: Fix :cve_nist:`2023-5129`
21- libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` 21- libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787`
22- libxml2: Fix :cve:`2023-45322` 22- libxml2: Fix :cve_nist:`2023-45322`
23- libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` 23- libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789`
24- linux-firmware: Fix :cve:`2022-40982`, :cve:`2023-20569` and :cve:`2023-20593` 24- linux-firmware: Fix :cve_nist:`2022-40982`, :cve_nist:`2023-20569` and :cve_nist:`2023-20593`
25- linux-yocto: update CVE exclusions 25- linux-yocto: update CVE exclusions
26- linux-yocto/5.10: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27418`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-3910`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45888`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-21264`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23005`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42755`, :cve:`2023-42756`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-44466`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-45862`, :cve:`2023-45871`, :cve:`2023-4611`, :cve:`2023-4623`, :cve:`2023-4732`, :cve:`2023-4921` and :cve:`2023-5345` 26- linux-yocto/5.10: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27418`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-3910`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45888`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-21264`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23005`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42755`, :cve_nist:`2023-42756`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-44466`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-45862`, :cve_nist:`2023-45871`, :cve_nist:`2023-4611`, :cve_nist:`2023-4623`, :cve_nist:`2023-4732`, :cve_nist:`2023-4921` and :cve_nist:`2023-5345`
27- linux-yocto/5.15: Ignore :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-48502`, :cve:`2023-0160`, :cve:`2023-1206`, :cve:`2023-20593`, :cve:`2023-21264`, :cve:`2023-2898`, :cve:`2023-31248`, :cve:`2023-33250`, :cve:`2023-34319`, :cve:`2023-35001`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4194`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459` and :cve:`2023-4611` 27- linux-yocto/5.15: Ignore :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-48502`, :cve_nist:`2023-0160`, :cve_nist:`2023-1206`, :cve_nist:`2023-20593`, :cve_nist:`2023-21264`, :cve_nist:`2023-2898`, :cve_nist:`2023-31248`, :cve_nist:`2023-33250`, :cve_nist:`2023-34319`, :cve_nist:`2023-35001`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4194`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459` and :cve_nist:`2023-4611`
28- openssl: Fix :cve:`2023-4807` and :cve:`2023-5363` 28- openssl: Fix :cve_nist:`2023-4807` and :cve_nist:`2023-5363`
29- python3-git: Fix :cve:`2023-40590` and :cve:`2023-41040` 29- python3-git: Fix :cve_nist:`2023-40590` and :cve_nist:`2023-41040`
30- python3-urllib3: Fix :cve:`2023-43804` 30- python3-urllib3: Fix :cve_nist:`2023-43804`
31- qemu: Ignore :cve:`2023-2680` 31- qemu: Ignore :cve_nist:`2023-2680`
32- ruby: Fix :cve:`2023-36617` 32- ruby: Fix :cve_nist:`2023-36617`
33- shadow: Fix :cve_mitre:`2023-4641` 33- shadow: Fix :cve_mitre:`2023-4641`
34- tiff: Fix :cve:`2023-3576` and :cve:`2023-40745` 34- tiff: Fix :cve_nist:`2023-3576` and :cve_nist:`2023-40745`
35- vim: Fix :cve:`2023-5441` and :cve:`2023-5535` 35- vim: Fix :cve_nist:`2023-5441` and :cve_nist:`2023-5535`
36- webkitgtk: Fix :cve:`2023-32439` 36- webkitgtk: Fix :cve_nist:`2023-32439`
37- xdg-utils: Fix :cve:`2022-4055` 37- xdg-utils: Fix :cve_nist:`2022-4055`
38- xserver-xorg: ignore :cve:`2022-3553` (XQuartz-specific) 38- xserver-xorg: ignore :cve_nist:`2022-3553` (XQuartz-specific)
39- zlib: Fix :cve:`2023-45853` 39- zlib: Fix :cve_nist:`2023-45853`
40 40
41 41
42 42
diff --git a/documentation/migration-guides/release-notes-4.0.15.rst b/documentation/migration-guides/release-notes-4.0.15.rst
index b2731530e8..e05cd6f143 100644
--- a/documentation/migration-guides/release-notes-4.0.15.rst
+++ b/documentation/migration-guides/release-notes-4.0.15.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.0.15 (Kirkstone)
6Security Fixes in Yocto-4.0.15 6Security Fixes in Yocto-4.0.15
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` 9- avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473`
10- binutils: Fix :cve:`2022-47007`, :cve:`2022-47010` and :cve:`2022-48064` 10- binutils: Fix :cve_nist:`2022-47007`, :cve_nist:`2022-47010` and :cve_nist:`2022-48064`
11- bluez5: Fix :cve:`2023-45866` 11- bluez5: Fix :cve_nist:`2023-45866`
12- ghostscript: Ignore GhostPCL :cve:`2023-38560` 12- ghostscript: Ignore GhostPCL :cve_nist:`2023-38560`
13- gnutls: Fix :cve:`2023-5981` 13- gnutls: Fix :cve_nist:`2023-5981`
14- go: Ignore :cve:`2023-45283` and :cve:`2023-45284` 14- go: Ignore :cve_nist:`2023-45283` and :cve_nist:`2023-45284`
15- grub: Fix :cve:`2023-4692` and :cve:`2023-4693` 15- grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
16- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429` 16- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429`
17- libsndfile: Fix :cve:`2022-33065` 17- libsndfile: Fix :cve_nist:`2022-33065`
18- libwebp: Fix :cve:`2023-4863` 18- libwebp: Fix :cve_nist:`2023-4863`
19- openssl: Fix :cve:`2023-5678` 19- openssl: Fix :cve_nist:`2023-5678`
20- python3-cryptography: Fix :cve:`2023-49083` 20- python3-cryptography: Fix :cve_nist:`2023-49083`
21- qemu: Fix :cve:`2023-1544` 21- qemu: Fix :cve_nist:`2023-1544`
22- sudo: :cve:`2023-42456` and :cve_mitre:`2023-42465` 22- sudo: :cve_nist:`2023-42456` and :cve_mitre:`2023-42465`
23- tiff: Fix :cve:`2023-41175` 23- tiff: Fix :cve_nist:`2023-41175`
24- vim: Fix :cve:`2023-46246`, :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236`, :cve:`2023-48237` and :cve:`2023-48706` 24- vim: Fix :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237` and :cve_nist:`2023-48706`
25- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 25- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
26- xwayland: Fix :cve:`2023-5367` 26- xwayland: Fix :cve_nist:`2023-5367`
27 27
28 28
29Fixes in Yocto-4.0.15 29Fixes in Yocto-4.0.15
diff --git a/documentation/migration-guides/release-notes-4.0.16.rst b/documentation/migration-guides/release-notes-4.0.16.rst
index 0eb31832ab..dea5b4c2bf 100644
--- a/documentation/migration-guides/release-notes-4.0.16.rst
+++ b/documentation/migration-guides/release-notes-4.0.16.rst
@@ -8,22 +8,22 @@ Security Fixes in Yocto-4.0.16
8 8
9- cpio: Fix :cve_mitre:`2023-7207` 9- cpio: Fix :cve_mitre:`2023-7207`
10- curl: Revert "curl: Backport fix CVE-2023-32001" 10- curl: Revert "curl: Backport fix CVE-2023-32001"
11- curl: Fix :cve:`2023-46218` 11- curl: Fix :cve_nist:`2023-46218`
12- dropbear:Fix :cve:`2023-48795` 12- dropbear:Fix :cve_nist:`2023-48795`
13- ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965`
14- ghostscript: Fix :cve:`2023-46751` 14- ghostscript: Fix :cve_nist:`2023-46751`
15- gnutls: Fix :cve:`2024-0553` and :cve:`2024-0567` 15- gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567`
16- go: Fix :cve:`2023-39326` 16- go: Fix :cve_nist:`2023-39326`
17- openssh: Fix :cve:`2023-48795`, :cve:`2023-51384` and :cve:`2023-51385` 17- openssh: Fix :cve_nist:`2023-48795`, :cve_nist:`2023-51384` and :cve_nist:`2023-51385`
18- openssl: Fix :cve:`2023-6129` and :cve_mitre:`2023-6237` 18- openssl: Fix :cve_nist:`2023-6129` and :cve_mitre:`2023-6237`
19- pam: Fix :cve_mitre:`2024-22365` 19- pam: Fix :cve_mitre:`2024-22365`
20- perl: Fix :cve:`2023-47038` 20- perl: Fix :cve_nist:`2023-47038`
21- qemu: Fix :cve:`2023-5088` 21- qemu: Fix :cve_nist:`2023-5088`
22- sqlite3: Fix :cve:`2023-7104` 22- sqlite3: Fix :cve_nist:`2023-7104`
23- systemd: Fix :cve:`2023-7008` 23- systemd: Fix :cve_nist:`2023-7008`
24- tiff: Fix :cve:`2023-6228` 24- tiff: Fix :cve_nist:`2023-6228`
25- xserver-xorg: Fix :cve:`2023-6377`, :cve:`2023-6478`, :cve:`2023-6816`, :cve_mitre:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886` 25- xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_mitre:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886`
26- zlib: Ignore :cve:`2023-6992` 26- zlib: Ignore :cve_nist:`2023-6992`
27 27
28 28
29Fixes in Yocto-4.0.16 29Fixes in Yocto-4.0.16
diff --git a/documentation/migration-guides/release-notes-4.0.17.rst b/documentation/migration-guides/release-notes-4.0.17.rst
index 1dfd10ce20..e917dc9bf8 100644
--- a/documentation/migration-guides/release-notes-4.0.17.rst
+++ b/documentation/migration-guides/release-notes-4.0.17.rst
@@ -6,27 +6,27 @@ Release notes for Yocto-4.0.17 (Kirkstone)
6Security Fixes in Yocto-4.0.17 6Security Fixes in Yocto-4.0.17
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-4408`, :cve:`2023-50387`, :cve:`2023-50868`, :cve:`2023-5517` and :cve:`2023-5679` 9- bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50868` and :cve_nist:`2023-50387`
10- binutils: Fix :cve:`2023-39129` and :cve:`2023-39130` 10- binutils: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130`
11- curl: Fix :cve:`2023-46219` 11- curl: Fix :cve_nist:`2023-46219`
12- curl: Ignore :cve:`2023-42915` 12- curl: Ignore :cve_nist:`2023-42915`
13- gcc: Ignore :cve:`2023-4039` 13- gcc: Ignore :cve_nist:`2023-4039`
14- gdb: Fix :cve:`2023-39129` and :cve:`2023-39130` 14- gdb: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130`
15- glibc: Ignore :cve:`2023-0687` 15- glibc: Ignore :cve_nist:`2023-0687`
16- go: Fix :cve:`2023-29406`, :cve:`2023-45285`, :cve:`2023-45287`, :cve:`2023-45289`, :cve:`2023-45290`, :cve:`2024-24784` and :cve:`2024-24785` 16- go: Fix :cve_nist:`2023-29406`, :cve_nist:`2023-45285`, :cve_nist:`2023-45287`, :cve_nist:`2023-45289`, :cve_nist:`2023-45290`, :cve_nist:`2024-24784` and :cve_nist:`2024-24785`
17- less: Fix :cve:`2022-48624` 17- less: Fix :cve_nist:`2022-48624`
18- libgit2: Fix :cve:`2024-24575` and :cve:`2024-24577` 18- libgit2: Fix :cve_nist:`2024-24575` and :cve_nist:`2024-24577`
19- libuv: fix :cve:`2024-24806` 19- libuv: fix :cve_nist:`2024-24806`
20- libxml2: Fix for :cve:`2024-25062` 20- libxml2: Fix for :cve_nist:`2024-25062`
21- linux-yocto/5.15: Fix :cve:`2022-36402`, :cve:`2022-40982`, :cve:`2022-47940`, :cve:`2023-1193`, :cve:`2023-1194`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-25775`, :cve:`2023-31085`, :cve:`2023-32247`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-34324`, :cve:`2023-35827`, :cve:`2023-3772`, :cve:`2023-38427`, :cve:`2023-38430`, :cve:`2023-38431`, :cve_mitre:`2023-3867`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-39198`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4244`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42754`, :cve:`2023-42755`, :cve:`2023-4563`, :cve:`2023-4569`, :cve:`2023-45871`, :cve:`2023-4623`, :cve:`2023-46343`, :cve:`2023-46813`, :cve:`2023-46838`, :cve:`2023-46862`, :cve:`2023-4881`, :cve:`2023-4921`, :cve:`2023-51042`, :cve:`2023-5158`, :cve:`2023-51779`, :cve_mitre:`2023-52340`, :cve:`2023-52429`, :cve:`2023-52435`, :cve:`2023-52436`, :cve:`2023-52438`, :cve:`2023-52439`, :cve:`2023-52441`, :cve:`2023-52442`, :cve:`2023-52443`, :cve:`2023-52444`, :cve:`2023-52445`, :cve:`2023-52448`, :cve:`2023-52449`, :cve:`2023-52451`, :cve:`2023-52454`, :cve:`2023-52456`, :cve:`2023-52457`, :cve:`2023-52458`, :cve:`2023-52463`, :cve:`2023-52464`, :cve:`2023-5717`, :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6176`, :cve:`2023-6546`, :cve:`2023-6606`, :cve:`2023-6622`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2024-0340`, :cve:`2024-0584`, :cve:`2024-0607`, :cve:`2024-0641`, :cve:`2024-0646`, :cve:`2024-1085`, :cve:`2024-1086`, :cve:`2024-1151`, :cve:`2024-22705`, :cve:`2024-23849`, :cve:`2024-23850`, :cve:`2024-23851`, :cve:`2024-24860`, :cve:`2024-26586`, :cve:`2024-26589`, :cve:`2024-26591`, :cve:`2024-26592`, :cve:`2024-26593`, :cve:`2024-26594`, :cve:`2024-26597` and :cve:`2024-26598` 21- linux-yocto/5.15: Fix :cve_nist:`2022-36402`, :cve_nist:`2022-40982`, :cve_nist:`2022-47940`, :cve_nist:`2023-1193`, :cve_nist:`2023-1194`, :cve_nist:`2023-3772`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4128`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4244`, :cve_nist:`2023-4273`, :cve_nist:`2023-4563`, :cve_nist:`2023-4569`, :cve_nist:`2023-4623`, :cve_nist:`2023-4881`, :cve_nist:`2023-4921`, :cve_nist:`2023-5158`, :cve_nist:`2023-5717`, :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6176`, :cve_nist:`2023-6546`, :cve_nist:`2023-6606`, :cve_nist:`2023-6622`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-25775`, :cve_nist:`2023-31085`, :cve_nist:`2023-32247`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-34324`, :cve_nist:`2023-35827`, :cve_nist:`2023-38427`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-39198`, :cve_nist:`2023-40283`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42754`, :cve_nist:`2023-42755`, :cve_nist:`2023-45871`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46838`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51779`, :cve_mitre:`2023-52340`, :cve_nist:`2023-52429`, :cve_nist:`2023-52435`, :cve_nist:`2023-52436`, :cve_nist:`2023-52438`, :cve_nist:`2023-52439`, :cve_nist:`2023-52441`, :cve_nist:`2023-52442`, :cve_nist:`2023-52443`, :cve_nist:`2023-52444`, :cve_nist:`2023-52445`, :cve_nist:`2023-52448`, :cve_nist:`2023-52449`, :cve_nist:`2023-52451`, :cve_nist:`2023-52454`, :cve_nist:`2023-52456`, :cve_nist:`2023-52457`, :cve_nist:`2023-52458`, :cve_nist:`2023-52463`, :cve_nist:`2023-52464`, :cve_nist:`2024-0340`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086`, :cve_nist:`2024-1151`, :cve_nist:`2024-22705`, :cve_nist:`2024-23849`, :cve_nist:`2024-23850`, :cve_nist:`2024-23851`, :cve_nist:`2024-24860`, :cve_nist:`2024-26586`, :cve_nist:`2024-26589`, :cve_nist:`2024-26591`, :cve_nist:`2024-26592`, :cve_nist:`2024-26593`, :cve_nist:`2024-26594`, :cve_nist:`2024-26597` and :cve_nist:`2024-26598`
22- linux-yocto/5.15: Ignore :cve:`2020-27418`, :cve:`2020-36766`, :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-40791`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45898`, :cve:`2023-4610`, :cve:`2023-4732`, :cve:`2023-5090`, :cve:`2023-51043`, :cve:`2023-5178`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve:`2023-5197`, :cve:`2023-52433`, :cve:`2023-52440`, :cve:`2023-52446`, :cve:`2023-52450`, :cve:`2023-52453`, :cve:`2023-52455`, :cve:`2023-52459`, :cve:`2023-52460`, :cve:`2023-52461`, :cve:`2023-52462`, :cve:`2023-5345`, :cve:`2023-5633`, :cve:`2023-5972`, :cve:`2023-6111`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0775`, :cve:`2024-26581`, :cve:`2024-26582`, :cve:`2024-26590`, :cve:`2024-26596` and :cve:`2024-26599` 22- linux-yocto/5.15: Ignore :cve_nist:`2020-27418`, :cve_nist:`2020-36766`, :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-4732`, :cve_nist:`2023-5090`, :cve_nist:`2023-5178`, :cve_nist:`2023-5197`, :cve_nist:`2023-5345`, :cve_nist:`2023-5633`, :cve_nist:`2023-5972`, :cve_nist:`2023-6111`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-40791`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45898`, :cve_nist:`2023-51043`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_nist:`2023-52433`, :cve_nist:`2023-52440`, :cve_nist:`2023-52446`, :cve_nist:`2023-52450`, :cve_nist:`2023-52453`, :cve_nist:`2023-52455`, :cve_nist:`2023-52459`, :cve_nist:`2023-52460`, :cve_nist:`2023-52461`, :cve_nist:`2023-52462`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0775`, :cve_nist:`2024-26581`, :cve_nist:`2024-26582`, :cve_nist:`2024-26590`, :cve_nist:`2024-26596` and :cve_nist:`2024-26599`
23- linux-yocto/5.10: Fix :cve:`2023-39198`, :cve:`2023-46838`, :cve:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve_mitre:`2023-52340`, :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6606`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2024-0584` and :cve:`2024-0646` 23- linux-yocto/5.10: Fix :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6606`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-39198`, :cve_nist:`2023-46838`, :cve_nist:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0584` and :cve_nist:`2024-0646`
24- linux-yocto/5.10: Ignore :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-1508`, :cve:`2022-36402`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-4610`, :cve:`2023-46343`, :cve:`2023-51042`, :cve:`2023-51043`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0641`, :cve:`2024-0775`, :cve:`2024-1085` and :cve:`2024-22705` 24- linux-yocto/5.10: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-1508`, :cve_nist:`2022-36402`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-46343`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0775`, :cve_nist:`2024-1085` and :cve_nist:`2024-22705`
25- openssl: Fix :cve:`2024-0727` 25- openssl: Fix :cve_nist:`2024-0727`
26- python3-pycryptodome: Fix :cve:`2023-52323` 26- python3-pycryptodome: Fix :cve_nist:`2023-52323`
27- qemu: Fix :cve:`2023-42467`, :cve:`2023-6693` and :cve:`2024-24474` 27- qemu: Fix :cve_nist:`2023-6693`, :cve_nist:`2023-42467` and :cve_nist:`2024-24474`
28- vim: Fix :cve:`2024-22667` 28- vim: Fix :cve_nist:`2024-22667`
29- xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` 29- xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478`
30 30
31 31
32Fixes in Yocto-4.0.17 32Fixes in Yocto-4.0.17
diff --git a/documentation/migration-guides/release-notes-4.0.18.rst b/documentation/migration-guides/release-notes-4.0.18.rst
new file mode 100644
index 0000000000..624aae127b
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.18.rst
@@ -0,0 +1,191 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.18 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.18
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- curl: Fix :cve_nist:`2024-2398`
10- expat: fix :cve_nist:`2023-52426` and :cve_nist:`2024-28757`
11- libssh2: fix :cve_nist:`2023-48795`
12- ncurses: Fix :cve_nist:`2023-50495`
13- nghttp2: Fix :cve_nist:`2024-28182` and :cve_nist:`2023-44487`
14- openssh: Ignore :cve_nist:`2023-51767`
15- openssl: Fix :cve_nist:`2024-2511`
16- perl: Ignore :cve_nist:`2023-47100`
17- python3-cryptography: Fix :cve_nist:`2024-26130`
18- python3-urllib3: Fix :cve_nist:`2023-45803`
19- qemu: Fix :cve_nist:`2023-6683`
20- ruby: fix :cve_mitre:`2024-27281`
21- rust: Ignore :cve_nist:`2024-24576`
22- tiff: Fix :cve_nist:`2023-52356` and :cve_nist:`2023-6277`
23- xserver-xorg: Fix :cve_nist:`2024-31080` and :cve_nist:`2024-31081`
24- xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409`
25
26
27Fixes in Yocto-4.0.18
28~~~~~~~~~~~~~~~~~~~~~
29
30- build-appliance-image: Update to kirkstone head revision
31- common-licenses: backport LGPL-3.0-with-zeromq-exception license
32- contributor-guide: add notes for tests
33- contributor-guide: be more specific about meta-* trees
34- cups: fix typo in :cve_nist:`2023-32360` backport patch
35- cve-update-nvd2-native: Add an age threshold for incremental update
36- cve-update-nvd2-native: Fix CVE configuration update
37- cve-update-nvd2-native: Fix typo in comment
38- cve-update-nvd2-native: Remove duplicated CVE_CHECK_DB_FILE definition
39- cve-update-nvd2-native: Remove rejected CVE from database
40- cve-update-nvd2-native: nvd_request_next: Improve comment
41- dev-manual: improve descriptions of 'bitbake -S printdiff'
42- dev-manual: packages: fix capitalization
43- docs: conf.py: properly escape backslashes for latex_elements
44- gcc: Backport sanitizer fix for 32-bit ALSR
45- glibc: Fix subscript typos for get_nscd_addresses
46- kernel-dev: join mkdir commands with -p
47- linux-firmware: Upgrade to 20240220
48- manuals: add initial sphinx-lint support
49- manuals: add initial stylechecks with Vale
50- manuals: document VIRTUAL-RUNTIME variables
51- manuals: fix duplicate "stylecheck" target
52- manuals: fix incorrect double backticks
53- manuals: fix trailing spaces
54- manuals: refer to new yocto-patches mailing list wherever appropriate
55- manuals: remove tab characters
56- manuals: replace hyphens with em dashes
57- manuals: use "manual page(s)"
58- migration-guides: add release notes for 4.0.17
59- poky.conf: bump version for 4.0.18
60- profile-manual: usage.rst: fix reference to bug report
61- profile-manual: usage.rst: formatting fixes
62- profile-manual: usage.rst: further style improvements
63- python3-urllib3: Upgrade to v1.26.18
64- ref-manual: add documentation of the variable :term:`SPDX_NAMESPACE_PREFIX`
65- ref-manual: tasks: do_cleanall: recommend using '-f' instead
66- ref-manual: tasks: do_cleansstate: recommend using '-f' instead for a shared sstate
67- ref-manual: variables: adding multiple groups in :term:`GROUPADD_PARAM`
68- ref-manual: variables: correct sdk installation default path
69- stress-ng: avoid calling sync during do_compile
70- systemd: Fix vlan qos mapping
71- tcl: Add a way to skip ptests
72- tcl: skip async and event tests in run-ptest
73- tcl: skip timing-dependent tests in run-ptest
74- valgrind: skip intermittently failing ptest
75- wireless-regdb: Upgrade to 2024.01.23
76- yocto-uninative: Update to 4.4 for glibc 2.39
77
78
79Known Issues in Yocto-4.0.18
80~~~~~~~~~~~~~~~~~~~~~~~~~~~~
81
82- N/A
83
84
85Contributors to Yocto-4.0.18
86~~~~~~~~~~~~~~~~~~~~~~~~~~~~
87
88- Alex Kiernan
89- Alex Stewart
90- Alexander Kanavin
91- BELOUARGA Mohamed
92- Claus Stovgaard
93- Colin McAllister
94- Geoff Parker
95- Haitao Liu
96- Harish Sadineni
97- Johan Bezem
98- Jonathan GUILLOT
99- Jörg Sommer
100- Khem Raj
101- Lee Chee Yang
102- Luca Ceresoli
103- Martin Jansa
104- Meenali Gupta
105- Michael Halstead
106- Michael Opdenacker
107- Peter Marko
108- Quentin Schulz
109- Ross Burton
110- Sana Kazi
111- Simone Weiß
112- Soumya Sambu
113- Steve Sakoman
114- Tan Wen Yan
115- Vijay Anusuri
116- Wang Mingyu
117- Yoann Congal
118- Yogita Urade
119- Zahir Hussain
120
121
122Repositories / Downloads for Yocto-4.0.18
123~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
124
125poky
126
127- Repository Location: :yocto_git:`/poky`
128- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
129- Tag: :yocto_git:`yocto-4.0.18 </poky/log/?h=yocto-4.0.18>`
130- Git Revision: :yocto_git:`31751bba1c789f15f574773a659b8017d7bcf440 </poky/commit/?id=31751bba1c789f15f574773a659b8017d7bcf440>`
131- Release Artefact: poky-31751bba1c789f15f574773a659b8017d7bcf440
132- sha: 72d5aa65c3c37766ebc24b212740272c1d52342468548f9c070241d3522ad2ca
133- Download Locations:
134 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.18/poky-31751bba1c789f15f574773a659b8017d7bcf440.tar.bz2
135 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.18/poky-31751bba1c789f15f574773a659b8017d7bcf440.tar.bz2
136
137openembedded-core
138
139- Repository Location: :oe_git:`/openembedded-core`
140- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
141- Tag: :oe_git:`yocto-4.0.18 </openembedded-core/log/?h=yocto-4.0.18>`
142- Git Revision: :oe_git:`b7182571242dc4e23e5250a449d90348e62a6abc </openembedded-core/commit/?id=b7182571242dc4e23e5250a449d90348e62a6abc>`
143- Release Artefact: oecore-b7182571242dc4e23e5250a449d90348e62a6abc
144- sha: 6f257e50c10ebae673dcf61a833b3270db6d22781f02f6794a370aac839f1020
145- Download Locations:
146 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.18/oecore-b7182571242dc4e23e5250a449d90348e62a6abc.tar.bz2
147 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.18/oecore-b7182571242dc4e23e5250a449d90348e62a6abc.tar.bz2
148
149meta-mingw
150
151- Repository Location: :yocto_git:`/meta-mingw`
152- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
153- Tag: :yocto_git:`yocto-4.0.18 </meta-mingw/log/?h=yocto-4.0.18>`
154- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
155- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
156- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
157- Download Locations:
158 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.18/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
159 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.18/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
160
161meta-gplv2
162
163- Repository Location: :yocto_git:`/meta-gplv2`
164- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
165- Tag: :yocto_git:`yocto-4.0.18 </meta-gplv2/log/?h=yocto-4.0.18>`
166- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
167- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
168- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
169- Download Locations:
170 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.18/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
171 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.18/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
172
173bitbake
174
175- Repository Location: :oe_git:`/bitbake`
176- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
177- Tag: :oe_git:`yocto-4.0.18 </bitbake/log/?h=yocto-4.0.18>`
178- Git Revision: :oe_git:`40fd5f4eef7460ca67f32cfce8e229e67e1ff607 </bitbake/commit/?id=40fd5f4eef7460ca67f32cfce8e229e67e1ff607>`
179- Release Artefact: bitbake-40fd5f4eef7460ca67f32cfce8e229e67e1ff607
180- sha: 5d20a0e4c5d0fce44bd84778168714a261a30a4b83f67c88df3b8a7e7115e444
181- Download Locations:
182 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.18/bitbake-40fd5f4eef7460ca67f32cfce8e229e67e1ff607.tar.bz2
183 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.18/bitbake-40fd5f4eef7460ca67f32cfce8e229e67e1ff607.tar.bz2
184
185yocto-docs
186
187- Repository Location: :yocto_git:`/yocto-docs`
188- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
189- Tag: :yocto_git:`yocto-4.0.18 </yocto-docs/log/?h=yocto-4.0.18>`
190- Git Revision: :yocto_git:`fd1423141e7458ba557db465c171b0b4e9063987 </yocto-docs/commit/?id=fd1423141e7458ba557db465c171b0b4e9063987>`
191
diff --git a/documentation/migration-guides/release-notes-4.0.19.rst b/documentation/migration-guides/release-notes-4.0.19.rst
new file mode 100644
index 0000000000..e363f05d7d
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.19.rst
@@ -0,0 +1,159 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.19 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.19
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- bluez5: Fix :cve_nist:`2023-27349`, :cve_nist:`2023-50229` and :cve_nist:`2023-50230`
10- ghostscript: Fix :cve_nist:`2023-52722`, :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871`
11- git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465`
12- glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602`
13- gnutls: Fix :cve_nist:`2024-28834` and :cve_nist:`2024-28835`
14- go: Fix :cve_nist:`2023-45288`
15- gstreamer1.0-plugins-bad: Fix :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_mitre:`2024-0444`
16- less: Fix :cve_nist:`2024-32487`
17- libarchive: Fix :cve_nist:`2024-26256`
18- libarchive: Fix multiple null deference and heap overflow in pax writer (no CVE assigned)
19- linux-yocto/5.15: Fix :cve_nist:`2023-6270`, :cve_nist:`2023-7042`, :cve_nist:`2023-52447`, :cve_nist:`2023-52620`, :cve_nist:`2024-22099`, :cve_nist:`2024-26622`, :cve_nist:`2024-26651`, :cve_nist:`2024-26659`, :cve_nist:`2024-26688`, :cve_nist:`2024-26782`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26793`, :cve_nist:`2024-26795`, :cve_nist:`2024-26798`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805` and :cve_nist:`2024-26809`
20- linux-yocto/5.15: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179` and :cve_nist:`2021-47180`
21- linux-yocto/5.15 (cont.): Ignore :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48629`, :cve_nist:`2022-48630`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-52434`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52507`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52531`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52570`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52583`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0565`, :cve_nist:`2024-0841`, :cve_nist:`2024-23196`, :cve_nist:`2024-26587`, :cve_nist:`2024-26588`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26643`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26649`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26660`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26766`, :cve_nist:`2024-26769`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26783`, :cve_nist:`2024-26785`, :cve_nist:`2024-26786`, :cve_nist:`2024-26792`, :cve_nist:`2024-26794`, :cve_nist:`2024-26796`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26807` and :cve_nist:`2024-26808`
22- ncurses: Fix :cve_nist:`2023-45918`
23- ofono: Fix :cve_nist:`2023-4233` and :cve_nist:`2023-4234`
24- openssl: Fix :cve_nist:`2024-4603`
25- util-linux: Fix :cve_nist:`2024-28085`
26- xserver-xorg: Fix :cve_nist:`2024-31082` and :cve_nist:`2024-31083`
27
28
29Fixes in Yocto-4.0.19
30~~~~~~~~~~~~~~~~~~~~~
31
32- binutils: Rename CVE-2022-38126 patch to :cve_nist:`2022-35205`
33- bitbake: parse: Improve/fix cache invalidation via mtime
34- build-appliance-image: Update to kirkstone head revision
35- go-mod.bbclass: do not pack go mod cache
36- dev-manual: update custom distribution section
37- docs: poky.yaml.in: drop mesa/sdl from essential host packages
38- docs: standards.md: align with master branch
39- glibc: Update to latest on stable 2.35 branch (54a666dc5c...)
40- go.bbclass: fix path to linker in native Go builds
41- go.bbclass: Always pass interpreter to linker
42- initscripts: Add custom mount args for /var/lib
43- kernel.bbclass: check if directory exists before removing empty module directory
44- libpciaccess: Remove duplicated license entry
45- linux-yocto/5.15: cfg: remove obselete CONFIG_NFSD_V3 option
46- linux-yocto/5.15: update to v5.15.157
47- migration-notes: add release notes for 4.0.18
48- poky.conf: bump version for 4.0.19
49- ppp: Add RSA-MD in :term:`LICENSE`
50- python3: Upgrade to 3.10.14
51- ref-manual: update releases.svg
52- ref-manual: variables: Update default :term:`INHERIT_DISTRO` value
53- rootfs-postcommands.bbclass: Only set DROPBEAR_RSAKEY_DIR once
54- systemd-systemctl: Fix WantedBy processing
55
56
57Known Issues in Yocto-4.0.19
58~~~~~~~~~~~~~~~~~~~~~~~~~~~~
59
60- N/A
61
62
63Contributors to Yocto-4.0.19
64~~~~~~~~~~~~~~~~~~~~~~~~~~~~
65
66- Alexander Kanavin
67- Archana Polampalli
68- Bhabu Bindu
69- Bob Henz
70- Bruce Ashfield
71- Colin McAllister
72- Dmitry Baryshkov
73- Geoff Parker
74- Heiko Thole
75- Joerg Vehlow
76- Lee Chee Yang
77- Michael Glembotzki
78- Michael Opdenacker
79- Paul Eggleton
80- Peter Marko
81- Poonam Jadhav
82- Richard Purdie
83- Soumya Sambu
84- Stefan Herbrechtsmeier
85- Steve Sakoman
86- Vijay Anusuri
87- Yogita Urade
88
89
90Repositories / Downloads for Yocto-4.0.19
91~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92
93poky
94
95- Repository Location: :yocto_git:`/poky`
96- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
97- Tag: :yocto_git:`yocto-4.0.19 </poky/log/?h=yocto-4.0.19>`
98- Git Revision: :yocto_git:`e139e9d0ce343ba77a09601a976c92acd562c9df </poky/commit/?id=e139e9d0ce343ba77a09601a976c92acd562c9df>`
99- Release Artefact: poky-e139e9d0ce343ba77a09601a976c92acd562c9df
100- sha: 3e568af60ee599e262a359b50446c6cbe239481d8be2ee55403bda497735d636
101- Download Locations:
102 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.19/poky-e139e9d0ce343ba77a09601a976c92acd562c9df.tar.bz2
103 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.19/poky-e139e9d0ce343ba77a09601a976c92acd562c9df.tar.bz2
104
105openembedded-core
106
107- Repository Location: :oe_git:`/openembedded-core`
108- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
109- Tag: :oe_git:`yocto-4.0.19 </openembedded-core/log/?h=yocto-4.0.19>`
110- Git Revision: :oe_git:`ab2649ef6c83f0ae7cac554a72e6bea4dcda0e99 </openembedded-core/commit/?id=ab2649ef6c83f0ae7cac554a72e6bea4dcda0e99>`
111- Release Artefact: oecore-ab2649ef6c83f0ae7cac554a72e6bea4dcda0e99
112- sha: abc7601650651a2d2260f7e7e9e2e0709f25233148d66cb2d9481775b7b59a0c
113- Download Locations:
114 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.19/oecore-ab2649ef6c83f0ae7cac554a72e6bea4dcda0e99.tar.bz2
115 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.19/oecore-ab2649ef6c83f0ae7cac554a72e6bea4dcda0e99.tar.bz2
116
117meta-mingw
118
119- Repository Location: :yocto_git:`/meta-mingw`
120- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
121- Tag: :yocto_git:`yocto-4.0.19 </meta-mingw/log/?h=yocto-4.0.19>`
122- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
123- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
124- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
125- Download Locations:
126 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.19/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
127 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.19/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
128
129meta-gplv2
130
131- Repository Location: :yocto_git:`/meta-gplv2`
132- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
133- Tag: :yocto_git:`yocto-4.0.19 </meta-gplv2/log/?h=yocto-4.0.19>`
134- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
135- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
136- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
137- Download Locations:
138 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.19/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
139 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.19/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
140
141bitbake
142
143- Repository Location: :oe_git:`/bitbake`
144- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
145- Tag: :oe_git:`yocto-4.0.19 </bitbake/log/?h=yocto-4.0.19>`
146- Git Revision: :oe_git:`5a90927f31c4f9fccbe5d9d07d08e6e69485baa8 </bitbake/commit/?id=5a90927f31c4f9fccbe5d9d07d08e6e69485baa8>`
147- Release Artefact: bitbake-5a90927f31c4f9fccbe5d9d07d08e6e69485baa8
148- sha: e64b7f747718d10565d733057a8e6ee592c6b64983c7ffe623f9315ad35b6e0c
149- Download Locations:
150 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.19/bitbake-5a90927f31c4f9fccbe5d9d07d08e6e69485baa8.tar.bz2
151 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.19/bitbake-5a90927f31c4f9fccbe5d9d07d08e6e69485baa8.tar.bz2
152
153yocto-docs
154
155- Repository Location: :yocto_git:`/yocto-docs`
156- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
157- Tag: :yocto_git:`yocto-4.0.19 </yocto-docs/log/?h=yocto-4.0.19>`
158- Git Revision: :yocto_git:`78b8d5b18274a41ffec43ca4e136abc717585f6d </yocto-docs/commit/?id=78b8d5b18274a41ffec43ca4e136abc717585f6d>`
159
diff --git a/documentation/migration-guides/release-notes-4.0.2.rst b/documentation/migration-guides/release-notes-4.0.2.rst
index 2f724e33c4..57881fa359 100644
--- a/documentation/migration-guides/release-notes-4.0.2.rst
+++ b/documentation/migration-guides/release-notes-4.0.2.rst
@@ -6,13 +6,13 @@ Release notes for Yocto-4.0.2 (Kirkstone)
6Security Fixes in Yocto-4.0.2 6Security Fixes in Yocto-4.0.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- libxslt: Mark :cve:`2022-29824` as not applying 9- libxslt: Mark :cve_nist:`2022-29824` as not applying
10- tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve:`2022-1210` 10- tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve_nist:`2022-1210`
11- tiff: mark :cve:`2022-1622` and :cve:`2022-1623` as invalid 11- tiff: mark :cve_nist:`2022-1622` and :cve_nist:`2022-1623` as invalid
12- pcre2:fix :cve:`2022-1586` Out-of-bounds read 12- pcre2:fix :cve_nist:`2022-1586` Out-of-bounds read
13- curl: fix :cve:`2022-22576`, :cve:`2022-27775`, :cve:`2022-27776`, :cve:`2022-27774`, :cve:`2022-30115`, :cve:`2022-27780`, :cve:`2022-27781`, :cve:`2022-27779` and :cve:`2022-27782` 13- curl: fix :cve_nist:`2022-22576`, :cve_nist:`2022-27775`, :cve_nist:`2022-27776`, :cve_nist:`2022-27774`, :cve_nist:`2022-30115`, :cve_nist:`2022-27780`, :cve_nist:`2022-27781`, :cve_nist:`2022-27779` and :cve_nist:`2022-27782`
14- qemu: fix :cve:`2021-4206` and :cve:`2021-4207` 14- qemu: fix :cve_nist:`2021-4206` and :cve_nist:`2021-4207`
15- freetype: fix :cve:`2022-27404`, :cve:`2022-27405` and :cve:`2022-27406` 15- freetype: fix :cve_nist:`2022-27404`, :cve_nist:`2022-27405` and :cve_nist:`2022-27406`
16 16
17Fixes in Yocto-4.0.2 17Fixes in Yocto-4.0.2
18~~~~~~~~~~~~~~~~~~~~ 18~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.20.rst b/documentation/migration-guides/release-notes-4.0.20.rst
new file mode 100644
index 0000000000..d0f95fff50
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.20.rst
@@ -0,0 +1,130 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.20 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.20
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- acpica: Fix :cve_nist:`2024-24856`
10- glib-2.0: Fix :cve_nist:`2024-34397`
11- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453`
12- libxml2: Fix :cve_nist:`2024-34459`
13- openssh: fix :cve_nist:`2024-6387`
14- openssl: Fix :cve_mitre:`2024-4741` and :cve_nist:`2024-5535`
15- ruby: fix :cve_nist:`2024-27280`
16- wget: Fix for :cve_nist:`2024-38428`
17
18
19Fixes in Yocto-4.0.20
20~~~~~~~~~~~~~~~~~~~~~
21
22- bitbake: tests/fetch: Tweak test to match upstream repo url change Upstream changed their urls, update our test to match.
23- build-appliance-image: Update to kirkstone head revision
24- glibc-tests: Add missing bash ptest dependency
25- glibc-tests: correctly pull in the actual tests when installing -ptest package
26- glibc: stable 2.35 branch updates
27- gobject-introspection: Do not hardcode objdump name
28- linuxloader: add -armhf on arm only for :term:`TARGET_FPU` 'hard'
29- man-pages: add an alternative link name for crypt_r.3
30- man-pages: remove conflict pages
31- migration-guides: add release notes for 4.0.19
32- openssl: Upgrade 3.0.13 -> 3.0.14
33- poky.conf: bump version for 4.0.20
34
35
36Known Issues in Yocto-4.0.20
37~~~~~~~~~~~~~~~~~~~~~~~~~~~~
38
39- N/A
40
41
42Contributors to Yocto-4.0.20
43~~~~~~~~~~~~~~~~~~~~~~~~~~~~
44
45- Archana Polampalli
46- Changqing Li
47- Deepthi Hemraj
48- Jonas Gorski
49- Jose Quaresma
50- Khem Raj
51- Lee Chee Yang
52- Peter Marko
53- Poonam Jadhav
54- Siddharth Doshi
55- Steve Sakoman
56- Thomas Perrot
57- Vijay Anusuri
58- Yogita Urade
59
60
61Repositories / Downloads for Yocto-4.0.20
62~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
63
64poky
65
66- Repository Location: :yocto_git:`/poky`
67- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
68- Tag: :yocto_git:`yocto-4.0.20 </poky/log/?h=yocto-4.0.20>`
69- Git Revision: :yocto_git:`6bd3969d32730538608e680653e032e66958fe84 </poky/commit/?id=6bd3969d32730538608e680653e032e66958fe84>`
70- Release Artefact: poky-6bd3969d32730538608e680653e032e66958fe84
71- sha: b7ef1bd5ba1af257c4eb07a59b51d69e147723aea010eb2da99ea30dcbbbe2d9
72- Download Locations:
73 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.20/poky-6bd3969d32730538608e680653e032e66958fe84.tar.bz2
74 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.20/poky-6bd3969d32730538608e680653e032e66958fe84.tar.bz2
75
76openembedded-core
77
78- Repository Location: :oe_git:`/openembedded-core`
79- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
80- Tag: :oe_git:`yocto-4.0.20 </openembedded-core/log/?h=yocto-4.0.20>`
81- Git Revision: :oe_git:`5d97b0576e98a2cf402abab1a1edcab223545d87 </openembedded-core/commit/?id=5d97b0576e98a2cf402abab1a1edcab223545d87>`
82- Release Artefact: oecore-5d97b0576e98a2cf402abab1a1edcab223545d87
83- sha: 4064a32b8ff1ad8a98aa15e75b27585d2b27236c8cdfa4a28af6d6fef99b93c0
84- Download Locations:
85 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.20/oecore-5d97b0576e98a2cf402abab1a1edcab223545d87.tar.bz2
86 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.20/oecore-5d97b0576e98a2cf402abab1a1edcab223545d87.tar.bz2
87
88meta-mingw
89
90- Repository Location: :yocto_git:`/meta-mingw`
91- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
92- Tag: :yocto_git:`yocto-4.0.20 </meta-mingw/log/?h=yocto-4.0.20>`
93- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
94- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
95- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
96- Download Locations:
97 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.20/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
98 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.20/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
99
100meta-gplv2
101
102- Repository Location: :yocto_git:`/meta-gplv2`
103- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
104- Tag: :yocto_git:`yocto-4.0.20 </meta-gplv2/log/?h=yocto-4.0.20>`
105- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
106- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
107- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
108- Download Locations:
109 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.20/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
110 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.20/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
111
112bitbake
113
114- Repository Location: :oe_git:`/bitbake`
115- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
116- Tag: :oe_git:`yocto-4.0.20 </bitbake/log/?h=yocto-4.0.20>`
117- Git Revision: :oe_git:`734b0ea3dfe45eb16ee60f0c2c388e22af4040e0 </bitbake/commit/?id=734b0ea3dfe45eb16ee60f0c2c388e22af4040e0>`
118- Release Artefact: bitbake-734b0ea3dfe45eb16ee60f0c2c388e22af4040e0
119- sha: 99f4c6786fec790fd6c4577b5dea3c97c580cc4815bd409ce554a68ee99b0180
120- Download Locations:
121 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.20/bitbake-734b0ea3dfe45eb16ee60f0c2c388e22af4040e0.tar.bz2
122 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.20/bitbake-734b0ea3dfe45eb16ee60f0c2c388e22af4040e0.tar.bz2
123
124yocto-docs
125
126- Repository Location: :yocto_git:`/yocto-docs`
127- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
128- Tag: :yocto_git:`yocto-4.0.20 </yocto-docs/log/?h=yocto-4.0.20>`
129- Git Revision: :yocto_git:`b15b1d369edf33cd91232fefa0278e7e89653a01 </yocto-docs/commit/?id=b15b1d369edf33cd91232fefa0278e7e89653a01>`
130
diff --git a/documentation/migration-guides/release-notes-4.0.21.rst b/documentation/migration-guides/release-notes-4.0.21.rst
new file mode 100644
index 0000000000..abf2199ee5
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.21.rst
@@ -0,0 +1,166 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.21 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.21
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- bind: Fix :cve_nist:`2024-4076`, :cve_nist:`2024-1737`, :cve_nist:`2024-0760` and :cve_nist:`2024-1975`
10- apr: Fix :cve_nist:`2023-49582`
11- busybox: Fix :cve_nist:`2023-42363`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2023-42366` and :cve_nist:`2021-42380`
12- curl: Ignore :cve_nist:`2024-32928`
13- curl: Fix :cve_nist:`2024-7264`
14- ghostscript: Fix :cve_nist:`2024-29506`, :cve_nist:`2024-29509` and :cve_nist:`2024-29511`
15- go: Fix :cve_nist:`2024-24789` and :cve_nist:`2024-24791`
16- gtk+3: Fix :cve_nist:`2024-6655`
17- libarchive: Ignore :cve_nist:`2024-37407`
18- libyaml: Ignore :cve_nist:`2024-35325`, :cve_nist:`2024-35326` and :cve_nist:`2024-35328`
19- linux-yocto/5.15: Fix :cve_nist:`2022-48772`, :cve_nist:`2024-35972`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36897`, :cve_nist:`2024-36938`, :cve_nist:`2024-36965`, :cve_nist:`2024-36967`, :cve_nist:`2024-36969`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38571`, :cve_nist:`2024-38583`, :cve_nist:`2024-38591`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38600`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39277`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39466`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39493`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40911`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40954`, :cve_nist:`2024-40956`, :cve_nist:`2024-40957`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40967`, :cve_nist:`2024-40970`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40994`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41002`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41055`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41073`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41093`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42068`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42080`, :cve_nist:`2024-42082`, :cve_nist:`2024-42085`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42109`, :cve_nist:`2024-42140`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42225`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247`
20- llvm: Fix :cve_nist:`2023-46049` and :cve_nist:`2024-31852`
21- ofono: fix :cve_nist:`2023-2794`
22- orc: Fix :cve_nist:`2024-40897`
23- python3-certifi: Fix :cve_nist:`2024-39689`
24- python3-jinja2: Fix :cve_nist:`2024-34064`
25- python3: Fix :cve_nist:`2024-8088`
26- qemu: Fix :cve_nist:`2024-7409`
27- ruby: Fix for :cve_nist:`2024-27282`
28- tiff: Fix :cve_nist:`2024-7006`
29- vim: Fix :cve_nist:`2024-22667`, :cve_nist:`2024-41957`, :cve_nist:`2024-41965` and :cve_nist:`2024-43374`
30- wpa-supplicant: Fix :cve_nist:`2023-52160`
31
32
33Fixes in Yocto-4.0.21
34~~~~~~~~~~~~~~~~~~~~~
35
36- apr: upgrade to 1.7.5
37- bind: Upgrade to 9.18.28
38- bitbake: data_smart: Improve performance for VariableHistory
39- build-appliance-image: Update to kirkstone head revision
40- cryptodev-module: Fix build for linux 5.10.220
41- gcc-runtime: remove bashism
42- grub: fs/fat: Don't error when mtime is 0
43- image_types.bbclass: Use --force also with lz4,lzop
44- libsoup: fix compile error on centos7
45- linux-yocto/5.15: upgrade to v5.15.164
46- lttng-modules: Upgrade to 2.13.14
47- migration-guide: add release notes for 4.0.20
48- orc: upgrade to 0.4.39
49- poky.conf: bump version for 4.0.21
50- python3-jinja2: upgrade to 3.1.4
51- python3-pycryptodome(x): use python_setuptools_build_meta build class
52- python3: add PACKAGECONFIG[editline]
53- ref-manual: fix typo and move :term:`SYSROOT_DIRS` example
54- sqlite3: CVE_ID correction for :cve_nist:`2023-7104` as patched
55- sqlite3: Rename patch for :cve_nist:`2022-35737`
56- uboot-sign: Fix index error in concat_dtb_helper() with multiple configs
57- vim: upgrade to 9.1.0682
58- wireless-regdb: upgrade to 2024.07.04
59
60
61Known Issues in Yocto-4.0.21
62~~~~~~~~~~~~~~~~~~~~~~~~~~~~
63
64- N/A
65
66
67Contributors to Yocto-4.0.21
68~~~~~~~~~~~~~~~~~~~~~~~~~~~~
69
70- Archana Polampalli
71- Ashish Sharma
72- Bruce Ashfield
73- Deepthi Hemraj
74- Divya Chellam
75- Florian Amstutz
76- Guocai He
77- Hitendra Prajapati
78- Hugo SIMELIERE
79- Lee Chee Yang
80- Leon Anavi
81- Matthias Pritschet
82- Ming Liu
83- Niko Mauno
84- Peter Marko
85- Robert Yang
86- Rohini Sangam
87- Ross Burton
88- Siddharth Doshi
89- Soumya Sambu
90- Steve Sakoman
91- Vijay Anusuri
92- Vrushti Dabhi
93- Wang Mingyu
94- Yogita Urade
95
96
97Repositories / Downloads for Yocto-4.0.21
98~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99
100poky
101
102- Repository Location: :yocto_git:`/poky`
103- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
104- Tag: :yocto_git:`yocto-4.0.21 </poky/log/?h=yocto-4.0.21>`
105- Git Revision: :yocto_git:`4cdc553814640851cce85f84ee9c0b58646cd33b </poky/commit/?id=4cdc553814640851cce85f84ee9c0b58646cd33b>`
106- Release Artefact: poky-4cdc553814640851cce85f84ee9c0b58646cd33b
107- sha: 460e3a4ede491a9b66c5d262cd9498d5bcca1f2d880885342b08dc32b967f33d
108- Download Locations:
109 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2
110 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2
111
112openembedded-core
113
114- Repository Location: :oe_git:`/openembedded-core`
115- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
116- Tag: :oe_git:`yocto-4.0.21 </openembedded-core/log/?h=yocto-4.0.21>`
117- Git Revision: :oe_git:`c40a3fec49942ac6d25ba33e57e801a550e252c9 </openembedded-core/commit/?id=c40a3fec49942ac6d25ba33e57e801a550e252c9>`
118- Release Artefact: oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9
119- sha: afc2aaf312f9fb2590ae006615557ec605c98eff42bc380a1b2d6e39cfdf8930
120- Download Locations:
121 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2
122 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2
123
124meta-mingw
125
126- Repository Location: :yocto_git:`/meta-mingw`
127- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
128- Tag: :yocto_git:`yocto-4.0.21 </meta-mingw/log/?h=yocto-4.0.21>`
129- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
130- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
131- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
132- Download Locations:
133 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
134 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
135
136meta-gplv2
137
138- Repository Location: :yocto_git:`/meta-gplv2`
139- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
140- Tag: :yocto_git:`yocto-4.0.21 </meta-gplv2/log/?h=yocto-4.0.21>`
141- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
142- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
143- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
144- Download Locations:
145 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
146 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
147
148bitbake
149
150- Repository Location: :oe_git:`/bitbake`
151- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
152- Tag: :oe_git:`yocto-4.0.21 </bitbake/log/?h=yocto-4.0.21>`
153- Git Revision: :oe_git:`ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1 </bitbake/commit/?id=ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1>`
154- Release Artefact: bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1
155- sha: 1cb102f4c8dbd067f0262072e4e629ec7cb423103111ccdde75a09fcb8f55e5f
156- Download Locations:
157 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2
158 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2
159
160yocto-docs
161
162- Repository Location: :yocto_git:`/yocto-docs`
163- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
164- Tag: :yocto_git:`yocto-4.0.21 </yocto-docs/log/?h=yocto-4.0.21>`
165- Git Revision: :yocto_git:`512025edd9b3b6b8d0938b35bb6188c9f3b7f17d </yocto-docs/commit/?id=512025edd9b3b6b8d0938b35bb6188c9f3b7f17d>`
166
diff --git a/documentation/migration-guides/release-notes-4.0.22.rst b/documentation/migration-guides/release-notes-4.0.22.rst
new file mode 100644
index 0000000000..b2b98bd907
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.22.rst
@@ -0,0 +1,196 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.22 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.22
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- cups: Fix :cve_nist:`2024-35235` and :cve_nist:`2024-47175`
10- curl: Fix :cve_nist:`2024-8096`
11- expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492`
12- gnupg: Ignore :cve_nist:`2022-3219`
13- libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006`
14- linux-yocto/5.10: Fix :cve_nist:`2022-48772`, :cve_nist:`2023-52434`, :cve_nist:`2023-52447`, :cve_nist:`2023-52458`, :cve_nist:`2024-0841`, :cve_nist:`2024-26601`, :cve_nist:`2024-26882`, :cve_nist:`2024-26883`, :cve_nist:`2024-26884`, :cve_nist:`2024-26885`, :cve_nist:`2024-26898`, :cve_nist:`2024-26901`, :cve_nist:`2024-26903`, :cve_nist:`2024-26907`, :cve_nist:`2024-26934`, :cve_nist:`2024-26978`, :cve_nist:`2024-27013`, :cve_nist:`2024-27020`, :cve_nist:`2024-35972`, :cve_nist:`2024-35978`, :cve_nist:`2024-35982`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36902`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38583`, :cve_nist:`2024-38590`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40904`, :cve_nist:`2024-40905`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41012`, :cve_nist:`2024-41040`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41059`, :cve_nist:`2024-41063`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42082`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42131`, :cve_nist:`2024-42137`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247`
15- linux-yocto/5.15: Fix :cve_nist:`2023-52889`, :cve_nist:`2024-41011`, :cve_nist:`2024-42114`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`, :cve_nist:`2024-42277`, :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`, :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`, :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`, :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43817`, :cve_nist:`2024-43828`, :cve_nist:`2024-43854`, :cve_nist:`2024-43856`, :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43863`, :cve_nist:`2024-43871`, :cve_nist:`2024-43873`, :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`, :cve_nist:`2024-43894`, :cve_nist:`2024-43902`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43909`, :cve_nist:`2024-43914`, :cve_nist:`2024-44934`, :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44952`, :cve_nist:`2024-44954`, :cve_nist:`2024-44958`, :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44966`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`, :cve_nist:`2024-44982`, :cve_nist:`2024-44983`, :cve_nist:`2024-44985`, :cve_nist:`2024-44986`, :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`, :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`, :cve_nist:`2024-45006`, :cve_nist:`2024-45011`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`, :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`, :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`, :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702` and :cve_nist:`2024-46707`
16- openssl: Fix :cve_nist:`2024-6119`
17- procps: Fix :cve_nist:`2023-4016`
18- python3: Fix :cve_nist:`2023-27043`, :cve_nist:`2024-4030`, :cve_nist:`2024-4032`, :cve_nist:`2024-6923`, :cve_nist:`2024-6232`, :cve_nist:`2024-7592` and :cve_nist:`2024-8088`
19- qemu: Fix :cve_nist:`2024-4467`
20- rust: Ignore :cve_nist:`2024-43402`
21- webkitgtk: Fix :cve_nist:`2024-40779`
22- wpa-supplicant: Ignore :cve_nist:`2024-5290`
23- wpa-supplicant: Fix :cve_nist:`2024-3596`
24
25
26Fixes in Yocto-4.0.22
27~~~~~~~~~~~~~~~~~~~~~
28
29- bintuils: stable 2.38 branch update
30- bitbake: fetch2/wget: Canonicalize :term:`DL_DIR` paths for wget2 compatibility
31- bitbake: fetch/wget: Move files into place atomically
32- bitbake: hashserv: tests: Omit client in slow server start test
33- bitbake: tests/fetch: Tweak to work on Fedora40
34- bitbake: wget: Make wget --passive-ftp option conditional on ftp/ftps
35- build-appliance-image: Update to kirkstone head revision
36- buildhistory: Fix intermittent package file list creation
37- buildhistory: Restoring files from preserve list
38- buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage
39- busybox: Fix cut with "-s" flag
40- cdrtools-native: fix build with gcc-14
41- curl: free old conn better on reuse
42- cve-exclusion: Drop the version comparision/warning
43- dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only)
44- doc/features: remove duplicate word in distribution feature ext2
45- gcc: upgrade to v11.5
46- gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only)
47- glibc: stable 2.35 branch updates
48- install-buildtools: fix "test installation" step
49- install-buildtools: remove md5 checksum validation
50- install-buildtools: support buildtools-make-tarball and update to 4.1
51- iw: Fix :term:`LICENSE` (change to ISC)
52- kmscube: Add patch to fix -int-conversion build error
53- lib/oeqa: rename assertRaisesRegexp to assertRaisesRegex
54- libedit: Make docs generation deterministic
55- linux-yocto/5.10: fix NFSV3 config warning
56- linux-yocto/5.10: remove obsolete options
57- linux-yocto/5.10: update to v5.10.223
58- linux-yocto/5.15: update to v5.15.166
59- meta-world-pkgdata: Inherit nopackages
60- migration-guide: add release notes for 4.0.21
61- openssl: Upgrade to 3.0.15
62- poky.conf: bump version for 4.0.22
63- populate_sdk_base: inherit nopackages
64- python3: Upgrade to 3.10.15
65- ruby: Make docs generation deterministic
66- runqemu: keep generating tap devices
67- scripts/install-buildtools: Update to 4.0.21
68- selftest/runtime_test/virgl: Disable for all fedora
69- testexport: fallback for empty :term:`IMAGE_LINK_NAME`
70- testimage: fallback for empty :term:`IMAGE_LINK_NAME`
71- tiff: Fix :term:`LICENSE` (change to libtiff)
72- udev-extraconf: Add collect flag to mount
73- unzip: Fix :term:`LICENSE` (change to Info-ZIP)
74- valgrind: disable avx_estimate_insn.vgtest
75- wpa-supplicant: Patch security advisory 2024-2
76- yocto-uninative: Update to 4.5 for gcc 14
77- yocto-uninative: Update to 4.6 for glibc 2.40
78- zip: Fix :term:`LICENSE` (change to Info-ZIP)
79- zstd: fix :term:`LICENSE` statement (change to "BSD-3-Clause | GPL-2.0-only")
80
81
82Known Issues in Yocto-4.0.22
83~~~~~~~~~~~~~~~~~~~~~~~~~~~~
84
85- ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the ``parselogs``
86 runtime test due to unexpected kernel error messages in the log (see
87 :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla).
88
89
90Contributors to Yocto-4.0.22
91~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92
93- Aleksandar Nikolic
94- Alexandre Belloni
95- Archana Polampalli
96- Bruce Ashfield
97- Colin McAllister
98- Deepthi Hemraj
99- Divya Chellam
100- Hitendra Prajapati
101- Hugo SIMELIERE
102- Jinfeng Wang
103- Joshua Watt
104- Jörg Sommer
105- Konrad Weihmann
106- Lee Chee Yang
107- Martin Jansa
108- Massimiliano Minella
109- Michael Halstead
110- Mingli Yu
111- Niko Mauno
112- Paul Eggleton
113- Pedro Ferreira
114- Peter Marko
115- Purushottam Choudhary
116- Richard Purdie
117- Rob Woolley
118- Rohini Sangam
119- Ross Burton
120- Rudolf J Streif
121- Siddharth Doshi
122- Steve Sakoman
123- Vijay Anusuri
124- Vivek Kumbhar
125
126
127Repositories / Downloads for Yocto-4.0.22
128~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
129
130poky
131
132- Repository Location: :yocto_git:`/poky`
133- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
134- Tag: :yocto_git:`yocto-4.0.22 </poky/log/?h=yocto-4.0.22>`
135- Git Revision: :yocto_git:`7e87dc422d972e0dc98372318fcdc63a76347d16 </poky/commit/?id=7e87dc422d972e0dc98372318fcdc63a76347d16>`
136- Release Artefact: poky-7e87dc422d972e0dc98372318fcdc63a76347d16
137- sha: 5058e7b2474f8cb73c19e776ef58d9784321ef42109d5982747c8c432531239f
138- Download Locations:
139 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2
140 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2
141
142openembedded-core
143
144- Repository Location: :oe_git:`/openembedded-core`
145- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
146- Tag: :oe_git:`yocto-4.0.22 </openembedded-core/log/?h=yocto-4.0.22>`
147- Git Revision: :oe_git:`f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf </openembedded-core/commit/?id=f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf>`
148- Release Artefact: oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf
149- sha: 378bcc840ba9fbf06a15fea1b5dacdd446f3ad4d85115d708e7bbb20629cdeb4
150- Download Locations:
151 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2
152 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2
153
154meta-mingw
155
156- Repository Location: :yocto_git:`/meta-mingw`
157- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
158- Tag: :yocto_git:`yocto-4.0.22 </meta-mingw/log/?h=yocto-4.0.22>`
159- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
160- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
161- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
162- Download Locations:
163 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
164 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
165
166meta-gplv2
167
168- Repository Location: :yocto_git:`/meta-gplv2`
169- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
170- Tag: :yocto_git:`yocto-4.0.22 </meta-gplv2/log/?h=yocto-4.0.22>`
171- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
172- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
173- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
174- Download Locations:
175 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
176 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
177
178bitbake
179
180- Repository Location: :oe_git:`/bitbake`
181- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
182- Tag: :oe_git:`yocto-4.0.22 </bitbake/log/?h=yocto-4.0.22>`
183- Git Revision: :oe_git:`eb5c1ce6b1b8f33535ff7b9263ec7648044163ea </bitbake/commit/?id=eb5c1ce6b1b8f33535ff7b9263ec7648044163ea>`
184- Release Artefact: bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea
185- sha: 473d3e9539160633f3de9d88cce69123f6c623e4c8ab35beb7875868564593cf
186- Download Locations:
187 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2
188 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2
189
190yocto-docs
191
192- Repository Location: :yocto_git:`/yocto-docs`
193- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
194- Tag: :yocto_git:`yocto-4.0.22 </yocto-docs/log/?h=yocto-4.0.22>`
195- Git Revision: :yocto_git:`2169a52a24ebd1906039c42632bae6c4285a3aca </yocto-docs/commit/?id=2169a52a24ebd1906039c42632bae6c4285a3aca>`
196
diff --git a/documentation/migration-guides/release-notes-4.0.23.rst b/documentation/migration-guides/release-notes-4.0.23.rst
new file mode 100644
index 0000000000..abf7c69759
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.23.rst
@@ -0,0 +1,209 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.23 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.23
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- ``curl``: Fix :cve_nist:`2024-9681`
10- ``expat``: Fix :cve_nist:`2024-50602`
11- ``gcc``: Ignore :cve_nist:`2023-4039`
12- ``ghostscript``: Fix :cve_nist:`2023-46361` and :cve_nist:`2024-29508`
13- ``gstreamer1.0``: Ignore :cve_nist:`2024-0444`
14- ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958`
15- ``openssl``: Fix :cve_nist:`2024-9143`
16- ``orc``: Fix :cve_nist:`2024-40897`
17- ``python3``: Ignore :cve_nist:`2023-27043`, :cve_nist:`2024-6232` and :cve_nist:`2024-7592`
18- ``qemu``: Fix :cve_nist:`2023-3019`
19- ``vim``: Fix :cve_nist:`2024-43790`, :cve_nist:`2024-43802`, :cve_nist:`2024-45306` and :cve_nist:`2024-47814`
20- ``zstd``: Fix :cve_nist:`2022-4899`
21
22
23Fixes in Yocto-4.0.23
24~~~~~~~~~~~~~~~~~~~~~
25
26- at-spi2-core: backport a patch to fix build with gcc-14 on host
27- bitbake: bitbake: doc/user-manual: Update the BB_HASHSERVE_UPSTREAM
28- bitbake: codeparser: Fix handling of string AST nodes with older Python versions
29- bitbake: fetch2/git: Use quote from shlex, not pipes
30- bitbake: gitsm: Add call_process_submodules() to remove duplicated code
31- bitbake: gitsm: Remove downloads/tmpdir when failed
32- bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab
33- bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab
34- bmap-tools: update :term:`HOMEPAGE` and :term:`SRC_URI`
35- build-appliance-image: Update to kirkstone head revision
36- cmake: Fix sporadic issues when determining compiler internals
37- cracklib: Modify patch to compile with GCC 14
38- cve-check: add CVSS vector string to CVE database and reports
39- cve-check: add support for cvss v4.0
40- cve_check: Use a local copy of the database during builds
41- dev-manual: document how to provide confs from layer.conf
42- documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint
43- documentation: Makefile: fix epub and latexpdf targets
44- documentation: README: add instruction to run Vale on a subset
45- documentation: brief-yoctoprojectqs: update BB_HASHSERVE_UPSTREAM for new infrastructure
46- documentation: conf.py: add a bitbake_git extlink
47- documentation: rename :cve: role to :cve_nist:
48- documentation: styles: vocabularies: Yocto: add sstate
49- documnetation: contributor-guide: Remove duplicated words
50- gcc: restore a patch for Neoverse N2 core
51- glib-2.0: patch regression of :cve_nist:`2023-32665`
52- kmscube: create_framebuffer: backport modifier fix
53- libffi: backport a fix to build libffi-native with gcc-14
54- linux-firmware: Upgrade to 20240909
55- local.conf.sample: update BB_HASHSERVE_UPSTREAM for new infrastructure
56- migration-guide: add release notes for 4.0.22
57- migration-guide: release-notes-4.0: update BB_HASHSERVE_UPSTREAM for new infrastructure
58- nativesdk-intercept: Fix bad intercept chgrp/chown logic
59- orc: Upgrade to 0.4.40
60- overlayfs-etc: add option to skip creation of mount dirs
61- overview-manual: concepts: add details on package splitting
62- package: Switch debug source handling to use prefix map
63- patch.py: Use shlex instead of deprecated pipe
64- poky.conf: bump version for 4.0.23
65- pseudo: Disable LFS on 32bit arches
66- pseudo: Fix envp bug and add posix_spawn wrapper
67- pseudo: Fix to work with glibc 2.40
68- pseudo: Switch back to the master branch
69- pseudo: Update to include logic fix
70- pseudo: Update to include open symlink handling bugfix
71- pseudo: Update to pull in fchmodat fix
72- pseudo: Update to pull in fd leak fix
73- pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept
74- pseudo: Update to pull in linux-libc-headers race fix
75- pseudo: Update to pull in python 3.12+ fix
76- pseudo: Update to pull in syncfs probe fix
77- ref-manual: add description for the "sysroot" term
78- ref-manual: add missing CVE_CHECK manifest variables
79- ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable
80- ref-manual: add missing :term:`OPKGBUILDCMD` variable
81- ref-manual: devtool-reference: document missing commands
82- ref-manual: devtool-reference: refresh example outputs
83- ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable
84- ref-manual: release-process: add a reference to the doc's release
85- ref-manual: release-process: refresh the current LTS releases
86- ref-manual: release-process: update releases.svg
87- ref-manual: release-process: update releases.svg with month after "Current"
88- ref-manual: structure.rst: document missing tmp/ dirs
89- ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables
90- syslinux: Disable error on implicit-function-declaration
91- util-linux: Define pidfd_* function signatures
92- vala: add -Wno-error=incompatible-pointer-types work around
93- vim: Upgrade to 9.1.0764
94- xmlto: backport a patch to fix build with gcc-14 on host
95- zip: Fix build with gcc-14
96- zip: Make configure checks to be more robust
97
98
99Known Issues in Yocto-4.0.23
100~~~~~~~~~~~~~~~~~~~~~~~~~~~~
101
102-N/A
103
104
105Contributors to Yocto-4.0.23
106~~~~~~~~~~~~~~~~~~~~~~~~~~~~
107
108- Aleksandar Nikolic
109- Alexandre Belloni
110- Antoine Lubineau
111- Antonin Godard
112- Archana Polampalli
113- Ashish Sharma
114- Baruch Siach
115- Eilís 'pidge' Ní Fhlannagáin
116- Jose Quaresma
117- Julien Stephan
118- Khem Raj
119- Lee Chee Yang
120- Macpaul Lin
121- Martin Jansa
122- Michael Opdenacker
123- Ola x Nilsson
124- Peter Marko
125- Philip Lorenz
126- Randolph Sapp
127- Richard Purdie
128- Robert Yang
129- Rohini Sangam
130- Ruiqiang Hao
131- Siddharth Doshi
132- Steve Sakoman
133- Talel BELHAJSALEM
134- Wang Mingyu
135- Yogita Urade
136- Zoltan Boszormenyi
137
138
139Repositories / Downloads for Yocto-4.0.23
140~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
141
142poky
143
144- Repository Location: :yocto_git:`/poky`
145- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
146- Tag: :yocto_git:`yocto-4.0.23 </poky/log/?h=yocto-4.0.23>`
147- Git Revision: :yocto_git:`8e092852b63e998d990b8f8e1aa91297dec4430f </poky/commit/?id=8e092852b63e998d990b8f8e1aa91297dec4430f>`
148- Release Artefact: poky-8e092852b63e998d990b8f8e1aa91297dec4430f
149- sha: 339d34d8432070dac948449e732ebf06a888eeb27ff548958b2395c9446b029d
150- Download Locations:
151 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2
152 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2
153
154openembedded-core
155
156- Repository Location: :oe_git:`/openembedded-core`
157- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
158- Tag: :oe_git:`yocto-4.0.23 </openembedded-core/log/?h=yocto-4.0.23>`
159- Git Revision: :oe_git:`fb45c5cf8c2b663af293acb069d446610f77ff1a </openembedded-core/commit/?id=fb45c5cf8c2b663af293acb069d446610f77ff1a>`
160- Release Artefact: oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a
161- sha: 1d394370ea7d43fb885ab8a952d6d1e43f1a850745a5152d5ead5565a283a0f5
162- Download Locations:
163 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2
164 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2
165
166meta-mingw
167
168- Repository Location: :yocto_git:`/meta-mingw`
169- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
170- Tag: :yocto_git:`yocto-4.0.23 </meta-mingw/log/?h=yocto-4.0.23>`
171- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
172- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
173- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
174- Download Locations:
175 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
176 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
177
178meta-gplv2
179
180- Repository Location: :yocto_git:`/meta-gplv2`
181- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
182- Tag: :yocto_git:`yocto-4.0.23 </meta-gplv2/log/?h=yocto-4.0.23>`
183- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
184- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
185- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
186- Download Locations:
187 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
188 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
189
190bitbake
191
192- Repository Location: :oe_git:`/bitbake`
193- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
194- Tag: :oe_git:`yocto-4.0.23 </bitbake/log/?h=yocto-4.0.23>`
195- Git Revision: :oe_git:`fb73c495c45d1d4107cfd60b67a5b4f11a99647b </bitbake/commit/?id=fb73c495c45d1d4107cfd60b67a5b4f11a99647b>`
196- Release Artefact: bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b
197- sha: 5cd271299951f25912a2e8d4de6d8769a4c0bb3bbcfc90815be41f23fd299a0b
198- Download Locations:
199 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2
200 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2
201
202yocto-docs
203
204- Repository Location: :yocto_git:`/yocto-docs`
205- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
206- Tag: :yocto_git:`yocto-4.0.23 </yocto-docs/log/?h=yocto-4.0.23>`
207- Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>`
208
209
diff --git a/documentation/migration-guides/release-notes-4.0.24.rst b/documentation/migration-guides/release-notes-4.0.24.rst
new file mode 100644
index 0000000000..33372dc89e
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.24.rst
@@ -0,0 +1,383 @@
1Release notes for Yocto-4.0.24 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.24
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- coreutils: Fix :cve_nist:`2024-0684`
8- cpio: Ignore :cve_nist:`2023-7216`
9- diffoscope: Fix :cve_nist:`2024-25711`
10- ffmpeg: fix :cve_mitre:`2023-47342`, :cve_nist:`2023-50007`, :cve_nist:`2023-50008`,
11 :cve_nist:`2023-51793`, :cve_nist:`2023-51794`, :cve_nist:`2023-51796`, :cve_nist:`2023-51798`,
12 :cve_nist:`2024-7055`, :cve_nist:`2024-31578`, :cve_nist:`2024-31582`, :cve_nist:`2024-32230`,
13 :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368`
14- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
15 :cve_nist:`2024-46955` and :cve_nist:`2024-46956`
16- ghostscript: Ignore :cve_nist:`2024-46954`
17- glib-2.0: Fix :cve_nist:`2024-52533`
18- gnupg: Ignore :cve_nist:`2022-3515`
19- grub: Ignore :cve_nist:`2024-1048` and :cve_nist:`2023-4001`
20- gstreame1.0: Ignore :cve_nist:`2023-40474`, :cve_nist:`2023-40475`, :cve_nist:`2023-40476`,
21 :cve_nist:`2023-44429`, :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_nist:`2024-0444`
22- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
23 :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
24 and :cve_nist:`2024-47835`
25- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
26 :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
27 :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
28 :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
29 :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
30 :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
31- gstreamer1.0: Fix :cve_nist:`2024-47606`
32- libarchive: Fix :cve_nist:`2024-20696`
33- libpam: Fix :cve_nist:`2024-10041`
34- libsdl2: Ignore :cve_nist:`2020-14409` and :cve_nist:`2020-14410`
35- libsndfile1: Fix :cve_nist:`2022-33065` and :cve_nist:`2024-50612`
36- libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
37- libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
38- linux-yocto/5.10: Fix :cve_nist:`2023-52889`, :cve_nist:`2023-52917`, :cve_nist:`2023-52918`,
39 :cve_nist:`2024-41011`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`,
40 :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`,
41 :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`,
42 :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`,
43 :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43828`, :cve_nist:`2024-43856`,
44 :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43871`,
45 :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`,
46 :cve_nist:`2024-43894`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43914`,
47 :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44954`,
48 :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`,
49 :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`,
50 :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`,
51 :cve_nist:`2024-45006`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`,
52 :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`,
53 :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`,
54 :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702`,
55 :cve_nist:`2024-46707`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
56 :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
57 :cve_nist:`2024-46731`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`,
58 :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46747`,
59 :cve_nist:`2024-46750`, :cve_nist:`2024-46755`, :cve_nist:`2024-46759`, :cve_nist:`2024-46761`,
60 :cve_nist:`2024-46763`, :cve_nist:`2024-46771`, :cve_nist:`2024-46777`, :cve_nist:`2024-46780`,
61 :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46791`,
62 :cve_nist:`2024-46798`, :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46814`,
63 :cve_nist:`2024-46815`, :cve_nist:`2024-46817`, :cve_nist:`2024-46818`, :cve_nist:`2024-46819`,
64 :cve_nist:`2024-46822`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46832`,
65 :cve_nist:`2024-46840`, :cve_nist:`2024-46844`, :cve_nist:`2024-47659`, :cve_nist:`2024-47660`,
66 :cve_nist:`2024-47663`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`,
67 :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47692`,
68 :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
69 :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
70 :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47723`, :cve_nist:`2024-47735`,
71 :cve_nist:`2024-47737`, :cve_nist:`2024-47739`, :cve_nist:`2024-47742`, :cve_nist:`2024-47747`,
72 :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47757`, :cve_nist:`2024-49851`,
73 :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`, :cve_nist:`2024-49867`,
74 :cve_nist:`2024-49868`, :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`,
75 :cve_nist:`2024-49879`, :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`,
76 :cve_nist:`2024-49884`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
77 :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
78 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
79 :cve_nist:`2024-49924`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`, :cve_nist:`2024-49936`,
80 :cve_nist:`2024-49938`, :cve_nist:`2024-49944`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`,
81 :cve_nist:`2024-49952`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
82 :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
83 :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
84 :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
85 :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50001`,
86 :cve_nist:`2024-50006`, :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`,
87 :cve_nist:`2024-50015`, :cve_nist:`2024-50024`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
88 :cve_nist:`2024-50039`, :cve_nist:`2024-50040`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`,
89 :cve_nist:`2024-50046`, :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50095`,
90 :cve_nist:`2024-50096`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`,
91 :cve_nist:`2024-50184` and :cve_nist:`2024-50188`
92- linux-yocto/5.15: Fix :cve_nist:`2022-48695`, :cve_nist:`2023-52530`, :cve_nist:`2023-52917`,
93 :cve_nist:`2024-45009`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
94 :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
95 :cve_nist:`2024-46731`, :cve_nist:`2024-46732`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`,
96 :cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`,
97 :cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46750`, :cve_nist:`2024-46755`,
98 :cve_nist:`2024-46759`, :cve_nist:`2024-46761`, :cve_nist:`2024-46763`, :cve_nist:`2024-46771`,
99 :cve_nist:`2024-46777`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`,
100 :cve_nist:`2024-46783`, :cve_nist:`2024-46791`, :cve_nist:`2024-46795`, :cve_nist:`2024-46798`,
101 :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46805`, :cve_nist:`2024-46807`,
102 :cve_nist:`2024-46810`, :cve_nist:`2024-46814`, :cve_nist:`2024-46815`, :cve_nist:`2024-46817`,
103 :cve_nist:`2024-46818`, :cve_nist:`2024-46819`, :cve_nist:`2024-46822`, :cve_nist:`2024-46828`,
104 :cve_nist:`2024-46829`, :cve_nist:`2024-46832`, :cve_nist:`2024-46840`, :cve_nist:`2024-46844`,
105 :cve_nist:`2024-47659`, :cve_nist:`2024-47660`, :cve_nist:`2024-47663`, :cve_nist:`2024-47665`,
106 :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47674`,
107 :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47690`,
108 :cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`,
109 :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
110 :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
111 :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47720`, :cve_nist:`2024-47723`,
112 :cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47737`, :cve_nist:`2024-47739`,
113 :cve_nist:`2024-47742`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`,
114 :cve_nist:`2024-47757`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49854`,
115 :cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`,
116 :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, :cve_nist:`2024-49871`,
117 :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`,
118 :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`,
119 :cve_nist:`2024-49886`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
120 :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
121 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
122 :cve_nist:`2024-49924`, :cve_nist:`2024-49927`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`,
123 :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49938`, :cve_nist:`2024-49944`,
124 :cve_nist:`2024-49946`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49952`,
125 :cve_nist:`2024-49954`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
126 :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
127 :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
128 :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
129 :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`,
130 :cve_nist:`2024-50001`, :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50006`,
131 :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`, :cve_nist:`2024-50015`,
132 :cve_nist:`2024-50019`, :cve_nist:`2024-50024`, :cve_nist:`2024-50031`, :cve_nist:`2024-50033`,
133 :cve_nist:`2024-50035`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
134 :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
135 :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50062`, :cve_nist:`2024-50074`,
136 :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50093`, :cve_nist:`2024-50095`,
137 :cve_nist:`2024-50096`, :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`,
138 :cve_nist:`2024-50110`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`, :cve_nist:`2024-50117`,
139 :cve_nist:`2024-50127`, :cve_nist:`2024-50128`, :cve_nist:`2024-50131`, :cve_nist:`2024-50134`,
140 :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, :cve_nist:`2024-50148`,
141 :cve_nist:`2024-50150`, :cve_nist:`2024-50151`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`,
142 :cve_nist:`2024-50156`, :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`,
143 :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`, :cve_nist:`2024-50179`,
144 :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, :cve_nist:`2024-50182`, :cve_nist:`2024-50184`,
145 :cve_nist:`2024-50185`, :cve_nist:`2024-50186`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`,
146 :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
147 :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`,
148 :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`,
149 :cve_nist:`2024-50229`, :cve_nist:`2024-50230`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`,
150 :cve_nist:`2024-50234`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50244`,
151 :cve_nist:`2024-50245`, :cve_nist:`2024-50247`, :cve_nist:`2024-50251`, :cve_nist:`2024-50257`,
152 :cve_nist:`2024-50259`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, :cve_nist:`2024-50265`,
153 :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, :cve_nist:`2024-50273`,
154 :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, :cve_nist:`2024-50287`,
155 :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`, :cve_nist:`2024-50301`,
156 :cve_nist:`2024-50302`, :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`,
157 :cve_nist:`2024-53058`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`,
158 :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53088`, :cve_nist:`2024-53096`,
159 :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53145`, :cve_nist:`2024-53146`,
160 :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`,
161 :cve_nist:`2024-53157`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`, :cve_nist:`2024-53173`,
162 :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`, :cve_nist:`2024-56567`,
163 :cve_nist:`2024-56572`, :cve_nist:`2024-56574`, :cve_nist:`2024-56578`, :cve_nist:`2024-56581`,
164 :cve_nist:`2024-56593`, :cve_nist:`2024-56600`, :cve_nist:`2024-56601`, :cve_nist:`2024-56602`,
165 :cve_nist:`2024-56603`, :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56614`,
166 :cve_nist:`2024-56622`, :cve_nist:`2024-56623`, :cve_nist:`2024-56629`, :cve_nist:`2024-56634`,
167 :cve_nist:`2024-56640`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`,
168 :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`, :cve_nist:`2024-56670`,
169 :cve_nist:`2024-56688`, :cve_nist:`2024-56694`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`,
170 :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, :cve_nist:`2024-56726`,
171 :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56745`,
172 :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`, :cve_nist:`2024-56754`,
173 :cve_nist:`2024-56756`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`, :cve_nist:`2024-56776`,
174 :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`, :cve_nist:`2024-56780`,
175 :cve_nist:`2024-56781`, :cve_nist:`2024-56785` and :cve_nist:`2024-56787`
176- ovmf: Fix :cve_nist:`2022-36763`, :cve_nist:`2022-36764`, :cve_nist:`2022-36765`,
177 :cve_nist:`2023-45229`, :cve_nist:`2023-45230`, :cve_nist:`2023-45231`, :cve_nist:`2023-45232`,
178 :cve_nist:`2023-45233`, :cve_nist:`2023-45234`, :cve_nist:`2023-45235`, :cve_nist:`2023-45236`,
179 :cve_nist:`2023-45237`, :cve_nist:`2024-1298` and :cve_nist:`2024-38796`
180- pixman: Ignore :cve_nist:`2023-37769`
181- python3: Fix :cve_nist:`2024-9287`, :cve_nist:`2024-11168` and :cve_nist:`2024-50602`
182- python3-pip: Fix :cve_nist:`2023-5752`
183- python3-requests: Fix :cve_nist:`2024-35195`
184- python3-zipp: Fix :cve_nist:`2024-5569`
185- qemu: Fix :cve_nist:`2024-3446`, :cve_nist:`2024-3447` and :cve_nist:`2024-6505`
186- qemu: Ignore :cve_nist:`2022-36648`
187- subversion: Fix :cve_nist:`2024-46901`
188- tiff: Fix :cve_nist:`2023-3164`
189- tiff: Ignore :cve_nist:`2023-2731`
190- webkitgtk: Fix :cve_nist:`2024-40776` and :cve_nist:`2024-40780`
191- xserver-xorg: Fix :cve_nist:`2024-9632`
192- xwayland: Fix :cve_nist:`2023-5380` and :cve_nist:`2024-0229`
193
194
195Fixes in Yocto-4.0.24
196~~~~~~~~~~~~~~~~~~~~~
197
198- base-passwd: Add the sgx group
199- base-passwd: Regenerate the patches
200- base-passwd: Update the status for two patches
201- base-passwd: Update to 3.5.52
202- base-passwd: add the wheel group
203- base-passwd: fix patchreview warning
204- bitbake: fetch2: use persist_data context managers
205- bitbake: fetch/wget: Increase timeout to 100s from 30s
206- bitbake: persist_data: close connection in SQLTable __exit__
207- build-appliance-image: Update to kirkstone head revision
208- builder: set :term:`CVE_PRODUCT`
209- contributor-guide: submit-changes.rst: suggest to remove the git signature
210- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
211- dbus: disable assertions and enable only modular tests
212- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
213- docs: Gather dependencies in poky.yaml.in
214- docs: standards.md: add a section on admonitions
215- gstreamer1.0: improve test reliability
216- linux-yocto/5.10: update to v5.10.227
217- linux-yocto/5.15: update to v5.15.175
218- llvm: reduce size of -dbg package
219- lttng-modules: fix build error after kernel update to 5.15.171
220- migration-guides: add release notes for 4.0.23
221- ninja: fix build with python 3.13
222- oeqa/utils/gitarchive: Return tag name and improve exclude handling
223- ovmf-native: remove .pyc files from install
224- package.bbclass: Use shlex instead of deprecated pipes
225- package_rpm: restrict rpm to 4 threads
226- package_rpm: use zstd's default compression level
227- poky.conf: add new tested distros
228- poky.conf: bump version for 4.0.24
229- poky.yaml.in: add missing locales dependency
230- python3: upgrade to 3.10.16
231- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
232- ref-manual: classes: fix bin_package description
233- ref-manual: devtool-reference: add warning note on deploy-target and shared objects
234- ref-manual: move runtime-testing section to the test-manual
235- ref-manual: packages: move ptest section to the test-manual
236- ref-manual: system-requirements: update list of supported distros
237- ref-manual: use standardized method accross both ubuntu and debian for locale install
238- resulttool: Add --logfile-archive option to store mode
239- resulttool: Allow store to filter to specific revisions
240- resulttool: Clean up repoducible build logs
241- resulttool: Fix passthrough of --all files in store mode
242- resulttool: Handle ltp rawlogs as well as ptest
243- resulttool: Improve repo layout for oeselftest results
244- resulttool: Trim the precision of duration information
245- resulttool: Use single space indentation in json output
246- rootfs-postcommands.bbclass: make opkg status reproducible
247- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
248- sanity: check for working user namespaces
249- scripts/install-buildtools: Update to 4.0.22
250- selftest/reproducible: Clean up pathnames
251- selftest/reproducible: Drop rawlogs
252- test-manual: reproducible-builds.rst: document :term:`OEQA_REPRODUCIBLE_TEST_TARGET` and
253 :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS`
254- test-manual: reproducible-builds.rst: show how to build a single package
255- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
256- tzdata & tzcode-native: upgrade 2024b
257- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
258- unzip: Fix configure tests to use modern C
259- webkitgtk: Fix build on 32bit arm
260- webkitgtk: fix perl-native dependency
261- webkitgtk: reduce size of -dbg package
262- wireless-regdb: upgrade to 2024.10.07
263
264
265Known Issues in Yocto-4.0.24
266~~~~~~~~~~~~~~~~~~~~~~~~~~~~
267
268- N/A
269
270Contributors to Yocto-4.0.24
271~~~~~~~~~~~~~~~~~~~~~~~~~~~~
272
273Thanks to the following people who contributed to this release:
274
275- Aleksandar Nikolic
276- Alex Kiernan
277- Alexander Kanavin
278- Alexandre Belloni
279- Antonin Godard
280- Archana Polampalli
281- Bruce Ashfield
282- Changqing Li
283- Chen Qi
284- Chris Laplante
285- Divya Chellam
286- Ernst Persson
287- Guénaël Muller
288- Hitendra Prajapati
289- Hongxu Jia
290- Jiaying Song
291- Jinfeng Wang
292- Khem Raj
293- Lee Chee Yang
294- Liyin Zhang
295- Louis Rannou
296- Markus Volk
297- Mikko Rapeli
298- Ovidiu Panait
299- Peter Kjellerstedt
300- Peter Marko
301- Regis Dargent
302- Richard Purdie
303- Rohini Sangam
304- Ross Burton
305- Soumya Sambu
306- Steve Sakoman
307- Trevor Gamblin
308- Vijay Anusuri
309- Wang Mingyu
310- Yogita Urade
311- Zahir Hussain
312
313
314Repositories / Downloads for Yocto-4.0.24
315~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
316
317poky
318
319- Repository Location: :yocto_git:`/poky`
320- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
321- Tag: :yocto_git:`yocto-4.0.24 </poky/log/?h=yocto-4.0.24>`
322- Git Revision: :yocto_git:`f50532593651dff82bc952288d786c55038c2c86 </poky/commit/?id=f50532593651dff82bc952288d786c55038c2c86>`
323- Release Artefact: poky-f50532593651dff82bc952288d786c55038c2c86
324- sha: 0aa062d19510394748db9a2d6ded2d764f435383296d9c94fb6b25755280556e
325- Download Locations:
326 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
327 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
328
329openembedded-core
330
331- Repository Location: :oe_git:`/openembedded-core`
332- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
333- Tag: :oe_git:`yocto-4.0.24 </openembedded-core/log/?h=yocto-4.0.24>`
334- Git Revision: :oe_git:`a270d4c957259761bcc7382fcc54642a02f9fc7d </openembedded-core/commit/?id=a270d4c957259761bcc7382fcc54642a02f9fc7d>`
335- Release Artefact: oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d
336- sha: b08b9b16c8ffa587d521ad28e24e38c79d757a6f0839d18165ebac3081a34b68
337- Download Locations:
338 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
339 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
340
341meta-mingw
342
343- Repository Location: :yocto_git:`/meta-mingw`
344- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
345- Tag: :yocto_git:`yocto-4.0.24 </meta-mingw/log/?h=yocto-4.0.24>`
346- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
347- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
348- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
349- Download Locations:
350 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
351 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
352
353meta-gplv2
354
355- Repository Location: :yocto_git:`/meta-gplv2`
356- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
357- Tag: :yocto_git:`yocto-4.0.24 </meta-gplv2/log/?h=yocto-4.0.24>`
358- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
359- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
360- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
361- Download Locations:
362 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
363 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
364
365bitbake
366
367- Repository Location: :oe_git:`/bitbake`
368- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
369- Tag: :oe_git:`yocto-4.0.24 </bitbake/log/?h=yocto-4.0.24>`
370- Git Revision: :oe_git:`3f88b005244a0afb5d5c7260e54a94a453ec9b3e </bitbake/commit/?id=3f88b005244a0afb5d5c7260e54a94a453ec9b3e>`
371- Release Artefact: bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e
372- sha: 31f442b72ec7d81ca75509b1a7179c3fe3942528b1e31c823b21a413244bd15b
373- Download Locations:
374 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
375 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
376
377yocto-docs
378
379- Repository Location: :yocto_git:`/yocto-docs`
380- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
381- Tag: :yocto_git:`yocto-4.0.24 </yocto-docs/log/?h=yocto-4.0.24>`
382- Git Revision: :yocto_git:`3128bf149f40928e6c2a3e264590a0c6c9778c6a </yocto-docs/commit/?id=3128bf149f40928e6c2a3e264590a0c6c9778c6a>`
383
diff --git a/documentation/migration-guides/release-notes-4.0.25.rst b/documentation/migration-guides/release-notes-4.0.25.rst
new file mode 100644
index 0000000000..e52f57913f
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.25.rst
@@ -0,0 +1,167 @@
1Release notes for Yocto-4.0.25 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.25
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- avahi: Fix :cve_nist:`2024-52616`
8- binutils: Fix :cve_nist:`2024-53589`
9- gdb: Fix :cve_nist:`2024-53589`
10- go: Fix :cve_nist:`2024-34155`, :cve_nist:`2024-34156`, :cve_nist:`2024-34158` and
11 :cve_nist:`2024-45336`
12- gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`,
13 :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`,
14 :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`,
15 :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`,
16 :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`,
17 :cve_nist:`2024-47777`, :cve_nist:`2024-47778`, :cve_nist:`2024-47834`, :cve_nist:`2024-47602`,
18 :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`
19 and :cve_nist:`2024-47776`
20- linux-yocto/5.15: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-55916`, :cve_nist:`2024-56369`,
21 :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56715`, :cve_nist:`2024-56716`,
22 :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57841`, :cve_nist:`2024-57890`,
23 :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`,
24 :cve_nist:`2024-57938`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21665`,
25 :cve_nist:`2025-21666`, :cve_nist:`2025-21669`, :cve_nist:`2025-21680`, :cve_nist:`2025-21683`,
26 :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
27- ofono: Fix :cve_nist:`2024-7539`, :cve_nist:`2024-7540`, :cve_nist:`2024-7541`,
28 :cve_nist:`2024-7542`, :cve_nist:`2024-7543`, :cve_nist:`2024-7544`, :cve_nist:`2024-7545`,
29 :cve_nist:`2024-7546` and :cve_nist:`2024-7547`
30- openssl: Fix :cve_nist:`2024-13176`
31- rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`,
32 :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747`
33- ruby: Fix :cve_nist:`2024-49761`
34- socat: Fix :cve_nist:`2024-54661`
35- vte: Fix :cve_nist:`2024-37535`
36- wget: Fix :cve_nist:`2024-10524`
37
38
39Fixes in Yocto-4.0.25
40~~~~~~~~~~~~~~~~~~~~~
41
42- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
43- build-appliance-image: Update to kirkstone head revision
44- classes-global/insane: Look up all runtime providers for file-rdeps
45- classes/nativesdk: also override :term:`TUNE_PKGARCH`
46- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
47- cmake: apply parallel build settings to ptest tasks
48- dev-manual/building: document the initramfs-framework recipe
49- docs: Update autobuilder URLs to valkyrie
50- documentation: Fix typo in standards.md
51- glibc: Suppress GCC -Os warning on user2netname for sunrpc
52- glibc: stable 2.35 branch updates
53- lib/packagedata.py: Add API to iterate over rprovides
54- linux-yocto/5.15: upgrade to v5.15.178
55- migration-guides: add release notes for 4.0.24
56- openssl: upgrade to 3.0.16
57- poky.conf: bump version for 4.0.25
58- python3: Treat UID/GID overflow as failure
59- rsync: Delete pedantic errors re-ordering patch
60- rsync: upgrade to 3.2.7
61- rust-common.bbclass: soft assignment for RUSTLIB path
62- scripts/install-buildtools: Update to 4.0.23
63- test-manual/reproducible-builds: fix reproducible links
64
65
66Known Issues in Yocto-4.0.25
67~~~~~~~~~~~~~~~~~~~~~~~~~~~~
68
69- N/A
70
71
72Contributors to Yocto-4.0.25
73~~~~~~~~~~~~~~~~~~~~~~~~~~~~
74
75- Aleksandar Nikolic
76- Alexander Kanavin
77- Antonin Godard
78- Archana Polampalli
79- Bruce Ashfield
80- Deepesh Varatharajan
81- Divya Chellam
82- Joshua Watt
83- Khem Raj
84- Lee Chee Yang
85- Nikhil R
86- Pedro Ferreira
87- Peter Marko
88- Praveen Kumar
89- Richard Purdie
90- Ross Burton
91- Simon A. Eugster
92- Steve Sakoman
93- Yash Shinde
94- Yogita Urade
95- Zhang Peng
96
97
98Repositories / Downloads for Yocto-4.0.25
99~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
100
101poky
102
103- Repository Location: :yocto_git:`/poky`
104- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
105- Tag: :yocto_git:`yocto-4.0.25 </poky/log/?h=yocto-4.0.25>`
106- Git Revision: :yocto_git:`b5aa03f336c121269551f9e7baed4c677c76bb39 </poky/commit/?id=b5aa03f336c121269551f9e7baed4c677c76bb39>`
107- Release Artefact: poky-b5aa03f336c121269551f9e7baed4c677c76bb39
108- sha: 7afbcb25f0dd89a4fb6dd4c5945061705ef9ce79a6863806278603273c2b3b4a
109- Download Locations:
110 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
111 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
112
113openembedded-core
114
115- Repository Location: :oe_git:`/openembedded-core`
116- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
117- Tag: :oe_git:`yocto-4.0.25 </openembedded-core/log/?h=yocto-4.0.25>`
118- Git Revision: :oe_git:`5a794fd244f7fdeb426bd5e3def6b4effc0e8c62 </openembedded-core/commit/?id=5a794fd244f7fdeb426bd5e3def6b4effc0e8c62>`
119- Release Artefact: oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62
120- sha: 8fc93109693e5f4702b3fe0633b6be833605291b3d595dc8bdeb6379f40cd2de
121- Download Locations:
122 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
123 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
124
125meta-mingw
126
127- Repository Location: :yocto_git:`/meta-mingw`
128- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
129- Tag: :yocto_git:`yocto-4.0.25 </meta-mingw/log/?h=yocto-4.0.25>`
130- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
131- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
132- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
133- Download Locations:
134 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
135 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
136
137meta-gplv2
138
139- Repository Location: :yocto_git:`/meta-gplv2`
140- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
141- Tag: :yocto_git:`yocto-4.0.25 </meta-gplv2/log/?h=yocto-4.0.25>`
142- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
143- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
144- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
145- Download Locations:
146 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
147 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
148
149bitbake
150
151- Repository Location: :oe_git:`/bitbake`
152- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
153- Tag: :oe_git:`yocto-4.0.25 </bitbake/log/?h=yocto-4.0.25>`
154- Git Revision: :oe_git:`e71f1ce53cf3b8320caa481ae62d1ce2900c4670 </bitbake/commit/?id=e71f1ce53cf3b8320caa481ae62d1ce2900c4670>`
155- Release Artefact: bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670
156- sha: 007eef35174586c85b233f4ec91578956fe21e0236f7ca2c3f90f9d034f94b5b
157- Download Locations:
158 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
159 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
160
161yocto-docs
162
163- Repository Location: :yocto_git:`/yocto-docs`
164- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
165- Tag: :yocto_git:`yocto-4.0.25 </yocto-docs/log/?h=yocto-4.0.25>`
166- Git Revision: :yocto_git:`c6dce0c77481dee7b0a0fcdc803f755ceccef234 </yocto-docs/commit/?id=c6dce0c77481dee7b0a0fcdc803f755ceccef234>`
167
diff --git a/documentation/migration-guides/release-notes-4.0.26.rst b/documentation/migration-guides/release-notes-4.0.26.rst
new file mode 100644
index 0000000000..42ff28c6a2
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.26.rst
@@ -0,0 +1,263 @@
1Release notes for Yocto-4.0.26 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.26
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7
8- bind: Fix :cve_nist:`2024-11187` and :cve_nist:`2024-12705`
9- binutils: Fix :cve_nist:`2025-0840`
10- elfutils: Fix :cve_nist:`2025-1352` and :cve_nist:`2025-1372`
11- ffmpeg: Fix CVE-2024-28661, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`, :cve_nist:`2024-36616`,
12 :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2025-0518` and :cve_nist:`2025-25473`
13- ffmpeg: Ignore :cve_nist:`2023-46407`, :cve_nist:`2023-47470`, :cve_nist:`2024-7272`,
14 :cve_nist:`2024-22860`, :cve_nist:`2024-22861` and :cve_nist:`2024-22862`
15- freetype: Fix :cve_nist:`2025-27363`
16- gnutls: Fix :cve_nist:`2024-12243`
17- grub: Fix :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, :cve_nist:`2024-45776`,
18 :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, :cve_nist:`2024-45780`,
19 :cve_nist:`2024-45781`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`,
20 :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0684`,
21 :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`, :cve_nist:`2025-0678`,
22 :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125`
23- gstreamer1.0-rtsp-server: fix :cve_nist:`2024-44331`
24- libarchive: Fix :cve_nist:`2025-25724`
25- libarchive: Ignore :cve_nist:`2025-1632`
26- libcap: Fix :cve_nist:`2025-1390`
27- linux-yocto/5.10: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-43098`, :cve_nist:`2024-47143`,
28 :cve_nist:`2024-48881`, :cve_nist:`2024-50051`, :cve_nist:`2024-50074`, :cve_nist:`2024-50082`,
29 :cve_nist:`2024-50083`, :cve_nist:`2024-50099`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`,
30 :cve_nist:`2024-50117`, :cve_nist:`2024-50142`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`,
31 :cve_nist:`2024-50151`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`,
32 :cve_nist:`2024-50185`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
33 :cve_nist:`2024-50195`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, :cve_nist:`2024-50202`,
34 :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, :cve_nist:`2024-50229`,
35 :cve_nist:`2024-50230`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`, :cve_nist:`2024-50236`,
36 :cve_nist:`2024-50237`, :cve_nist:`2024-50251`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`,
37 :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`,
38 :cve_nist:`2024-50273`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`,
39 :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`,
40 :cve_nist:`2024-50301`, :cve_nist:`2024-50302`, :cve_nist:`2024-53042`, :cve_nist:`2024-53052`,
41 :cve_nist:`2024-53057`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`,
42 :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53096`, :cve_nist:`2024-53097`,
43 :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53104`, :cve_nist:`2024-53145`,
44 :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`,
45 :cve_nist:`2024-53157`, :cve_nist:`2024-53161`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`,
46 :cve_nist:`2024-53173`, :cve_nist:`2024-53174`, :cve_nist:`2024-53194`, :cve_nist:`2024-53197`,
47 :cve_nist:`2024-53217`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`,
48 :cve_nist:`2024-53239`, :cve_nist:`2024-55916`, :cve_nist:`2024-56548`, :cve_nist:`2024-56558`,
49 :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`,
50 :cve_nist:`2024-56574`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`,
51 :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`,
52 :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56605`,
53 :cve_nist:`2024-56606`, :cve_nist:`2024-56615`, :cve_nist:`2024-56619`, :cve_nist:`2024-56623`,
54 :cve_nist:`2024-56629`, :cve_nist:`2024-56634`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`,
55 :cve_nist:`2024-56648`, :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`,
56 :cve_nist:`2024-56670`, :cve_nist:`2024-56688`, :cve_nist:`2024-56698`, :cve_nist:`2024-56704`,
57 :cve_nist:`2024-56716`, :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`,
58 :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`,
59 :cve_nist:`2024-56748`, :cve_nist:`2024-56754`, :cve_nist:`2024-56756`, :cve_nist:`2024-56770`,
60 :cve_nist:`2024-56779`, :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56785`,
61 :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57850`, :cve_nist:`2024-57874`,
62 :cve_nist:`2024-57890`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`,
63 :cve_nist:`2024-57902`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57913`,
64 :cve_nist:`2024-57922`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57946`,
65 :cve_nist:`2024-57951`, :cve_nist:`2025-21638`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`,
66 :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
67- linux-yocto/5.15: Fix :cve_nist:`2024-57979`, :cve_nist:`2024-58034`, :cve_nist:`2024-58052`,
68 :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`, :cve_nist:`2024-58069`,
69 :cve_nist:`2024-58071`, :cve_nist:`2024-58076`, :cve_nist:`2024-58083`, :cve_nist:`2025-21700`,
70 :cve_nist:`2025-21703`, :cve_nist:`2025-21715`, :cve_nist:`2025-21722`, :cve_nist:`2025-21727`,
71 :cve_nist:`2025-21731`, :cve_nist:`2025-21753`, :cve_nist:`2025-21756`, :cve_nist:`2025-21760`,
72 :cve_nist:`2025-21761`, :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`,
73 :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21887`, :cve_nist:`2025-21898`,
74 :cve_nist:`2025-21904`, :cve_nist:`2025-21905`, :cve_nist:`2025-21912`, :cve_nist:`2025-21917`,
75 :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`, :cve_nist:`2025-21934`,
76 :cve_nist:`2025-21943`, :cve_nist:`2025-21948` and :cve_nist:`2025-21951`
77- libpcre2: Ignore :cve_nist:`2022-1586`
78- libtasn1: Fix :cve_nist:`2024-12133`
79- libxml2: Fix :cve_nist:`2022-49043`, :cve_nist:`2024-56171`, :cve_nist:`2025-24928` and
80 :cve_nist:`2025-27113`
81- libxslt: Fix :cve_nist:`2024-55549` and :cve_nist:`2025-24855`
82- llvm: Fix :cve_nist:`2024-0151`
83- mpg123: Fix :cve_nist:`2024-10573`
84- openssh: Fix :cve_nist:`2025-26465`
85- ovmf: Revert Fix for CVE-2023-45236 :cve_nist:`2023-45237`
86- perl: Ignore :cve_nist:`2023-47038`
87- puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837`
88- python3: Fix :cve_nist:`2025-0938`
89- ruby: Fix :cve_nist:`2024-41946`, :cve_nist:`2025-27219` and :cve_nist:`2025-27220`
90- subversion: Ignore :cve_nist:`2024-45720`
91- systemd: Fix :cve_nist:`2022-3821`, :cve_nist:`2022-4415`, :cve_nist:`2022-45873` and
92 :cve_nist:`2023-7008`
93- tiff: mark :cve_nist:`2023-30774` as patched with existing patch
94- u-boot: Fix :cve_nist:`2022-2347`, :cve_nist:`2022-30767`, :cve_nist:`2022-30790`,
95 :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`, :cve_nist:`2024-57257`,
96 :cve_nist:`2024-57258` and :cve_nist:`2024-57259`
97- vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-22134`, :cve_nist:`2025-24014`,
98 :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and :cve_nist:`2025-29768`
99- xserver-xorg: Fix :cve_nist:`2022-49737`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`,
100 :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`,
101 :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
102- xwayland: Fix :cve_nist:`2022-49737`, :cve_nist:`2024-9632`, :cve_nist:`2024-21885`,
103 :cve_nist:`2024-21886`, :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31083`,
104 :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, :cve_nist:`2025-26597`,
105 :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
106- zlib: Fix :cve_nist:`2014-9485`
107
108
109
110Fixes in Yocto-4.0.26
111~~~~~~~~~~~~~~~~~~~~~
112
113- bind: Upgrade to 9.18.33
114- bitbake: cache: bump cache version
115- bitbake: siggen.py: Improve taskhash reproducibility
116- boost: fix do_fetch error
117- build-appliance-image: Update to kirkstone head revision
118- contributor-guide/submit-changes: add policy on AI generated code
119- cve-update-nvd2-native: handle missing vulnStatus
120- docs: Add favicon for the documentation html
121- docs: Remove all mention of core-image-lsb
122- libtasn1: upgrade to 4.20.0
123- libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt
124- libxml2: fix compilation of explicit child axis in pattern
125- linux-yocto/5.10: update to v5.10.234
126- linux-yocto/5.15: update to v5.15.179
127- mesa: Fix missing GLES3 headers in SDK sysroot
128- mesa: Update :term:`SRC_URI`
129- meta: Enable '-o pipefail' for the SDK installer
130- migration-guides: add release notes for 4.0.25
131- poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS`
132- poky.conf: bump version for 4.0.26
133- procps: replaced one use of fputs(3) with a write(2) call
134- ref-manual: don't refer to poky-lsb
135- scripts/install-buildtools: Update to 4.0.24
136- scritps/runqemu: Ensure we only have two serial ports
137- systemd: upgrade to 250.14
138- tzcode-native: Fix compiler setting from 2023d version
139- tzcode: Update :term:`SRC_URI`
140- tzdata/tzcode-native: upgrade 2025a
141- vim: Upgrade to 9.1.1198
142- virglrenderer: fix do_fetch error
143- vulnerabilities/classes: remove references to cve-check text format
144- xz: Update :term:`SRC_URI`
145- yocto-uninative: Update to 4.7 for glibc 2.41
146
147
148Known Issues in Yocto-4.0.26
149~~~~~~~~~~~~~~~~~~~~~~~~~~~~
150
151- N/A
152
153
154Contributors to Yocto-4.0.26
155~~~~~~~~~~~~~~~~~~~~~~~~~~~~
156
157Thanks to the following people who contributed to this release:
158
159- Aleksandar Nikolic
160- Alessio Cascone
161- Antonin Godard
162- Archana Polampalli
163- Ashish Sharma
164- Bruce Ashfield
165- Carlos Dominguez
166- Deepesh Varatharajan
167- Divya Chellam
168- Guocai He
169- Hitendra Prajapati
170- Hongxu Jia
171- Jiaying Song
172- Johannes Kauffmann
173- Kai Kang
174- Lee Chee Yang
175- Libo Chen
176- Marta Rybczynska
177- Michael Halstead
178- Mingli Yu
179- Moritz Haase
180- Narpat Mali
181- Paulo Neves
182- Peter Marko
183- Priyal Doshi
184- Richard Purdie
185- Robert Yang
186- Ross Burton
187- Sakib Sajal
188- Steve Sakoman
189- Vijay Anusuri
190- Yogita Urade
191- Zhang Peng
192
193
194Repositories / Downloads for Yocto-4.0.26
195~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
196
197poky
198
199- Repository Location: :yocto_git:`/poky`
200- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
201- Tag: :yocto_git:`yocto-4.0.26 </poky/log/?h=yocto-4.0.26>`
202- Git Revision: :yocto_git:`d70d287a77d5026b698ac237ab865b2dafd36bb8 </poky/commit/?id=d70d287a77d5026b698ac237ab865b2dafd36bb8>`
203- Release Artefact: poky-d70d287a77d5026b698ac237ab865b2dafd36bb8
204- sha: 3ebfadb8bff4c1ca12b3cf3e4ef6e3ac2ce52b73570266daa98436c9959249f2
205- Download Locations:
206 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2
207 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2
208
209openembedded-core
210
211- Repository Location: :oe_git:`/openembedded-core`
212- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
213- Tag: :oe_git:`yocto-4.0.26 </openembedded-core/log/?h=yocto-4.0.26>`
214- Git Revision: :oe_git:`1efbe1004bc82e7c14c1e8bd4ce644f5015c3346 </openembedded-core/commit/?id=1efbe1004bc82e7c14c1e8bd4ce644f5015c3346>`
215- Release Artefact: oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346
216- sha: d3805e034dabd0865dbf55488b2c16d4ea0351d37aa826f0054a6bfdde5a8be9
217- Download Locations:
218 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2
219 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2
220
221meta-mingw
222
223- Repository Location: :yocto_git:`/meta-mingw`
224- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
225- Tag: :yocto_git:`yocto-4.0.26 </meta-mingw/log/?h=yocto-4.0.26>`
226- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
227- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
228- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
229- Download Locations:
230 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
231 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
232
233meta-gplv2
234
235- Repository Location: :yocto_git:`/meta-gplv2`
236- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
237- Tag: :yocto_git:`yocto-4.0.26 </meta-gplv2/log/?h=yocto-4.0.26>`
238- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
239- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
240- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
241- Download Locations:
242 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
243 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
244
245bitbake
246
247- Repository Location: :oe_git:`/bitbake`
248- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
249- Tag: :oe_git:`yocto-4.0.26 </bitbake/log/?h=yocto-4.0.26>`
250- Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>`
251- Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e
252- sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a
253- Download Locations:
254 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
255 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
256
257yocto-docs
258
259- Repository Location: :yocto_git:`/yocto-docs`
260- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
261- Tag: :yocto_git:`yocto-4.0.26 </yocto-docs/log/?h=yocto-4.0.26>`
262- Git Revision: :yocto_git:`9b4c36f7b02dd4bedfec90206744a1e90e37733c </yocto-docs/commit/?id=9b4c36f7b02dd4bedfec90206744a1e90e37733c>`
263
diff --git a/documentation/migration-guides/release-notes-4.0.27.rst b/documentation/migration-guides/release-notes-4.0.27.rst
new file mode 100644
index 0000000000..e37e2f78b6
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.27.rst
@@ -0,0 +1,153 @@
1Release notes for Yocto-4.0.27 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.27
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- binutils: Fix :cve_nist:`2025-1178`
8- busybox: fix :cve_nist:`2023-39810`
9- connman :fix :cve_nist:`2025-32743`
10- curl: Ignore :cve_nist:`2025-0725`
11- ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`,
12 :cve_nist:`2025-27834`, :cve_nist:`2025-27835` and :cve_nist:`2025-27836`
13- ghostscript: Ignore :cve_nist:`2024-29507`, :cve_nist:`2025-27833` and :cve_nist:`2025-27837`
14- glib-2.0: Fix :cve_nist:`2025-3360`
15- go: Fix :cve_nist:`2025-22871`
16- libarchive: Ignore :cve_nist:`2024-48615`
17- libpam: Fix :cve_nist:`2024-10041`
18- libsoup-2.4: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906` and :cve_nist:`2025-32909`
19- libsoup: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`,
20 :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913`
21 and :cve_nist:`2025-32914`
22- libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415`
23- ofono: Fix :cve_nist:`2024-7537`
24- perl: Fix :cve_nist:`2024-56406`
25- ppp: Fix :cve_nist:`2024-58250`
26- python3-setuptools: Fix :cve_nist:`2024-6345`
27- qemu: Ignore :cve_nist:`2023-1386`
28- ruby: Fix :cve_nist:`2024-43398`
29- sqlite3: Fix :cve_nist:`2025-29088`
30- systemd: Ignore :cve_nist:`2022-3821`, :cve_nist:`2022-4415` and :cve_nist:`2022-45873`
31
32
33Fixes in Yocto-4.0.27
34~~~~~~~~~~~~~~~~~~~~~
35
36- Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR"
37- build-appliance-image: Update to kirkstone head revision
38- cve-update-nvd2-native: add workaround for json5 style list
39- docs: Fix dead links that use the :term:`DISTRO` macro
40- docs: manuals: remove repeated word
41- docs: poky.yaml: introduce DISTRO_LATEST_TAG
42- glibc: Add single-threaded fast path to rand()
43- glibc: stable 2.35 branch updates
44- module.bbclass: add KBUILD_EXTRA_SYMBOLS to install
45- perl: enable _GNU_SOURCE define via d_gnulibc
46- poky.conf: bump version for 4.0.27
47- ref-manual/variables.rst: document autotools class related variables
48- scripts/install-buildtools: Update to 4.0.26
49- systemd: backport patch to fix journal issue
50- systemd: systemd-journald fails to setup LogNamespace
51- tzdata/tzcode-native: upgrade to 2025b
52
53
54Known Issues in Yocto-4.0.27
55~~~~~~~~~~~~~~~~~~~~~~~~~~~~
56
57- N/A
58
59
60Contributors to Yocto-4.0.27
61~~~~~~~~~~~~~~~~~~~~~~~~~~~~
62
63- Aleksandar Nikolic
64- Alexander Kanavin
65- Alon Bar-Lev
66- Andrew Kreimer
67- Antonin Godard
68- Chen Qi
69- Deepesh Varatharajan
70- Divya Chellam
71- Haitao Liu
72- Haixiao Yan
73- Hitendra Prajapati
74- Peter Marko
75- Praveen Kumar
76- Priyal Doshi
77- Shubham Kulkarni
78- Soumya Sambu
79- Steve Sakoman
80- Vijay Anusuri
81- Yogita Urade
82
83
84Repositories / Downloads for Yocto-4.0.27
85~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
86
87poky
88
89- Repository Location: :yocto_git:`/poky`
90- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
91- Tag: :yocto_git:`yocto-4.0.27 </poky/log/?h=yocto-4.0.27>`
92- Git Revision: :yocto_git:`ab9a994a8cd8e06b519a693db444030999d273b7 </poky/commit/?id=ab9a994a8cd8e06b519a693db444030999d273b7>`
93- Release Artefact: poky-ab9a994a8cd8e06b519a693db444030999d273b7
94- sha: 77a366c17cf29eef15c6ff3f44e73f81c07288c723fd4a6dbd8c7ee9b79933f3
95- Download Locations:
96 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2
97 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2
98
99openembedded-core
100
101- Repository Location: :oe_git:`/openembedded-core`
102- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
103- Tag: :oe_git:`yocto-4.0.27 </openembedded-core/log/?h=yocto-4.0.27>`
104- Git Revision: :oe_git:`e8be08a624b2d024715a5c8b0c37f2345a02336b </openembedded-core/commit/?id=e8be08a624b2d024715a5c8b0c37f2345a02336b>`
105- Release Artefact: oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b
106- sha: cc5b0fadab021c6dc61f37fc4ff01a1cf657e7c219488ce264bede42f7f6212f
107- Download Locations:
108 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2
109 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2
110
111meta-mingw
112
113- Repository Location: :yocto_git:`/meta-mingw`
114- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
115- Tag: :yocto_git:`yocto-4.0.27 </meta-mingw/log/?h=yocto-4.0.27>`
116- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
117- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
118- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
119- Download Locations:
120 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
121 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
122
123meta-gplv2
124
125- Repository Location: :yocto_git:`/meta-gplv2`
126- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
127- Tag: :yocto_git:`yocto-4.0.27 </meta-gplv2/log/?h=yocto-4.0.27>`
128- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
129- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
130- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
131- Download Locations:
132 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
133 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
134
135bitbake
136
137- Repository Location: :oe_git:`/bitbake`
138- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
139- Tag: :oe_git:`yocto-4.0.27 </bitbake/log/?h=yocto-4.0.27>`
140- Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>`
141- Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e
142- sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a
143- Download Locations:
144 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
145 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
146
147yocto-docs
148
149- Repository Location: :yocto_git:`/yocto-docs`
150- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
151- Tag: :yocto_git:`yocto-4.0.27 </yocto-docs/log/?h=yocto-4.0.27>`
152- Git Revision: :yocto_git:`0d51e553d5f83eea6634e03ddc9c7740bf72fcea </yocto-docs/commit/?id=0d51e553d5f83eea6634e03ddc9c7740bf72fcea>`
153
diff --git a/documentation/migration-guides/release-notes-4.0.3.rst b/documentation/migration-guides/release-notes-4.0.3.rst
index 46fe858cb7..1b9559a962 100644
--- a/documentation/migration-guides/release-notes-4.0.3.rst
+++ b/documentation/migration-guides/release-notes-4.0.3.rst
@@ -6,21 +6,21 @@ Release notes for Yocto-4.0.3 (Kirkstone)
6Security Fixes in Yocto-4.0.3 6Security Fixes in Yocto-4.0.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: fix :cve:`2019-1010204` 9- binutils: fix :cve_nist:`2019-1010204`
10- busybox: fix :cve:`2022-30065` 10- busybox: fix :cve_nist:`2022-30065`
11- cups: ignore :cve:`2022-26691` 11- cups: ignore :cve_nist:`2022-26691`
12- curl: Fix :cve:`2022-32205`, :cve:`2022-32206`, :cve:`2022-32207` and :cve:`2022-32208` 12- curl: Fix :cve_nist:`2022-32205`, :cve_nist:`2022-32206`, :cve_nist:`2022-32207` and :cve_nist:`2022-32208`
13- dpkg: fix :cve:`2022-1664` 13- dpkg: fix :cve_nist:`2022-1664`
14- ghostscript: fix :cve:`2022-2085` 14- ghostscript: fix :cve_nist:`2022-2085`
15- harfbuzz: fix :cve:`2022-33068` 15- harfbuzz: fix :cve_nist:`2022-33068`
16- libtirpc: fix :cve:`2021-46828` 16- libtirpc: fix :cve_nist:`2021-46828`
17- lua: fix :cve:`2022-33099` 17- lua: fix :cve_nist:`2022-33099`
18- nasm: ignore :cve:`2020-18974` 18- nasm: ignore :cve_nist:`2020-18974`
19- qemu: fix :cve:`2022-35414` 19- qemu: fix :cve_nist:`2022-35414`
20- qemu: ignore :cve:`2021-20255` and :cve:`2019-12067` 20- qemu: ignore :cve_nist:`2021-20255` and :cve_nist:`2019-12067`
21- tiff: fix :cve:`2022-1354`, :cve:`2022-1355`, :cve:`2022-2056`, :cve:`2022-2057` and :cve:`2022-2058` 21- tiff: fix :cve_nist:`2022-1354`, :cve_nist:`2022-1355`, :cve_nist:`2022-2056`, :cve_nist:`2022-2057` and :cve_nist:`2022-2058`
22- u-boot: fix :cve:`2022-34835` 22- u-boot: fix :cve_nist:`2022-34835`
23- unzip: fix :cve:`2022-0529` and :cve:`2022-0530` 23- unzip: fix :cve_nist:`2022-0529` and :cve_nist:`2022-0530`
24 24
25 25
26Fixes in Yocto-4.0.3 26Fixes in Yocto-4.0.3
diff --git a/documentation/migration-guides/release-notes-4.0.4.rst b/documentation/migration-guides/release-notes-4.0.4.rst
index 611109a77e..41ef095c45 100644
--- a/documentation/migration-guides/release-notes-4.0.4.rst
+++ b/documentation/migration-guides/release-notes-4.0.4.rst
@@ -6,17 +6,17 @@ Release notes for Yocto-4.0.4 (Kirkstone)
6Security Fixes in Yocto-4.0.4 6Security Fixes in Yocto-4.0.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils : fix :cve:`2022-38533` 9- binutils : fix :cve_nist:`2022-38533`
10- curl: fix :cve:`2022-35252` 10- curl: fix :cve_nist:`2022-35252`
11- sqlite: fix :cve:`2022-35737` 11- sqlite: fix :cve_nist:`2022-35737`
12- grub2: fix :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734` and :cve:`2022-28735` 12- grub2: fix :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734` and :cve_nist:`2022-28735`
13- u-boot: fix :cve:`2022-30552` and :cve:`2022-33967` 13- u-boot: fix :cve_nist:`2022-30552` and :cve_nist:`2022-33967`
14- libxml2: Ignore :cve:`2016-3709` 14- libxml2: Ignore :cve_nist:`2016-3709`
15- libtiff: fix :cve:`2022-34526` 15- libtiff: fix :cve_nist:`2022-34526`
16- zlib: fix :cve:`2022-37434` 16- zlib: fix :cve_nist:`2022-37434`
17- gnutls: fix :cve:`2022-2509` 17- gnutls: fix :cve_nist:`2022-2509`
18- u-boot: fix :cve:`2022-33103` 18- u-boot: fix :cve_nist:`2022-33103`
19- qemu: fix :cve:`2021-3507`, :cve:`2021-3929`, :cve:`2021-4158`, :cve:`2022-0216` and :cve:`2022-0358` 19- qemu: fix :cve_nist:`2021-3507`, :cve_nist:`2021-3929`, :cve_nist:`2021-4158`, :cve_nist:`2022-0216` and :cve_nist:`2022-0358`
20 20
21 21
22Fixes in Yocto-4.0.4 22Fixes in Yocto-4.0.4
@@ -247,7 +247,7 @@ poky
247 247
248openembedded-core 248openembedded-core
249 249
250- Repository Location: oe_git:`/openembedded-core` 250- Repository Location: :oe_git:`/openembedded-core`
251- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` 251- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
252- Tag: :oe_git:`yocto-4.0.4 </openembedded-core/log/?h=yocto-4.0.4>` 252- Tag: :oe_git:`yocto-4.0.4 </openembedded-core/log/?h=yocto-4.0.4>`
253- Git Revision: :oe_git:`f7766da462905ec67bf549d46b8017be36cd5b2a </openembedded-core/commit/?id=f7766da462905ec67bf549d46b8017be36cd5b2a>` 253- Git Revision: :oe_git:`f7766da462905ec67bf549d46b8017be36cd5b2a </openembedded-core/commit/?id=f7766da462905ec67bf549d46b8017be36cd5b2a>`
diff --git a/documentation/migration-guides/release-notes-4.0.5.rst b/documentation/migration-guides/release-notes-4.0.5.rst
index 172b8b800d..ae061ed633 100644
--- a/documentation/migration-guides/release-notes-4.0.5.rst
+++ b/documentation/migration-guides/release-notes-4.0.5.rst
@@ -6,11 +6,11 @@ Release notes for Yocto-4.0.5 (Kirkstone)
6Security Fixes in Yocto-4.0.5 6Security Fixes in Yocto-4.0.5
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- qemu: fix :cve:`2021-3750`, :cve:`2021-3611` and :cve:`2022-2962` 9- qemu: fix :cve_nist:`2021-3750`, :cve_nist:`2021-3611` and :cve_nist:`2022-2962`
10- binutils : fix :cve:`2022-38126`, :cve:`2022-38127` and :cve:`2022-38128` 10- binutils : fix :cve_nist:`2022-38126`, :cve_nist:`2022-38127` and :cve_nist:`2022-38128`
11- tff: fix :cve:`2022-2867`, :cve:`2022-2868` and :cve:`2022-2869` 11- tff: fix :cve_nist:`2022-2867`, :cve_nist:`2022-2868` and :cve_nist:`2022-2869`
12- inetutils: fix :cve:`2022-39028` 12- inetutils: fix :cve_nist:`2022-39028`
13- go: fix :cve:`2022-27664` 13- go: fix :cve_nist:`2022-27664`
14 14
15Fixes in Yocto-4.0.5 15Fixes in Yocto-4.0.5
16~~~~~~~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~~~~~~~
@@ -83,7 +83,7 @@ Fixes in Yocto-4.0.5
83Known Issues in Yocto-4.0.5 83Known Issues in Yocto-4.0.5
84~~~~~~~~~~~~~~~~~~~~~~~~~~~ 84~~~~~~~~~~~~~~~~~~~~~~~~~~~
85 85
86- There are recent CVEs in key components such as openssl. They are not included in this release as it was built before the issues were known and fixes were available but these are now available on the kirkstone branch. 86- There are recent CVEs in key components such as openssl. They are not included in this release as it was built before the issues were known and fixes were available but these are now available on the kirkstone branch.
87 87
88 88
89Contributors to Yocto-4.0.5 89Contributors to Yocto-4.0.5
diff --git a/documentation/migration-guides/release-notes-4.0.6.rst b/documentation/migration-guides/release-notes-4.0.6.rst
index 76d23fcf0c..e0c0cc09b9 100644
--- a/documentation/migration-guides/release-notes-4.0.6.rst
+++ b/documentation/migration-guides/release-notes-4.0.6.rst
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.6 (Kirkstone)
6Security Fixes in Yocto-4.0.6 6Security Fixes in Yocto-4.0.6
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bash: Fix :cve:`2022-3715` 9- bash: Fix :cve_nist:`2022-3715`
10- curl: Fix :cve:`2022-32221`, :cve:`2022-42915` and :cve:`2022-42916` 10- curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916`
11- dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` 11- dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012`
12- dropbear: Fix :cve:`2021-36369` 12- dropbear: Fix :cve_nist:`2021-36369`
13- ffmpeg: Fix :cve:`2022-3964`, :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964`, :cve_nist:`2022-3965`
14- go: Fix :cve:`2022-2880` 14- go: Fix :cve_nist:`2022-2880`
15- grub2: Fix :cve:`2022-2601`, :cve:`2022-3775` and :cve:`2022-28736` 15- grub2: Fix :cve_nist:`2022-2601`, :cve_nist:`2022-3775` and :cve_nist:`2022-28736`
16- libarchive: Fix :cve:`2022-36227` 16- libarchive: Fix :cve_nist:`2022-36227`
17- libpam: Fix :cve:`2022-28321` 17- libpam: Fix :cve_nist:`2022-28321`
18- libsndfile1: Fix :cve:`2021-4156` 18- libsndfile1: Fix :cve_nist:`2021-4156`
19- lighttpd: Fix :cve:`2022-41556` 19- lighttpd: Fix :cve_nist:`2022-41556`
20- openssl: Fix :cve:`2022-3358` 20- openssl: Fix :cve_nist:`2022-3358`
21- pixman: Fix :cve:`2022-44638` 21- pixman: Fix :cve_nist:`2022-44638`
22- python3-mako: Fix :cve:`2022-40023` 22- python3-mako: Fix :cve_nist:`2022-40023`
23- python3: Fix :cve:`2022-42919` 23- python3: Fix :cve_nist:`2022-42919`
24- qemu: Fix :cve:`2022-3165` 24- qemu: Fix :cve_nist:`2022-3165`
25- sysstat: Fix :cve:`2022-39377` 25- sysstat: Fix :cve_nist:`2022-39377`
26- systemd: Fix :cve:`2022-3821` 26- systemd: Fix :cve_nist:`2022-3821`
27- tiff: Fix :cve:`2022-2953`, :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598` and :cve:`2022-3970` 27- tiff: Fix :cve_nist:`2022-2953`, :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598` and :cve_nist:`2022-3970`
28- vim: Fix :cve:`2022-3352`, :cve:`2022-3705` and :cve:`2022-4141` 28- vim: Fix :cve_nist:`2022-3352`, :cve_nist:`2022-3705` and :cve_nist:`2022-4141`
29- wayland: Fix :cve:`2021-3782` 29- wayland: Fix :cve_nist:`2021-3782`
30- xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` 30- xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551`
31 31
32 32
33Fixes in Yocto-4.0.6 33Fixes in Yocto-4.0.6
diff --git a/documentation/migration-guides/release-notes-4.0.7.rst b/documentation/migration-guides/release-notes-4.0.7.rst
index c3885d9e0e..a11a29889d 100644
--- a/documentation/migration-guides/release-notes-4.0.7.rst
+++ b/documentation/migration-guides/release-notes-4.0.7.rst
@@ -6,25 +6,25 @@ Release notes for Yocto-4.0.7 (Kirkstone)
6Security Fixes in Yocto-4.0.7 6Security Fixes in Yocto-4.0.7
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2022-4285` 9- binutils: Fix :cve_nist:`2022-4285`
10- curl: Fix :cve:`2022-43551` and :cve_mitre:`2022-43552` 10- curl: Fix :cve_nist:`2022-43551` and :cve_mitre:`2022-43552`
11- ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341` 11- ffmpeg: Fix :cve_nist:`2022-3109` and :cve_nist:`2022-3341`
12- go: Fix :cve:`2022-41715` and :cve:`2022-41717` 12- go: Fix :cve_nist:`2022-41715` and :cve_nist:`2022-41717`
13- libX11: Fix :cve:`2022-3554` and :cve:`2022-3555` 13- libX11: Fix :cve_nist:`2022-3554` and :cve_nist:`2022-3555`
14- libarchive: Fix :cve:`2022-36227` 14- libarchive: Fix :cve_nist:`2022-36227`
15- libksba: Fix :cve:`2022-47629` 15- libksba: Fix :cve_nist:`2022-47629`
16- libpng: Fix :cve:`2019-6129` 16- libpng: Fix :cve_nist:`2019-6129`
17- libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` 17- libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304`
18- openssl: Fix :cve:`2022-3996` 18- openssl: Fix :cve_nist:`2022-3996`
19- python3: Fix :cve:`2022-45061` 19- python3: Fix :cve_nist:`2022-45061`
20- python3-git: Fix :cve:`2022-24439` 20- python3-git: Fix :cve_nist:`2022-24439`
21- python3-setuptools: Fix :cve:`2022-40897` 21- python3-setuptools: Fix :cve_nist:`2022-40897`
22- python3-wheel: Fix :cve:`2022-40898` 22- python3-wheel: Fix :cve_nist:`2022-40898`
23- qemu: Fix :cve:`2022-4144` 23- qemu: Fix :cve_nist:`2022-4144`
24- sqlite: Fix :cve:`2022-46908` 24- sqlite: Fix :cve_nist:`2022-46908`
25- systemd: Fix :cve:`2022-45873` 25- systemd: Fix :cve_nist:`2022-45873`
26- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054` and :cve:`2023-0088` 26- vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054` and :cve_nist:`2023-0088`
27- webkitgtk: Fix :cve:`2022-32886`, :cve_mitre:`2022-32891` and :cve:`2022-32912` 27- webkitgtk: Fix :cve_nist:`2022-32886`, :cve_mitre:`2022-32891` and :cve_nist:`2022-32912`
28 28
29 29
30Fixes in Yocto-4.0.7 30Fixes in Yocto-4.0.7
@@ -39,7 +39,7 @@ Fixes in Yocto-4.0.7
39- busybox: always start do_compile with orig config files 39- busybox: always start do_compile with orig config files
40- busybox: rm temporary files if do_compile was interrupted 40- busybox: rm temporary files if do_compile was interrupted
41- cairo: fix CVE patches assigned wrong CVE number 41- cairo: fix CVE patches assigned wrong CVE number
42- cairo: update patch for :cve:`2019-6461` with upstream solution 42- cairo: update patch for :cve_nist:`2019-6461` with upstream solution
43- classes/create-spdx: Add SPDX_PRETTY option 43- classes/create-spdx: Add SPDX_PRETTY option
44- classes: image: Set empty weak default IMAGE_LINGUAS 44- classes: image: Set empty weak default IMAGE_LINGUAS
45- combo-layer: add sync-revs command 45- combo-layer: add sync-revs command
diff --git a/documentation/migration-guides/release-notes-4.0.8.rst b/documentation/migration-guides/release-notes-4.0.8.rst
index 223b74fbaf..af58d0462c 100644
--- a/documentation/migration-guides/release-notes-4.0.8.rst
+++ b/documentation/migration-guides/release-notes-4.0.8.rst
@@ -6,16 +6,16 @@ Release notes for Yocto-4.0.8 (Kirkstone)
6Security Fixes in Yocto-4.0.8 6Security Fixes in Yocto-4.0.8
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- apr-util: Fix :cve:`2022-25147` 9- apr-util: Fix :cve_nist:`2022-25147`
10- apr: Fix :cve:`2022-24963`, :cve:`2022-28331` and :cve:`2021-35940` 10- apr: Fix :cve_nist:`2022-24963`, :cve_nist:`2022-28331` and :cve_nist:`2021-35940`
11- bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` 11- bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924`
12- git: Ignore :cve:`2022-41953` 12- git: Ignore :cve_nist:`2022-41953`
13- git: Fix :cve:`2022-23521` and :cve:`2022-41903` 13- git: Fix :cve_nist:`2022-23521` and :cve_nist:`2022-41903`
14- libgit2: Fix :cve:`2023-22742` 14- libgit2: Fix :cve_nist:`2023-22742`
15- ppp: Fix :cve:`2022-4603` 15- ppp: Fix :cve_nist:`2022-4603`
16- python3-certifi: Fix :cve:`2022-23491` 16- python3-certifi: Fix :cve_nist:`2022-23491`
17- sudo: Fix :cve:`2023-22809` 17- sudo: Fix :cve_nist:`2023-22809`
18- tar: Fix :cve:`2022-48303` 18- tar: Fix :cve_nist:`2022-48303`
19 19
20 20
21Fixes in Yocto-4.0.8 21Fixes in Yocto-4.0.8
diff --git a/documentation/migration-guides/release-notes-4.0.9.rst b/documentation/migration-guides/release-notes-4.0.9.rst
index 236477443a..a571e95724 100644
--- a/documentation/migration-guides/release-notes-4.0.9.rst
+++ b/documentation/migration-guides/release-notes-4.0.9.rst
@@ -6,26 +6,26 @@ Release notes for Yocto-4.0.9 (Kirkstone)
6Security Fixes in Yocto-4.0.9 6Security Fixes in Yocto-4.0.9
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-22608` 9- binutils: Fix :cve_nist:`2023-22608`
10- curl: Fix :cve:`2023-23914`, :cve:`2023-23915` and :cve:`2023-23916` 10- curl: Fix :cve_nist:`2023-23914`, :cve_nist:`2023-23915` and :cve_nist:`2023-23916`
11- epiphany: Fix :cve:`2023-26081` 11- epiphany: Fix :cve_nist:`2023-26081`
12- git: Ignore :cve:`2023-22743` 12- git: Ignore :cve_nist:`2023-22743`
13- glibc: Fix :cve:`2023-0687` 13- glibc: Fix :cve_nist:`2023-0687`
14- gnutls: Fix :cve:`2023-0361` 14- gnutls: Fix :cve_nist:`2023-0361`
15- go: Fix :cve:`2022-2879`, :cve:`2022-41720` and :cve:`2022-41723` 15- go: Fix :cve_nist:`2022-2879`, :cve_nist:`2022-41720` and :cve_nist:`2022-41723`
16- harfbuzz: Fix :cve:`2023-25193` 16- harfbuzz: Fix :cve_nist:`2023-25193`
17- less: Fix :cve:`2022-46663` 17- less: Fix :cve_nist:`2022-46663`
18- libmicrohttpd: Fix :cve:`2023-27371` 18- libmicrohttpd: Fix :cve_nist:`2023-27371`
19- libsdl2: Fix :cve:`2022-4743` 19- libsdl2: Fix :cve_nist:`2022-4743`
20- openssl: Fix :cve:`2022-3996`, :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` 20- openssl: Fix :cve_nist:`2022-3996`, :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466`
21- pkgconf: Fix :cve:`2023-24056` 21- pkgconf: Fix :cve_nist:`2023-24056`
22- python3: Fix :cve:`2023-24329` 22- python3: Fix :cve_nist:`2023-24329`
23- shadow: Ignore :cve:`2016-15024` 23- shadow: Ignore :cve_nist:`2016-15024`
24- systemd: Fix :cve:`2022-4415` 24- systemd: Fix :cve_nist:`2022-4415`
25- tiff: Fix :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` 25- tiff: Fix :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804`
26- vim: Fix :cve:`2023-0433`, :cve:`2023-0512`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` 26- vim: Fix :cve_nist:`2023-0433`, :cve_nist:`2023-0512`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355`
27- xserver-xorg: Fix :cve:`2023-0494` 27- xserver-xorg: Fix :cve_nist:`2023-0494`
28- xwayland: Fix :cve:`2023-0494` 28- xwayland: Fix :cve_nist:`2023-0494`
29 29
30 30
31Fixes in Yocto-4.0.9 31Fixes in Yocto-4.0.9
@@ -90,7 +90,7 @@ Fixes in Yocto-4.0.9
90- pybootchartui: Fix python syntax issue 90- pybootchartui: Fix python syntax issue
91- python3-git: fix indent error 91- python3-git: fix indent error
92- python3-setuptools-rust-native: Add direct dependency of native python3 modules 92- python3-setuptools-rust-native: Add direct dependency of native python3 modules
93- qemu: Revert "fix :cve:`2021-3507`" as not applicable for qemu 6.2 93- qemu: Revert "fix :cve_nist:`2021-3507`" as not applicable for qemu 6.2
94- rsync: Add missing prototypes to function declarations 94- rsync: Add missing prototypes to function declarations
95- rsync: Turn on -pedantic-errors at the end of 'configure' 95- rsync: Turn on -pedantic-errors at the end of 'configure'
96- runqemu: kill qemu if it hangs 96- runqemu: kill qemu if it hangs
diff --git a/documentation/migration-guides/release-notes-4.0.rst b/documentation/migration-guides/release-notes-4.0.rst
index 6eb5f807de..e9e6949527 100644
--- a/documentation/migration-guides/release-notes-4.0.rst
+++ b/documentation/migration-guides/release-notes-4.0.rst
@@ -25,7 +25,7 @@ New Features / Enhancements in 4.0
25 25
26 BB_SIGNATURE_HANDLER = "OEEquivHash" 26 BB_SIGNATURE_HANDLER = "OEEquivHash"
27 BB_HASHSERVE = "auto" 27 BB_HASHSERVE = "auto"
28 BB_HASHSERVE_UPSTREAM = "hashserv.yocto.io:8687" 28 BB_HASHSERVE_UPSTREAM = "hashserv.yoctoproject.org:8686"
29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" 29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH"
30 30
31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__ 31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__
@@ -38,7 +38,7 @@ New Features / Enhancements in 4.0
38 38
39- Inclusive language adjustments to some variable names - see the 39- Inclusive language adjustments to some variable names - see the
40 :ref:`4.0 migration guide <migration-4.0-inclusive-language>` for details. 40 :ref:`4.0 migration guide <migration-4.0-inclusive-language>` for details.
41 41
42- New recipes: 42- New recipes:
43 43
44 - ``buildtools-docs-tarball`` 44 - ``buildtools-docs-tarball``
@@ -114,7 +114,7 @@ New Features / Enhancements in 4.0
114- BitBake enhancements: 114- BitBake enhancements:
115 115
116 - Fetcher enhancements: 116 - Fetcher enhancements:
117 117
118 - New :ref:`bitbake-user-manual/bitbake-user-manual-fetching:crate fetcher (\`\`crate://\`\`)` for Rust packages 118 - New :ref:`bitbake-user-manual/bitbake-user-manual-fetching:crate fetcher (\`\`crate://\`\`)` for Rust packages
119 - Added striplevel support to unpack 119 - Added striplevel support to unpack
120 - git: Add a warning asking users to set a branch in git urls 120 - git: Add a warning asking users to set a branch in git urls
@@ -127,7 +127,7 @@ New Features / Enhancements in 4.0
127 - ssh: now supports checkstatus, allows : in URLs (both required for use with sstate) and no longer requires username 127 - ssh: now supports checkstatus, allows : in URLs (both required for use with sstate) and no longer requires username
128 - wget: add redirectauth parameter 128 - wget: add redirectauth parameter
129 - wget: add 30s timeout for checkstatus calls 129 - wget: add 30s timeout for checkstatus calls
130 130
131 - Show warnings for append/prepend/remove operators combined with +=/.= 131 - Show warnings for append/prepend/remove operators combined with +=/.=
132 - Add bb.warnonce() and bb.erroronce() log methods 132 - Add bb.warnonce() and bb.erroronce() log methods
133 - Improved setscene task display 133 - Improved setscene task display
@@ -140,7 +140,7 @@ New Features / Enhancements in 4.0
140- Architecture-specific enhancements: 140- Architecture-specific enhancements:
141 141
142 - ARM: 142 - ARM:
143 143
144 - tune-cortexa72: Enable the crc extension by default for cortexa72 144 - tune-cortexa72: Enable the crc extension by default for cortexa72
145 - qemuarm64: Add tiny ktype to qemuarm64 bsp 145 - qemuarm64: Add tiny ktype to qemuarm64 bsp
146 - armv9a/tune: Add the support for the Neoverse N2 core 146 - armv9a/tune: Add the support for the Neoverse N2 core
@@ -163,7 +163,7 @@ New Features / Enhancements in 4.0
163 - linux-yocto-dev: add qemuriscv32 163 - linux-yocto-dev: add qemuriscv32
164 - packagegroup-core-tools-profile: Enable systemtap for riscv64 164 - packagegroup-core-tools-profile: Enable systemtap for riscv64
165 - qemuriscv: Use virtio-tablet-pci for mouse 165 - qemuriscv: Use virtio-tablet-pci for mouse
166 166
167 - x86: 167 - x86:
168 168
169 - kernel-yocto: conditionally enable stack protection checking on x86-64 169 - kernel-yocto: conditionally enable stack protection checking on x86-64
@@ -199,7 +199,7 @@ New Features / Enhancements in 4.0
199- yocto-check-layer: improved README checks 199- yocto-check-layer: improved README checks
200- cve-check: add json output format 200- cve-check: add json output format
201- cve-check: add coverage statistics on recipes with/without CVEs 201- cve-check: add coverage statistics on recipes with/without CVEs
202- Added mirrors for kernel sources and uninative binaries on kernel.org 202- Added mirrors for kernel sources and uninative binaries on kernel.org
203- glibc and binutils recipes now use shallow mirror tarballs for faster fetching 203- glibc and binutils recipes now use shallow mirror tarballs for faster fetching
204- When patching fails, show more information on the fatal error 204- When patching fails, show more information on the fatal error
205 205
@@ -234,7 +234,7 @@ New Features / Enhancements in 4.0
234 - Detect more known licenses in Python code 234 - Detect more known licenses in Python code
235 - Move license md5sums data into CSV files 235 - Move license md5sums data into CSV files
236 - npm: Use README as license fallback 236 - npm: Use README as license fallback
237 237
238- SDK-related enhancements: 238- SDK-related enhancements:
239 239
240 - Extended recipes to :ref:`ref-classes-nativesdk`: ``cargo``, 240 - Extended recipes to :ref:`ref-classes-nativesdk`: ``cargo``,
@@ -244,7 +244,7 @@ New Features / Enhancements in 4.0
244 - Support creating per-toolchain cmake file in SDK 244 - Support creating per-toolchain cmake file in SDK
245 245
246- Rust enhancements: 246- Rust enhancements:
247 247
248 - New python_setuptools3_rust class to enable building python extensions in Rust 248 - New python_setuptools3_rust class to enable building python extensions in Rust
249 - classes/meson: Add optional rust definitions 249 - classes/meson: Add optional rust definitions
250 250
@@ -337,37 +337,37 @@ Other license-related notes:
337Security Fixes in 4.0 337Security Fixes in 4.0
338~~~~~~~~~~~~~~~~~~~~~ 338~~~~~~~~~~~~~~~~~~~~~
339 339
340- binutils: :cve:`2021-42574`, :cve:`2021-45078` 340- binutils: :cve_nist:`2021-42574`, :cve_nist:`2021-45078`
341- curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947` 341- curl: :cve_nist:`2021-22945`, :cve_nist:`2021-22946`, :cve_nist:`2021-22947`
342- epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088` 342- epiphany: :cve_nist:`2021-45085`, :cve_nist:`2021-45086`, :cve_nist:`2021-45087`, :cve_nist:`2021-45088`
343- expat: :cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve:`2022-22825`, :cve:`2022-22826`, :cve:`2022-22827`, :cve:`2022-23852`, :cve:`2022-23990`, :cve:`2022-25235`, :cve:`2022-25236`, :cve:`2022-25313`, :cve:`2022-25314`, :cve:`2022-25315` 343- expat: :cve_nist:`2021-45960`, :cve_nist:`2021-46143`, :cve_nist:`2022-22822`, :cve_nist:`2022-22823`, :cve_nist:`2022-22824`, :cve_nist:`2022-22825`, :cve_nist:`2022-22826`, :cve_nist:`2022-22827`, :cve_nist:`2022-23852`, :cve_nist:`2022-23990`, :cve_nist:`2022-25235`, :cve_nist:`2022-25236`, :cve_nist:`2022-25313`, :cve_nist:`2022-25314`, :cve_nist:`2022-25315`
344- ffmpeg: :cve:`2021-38114` 344- ffmpeg: :cve_nist:`2021-38114`
345- gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765` 345- gcc: :cve_nist:`2021-35465`, :cve_nist:`2021-42574`, :cve_nist:`2021-46195`, :cve_nist:`2022-24765`
346- glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219` 346- glibc: :cve_nist:`2021-3998`, :cve_nist:`2021-3999`, :cve_nist:`2021-43396`, :cve_nist:`2022-23218`, :cve_nist:`2022-23219`
347- gmp: :cve:`2021-43618` 347- gmp: :cve_nist:`2021-43618`
348- go: :cve:`2021-41771` and :cve:`2021-41772` 348- go: :cve_nist:`2021-41771` and :cve_nist:`2021-41772`
349- grub2: :cve:`2021-3981` 349- grub2: :cve_nist:`2021-3981`
350- gzip: :cve:`2022-1271` 350- gzip: :cve_nist:`2022-1271`
351- libarchive : :cve:`2021-31566`, :cve:`2021-36976` 351- libarchive : :cve_nist:`2021-31566`, :cve_nist:`2021-36976`
352- libxml2: :cve:`2022-23308` 352- libxml2: :cve_nist:`2022-23308`
353- libxslt: :cve:`2021-30560` 353- libxslt: :cve_nist:`2021-30560`
354- lighttpd: :cve:`2022-22707` 354- lighttpd: :cve_nist:`2022-22707`
355- linux-yocto/5.10: amdgpu: :cve:`2021-42327` 355- linux-yocto/5.10: amdgpu: :cve_nist:`2021-42327`
356- lua: :cve:`2021-43396` 356- lua: :cve_nist:`2021-43396`
357- openssl: :cve:`2021-4044`, :cve:`2022-0778` 357- openssl: :cve_nist:`2021-4044`, :cve_nist:`2022-0778`
358- qemu: :cve:`2022-1050`, :cve:`2022-26353`, :cve:`2022-26354` 358- qemu: :cve_nist:`2022-1050`, :cve_nist:`2022-26353`, :cve_nist:`2022-26354`
359- rpm: :cve:`2021-3521` 359- rpm: :cve_nist:`2021-3521`
360- seatd: :cve:`2022-25643` 360- seatd: :cve_nist:`2022-25643`
361- speex: :cve:`2020-23903` 361- speex: :cve_nist:`2020-23903`
362- squashfs-tools: :cve:`2021-41072` 362- squashfs-tools: :cve_nist:`2021-41072`
363- systemd: :cve:`2021-4034` 363- systemd: :cve_nist:`2021-4034`
364- tiff: :cve:`2022-0561`, :cve:`2022-0562`, :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909`, :cve:`2022-0924`, :cve:`2022-1056`, :cve:`2022-22844` 364- tiff: :cve_nist:`2022-0561`, :cve_nist:`2022-0562`, :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909`, :cve_nist:`2022-0924`, :cve_nist:`2022-1056`, :cve_nist:`2022-22844`
365- unzip: :cve:`2021-4217` 365- unzip: :cve_nist:`2021-4217`
366- vim: :cve:`2021-3796`, :cve:`2021-3872`, :cve:`2021-3875`, :cve:`2021-3927`, :cve:`2021-3928`, :cve:`2021-3968`, :cve:`2021-3973`, :cve:`2021-4187`, :cve:`2022-0128`, :cve:`2022-0156`, :cve:`2022-0158`, :cve:`2022-0261`, :cve:`2022-0318`, :cve:`2022-0319`, :cve:`2022-0554`, :cve:`2022-0696`, :cve:`2022-0714`, :cve:`2022-0729`, :cve:`2022-0943` 366- vim: :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, :cve_nist:`2021-3875`, :cve_nist:`2021-3927`, :cve_nist:`2021-3928`, :cve_nist:`2021-3968`, :cve_nist:`2021-3973`, :cve_nist:`2021-4187`, :cve_nist:`2022-0128`, :cve_nist:`2022-0156`, :cve_nist:`2022-0158`, :cve_nist:`2022-0261`, :cve_nist:`2022-0318`, :cve_nist:`2022-0319`, :cve_nist:`2022-0554`, :cve_nist:`2022-0696`, :cve_nist:`2022-0714`, :cve_nist:`2022-0729`, :cve_nist:`2022-0943`
367- virglrenderer: :cve:`2022-0135`, :cve:`2022-0175` 367- virglrenderer: :cve_nist:`2022-0135`, :cve_nist:`2022-0175`
368- webkitgtk: :cve:`2022-22589`, :cve:`2022-22590`, :cve:`2022-22592` 368- webkitgtk: :cve_nist:`2022-22589`, :cve_nist:`2022-22590`, :cve_nist:`2022-22592`
369- xz: :cve:`2022-1271` 369- xz: :cve_nist:`2022-1271`
370- zlib: :cve:`2018-25032` 370- zlib: :cve_nist:`2018-25032`
371 371
372 372
373 373
diff --git a/documentation/migration-guides/release-notes-4.1.1.rst b/documentation/migration-guides/release-notes-4.1.1.rst
index 4f31fbf1c7..8393bc5320 100644
--- a/documentation/migration-guides/release-notes-4.1.1.rst
+++ b/documentation/migration-guides/release-notes-4.1.1.rst
@@ -6,16 +6,16 @@ Release notes for Yocto-4.1.1 (Langdale)
6Security Fixes in Yocto-4.1.1 6Security Fixes in Yocto-4.1.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- curl: Fix :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915` and :cve:`2022-42916` 9- curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916`
10- libx11: Fix :cve:`2022-3554` 10- libx11: Fix :cve_nist:`2022-3554`
11- lighttpd: Fix :cve:`2022-41556` 11- lighttpd: Fix :cve_nist:`2022-41556`
12- openssl: Fix :cve:`2022-3358`, :cve:`2022-3602` and :cve:`2022-3786` 12- openssl: Fix :cve_nist:`2022-3358`, :cve_nist:`2022-3602` and :cve_nist:`2022-3786`
13- pixman: Fix :cve:`2022-44638` 13- pixman: Fix :cve_nist:`2022-44638`
14- qemu: Fix :cve:`2022-3165` 14- qemu: Fix :cve_nist:`2022-3165`
15- sudo: Fix :cve:`2022-43995` 15- sudo: Fix :cve_nist:`2022-43995`
16- tiff: Fix :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570` and :cve:`2022-3598` 16- tiff: Fix :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570` and :cve_nist:`2022-3598`
17- xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` 17- xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551`
18- xserver-xorg: Ignore :cve:`2022-3553` 18- xserver-xorg: Ignore :cve_nist:`2022-3553`
19 19
20 20
21Fixes in Yocto-4.1.1 21Fixes in Yocto-4.1.1
@@ -179,7 +179,7 @@ Fixes in Yocto-4.1.1
179- shadow: update 4.12.1 -> 4.12.3 179- shadow: update 4.12.1 -> 4.12.3
180- systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils 180- systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils
181- test-manual: fix typo in machine name 181- test-manual: fix typo in machine name
182- tiff: fix a typo for :cve:`2022-2953`.patch 182- tiff: fix a typo for :cve_nist:`2022-2953`.patch
183- u-boot: Add savedefconfig task 183- u-boot: Add savedefconfig task
184- u-boot: Remove duplicate inherit of cml1 184- u-boot: Remove duplicate inherit of cml1
185- uboot-sign: Fix using wrong KEY_REQ_ARGS 185- uboot-sign: Fix using wrong KEY_REQ_ARGS
diff --git a/documentation/migration-guides/release-notes-4.1.2.rst b/documentation/migration-guides/release-notes-4.1.2.rst
index ee5d4ccc51..ea20ced1be 100644
--- a/documentation/migration-guides/release-notes-4.1.2.rst
+++ b/documentation/migration-guides/release-notes-4.1.2.rst
@@ -6,18 +6,18 @@ Release notes for Yocto-4.1.2 (Langdale)
6Security Fixes in Yocto-4.1.2 6Security Fixes in Yocto-4.1.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- sudo: Fix :cve:`2022-43995` 9- sudo: Fix :cve_nist:`2022-43995`
10- binutils: Fix :cve:`2022-4285` 10- binutils: Fix :cve_nist:`2022-4285`
11- cairo: update patch for :cve:`2019-6461` with upstream solution 11- cairo: update patch for :cve_nist:`2019-6461` with upstream solution
12- expat: Fix :cve:`2022-43680` 12- expat: Fix :cve_nist:`2022-43680`
13- ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965`
14- grub: Fix :cve:`2022-28736` 14- grub: Fix :cve_nist:`2022-28736`
15- libarchive: Fix :cve:`2022-36227` 15- libarchive: Fix :cve_nist:`2022-36227`
16- libpam: Fix :cve:`2022-28321` 16- libpam: Fix :cve_nist:`2022-28321`
17- libpng: Fix :cve:`2019-6129` 17- libpng: Fix :cve_nist:`2019-6129`
18- ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` 18- ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739`
19- tiff: Fix :cve:`2022-3970` 19- tiff: Fix :cve_nist:`2022-3970`
20- vim: Fix :cve:`2022-4141` 20- vim: Fix :cve_nist:`2022-4141`
21 21
22 22
23Fixes in Yocto-4.1.2 23Fixes in Yocto-4.1.2
diff --git a/documentation/migration-guides/release-notes-4.1.3.rst b/documentation/migration-guides/release-notes-4.1.3.rst
index d8474cda68..b07cfa4689 100644
--- a/documentation/migration-guides/release-notes-4.1.3.rst
+++ b/documentation/migration-guides/release-notes-4.1.3.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.1.3 (Langdale)
6Security Fixes in Yocto-4.1.3 6Security Fixes in Yocto-4.1.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- apr-util: Fix :cve:`2022-25147` 9- apr-util: Fix :cve_nist:`2022-25147`
10- apr: Fix :cve:`2022-24963` and :cve:`2022-28331` 10- apr: Fix :cve_nist:`2022-24963` and :cve_nist:`2022-28331`
11- bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` 11- bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924`
12- curl: Fix :cve:`2022-43551` and :cve:`2022-43552` 12- curl: Fix :cve_nist:`2022-43551` and :cve_nist:`2022-43552`
13- dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` 13- dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012`
14- git: Fix :cve:`2022-23521`, :cve:`2022-39253`, :cve:`2022-39260` and :cve:`2022-41903` 14- git: Fix :cve_nist:`2022-23521`, :cve_nist:`2022-39253`, :cve_nist:`2022-39260` and :cve_nist:`2022-41903`
15- git: Ignore :cve:`2022-41953` 15- git: Ignore :cve_nist:`2022-41953`
16- go: Fix :cve:`2022-41717` and :cve:`2022-41720` 16- go: Fix :cve_nist:`2022-41717` and :cve_nist:`2022-41720`
17- grub2: Fix :cve:`2022-2601` and :cve:`2022-3775` 17- grub2: Fix :cve_nist:`2022-2601` and :cve_nist:`2022-3775`
18- less: Fix :cve:`2022-46663` 18- less: Fix :cve_nist:`2022-46663`
19- libarchive: Fix :cve:`2022-36227` 19- libarchive: Fix :cve_nist:`2022-36227`
20- libksba: Fix :cve:`2022-47629` 20- libksba: Fix :cve_nist:`2022-47629`
21- openssl: Fix :cve:`2022-3996` 21- openssl: Fix :cve_nist:`2022-3996`
22- pkgconf: Fix :cve:`2023-24056` 22- pkgconf: Fix :cve_nist:`2023-24056`
23- ppp: Fix :cve:`2022-4603` 23- ppp: Fix :cve_nist:`2022-4603`
24- sudo: Fix :cve:`2023-22809` 24- sudo: Fix :cve_nist:`2023-22809`
25- tar: Fix :cve:`2022-48303` 25- tar: Fix :cve_nist:`2022-48303`
26- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-0433` and :cve:`2023-0512` 26- vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-0433` and :cve_nist:`2023-0512`
27- xserver-xorg: Fix :cve_mitre:`2023-0494` 27- xserver-xorg: Fix :cve_mitre:`2023-0494`
28- xwayland: Fix :cve_mitre:`2023-0494` 28- xwayland: Fix :cve_mitre:`2023-0494`
29 29
diff --git a/documentation/migration-guides/release-notes-4.1.4.rst b/documentation/migration-guides/release-notes-4.1.4.rst
index de469f4bee..147dd371b1 100644
--- a/documentation/migration-guides/release-notes-4.1.4.rst
+++ b/documentation/migration-guides/release-notes-4.1.4.rst
@@ -6,23 +6,23 @@ Release notes for Yocto-4.1.4 (Langdale)
6Security Fixes in Yocto-4.1.4 6Security Fixes in Yocto-4.1.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- cve-extra-exclusions/linux-yocto: Ignore :cve:`2020-27784`, :cve:`2021-3669`, :cve:`2021-3759`, :cve:`2021-4218`, :cve:`2022-0480`, :cve:`2022-1184`, :cve:`2022-1462`, :cve:`2022-2308`, :cve:`2022-2327`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2785`, :cve:`2022-3176`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-3526`, :cve:`2022-3563`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3637`, :cve:`2022-3646` and :cve:`2022-3649` 9- cve-extra-exclusions/linux-yocto: Ignore :cve_nist:`2020-27784`, :cve_nist:`2021-3669`, :cve_nist:`2021-3759`, :cve_nist:`2021-4218`, :cve_nist:`2022-0480`, :cve_nist:`2022-1184`, :cve_nist:`2022-1462`, :cve_nist:`2022-2308`, :cve_nist:`2022-2327`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2785`, :cve_nist:`2022-3176`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-3526`, :cve_nist:`2022-3563`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3637`, :cve_nist:`2022-3646` and :cve_nist:`2022-3649`
10- cve-extra-exclusions/linux-yocto 5.15: Ignore :cve:`2022-3435`, :cve:`2022-3534`, :cve:`2022-3564`, :cve:`2022-3564`, :cve:`2022-3619`, :cve:`2022-3640`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-4382`, :cve:`2023-0266` and :cve:`2023-0394` 10- cve-extra-exclusions/linux-yocto 5.15: Ignore :cve_nist:`2022-3435`, :cve_nist:`2022-3534`, :cve_nist:`2022-3564`, :cve_nist:`2022-3564`, :cve_nist:`2022-3619`, :cve_nist:`2022-3640`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-4382`, :cve_nist:`2023-0266` and :cve_nist:`2023-0394`
11- epiphany: Fix :cve:`2023-26081` 11- epiphany: Fix :cve_nist:`2023-26081`
12- git: Ignore :cve:`2023-22743` 12- git: Ignore :cve_nist:`2023-22743`
13- go: Fix :cve:`2022-41722`, :cve:`2022-41723`, :cve:`2022-41724`, :cve:`2022-41725` and :cve:`2023-24532` 13- go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41723`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725` and :cve_nist:`2023-24532`
14- harfbuzz: Fix :cve:`2023-25193` 14- harfbuzz: Fix :cve_nist:`2023-25193`
15- libmicrohttpd: Fix :cve:`2023-27371` 15- libmicrohttpd: Fix :cve_nist:`2023-27371`
16- libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` 16- libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304`
17- openssl: Fix :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` 17- openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466`
18- python3-setuptools: Fix :cve:`2022-40897` 18- python3-setuptools: Fix :cve_nist:`2022-40897`
19- qemu: Fix :cve:`2022-4144` 19- qemu: Fix :cve_nist:`2022-4144`
20- screen: Fix :cve:`2023-24626` 20- screen: Fix :cve_nist:`2023-24626`
21- shadow: Ignore :cve:`2016-15024` 21- shadow: Ignore :cve_nist:`2016-15024`
22- tiff: Fix :cve:`2022-48281`, :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` 22- tiff: Fix :cve_nist:`2022-48281`, :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804`
23- vim: Fix :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` 23- vim: Fix :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355`
24- xdg-utils: Fix :cve:`2022-4055` 24- xdg-utils: Fix :cve_nist:`2022-4055`
25- xserver-xorg: Fix for :cve:`2023-1393` 25- xserver-xorg: Fix for :cve_nist:`2023-1393`
26 26
27 27
28Fixes in Yocto-4.1.4 28Fixes in Yocto-4.1.4
diff --git a/documentation/migration-guides/release-notes-4.1.rst b/documentation/migration-guides/release-notes-4.1.rst
index a0d5196128..3ad3611b80 100644
--- a/documentation/migration-guides/release-notes-4.1.rst
+++ b/documentation/migration-guides/release-notes-4.1.rst
@@ -225,36 +225,36 @@ The following corrections have been made to the :term:`LICENSE` values set by re
225Security Fixes in 4.1 225Security Fixes in 4.1
226~~~~~~~~~~~~~~~~~~~~~ 226~~~~~~~~~~~~~~~~~~~~~
227 227
228- bind: :cve:`2022-1183`, :cve:`2022-2795`, :cve:`2022-2881`, :cve:`2022-2906`, :cve:`2022-3080`, :cve:`2022-38178` 228- bind: :cve_nist:`2022-1183`, :cve_nist:`2022-2795`, :cve_nist:`2022-2881`, :cve_nist:`2022-2906`, :cve_nist:`2022-3080`, :cve_nist:`2022-38178`
229- binutils: :cve:`2019-1010204`, :cve:`2022-38126`, :cve:`2022-38127`, :cve:`2022-38128`, :cve:`2022-38533` 229- binutils: :cve_nist:`2019-1010204`, :cve_nist:`2022-38126`, :cve_nist:`2022-38127`, :cve_nist:`2022-38128`, :cve_nist:`2022-38533`
230- busybox: :cve:`2022-30065` 230- busybox: :cve_nist:`2022-30065`
231- connman: :cve:`2022-32292`, :cve:`2022-32293` 231- connman: :cve_nist:`2022-32292`, :cve_nist:`2022-32293`
232- cups: :cve:`2022-26691` 232- cups: :cve_nist:`2022-26691`
233- e2fsprogs: :cve:`2022-1304` 233- e2fsprogs: :cve_nist:`2022-1304`
234- expat: :cve:`2022-40674` 234- expat: :cve_nist:`2022-40674`
235- freetype: :cve:`2022-27404` 235- freetype: :cve_nist:`2022-27404`
236- glibc: :cve:`2022-39046` 236- glibc: :cve_nist:`2022-39046`
237- gnupg: :cve:`2022-34903` 237- gnupg: :cve_nist:`2022-34903`
238- grub2: :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734`, :cve:`2022-28735` 238- grub2: :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734`, :cve_nist:`2022-28735`
239- inetutils: :cve:`2022-39028` 239- inetutils: :cve_nist:`2022-39028`
240- libtirpc: :cve:`2021-46828` 240- libtirpc: :cve_nist:`2021-46828`
241- libxml2: :cve:`2016-3709` (ignored) 241- libxml2: :cve_nist:`2016-3709` (ignored)
242- libxslt: :cve:`2022-29824` (not applicable) 242- libxslt: :cve_nist:`2022-29824` (not applicable)
243- linux-yocto/5.15: :cve:`2022-28796` 243- linux-yocto/5.15: :cve_nist:`2022-28796`
244- logrotate: :cve:`2022-1348` 244- logrotate: :cve_nist:`2022-1348`
245- lua: :cve:`2022-33099` 245- lua: :cve_nist:`2022-33099`
246- nasm: :cve:`2020-18974` (ignored) 246- nasm: :cve_nist:`2020-18974` (ignored)
247- ncurses: :cve:`2022-29458` 247- ncurses: :cve_nist:`2022-29458`
248- openssl: :cve:`2022-1292`, :cve:`2022-1343`, :cve:`2022-1434`, :cve:`2022-1473`, :cve:`2022-2068`, :cve:`2022-2274`, :cve:`2022-2097` 248- openssl: :cve_nist:`2022-1292`, :cve_nist:`2022-1343`, :cve_nist:`2022-1434`, :cve_nist:`2022-1473`, :cve_nist:`2022-2068`, :cve_nist:`2022-2274`, :cve_nist:`2022-2097`
249- python3: :cve:`2015-20107` (ignored) 249- python3: :cve_nist:`2015-20107` (ignored)
250- qemu: :cve:`2021-20255` (ignored), :cve:`2019-12067` (ignored), :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414` 250- qemu: :cve_nist:`2021-20255` (ignored), :cve_nist:`2019-12067` (ignored), :cve_nist:`2021-3507`, :cve_nist:`2022-0216`, :cve_nist:`2022-2962`, :cve_nist:`2022-35414`
251- rpm: :cve:`2021-35937`, :cve:`2021-35938`, :cve:`2021-35939` 251- rpm: :cve_nist:`2021-35937`, :cve_nist:`2021-35938`, :cve_nist:`2021-35939`
252- rsync: :cve:`2022-29154` 252- rsync: :cve_nist:`2022-29154`
253- subversion: :cve:`2021-28544`, :cve:`2022-24070` 253- subversion: :cve_nist:`2021-28544`, :cve_nist:`2022-24070`
254- tiff: :cve:`2022-1210` (not applicable), :cve:`2022-1622`, :cve:`2022-1623` (invalid), :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526` 254- tiff: :cve_nist:`2022-1210` (not applicable), :cve_nist:`2022-1622`, :cve_nist:`2022-1623` (invalid), :cve_nist:`2022-2056`, :cve_nist:`2022-2057`, :cve_nist:`2022-2058`, :cve_nist:`2022-2953`, :cve_nist:`2022-34526`
255- unzip: :cve:`2022-0529`, :cve:`2022-0530` 255- unzip: :cve_nist:`2022-0529`, :cve_nist:`2022-0530`
256- vim: :cve:`2022-1381`, :cve:`2022-1420`, :cve:`2022-1621`, :cve:`2022-1629`, :cve:`2022-1674`, :cve:`2022-1733`, :cve:`2022-1735`, :cve:`2022-1769`, :cve:`2022-1771`, :cve:`2022-1785`, :cve:`2022-1796`, :cve:`2022-1927`, :cve:`2022-1942`, :cve:`2022-2257`, :cve:`2022-2264`, :cve:`2022-2284`, :cve:`2022-2285`, :cve:`2022-2286`, :cve:`2022-2287`, :cve:`2022-2816`, :cve:`2022-2817`, :cve:`2022-2819`, :cve:`2022-2845`, :cve:`2022-2849`, :cve:`2022-2862`, :cve:`2022-2874`, :cve:`2022-2889`, :cve:`2022-2980`, :cve:`2022-2946`, :cve:`2022-2982`, :cve:`2022-3099`, :cve:`2022-3134`, :cve:`2022-3234`, :cve:`2022-3278` 256- vim: :cve_nist:`2022-1381`, :cve_nist:`2022-1420`, :cve_nist:`2022-1621`, :cve_nist:`2022-1629`, :cve_nist:`2022-1674`, :cve_nist:`2022-1733`, :cve_nist:`2022-1735`, :cve_nist:`2022-1769`, :cve_nist:`2022-1771`, :cve_nist:`2022-1785`, :cve_nist:`2022-1796`, :cve_nist:`2022-1927`, :cve_nist:`2022-1942`, :cve_nist:`2022-2257`, :cve_nist:`2022-2264`, :cve_nist:`2022-2284`, :cve_nist:`2022-2285`, :cve_nist:`2022-2286`, :cve_nist:`2022-2287`, :cve_nist:`2022-2816`, :cve_nist:`2022-2817`, :cve_nist:`2022-2819`, :cve_nist:`2022-2845`, :cve_nist:`2022-2849`, :cve_nist:`2022-2862`, :cve_nist:`2022-2874`, :cve_nist:`2022-2889`, :cve_nist:`2022-2980`, :cve_nist:`2022-2946`, :cve_nist:`2022-2982`, :cve_nist:`2022-3099`, :cve_nist:`2022-3134`, :cve_nist:`2022-3234`, :cve_nist:`2022-3278`
257- zlib: :cve:`2022-37434` 257- zlib: :cve_nist:`2022-37434`
258 258
259 259
260 260
diff --git a/documentation/migration-guides/release-notes-4.2.1.rst b/documentation/migration-guides/release-notes-4.2.1.rst
index 948c35fd67..0b2ef060fc 100644
--- a/documentation/migration-guides/release-notes-4.2.1.rst
+++ b/documentation/migration-guides/release-notes-4.2.1.rst
@@ -6,13 +6,13 @@ Release notes for Yocto-4.2.1 (Mickledore)
6Security Fixes in Yocto-4.2.1 6Security Fixes in Yocto-4.2.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- connman: Fix :cve:`2023-28488` 9- connman: Fix :cve_nist:`2023-28488`
10- linux-yocto: Ignore :cve:`2023-1652` and :cve:`2023-1829` 10- linux-yocto: Ignore :cve_nist:`2023-1652` and :cve_nist:`2023-1829`
11- ghostscript: Fix :cve:`2023-28879` 11- ghostscript: Fix :cve_nist:`2023-28879`
12- qemu: Ignore :cve:`2023-0664` 12- qemu: Ignore :cve_nist:`2023-0664`
13- ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` 13- ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739`
14- tiff: Fix :cve:`2022-4645` 14- tiff: Fix :cve_nist:`2022-4645`
15- xwayland: Fix :cve:`2023-1393` 15- xwayland: Fix :cve_nist:`2023-1393`
16 16
17 17
18Fixes in Yocto-4.2.1 18Fixes in Yocto-4.2.1
diff --git a/documentation/migration-guides/release-notes-4.2.2.rst b/documentation/migration-guides/release-notes-4.2.2.rst
index 74f2d0e82a..0795c8e938 100644
--- a/documentation/migration-guides/release-notes-4.2.2.rst
+++ b/documentation/migration-guides/release-notes-4.2.2.rst
@@ -6,21 +6,21 @@ Release notes for Yocto-4.2.2 (Mickledore)
6Security Fixes in Yocto-4.2.2 6Security Fixes in Yocto-4.2.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-1972` 9- binutils: Fix :cve_nist:`2023-1972`
10- cups: Fix :cve:`2023-32324` 10- cups: Fix :cve_nist:`2023-32324`
11- curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` 11- curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322`
12- dbus: Fix :cve:`2023-34969` 12- dbus: Fix :cve_nist:`2023-34969`
13- git: Fix :cve:`2023-25652` and :cve:`2023-29007` 13- git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007`
14- git: Ignore :cve:`2023-25815` 14- git: Ignore :cve_nist:`2023-25815`
15- libwebp: Fix :cve:`2023-1999` 15- libwebp: Fix :cve_nist:`2023-1999`
16- libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` 16- libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469`
17- libxpm: Fix :cve:`2022-44617` 17- libxpm: Fix :cve_nist:`2022-44617`
18- ninja: Ignore :cve:`2021-4336` 18- ninja: Ignore :cve_nist:`2021-4336`
19- openssl: Fix :cve:`2023-0464`, :cve:`2023-0465`, :cve:`2023-0466`, :cve:`2023-1255` and :cve:`2023-2650` 19- openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465`, :cve_nist:`2023-0466`, :cve_nist:`2023-1255` and :cve_nist:`2023-2650`
20- perl: Fix :cve:`2023-31484` and :cve:`2023-31486` 20- perl: Fix :cve_nist:`2023-31484` and :cve_nist:`2023-31486`
21- sysstat: Fix :cve:`2023-33204` 21- sysstat: Fix :cve_nist:`2023-33204`
22- tiff: Fix :cve_mitre:`2023-25434`, :cve:`2023-26965` and :cve:`2023-2731` 22- tiff: Fix :cve_mitre:`2023-25434`, :cve_nist:`2023-26965` and :cve_nist:`2023-2731`
23- vim: Fix :cve:`2023-2426` 23- vim: Fix :cve_nist:`2023-2426`
24 24
25 25
26Fixes in Yocto-4.2.2 26Fixes in Yocto-4.2.2
diff --git a/documentation/migration-guides/release-notes-4.2.3.rst b/documentation/migration-guides/release-notes-4.2.3.rst
index 3b568a1c29..86ce5b7025 100644
--- a/documentation/migration-guides/release-notes-4.2.3.rst
+++ b/documentation/migration-guides/release-notes-4.2.3.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.2.3 (Mickledore)
6Security Fixes in Yocto-4.2.3 6Security Fixes in Yocto-4.2.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2828` and :cve:`2023-2911` 9- bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911`
10- cups: Fix :cve:`2023-34241` 10- cups: Fix :cve_nist:`2023-34241`
11- dmidecode: Fix :cve:`2023-30630` 11- dmidecode: Fix :cve_nist:`2023-30630`
12- erofs-utils: Fix :cve:`2023-33551` and :cve:`2023-33552` 12- erofs-utils: Fix :cve_nist:`2023-33551` and :cve_nist:`2023-33552`
13- ghostscript: Fix :cve:`2023-36664` 13- ghostscript: Fix :cve_nist:`2023-36664`
14- go: Fix :cve_mitre:`2023-24531` 14- go: Fix :cve_mitre:`2023-24531`
15- libarchive: ignore :cve:`2023-30571` 15- libarchive: ignore :cve_nist:`2023-30571`
16- libjpeg-turbo: Fix :cve:`2023-2804` 16- libjpeg-turbo: Fix :cve_nist:`2023-2804`
17- libx11: Fix :cve:`2023-3138` 17- libx11: Fix :cve_nist:`2023-3138`
18- ncurses: Fix :cve:`2023-29491` 18- ncurses: Fix :cve_nist:`2023-29491`
19- openssh: Fix :cve:`2023-38408` 19- openssh: Fix :cve_nist:`2023-38408`
20- python3-certifi: Fix :cve:`2023-37920` 20- python3-certifi: Fix :cve_nist:`2023-37920`
21- python3-requests: Fix :cve:`2023-32681` 21- python3-requests: Fix :cve_nist:`2023-32681`
22- python3: Ignore :cve:`2023-36632` 22- python3: Ignore :cve_nist:`2023-36632`
23- qemu: fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` 23- qemu: fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301`
24- ruby: Fix :cve:`2023-36617` 24- ruby: Fix :cve_nist:`2023-36617`
25- vim: Fix :cve:`2023-2609` and :cve:`2023-2610` 25- vim: Fix :cve_nist:`2023-2609` and :cve_nist:`2023-2610`
26- webkitgtk: Fix :cve:`2023-27932` and :cve:`2023-27954` 26- webkitgtk: Fix :cve_nist:`2023-27932` and :cve_nist:`2023-27954`
27 27
28 28
29Fixes in Yocto-4.2.3 29Fixes in Yocto-4.2.3
diff --git a/documentation/migration-guides/release-notes-4.2.4.rst b/documentation/migration-guides/release-notes-4.2.4.rst
index 3c20140e29..60f878c3b0 100644
--- a/documentation/migration-guides/release-notes-4.2.4.rst
+++ b/documentation/migration-guides/release-notes-4.2.4.rst
@@ -6,44 +6,44 @@ Release notes for Yocto-4.2.4 (Mickledore)
6Security Fixes in Yocto-4.2.4 6Security Fixes in Yocto-4.2.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-3341` and :cve:`2023-4236` 9- bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236`
10- binutils: Fix :cve:`2023-39128` 10- binutils: Fix :cve_nist:`2023-39128`
11- cups: fix :cve:`2023-4504` 11- cups: fix :cve_nist:`2023-4504`
12- curl: Fix :cve:`2023-28320`, :cve:`2023-32001`, :cve:`2023-38039`, :cve:`2023-38545` and :cve:`2023-38546` 12- curl: Fix :cve_nist:`2023-28320`, :cve_nist:`2023-32001`, :cve_nist:`2023-38039`, :cve_nist:`2023-38545` and :cve_nist:`2023-38546`
13- dmidecode: fix for :cve:`2023-30630` 13- dmidecode: fix for :cve_nist:`2023-30630`
14- dropbear: fix :cve:`2023-36328` 14- dropbear: fix :cve_nist:`2023-36328`
15- ffmpeg: Ignore :cve:`2023-39018` 15- ffmpeg: Ignore :cve_nist:`2023-39018`
16- gcc: Fix :cve:`2023-4039` 16- gcc: Fix :cve_nist:`2023-4039`
17- gdb: Fix :cve:`2023-39128` 17- gdb: Fix :cve_nist:`2023-39128`
18- ghostscript: Fix :cve:`2023-38559` and :cve:`2023-43115` 18- ghostscript: Fix :cve_nist:`2023-38559` and :cve_nist:`2023-43115`
19- glibc: Fix :cve:`2023-4527` and :cve:`2023-4806` 19- glibc: Fix :cve_nist:`2023-4527` and :cve_nist:`2023-4806`
20- go: Fix :cve:`2023-29409` and :cve:`2023-39533` 20- go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39533`
21- grub: Fix :cve:`2023-4692` and :cve:`2023-4693` 21- grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
22- gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` 22- gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476`
23- inetutils: fix :cve:`2023-40303` 23- inetutils: fix :cve_nist:`2023-40303`
24- librsvg: Fix :cve:`2023-38633` 24- librsvg: Fix :cve_nist:`2023-38633`
25- libssh2: Fix :cve:`2020-22218` 25- libssh2: Fix :cve_nist:`2020-22218`
26- libwebp: Fix :cve:`2023-4863` and :cve:`2023-5129` 26- libwebp: Fix :cve_nist:`2023-4863` and :cve_nist:`2023-5129`
27- libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` 27- libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787`
28- libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` 28- libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789`
29- linux-yocto/6.1: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568` 29- linux-yocto/6.1: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568`
30- linux-yocto/6.1 (Continued): Ignore :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12362`, :cve:`2020-12363`, :cve:`2020-12364`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24504`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32078`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33061`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve:`2021-3493`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3669`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4023`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4150`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4204`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-44879`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0382`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0480`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0500`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-0998`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1263`, :cve:`2022-1280`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1508`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20148`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20409`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve:`2022-20424`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20568`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-23222`, :cve:`2022-2327`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-27672`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-2991`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3108`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3176`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-3344`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3522`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-3595`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-38457`, :cve:`2022-3903`, :cve:`2022-3910`, :cve:`2022-39188`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40133`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4696`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-47946`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0386`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1295`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1872`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2007`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20928`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22995`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23000`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-23586`, :cve:`2023-2430`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3389`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-4611` and :cve:`2023-4623` 30- linux-yocto/6.1 (Continued): Ignore :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12362`, :cve_nist:`2020-12363`, :cve_nist:`2020-12364`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24504`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32078`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33061`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_nist:`2021-3493`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3669`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4023`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4150`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4204`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-44879`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0382`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0480`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0500`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-0998`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1263`, :cve_nist:`2022-1280`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1508`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20148`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20409`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_nist:`2022-20424`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20568`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-23222`, :cve_nist:`2022-2327`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-27672`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-2991`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3108`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3176`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-3344`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3522`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-3595`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-38457`, :cve_nist:`2022-3903`, :cve_nist:`2022-3910`, :cve_nist:`2022-39188`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40133`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4696`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-47946`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0386`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1295`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1872`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2007`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20928`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22995`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23000`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-23586`, :cve_nist:`2023-2430`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3389`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-4611` and :cve_nist:`2023-4623`
31- nghttp2: Fix :cve:`2023-35945` 31- nghttp2: Fix :cve_nist:`2023-35945`
32- openssl: Fix :cve:`2023-2975`, :cve:`2023-3446`, :cve:`2023-3817`, :cve:`2023-4807` and :cve:`2023-5363` 32- openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446`, :cve_nist:`2023-3817`, :cve_nist:`2023-4807` and :cve_nist:`2023-5363`
33- pixman: Ignore :cve:`2023-37769` 33- pixman: Ignore :cve_nist:`2023-37769`
34- procps: Fix :cve:`2023-4016` 34- procps: Fix :cve_nist:`2023-4016`
35- python3-git: Fix :cve:`2023-40267`, :cve:`2023-40590` and :cve:`2023-41040` 35- python3-git: Fix :cve_nist:`2023-40267`, :cve_nist:`2023-40590` and :cve_nist:`2023-41040`
36- python3-pygments: Fix :cve:`2022-40896` 36- python3-pygments: Fix :cve_nist:`2022-40896`
37- python3-urllib3: Fix :cve:`2023-43804` and :cve:`2023-45803` 37- python3-urllib3: Fix :cve_nist:`2023-43804` and :cve_nist:`2023-45803`
38- python3: Fix :cve:`2023-24329` and :cve:`2023-40217` 38- python3: Fix :cve_nist:`2023-24329` and :cve_nist:`2023-40217`
39- qemu: Fix :cve:`2023-3180`, :cve:`2023-3354` and :cve:`2023-42467` 39- qemu: Fix :cve_nist:`2023-3180`, :cve_nist:`2023-3354` and :cve_nist:`2023-42467`
40- qemu: Ignore :cve:`2023-2680` 40- qemu: Ignore :cve_nist:`2023-2680`
41- screen: Fix :cve:`2023-24626` 41- screen: Fix :cve_nist:`2023-24626`
42- shadow: Fix :cve_mitre:`2023-4641` 42- shadow: Fix :cve_mitre:`2023-4641`
43- tiff: Fix :cve:`2023-40745` and :cve:`2023-41175` 43- tiff: Fix :cve_nist:`2023-40745` and :cve_nist:`2023-41175`
44- vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750`, :cve:`2023-4752`, :cve:`2023-4781`, :cve:`2023-5441` and :cve:`2023-5535` 44- vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750`, :cve_nist:`2023-4752`, :cve_nist:`2023-4781`, :cve_nist:`2023-5441` and :cve_nist:`2023-5535`
45- webkitgtk: Fix :cve:`2023-32435` and :cve:`2023-32439` 45- webkitgtk: Fix :cve_nist:`2023-32435` and :cve_nist:`2023-32439`
46- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 46- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
47 47
48 48
49Fixes in Yocto-4.2.4 49Fixes in Yocto-4.2.4
diff --git a/documentation/migration-guides/release-notes-4.2.rst b/documentation/migration-guides/release-notes-4.2.rst
index 653602f152..8da42a4390 100644
--- a/documentation/migration-guides/release-notes-4.2.rst
+++ b/documentation/migration-guides/release-notes-4.2.rst
@@ -35,10 +35,10 @@ New Features / Enhancements in 4.2
35 35
36 - BitBake's UI will now ping the server regularly to ensure 36 - BitBake's UI will now ping the server regularly to ensure
37 it is still alive. 37 it is still alive.
38 38
39- New variables: 39- New variables:
40 40
41 - :term:`VOLATILE_TMP_DIR` allows to specify 41 - ``VOLATILE_TMP_DIR`` allows to specify
42 whether ``/tmp`` should be on persistent storage 42 whether ``/tmp`` should be on persistent storage
43 or in RAM. 43 or in RAM.
44 44
@@ -288,7 +288,7 @@ New Features / Enhancements in 4.2
288 BitBake manual. All variables should be easy to access through the Yocto 288 BitBake manual. All variables should be easy to access through the Yocto
289 Manual variable index. 289 Manual variable index.
290 - Expanded the description of the :term:`BB_NUMBER_THREADS` variable. 290 - Expanded the description of the :term:`BB_NUMBER_THREADS` variable.
291 291
292- Miscellaneous changes: 292- Miscellaneous changes:
293 293
294 - Supporting 64 bit dates on 32 bit platforms: several packages have been 294 - Supporting 64 bit dates on 32 bit platforms: several packages have been
@@ -348,39 +348,39 @@ The following corrections have been made to the :term:`LICENSE` values set by re
348Security Fixes in 4.2 348Security Fixes in 4.2
349~~~~~~~~~~~~~~~~~~~~~ 349~~~~~~~~~~~~~~~~~~~~~
350 350
351- binutils: :cve:`2022-4285`, :cve_mitre:`2023-25586` 351- binutils: :cve_nist:`2022-4285`, :cve_mitre:`2023-25586`
352- curl: :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915`, :cve:`2022-42916` 352- curl: :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915`, :cve_nist:`2022-42916`
353- epiphany: :cve:`2023-26081` 353- epiphany: :cve_nist:`2023-26081`
354- expat: :cve:`2022-43680` 354- expat: :cve_nist:`2022-43680`
355- ffmpeg: :cve:`2022-3964`, :cve:`2022-3965` 355- ffmpeg: :cve_nist:`2022-3964`, :cve_nist:`2022-3965`
356- git: :cve:`2022-39260`, :cve:`2022-41903`, :cve:`2022-23521`, :cve:`2022-41953` (ignored) 356- git: :cve_nist:`2022-39260`, :cve_nist:`2022-41903`, :cve_nist:`2022-23521`, :cve_nist:`2022-41953` (ignored)
357- glibc: :cve:`2023-25139` (ignored) 357- glibc: :cve_nist:`2023-25139` (ignored)
358- go: :cve:`2023-24532`, :cve:`2023-24537` 358- go: :cve_nist:`2023-24532`, :cve_nist:`2023-24537`
359- grub2: :cve:`2022-2601`, :cve:`2022-3775`, :cve_mitre:`2022-28736` 359- grub2: :cve_nist:`2022-2601`, :cve_nist:`2022-3775`, :cve_mitre:`2022-28736`
360- inetutils: :cve:`2019-0053` 360- inetutils: :cve_nist:`2019-0053`
361- less: :cve:`2022-46663` 361- less: :cve_nist:`2022-46663`
362- libarchive: :cve:`2022-36227` 362- libarchive: :cve_nist:`2022-36227`
363- libinput: :cve:`2022-1215` 363- libinput: :cve_nist:`2022-1215`
364- libpam: :cve:`2022-28321` 364- libpam: :cve_nist:`2022-28321`
365- libpng: :cve:`2019-6129` 365- libpng: :cve_nist:`2019-6129`
366- libx11: :cve:`2022-3554` 366- libx11: :cve_nist:`2022-3554`
367- openssh: :cve:`2023-28531` 367- openssh: :cve_nist:`2023-28531`
368- openssl: :cve:`2022-3358`, :cve:`2022-3786`, :cve:`2022-3602`, :cve:`2022-3996`, :cve:`2023-0286`, :cve:`2022-4304`, :cve:`2022-4203`, :cve:`2023-0215`, :cve:`2022-4450`, :cve:`2023-0216`, :cve:`2023-0217`, :cve:`2023-0401`, :cve:`2023-0464` 368- openssl: :cve_nist:`2022-3358`, :cve_nist:`2022-3786`, :cve_nist:`2022-3602`, :cve_nist:`2022-3996`, :cve_nist:`2023-0286`, :cve_nist:`2022-4304`, :cve_nist:`2022-4203`, :cve_nist:`2023-0215`, :cve_nist:`2022-4450`, :cve_nist:`2023-0216`, :cve_nist:`2023-0217`, :cve_nist:`2023-0401`, :cve_nist:`2023-0464`
369- ppp: :cve:`2022-4603` 369- ppp: :cve_nist:`2022-4603`
370- python3-cryptography{-vectors}: :cve:`2022-3602`, :cve:`2022-3786`, :cve:`2023-23931` 370- python3-cryptography{-vectors}: :cve_nist:`2022-3602`, :cve_nist:`2022-3786`, :cve_nist:`2023-23931`
371- python3: :cve_mitre:`2022-37460` 371- python3: :cve_mitre:`2022-37460`
372- qemu: :cve:`2022-3165` 372- qemu: :cve_nist:`2022-3165`
373- rust: :cve:`2022-46176` 373- rust: :cve_nist:`2022-46176`
374- rxvt-unicode: :cve:`2022-4170` 374- rxvt-unicode: :cve_nist:`2022-4170`
375- screen: :cve:`2023-24626` 375- screen: :cve_nist:`2023-24626`
376- shadow: :cve:`2023-29383`, :cve:`2016-15024` (ignored) 376- shadow: :cve_nist:`2023-29383`, :cve_nist:`2016-15024` (ignored)
377- sudo: :cve:`2022-43995` 377- sudo: :cve_nist:`2022-43995`
378- systemd: :cve:`2022-4415` (ignored) 378- systemd: :cve_nist:`2022-4415` (ignored)
379- tar: :cve:`2022-48303` 379- tar: :cve_nist:`2022-48303`
380- tiff: :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598`, :cve:`2022-3970`, :cve:`2022-48281` 380- tiff: :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598`, :cve_nist:`2022-3970`, :cve_nist:`2022-48281`
381- vim: :cve:`2022-3352`, :cve:`2022-4141`, :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264`, :cve:`2023-1355`, :cve:`2023-0433`, :cve:`2022-47024`, :cve:`2022-3705` 381- vim: :cve_nist:`2022-3352`, :cve_nist:`2022-4141`, :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264`, :cve_nist:`2023-1355`, :cve_nist:`2023-0433`, :cve_nist:`2022-47024`, :cve_nist:`2022-3705`
382- xdg-utils: :cve:`2022-4055` 382- xdg-utils: :cve_nist:`2022-4055`
383- xserver-xorg: :cve:`2022-3550`, :cve:`2022-3551`, :cve:`2023-1393`, :cve:`2023-0494`, :cve:`2022-3553` (ignored) 383- xserver-xorg: :cve_nist:`2022-3550`, :cve_nist:`2022-3551`, :cve_nist:`2023-1393`, :cve_nist:`2023-0494`, :cve_nist:`2022-3553` (ignored)
384 384
385Recipe Upgrades in 4.2 385Recipe Upgrades in 4.2
386~~~~~~~~~~~~~~~~~~~~~~ 386~~~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.3.1.rst b/documentation/migration-guides/release-notes-4.3.1.rst
index cea9c538a2..afde1e7942 100644
--- a/documentation/migration-guides/release-notes-4.3.1.rst
+++ b/documentation/migration-guides/release-notes-4.3.1.rst
@@ -6,14 +6,14 @@ Release notes for Yocto-4.3.1 (Nanbield)
6Security Fixes in Yocto-4.3.1 6Security Fixes in Yocto-4.3.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- libsndfile1: Fix :cve:`2022-33065` 9- libsndfile1: Fix :cve_nist:`2022-33065`
10- libxml2: Ignore :cve:`2023-45322` 10- libxml2: Ignore :cve_nist:`2023-45322`
11- linux-yocto/6.1: Ignore :cve:`2020-27418`, :cve:`2023-31085`, :cve_mitre:`2023-34324`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4244`, :cve:`2023-42754`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-4563`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45871`, :cve:`2023-45898`, :cve:`2023-4732`, :cve:`2023-5158`, :cve:`2023-5197` and :cve:`2023-5345` 11- linux-yocto/6.1: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-31085`, :cve_mitre:`2023-34324`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4244`, :cve_nist:`2023-42754`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-4563`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45871`, :cve_nist:`2023-45898`, :cve_nist:`2023-4732`, :cve_nist:`2023-5158`, :cve_nist:`2023-5197` and :cve_nist:`2023-5345`
12- linux-yocto/6.5: Ignore :cve:`2020-27418`, :cve:`2023-1193`, :cve:`2023-39191`, :cve:`2023-39194`, :cve:`2023-40791`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-4610` and :cve:`2023-4732` 12- linux-yocto/6.5: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-1193`, :cve_nist:`2023-39191`, :cve_nist:`2023-39194`, :cve_nist:`2023-40791`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-4610` and :cve_nist:`2023-4732`
13- openssl: Fix :cve:`2023-5363` 13- openssl: Fix :cve_nist:`2023-5363`
14- pixman: Ignore :cve:`2023-37769` 14- pixman: Ignore :cve_nist:`2023-37769`
15- vim: Fix :cve:`2023-46246` 15- vim: Fix :cve_nist:`2023-46246`
16- zlib: Ignore :cve:`2023-45853` 16- zlib: Ignore :cve_nist:`2023-45853`
17 17
18 18
19Fixes in Yocto-4.3.1 19Fixes in Yocto-4.3.1
diff --git a/documentation/migration-guides/release-notes-4.3.2.rst b/documentation/migration-guides/release-notes-4.3.2.rst
index 3a40d83bc2..c32cd83b2a 100644
--- a/documentation/migration-guides/release-notes-4.3.2.rst
+++ b/documentation/migration-guides/release-notes-4.3.2.rst
@@ -6,19 +6,19 @@ Release notes for Yocto-4.3.2 (Nanbield)
6Security Fixes in Yocto-4.3.2 6Security Fixes in Yocto-4.3.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` 9- avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473`
10- curl: Fix :cve:`2023-46218` 10- curl: Fix :cve_nist:`2023-46218`
11- ghostscript: Fix :cve:`2023-46751` 11- ghostscript: Fix :cve_nist:`2023-46751`
12- grub: fix :cve:`2023-4692` and :cve:`2023-4693` 12- grub: fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
13- gstreamer1.0: Fix :cve_mitre:`2023-44446` 13- gstreamer1.0: Fix :cve_mitre:`2023-44446`
14- linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5090`, :cve:`2023-5633`, :cve:`2023-6111`, :cve:`2023-6121` and :cve:`2023-6176` 14- linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5090`, :cve_nist:`2023-5633`, :cve_nist:`2023-6111`, :cve_nist:`2023-6121` and :cve_nist:`2023-6176`
15- linux-yocto/6.5: Ignore :cve:`2022-44034`, :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6111` and :cve:`2023-6176` 15- linux-yocto/6.5: Ignore :cve_nist:`2022-44034`, :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6111` and :cve_nist:`2023-6176`
16- perl: fix :cve:`2023-47100` 16- perl: fix :cve_nist:`2023-47100`
17- python3-urllib3: Fix :cve:`2023-45803` 17- python3-urllib3: Fix :cve_nist:`2023-45803`
18- rust: Fix :cve:`2023-40030` 18- rust: Fix :cve_nist:`2023-40030`
19- vim: Fix :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236` and :cve:`2023-48237` 19- vim: Fix :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236` and :cve_nist:`2023-48237`
20- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 20- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
21- xwayland: Fix :cve:`2023-5367` 21- xwayland: Fix :cve_nist:`2023-5367`
22 22
23 23
24Fixes in Yocto-4.3.2 24Fixes in Yocto-4.3.2
diff --git a/documentation/migration-guides/release-notes-4.3.3.rst b/documentation/migration-guides/release-notes-4.3.3.rst
index 2a0658a9c9..d30f4f5c2d 100644
--- a/documentation/migration-guides/release-notes-4.3.3.rst
+++ b/documentation/migration-guides/release-notes-4.3.3.rst
@@ -6,17 +6,17 @@ Release notes for Yocto-4.3.3 (Nanbield)
6Security Fixes in Yocto-4.3.3 6Security Fixes in Yocto-4.3.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- curl: Fix :cve:`2023-46219` 9- curl: Fix :cve_nist:`2023-46219`
10- glibc: Ignore fixed :cve:`2023-0687` and :cve:`2023-5156` 10- glibc: Ignore fixed :cve_nist:`2023-0687` and :cve_nist:`2023-5156`
11- linux-yocto/6.1: Ignore :cve:`2022-48619`, :cve:`2023-4610`, :cve:`2023-5178`, :cve:`2023-5972`, :cve:`2023-6040`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-6817`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-7192`, :cve:`2024-0193` and :cve:`2024-0443` 11- linux-yocto/6.1: Ignore :cve_nist:`2022-48619`, :cve_nist:`2023-4610`, :cve_nist:`2023-5178`, :cve_nist:`2023-5972`, :cve_nist:`2023-6040`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-6817`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-7192`, :cve_nist:`2024-0193` and :cve_nist:`2024-0443`
12- linux-yocto/6.1: Fix :cve:`2023-1193`, :cve_mitre:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782` and :cve:`2023-6606` 12- linux-yocto/6.1: Fix :cve_nist:`2023-1193`, :cve_mitre:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782` and :cve_nist:`2023-6606`
13- qemu: Fix :cve:`2023-3019` 13- qemu: Fix :cve_nist:`2023-3019`
14- shadow: Fix :cve:`2023-4641` 14- shadow: Fix :cve_nist:`2023-4641`
15- sqlite3: Fix :cve:`2024-0232` 15- sqlite3: Fix :cve_nist:`2024-0232`
16- sqlite3: drop obsolete CVE ignore :cve:`2023-36191` 16- sqlite3: drop obsolete CVE ignore :cve_nist:`2023-36191`
17- sudo: Fix :cve:`2023-42456` and :cve:`2023-42465` 17- sudo: Fix :cve_nist:`2023-42456` and :cve_nist:`2023-42465`
18- tiff: Fix :cve:`2023-6277` 18- tiff: Fix :cve_nist:`2023-6277`
19- xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` 19- xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478`
20 20
21 21
22Fixes in Yocto-4.3.3 22Fixes in Yocto-4.3.3
diff --git a/documentation/migration-guides/release-notes-4.3.4.rst b/documentation/migration-guides/release-notes-4.3.4.rst
new file mode 100644
index 0000000000..b725ace369
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.3.4.rst
@@ -0,0 +1,206 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.3.4 (Nanbield)
4----------------------------------------
5
6Security Fixes in Yocto-4.3.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679` and :cve_nist:`2023-50387`
10- gcc: Update :term:`CVE_STATUS` for :cve_nist:`2023-4039` as fixed
11- glibc: Fix :cve_nist:`2023-6246`, :cve_nist:`2023-6779` and :cve_nist:`2023-6780`
12- gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567`
13- gstreamer: Fix :cve_mitre:`2024-0444`
14- libssh2: fix :cve_nist:`2023-48795`
15- libxml2: Fix :cve_nist:`2024-25062`
16- linux-yocto/6.1: Fix :cve_nist:`2023-6610`, :cve_nist:`2023-6915`, :cve_nist:`2023-46838`, :cve_nist:`2023-50431`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086` and :cve_nist:`2024-23849`
17- linux-yocto/6.1: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-36402`, :cve_nist:`2023-5717`, :cve_nist:`2023-6200`, :cve_nist:`2023-35827`, :cve_nist:`2023-40791`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0562`, :cve_nist:`2024-0565`, :cve_nist:`2024-0582`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-0775` and :cve_nist:`2024-22705`
18- openssl: fix :cve_nist:`2024-0727`
19- python3-jinja2: Fix :cve_nist:`2024-22195`
20- tiff: Fix :cve_nist:`2023-6228`, :cve_nist:`2023-52355` and :cve_nist:`2023-52356`
21- vim: Fix :cve_nist:`2024-22667`
22- wpa-supplicant: Fix :cve_nist:`2023-52160`
23- xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885` and :cve_nist:`2024-21886`
24- xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409`
25- zlib: Ignore :cve_nist:`2023-6992`
26
27
28Fixes in Yocto-4.3.4
29~~~~~~~~~~~~~~~~~~~~
30
31- allarch: Fix allarch corner case
32- at-spi2-core: Upgrade to 2.50.1
33- bind: Upgrade to 9.18.24
34- build-appliance-image: Update to nanbield head revision
35- contributor-guide: add notes for tests
36- contributor-guide: be more specific about meta-* trees
37- core-image-ptest: Increase disk size to 1.5G for strace ptest image
38- cpio: Upgrade to 2.15
39- curl: improve run-ptest
40- curl: increase test timeouts
41- cve-check: Log if :term:`CVE_STATUS` set but not reported for component
42- cve-update-nvd2-native: Add an age threshold for incremental update
43- cve-update-nvd2-native: Fix CVE configuration update
44- cve-update-nvd2-native: Fix typo in comment
45- cve-update-nvd2-native: Remove duplicated CVE_CHECK_DB_FILE definition
46- cve-update-nvd2-native: Remove rejected CVE from database
47- cve-update-nvd2-native: nvd_request_next: Improve comment
48- cve_check: cleanup logging
49- cve_check: handle :term:`CVE_STATUS` being set to the empty string
50- dev-manual: Rephrase spdx creation
51- dev-manual: improve descriptions of 'bitbake -S printdiff'
52- dev-manual: packages: clarify shared :term:`PR` service constraint
53- dev-manual: packages: fix capitalization
54- dev-manual: packages: need enough free space
55- docs: add initial stylechecks with Vale
56- docs: correct sdk installation default path
57- docs: document VIRTUAL-RUNTIME variables
58- docs: suppress excess use of "following" word
59- docs: use "manual page(s)"
60- docs: Makefile: remove releases.rst in "make clean"
61- externalsrc: fix task dependency for do_populate_lic
62- glibc: Remove duplicate :term:`CVE_STATUS` for :cve_nist:`2023-4527`
63- glibc: stable 2.38 branch updates (2.38+gitd37c2b20a4)
64- gnutls: Upgrade to 3.8.3
65- gstreamer1.0: skip a test that is known to be flaky
66- gstreamer: Upgrade to 1.22.9
67- gtk: Set :term:`CVE_PRODUCT`
68- kernel.bbclass: Set pkg-config variables for building modules
69- libxml2: Upgrade to 2.11.7
70- linux-firmware: Upgrade to 20240220
71- linux-yocto/6.1: update to v6.1.78
72- mdadm: Disable ptests
73- migration-guides: add release notes for 4.3.3
74- migration-guides: add release notes for 4.0.17
75- migration-guides: fix release notes for 4.3.3 linux-yocto/6.1 CVE entries
76- multilib_global.bbclass: fix parsing error with no kernel module split
77- openssl: fix crash on aarch64 if BTI is enabled but no Crypto instructions
78- openssl: Upgrade to 3.1.5
79- overlayfs: add missing closing parenthesis in selftest
80- poky.conf: bump version for 4.3.4 release
81- profile-manual: usage.rst: fix reference to bug report
82- profile-manual: usage.rst: formatting fixes
83- profile-manual: usage.rst: further style improvements
84- pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept
85- python3-jinja2: Upgrade to 3.1.3
86- ref-manual: release-process: grammar fix
87- ref-manual: system-requirements: update packages to build docs
88- ref-manual: tasks: do_cleanall: recommend using '-f' instead
89- ref-manual: tasks: do_cleansstate: recommend using '-f' instead for a shared sstate
90- ref-manual: variables: adding multiple groups in :term:`GROUPADD_PARAM`
91- ref-manual: variables: add documentation of the variable :term:`SPDX_NAMESPACE_PREFIX`
92- reproducible: Fix race with externalsrc/devtool over lockfile
93- sdk-manual: extensible: correctly describe separate build-sysroots tasks in direct sdk workflows
94- tzdata : Upgrade to 2024a
95- udev-extraconf: fix unmount directories containing octal-escaped chars
96- vim: Upgrade to v9.0.2190
97- wireless-regdb: Upgrade to 2024.01.23
98- xserver-xorg: Upgrade to 21.1.11
99- xwayland: Upgrade to 23.2.4
100- yocto-uninative: Update to 4.4 for glibc 2.39
101
102
103Known Issues in Yocto-4.3.4
104~~~~~~~~~~~~~~~~~~~~~~~~~~~
105
106- N/A
107
108
109Contributors to Yocto-4.3.4
110~~~~~~~~~~~~~~~~~~~~~~~~~~~
111
112- Alex Kiernan
113- Alexander Kanavin
114- Alexander Sverdlin
115- Baruch Siach
116- BELOUARGA Mohamed
117- Benjamin Bara
118- Bruce Ashfield
119- Chen Qi
120- Claus Stovgaard
121- Dhairya Nagodra
122- Geoff Parker
123- Johan Bezem
124- Jonathan GUILLOT
125- Julien Stephan
126- Kai Kang
127- Khem Raj
128- Lee Chee Yang
129- Luca Ceresoli
130- Martin Jansa
131- Michael Halstead
132- Michael Opdenacker
133- Munehisa Kamata
134- Pavel Zhukov
135- Peter Marko
136- Priyal Doshi
137- Richard Purdie
138- Robert Joslyn
139- Ross Burton
140- Simone Weiß
141- Soumya Sambu
142- Steve Sakoman
143- Tim Orling
144- Wang Mingyu
145- Yoann Congal
146- Yogita Urade
147
148
149Repositories / Downloads for Yocto-4.3.4
150~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
151
152poky
153
154- Repository Location: :yocto_git:`/poky`
155- Branch: :yocto_git:`nanbield </poky/log/?h=nanbield>`
156- Tag: :yocto_git:`yocto-4.3.4 </poky/log/?h=yocto-4.3.4>`
157- Git Revision: :yocto_git:`7b8aa378d069ee31373f22caba3bd7fc7863f447 </poky/commit/?id=7b8aa378d069ee31373f22caba3bd7fc7863f447>`
158- Release Artefact: poky-7b8aa378d069ee31373f22caba3bd7fc7863f447
159- sha: 0cb14125f215cc9691cff43982e2c540a5b6018df4ed25c10933135b5bf21d0f
160- Download Locations:
161 http://downloads.yoctoproject.org/releases/yocto/yocto-4.3.4/poky-7b8aa378d069ee31373f22caba3bd7fc7863f447.tar.bz2
162 http://mirrors.kernel.org/yocto/yocto/yocto-4.3.4/poky-7b8aa378d069ee31373f22caba3bd7fc7863f447.tar.bz2
163
164openembedded-core
165
166- Repository Location: :oe_git:`/openembedded-core`
167- Branch: :oe_git:`nanbield </openembedded-core/log/?h=nanbield>`
168- Tag: :oe_git:`yocto-4.3.4 </openembedded-core/log/?h=yocto-4.3.4>`
169- Git Revision: :oe_git:`d0e68072d138ccc1fb5957fdc46a91871eb6a3e1 </openembedded-core/commit/?id=d0e68072d138ccc1fb5957fdc46a91871eb6a3e1>`
170- Release Artefact: oecore-d0e68072d138ccc1fb5957fdc46a91871eb6a3e1
171- sha: d311fe22ff296c466f9bea1cd26343baee5630bc37f3dda42f2d9d8cc99e3add
172- Download Locations:
173 http://downloads.yoctoproject.org/releases/yocto/yocto-4.3.4/oecore-d0e68072d138ccc1fb5957fdc46a91871eb6a3e1.tar.bz2
174 http://mirrors.kernel.org/yocto/yocto/yocto-4.3.4/oecore-d0e68072d138ccc1fb5957fdc46a91871eb6a3e1.tar.bz2
175
176meta-mingw
177
178- Repository Location: :yocto_git:`/meta-mingw`
179- Branch: :yocto_git:`nanbield </meta-mingw/log/?h=nanbield>`
180- Tag: :yocto_git:`yocto-4.3.4 </meta-mingw/log/?h=yocto-4.3.4>`
181- Git Revision: :yocto_git:`49617a253e09baabbf0355bc736122e9549c8ab2 </meta-mingw/commit/?id=49617a253e09baabbf0355bc736122e9549c8ab2>`
182- Release Artefact: meta-mingw-49617a253e09baabbf0355bc736122e9549c8ab2
183- sha: 2225115b73589cdbf1e491115221035c6a61679a92a93b2a3cf761ff87bf4ecc
184- Download Locations:
185 http://downloads.yoctoproject.org/releases/yocto/yocto-4.3.4/meta-mingw-49617a253e09baabbf0355bc736122e9549c8ab2.tar.bz2
186 http://mirrors.kernel.org/yocto/yocto/yocto-4.3.4/meta-mingw-49617a253e09baabbf0355bc736122e9549c8ab2.tar.bz2
187
188bitbake
189
190- Repository Location: :oe_git:`/bitbake`
191- Branch: :oe_git:`2.6 </bitbake/log/?h=2.6>`
192- Tag: :oe_git:`yocto-4.3.4 </bitbake/log/?h=yocto-4.3.4>`
193- Git Revision: :oe_git:`380a9ac97de5774378ded5e37d40b79b96761a0c </bitbake/commit/?id=380a9ac97de5774378ded5e37d40b79b96761a0c>`
194- Release Artefact: bitbake-380a9ac97de5774378ded5e37d40b79b96761a0c
195- sha: 78f579b9d29e72d09b6fb10ac62aa925104335e92d2afb3155bc9ab1994e36c1
196- Download Locations:
197 http://downloads.yoctoproject.org/releases/yocto/yocto-4.3.4/bitbake-380a9ac97de5774378ded5e37d40b79b96761a0c.tar.bz2
198 http://mirrors.kernel.org/yocto/yocto/yocto-4.3.4/bitbake-380a9ac97de5774378ded5e37d40b79b96761a0c.tar.bz2
199
200yocto-docs
201
202- Repository Location: :yocto_git:`/yocto-docs`
203- Branch: :yocto_git:`nanbield </yocto-docs/log/?h=nanbield>`
204- Tag: :yocto_git:`yocto-4.3.4 </yocto-docs/log/?h=yocto-4.3.4>`
205- Git Revision: :yocto_git:`05d08b0bbaef760157c8d35a78d7405bc5ffce55 </yocto-docs/commit/?id=05d08b0bbaef760157c8d35a78d7405bc5ffce55>`
206
diff --git a/documentation/migration-guides/release-notes-4.3.rst b/documentation/migration-guides/release-notes-4.3.rst
index 0e175067da..aa3f31a2ce 100644
--- a/documentation/migration-guides/release-notes-4.3.rst
+++ b/documentation/migration-guides/release-notes-4.3.rst
@@ -272,9 +272,9 @@ New Features / Enhancements in 4.3
272 272
273- Prominent documentation updates: 273- Prominent documentation updates:
274 274
275 - New :doc:`../contributor-guide/index` document. 275 - New :doc:`/contributor-guide/index` document.
276 276
277 - New :doc:`../dev-manual/security-subjects` chapter in the Development 277 - New :doc:`/dev-manual/security-subjects` chapter in the Development
278 Tasks Manual. 278 Tasks Manual.
279 279
280 - Long overdue documentation for the :ref:`ref-classes-devicetree` class. 280 - Long overdue documentation for the :ref:`ref-classes-devicetree` class.
@@ -295,7 +295,7 @@ New Features / Enhancements in 4.3
295 - Generation of :term:`SPDX` manifests is now enabled by default. 295 - Generation of :term:`SPDX` manifests is now enabled by default.
296 296
297 - Git based recipes in OE-Core which used the ``git`` protocol have been 297 - Git based recipes in OE-Core which used the ``git`` protocol have been
298 changed to use `https`` where possible, as it is typically faster and 298 changed to use ``https`` where possible, as it is typically faster and
299 more reliable. 299 more reliable.
300 300
301 - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the 301 - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the
@@ -337,47 +337,47 @@ The following corrections have been made to the :term:`LICENSE` values set by re
337Security Fixes in 4.3 337Security Fixes in 4.3
338~~~~~~~~~~~~~~~~~~~~~ 338~~~~~~~~~~~~~~~~~~~~~
339 339
340- bind: :cve:`2023-2911`, :cve:`2023-2828`, :cve:`2023-3341`, :cve:`2023-4236` 340- bind: :cve_nist:`2023-2911`, :cve_nist:`2023-2828`, :cve_nist:`2023-3341`, :cve_nist:`2023-4236`
341- binutils: :cve:`2023-1972` 341- binutils: :cve_nist:`2023-1972`
342- connman: :cve:`2023-28488` 342- connman: :cve_nist:`2023-28488`
343- cups: :cve:`2023-32324`, :cve:`2023-34241`, :cve:`2023-4504` 343- cups: :cve_nist:`2023-32324`, :cve_nist:`2023-34241`, :cve_nist:`2023-4504`
344- dbus: :cve:`2023-34969` 344- dbus: :cve_nist:`2023-34969`
345- dmidecode: :cve:`2023-30630` 345- dmidecode: :cve_nist:`2023-30630`
346- dropbear: :cve:`2023-36328` 346- dropbear: :cve_nist:`2023-36328`
347- erofs-utils: :cve:`2023-33551`, :cve:`2023-33552` 347- erofs-utils: :cve_nist:`2023-33551`, :cve_nist:`2023-33552`
348- gcc: :cve:`2023-4039` 348- gcc: :cve_nist:`2023-4039`
349- ghostscript: :cve:`2023-28879`, :cve:`2023-36664`, :cve:`2023-38559;` ignore :cve:`2023-38560` 349- ghostscript: :cve_nist:`2023-28879`, :cve_nist:`2023-36664`, :cve_nist:`2023-38559;` ignore :cve_nist:`2023-38560`
350- git: :cve:`2023-25652`, :cve:`2023-29007` 350- git: :cve_nist:`2023-25652`, :cve_nist:`2023-29007`
351- glibc: :cve:`2023-4527`, :cve:`2023-4806` 351- glibc: :cve_nist:`2023-4527`, :cve_nist:`2023-4806`
352- go: :cve:`2023-24537`, :cve:`2023-39325` 352- go: :cve_nist:`2023-24537`, :cve_nist:`2023-39325`
353- gstreamer: :cve:`2023-40475`, :cve:`2023-40476` 353- gstreamer: :cve_nist:`2023-40475`, :cve_nist:`2023-40476`
354- inetutils: :cve:`2023-40303` 354- inetutils: :cve_nist:`2023-40303`
355- libarchive: ignore :cve:`2023-30571` 355- libarchive: ignore :cve_nist:`2023-30571`
356- librsvg: :cve:`2023-38633` 356- librsvg: :cve_nist:`2023-38633`
357- libwebp: :cve:`2023-1999`, :cve:`2023-4863` 357- libwebp: :cve_nist:`2023-1999`, :cve_nist:`2023-4863`
358- libx11: :cve:`2023-3138`, :cve:`2023-43785`, :cve:`2023-43786`, :cve:`2023-43787` 358- libx11: :cve_nist:`2023-3138`, :cve_nist:`2023-43785`, :cve_nist:`2023-43786`, :cve_nist:`2023-43787`
359- libxml2: :cve:`2023-28484`, :cve:`2023-29469;` ignore disputed :cve:`2023-45322` 359- libxml2: :cve_nist:`2023-28484`, :cve_nist:`2023-29469;` ignore disputed :cve_nist:`2023-45322`
360- libxpm: :cve:`2023-43788`, :cve:`2023-43789`, :cve:`2022-44617` 360- libxpm: :cve_nist:`2023-43788`, :cve_nist:`2023-43789`, :cve_nist:`2022-44617`
361- linux: update CVE exclusions 361- linux: update CVE exclusions
362- ncurses: :cve:`2023-29491` 362- ncurses: :cve_nist:`2023-29491`
363- nghttp2: :cve:`2023-44487` 363- nghttp2: :cve_nist:`2023-44487`
364- ninja: ignore :cve:`2021-4336`, wrong ninja 364- ninja: ignore :cve_nist:`2021-4336`, wrong ninja
365- openssh: :cve:`2023-38408` 365- openssh: :cve_nist:`2023-38408`
366- openssl: :cve:`2023-2650`, :cve:`2023-1255`, :cve:`2023-0466`, :cve:`2023-0465`, :cve:`2023-0464`, :cve:`2023-3817`, :cve:`2023-3446`, :cve:`2023-2975`, :cve:`2023-4807` 366- openssl: :cve_nist:`2023-2650`, :cve_nist:`2023-1255`, :cve_nist:`2023-0466`, :cve_nist:`2023-0465`, :cve_nist:`2023-0464`, :cve_nist:`2023-3817`, :cve_nist:`2023-3446`, :cve_nist:`2023-2975`, :cve_nist:`2023-4807`
367- perl: :cve:`2023-31484`, :cve:`2023-31486` 367- perl: :cve_nist:`2023-31484`, :cve_nist:`2023-31486`
368- pixman: ignore :cve:`2023-37769` 368- pixman: ignore :cve_nist:`2023-37769`
369- procps: :cve:`2023-4016` 369- procps: :cve_nist:`2023-4016`
370- python3-git: :cve:`2023-41040` 370- python3-git: :cve_nist:`2023-41040`
371- python3: ignore :cve:`2023-36632` 371- python3: ignore :cve_nist:`2023-36632`
372- python3-urllib3: :cve:`2023-43804` 372- python3-urllib3: :cve_nist:`2023-43804`
373- qemu: :cve:`2023-40360`, :cve:`2023-42467;` ignore :cve:`2023-0664` (Windows-specific), ignore :cve:`2023-2680` (RHEL specific) 373- qemu: :cve_nist:`2023-40360`, :cve_nist:`2023-42467;` ignore :cve_nist:`2023-0664` (Windows-specific), ignore :cve_nist:`2023-2680` (RHEL specific)
374- screen: :cve:`2023-24626` 374- screen: :cve_nist:`2023-24626`
375- shadow: :cve:`2023-29383` 375- shadow: :cve_nist:`2023-29383`
376- sqlite3: ignore :cve:`2023-36191` 376- sqlite3: ignore :cve_nist:`2023-36191`
377- sysstat: :cve:`2023-33204` 377- sysstat: :cve_nist:`2023-33204`
378- tiff: :cve:`2022-4645`, :cve:`2023-2731`, :cve:`2023-26965`, :cve:`2023-40745`, :cve:`2023-41175` 378- tiff: :cve_nist:`2022-4645`, :cve_nist:`2023-2731`, :cve_nist:`2023-26965`, :cve_nist:`2023-40745`, :cve_nist:`2023-41175`
379- vim: :cve:`2023-2426`, :cve:`2023-2609`, :cve:`2023-2610`, :cve:`2023-3896`, :cve:`2023-5441`, :cve:`2023-5535` 379- vim: :cve_nist:`2023-2426`, :cve_nist:`2023-2609`, :cve_nist:`2023-2610`, :cve_nist:`2023-3896`, :cve_nist:`2023-5441`, :cve_nist:`2023-5535`
380- zlib: ignore :cve:`2023-45853` 380- zlib: ignore :cve_nist:`2023-45853`
381 381
382 382
383Recipe Upgrades in 4.3 383Recipe Upgrades in 4.3
diff --git a/documentation/migration-guides/release-notes-5.0.1.rst b/documentation/migration-guides/release-notes-5.0.1.rst
new file mode 100644
index 0000000000..a377f92c19
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.1.rst
@@ -0,0 +1,134 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.1 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- N/A
10
11
12Fixes in Yocto-5.0.1
13~~~~~~~~~~~~~~~~~~~~
14
15- babeltrace2: upgrade 2.0.5 -> 2.0.6
16- bind: upgrade 9.18.24 -> 9.18.25
17- bitbake: cooker: Use hash client to ping upstream server
18- build-appliance-image: Update to scarthgap head revision (b9b47b1a392b...)
19- docs: add support for scarthgap 5.0 release
20- docs: brief-yoctoprojectqs: explicit version dependency on websockets python module
21- docs: brief-yoctoprojectqs: Update to the correct hash equivalence server address
22- documentation/poky.yaml.in: drop mesa/sdl from essential host packages
23- ell: upgrade 0.63 -> 0.64
24- gcr: upgrade 4.2.0 -> 4.2.1
25- icu: update 74-1 -> 74-2
26- libdnf: upgrade 0.73.0 -> 0.73.1
27- libsdl2: upgrade 2.30.0 -> 2.30.1
28- libx11: upgrade 1.8.7 -> 1.8.9
29- libxcursor: upgrade 1.2.1 -> 1.2.2
30- libxml2: upgrade 2.12.5 -> 2.12.6
31- local.conf.sample: Fix hashequivalence server address
32- lttng-tools: upgrade 2.13.11 -> 2.13.13
33- manuals: standards.md: add standard for project names
34- mesa: upgrade 24.0.2 -> 24.0.3
35- migration-notes: add release notes for 4.0.18
36- mpg123: upgrade 1.32.5 -> 1.32.6
37- pango: upgrade 1.52.0 -> 1.52.1
38- poky.conf: bump version for 5.0.1
39- python3: skip test_concurrent_futures/test_shutdown
40- ref-manual: update releases.svg
41- ref-manual: variables: add :term:`USERADD_DEPENDS`
42- release-notes-5.0: update Repositories / Downloads section
43- release-notes-5.0: update recipes changes
44- release-notes-5.0: update new features
45- rootfs-postcommands.bbclass: Only set DROPBEAR_RSAKEY_DIR once
46- rpm: update 4.19.1 -> 4.19.1.1
47- scripts/oe-setup-build: write a build environment initialization one-liner into the build directory
48- sstate.bbclass: Add _SSTATE_EXCLUDEDEPS_SYSROOT to vardepsexclude
49- systemd: sed :term:`ROOT_HOME` only if sysusers :term:`PACKAGECONFIG` is set
50
51
52Known Issues in Yocto-5.0.1
53~~~~~~~~~~~~~~~~~~~~~~~~~~~
54
55- N/A
56
57
58Contributors to Yocto-5.0.1
59~~~~~~~~~~~~~~~~~~~~~~~~~~~
60
61- Alexander Kanavin
62- Christian Bräuner Sørensen
63- Joshua Watt
64- Lee Chee Yang
65- Mark Hatle
66- Michael Glembotzki
67- Michael Halstead
68- Michael Opdenacker
69- Paul Eggleton
70- Quentin Schulz
71- Richard Purdie
72- Steve Sakoman
73- Trevor Gamblin
74- Wang Mingyu
75
76
77Repositories / Downloads for Yocto-5.0.1
78~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
79
80poky
81
82- Repository Location: :yocto_git:`/poky`
83- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
84- Tag: :yocto_git:`yocto-5.0.1 </poky/log/?h=yocto-5.0.1>`
85- Git Revision: :yocto_git:`4b07a5316ed4b858863dfdb7cab63859d46d1810 </poky/commit/?id=4b07a5316ed4b858863dfdb7cab63859d46d1810>`
86- Release Artefact: poky-4b07a5316ed4b858863dfdb7cab63859d46d1810
87- sha: 51d0c84da7dbcc8db04a674da39cfc73ea78aac22ee646ede5b6229937d4666a
88- Download Locations:
89 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.1/poky-4b07a5316ed4b858863dfdb7cab63859d46d1810.tar.bz2
90 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.1/poky-4b07a5316ed4b858863dfdb7cab63859d46d1810.tar.bz2
91
92openembedded-core
93
94- Repository Location: :oe_git:`/openembedded-core`
95- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
96- Tag: :oe_git:`yocto-5.0.1 </openembedded-core/log/?h=yocto-5.0.1>`
97- Git Revision: :oe_git:`294a7dbe44f6b7c8d3a1de8c2cc182af37c4f916 </openembedded-core/commit/?id=294a7dbe44f6b7c8d3a1de8c2cc182af37c4f916>`
98- Release Artefact: oecore-294a7dbe44f6b7c8d3a1de8c2cc182af37c4f916
99- sha: e9be51a3b1fe8a1f420483b912caf91bc429dcca303d462381876a643b73045e
100- Download Locations:
101 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.1/oecore-294a7dbe44f6b7c8d3a1de8c2cc182af37c4f916.tar.bz2
102 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.1/oecore-294a7dbe44f6b7c8d3a1de8c2cc182af37c4f916.tar.bz2
103
104meta-mingw
105
106- Repository Location: :yocto_git:`/meta-mingw`
107- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
108- Tag: :yocto_git:`yocto-5.0.1 </meta-mingw/log/?h=yocto-5.0.1>`
109- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
110- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
111- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
112- Download Locations:
113 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.1/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
114 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.1/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
115
116bitbake
117
118- Repository Location: :oe_git:`/bitbake`
119- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
120- Tag: :oe_git:`yocto-5.0.1 </bitbake/log/?h=yocto-5.0.1>`
121- Git Revision: :oe_git:`8f90d10f9efc9a32e13f6bd031992aece79fe7cc </bitbake/commit/?id=8f90d10f9efc9a32e13f6bd031992aece79fe7cc>`
122- Release Artefact: bitbake-8f90d10f9efc9a32e13f6bd031992aece79fe7cc
123- sha: 519f02d5de7fbfac411532161d521123814dd9cc7d6b55488b5e7a547c1a6977
124- Download Locations:
125 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.1/bitbake-8f90d10f9efc9a32e13f6bd031992aece79fe7cc.tar.bz2
126 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.1/bitbake-8f90d10f9efc9a32e13f6bd031992aece79fe7cc.tar.bz2
127
128yocto-docs
129
130- Repository Location: :yocto_git:`/yocto-docs`
131- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
132- Tag: :yocto_git:`yocto-5.0.1 </yocto-docs/log/?h=yocto-5.0.1>`
133- Git Revision: :yocto_git:`875dfe69e93bf8fee3b8c07818a6ac059f228a13 </yocto-docs/commit/?id=875dfe69e93bf8fee3b8c07818a6ac059f228a13>`
134
diff --git a/documentation/migration-guides/release-notes-5.0.10.rst b/documentation/migration-guides/release-notes-5.0.10.rst
new file mode 100644
index 0000000000..e9845aa315
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.10.rst
@@ -0,0 +1,208 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.10 (Scarthgap)
4------------------------------------------
5
6Security Fixes in Yocto-5.0.10
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2025-1153`, :cve_nist:`2025-1179`, :cve_nist:`2025-1180` and
10 :cve_nist:`2025-1182`
11- connman: Fix :cve_nist:`2025-32366` and :cve_nist:`2025-32743`
12- curl: Fix :cve_nist:`2024-11053` and :cve_nist:`2025-0167`
13- elfutils: Fix :cve_nist:`2025-1371`
14- ffmpeg: Fix :cve_nist:`2024-7055`, :cve_nist:`2024-32230`, :cve_nist:`2024-35366`,
15 :cve_nist:`2024-36613`, :cve_nist:`2024-36616`, :cve_nist:`2024-36617` and :cve_nist:`2024-36619`
16- git: Fix :cve_nist:`2024-50349` and :cve_nist:`2024-52006`
17- glib-2.0: fix :cve_nist:`2025-3360` and :cve_nist:`2025-4373`
18- iputils: Fix :cve_nist:`2025-47268`
19- libpam: Fix :cve_nist:`2024-10041`
20- libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531`, :cve_nist:`2024-52532`,
21 :cve_nist:`2025-32906`, :cve_nist:`2025-32909`, :cve_nist:`2025-32910`, :cve_nist:`2025-32911`,
22 :cve_nist:`2025-32912`, :cve_nist:`2025-32913`, :cve_nist:`2025-32914` and :cve_nist:`2025-46420`
23- libsoup: Fix :cve_nist:`2025-4476`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`,
24 :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913`,
25 :cve_nist:`2025-32914` and :cve_nist:`2025-46420`
26- libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415`
27- openssh: Fix :cve_nist:`2025-32728`
28- perl: Fix :cve_nist:`2024-56406`
29- ppp: Fix :cve_nist:`2024-58250`
30- python3-jinja2: Fix :cve_nist:`2024-56201`, :cve_nist:`2024-56326` and :cve_nist:`2025-27516`
31- ruby: Fix :cve_nist:`2025-27221`
32- sqlite3: Fix :cve_nist:`2025-3277`, :cve_nist:`2025-29087` and :cve_nist:`2025-29088`
33
34
35Fixes in Yocto-5.0.10
36~~~~~~~~~~~~~~~~~~~~~
37
38- binutils: stable 2.42 branch updates
39- bluez5: add missing tools to noinst-tools package
40- bluez5: backport a patch to fix btmgmt -i
41- bluez5: make media control a :term:`PACKAGECONFIG` option
42- build-appliance-image: Update to scarthgap head revision
43- buildtools-tarball: Make buildtools respects host CA certificates
44- buildtools-tarball: add envvars into :term:`BB_ENV_PASSTHROUGH_ADDITIONS`
45- buildtools-tarball: move setting of envvars to respective envfile
46- contributor-guide/submit-changes: encourage patch version changelogs
47- cve-check.bbclass: Fix symlink handling also for text files
48- cve-update-nvd2-native: Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR"
49- dev-manual/sbom.rst: fix wrong build outputs
50- docs: Fix dead links that use the :term:`DISTRO` macro
51- docs: conf.py: tweak SearchEnglish to be hyphen-friendly
52- docs:conf.py: define a manpage url
53- ffmpeg: upgrade to 6.1.2
54- git: upgrade to 2.44.3
55- glibc-y2038-tests: remove glibc-y2038-tests_2.39.bb recipe
56- glibc: Add single-threaded fast path to rand()
57- glibc: stable 2.39 branch updates
58- initscripts: add function log_success_msg/log_failure_msg/log_warning_msg
59- libatomic-ops: Update :term:`GITHUB_BASE_URI`
60- manuals: remove repeated word
61- migration-guides: add release notes for 4.0.26, 5.0.8, 5.0.9
62- module.bbclass: add KBUILD_EXTRA_SYMBOLS to install
63- perl: upgrade to 5.38.4
64- perlcross: upgrade to 1.6.2
65- poky.conf: bump version for 5.0.10
66- poky.yaml: introduce DISTRO_LATEST_TAG
67- python3-jinja2: upgrade to 3.1.6
68- ref-manual/release-process: update releases.svg
69- ref-manual/variables.rst: HOST_CC_ARCH: fix wrong SDK reference
70- ref-manual/variables.rst: WATCHDOG_TIMEOUT: fix recipe name
71- ref-manual/variables.rst: add manpage links for toolchain variables
72- ref-manual/variables.rst: add missing documentation for BUILD_* variables
73- ref-manual/variables.rst: document HOST_*_ARCH variables
74- ref-manual/variables.rst: document :term:`INHIBIT_DEFAULT_RUST_DEPS`
75- ref-manual/variables.rst: document :term:`INHIBIT_UPDATERCD_BBCLASS`
76- ref-manual/variables.rst: document :term:`SSTATE_SKIP_CREATION`
77- ref-manual/variables.rst: document :term:`WIC_CREATE_EXTRA_ARGS`
78- ref-manual/variables.rst: document autotools class related variables
79- ref-manual/variables.rst: document missing SDK_*_ARCH variables
80- ref-manual/variables.rst: document the :term:`IMAGE_ROOTFS_MAXSIZE` variable
81- ref-manual/variables.rst: document the :term:`INITRAMFS_MAXSIZE` variable
82- ref-manual/variables.rst: improve the :term:`PKGV` documentation
83- ref-manual/variables.rst: update :term:`ROOT_HOME` documentation
84- ref-manual: kernel-fitimage.bbclass does not use :term:`SPL_SIGN_KEYNAME`
85- scripts/install-buildtools: Update to 5.0.9
86- sphinx-lint: missing space after literal
87- sphinx-lint: trailing whitespace
88- sphinx-lint: unbalanced inline literal markup
89- systemd: Password agents shouldn't be optional
90- systemd: upgrade to 255.18
91- test-manual/intro: remove Buildbot version used
92- tzdata/tzcode-native: upgrade 2025a -> 2025b
93- u-boot: ensure keys are generated before assembling U-Boot FIT image
94- util-linux: Add fix to isolate test fstab entries using CUSTOM_FSTAB
95- wic: bootimg-efi: Support + symbol in filenames
96
97
98Known Issues in Yocto-5.0.10
99~~~~~~~~~~~~~~~~~~~~~~~~~~~~
100
101- There is an issue where the target libsoup-2.4 build may fail if apachectl is present on the build
102 host. The issue only affects test binaries which aren't actually used. The issue can be fixed by
103 disabling the tests or updating to more recent changes on the scarthgap branch which fix this.
104
105
106Contributors to Yocto-5.0.10
107~~~~~~~~~~~~~~~~~~~~~~~~~~~~
108
109Thanks to the following people who contributed to this release:
110
111- Adrian Freihofer
112- Aleksandar Nikolic
113- Alexander Kanavin
114- Alon Bar-Lev
115- Alper Ak
116- Andrew Kreimer
117- Antonin Godard
118- Archana Polampalli
119- Ashish Sharma
120- Changqing Li
121- Christos Gavros
122- Deepesh Varatharajan
123- Divya Chellam
124- Divyanshu Rathore
125- Enrico Jörns
126- Etienne Cordonnier
127- Guðni Már Gilbert
128- Haixiao Yan
129- Harish Sadineni
130- Igor Opaniuk
131- Jeroen Hofstee
132- Lee Chee Yang
133- Nguyen Dat Tho
134- Niko Mauno
135- Peter Marko
136- Praveen Kumar
137- Priyal Doshi
138- Rogerio Guerra Borin
139- Shubham Kulkarni
140- Soumya Sambu
141- Steve Sakoman
142- Sunil Dora
143- Trevor Woerner
144- Vijay Anusuri
145- Virendra Thakur
146- Vyacheslav Yurkov
147- Yi Zhao
148- Yogita Urade
149- rajmohan r
150
151Repositories / Downloads for Yocto-5.0.10
152~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
153
154poky
155
156- Repository Location: :yocto_git:`/poky`
157- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
158- Tag: :yocto_git:`yocto-5.0.10 </poky/log/?h=yocto-5.0.10>`
159- Git Revision: :yocto_git:`ac257900c33754957b2696529682029d997a8f28 </poky/commit/?id=ac257900c33754957b2696529682029d997a8f28>`
160- Release Artefact: poky-ac257900c33754957b2696529682029d997a8f28
161- sha: ddca7e54b331e78214bea65b346320d4fbcddf4b51103bfbbd9fc3960f32cdc7
162- Download Locations:
163 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2
164 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2
165
166openembedded-core
167
168- Repository Location: :oe_git:`/openembedded-core`
169- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
170- Tag: :oe_git:`yocto-5.0.10 </openembedded-core/log/?h=yocto-5.0.10>`
171- Git Revision: :oe_git:`d5342ffc570d47a723b18297d75bd2f63c2088db </openembedded-core/commit/?id=d5342ffc570d47a723b18297d75bd2f63c2088db>`
172- Release Artefact: oecore-d5342ffc570d47a723b18297d75bd2f63c2088db
173- sha: daa62094f2327f4b3fbcc485e8964d1b86a4722f58fb37e0d8e8e9885094a262
174- Download Locations:
175 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2
176 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2
177
178meta-mingw
179
180- Repository Location: :yocto_git:`/meta-mingw`
181- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
182- Tag: :yocto_git:`yocto-5.0.10 </meta-mingw/log/?h=yocto-5.0.10>`
183- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
184- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
185- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
186- Download Locations:
187 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
188 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
189
190bitbake
191
192- Repository Location: :oe_git:`/bitbake`
193- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
194- Tag: :oe_git:`yocto-5.0.10 </bitbake/log/?h=yocto-5.0.10>`
195- Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>`
196- Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e
197- sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f
198- Download Locations:
199 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
200 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
201
202yocto-docs
203
204- Repository Location: :yocto_git:`/yocto-docs`
205- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
206- Tag: :yocto_git:`yocto-5.0.10 </yocto-docs/log/?h=yocto-5.0.10>`
207- Git Revision: :yocto_git:`3996388e337377bedc113d072a51fe9d68dd40c6 </yocto-docs/commit/?id=3996388e337377bedc113d072a51fe9d68dd40c6>`
208
diff --git a/documentation/migration-guides/release-notes-5.0.2.rst b/documentation/migration-guides/release-notes-5.0.2.rst
new file mode 100644
index 0000000000..b60fd73190
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.2.rst
@@ -0,0 +1,245 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.2 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- cups: Fix :cve_nist:`2024-35235`
10- gcc: Fix :cve_nist:`2024-0151`
11- gdk-pixbuf: Fix :cve_nist:`2022-48622`
12- ghostscript: fix :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871`
13- git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465`
14- glib-2.0: Fix :cve_nist:`2024-34397`
15- glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602`
16- ncurses: Fix :cve_nist:`2023-45918` and :cve_nist:`2023-50495`
17- openssl: Fix :cve_nist:`2024-4603` and :cve_mitre:`2024-4741`
18- util-linux: Fix :cve_nist:`2024-28085`
19- xserver-xorg: Fix :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31082` and :cve_nist:`2024-31083`
20
21
22Fixes in Yocto-5.0.2
23~~~~~~~~~~~~~~~~~~~~
24
25- appstream: Upgrade to 1.0.3
26- apr: submit 0001-Add-option-to-disable-timed-dependant-tests.patch upstream
27- base-files: profile: fix error sh: 1: unknown operand
28- bash: Fix file-substitution error-handling bug
29- bash: mark build-tests.patch as Inappropriate
30- binutils: Fix aarch64 disassembly abort
31- bitbake: bb: Use namedtuple for Task data
32- bitbake: cooker: Handle ImportError for websockets
33- bitbake: fetch2/gcp: Add missing runfetchcmd import
34- bitbake: fetch2/wget: Canonicalize :term:`DL_DIR` paths for wget2 compatibility
35- bitbake: fetch2/wget: Fix failure path for files that are empty or don't exist
36- bitbake: hashserv: client: Add batch stream API
37- bitbake: parse: Improve/fix cache invalidation via mtime
38- bitbake: runqueue: Add timing warnings around slow loops
39- bitbake: runqueue: Allow rehash loop to exit in case of interrupts
40- bitbake: runqueue: Improve rehash get_unihash parallelism
41- bitbake: runqueue: Process unihashes in parallel at init
42- bitbake: siggen/runqueue: Report which dependencies affect the taskhash
43- bitbake: siggen: Enable batching of unihash queries
44- bitbake: tests/fetch: Tweak test to match upstream repo url change
45- bitbake: tests/fetch: Tweak to work on Fedora40
46- build-appliance-image: Update to scarthgap head revision
47- busybox: update :cve_nist:`2022-28391` patches upstream status
48- cdrtools-native: Fix build with GCC 14
49- classes: image_types: apply EXTRA_IMAGECMD:squashfs* in oe_mksquashfs()
50- classes: image_types: quote variable assignment needed by dash
51- consolekit: Disable incompatible-pointer-types warning as error
52- cracklib: Modify patch to compile with GCC 14
53- cronie: Upgrade to 1.7.2
54- cups: Upgrade to 2.4.9
55- db: ignore implicit-int and implicit-function-declaration issues fatal with gcc-14
56- devtool: modify: Catch git submodule error for go code
57- devtool: standard: update-recipe/finish: fix update localfile in another layer
58- devtool: sync: Fix Execution error
59- expect: ignore various issues now fatal with gcc-14
60- expect: mark patches as Inactive-Upstream
61- gawk: fix readline detection
62- gcc : Upgrade to v13.3
63- gcc-runtime: libgomp fix for gcc 14 warnings with mandb selftest
64- gdk-pixbuf: Upgrade to 2.42.12
65- git: set --with-gitconfig=/etc/gitconfig for -native builds
66- git: Upgrade to 2.44.1
67- glib-2.0: Upgrade to 2.78.6
68- glibc: Update to latest on stable 2.39 branch (273a835fe7...)
69- glibc: correct :term:`LICENSE` to "GPL-2.0-only & LGPL-2.1-or-later"
70- go: Drop the linkmode completely
71- goarch: Revert "disable dynamic linking globally"
72- gstreamer1.0-plugins-good: Include qttools-native during the build with qt5 :term:`PACKAGECONFIG`
73- gtk4: Disable int-conversion warning as error
74- icu: add upstream submission links for fix-install-manx.patch
75- ipk: Fix clean up of extracted IPK payload
76- iproute2: Fix build with GCC-14
77- iproute2: drop obsolete patch
78- iputils: splitting the ping6 as a package
79- kea: Remove -fvisibility-inlines-hidden from C++ flags
80- kea: remove unnecessary reproducibility patch
81- kernel.bbclass: check, if directory exists before removing empty module directory
82- kexec-tools: Fix build with GCC-14 on musl
83- lib/oe/package-manager: allow including self in create_packages_dir
84- lib/package_manager/ipk: Do not hardcode payload compression algorithm
85- libarchive: Upgrade to 3.7.4
86- libcgroup: fix build on non-systemd systems
87- libgloss: Do not apply non-existent patch
88- libinput: fix building with debug-gui option
89- libtraceevent: submit meson.patch upstream
90- libunwind: ignore various issues now fatal with gcc-14
91- libusb1: Set :term:`CVE_PRODUCT`
92- llvm: Switch to using release tarballs
93- llvm: Upgrade to 18.1.5
94- lrzsz connman-gnome libfm: ignore various issues fatal with gcc-14
95- ltp: Fix build with GCC-14
96- ltp: add iputils-ping6 to :term:`RDEPENDS`
97- lttng-ust: Upgrade to 2.13.8
98- mesa: Upgrade to 24.0.5
99- oeqa/postactions: Do not use -l option with df
100- oeqa/sdk/assimp: Upgrade and fix for gcc 14
101- oeqa/sdkext/devtool: replace use of librdfa
102- oeqa/selftest/debuginfod: use localpkgfeed to speed server startup
103- oeqa/selftest/devtool: Revert fix test_devtool_add_git_style2"
104- oeqa/selftest/devtool: add test for modifying recipes using go.bbclass
105- oeqa/selftest/devtool: add test for updating local files into another layer
106- oeqa/selftest/devtool: fix _test_devtool_add_git_url
107- oeqa: selftest: context: run tests serially if testtools/subunit modules are not found
108- openssl: Upgrade to 3.2.2
109- p11-kit: ignore various issues fatal with gcc-14 (for 32bit MACHINEs)
110- patchtest: test_metadata: fix invalid escape sequences
111- poky.conf: bump version for 5.0.2
112- ppp: Add RSA-MD in :term:`LICENSE`
113- procps: fix build with new glibc but old kernel headers
114- ptest-runner: Bump to 2.4.4 (95f528c)
115- recipetool: Handle several go-import tags in go resolver
116- recipetool: Handle unclean response in go resolver
117- run-postinsts.service: Removed --no-reload to fix reload warning when users execute systemctl in the first boot.
118- selftest/classes: add localpkgfeed class
119- serf: mark patch as inappropriate for upstream submission
120- taglib: Upgrade to 2.0.1
121- ttyrun: define :term:`CVE_PRODUCT`
122- uboot-sign: fix loop in do_uboot_assemble_fitimage
123- update-rc.d: add +git to :term:`PV`
124- webkitgtk: Upgrade to 2.44.1
125- xinput-calibrator: mark upstream as inactive in a patch
126- xserver-xorg: Upgrade to 21.1.12
127- yocto-uninative: Update to 4.5 for gcc 14
128- zip: Fix build with gcc-14
129
130
131Known Issues in Yocto-5.0.2
132~~~~~~~~~~~~~~~~~~~~~~~~~~~
133
134- N/A
135
136
137Contributors to Yocto-5.0.2
138~~~~~~~~~~~~~~~~~~~~~~~~~~~
139
140- Adriaan Schmidt
141- Alexander Kanavin
142- Alexandre Truong
143- Anton Almqvist
144- Archana Polampalli
145- Changqing Li
146- Deepthi Hemraj
147- Felix Nilsson
148- Heiko Thole
149- Jose Quaresma
150- Joshua Watt
151- Julien Stephan
152- Kai Kang
153- Khem Raj
154- Lei Maohui
155- Marc Ferland
156- Marek Vasut
157- Mark Hatle
158- Martin Hundebøll
159- Martin Jansa
160- Maxin B. John
161- Michael Halstead
162- Mingli Yu
163- Ola x Nilsson
164- Peter Marko
165- Philip Lorenz
166- Poonam Jadhav
167- Ralph Siemsen
168- Rasmus Villemoes
169- Ricardo Simoes
170- Richard Purdie
171- Robert Joslyn
172- Ross Burton
173- Rudolf J Streif
174- Siddharth Doshi
175- Soumya Sambu
176- Steve Sakoman
177- Sven Schwermer
178- Trevor Gamblin
179- Vincent Kriek
180- Wang Mingyu
181- Xiangyu Chen
182- Yogita Urade
183- Zev Weiss
184- Zoltan Boszormenyi
185
186
187Repositories / Downloads for Yocto-5.0.2
188~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
189
190poky
191
192- Repository Location: :yocto_git:`/poky`
193- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
194- Tag: :yocto_git:`yocto-5.0.2 </poky/log/?h=yocto-5.0.2>`
195- Git Revision: :yocto_git:`f7def85be9f99dcb4ba488bead201f670304379b </poky/commit/?id=f7def85be9f99dcb4ba488bead201f670304379b>`
196- Release Artefact: poky-f7def85be9f99dcb4ba488bead201f670304379b
197- sha: 0610a3175846d87f8a853020e8d517c94fe5e8b3fd4e40cd2d0ddbc22e75db4c
198- Download Locations:
199 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.2/poky-f7def85be9f99dcb4ba488bead201f670304379b.tar.bz2
200 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.2/poky-f7def85be9f99dcb4ba488bead201f670304379b.tar.bz2
201
202openembedded-core
203
204- Repository Location: :oe_git:`/openembedded-core`
205- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
206- Tag: :oe_git:`yocto-5.0.2 </openembedded-core/log/?h=yocto-5.0.2>`
207- Git Revision: :oe_git:`803cc32e72b4fc2fc28d92090e61f5dd288a10cb </openembedded-core/commit/?id=803cc32e72b4fc2fc28d92090e61f5dd288a10cb>`
208- Release Artefact: oecore-803cc32e72b4fc2fc28d92090e61f5dd288a10cb
209- sha: b63f1214438e540ec15f1ec7f49615f31584c93e9cff10833273eefc710a7862
210- Download Locations:
211 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.2/oecore-803cc32e72b4fc2fc28d92090e61f5dd288a10cb.tar.bz2
212 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.2/oecore-803cc32e72b4fc2fc28d92090e61f5dd288a10cb.tar.bz2
213
214meta-mingw
215
216- Repository Location: :yocto_git:`/meta-mingw`
217- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
218- Tag: :yocto_git:`yocto-5.0.2 </meta-mingw/log/?h=yocto-5.0.2>`
219- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
220- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
221- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
222- Download Locations:
223 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.2/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
224 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.2/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
225
226bitbake
227
228- Repository Location: :oe_git:`/bitbake`
229- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
230- Tag: :oe_git:`yocto-5.0.2 </bitbake/log/?h=yocto-5.0.2>`
231- Git Revision: :oe_git:`8714a02e13477a9d97858b3642e05f28247454b5 </bitbake/commit/?id=8714a02e13477a9d97858b3642e05f28247454b5>`
232- Release Artefact: bitbake-8714a02e13477a9d97858b3642e05f28247454b5
233- sha: f22b56447e321c308353196da1d6dd76af5e9957e7e654c75dfd707f58091fd1
234- Download Locations:
235 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.2/bitbake-8714a02e13477a9d97858b3642e05f28247454b5.tar.bz2
236 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.2/bitbake-8714a02e13477a9d97858b3642e05f28247454b5.tar.bz2
237
238yocto-docs
239
240- Repository Location: :yocto_git:`/yocto-docs`
241- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
242- Tag: :yocto_git:`yocto-5.0.2 </yocto-docs/log/?h=yocto-5.0.2>`
243- Git Revision: :yocto_git:`875dfe69e93bf8fee3b8c07818a6ac059f228a13 </yocto-docs/commit/?id=875dfe69e93bf8fee3b8c07818a6ac059f228a13>`
244
245
diff --git a/documentation/migration-guides/release-notes-5.0.3.rst b/documentation/migration-guides/release-notes-5.0.3.rst
new file mode 100644
index 0000000000..caf33c7c3f
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.3.rst
@@ -0,0 +1,314 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.3 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- bind: Fix :cve_nist:`2024-0760`, :cve_nist:`2024-1737`, :cve_nist:`2024-1975` and :cve_nist:`2024-4076`
10- busybox: Fix :cve_nist:`2023-42366`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2021-42380` and :cve_nist:`2023-42363`
11- cpio: Ignore :cve_nist:`2023-7216`
12- curl: Fix :cve_nist:`2024-6197`
13- ffmpeg: Fix :cve_nist:`2023-49502`, :cve_nist:`2024-31578` and :cve_nist:`2024-31582`
14- ghostscript: Fix :cve_nist:`2023-52722`
15- go: Fix :cve_nist:`2024-24790`
16- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453`
17- less: Fix :cve_nist:`2024-32487`
18- libxml2: Fix :cve_nist:`2024-34459`
19- libyaml: Ignore :cve_nist:`2024-35328`
20- linux-yocto/6.6: Fix :cve_nist:`2024-23307`, :cve_nist:`2024-24861`, :cve_nist:`2024-26642`, :cve_nist:`2024-26643`, :cve_nist:`2024-26654`, :cve_nist:`2024-26656` and :cve_nist:`2023-47233`
21- linux-yocto/6.6: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179`, :cve_nist:`2021-47180`, :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48628`, :cve_nist:`2022-48629` and :cve_nist:`2022-48630`
22- linux-yocto/6.6 (cont.): Ignore :cve_nist:`2023-6270`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-7042`, :cve_nist:`2023-28746`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52481`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52488`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52506`, :cve_nist:`2023-52507`, :cve_nist:`2023-52508`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52530`, :cve_nist:`2023-52531`, :cve_nist:`2023-52532`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52561`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52565`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52568`, :cve_nist:`2023-52569`, :cve_nist:`2023-52570`, :cve_nist:`2023-52571`, :cve_nist:`2023-52572`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52576`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52582`, :cve_nist:`2023-52583`, :cve_nist:`2023-52584`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52589`, :cve_nist:`2023-52591`, :cve_nist:`2023-52593`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52596`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52620`, :cve_nist:`2023-52621`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52629`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52632`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52639`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0841`, :cve_nist:`2024-22099`, :cve_nist:`2024-23196`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26607`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26622`, :cve_nist:`2024-26623`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26646`, :cve_nist:`2024-26647`, :cve_nist:`2024-26648`, :cve_nist:`2024-26649`, :cve_nist:`2024-26650`, :cve_nist:`2024-26651`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26659`, :cve_nist:`2024-26660`, :cve_nist:`2024-26661`, :cve_nist:`2024-26662`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26669`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26677`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26680`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26687`, :cve_nist:`2024-26688`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26691`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26700`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26706`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26713`, :cve_nist:`2024-26714`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26718`, :cve_nist:`2024-26719`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26726`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26738`, :cve_nist:`2024-26739`, :cve_nist:`2024-26740`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26745`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26759`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26765`, :cve_nist:`2024-26766`, :cve_nist:`2024-26767`, :cve_nist:`2024-26768`, :cve_nist:`2024-26769`, :cve_nist:`2024-26770`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26775`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26782`, :cve_nist:`2024-26783`, :cve_nist:`2024-26786`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26789`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26792`, :cve_nist:`2024-26793`, :cve_nist:`2024-26794`, :cve_nist:`2024-26795`, :cve_nist:`2024-26796`, :cve_nist:`2024-26798`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805`, :cve_nist:`2024-26807`, :cve_nist:`2024-26808` and :cve_nist:`2024-26809`
23- llvm: Fix :cve_nist:`2024-0151`
24- ofono: Fix :cve_nist:`2023-2794`
25- openssh: Fix :cve_nist:`2024-6387` and :cve_nist:`2024-39894`
26- openssl: Fix :cve_nist:`2024-5535`
27- pam: Fix :cve_nist:`2024-22365`
28- python3-idna: Fix :cve_nist:`2024-3651`
29- qemu: Fix :cve_nist:`2023-6683`, :cve_nist:`2024-3446`, :cve_mitre:`2024-3447`, :cve_nist:`2024-3567`, :cve_nist:`2024-26327` and :cve_nist:`2024-26328`
30- ruby: Fix :cve_nist:`2023-36617` and :cve_nist:`2024-27281`
31- vte: Fix :cve_nist:`2024-37535`
32- wget: Fix for :cve_nist:`2024-38428`
33
34
35Fixes in Yocto-5.0.3
36~~~~~~~~~~~~~~~~~~~~
37
38- apt-native: don't let dpkg overwrite files by default
39- archiver.bbclass: Fix work-shared checking for kernel recipes
40- automake: mark new_rt_path_for_test-driver.patch as Inappropriate
41- bash: fix configure checks that fail with GCC 14.1
42- bind: upgrade to 9.18.28
43- binutils: stable 2.42 branch updates
44- bitbake: codeparser/data: Ensure module function contents changing is accounted for
45- bitbake: codeparser: Skip non-local functions for module dependencies
46- build-appliance-image: Update to scarthgap head revision
47- cargo: remove True option to getVar calls
48- classes/create-spdx-2.2: Fix :term:`SPDX` Namespace Prefix
49- classes/kernel: No symlink in postinst without KERNEL_IMAGETYPE_SYMLINK
50- cmake-qemu.bbclass: fix if criterion
51- create-spdx-3.0/populate_sdk_base: Add SDK_CLASSES inherit mechanism to fix tarball :term:`SPDX` manifests
52- create-spdx-'*': Support multilibs via SPDX_MULTILIB_SSTATE_ARCHS
53- curl: correct the :term:`PACKAGECONFIG` for native/nativesdk
54- curl: locale-base-en-us isn't glibc-specific
55- curl: skip FTP tests in run-ptest
56- cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX
57- cve-exclusion: Drop the version comparision/warning
58- devtool: ide-sdk: correct help typo
59- dnf: Fix missing leading whitespace with ':append'
60- dpkg: mark patches adding custom non-debian architectures as inappropriate for upstream
61- ed: upgrade to 1.20.2
62- expect: fix configure with GCC 14
63- ffmpeg: backport patch to fix errors with GCC 14
64- ffmpeg: backport patches to use new Vulkan AV1 codec API
65- flac: fix buildpaths warnings
66- fribidi: upgrade to 1.0.14
67- gawk: Remove References to /usr/local/bin/gawk
68- gawk: update patch status
69- gettext: fix a parallel build issue
70- ghostscript: upgrade to 10.03.1
71- glib-networking: submit eagain.patch upstream
72- glibc: cleanup old cve status
73- glibc: stable 2.39 branch updates
74- glslang: mark 0001-generate-glslang-pkg-config.patch as Inappropriate
75- go: drop the old 1.4 bootstrap C version
76- go: upgrade to 1.22.5
77- gpgme: move gpgme-tool to own sub-package
78- grub,grub-efi: Remove -mfpmath=sse on x86
79- grub: mark grub-module-explicitly-keeps-symbole-.module_license.patch as a workaround
80- gstreamer1.0: skip another known flaky test
81- gstreamer: upgrade to 1.22.12
82- insane.bbclass: fix `HOST_` variable names
83- insane.bbclass: remove leftover variables and comment
84- insane.bbclass: remove skipping of cross-compiled packages
85- insane: handle dangling symlinks in the libdir QA check
86- iptables: fix memory corruption when parsing nft rules
87- iptables: fix save/restore symlinks with libnftnl :term:`PACKAGECONFIG` enabled
88- iptables: submit 0001-configure-Add-option-to-enable-disable-libnfnetlink.patch upstream
89- kexec-tools: submit 0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch upstream
90- layer.conf: Add os-release to :term:`SIGGEN_EXCLUDERECIPES_ABISAFE`
91- libacpi: mark patches as inactive-upstream
92- libadwaita: upgrade to 1.5.1
93- libcap-ng-python: upgrade to 0.8.5
94- libcap-ng: upgrade to 0.8.5
95- libmnl: explicitly disable doxygen
96- libnl: change :term:`HOMEPAGE`
97- libpam: fix runtime error in pam_pwhistory moudle
98- libpng: update :term:`SRC_URI`
99- libportal: fix rare build race
100- libstd-rs: set :term:`CVE_PRODUCT` to rust
101- libxcrypt: correct the check for a working libucontext.h
102- libxml2: upgrade to 2.12.8
103- linux-yocto-custom: Fix comment override syntax
104- linux-yocto/6.6: cfg: drop obselete options
105- linux-yocto/6.6: cfg: introduce Intel NPU fragment
106- linux-yocto/6.6: fix AMD boot trace
107- linux-yocto/6.6: fix kselftest failures
108- linux-yocto/6.6: intel configuration changes
109- linux-yocto/6.6: nft: enable veth
110- linux-yocto/6.6: update to v6.6.35
111- linux-yocto: Enable team net driver
112- linuxloader: add -armhf on arm only for :term:`TARGET_FPU` 'hard'
113- llvm: upgrade to 18.1.6
114- maintainers.inc: update self e-mail address
115- maintainers: Drop go-native as recipe removed
116- mesa: Fix missing leading whitespace with ':append'
117- mesa: remove obsolete 0001-meson.build-check-for-all-linux-host_os-combinations.patch
118- mesa: upgrade to 24.0.7
119- meson: don't use deprecated pkgconfig variable
120- migration-guides: add release notes for 4.0.19
121- migration-guides: add release notes for 5.0.2
122- migration-notes: add release notes for 5.0.1
123- mmc-utils: fix URL
124- mobile-broadband-provider-info: upgrade to 20240407
125- multilib.bbclass: replace deprecated e.data with d
126- multilib.conf: remove appending to :term:`PKG_CONFIG_PATH`
127- nasm: upgrade to 2.16.03
128- ncurses: switch to new mirror
129- oeqa/runtime/scp: requires openssh-sftp-server
130- oeqa/runtime: fix race-condition in minidebuginfo test
131- oeqa/runtime: fix regression in minidebuginfo test
132- oeqa/runtime: make minidebuginfo test work with coreutils
133- oeqa/sdk/case: Ensure :term:`DL_DIR` is populated with artefacts if used
134- oeqa/sdk/case: Skip SDK test cases when :term:`TCLIBC` is newlib
135- oeqa/selftest/devtool: Fix for usrmerge in :term:`DISTRO_FEATURES`
136- oeqa/selftest/recipetool: Fix for usrmerge in :term:`DISTRO_FEATURES`
137- openssh: drop rejected patch fixed in 8.6p1 release
138- openssh: systemd notification was implemented upstream
139- openssh: systemd sd-notify patch was rejected upstream
140- orc: upgrade to 0.4.39
141- package.py: Fix static debuginfo split
142- package.py: Fix static library processing
143- pcmanfm: Disable incompatible-pointer-types warning as error
144- perl: submit the rest of determinism.patch upstream
145- pixman: fixing inline failure with -Og
146- poky.conf: bump version for 5.0.3
147- populate_sdk_ext.bbclass: Fix undefined variable error
148- pseudo: Fix to work with glibc 2.40
149- pseudo: Update to include open symlink handling bugfix
150- pseudo: Update to pull in python 3.12+ fix
151- python3-attrs: drop python3-ctypes from :term:`RDEPENDS`
152- python3-bcrypt: drop python3-six from :term:`RDEPENDS`
153- python3-idna: upgrade to 3.7
154- python3-jinja2: upgrade to 3.1.4
155- python3-pyopenssl: drop python3-six from :term:`RDEPENDS`
156- python3-requests: cleanup :term:`RDEPENDS`
157- python3-setuptools: drop python3-2to3 from :term:`RDEPENDS`
158- python3: Treat UID/GID overflow as failure
159- python3: skip test_concurrent_futures/test_deadlock
160- python3: skip test_multiprocessing/test_active_children test
161- python3: submit deterministic_imports.patch upstream as a ticket
162- python3: upgrade to 3.12.4
163- qemu: upgrade to 8.2.3
164- rng-tools: ignore incompatible-pointer-types errors for now
165- rt-tests: rt_bmark.py: fix TypeError
166- rust-cross-canadian: set :term:`CVE_PRODUCT` to rust
167- rust: Add new varaible RUST_ENABLE_EXTRA_TOOLS
168- sanity: Check if tar is gnutar
169- sdk: Fix path length limit to match reserved size
170- selftest-hardlink: Add additional test cases
171- selftest/cases/runtime_test: Exclude centos-9 from virgl tests
172- selftest: add Upstream-Status to .patch files
173- settings-daemon: submit addsoundkeys.patch upstream and update to a revision that has it
174- systemd.bbclass: Clarify error message
175- tcp-wrappers: mark all patches as inactive-upstream
176- tzdata: Add tzdata.zi to tzdata-core package
177- vorbis: mark patch as Inactive-Upstream
178- vulkan-samples: fix do_compile error when -Og enabled
179- watchdog: Set watchdog_module in default config
180- webkitgtk: fix do_compile errors on beaglebone-yocto
181- webkitgtk: fix do_configure error on beaglebone-yocto
182- weston: upgrade to 13.0.1
183- wic/partition.py: Set hash_seed for empty ext partition
184- wic: bootimg-efi: fix error handling
185- wic: engine.py: use raw string for escape sequence
186- wireless-regdb: upgrade to 2024.05.08
187- xserver-xorg: upgrade to 21.1.13
188- xz: Update :term:`LICENSE` variable for xz packages
189
190
191Known Issues in Yocto-5.0.3
192~~~~~~~~~~~~~~~~~~~~~~~~~~~
193
194- N/A
195
196
197Contributors to Yocto-5.0.3
198~~~~~~~~~~~~~~~~~~~~~~~~~~~
199
200- Adithya Balakumar
201- Aleksandar Nikolic
202- Alexander Kanavin
203- Antonin Godard
204- Archana Polampalli
205- Ashish Sharma
206- Benjamin Szőke
207- Bruce Ashfield
208- Changqing Li
209- Chen Qi
210- Christian Taedcke
211- Deepthi Hemraj
212- Denys Dmytriyenko
213- Dmitry Baryshkov
214- Emil Kronborg
215- Enrico Jörns
216- Etienne Cordonnier
217- Guðni Már Gilbert
218- Hitendra Prajapati
219- Jonas Gorski
220- Jookia
221- Jose Quaresma
222- Joshua Watt
223- Jörg Sommer
224- Kai Kang
225- Khem Raj
226- Kirill Yatsenko
227- Lee Chee Yang
228- Mark Hatle
229- Markus Volk
230- Martin Jansa
231- Michael Opdenacker
232- Mingli Yu
233- Niko Mauno
234- Patrick Wicki
235- Peter Marko
236- Quentin Schulz
237- Ranjitsinh Rathod
238- Richard Purdie
239- Robert Kovacsics
240- Ross Burton
241- Siddharth Doshi
242- Simone Weiß
243- Soumya Sambu
244- Steve Sakoman
245- Sundeep KOKKONDA
246- Trevor Gamblin
247- Vijay Anusuri
248- Wadim Egorov
249- Wang Mingyu
250- Xiangyu Chen
251- Yi Zhao
252- Yogita Urade
253- Zahir Hussain
254
255
256Repositories / Downloads for Yocto-5.0.3
257~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
258
259poky
260
261- Repository Location: :yocto_git:`/poky`
262- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
263- Tag: :yocto_git:`yocto-5.0.3 </poky/log/?h=yocto-5.0.3>`
264- Git Revision: :yocto_git:`0b37512fb4b231cc106768e2a7328431009b3b70 </poky/commit/?id=0b37512fb4b231cc106768e2a7328431009b3b70>`
265- Release Artefact: poky-0b37512fb4b231cc106768e2a7328431009b3b70
266- sha: b37fe0b2f6a685ee94b4af55f896cbf52ba69023e10eb21d3e54798ca21ace79
267- Download Locations:
268 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/poky-0b37512fb4b231cc106768e2a7328431009b3b70.tar.bz2
269 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/poky-0b37512fb4b231cc106768e2a7328431009b3b70.tar.bz2
270
271openembedded-core
272
273- Repository Location: :oe_git:`/openembedded-core`
274- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
275- Tag: :oe_git:`yocto-5.0.3 </openembedded-core/log/?h=yocto-5.0.3>`
276- Git Revision: :oe_git:`236ac1b43308df722a78d3aa20aef065dfae5b2b </openembedded-core/commit/?id=236ac1b43308df722a78d3aa20aef065dfae5b2b>`
277- Release Artefact: oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b
278- sha: 44b89feba9563c2281c8c2f45037dd7c312fb20e8b7d9289b25f0ea0fe1fc2c4
279- Download Locations:
280 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b.tar.bz2
281 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b.tar.bz2
282
283meta-mingw
284
285- Repository Location: :yocto_git:`/meta-mingw`
286- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
287- Tag: :yocto_git:`yocto-5.0.3 </meta-mingw/log/?h=yocto-5.0.3>`
288- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
289- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
290- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
291- Download Locations:
292 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
293 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
294
295bitbake
296
297- Repository Location: :oe_git:`/bitbake`
298- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
299- Tag: :oe_git:`yocto-5.0.3 </bitbake/log/?h=yocto-5.0.3>`
300- Git Revision: :oe_git:`11d83170922a2c6b9db1f6e8c23e533526984b2c </bitbake/commit/?id=11d83170922a2c6b9db1f6e8c23e533526984b2c>`
301- Release Artefact: bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c
302- sha: 9643433748d7ed80d6334124390271929566b3bc076dad0f6e6be1ec6d753b8d
303- Download Locations:
304 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c.tar.bz2
305 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c.tar.bz2
306
307yocto-docs
308
309- Repository Location: :yocto_git:`/yocto-docs`
310- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
311- Tag: :yocto_git:`yocto-5.0.3 </yocto-docs/log/?h=yocto-5.0.3>`
312- Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>`
313
314
diff --git a/documentation/migration-guides/release-notes-5.0.4.rst b/documentation/migration-guides/release-notes-5.0.4.rst
new file mode 100644
index 0000000000..14fbe3f6f8
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.4.rst
@@ -0,0 +1,212 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.4 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- apr: Fix :cve_nist:`2023-49582`
10- curl: Ignore :cve_nist:`2024-32928`
11- curl: Fix :cve_nist:`2024-7264`
12- expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492`
13- ffmpeg: Fix :cve_nist:`2023-50008` and :cve_nist:`2024-32230`
14- libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006`
15- libyaml: Ignore :cve_nist:`2024-35325` and :cve_nist:`2024-35326`
16- openssl: Fix :cve_nist:`2024-5535` and :cve_nist:`2024-6119`
17- python3-certifi: Fix :cve_nist:`2024-39689`
18- python3-setuptools: Fix :cve_nist:`2024-6345`
19- python3: Fix :cve_nist:`2024-6232`, :cve_nist:`2024-7592`, :cve_nist:`2024-8088` and :cve_nist:`2024-27034`
20- qemu: Fix :cve_nist:`2024-4467` and :cve_nist:`2024-7409`
21- ruby: Fix :cve_nist:`2024-27282`
22- tiff: Fix :cve_nist:`2024-7006`
23- vim: Fix :cve_nist:`2024-41957`, :cve_nist:`2024-41965`, :cve_nist:`2024-43374`, :cve_nist:`2024-43790` and :cve_nist:`2024-43802`
24
25
26Fixes in Yocto-5.0.4
27~~~~~~~~~~~~~~~~~~~~
28
29- apr: drop 0007-explicitly-link-libapr-against-phtread-to-make-gold-.patch
30- apr: upgrade to 1.7.5
31- bind: Fix build with the `httpstats` package config enabled
32- bitbake: data_smart: Improve performance for VariableHistory
33- bluez5: remove redundant patch for MAX_INPUT
34- build-appliance-image: Update to scarthgap head revision
35- buildhistory: Fix intermittent package file list creation
36- buildhistory: Restoring files from preserve list
37- buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage
38- busybox: Fix cut with "-s" flag
39- create-sdpx-2.2.bbclass: Switch from exists to isfile checking debugsrc
40- cups: upgrade to 2.4.10
41- dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only)
42- doc: features: describe distribution feature pni-name
43- doc: features: remove duplicate word in distribution feature ext2
44- expat: upgrade to 2.6.3
45- expect-native: fix do_compile failure with gcc-14
46- gcc: Fix spurious '/' in GLIBC_DYNAMIC_LINKER on microblaze
47- gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only)
48- glibc: fix fortran header file conflict for arm
49- go: upgrade to 1.22.6
50- gstreamer1.0: disable flaky baseparser tests
51- image_types.bbclass: Use --force also with lz4,lzop
52- initramfs-framework: fix typos
53- iw: Fix :term:`LICENSE` (change to ISC)
54- libadwaita: upgrade to 1.5.2
55- libcap-ng: update :term:`SRC_URI`
56- libdnf: upgrade to 0.73.2
57- libedit: Make docs generation deterministic
58- libgfortran.inc: fix nativesdk-libgfortran dependencies
59- librsvg: don't try to run target code at build time
60- linux-firmware: add a package for ath12k firmware
61- llvm: Enable libllvm for native build
62- maintainers.inc: add maintainer for python(-setuptools, -smmap, -subunit, -testtools)
63- mc: fix source URL
64- migration-guide: add release notes for 4.0.20 and 5.0.3
65- oeqa/postactions: fix exception handling
66- oeqa/runtime/ssh: In case of failure, show exit code and handle -15 (SIGTERM)
67- oeqa/runtime/ssh: add retry logic and sleeps to allow for slower systems
68- oeqa/runtime/ssh: check for all errors at the end
69- oeqa/runtime/ssh: increase the number of attempts
70- oeqa/selftest/reproducibile: Explicitly list virtual targets
71- oeqa/utils/postactions: transfer whole archive over ssh instead of doing individual copies
72- openssh: add backported header file include
73- openssl: upgrade to 3.2.3
74- os-release: Fix VERSION_CODENAME in case it is empty
75- poky.conf: bump version for 5.0.4
76- populate_sdk_ext.bclass: make sure OECORE_NATIVE_SYSROOT is exported.
77- python3-maturin: Fix cross compilation issue for armv7l, mips64, ppc
78- python3-pycryptodome(x): use python_setuptools_build_meta build class
79- python3: upgrade to 3.12.6
80- python3: skip readline limited history tests
81- qemu: backport patches to fix riscv64 build failure
82- qemuboot: Trigger write_qemuboot_conf task on changes of kernel image realpath
83- ref-manual: fix typo and move :term:`SYSROOT_DIRS` example
84- ruby: Make docs generation deterministic
85- systemd: Mitigate /var/log type mismatch issue
86- systemd: Mitigate /var/tmp type mismatch issue
87- tiff: Fix :term:`LICENSE` (change to libtiff)
88- u-boot.inc: Refactor do_* steps into functions that can be overridden
89- udev-extraconf: Add collect flag to mount
90- unzip: Fix :term:`LICENSE` (change to Info-ZIP)
91- util-linux: Add :term:`PACKAGECONFIG` option (libmount-mountfd-support) to mitigate rootfs remount error
92- vim: upgrade to 9.1.0698
93- weston-init: fix weston not starting when xwayland is enabled
94- wireless-regdb: upgrade to 2024.07.04
95- wpa-supplicant: upgrade to 2.11
96- xserver-xorg: mark :cve_nist:`2023-5574` as unpatched when xvfb enabled
97- yocto-uninative: Update to 4.6 for glibc 2.40
98- zip: Fix :term:`LICENSE` (change to Info-ZIP)
99
100
101Known Issues in Yocto-5.0.4
102~~~~~~~~~~~~~~~~~~~~~~~~~~~
103
104- N/A
105
106
107Contributors to Yocto-5.0.4
108~~~~~~~~~~~~~~~~~~~~~~~~~~~
109
110- Alban Bedel
111- Alexander Kanavin
112- Alexis Lothoré
113- Archana Polampalli
114- Ashish Sharma
115- Bartosz Golaszewski
116- Benjamin Szőke
117- Changqing Li
118- Chen Qi
119- Colin McAllister
120- Daniel Semkowicz
121- Dmitry Baryshkov
122- Gauthier HADERER
123- Guðni Már Gilbert
124- Jon Mason
125- Jose Quaresma
126- Jörg Sommer
127- Kai Kang
128- Khem Raj
129- Lee Chee Yang
130- Mark Hatle
131- Martin Jansa
132- Matthias Pritschet
133- Michael Halstead
134- Mingli Yu
135- Niko Mauno
136- Pedro Ferreira
137- Peter Marko
138- Quentin Schulz
139- Richard Purdie
140- Robert Yang
141- Ross Burton
142- Ryan Eatmon
143- Siddharth Doshi
144- Simone Weiß
145- Soumya Sambu
146- Steve Sakoman
147- Trevor Gamblin
148- Ulrich Ölmann
149- Vijay Anusuri
150- Wang Mingyu
151- Weisser, Pascal.ext
152- Yogita Urade
153
154
155Repositories / Downloads for Yocto-5.0.4
156~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
157
158poky
159
160- Repository Location: :yocto_git:`/poky`
161- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
162- Tag: :yocto_git:`yocto-5.0.4 </poky/log/?h=yocto-5.0.4>`
163- Git Revision: :yocto_git:`2034fc38eb4e63984d9bd6b260aa1bf95ce562e4 </poky/commit/?id=2034fc38eb4e63984d9bd6b260aa1bf95ce562e4>`
164- Release Artefact: poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4
165- sha: 697ed099793d6c86d5ffe590e96f99689bd28dcb2d4451dc4585496fa4a20400
166- Download Locations:
167 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2
168 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2
169
170openembedded-core
171
172- Repository Location: :oe_git:`/openembedded-core`
173- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
174- Tag: :oe_git:`yocto-5.0.4 </openembedded-core/log/?h=yocto-5.0.4>`
175- Git Revision: :oe_git:`f888dd911529a828820799a7a1b75dfd3a44847c </openembedded-core/commit/?id=f888dd911529a828820799a7a1b75dfd3a44847c>`
176- Release Artefact: oecore-f888dd911529a828820799a7a1b75dfd3a44847c
177- sha: 93cb4c3c8e0f77edab20814d155847dc3452c6b083e3dd9c7a801e80a7e4d228
178- Download Locations:
179 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2
180 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2
181
182meta-mingw
183
184- Repository Location: :yocto_git:`/meta-mingw`
185- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
186- Tag: :yocto_git:`yocto-5.0.4 </meta-mingw/log/?h=yocto-5.0.4>`
187- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
188- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
189- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
190- Download Locations:
191 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
192 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
193
194bitbake
195
196- Repository Location: :oe_git:`/bitbake`
197- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
198- Tag: :oe_git:`yocto-5.0.4 </bitbake/log/?h=yocto-5.0.4>`
199- Git Revision: :oe_git:`d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3 </bitbake/commit/?id=d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3>`
200- Release Artefact: bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3
201- sha: d873f4d3a471d26680dc39200d8f3851a6863f15daa9bed978ba31b930f9a1c1
202- Download Locations:
203 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2
204 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2
205
206yocto-docs
207
208- Repository Location: :yocto_git:`/yocto-docs`
209- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
210- Tag: :yocto_git:`yocto-5.0.4 </yocto-docs/log/?h=yocto-5.0.4>`
211- Git Revision: :yocto_git:`d71081dd14a9d75ace4d1c62472374f37b4a888d </yocto-docs/commit/?id=d71081dd14a9d75ace4d1c62472374f37b4a888d>`
212
diff --git a/documentation/migration-guides/release-notes-5.0.5.rst b/documentation/migration-guides/release-notes-5.0.5.rst
new file mode 100644
index 0000000000..c8cf9a85d1
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.5.rst
@@ -0,0 +1,227 @@
1Release notes for Yocto-5.0.5 (Scarthgap)
2-----------------------------------------
3
4Security Fixes in Yocto-5.0.5
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- ``cups``: Fix :cve_nist:`2024-47175`
8- ``curl``: Fix :cve_nist:`2024-8096`
9- ``gnupg``: Ignore :cve_nist:`2022-3219` (wont-fix)
10- ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958`
11- ``openssh``: Ignore :cve_nist:`2023-51767` (wont-fix)
12- ``openssl``: Fix :cve_nist:`2024-9143`
13- ``ruby``: Fix :cve_nist:`2024-41123` and :cve_mitre:`2024-41496`
14- ``rust-llvm``: Fix :cve_nist:`2024-0151`
15- ``rust``, ``libstd-rs``: Ignore :cve_nist:`2024-43402`
16- ``wpa-supplicant``: Patch SAE H2E and incomplete downgrade protection for group negotiation
17- ``wpa-supplicant``: Fix :cve_nist:`2024-3596`
18- ``wpa-supplicant``: Ignore :cve_nist:`2024-5290`
19
20
21Fixes in Yocto-5.0.5
22~~~~~~~~~~~~~~~~~~~~
23
24- binutils: stable 2.42 branch updates
25- bitbake.conf: Add truncate to :term:`HOSTTOOLS`
26- bitbake: asyncrpc: Use client timeout for websocket open timeout
27- bitbake: bitbake: doc/user-manual: Update the :term:`BB_HASHSERVE_UPSTREAM`
28- bitbake: gitsm: Add call_process_submodules() to remove duplicated code
29- bitbake: gitsm: Remove downloads/tmpdir when failed
30- bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab
31- bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab
32- build-appliance-image: Update to scarthgap head revision
33- cryptodev: upgrade to 1.14
34- cve-check: add support for cvss v4.0
35- cve_check: Use a local copy of the database during builds
36- dev-manual: add bblock documentation
37- documentation: conf.py: rename :cve: role to :cve_nist:
38- documentation: README: add instruction to run Vale on a subset
39- documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint
40- e2fsprogs: removed 'sed -u' option
41- ffmpeg: Add "libswresample libavcodec" to :term:`CVE_PRODUCT`
42- glibc: stable 2.39 branch updates.
43- go: upgrade to 1.22.8
44- icu: update patch Upstream-Status
45- image.bbclass: Drop support for ImageQAFailed exceptions in image_qa
46- image_qa: fix error handling
47- install-buildtools: fix "test installation" step
48- install-buildtools: remove md5 checksum validation
49- install-buildtools: update base-url, release and installer version
50- kernel-devsrc: remove 64 bit vdso cmd files
51- kernel-fitimage: fix external dtb check
52- kernel-fitimage: fix intentation
53- lib/oe/package-manager: skip processing installed-pkgs with empty globs
54- liba52: fix do_fetch error
55- libpcre2: Update base uri PhilipHazel -> PCRE2Project
56- libsdl2: Fix non-deterministic configure option for libsamplerate
57- license: Fix directory layout issues
58- linux-firmware: upgrade to 20240909
59- linux-yocto/6.6: fix genericarm64 config warning
60- linux-yocto/6.6: upgrade to v6.6.54
61- lsb-release: fix Distro Codename shell escaping
62- makedevs: Fix issue when rootdir of / is given
63- makedevs: Fix matching uid/gid
64- meta-ide-support: Mark recipe as MACHINE-specific
65- meta-world-pkgdata: Inherit nopackages
66- migration-guide: add release notes for 4.0.21, 4.0.22 and 5.0.4
67- migration-guide: release-notes-4.0: update :term:`BB_HASHSERVE_UPSTREAM` for new infrastructure
68- migration-guide: release-notes-5.0.rst: update NO_OUTPUT -> NO_COLOR
69- orc: upgrade to 0.4.40
70- overview-manual: concepts: add details on package splitting
71- poky.conf: bump version for 5.0.5
72- populate_sdk_base: inherit nopackages
73- ptest-runner: upgrade to 2.4.5
74- pulseaudio: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI`
75- desktop-file-utils: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI`
76- python3-lxml: upgrade to v5.0.2
77- python3-setuptools: Add "python:setuptools" to :term:`CVE_PRODUCT`
78- recipes-bsp: usbutils: Fix usb-devices command using busybox
79- ref-manual: add missing CVE_CHECK manifest variables
80- ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable
81- ref-manual: add missing :term:`OPKGBUILDCMD` variable
82- ref-manual: add missing :term:`TESTIMAGE_FAILED_QA_ARTIFACTS`
83- ref-manual: devtool-reference: document missing commands
84- ref-manual: devtool-reference: refresh example outputs
85- ref-manual: faq: add q&a on class appends
86- ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable
87- ref-manual: merge patch-status-* to patch-status
88- ref-manual: release-process: add a reference to the doc's release
89- ref-manual: release-process: refresh the current LTS releases
90- ref-manual: release-process: update releases.svg
91- ref-manual: release-process: update releases.svg with month after "Current"
92- ref-manual: structure.rst: document missing tmp/ dirs
93- ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables
94- rootfs-postcommands.bbclass: make opkg status reproducible
95- rpm: fix expansion of %_libdir in macros
96- ruby: upgrade to 3.3.5
97- runqemu: Fix detection of -serial parameter
98- runqemu: keep generating tap devices
99- scripts/install-buildtools: Update to 5.0.3
100- sqlite3: upgrade to 3.45.3
101- styles: vocabularies: Yocto: add sstate
102- systemtap: fix systemtap-native build error on Fedora 40
103- sysvinit: take release tarballs from github
104- testexport: fallback for empty :term:`IMAGE_LINK_NAME`
105- testimage: fallback for empty :term:`IMAGE_LINK_NAME`
106- uboot-sign: fix counters in do_uboot_assemble_fitimage
107- vim: upgrade to 9.1.0764
108- virglrenderer: Add patch to fix -int-conversion build issue
109- webkitgtk: upgrade to 2.44.3
110- weston: backport patch to allow neatvnc < v0.9.0
111- wpa-supplicant: Patch security advisory 2024-2
112- xserver-xorg: upgrade to 21.1.14
113
114
115Known Issues in Yocto-5.0.5
116~~~~~~~~~~~~~~~~~~~~~~~~~~~
117
118- ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the parselogs runtime test due to unexpected kernel error messages in the log (see :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla).
119
120
121Contributors to Yocto-5.0.5
122~~~~~~~~~~~~~~~~~~~~~~~~~~~
123
124- Aditya Tayade
125- Adrian Freihofer
126- Aleksandar Nikolic
127- Alexander Kanavin
128- Antonin Godard
129- Anuj Mittal
130- Bruce Ashfield
131- Claus Stovgaard
132- Deepesh Varatharajan
133- Deepthi Hemraj
134- Hiago De Franco
135- Hitendra Prajapati
136- Jaeyoon Jung
137- Jiaying Song
138- Jonas Gorski
139- Jose Quaresma
140- Joshua Watt
141- Julien Stephan
142- Jörg Sommer
143- Khem Raj
144- Konrad Weihmann
145- Lee Chee Yang
146- Louis Rannou
147- Macpaul Lin
148- Martin Jansa
149- Paul Barker
150- Paul Gerber
151- Peter Kjellerstedt
152- Peter Marko
153- Purushottam Choudhary
154- Richard Purdie
155- Robert Yang
156- Rohini Sangam
157- Ross Burton
158- Sergei Zhmylev
159- Shunsuke Tokumoto
160- Steve Sakoman
161- Teresa Remmet
162- Victor Kamensky
163- Vijay Anusuri
164- Wang Mingyu
165- Yi Zhao
166- Yogita Urade
167- Zahir Hussain
168
169
170Repositories / Downloads for Yocto-5.0.5
171~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
172
173poky
174
175- Repository Location: :yocto_git:`/poky`
176- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
177- Tag: :yocto_git:`yocto-5.0.5 </poky/log/?h=yocto-5.0.5>`
178- Git Revision: :yocto_git:`dce4163d42f7036ea216b52b9135968d51bec4c1 </poky/commit/?id=dce4163d42f7036ea216b52b9135968d51bec4c1>`
179- Release Artefact: poky-dce4163d42f7036ea216b52b9135968d51bec4c1
180- sha: ad35a965a284490a962f6854ace536b8795f96514e14bf5c79f91f6d76ac25d3
181- Download Locations:
182 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2
183 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2
184
185openembedded-core
186
187- Repository Location: :oe_git:`/openembedded-core`
188- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
189- Tag: :oe_git:`yocto-5.0.5 </openembedded-core/log/?h=yocto-5.0.5>`
190- Git Revision: :oe_git:`a051a066da2874b95680d0353dfa18c1d56b2670 </openembedded-core/commit/?id=a051a066da2874b95680d0353dfa18c1d56b2670>`
191- Release Artefact: oecore-a051a066da2874b95680d0353dfa18c1d56b2670
192- sha: 16d252aade00161ade2692f41b2da3effeb1f41816a66db843bb1c5495125e93
193- Download Locations:
194 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2
195 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2
196
197meta-mingw
198
199- Repository Location: :yocto_git:`/meta-mingw`
200- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
201- Tag: :yocto_git:`yocto-5.0.5 </meta-mingw/log/?h=yocto-5.0.5>`
202- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
203- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
204- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
205- Download Locations:
206 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
207 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
208
209bitbake
210
211- Repository Location: :bitbake_git:`/`
212- Branch: :bitbake_git:`2.8 </log/?h=2.8>`
213- Tag: :bitbake_git:`yocto-5.0.5 </log/?h=yocto-5.0.5>`
214- Git Revision: :bitbake_git:`377eba2361850adfb8ce7e761ef9c76be287f88c </commit/?id=377eba2361850adfb8ce7e761ef9c76be287f88c>`
215- Release Artefact: bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c
216- sha: 4a5a35098eec719bbb879706d50e552a2b709295db4055c8050ae7dda1eb2994
217- Download Locations:
218 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2
219 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2
220
221yocto-docs
222
223- Repository Location: :yocto_git:`/yocto-docs`
224- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
225- Tag: :yocto_git:`yocto-5.0.5 </yocto-docs/log/?h=yocto-5.0.5>`
226- Git Revision: :yocto_git:`e882cb3e5816d081eb05cb83488f286cca70e0c6 </yocto-docs/commit/?id=e882cb3e5816d081eb05cb83488f286cca70e0c6>`
227
diff --git a/documentation/migration-guides/release-notes-5.0.6.rst b/documentation/migration-guides/release-notes-5.0.6.rst
new file mode 100644
index 0000000000..b6f42198a1
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.6.rst
@@ -0,0 +1,223 @@
1Release notes for Yocto-5.0.6 (Scarthgap)
2-----------------------------------------
3
4Security Fixes in Yocto-5.0.6
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- acpica: Fix :cve_nist:`2024-24856`
8- curl: Fix :cve_nist:`2024-9681`
9- dropbear: Fix :cve_nist:`2023-48795`
10- expat: Fix :cve_nist:`2024-50602`
11- ffmpeg: Fix :cve_nist:`2023-49501`, :cve_nist:`2023-49528`, :cve_nist:`2023-50007`,
12 :cve_nist:`2024-7055` and :cve_mitre:`2024-28661`
13- glib-2.0: Fix :cve_nist:`2024-52533`
14- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
15 :cve_nist:`2024-46954`, :cve_nist:`2024-46955` and :cve_nist:`2024-46956`
16- gstreamer1.0: Ignore :cve_nist:`2024-0444`
17- libpam: Fix :cve_nist:`2024-10041`
18- libsndfile: Fix :cve_nist:`2024-50612`
19- libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
20- ovmf: Fix :cve_nist:`2024-1298` and :cve_nist:`2024-38796`
21- python3-zipp: Fix :cve_nist:`2024-5569`
22- qemu: Fix :cve_nist:`2024-4693`, :cve_nist:`2024-6505` and :cve_nist:`2024-7730`
23- qemu: Ignore :cve_nist:`2024-6505`
24
25
26Fixes in Yocto-5.0.6
27~~~~~~~~~~~~~~~~~~~~
28
29- binutils: Add missing perl modules to :term:`RDEPENDS` for nativesdk variant
30- binutils: stable 2.42 branch update
31- bitbake: Remove custom exception backtrace formatting
32- bitbake: fetch2/git: Use quote from shlex, not pipes
33- bitbake: fetch2: use persist_data context managers
34- bitbake: fetch/wget: Increase timeout to 100s from 30s
35- bitbake: persist_data: close connection in SQLTable __exit__
36- bitbake: runqueue: Fix performance of multiconfigs with large overlap
37- bitbake: runqueue: Fix scenetask processing performance issue
38- bitbake: runqueue: Optimise setscene loop processing
39- build-appliance-image: Update to scarthgap head revision
40- builder: set :term:`CVE_PRODUCT`
41- cmake: Fix sporadic issues when determining compiler internals
42- cml1: do_diffconfig: Don't override .config with .config.orig
43- contributor-guide: Remove duplicated words
44- dev-manual: bblock: use warning block instead of attention
45- dev-manual: document how to provide confs from layer.conf
46- dnf: drop python3-iniparse from :term:`DEPENDS` and :term:`RDEPENDS`
47- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
48- doc: Makefile: add support for xelatex
49- doc: Makefile: publish pdf and epub versions too
50- doc: Makefile: remove inkscape, replace by rsvg-convert
51- doc: add a download page for epub and pdf
52- doc: conf.py: add a bitbake_git extlink
53- doc: standards.md: add a section on admonitions
54- doc: sphinx-static: switchers.js.in: do not refer to URL_ROOT anymore
55- dropbear: backport fix for concurrent channel open/close
56- enchant2: fix do_fetch error
57- expat: upgrade to 2.6.4
58- gcc: backport patch to fix an issue with tzdata 2024b
59- ghostscript: upgrade to 10.04.0
60- glibc: stable 2.39 branch updates
61- groff: fix rare build race in hdtbl
62- libgcrypt: Fix building error with '-O2' in sysroot path
63- libpam: drop cracklib from :term:`DEPENDS`
64- libxml-parser-perl: fix do_fetch error
65- llvm: reduce size of -dbg package
66- lttng-ust: backport patch to fix cmake-multiple-shared-libraries build error
67- migration-guides: add release notes for 4.0.23 and 5.0.5
68- ninja: fix build with python 3.13
69- oeqa/runtime/ssh: Fix incorrect timeout fix
70- oeqa/runtime/ssh: Rework ssh timeout
71- oeqa/utils/gitarchive: Return tag name and improve exclude handling
72- package_rpm: Check if file exists before open()
73- package_rpm: restrict rpm to 4 threads
74- package_rpm: use zstd's default compression level
75- poky.conf: bump version for 5.0.6
76- pseudo: Fix envp bug and add posix_spawn wrapper
77- python3-poetry-core: drop python3-six from :term:`RDEPENDS`
78- python3-requests: upgrade to 2.32.2
79- python3-urllib3: upgrade to 2.2.2
80- qemu: upgrade to 8.2.7
81- qemurunner: Clean up serial_lock handling
82- ref-manual: classes: fix bin_package description
83- resulttool: Add --logfile-archive option to store mode
84- resulttool: Allow store to filter to specific revisions
85- resulttool: Clean up repoducible build logs
86- resulttool: Fix passthrough of --all files in store mode
87- resulttool: Handle ltp rawlogs as well as ptest
88- resulttool: Improve repo layout for oeselftest results
89- resulttool: Trim the precision of duration information
90- resulttool: Use single space indentation in json output
91- rootfs: Ensure run-postinsts is not uninstalled for read-only-rootfs-delayed-postinsts
92- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
93- sanity: check for working user namespaces
94- scripts/install-buildtools: Update to 5.0.5
95- selftest/reproducible: Clean up pathnames
96- selftest/reproducible: Drop rawlogs
97- shared-mime-info: drop itstool-native from :term:`DEPENDS`
98- strace: download release tarballs from GitHub
99- systemd-boot: drop intltool-native from :term:`DEPENDS`
100- systemd: drop intltool-native from :term:`DEPENDS`
101- systemd: upgrade to 255.13
102- sysvinit: backport patch for fixing one issue of pidof
103- tcl: skip io-13.6 test case
104- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
105- tune-cortexa32: set tune feature as armv8a
106- tzcode-native: upgrade to 2024b
107- tzdata: upgrade to 2024b
108- uboot-sign: fix concat_dtb arguments
109- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
110- webkitgtk: fix erroneous use of unsuported DEBUG_LEVELFLAG variable
111- wireless-regdb: upgrade to 2024.10.07
112
113
114Known Issues in Yocto-5.0.6
115~~~~~~~~~~~~~~~~~~~~~~~~~~~
116
117- N/A
118
119
120Contributors to Yocto-5.0.6
121~~~~~~~~~~~~~~~~~~~~~~~~~~~
122
123Thanks to the following people who contributed to this release:
124
125- Aleksandar Nikolic
126- Alexander Kanavin
127- Antonin Godard
128- Archana Polampalli
129- Bin Lan
130- Changqing Li
131- Chen Qi
132- Chris Laplante
133- Clayton Casciato
134- Deepthi Hemraj
135- Divya Chellam
136- Florian Kreutzer
137- Gassner, Tobias.ext
138- Guðni Már Gilbert
139- Harish Sadineni
140- Hitendra Prajapati
141- Hongxu Jia
142- Jagadeesh Krishnanjanappa
143- Jiaying Song
144- Jinfeng Wang
145- Joshua Watt
146- Lee Chee Yang
147- Markus Volk
148- Michael Opdenacker
149- Pavel Zhukov
150- Peter Marko
151- Philip Lorenz
152- Randy MacLeod
153- Regis Dargent
154- Richard Purdie
155- Robert Yang
156- Ross Burton
157- Soumya Sambu
158- Steve Sakoman
159- Talel BELHAJSALEM
160- Trevor Gamblin
161- Vijay Anusuri
162- Wang Mingyu
163- Yogita Urade
164
165
166Repositories / Downloads for Yocto-5.0.6
167~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
168
169poky
170
171- Repository Location: :yocto_git:`/poky`
172- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
173- Tag: :yocto_git:`yocto-5.0.6 </poky/log/?h=yocto-5.0.6>`
174- Git Revision: :yocto_git:`2541a8171f91812a4b16e7dc4da0d77d2318a256 </poky/commit/?id=2541a8171f91812a4b16e7dc4da0d77d2318a256>`
175- Release Artefact: poky-2541a8171f91812a4b16e7dc4da0d77d2318a256
176- sha: b77157596ae75d163387a08a317397a57ab8fa6cf4725f28e344fae3f69cca4d
177- Download Locations:
178 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2
179 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2
180
181openembedded-core
182
183- Repository Location: :oe_git:`/openembedded-core`
184- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
185- Tag: :oe_git:`yocto-5.0.6 </openembedded-core/log/?h=yocto-5.0.6>`
186- Git Revision: :oe_git:`336eec6808710f260a5336ca8ca98139a80ccb14 </openembedded-core/commit/?id=336eec6808710f260a5336ca8ca98139a80ccb14>`
187- Release Artefact: oecore-336eec6808710f260a5336ca8ca98139a80ccb14
188- sha: 38c4fa7e7e88c28361c012dd5baabe373e2ec3c8aba6194146768b146192cceb
189- Download Locations:
190 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2
191 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2
192
193meta-mingw
194
195- Repository Location: :yocto_git:`/meta-mingw`
196- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
197- Tag: :yocto_git:`yocto-5.0.6 </meta-mingw/log/?h=yocto-5.0.6>`
198- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
199- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
200- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
201- Download Locations:
202 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
203 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
204
205bitbake
206
207- Repository Location: :oe_git:`/bitbake`
208- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
209- Tag: :oe_git:`yocto-5.0.6 </bitbake/log/?h=yocto-5.0.6>`
210- Git Revision: :oe_git:`f40a3a477d5241b697bf2fb030dd804c1ff5839f </bitbake/commit/?id=f40a3a477d5241b697bf2fb030dd804c1ff5839f>`
211- Release Artefact: bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f
212- sha: dbfc056c7408a5547f624799621ab1261a05685112e0922a88007723b1edbc87
213- Download Locations:
214 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2
215 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2
216
217yocto-docs
218
219- Repository Location: :yocto_git:`/yocto-docs`
220- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
221- Tag: :yocto_git:`yocto-5.0.6 </yocto-docs/log/?h=yocto-5.0.6>`
222- Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>`
223
diff --git a/documentation/migration-guides/release-notes-5.0.7.rst b/documentation/migration-guides/release-notes-5.0.7.rst
new file mode 100644
index 0000000000..1c8a4809a9
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.7.rst
@@ -0,0 +1,331 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.7 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.7
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- avahi: Fix :cve_nist:`2024-52616`
10- binutils: Fix :cve_nist:`2024-53589`
11- ffmpeg: Fix :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368`
12- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
13 :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
14 and :cve_nist:`2024-47835`
15- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
16 :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
17 :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
18 :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
19 :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
20 :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
21- gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`,
22 :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`,
23 :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`,
24 :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`,
25 :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`,
26 :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`,
27 :cve_nist:`2024-47775`, :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778`
28 and :cve_nist:`2024-47834`
29- libarchive: Fix :cve_nist:`2024-20696`
30- libxml2: Fix :cve_nist:`2024-40896`
31- linux-yocto/6.6: Fix :cve_nist:`2024-27059`, :cve_nist:`2024-43098`, :cve_nist:`2024-45828`,
32 :cve_nist:`2024-47141`, :cve_nist:`2024-47143`, :cve_nist:`2024-47704`, :cve_nist:`2024-47809`,
33 :cve_nist:`2024-48873`, :cve_nist:`2024-48875`, :cve_nist:`2024-48881`, :cve_nist:`2024-49863`,
34 :cve_nist:`2024-49864`, :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`,
35 :cve_nist:`2024-49870`, :cve_nist:`2024-49871`, :cve_nist:`2024-49874`, :cve_nist:`2024-49875`,
36 :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`, :cve_nist:`2024-49881`,
37 :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`, :cve_nist:`2024-49886`,
38 :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, :cve_nist:`2024-49894`,
39 :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, :cve_nist:`2024-49901`,
40 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49905`, :cve_nist:`2024-49907`,
41 :cve_nist:`2024-49912`, :cve_nist:`2024-49913`, :cve_nist:`2024-49924`, :cve_nist:`2024-49925`,
42 :cve_nist:`2024-49927`, :cve_nist:`2024-49929`, :cve_nist:`2024-49930`, :cve_nist:`2024-49931`,
43 :cve_nist:`2024-49933`, :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49937`,
44 :cve_nist:`2024-49938`, :cve_nist:`2024-49939`, :cve_nist:`2024-49944`, :cve_nist:`2024-49946`,
45 :cve_nist:`2024-49947`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49950`,
46 :cve_nist:`2024-49951`, :cve_nist:`2024-49952`, :cve_nist:`2024-49953`, :cve_nist:`2024-49954`,
47 :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, :cve_nist:`2024-49959`,
48 :cve_nist:`2024-49960`, :cve_nist:`2024-49961`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`,
49 :cve_nist:`2024-49965`, :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`,
50 :cve_nist:`2024-49975`, :cve_nist:`2024-49976`, :cve_nist:`2024-49977`, :cve_nist:`2024-49978`,
51 :cve_nist:`2024-49980`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
52 :cve_nist:`2024-49985`, :cve_nist:`2024-49986`, :cve_nist:`2024-49987`, :cve_nist:`2024-49988`,
53 :cve_nist:`2024-49989`, :cve_nist:`2024-49991`, :cve_nist:`2024-49992`, :cve_nist:`2024-49995`,
54 :cve_nist:`2024-49996`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`, :cve_nist:`2024-50001`,
55 :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50005`, :cve_nist:`2024-50006`,
56 :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50012`, :cve_nist:`2024-50013`,
57 :cve_nist:`2024-50015`, :cve_nist:`2024-50016`, :cve_nist:`2024-50019`, :cve_nist:`2024-50022`,
58 :cve_nist:`2024-50023`, :cve_nist:`2024-50024`, :cve_nist:`2024-50026`, :cve_nist:`2024-50029`,
59 :cve_nist:`2024-50031`, :cve_nist:`2024-50032`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
60 :cve_nist:`2024-50036`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
61 :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
62 :cve_nist:`2024-50047`, :cve_nist:`2024-50048`, :cve_nist:`2024-50049`, :cve_nist:`2024-50051`,
63 :cve_nist:`2024-50055`, :cve_nist:`2024-50057`, :cve_nist:`2024-50058`, :cve_nist:`2024-50059`,
64 :cve_nist:`2024-50060`, :cve_nist:`2024-50061`, :cve_nist:`2024-50062`, :cve_nist:`2024-50063`,
65 :cve_nist:`2024-50064`, :cve_nist:`2024-50065`, :cve_nist:`2024-50066`, :cve_nist:`2024-50069`,
66 :cve_nist:`2024-50070`, :cve_nist:`2024-50072`, :cve_nist:`2024-50073`, :cve_nist:`2024-50074`,
67 :cve_nist:`2024-50075`, :cve_nist:`2024-50076`, :cve_nist:`2024-50077`, :cve_nist:`2024-50078`,
68 :cve_nist:`2024-50080`, :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50084`,
69 :cve_nist:`2024-50085`, :cve_nist:`2024-50086`, :cve_nist:`2024-50087`, :cve_nist:`2024-50088`,
70 :cve_nist:`2024-50093`, :cve_nist:`2024-50095`, :cve_nist:`2024-50096`, :cve_nist:`2024-50098`,
71 :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`, :cve_nist:`2024-50108`,
72 :cve_nist:`2024-50110`, :cve_nist:`2024-50111`, :cve_nist:`2024-50112`, :cve_nist:`2024-50115`,
73 :cve_nist:`2024-50116`, :cve_nist:`2024-50117`, :cve_nist:`2024-50120`, :cve_nist:`2024-50121`,
74 :cve_nist:`2024-50124`, :cve_nist:`2024-50125`, :cve_nist:`2024-50126`, :cve_nist:`2024-50127`,
75 :cve_nist:`2024-50128`, :cve_nist:`2024-50130`, :cve_nist:`2024-50131`, :cve_nist:`2024-50133`,
76 :cve_nist:`2024-50134`, :cve_nist:`2024-50135`, :cve_nist:`2024-50136`, :cve_nist:`2024-50139`,
77 :cve_nist:`2024-50140`, :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`,
78 :cve_nist:`2024-50145`, :cve_nist:`2024-50147`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`,
79 :cve_nist:`2024-50151`, :cve_nist:`2024-50152`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`,
80 :cve_nist:`2024-50155`, :cve_nist:`2024-50156`, :cve_nist:`2024-50158`, :cve_nist:`2024-50159`,
81 :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`, :cve_nist:`2024-50164`,
82 :cve_nist:`2024-50166`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50169`,
83 :cve_nist:`2024-50170`, :cve_nist:`2024-50171`, :cve_nist:`2024-50172`, :cve_nist:`2024-50175`,
84 :cve_nist:`2024-50176`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`,
85 :cve_nist:`2024-50182`, :cve_nist:`2024-50183`, :cve_nist:`2024-50184`, :cve_nist:`2024-50185`,
86 :cve_nist:`2024-50186`, :cve_nist:`2024-50187`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`,
87 :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
88 :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`,
89 :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`,
90 :cve_nist:`2024-50211`, :cve_nist:`2024-50215`, :cve_nist:`2024-50222`, :cve_nist:`2024-50223`,
91 :cve_nist:`2024-50224`, :cve_nist:`2024-50226`, :cve_nist:`2024-50229`, :cve_nist:`2024-50230`,
92 :cve_nist:`2024-50231`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`,
93 :cve_nist:`2024-50235`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50239`,
94 :cve_nist:`2024-50240`, :cve_nist:`2024-50242`, :cve_nist:`2024-50243`, :cve_nist:`2024-50244`,
95 :cve_nist:`2024-50245`, :cve_nist:`2024-50246`, :cve_nist:`2024-50247`, :cve_nist:`2024-50248`,
96 :cve_nist:`2024-50249`, :cve_nist:`2024-50250`, :cve_nist:`2024-50251`, :cve_nist:`2024-50252`,
97 :cve_nist:`2024-50255`, :cve_nist:`2024-50256`, :cve_nist:`2024-50257`, :cve_nist:`2024-50258`,
98 :cve_nist:`2024-50259`, :cve_nist:`2024-50261`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`,
99 :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`,
100 :cve_nist:`2024-50271`, :cve_nist:`2024-50272`, :cve_nist:`2024-50273`, :cve_nist:`2024-50275`,
101 :cve_nist:`2024-50276`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`,
102 :cve_nist:`2024-50283`, :cve_nist:`2024-50284`, :cve_nist:`2024-50285`, :cve_nist:`2024-50286`,
103 :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50298`,
104 :cve_nist:`2024-50299`, :cve_nist:`2024-50300`, :cve_nist:`2024-50301`, :cve_nist:`2024-50302`,
105 :cve_nist:`2024-53042`, :cve_nist:`2024-53043`, :cve_nist:`2024-53046`, :cve_nist:`2024-53047`,
106 :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`, :cve_nist:`2024-53058`,
107 :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, :cve_nist:`2024-53063`,
108 :cve_nist:`2024-53066`, :cve_nist:`2024-53068`, :cve_nist:`2024-53072`, :cve_nist:`2024-53076`,
109 :cve_nist:`2024-53079`, :cve_nist:`2024-53081`, :cve_nist:`2024-53082`, :cve_nist:`2024-53083`,
110 :cve_nist:`2024-53088`, :cve_nist:`2024-53091`, :cve_nist:`2024-53093`, :cve_nist:`2024-53094`,
111 :cve_nist:`2024-53096`, :cve_nist:`2024-53099`, :cve_nist:`2024-53100`, :cve_nist:`2024-53101`,
112 :cve_nist:`2024-53103`, :cve_nist:`2024-53108`, :cve_nist:`2024-53109`, :cve_nist:`2024-53110`,
113 :cve_nist:`2024-53112`, :cve_nist:`2024-53113`, :cve_nist:`2024-53119`, :cve_nist:`2024-53120`,
114 :cve_nist:`2024-53121`, :cve_nist:`2024-53122`, :cve_nist:`2024-53123`, :cve_nist:`2024-53126`,
115 :cve_nist:`2024-53127`, :cve_nist:`2024-53129`, :cve_nist:`2024-53130`, :cve_nist:`2024-53131`,
116 :cve_nist:`2024-53134`, :cve_nist:`2024-53135`, :cve_nist:`2024-53138`, :cve_nist:`2024-53139`,
117 :cve_nist:`2024-53140`, :cve_nist:`2024-53141`, :cve_nist:`2024-53142`, :cve_nist:`2024-53145`,
118 :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53154`,
119 :cve_nist:`2024-53155`, :cve_nist:`2024-53156`, :cve_nist:`2024-53157`, :cve_nist:`2024-53161`,
120 :cve_nist:`2024-53165`, :cve_nist:`2024-53166`, :cve_nist:`2024-53168`, :cve_nist:`2024-53171`,
121 :cve_nist:`2024-53173`, :cve_nist:`2024-53175`, :cve_nist:`2024-53180`, :cve_nist:`2024-53188`,
122 :cve_nist:`2024-53191`, :cve_nist:`2024-53200`, :cve_nist:`2024-53202`, :cve_nist:`2024-53208`,
123 :cve_nist:`2024-53210`, :cve_nist:`2024-53213`, :cve_nist:`2024-53215`, :cve_nist:`2024-53217`,
124 :cve_nist:`2024-53224`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53230`,
125 :cve_nist:`2024-53231`, :cve_nist:`2024-53237`, :cve_nist:`2024-53239`, :cve_nist:`2024-54683`,
126 :cve_nist:`2024-55916`, :cve_nist:`2024-56369`, :cve_nist:`2024-56538`, :cve_nist:`2024-56551`,
127 :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`,
128 :cve_nist:`2024-56574`, :cve_nist:`2024-56575`, :cve_nist:`2024-56577`, :cve_nist:`2024-56578`,
129 :cve_nist:`2024-56579`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`,
130 :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`,
131 :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56604`,
132 :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56611`, :cve_nist:`2024-56613`,
133 :cve_nist:`2024-56614`, :cve_nist:`2024-56615`, :cve_nist:`2024-56617`, :cve_nist:`2024-56622`,
134 :cve_nist:`2024-56623`, :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56629`,
135 :cve_nist:`2024-56631`, :cve_nist:`2024-56634`, :cve_nist:`2024-56635`, :cve_nist:`2024-56640`,
136 :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`, :cve_nist:`2024-56649`,
137 :cve_nist:`2024-56650`, :cve_nist:`2024-56651`, :cve_nist:`2024-56653`, :cve_nist:`2024-56654`,
138 :cve_nist:`2024-56657`, :cve_nist:`2024-56658`, :cve_nist:`2024-56659`, :cve_nist:`2024-56660`,
139 :cve_nist:`2024-56662`, :cve_nist:`2024-56663`, :cve_nist:`2024-56664`, :cve_nist:`2024-56667`,
140 :cve_nist:`2024-56670`, :cve_nist:`2024-56672`, :cve_nist:`2024-56675`, :cve_nist:`2024-56687`,
141 :cve_nist:`2024-56688`, :cve_nist:`2024-56689`, :cve_nist:`2024-56692`, :cve_nist:`2024-56694`,
142 :cve_nist:`2024-56698`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`, :cve_nist:`2024-56710`,
143 :cve_nist:`2024-56715`, :cve_nist:`2024-56716`, :cve_nist:`2024-56717`, :cve_nist:`2024-56718`,
144 :cve_nist:`2024-56720`, :cve_nist:`2024-56722`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`,
145 :cve_nist:`2024-56725`, :cve_nist:`2024-56726`, :cve_nist:`2024-56727`, :cve_nist:`2024-56728`,
146 :cve_nist:`2024-56729`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56744`,
147 :cve_nist:`2024-56745`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`,
148 :cve_nist:`2024-56751`, :cve_nist:`2024-56752`, :cve_nist:`2024-56754`, :cve_nist:`2024-56755`,
149 :cve_nist:`2024-56756`, :cve_nist:`2024-56760`, :cve_nist:`2024-56763`, :cve_nist:`2024-56765`,
150 :cve_nist:`2024-56767`, :cve_nist:`2024-56769`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`,
151 :cve_nist:`2024-56776`, :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`,
152 :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56783`, :cve_nist:`2024-56785`,
153 :cve_nist:`2024-56786`, :cve_nist:`2024-56787`, :cve_nist:`2024-57798`, :cve_nist:`2024-57807`
154 and :cve_nist:`2024-57874`
155- ofono: Fix :cve_nist:`2023-4232`, :cve_nist:`2023-4235`, :cve_nist:`2024-7539`,
156 :cve_nist:`2024-7540`, :cve_nist:`2024-7541`, :cve_nist:`2024-7542`, :cve_nist:`2024-7543`,
157 :cve_nist:`2024-7544`, :cve_nist:`2024-7545`, :cve_nist:`2024-7546` and :cve_nist:`2024-7547`
158- rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`,
159 :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747`
160- socat: Fix :cve_nist:`2024-54661`
161- subversion: Fix :cve_nist:`2024-46901`
162- wget: Fix :cve_nist:`2024-10524`
163
164
165Fixes in Yocto-5.0.7
166~~~~~~~~~~~~~~~~~~~~
167
168- bitbake: cooker: Make cooker 'skiplist' per-multiconfig/mc
169- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
170- bitbake: ui/knotty: print log paths for failed tasks in summary
171- bitbake: ui/knotty: respect NO_COLOR & check for tty; rename print_hyperlink => format_hyperlink
172- bluez5: Revert "bluez5: remove configuration files from install task"
173- bluez5: backport patch to fix address type when loading keys
174- boost: fix do_fetch error
175- build-appliance-image: Update to scarthgap head revision
176- classes/nativesdk: also override :term:`TUNE_PKGARCH`
177- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
178- contributor-guide/submit-changes.rst: suggest to remove the git signature
179- cve-update-nvd2-native: Handle :term:`BB_NO_NETWORK` and missing db
180- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
181- dev-manual/bmaptool.rst: correct command for bmaptool-native
182- dev-manual/bmaptool.rst: simplify and fix instructions
183- dev-manual: fix styling of references to bmaptool
184- docs: Gather dependencies in poky.yaml.in
185- docs: Update autobuilder URLs to valkyrie
186- docs: Update the documentation for :term:`SRCPV`
187- gcc: Fix c++: tweak for Wrange-loop-construct
188- groff: Fix race issues for parallel build
189- libgfortran: fix buildpath QA issue
190- libxml2: Upgrade to 2.12.9
191- linux-yocto/6.6: bsp/genericarm64: disable ARM64_SME
192- linux-yocto/6.6: genericarm64.cfg: enable CONFIG_DMA_CMA
193- linux-yocto/6.6: update to v6.6.69
194- lttng-modules: fix sched_stat_runtime changed in Linux 6.6.66
195- migration-guides: add release notes for 5.0.6
196- oeqa/ssh: allow to retrieve raw, unformatted ouput
197- ovmf-native: remove .pyc files from install
198- poky.conf: add new tested distros
199- poky.conf: bump version for 5.0.7
200- poky.yaml.in: add missing locales dependency
201- poky.yaml.in: replace inkscape dependency by librsvg2-bin
202- populate_sdk_ext: write_local_conf add shutil import
203- pulseaudio: fix webrtc audio depdency
204- python3-requests: upgrade to 2.32.3
205- python3: Drop empty patch
206- python3: add dependency on -compression to -core
207- python3: upgrade to 3.12.7
208- ref-manual: move runtime-testing section to the test-manual
209- ref-manual: use standardized method accross both ubuntu and debian for locale install
210- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
211- reproducible-builds.rst: show how to build a single package
212- rust-target-config: Fix TARGET_C_INT_WIDTH with correct size
213- rust: Revert "rust: Add new varaible RUST_ENABLE_EXTRA_TOOLS"
214- rust: add reproducibility patch to eliminate host leakage
215- rust: build the default set of tools
216- rust: correctly link rust-snapshot into build/stage0
217- rust: use rust-snapshot binaries only in rust-native
218- sanity.bbclass: skip check_userns for non-local uid
219- scripts/install-buildtools: Update to 5.0.6
220- system-requirements.rst: add dependencies for pdf builds
221- system-requirements: add fedora 39 to supported distros
222- system-requirements: update list of supported distros
223- systemd: enable create-log-dirs
224- test-manual/reproducible-builds: fix reproducible links
225
226
227Known Issues in Yocto-5.0.7
228~~~~~~~~~~~~~~~~~~~~~~~~~~~
229
230- N/A
231
232Contributors to Yocto-5.0.7
233~~~~~~~~~~~~~~~~~~~~~~~~~~~
234
235Thanks to the following people who contributed to this release:
236
237- Aleksandar Nikolic
238- Alexander Kanavin
239- Alexis Lothoré
240- Antonin Godard
241- Archana Polampalli
242- Bruce Ashfield
243- Catalin Popescu
244- Changqing Li
245- Chen Qi
246- Chris Laplante
247- Divya Chellam
248- Esben Haabendal
249- Guénaël Muller
250- Guðni Már Gilbert
251- Harish Sadineni
252- Hiago De Franco
253- Hitendra Prajapati
254- Jiaying Song
255- Khem Raj
256- Lee Chee Yang
257- Mark Hatle
258- Michael Opdenacker
259- Mikko Rapeli
260- Peter Marko
261- Richard Purdie
262- Robert Yang
263- Ross Burton
264- Soumya Sambu
265- Steve Sakoman
266- Sunil Dora
267- Trevor Gamblin
268- Xiangyu Chen
269- Yash Shinde
270- Zhang Peng
271- Zahir Hussain
272
273
274Repositories / Downloads for Yocto-5.0.7
275~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
276
277poky
278
279- Repository Location: :yocto_git:`/poky`
280- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
281- Tag: :yocto_git:`yocto-5.0.7 </poky/log/?h=yocto-5.0.7>`
282- Git Revision: :yocto_git:`7dad83c7e5e9637c0ff5d5712409611fd4a14946 </poky/commit/?id=7dad83c7e5e9637c0ff5d5712409611fd4a14946>`
283- Release Artefact: poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946
284- sha: ae688031b19b88582bb4a76d0525e3704b981ad1d21eb38a0873cd01dd9a4652
285- Download Locations:
286 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2
287 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2
288
289openembedded-core
290
291- Repository Location: :oe_git:`/openembedded-core`
292- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
293- Tag: :oe_git:`yocto-5.0.7 </openembedded-core/log/?h=yocto-5.0.7>`
294- Git Revision: :oe_git:`62cb12967391db709315820d48853ffa4c6b4740 </openembedded-core/commit/?id=62cb12967391db709315820d48853ffa4c6b4740>`
295- Release Artefact: oecore-62cb12967391db709315820d48853ffa4c6b4740
296- sha: bc45429df1805445b678f1b0ed6ce017edfac38c7226dce92ce393b3ef311f95
297- Download Locations:
298 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2
299 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2
300
301meta-mingw
302
303- Repository Location: :yocto_git:`/meta-mingw`
304- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
305- Tag: :yocto_git:`yocto-5.0.7 </meta-mingw/log/?h=yocto-5.0.7>`
306- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
307- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
308- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
309- Download Locations:
310 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
311 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
312
313bitbake
314
315- Repository Location: :oe_git:`/bitbake`
316- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
317- Tag: :oe_git:`yocto-5.0.7 </bitbake/log/?h=yocto-5.0.7>`
318- Git Revision: :oe_git:`aa0e540fc31a1c26839efd2c7785a751ce24ebfb </bitbake/commit/?id=aa0e540fc31a1c26839efd2c7785a751ce24ebfb>`
319- Release Artefact: bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb
320- sha: 169b68ed7d5e55015b1c35a82d35efaa25c87cba4722c85e66514a15d31e1d28
321- Download Locations:
322 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2
323 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2
324
325yocto-docs
326
327- Repository Location: :yocto_git:`/yocto-docs`
328- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
329- Tag: :yocto_git:`yocto-5.0.7 </yocto-docs/log/?h=yocto-5.0.7>`
330- Git Revision: :yocto_git:`bb9e018adcc10c642f87d0b95432783b5eb8057b </yocto-docs/commit/?id=bb9e018adcc10c642f87d0b95432783b5eb8057b>`
331
diff --git a/documentation/migration-guides/release-notes-5.0.8.rst b/documentation/migration-guides/release-notes-5.0.8.rst
new file mode 100644
index 0000000000..5cb8b30246
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.8.rst
@@ -0,0 +1,226 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.8 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.8
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2025-0840`
10- curl: Ignore :cve_nist:`2025-0725`
11- elfutils: Fix :cve_nist:`2025-1352`, :cve_nist:`2025-1365` and :cve_nist:`2025-1372`
12- ffmpeg: Fix :cve_nist:`2024-35365`, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`,
13 :cve_nist:`2024-36616`, :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2024-36619`,
14 :cve_nist:`2025-0518`, :cve_nist:`2025-22919`, :cve_nist:`2025-22921` and :cve_nist:`2025-25473`
15- glibc: Fix :cve_nist:`2025-0395`
16- gnutls: Fix :cve_nist:`2024-12243`
17- go: Fix :cve_nist:`2024-45336`, :cve_nist:`2024-45341` and :cve_nist:`2025-22866`
18- gstreamer1.0-rtsp-server: Fix :cve_nist:`2024-44331`
19- libcap: Fix :cve_nist:`2025-1390`
20- libtasn1: Fix :cve_nist:`2024-12133`
21- libxml2: Fix :cve_nist:`2024-56171` and :cve_nist:`2025-24928`
22- linux-yocto/6.6: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-53179`, :cve_nist:`2024-56582`,
23 :cve_nist:`2024-56703`, :cve_nist:`2024-57801`, :cve_nist:`2024-57802`, :cve_nist:`2024-57841`,
24 :cve_nist:`2024-57882`, :cve_nist:`2024-57887`, :cve_nist:`2024-57890`, :cve_nist:`2024-57892`,
25 :cve_nist:`2024-57895`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`,
26 :cve_nist:`2024-57902`, :cve_nist:`2024-57906`, :cve_nist:`2024-57907`, :cve_nist:`2024-57908`,
27 :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57912`, :cve_nist:`2024-57913`,
28 :cve_nist:`2024-57916`, :cve_nist:`2024-57922`, :cve_nist:`2024-57925`, :cve_nist:`2024-57926`,
29 :cve_nist:`2024-57933`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57940`,
30 :cve_nist:`2024-57949`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21636`,
31 :cve_nist:`2025-21637`, :cve_nist:`2025-21638`, :cve_nist:`2025-21639`, :cve_nist:`2025-21640`,
32 :cve_nist:`2025-21642`, :cve_nist:`2025-21652`, :cve_nist:`2025-21658`, :cve_nist:`2025-21665`,
33 :cve_nist:`2025-21666`, :cve_nist:`2025-21667`, :cve_nist:`2025-21669`, :cve_nist:`2025-21670`,
34 :cve_nist:`2025-21671`, :cve_nist:`2025-21673`, :cve_nist:`2025-21674`, :cve_nist:`2025-21675`,
35 :cve_nist:`2025-21676`, :cve_nist:`2025-21680`, :cve_nist:`2025-21681`, :cve_nist:`2025-21683`,
36 :cve_nist:`2025-21684`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`, :cve_nist:`2025-21690`,
37 :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
38- openssh: Fix :cve_nist:`2025-26466`
39- openssl: Fix :cve_nist:`2024-9143`, :cve_nist:`2024-12797` and :cve_nist:`2024-13176`
40- pyhton3: Fix :cve_nist:`2024-12254` and :cve_nist:`2025-0938`
41- subversion: Ignore :cve_nist:`2024-45720`
42- u-boot: Fix :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`,
43 :cve_nist:`2024-57257`, :cve_nist:`2024-57258` and :cve_nist:`2024-57259`
44- vim: Fix :cve_nist:`2025-22134` and :cve_nist:`2025-24014`
45- xwayland: Fix :cve_nist:`2024-9632`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`,
46 :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`,
47 :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
48
49
50Fixes in Yocto-5.0.8
51~~~~~~~~~~~~~~~~~~~~
52
53- base-files: Drop /bin/sh dependency
54- bind: upgrade to 9.18.33
55- binutils: File name too long causing failure to open temporary head file in dlltool
56- binutils: stable 2.42 branch update
57- bitbake: bblayers/query: Fix using "removeprefix" string method
58- bitbake: bitbake-diffsigs: fix handling when finding only a single sigfile
59- bitbake: data_smart.py: clear expand_cache in _setvar_update_overridevars
60- bitbake: data_smart.py: remove unnecessary ? from __expand_var_regexp__
61- bitbake: data_smart.py: simple clean up
62- build-appliance-image: Update to scarthgap head revision
63- ccache.conf: Add include_file_ctime to sloppiness
64- cmake: apply parallel build settings to ptest tasks
65- contributor-guide/submit-changes: add policy on AI generated code
66- dev-manual/building: document the initramfs-framework recipe
67- devtool: ide-sdk recommend :term:`DEBUG_BUILD`
68- devtool: ide-sdk remove the plugin from eSDK installer
69- devtool: ide-sdk sort cmake preset
70- devtool: modify support debug-builds
71- docs: Add favicon for the documentation html
72- docs: Fix typo in standards.md
73- docs: Remove all mention of core-image-lsb
74- docs: vulnerabilities/classes: remove references to cve-check text format
75- files: Amend overlayfs unit descriptions with path information
76- files: overlayfs-create-dirs: Improve mount unit dependency
77- glibc: stable 2.39 branch updates
78- gnupg: upgrade to 2.4.5
79- go: upgrade 1.22.12
80- icu: remove host references in nativesdk to fix reproducibility
81- libtasn1: upgrade to 4.20.0
82- libxml2: upgrade to 2.12.10
83- linux-yocto/6.6: upgrade to v6.6.75
84- meta: Enable '-o pipefail' for the SDK installer
85- migration-guides: add release notes for 4.0.24, 4.0.25 and 5.0.7
86- oe-selftest: devtool ide-sdk use modify debug-build
87- oeqa/sdk/context: fix for gtk3 test failure during do_testsdk
88- oeqa/selftest/rust: skip on all MIPS platforms
89- openssl: upgrade to 3.2.4
90- pkg-config-native: pick additional search paths from $EXTRA_NATIVE_PKGCONFIG_PATH
91- poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS`
92- poky.conf: bump version for 5.0.8
93- ppp: Revert lock path to /var/lock
94- python3-setuptools-scm: respect GIT_CEILING_DIRECTORIES
95- python3: upgrade to 3.12.9
96- qemu: Do not define sched_attr with glibc >= 2.41
97- ref-manual/faq: add q&a on systemd as default
98- ref-manual: Add missing variable :term:`IMAGE_ROOTFS_MAXSIZE`
99- ref-manual: don't refer to poky-lsb
100- ref-manual: remove OE_IMPORTS
101- rust-common.bbclass: soft assignment for RUSTLIB path
102- rust: fix for rust multilib sdk configuration
103- rust: remove redundant cargo config file
104- scripts/install-buildtools: Update to 5.0.7
105- sdk-manual: extensible.rst: devtool ide-sdk improve
106- sdk-manual: extensible.rst: update devtool ide-sdk
107- selftest/rust: correctly form the PATH environment variable
108- systemd: add libpcre2 as :term:`RRECOMMENDS` if pcre2 is enabled
109- systemd: upgrade to 255.17
110- test-manual/ptest: link to common framework ptest classes
111- tzcode-native: Fix compiler setting from 2023d version
112- tzdata/tzcode-native: upgrade to 2025a
113- u-boot: kernel-fitimage: Fix dependency loop if :term:`UBOOT_SIGN_ENABLE` and UBOOT_ENV enabled
114- u-boot: kernel-fitimage: Restore FIT_SIGN_INDIVIDUAL="1" behavior
115- uboot-config: fix devtool modify with kernel-fitimage
116- vim: upgrade to 9.1.1043
117
118
119Known Issues in Yocto-5.0.8
120~~~~~~~~~~~~~~~~~~~~~~~~~~~
121
122- N/A
123
124Contributors to Yocto-5.0.8
125~~~~~~~~~~~~~~~~~~~~~~~~~~~
126
127Thanks to the following people who contributed to this release:
128
129- Adrian Freihofer
130- Aleksandar Nikolic
131- Alessio Cascone
132- Alexander Kanavin
133- Alexis Cellier
134- Antonin Godard
135- Archana Polampalli
136- Bruce Ashfield
137- Chen Qi
138- Deepesh Varatharajan
139- Divya Chellam
140- Enrico Jörns
141- Esben Haabendal
142- Etienne Cordonnier
143- Fabio Berton
144- Guðni Már Gilbert
145- Harish Sadineni
146- Hitendra Prajapati
147- Hongxu Jia
148- Jiaying Song
149- Joerg Schmidt
150- Johannes Schneider
151- Khem Raj
152- Lee Chee Yang
153- Marek Vasut
154- Marta Rybczynska
155- Moritz Haase
156- Oleksandr Hnatiuk
157- Pedro Ferreira
158- Peter Marko
159- Poonam Jadhav
160- Priyal Doshi
161- Ross Burton
162- Simon A. Eugster
163- Steve Sakoman
164- Vijay Anusuri
165- Wang Mingyu
166- Weisser, Pascal
167
168
169Repositories / Downloads for Yocto-5.0.8
170~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
171
172poky
173
174- Repository Location: :yocto_git:`/poky`
175- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
176- Tag: :yocto_git:`yocto-5.0.8 </poky/log/?h=yocto-5.0.8>`
177- Git Revision: :yocto_git:`dc4827b3660bc1a03a2bc3b0672615b50e9137ff </poky/commit/?id=dc4827b3660bc1a03a2bc3b0672615b50e9137ff>`
178- Release Artefact: poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff
179- sha: ace7264e16e18ed02ef0ad2935fa10b5fad2c4de38b2356f4192b38ef2184504
180- Download Locations:
181 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2
182 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2
183
184openembedded-core
185
186- Repository Location: :oe_git:`/openembedded-core`
187- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
188- Tag: :oe_git:`yocto-5.0.8 </openembedded-core/log/?h=yocto-5.0.8>`
189- Git Revision: :oe_git:`cd2b6080a4c0f2ed2c9939ec0b87763aef595048 </openembedded-core/commit/?id=cd2b6080a4c0f2ed2c9939ec0b87763aef595048>`
190- Release Artefact: oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048
191- sha: 14c7cd5c62a96ceb9c2141164ea0f087fdbaed99ca3e9a722977a3f12d6381f6
192- Download Locations:
193 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2
194 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2
195
196meta-mingw
197
198- Repository Location: :yocto_git:`/meta-mingw`
199- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
200- Tag: :yocto_git:`yocto-5.0.8 </meta-mingw/log/?h=yocto-5.0.8>`
201- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
202- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
203- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
204- Download Locations:
205 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
206 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
207
208bitbake
209
210- Repository Location: :oe_git:`/bitbake`
211- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
212- Tag: :oe_git:`yocto-5.0.8 </bitbake/log/?h=yocto-5.0.8>`
213- Git Revision: :oe_git:`7375d32e8c1af20c51abec4eb3b072b4ca58b239 </bitbake/commit/?id=7375d32e8c1af20c51abec4eb3b072b4ca58b239>`
214- Release Artefact: bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239
215- sha: 13dffbc162c5b6e2c95fa72936a430b9a542d52d81d502a5d0afc592fbf4a16b
216- Download Locations:
217 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2
218 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2
219
220yocto-docs
221
222- Repository Location: :yocto_git:`/yocto-docs`
223- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
224- Tag: :yocto_git:`yocto-5.0.8 </yocto-docs/log/?h=yocto-5.0.8>`
225- Git Revision: :yocto_git:`7d3cce5b962ca9f73b29affceb7ebc6710627739 </yocto-docs/commit/?id=7d3cce5b962ca9f73b29affceb7ebc6710627739>`
226
diff --git a/documentation/migration-guides/release-notes-5.0.9.rst b/documentation/migration-guides/release-notes-5.0.9.rst
new file mode 100644
index 0000000000..81b853cf31
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.9.rst
@@ -0,0 +1,206 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.9 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.9
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2024-57360`, :cve_nist:`2025-1176`, :cve_nist:`2025-1178` and
10 :cve_nist:`2025-1181`
11- expat: Fix :cve_nist:`2024-8176`
12- freetype: Fix :cve_nist:`2025-27363`
13- ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`,
14 :cve_nist:`2025-27833`, :cve_nist:`2025-27833`, :cve_nist:`2025-27834`, :cve_nist:`2025-27835`
15 and :cve_nist:`2025-27836`
16- go: fix :cve_nist:`2025-22870` and :cve_nist:`2025-22871`
17- grub: Fix :cve_nist:`2024-45781`, :cve_nist:`2024-45774`, :cve_nist:`2024-45775`,
18 :cve_nist:`2024-45776`, :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`,
19 :cve_nist:`2024-45780`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`,
20 :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0678`,
21 :cve_nist:`2025-0684`, :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`,
22 :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125`
23- libarchive: Fix :cve_nist:`2024-20696`, :cve_nist:`2024-48957`, :cve_nist:`2024-48958`,
24 :cve_nist:`2025-1632` and :cve_nist:`2025-25724`
25- libxslt: Fix :cve_nist:`2024-24855` and :cve_nist:`2024-55549`
26- linux-yocto/6.6: Fix :cve_nist:`2024-54458`, :cve_nist:`2024-57834`, :cve_nist:`2024-57973`,
27 :cve_nist:`2024-57978`, :cve_nist:`2024-57979`, :cve_nist:`2024-57980`, :cve_nist:`2024-57981`,
28 :cve_nist:`2024-57984`, :cve_nist:`2024-57996`, :cve_nist:`2024-57997`, :cve_nist:`2024-58002`,
29 :cve_nist:`2024-58005`, :cve_nist:`2024-58007`, :cve_nist:`2024-58010`, :cve_nist:`2024-58011`,
30 :cve_nist:`2024-58013`, :cve_nist:`2024-58017`, :cve_nist:`2024-58020`, :cve_nist:`2024-58034`,
31 :cve_nist:`2024-58052`, :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`,
32 :cve_nist:`2024-58068`, :cve_nist:`2024-58069`, :cve_nist:`2024-58070`, :cve_nist:`2024-58071`,
33 :cve_nist:`2024-58076`, :cve_nist:`2024-58080`, :cve_nist:`2024-58083`, :cve_nist:`2024-58088`,
34 :cve_nist:`2025-21700`, :cve_nist:`2025-21703`, :cve_nist:`2025-21707`, :cve_nist:`2025-21711`,
35 :cve_nist:`2025-21715`, :cve_nist:`2025-21716`, :cve_nist:`2025-21718`, :cve_nist:`2025-21726`,
36 :cve_nist:`2025-21727`, :cve_nist:`2025-21731`, :cve_nist:`2025-21735`, :cve_nist:`2025-21736`,
37 :cve_nist:`2025-21741`, :cve_nist:`2025-21742`, :cve_nist:`2025-21743`, :cve_nist:`2025-21744`,
38 :cve_nist:`2025-21745`, :cve_nist:`2025-21748`, :cve_nist:`2025-21749`, :cve_nist:`2025-21753`,
39 :cve_nist:`2025-21756`, :cve_nist:`2025-21759`, :cve_nist:`2025-21760`, :cve_nist:`2025-21761`,
40 :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`, :cve_nist:`2025-21773`,
41 :cve_nist:`2025-21775`, :cve_nist:`2025-21776`, :cve_nist:`2025-21779`, :cve_nist:`2025-21780`,
42 :cve_nist:`2025-21782`, :cve_nist:`2025-21783`, :cve_nist:`2025-21785`, :cve_nist:`2025-21787`,
43 :cve_nist:`2025-21789`, :cve_nist:`2025-21790`, :cve_nist:`2025-21791`, :cve_nist:`2025-21792`,
44 :cve_nist:`2025-21793`, :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21812`,
45 :cve_nist:`2025-21814`, :cve_nist:`2025-21820`, :cve_nist:`2025-21844`, :cve_nist:`2025-21846`,
46 :cve_nist:`2025-21847`, :cve_nist:`2025-21848`, :cve_nist:`2025-21853`, :cve_nist:`2025-21854`,
47 :cve_nist:`2025-21855`, :cve_nist:`2025-21856`, :cve_nist:`2025-21857`, :cve_nist:`2025-21858`,
48 :cve_nist:`2025-21859`, :cve_nist:`2025-21862`, :cve_nist:`2025-21863`, :cve_nist:`2025-21864`,
49 :cve_nist:`2025-21865`, :cve_nist:`2025-21866`, :cve_nist:`2025-21867`, :cve_nist:`2025-21887`,
50 :cve_nist:`2025-21891`, :cve_nist:`2025-21898`, :cve_nist:`2025-21904`, :cve_nist:`2025-21905`,
51 :cve_nist:`2025-21908`, :cve_nist:`2025-21912`, :cve_nist:`2025-21915`, :cve_nist:`2025-21917`,
52 :cve_nist:`2025-21918`, :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`,
53 :cve_nist:`2025-21928`, :cve_nist:`2025-21934`, :cve_nist:`2025-21936`, :cve_nist:`2025-21937`,
54 :cve_nist:`2025-21941`, :cve_nist:`2025-21943`, :cve_nist:`2025-21945`, :cve_nist:`2025-21947`,
55 :cve_nist:`2025-21948`, :cve_nist:`2025-21951`, :cve_nist:`2025-21957`, :cve_nist:`2025-21959`,
56 :cve_nist:`2025-21962`, :cve_nist:`2025-21963`, :cve_nist:`2025-21964`, :cve_nist:`2025-21966`,
57 :cve_nist:`2025-21967`, :cve_nist:`2025-21968`, :cve_nist:`2025-21969`, :cve_nist:`2025-21979`,
58 :cve_nist:`2025-21980`, :cve_nist:`2025-21981`, :cve_nist:`2025-21991` and :cve_nist:`2025-21993`
59- mpg123: Fix :cve_nist:`2024-10573`
60- ofono: Fix :cve_nist:`2024-7537`
61- openssh: Fix :cve_nist:`2025-26465`
62- puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837`
63- qemu: Ignore :cve_nist:`2023-1386`
64- ruby: Fix :cve_nist:`2025-27219` and :cve_nist:`2025-27220`
65- rust-cross-canadian: Ignore :cve_nist:`2024-43402`
66- vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and
67 :cve_nist:`2025-29768`
68- xserver-xorg: Fix :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`,
69 :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`
70 and :cve_nist:`2025-26601`
71- xz: Fix :cve_nist:`2025-31115`
72
73
74Fixes in Yocto-5.0.9
75~~~~~~~~~~~~~~~~~~~~
76
77- babeltrace2: extend to nativesdk
78- babeltrace: extend to nativesdk
79- bitbake: event/utils: Avoid deadlock from lock_timeout() and recursive events
80- bitbake: utils: Add signal blocking for lock_timeout
81- bitbake: utils: Print information about lock issue before exiting
82- bitbake: utils: Tweak lock_timeout logic
83- build-appliance-image: Update to scarthgap head revision
84- cve-check.bbclass: Mitigate symlink related error
85- cve-update-nvd2-native: add workaround for json5 style list
86- cve-update-nvd2-native: handle missing vulnStatus
87- gcc: remove paths to sysroot from configargs.h and checksum-options for gcc-cross-canadian
88- gcc: unify cleanup of include-fixed, apply to cross-canadian
89- ghostscript: upgrade to 10.05.0
90- grub: backport strlcpy function
91- grub: drop obsolete CVE statuses
92- icu: Adjust ICU_DATA_DIR path on big endian targets
93- kernel-arch: add macro-prefix-map in KERNEL_CC
94- libarchive: upgrade to 3.7.9
95- libxslt: upgrade to 1.1.43
96- linux-yocto/6.6: update to v6.6.84
97- mc: set ac_cv_path_ZIP to avoid buildpaths QA issues
98- mpg123: upgrade to 1.32.10
99- nativesdk-libtool: sanitize the script, remove buildpaths
100- openssl: rewrite ptest installation
101- overview-manual/concepts: remove :term:`PR` from the build dir list
102- patch.py: set commituser and commitemail for addNote
103- poky.conf: bump version for 5.0.9
104- vim: Upgrade to 9.1.1198
105- xserver-xf86-config: add a configuration fragment to disable screen blanking
106- xserver-xf86-config: remove obsolete configuration files
107- xserver-xorg: upgrade to 21.1.16
108- xz: upgrade to 5.4.7
109- yocto-uninative: Update to 4.7 for glibc 2.41
110
111
112Known Issues in Yocto-5.0.9
113~~~~~~~~~~~~~~~~~~~~~~~~~~~
114
115- N/A
116
117Contributors to Yocto-5.0.9
118~~~~~~~~~~~~~~~~~~~~~~~~~~~
119
120Thanks to the following people who contributed to this release:
121
122- Antonin Godard
123- Archana Polampalli
124- Ashish Sharma
125- Bruce Ashfield
126- Changqing Li
127- Denys Dmytriyenko
128- Divya Chellam
129- Hitendra Prajapati
130- Madhu Marri
131- Makarios Christakis
132- Martin Jansa
133- Michael Halstead
134- Niko Mauno
135- Oleksandr Hnatiuk
136- Peter Marko
137- Richard Purdie
138- Ross Burton
139- Sana Kazi
140- Stefan Mueller-Klieser
141- Steve Sakoman
142- Vijay Anusuri
143- Virendra Thakur
144- Vishwas Udupa
145- Wang Mingyu
146- Zhang Peng
147
148
149Repositories / Downloads for Yocto-5.0.9
150~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
151
152poky
153
154- Repository Location: :yocto_git:`/poky`
155- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
156- Tag: :yocto_git:`yocto-5.0.9 </poky/log/?h=yocto-5.0.9>`
157- Git Revision: :yocto_git:`bab0f9f62af9af580744948dd3240f648a99879a </poky/commit/?id=bab0f9f62af9af580744948dd3240f648a99879a>`
158- Release Artefact: poky-bab0f9f62af9af580744948dd3240f648a99879a
159- sha: ee6811d9fb6c4913e19d6e3569f1edc8ccd793779b237520596506446a6b4531
160- Download Locations:
161 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2
162 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2
163
164openembedded-core
165
166- Repository Location: :oe_git:`/openembedded-core`
167- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
168- Tag: :oe_git:`yocto-5.0.9 </openembedded-core/log/?h=yocto-5.0.9>`
169- Git Revision: :oe_git:`04038ecd1edd6592b826665a2b787387bb7074fa </openembedded-core/commit/?id=04038ecd1edd6592b826665a2b787387bb7074fa>`
170- Release Artefact: oecore-04038ecd1edd6592b826665a2b787387bb7074fa
171- sha: 6e201a4b486dfbdfcb7e96d83b962a205ec4764db6ad0e34bd623db18910eddb
172- Download Locations:
173 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2
174 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2
175
176meta-mingw
177
178- Repository Location: :yocto_git:`/meta-mingw`
179- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
180- Tag: :yocto_git:`yocto-5.0.9 </meta-mingw/log/?h=yocto-5.0.9>`
181- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
182- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
183- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
184- Download Locations:
185 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
186 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
187
188bitbake
189
190- Repository Location: :oe_git:`/bitbake`
191- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
192- Tag: :oe_git:`yocto-5.0.9 </bitbake/log/?h=yocto-5.0.9>`
193- Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>`
194- Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e
195- sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f
196- Download Locations:
197 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
198 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
199
200yocto-docs
201
202- Repository Location: :yocto_git:`/yocto-docs`
203- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
204- Tag: :yocto_git:`yocto-5.0.9 </yocto-docs/log/?h=yocto-5.0.9>`
205- Git Revision: :yocto_git:`56db4fd81f6235428bef9e46a61c11ca0ba89733 </yocto-docs/commit/?id=56db4fd81f6235428bef9e46a61c11ca0ba89733>`
206
diff --git a/documentation/migration-guides/release-notes-5.0.rst b/documentation/migration-guides/release-notes-5.0.rst
index e5cdd87d1d..de11bd174a 100644
--- a/documentation/migration-guides/release-notes-5.0.rst
+++ b/documentation/migration-guides/release-notes-5.0.rst
@@ -6,61 +6,988 @@ Release notes for 5.0 (scarthgap)
6New Features / Enhancements in 5.0 6New Features / Enhancements in 5.0
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- Linux kernel 6.6, gcc 13.2, glibc 2.39, LLVM 18.1, and over XXX other recipe upgrades 9- Linux kernel 6.6, gcc 13.2, glibc 2.39, LLVM 18.1, and over 300 other recipe upgrades
10 10
11- New variables: 11- New variables:
12 12
13 - :term:`CVE_DB_INCR_UPDATE_AGE_THRES`: Configure the maximum age of the
14 internal CVE database for incremental update (instead of a full
15 redownload).
16
17 - :term:`RPMBUILD_EXTRA_PARAMS`: support extra user-defined fields without
18 crashing the RPM package creation.
19
20 - :term:`OPKG_MAKE_INDEX_EXTRA_PARAMS`: support extra parameters for
21 ``opkg-make-index``.
22
23 - :term:`EFI_UKI_PATH`, :term:`EFI_UKI_DIR`: define the location of UKI
24 image in the EFI System partition.
25
26 - :term:`TARGET_DBGSRC_DIR`: specifies the target path to debug source files
27
28 - :term:`USERADD_DEPENDS`: provides a way to declare dependencies on the users
29 and/or groups created by other recipes, resolving a long-standing build
30 ordering issue
31
13- Architecture-specific enhancements: 32- Architecture-specific enhancements:
14 33
34 - ``genericarm64``: a new :term:`MACHINE` to represent a 64-bit General Arm
35 SystemReady platform.
36
37 - Add Power8 tune to PowerPC architecture.
38
39 - ``arch-armv9``: remove CRC and SVE tunes, since FEAT_CRC32 is now mandatory
40 and SVE/SVE2 are enabled by default in GCC's ``-march=armv9-a``.
41
42 - ``arm/armv*``: add all of the additional Arm tunes in GCC 13.2.0
43
15- Kernel-related enhancements: 44- Kernel-related enhancements:
16 45
46 - The default kernel is the current LTS (6.6).
47
48 - Add support for ``genericarm64``.
49
17- New core recipes: 50- New core recipes:
18 51
52 - `bmaptool <https://github.com/yoctoproject/bmaptool>`__: a tool for
53 creating block maps for files and flashing images, being now under the
54 Yocto Project umbrella.
55
56 - ``core-image-initramfs-boot``: a minimal initramfs image, containing just
57 ``udev`` and ``init``, designed to find the main root filesystem and
58 pivot to it.
59
60 - `lzlib <https://www.nongnu.org/lzip/lzlib.html>`__: a data compression
61 library that provides LZMA compression and decompression functions.
62
63 - `lzop <https://www.lzop.org/>`__: a compression utility based on the LZO
64 library, that was brought back after a (now reverted) removal.
65
66 - `python3-jsonschema-specifications <https://pypi.org/project/jsonschema-specifications/>`__:
67 support files for JSON Schema Specifications (meta-schemas and
68 vocabularies), added as a new dependency of ``python3-jsonschema``.
69
70 - `python3-maturin <https://github.com/pyo3/maturin>`__: a project that
71 allows building and publishing Rust crates as Python packages.
72
73 - `python3-meson-python <https://github.com/mesonbuild/meson-python>`__: a
74 Python build backend that enables the Meson build-system for Python packages.
75
76 - `python3-pyproject-metadata <https://pypi.org/project/pyproject-metadata/>`__:
77 a class to handle PEP 621 metadata, and a dependency for
78 ``python3-meson-python``.
79
80 - `python3-referencing <https://github.com/python-jsonschema/referencing>`__:
81 another dependency of ``python3-jsonschema``, it provides an
82 implementation of JSON reference resolution.
83
84 - `python3-rpds-py <https://pypi.org/project/rpds-py/>`__: Python bindings
85 to the Rust rpds crate, and a runtime dependency for ``python3-referencing``.
86
87 - `python3-sphinxcontrib-jquery <https://pypi.org/project/sphinxcontrib-jquery/>`__:
88 a Sphinx extension to include jQuery on newer Sphinx releases. Recent
89 versions of ``python3-sphinx-rtd-theme`` depend on it.
90
91 - `python3-websockets <https://pypi.org/project/websockets/>`__: a
92 library for building WebSocket servers and clients in Python.
93
94 - `python3-yamllint <https://github.com/adrienverge/yamllint>`__: a linter
95 for YAML files. In U-Boot, the ``binman`` tool uses this linter to verify the
96 configurations at compile time.
97
98 - ``systemd-boot-native``: a UEFI boot manager, this time built as native to
99 provide the ``ukify`` tool.
100
101 - `utfcpp <https://github.com/nemtrif/utfcpp>`__: a C++ library to handle
102 UTF-8 encoded strings. It was added as a dependency for ``taglib`` after
103 its upgrade to v2.0.
104
105 - `vulkan-utility-libraries <https://github.com/KhronosGroup/Vulkan-Utility-Libraries>`__:
106 a set of libraries to share code across various Vulkan repositories.
107
108 - `vulkan-volk <https://github.com/zeux/volk>`__: a meta-loader for Vulkan,
109 needed to support building the latest ``vulkan-tools``.
110
19- QEMU / ``runqemu`` enhancements: 111- QEMU / ``runqemu`` enhancements:
20 112
21 - QEMU has been upgraded to version 8.2.1 113 - QEMU has been upgraded to version 8.2.1
22 114
115 - ``qemuboot``: support predictable network interface names.
116
117 - ``runqemu``: match ".rootfs." in addition to "-image-" for the root
118 filesystem.
119
120 - :ref:`ref-classes-cmake-qemu`: a new class allowing to execute cross-compiled
121 binaries using QEMU user-mode emulation.
122
23- Rust improvements: 123- Rust improvements:
24 124
25 - Rust has been upgraded to version 1.75 125 - Rust has been upgraded to version 1.75
26 126
127 - The Rust profiler (i.e., PGO - Profile-Guided Optimization) options were
128 enabled back.
129
130 - The Rust ``oe-selftest`` were enabled, except for ``mips32`` whose tests
131 are skipped.
132
133 - ``rust-cross-canadian``: added ``riscv64`` to cross-canadian hosts.
134
27- wic Image Creator enhancements: 135- wic Image Creator enhancements:
28 136
137 - Allow the imager's output file extension to match the imager's name,
138 instead of hardcoding it to ``direct`` (i.e., the default imager)
139
140 - For GPT-based disks, add reproducible Disk GUID generation
141
142 - Allow generating reproducible ext4 images
143
144 - Add feature to fill a specific range of a partition with zeros
145
146 - ``bootimg-efi``: add ``install-kernel-into-boot-dir`` parameter to
147 configure kernel installation point(s) (i.e., rootfs and/or boot partition)
148
149 - ``rawcopy``: add support for zstd decompression
150
29- SDK-related improvements: 151- SDK-related improvements:
30 152
153 - ``nativesdk``: let :term:`MACHINE_FEATURES` be set by ``machine-sdk``
154 configuration files.
155
156 - ``nativesdk``: prevent :term:`MACHINE_FEATURES` and :term:`DISTRO_FEATURES`
157 from being backfilled.
158
159 - Support for ``riscv64`` as an SDK host architecture
160
161 - Extend recipes to ``nativesdk``: ``acpica``, ``libpcap``, ``python3-setuptools-rust``
162
31- Testing: 163- Testing:
32 164
165 - Move `patchtest` to the core (as ``scripts/patchtest``, test cases under
166 ``meta/lib/patchtest/tests``) and make a number of improvements to enable
167 it to validate patches submitted on the mailing list again. Additionally,
168 make it work with the original upstream version of
169 `Patchwork <http://jk.ozlabs.org/projects/patchwork/>`__.
170
171 - Add an optional ``unimplemented-ptest`` QA warning to detect upstream
172 packages with tests, that do not use ptest.
173
174 - ``testimage``: retrieve the ptests directory, especially for the logs,
175 upon ptest failure.
176
177 - ``oeqa``, ``oe-selftest``: add test cases for Maturin (SDK and runtime).
178
179 - Proof-of-concept of screenshot-based runtime UI test
180 (``meta/lib/oeqa/runtime/cases/login.py``)
181
182 - Enable ptests for ``python3-attrs``, ``python3-pyyaml``, ``xz``
183
33- Utility script changes: 184- Utility script changes:
34 185
186 - ``oe-init-build-env`` can generate a initial configuration (``.vscode``)
187 for VSCode and its "Yocto Project BitBake" extension.
188
189 - The ``sstate-cache-management`` script has been rewritten in python for better performance and maintainability
190
191 - ``bitbake-layers``: added an option to update the reference of repositories in layer setup
192
35- BitBake improvements: 193- BitBake improvements:
36 194
195 - New ``inherit_defer`` statement which works as
196 :ref:`inherit <bitbake:bitbake-user-manual/bitbake-user-manual-metadata:\`\`inherit\`\` directive>`
197 does, except that it is only evaluated at the end of parsing
198 --- recommended where a conditional expression is used, e.g.::
199
200 inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python3targetconfig', '', d)}
201
202 This allows conditional expressions to be evaluated 'late' meaning changes
203 to the variable after the line is parsed will take effect - with inherit this
204 is not the case.
205
206 - Add support for :term:`BB_LOADFACTOR_MAX`, so Bitbake can stop running
207 extra tasks if the system load is too high, especially in distributions
208 where ``/proc/pressure`` is disabled.
209
210 - ``taskexp_ncurses``: add ncurses version of ``taskexp``, the dependency
211 explorer originally implemented with GTK.
212
213 - Improve ``runqueue`` performance by adding a cache mechanism in
214 ``build_taskdepdata``.
215
216 - ``bitbake.conf``: add ``runtimedir`` to represent the path to the runtime
217 state directory (i.e., ``/run``).
218
219 - Allow to disable colored text output through the
220 `NO_COLOR <https://no-color.org/>`__ environment variable.
221
222 - ``git-make-shallow`` script: add support for Git's ``safe.bareRepository=explicit``
223 configuration setting.
224
225 - Hash equivalence gained a number of scalability improvements including:
226
227 - Support for a wide range of database backends through `SQLAlchemy`
228
229 - Support for hash equivalence server and client to communicate over websockets
230
231 - Support for per-user permissions in the hashserver, and on the client side
232 specifying credentials via the environment or ``.netrc``
233
234 - Add garbage collection to remove unused unihashes from the database.
235
236- devtool improvements:
237
238 - Introduce a new ``ide-sdk`` plugin to generate a configuration to use
239 the eSDK through an IDE.
240
241 - Add ``--no-pypi`` option for Python projects that are not hosted on PyPI.
242
243 - Add support for Git submodules.
244
245 - ``ide``: ``vscode``: generate files from recipe sysroots and debug the
246 root filesystem in read-only mode to avoid confusion.
247
248 - ``modify``: add support for multiple sources in :term:`SRC_URI`.
249
250 - Support plugins within plugins.
251
252- recipetool improvements:
253
254 - ``appendsrcfile(s)``: add a mode to update the recipe itself.
255
256 - ``appendsrcfile(s)``: add ``--dry-run`` mode.
257
258 - ``create``: add handler to create Go recipes.
259
260 - ``create``: improve identification of licenses.
261
262 - ``create``: add support for modern Python PEP-517 build systems including
263 hatchling, maturin, meson-python.
264
265 - ``create``: add PyPi support.
266
267 - ``create``: prefix created Python recipes with ``python3-``.
268
37- Packaging changes: 269- Packaging changes:
38 270
271 - ``package_rpm``: the RPM package compressor's mode can now be overriden.
272
273 - ipk packaging (using ``opkg``) now uses ``zstd`` compression instead of
274 ``xz`` for better compression and performance.
275
39- Security improvements: 276- Security improvements:
40 277
278 - Improve incremental CVE database download from NVD. Rejected CVEs are
279 removed, configuration is kept up-to-date. The age threshold for
280 incremental update can be configured with :term:`CVE_DB_INCR_UPDATE_AGE_THRES`
281 variable.
282
283- Toaster Web UI improvements:
284
285 - Numerous bugfixes, and additional input validation
286
287 - Add `pytest` support and add/update test cases
288
41- Prominent documentation updates: 289- Prominent documentation updates:
42 290
291 - Documentation for using the new ``devtool ide-sdk`` command and features.
292 See :ref:`using_devtool` for details.
293
294 - New ":doc:`bitbake:bitbake-user-manual/bitbake-user-manual-ref-variables-context`"
295 section in the BitBake User Manual.
296
297 - New ``make stylecheck`` command to run `Vale <https://vale.sh>`__,
298 to perform text style checks and comply with text writing standards in
299 the industry.
300
301 - New ``make sphinx-lint`` command to run `sphinx-lint
302 <https://github.com/sphinx-contrib/sphinx-lint>`__. After customization,
303 this will allow us to enforce Sphinx syntax style choices.
304
43- Miscellaneous changes: 305- Miscellaneous changes:
44 306
307 - Systemd's following :term:`PACKAGECONFIG` options were added:
308 ``cryptsetup-plugins``, ``no-ntp-fallback``, and ``p11kit``.
309
310 - New PACKAGECONFIG options added to ``libarchive``, ``libinput``,
311 ``libunwind``, ``mesa``, ``mesa-gl``, ``openssh``, ``perf``,
312 ``python3-pyyaml``, ``qemu``, ``rpm``, ``shadow``, ``strace``,
313 ``syslinux``, ``systemd``, ``vte``, ``webkitgtk``, ``xserver-xorg``.
314
315 - ``systemd-boot`` can, from now on, be compiled as ``native``, thus
316 providing ``ukify`` tool to build UKI images.
317
318 - systemd: split bash completion for ``udevadm`` in a new
319 ``udev-bash-completion`` package.
320
321 - The :ref:`ref-classes-go-vendor` class was added to support offline builds
322 (i.e., vendoring). It can also handle modules from the same repository,
323 taking into account their versions.
324
325 - Disable strace support of bluetooth by default.
326
327 - ``openssh`` now has a systemd service: ``sshd.service``.
328
329 - The :ref:`ref-classes-python_mesonpy` class was added (moved in from
330 ``meta-python``) to support Python package builds using the meson-python
331 PEP-517 build backend.
332
333 - Support for unpacking ``.7z`` archives in :term:`SRC_URI` using ``p7zip``.
334
335 - Add minimal VS Code configuration to avoid VS Code's indexer from choking
336 on build directories.
337
338
45Known Issues in 5.0 339Known Issues in 5.0
46~~~~~~~~~~~~~~~~~~~ 340~~~~~~~~~~~~~~~~~~~
47 341
48- N/A 342- ``gpgme`` has had Python binding support disabled since upstream does not yet support Python 3.12.
343
49 344
50Recipe License changes in 5.0 345Recipe License changes in 5.0
51~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 346~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
52 347
348The following corrections have been made to the :term:`LICENSE` values set by recipes:
349
350- ``elfutils``: split license for libraries & backend and utilities.
351- ``ghostscript``: correct :term:`LICENSE` to ``AGPL-3.0-or-later``.
352- ``kbd``: update license for consolefont and keymaps.
353- ``libsystemd``: set its own :term:`LICENSE` value (``LGPL-2.1-or-later``) to add more granularity.
354- ``libtest-warnings-perl``: update :term:`LICENSE` ``Artistic-1.0`` to ``Artistic-1.0-Perl``.
355- ``linux-firmware``: set package :term:`LICENSE` appropriately for ``carl9170``, ``rockchip`` and ``powerpr``.
356- ``newlib``: add license ``Apache-2.0-with-LLVM-exception``.
357- ``python3-poetry-core``: add license ``BSD-3-Clause`` for ``fastjsonschema``.
358- ``systemd``: make the scope of ``LGPL`` more accurate (``LGPL-2.1`` -> ``LGPL-2.1-or-later``).
359- ``util-linux``: add ``GPL-1.0-or-later`` license for fdisk and ``MIT`` license for ``flock``.
360- ``zstd``: set to dual-licensed ``BSD-3-Clause`` or ``GPL-2.0-only``.
361
53Security Fixes in 5.0 362Security Fixes in 5.0
54~~~~~~~~~~~~~~~~~~~~~ 363~~~~~~~~~~~~~~~~~~~~~
55 364
365- avahi: :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472`, :cve_nist:`2023-38473`
366- bind: :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50387`
367- bluez5: :cve_nist:`2023-45866`
368- coreutils: :cve_nist:`2024-0684`
369- cups: :cve_nist:`2023-4504`
370- curl: :cve_nist:`2023-46218`
371- expat: :cve_nist:`2024-28757`
372- gcc: :cve_nist:`2023-4039`
373- glibc: :cve_nist:`2023-5156`, :cve_nist:`2023-0687`
374- gnutls: :cve_nist:`2024-0553`, :cve_nist:`2024-0567`, :cve_nist:`2024-28834`, :cve_nist:`2024-28835`
375- go: :cve_nist:`2023-45288`
376- grub: :cve_nist:`2023-4692`, :cve_nist:`2023-4693`
377- grub2: :cve_nist:`2023-4001` (ignored), :cve_nist:`2024-1048` (ignored)
378- libgit2: :cve_nist:`2024-24575`, :cve_nist:`2024-24577`
379- libsndfile1: :cve_nist:`2022-33065`
380- libssh2: :cve_nist:`2023-48795`
381- libuv: :cve_nist:`2024-24806`
382- libxml2: :cve_nist:`2023-45322` (ignored)
383- linux-yocto/6.6: :cve_nist:`2020-16119`
384- openssh: :cve_nist:`2023-48795`, :cve_nist:`2023-51384`, :cve_nist:`2023-51385`
385- openssl: :cve_nist:`2023-5363`, :cve_nist:`2023-5678`, :cve_nist:`2023-6129`, :cve_mitre:`2023-6237`, :cve_nist:`2024-0727`, :cve_nist:`2024-2511`
386- perl: :cve_nist:`2023-47100`
387- pixman: :cve_nist:`2023-37769` (ignored)
388- python3-cryptography{-vectors}: :cve_nist:`2023-49083`, :cve_nist:`2024-26130`
389- python3-urllib3: :cve_nist:`2023-45803`
390- shadow: :cve_nist:`2023-4641`
391- sudo: :cve_nist:`2023-42456`
392- tiff: :cve_nist:`2023-6228`, :cve_nist:`2023-6277`, :cve_nist:`2023-52355`, :cve_nist:`2023-52356`
393- vim: :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237`, :cve_nist:`2024-22667`
394- wpa-supplicant: :cve_nist:`2023-52160`
395- xserver-xorg: :cve_nist:`2023-5574`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886`
396- xwayland: :cve_nist:`2023-5367`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886`
397- zlib: :cve_nist:`2023-45853` (ignored), :cve_nist:`2023-6992` (ignored)
398
399
56Recipe Upgrades in 5.0 400Recipe Upgrades in 5.0
57~~~~~~~~~~~~~~~~~~~~~~ 401~~~~~~~~~~~~~~~~~~~~~~
58 402
403- acl 2.3.1 -> 2.3.2
404- acpica 20230628 -> 20240322
405- alsa-lib 1.2.10 -> 1.2.11
406- alsa-tools 1.2.5 -> 1.2.11
407- alsa-ucm-conf 1.2.10 -> 1.2.11
408- alsa-utils 1.2.10 -> 1.2.11
409- appstream 0.16.3 -> 1.0.2
410- autoconf 2.72c -> 2.72e
411- bash 5.2.15 -> 5.2.21
412- bash-completion 2.11 -> 2.12.0
413- binutils 2.41 -> 2.42
414- bluez5 5.69 -> 5.72
415- boost 1.83.0 -> 1.84.0
416- boost-build-native 1.83.0 -> 1.84.0
417- btrfs-tools 6.5.1 -> 6.7.1
418- cairo 1.16.0 -> 1.18.0
419- cargo 1.70.0 -> 1.75.0
420- cargo-c-native 0.9.18 -> 0.9.30+cargo-0.77.0
421- ccache 4.8.3 -> 4.9.1
422- cmake 3.27.7 -> 3.28.3
423- cmake-native 3.27.7 -> 3.28.3
424- createrepo-c 1.0.0 -> 1.0.4
425- cronie 1.6.1 -> 1.7.1
426- cross-localedef-native 2.38+git -> 2.39+git
427- cups 2.4.6 -> 2.4.7
428- curl 8.4.0 -> 8.7.1
429- dbus-wait 0.1+git (6cc6077a36fe…) -> 0.1+git (64bc7c8fae61…)
430- debianutils 5.13 -> 5.16
431- desktop-file-utils 0.26 -> 0.27
432- dhcpcd 10.0.2 -> 10.0.6
433- diffoscope 249 -> 259
434- diffstat 1.65 -> 1.66
435- dnf 4.17.0 -> 4.19.0
436- dos2unix 7.5.1 -> 7.5.2
437- ed 1.19 -> 1.20.1
438- efivar 38+39+git -> 39+39+git
439- elfutils 0.189 -> 0.191
440- ell 0.60 -> 0.63
441- enchant2 2.6.2 -> 2.6.7
442- epiphany 44.6 -> 46.0
443- erofs-utils 1.6 -> 1.7.1
444- ethtool 6.5 -> 6.7
445- eudev 3.2.12 -> 3.2.14
446- expat 2.5.0 -> 2.6.2
447- ffmpeg 6.0 -> 6.1.1
448- fontconfig 2.14.2 -> 2.15.0
449- gawk 5.2.2 -> 5.3.0
450- gcr 4.1.0 -> 4.2.0
451- gdb 13.2 -> 14.2
452- gettext 0.22 -> 0.22.5
453- gettext-minimal-native 0.22 -> 0.22.5
454- gi-docgen 2023.1 -> 2023.3
455- git 2.42.0 -> 2.44.0
456- glib-2.0 2.78.3 -> 2.78.4
457- glib-networking 2.76.1 -> 2.78.1
458- glibc 2.38+git -> 2.39+git
459- glibc-locale 2.38 -> 2.39+git
460- glibc-mtrace 2.38 -> 2.39+git
461- glibc-scripts 2.38 -> 2.39+git
462- glibc-testsuite 2.38+git -> 2.39+git
463- glibc-y2038-tests 2.38+git -> 2.39+git
464- glslang 1.3.261.1 -> 1.3.275.0
465- gnu-config 20230216+git -> 20240101+git
466- gnupg 2.4.3 -> 2.4.4
467- gnutls 3.8.3 -> 3.8.4
468- go 1.20.12 -> 1.22.2
469- go-binary-native 1.20.12 -> 1.22.2
470- go-native 1.20.12 -> 1.22.2
471- go-runtime 1.20.12 -> 1.22.2
472- gpgme 1.22.0 -> 1.23.2
473- grub 2.06 -> 2.12
474- grub-efi 2.06 -> 2.12
475- gsettings-desktop-schemas 44.0 -> 46.0
476- gst-devtools 1.22.9 -> 1.22.11
477- gstreamer1.0 1.22.9 -> 1.22.11
478- gstreamer1.0-libav 1.22.9 -> 1.22.11
479- gstreamer1.0-omx 1.22.9 -> 1.22.11
480- gstreamer1.0-plugins-bad 1.22.9 -> 1.22.11
481- gstreamer1.0-plugins-base 1.22.9 -> 1.22.11
482- gstreamer1.0-plugins-good 1.22.9 -> 1.22.11
483- gstreamer1.0-plugins-ugly 1.22.9 -> 1.22.11
484- gstreamer1.0-python 1.22.9 -> 1.22.11
485- gstreamer1.0-rtsp-server 1.22.9 -> 1.22.11
486- gstreamer1.0-vaapi 1.22.9 -> 1.22.11
487- gtk+3 3.24.38 -> 3.24.41
488- gtk4 4.12.3 -> 4.14.1
489- harfbuzz 8.2.2 -> 8.3.0
490- hwlatdetect 2.5 -> 2.6
491- icu 73-2 -> 74-1
492- inetutils 2.4 -> 2.5
493- init-system-helpers 1.65.2 -> 1.66
494- iproute2 6.5.0 -> 6.7.0
495- iptables 1.8.9 -> 1.8.10
496- iputils 20221126 -> 20240117
497- iso-codes 4.15.0 -> 4.16.0
498- iw 5.19 -> 6.7
499- json-glib 1.6.6 -> 1.8.0
500- kbd 2.6.3 -> 2.6.4
501- kexec-tools 2.0.27 -> 2.0.28
502- kmod 30 -> 31
503- kmscube git -> 0.0.1+git
504- libadwaita 1.4.2 -> 1.5.0
505- libbsd 0.11.7 -> 0.12.1
506- libcap-ng 0.8.3 -> 0.8.4
507- libcap-ng-python 0.8.3 -> 0.8.4
508- libcomps 0.1.19 -> 0.1.20
509- libdnf 0.71.0 -> 0.73.0
510- libdrm 2.4.116 -> 2.4.120
511- libffi 3.4.4 -> 3.4.6
512- libgit2 1.7.1 -> 1.7.2
513- libgloss 4.3.0+git -> 4.4.0+git
514- libgpg-error 1.47 -> 1.48
515- libhandy 1.8.2 -> 1.8.3
516- libical 3.0.16 -> 3.0.17
517- libidn2 2.3.4 -> 2.3.7
518- libinput 1.24.0 -> 1.25.0
519- libksba 1.6.4 -> 1.6.6
520- libmicrohttpd 0.9.77 -> 1.0.1
521- libnl 3.8.0 -> 3.9.0
522- libnotify 0.8.2 -> 0.8.3
523- libpciaccess 0.17 -> 0.18
524- libpcre2 10.42 -> 10.43
525- libpng 1.6.40 -> 1.6.42
526- libproxy 0.5.3 -> 0.5.4
527- libpsl 0.21.2 -> 0.21.5
528- librepo 1.16.0 -> 1.17.0
529- librsvg 2.56.3 -> 2.57.1
530- libsdl2 2.28.4 -> 2.30.0
531- libseccomp 2.5.4 -> 2.5.5
532- libsecret 0.21.1 -> 0.21.4
533- libsolv 0.7.26 -> 0.7.28
534- libsoup 3.4.2 -> 3.4.4
535- libstd-rs 1.70.0 -> 1.75.0
536- libtest-warnings-perl 0.031 -> 0.033
537- libtirpc 1.3.3 -> 1.3.4
538- libubootenv 0.3.4 -> 0.3.5
539- libunistring 1.1 -> 1.2
540- liburi-perl 5.21 -> 5.27
541- libusb1 1.0.26 -> 1.0.27
542- libuv 1.46.0 -> 1.48.0
543- libva 2.19.0 -> 2.20.0
544- libva-initial 2.19.0 -> 2.20.0
545- libwpe 1.14.1 -> 1.14.2
546- libxext 1.3.5 -> 1.3.6
547- libxkbcommon 1.5.0 -> 1.6.0
548- libxkbfile 1.1.2 -> 1.1.3
549- libxml-parser-perl 2.46 -> 2.47
550- libxml2 2.11.7 -> 2.12.5
551- libxmlb 0.3.14 -> 0.3.15
552- libxrandr 1.5.3 -> 1.5.4
553- libxvmc 1.0.13 -> 1.0.14
554- lighttpd 1.4.71 -> 1.4.74
555- linux-firmware 20240220 -> 20240312
556- linux-libc-headers 6.5 -> 6.6
557- linux-yocto 6.1.78+git, 6.5.13+git -> 6.6.23+git
558- linux-yocto-dev 6.6+git -> 6.9+git
559- linux-yocto-rt 6.1.78+git, 6.5.13+git -> 6.6.23+git
560- linux-yocto-tiny 6.1.78+git, 6.5.13+git -> 6.6.23+git
561- llvm 17.0.3 -> 18.1.3
562- lsof 4.98.0 -> 4.99.3
563- ltp 20230516 -> 20240129
564- lttng-modules 2.13.10 -> 2.13.12
565- lttng-ust 2.13.6 -> 2.13.7
566- lzip 1.23 -> 1.24
567- makedepend 1.0.8 -> 1.0.9
568- man-db 2.11.2 -> 2.12.0
569- man-pages 6.05.01 -> 6.06
570- mc 4.8.30 -> 4.8.31
571- mesa 23.2.1 -> 24.0.2
572- mesa-gl 23.2.1 -> 24.0.2
573- meson 1.2.2 -> 1.3.1
574- minicom 2.8 -> 2.9
575- mmc-utils 0.1+git (613495ecaca9…) -> 0.1+git (b5ca140312d2…)
576- mpg123 1.31.3 -> 1.32.5
577- newlib 4.3.0+git -> 4.4.0+git
578- nghttp2 1.57.0 -> 1.61.0
579- numactl 2.0.16 -> 2.0.18
580- ofono 2.1 -> 2.4
581- opensbi 1.2 -> 1.4
582- openssh 9.5p1 -> 9.6p1
583- openssl 3.1.5 -> 3.2.1
584- opkg 0.6.2 -> 0.6.3
585- opkg-utils 0.6.2 -> 0.6.3
586- orc 0.4.34 -> 0.4.38
587- ovmf edk2-stable202308 -> edk2-stable202402
588- p11-kit 0.25.0 -> 0.25.3
589- pango 1.51.0 -> 1.52.0
590- pciutils 3.10.0 -> 3.11.1
591- piglit 1.0+gitr (71c21b1157c4…) -> 1.0+gitr (22eaf6a91cfd…)
592- pkgconf 2.0.3 -> 2.1.1
593- psplash 0.1+git (44afb7506d43…) -> 0.1+git (ecc191375669…)
594- ptest-runner 2.4.2+git -> 2.4.3+git
595- pulseaudio 16.1 -> 17.0
596- puzzles 0.0+git (2d9e414ee316…) -> 0.0+git (80aac3104096…)
597- python3 3.11.5 -> 3.12.3
598- python3-alabaster 0.7.13 -> 0.7.16
599- python3-attrs 23.1.0 -> 23.2.0
600- python3-babel 2.12.1 -> 2.14.0
601- python3-bcrypt 4.0.1 -> 4.1.2
602- python3-beartype 0.15.0 -> 0.17.2
603- python3-build 1.0.3 -> 1.1.1
604- python3-certifi 2023.7.22 -> 2024.2.2
605- python3-cffi 1.15.1 -> 1.16.0
606- python3-cryptography 41.0.4 -> 42.0.5
607- python3-cryptography-vectors 41.0.4 -> 42.0.5
608- python3-cython 0.29.36 -> 3.0.8
609- python3-dbusmock 0.29.1 -> 0.31.1
610- python3-dtschema 2023.7 -> 2024.2
611- python3-git 3.1.36 -> 3.1.42
612- python3-gitdb 4.0.10 -> 4.0.11
613- python3-hatch-fancy-pypi-readme 23.1.0 -> 24.1.0
614- python3-hatch-vcs 0.3.0 -> 0.4.0
615- python3-hatchling 1.18.0 -> 1.21.1
616- python3-hypothesis 6.86.2 -> 6.98.15
617- python3-idna 3.4 -> 3.6
618- python3-importlib-metadata 6.8.0 -> 7.0.1
619- python3-iso8601 2.0.0 -> 2.1.0
620- python3-jsonschema 4.17.3 -> 4.21.1
621- python3-license-expression 30.1.1 -> 30.2.0
622- python3-lxml 4.9.3 -> 5.0.0
623- python3-mako 1.2.4 -> 1.3.2
624- python3-markdown 3.4.4 -> 3.5.2
625- python3-markupsafe 2.1.3 -> 2.1.5
626- python3-more-itertools 10.1.0 -> 10.2.0
627- python3-numpy 1.26.0 -> 1.26.4
628- python3-packaging 23.1 -> 23.2
629- python3-pathspec 0.11.2 -> 0.12.1
630- python3-pbr 5.11.1 -> 6.0.0
631- python3-pip 23.2.1 -> 24.0
632- python3-pluggy 1.3.0 -> 1.4.0
633- python3-poetry-core 1.7.0 -> 1.9.0
634- python3-psutil 5.9.5 -> 5.9.8
635- python3-pyasn1 0.5.0 -> 0.5.1
636- python3-pycairo 1.24.0 -> 1.26.0
637- python3-pycryptodome 3.19.0 -> 3.20.0
638- python3-pycryptodomex 3.19.0 -> 3.20.0
639- python3-pygments 2.16.1 -> 2.17.2
640- python3-pyopenssl 23.2.0 -> 24.0.0
641- python3-pyrsistent 0.19.3 -> 0.20.0
642- python3-pytest 7.4.2 -> 8.0.2
643- python3-pytest-runner 6.0.0 -> 6.0.1
644- python3-pytz 2023.3 -> 2024.1
645- python3-ruamel-yaml 0.17.32 -> 0.18.6
646- python3-scons 4.5.2 -> 4.6.0
647- python3-setuptools 68.2.2 -> 69.1.1
648- python3-setuptools-rust 1.7.0 -> 1.9.0
649- python3-setuptools-scm 7.1.0 -> 8.0.4
650- python3-spdx-tools 0.8.1 -> 0.8.2
651- python3-sphinx-rtd-theme 1.3.0 -> 2.0.0
652- python3-sphinxcontrib-applehelp 1.0.4 -> 1.0.8
653- python3-sphinxcontrib-devhelp 1.0.2 -> 1.0.6
654- python3-sphinxcontrib-htmlhelp 2.0.1 -> 2.0.5
655- python3-sphinxcontrib-qthelp 1.0.3 -> 1.0.7
656- python3-sphinxcontrib-serializinghtml 1.1.5 -> 1.1.10
657- python3-subunit 1.4.2 -> 1.4.4
658- python3-testtools 2.6.0 -> 2.7.1
659- python3-trove-classifiers 2023.9.19 -> 2024.2.23
660- python3-typing-extensions 4.8.0 -> 4.10.0
661- python3-unittest-automake-output 0.1 -> 0.2
662- python3-urllib3 2.0.7 -> 2.2.1
663- python3-wcwidth 0.2.6 -> 0.2.13
664- python3-wheel 0.41.2 -> 0.42.0
665- qemu 8.1.4 -> 8.2.1
666- qemu-native 8.1.4 -> 8.2.1
667- qemu-system-native 8.1.4 -> 8.2.1
668- repo 2.36.1 -> 2.42
669- resolvconf 1.91 -> 1.92
670- rpm 4.18.1 -> 4.19.1
671- rt-tests 2.5 -> 2.6
672- rust 1.70.0 -> 1.75.0
673- rust-cross-canadian 1.70.0 -> 1.75.0
674- rust-llvm 1.70.0 -> 1.75.0
675- shaderc 2023.6 -> 2023.8
676- shadow 4.13 -> 4.14.2
677- shared-mime-info 2.2 -> 2.4
678- socat 1.7.4.4 -> 1.8.0.0
679- spirv-headers 1.3.261.1 -> 1.3.275.0
680- spirv-tools 1.3.261.1 -> 1.3.275.0
681- sqlite3 3.43.2 -> 3.45.1
682- strace 6.5 -> 6.7
683- stress-ng 0.16.05 -> 0.17.05
684- subversion 1.14.2 -> 1.14.3
685- swig 4.1.1 -> 4.2.1
686- sysstat 12.7.4 -> 12.7.5
687- systemd 254.4 -> 255.4
688- systemd-boot 254.4 -> 255.4
689- systemd-bootchart 234 -> 235
690- systemtap 4.9 -> 5.0
691- systemtap-native 4.9 -> 5.0
692- taglib 1.13.1 -> 2.0
693- ttyrun 2.29.0 -> 2.31.0
694- u-boot 2023.10 -> 2024.01
695- u-boot-tools 2023.10 -> 2024.01
696- update-rc.d 0.8 (8636cf478d42…) -> 0.8 (b8f950105010…)
697- usbutils 015 -> 017
698- util-linux 2.39.2 -> 2.39.3
699- util-linux-libuuid 2.39.2 -> 2.39.3
700- vala 0.56.13 -> 0.56.15
701- valgrind 3.21.0 -> 3.22.0
702- vim 9.0.2190 -> 9.1.0114
703- vim-tiny 9.0.2190 -> 9.1.0114
704- virglrenderer 0.10.4 -> 1.0.1
705- vte 0.72.2 -> 0.74.2
706- vulkan-headers 1.3.261.1 -> 1.3.275.0
707- vulkan-loader 1.3.261.1 -> 1.3.275.0
708- vulkan-tools 1.3.261.1 -> 1.3.275.0
709- vulkan-validation-layers 1.3.261.1 -> 1.3.275.0
710- wayland-protocols 1.32 -> 1.33
711- webkitgtk 2.40.5 -> 2.44.0
712- weston 12.0.2 -> 13.0.0
713- xkbcomp 1.4.6 -> 1.4.7
714- xkeyboard-config 2.39 -> 2.41
715- xprop 1.2.6 -> 1.2.7
716- xwayland 23.2.4 -> 23.2.5
717- xz 5.4.4 -> 5.4.6
718- zlib 1.3 -> 1.3.1
719
720
59Contributors to 5.0 721Contributors to 5.0
60~~~~~~~~~~~~~~~~~~~ 722~~~~~~~~~~~~~~~~~~~
61 723
62Thanks to the following people who contributed to this release: 724Thanks to the following people who contributed to this release:
63 725
726- Adam Johnston
727- Adithya Balakumar
728- Adrian Freihofer
729- Alassane Yattara
730- Alejandro Hernandez Samaniego
731- Aleksey Smirnov
732- Alexander Kanavin
733- Alexander Lussier-Cullen
734- Alexander Sverdlin
735- Alexandre Belloni
736- Alexandre Truong
737- Alex Bennée
738- Alexis Lothoré
739- Alex Kiernan
740- Alex Stewart
741- André Draszik
742- Anibal Limon
743- Anuj Mittal
744- Archana Polampalli
745- Arne Schwerdt
746- Bartosz Golaszewski
747- Baruch Siach
748- Bastian Krause
749- BELHADJ SALEM Talel
750- BELOUARGA Mohamed
751- Bruce Ashfield
752- Changhyeok Bae
753- Changqing Li
754- Charlie Johnston
755- Chen Qi
756- Chi Xu
757- Chris Laplante
758- Christian Taedcke
759- Christoph Vogtländer
760- Claus Stovgaard
761- Clay Chang
762- Clément Péron
763- Colin McAllister
764- Corentin Guillevic
765- Daniel Ammann
766- david d zuhn
767- David Reyna
768- Deepthi Hemraj
769- Denys Dmytriyenko
770- Derek Erdmann
771- Desone Burns
772- Dhairya Nagodra
773- Dmitry Baryshkov
774- Eero Aaltonen
775- Eilís 'pidge' Ní Fhlannagáin
776- Emil Kronborg
777- Enguerrand de Ribaucourt
778- Enrico Jörns
779- Enrico Scholz
780- Etienne Cordonnier
781- Fabien Mahot
782- Fabio Estevam
783- Fahad Arslan
784- Felix Moessbauer
785- Florian Wickert
786- Geoff Parker
787- Glenn Strauss
788- Harish Sadineni
789- Hongxu Jia
790- Ilya A. Kriveshko
791- Jamin Lin
792- Jan Vermaete
793- Jason Andryuk
794- Javier Tia
795- Jeremy A. Puhlman
796- Jérémy Rosen
797- Jermain Horsman
798- Jiang Kai
799- Joakim Tjernlund
800- Joao Marcos Costa
801- Joe Slater
802- Johan Bezem
803- Johannes Schneider
804- Jonathan GUILLOT
805- Jon Mason
806- Jörg Sommer
807- Jose Quaresma
808- Joshua Watt
809- Julien Stephan
810- Justin Bronder
811- Kai Kang
812- Kareem Zarka
813- Kevin Hao
814- Khem Raj
815- Konrad Weihmann
816- Lee Chee Yang
817- Lei Maohui
818- lixiaoyong
819- Logan Gunthorpe
820- Luca Ceresoli
821- luca fancellu
822- Lucas Stach
823- Ludovic Jozeau
824- Lukas Funke
825- Maanya Goenka
826- Malte Schmidt
827- Marcel Ziswiler
828- Marco Felsch
829- Marcus Folkesson
830- Marek Vasut
831- Mark Asselstine
832- Mark Hatle
833- Markus Fuchs
834- Markus Volk
835- Marlon Rodriguez Garcia
836- Marta Rybczynska
837- Martin Hundebøll
838- Martin Jansa
839- Massimiliano Minella
840- Maxin B. John
841- Max Krummenacher
842- Meenali Gupta
843- Michael Halstead
844- Michael Opdenacker
845- Michal Sieron
846- Mikko Rapeli
847- Ming Liu
848- Mingli Yu
849- Munehisa Kamata
850- Nick Owens
851- Niko Mauno
852- Ola x Nilsson
853- Oleh Matiusha
854- Patrick Williams
855- Paul Barker
856- Paul Eggleton
857- Paul Gortmaker
858- Pavel Zhukov
859- Peter A. Bigot
860- Peter Kjellerstedt
861- Peter Marko
862- Petr Vorel
863- Philip Balister
864- Philip Lorenz
865- Philippe Rivest
866- Piotr Łobacz
867- Priyal Doshi
868- Quentin Schulz
869- Ragesh Nair
870- Randolph Sapp
871- Randy MacLeod
872- Rasmus Villemoes
873- Renat Khalikov
874- Richard Haar
875- Richard Purdie
876- Robert Berger
877- Robert Joslyn
878- Robert P. J. Day
879- Robert Yang
880- Rodrigo M. Duarte
881- Ross Burton
882- Rouven Czerwinski
883- Ryan Eatmon
884- Sam Van Den Berge
885- Saul Wold
886- Sava Jakovljev
887- Sean Nyekjaer
888- Sergei Zhmylev
889- Shinji Matsunaga
890- Shubham Kulkarni
891- Simone Weiß
892- Siong W.LIM
893- Soumya Sambu
894- Sourav Kumar Pramanik
895- Stefan Herbrechtsmeier
896- Stéphane Veyret
897- Steve Sakoman
898- Sundeep KOKKONDA
899- Thomas Perrot
900- Thomas Wolber
901- Timon Bergelt
902- Tim Orling
903- Timotheus Giuliani
904- Tobias Hagelborn
905- Tom Hochstein
906- Tom Rini
907- Toni Lammi
908- Trevor Gamblin
909- Trevor Woerner
910- Ulrich Ölmann
911- Valek Andrej
912- venkata pyla
913- Victor Kamensky
914- Vijay Anusuri
915- Vikas Katariya
916- Vincent Davis Jr
917- Viswanath Kraleti
918- Vyacheslav Yurkov
919- Wang Mingyu
920- William A. Kennington III
921- William Hauser
922- William Lyu
923- Xiangyu Chen
924- Xiaotian Wu
925- Yang Xu
926- Yannick Rodriguez
927- Yash Shinde
928- Yi Zhao
929- Yoann Congal
930- Yogesh Tyagi
931- Yogita Urade
932- Zahir Hussain
933- Zang Ruochen
934- Zoltan Boszormenyi
935
64Repositories / Downloads for Yocto-5.0 936Repositories / Downloads for Yocto-5.0
65~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 937~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
66 938
939poky
940
941- Repository Location: :yocto_git:`/poky`
942- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
943- Tag: :yocto_git:`yocto-5.0 </poky/log/?h=yocto-5.0>`
944- Git Revision: :yocto_git:`fb91a49387cfb0c8d48303bb3354325ba2a05587 </poky/commit/?id=fb91a49387cfb0c8d48303bb3354325ba2a05587>`
945- Release Artefact: poky-fb91a49387cfb0c8d48303bb3354325ba2a05587
946- sha: 8a0dff4b677b9414ab814ed35d1880196123732ea16ab2fafa388bcc509b32ab
947- Download Locations:
948 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0/poky-fb91a49387cfb0c8d48303bb3354325ba2a05587.tar.bz2
949 http://mirrors.kernel.org/yocto/yocto/yocto-5.0/poky-fb91a49387cfb0c8d48303bb3354325ba2a05587.tar.bz2
950
951openembedded-core
952
953- Repository Location: :oe_git:`/openembedded-core`
954- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
955- Tag: :oe_git:`yocto-5.0 </openembedded-core/log/?h=yocto-5.0>`
956- Git Revision: :oe_git:`b65b4e5a8e4473d8ca43835ba17bc8bd4bdca277 </openembedded-core/commit/?id=b65b4e5a8e4473d8ca43835ba17bc8bd4bdca277>`
957- Release Artefact: oecore-b65b4e5a8e4473d8ca43835ba17bc8bd4bdca277
958- sha: c7fd05d1a00c70acba2540e60dce01a1bdc4701ebff9a808784960240c69261d
959- Download Locations:
960 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0/oecore-b65b4e5a8e4473d8ca43835ba17bc8bd4bdca277.tar.bz2
961 http://mirrors.kernel.org/yocto/yocto/yocto-5.0/oecore-b65b4e5a8e4473d8ca43835ba17bc8bd4bdca277.tar.bz2
962
963meta-mingw
964
965- Repository Location: :yocto_git:`/meta-mingw`
966- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
967- Tag: :yocto_git:`yocto-5.0 </meta-mingw/log/?h=yocto-5.0>`
968- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
969- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
970- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
971- Download Locations:
972 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
973 http://mirrors.kernel.org/yocto/yocto/yocto-5.0/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
974
975bitbake
976
977- Repository Location: :oe_git:`/bitbake`
978- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
979- Tag: :oe_git:`yocto-5.0 </bitbake/log/?h=yocto-5.0>`
980- Git Revision: :oe_git:`c86466d51e8ff14e57a734c1eec5bb651fdc73ef </bitbake/commit/?id=c86466d51e8ff14e57a734c1eec5bb651fdc73ef>`
981- Release Artefact: bitbake-c86466d51e8ff14e57a734c1eec5bb651fdc73ef
982- sha: 45c91294c1fa5a0044f1bb72a9bb69456bb458747114115af85c7664bf672d48
983- Download Locations:
984 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0/bitbake-c86466d51e8ff14e57a734c1eec5bb651fdc73ef.tar.bz2
985 http://mirrors.kernel.org/yocto/yocto/yocto-5.0/bitbake-c86466d51e8ff14e57a734c1eec5bb651fdc73ef.tar.bz2
986
987yocto-docs
988
989- Repository Location: :yocto_git:`/yocto-docs`
990- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
991- Tag: :yocto_git:`yocto-5.0 </yocto-docs/log/?h=yocto-5.0>`
992- Git Revision: :yocto_git:`0cdc0afd3332459d30cfc8f4c2e62bdcc23f5ed5 </yocto-docs/commit/?id=0cdc0afd3332459d30cfc8f4c2e62bdcc23f5ed5>`
993
diff --git a/documentation/migration-guides/release-notes-5.1.1.rst b/documentation/migration-guides/release-notes-5.1.1.rst
new file mode 100644
index 0000000000..32488a9735
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.1.1.rst
@@ -0,0 +1,289 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.1.1 (Styhead)
4---------------------------------------
5
6Security Fixes in Yocto-5.1.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- go: Fix :cve_nist:`2024-34155`, :cve_nist:`2024-34156` and :cve_nist:`2024-34158`
10- linux-yocto/6.6: Fix :cve_nist:`2023-52917`, :cve_nist:`2024-46735`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46741`, :cve_nist:`2024-46742`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46749`, :cve_nist:`2024-46750`, :cve_nist:`2024-46755`, :cve_nist:`2024-46756`, :cve_nist:`2024-46757`, :cve_nist:`2024-46758`, :cve_nist:`2024-46759`, :cve_nist:`2024-46760`, :cve_nist:`2024-46761`, :cve_nist:`2024-46762`, :cve_nist:`2024-46763`, :cve_nist:`2024-46765`, :cve_nist:`2024-46768`, :cve_nist:`2024-46770`, :cve_nist:`2024-46771`, :cve_nist:`2024-46773`, :cve_nist:`2024-46776`, :cve_nist:`2024-46777`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46784`, :cve_nist:`2024-46785`, :cve_nist:`2024-46786`, :cve_nist:`2024-46787`, :cve_nist:`2024-46788`, :cve_nist:`2024-46791`, :cve_nist:`2024-46794`, :cve_nist:`2024-46795`, :cve_nist:`2024-46796`, :cve_nist:`2024-46797`, :cve_nist:`2024-46798`, :cve_nist:`2024-46800`, :cve_nist:`2024-46822`, :cve_nist:`2024-46825`, :cve_nist:`2024-46826`, :cve_nist:`2024-46827`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46830`, :cve_nist:`2024-46831`, :cve_nist:`2024-46832`, :cve_nist:`2024-46835`, :cve_nist:`2024-46836`, :cve_nist:`2024-46838`, :cve_nist:`2024-46840`, :cve_nist:`2024-46843`, :cve_nist:`2024-46844`, :cve_nist:`2024-46845`, :cve_nist:`2024-46846`, :cve_nist:`2024-46847`, :cve_nist:`2024-46848`, :cve_nist:`2024-46849`, :cve_nist:`2024-46852`, :cve_nist:`2024-46853`, :cve_nist:`2024-46854`, :cve_nist:`2024-46855`, :cve_nist:`2024-46857`, :cve_nist:`2024-46858`, :cve_nist:`2024-46859`, :cve_nist:`2024-46860`, :cve_nist:`2024-46861`, :cve_nist:`2024-46863`, :cve_nist:`2024-46864`, :cve_nist:`2024-47663`, :cve_nist:`2024-47664`, :cve_nist:`2024-47665`, :cve_nist:`2024-47666`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47670`, :cve_nist:`2024-47671`, :cve_nist:`2024-47672`, :cve_nist:`2024-47673`, :cve_nist:`2024-47674`, :cve_nist:`2024-47675`, :cve_nist:`2024-47678`, :cve_nist:`2024-47679`, :cve_nist:`2024-47681`, :cve_nist:`2024-47682`, :cve_nist:`2024-47683`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47686`, :cve_nist:`2024-47688`, :cve_nist:`2024-47689`, :cve_nist:`2024-47690`, :cve_nist:`2024-47691`, :cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`, :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47700`, :cve_nist:`2024-47701`, :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47707`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`, :cve_nist:`2024-47713`, :cve_nist:`2024-47714`, :cve_nist:`2024-47715`, :cve_nist:`2024-47716`, :cve_nist:`2024-47718`, :cve_nist:`2024-47719`, :cve_nist:`2024-47720`, :cve_nist:`2024-47723`, :cve_nist:`2024-47727`, :cve_nist:`2024-47728`, :cve_nist:`2024-47730`, :cve_nist:`2024-47731`, :cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47737`, :cve_nist:`2024-47738`, :cve_nist:`2024-47739`, :cve_nist:`2024-47741`, :cve_nist:`2024-47742`, :cve_nist:`2024-47743`, :cve_nist:`2024-47744`, :cve_nist:`2024-47745`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47750`, :cve_nist:`2024-47751`, :cve_nist:`2024-47752`, :cve_nist:`2024-47753`, :cve_nist:`2024-47754`, :cve_nist:`2024-47757`, :cve_nist:`2024-49850`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49853`, :cve_nist:`2024-49854`, :cve_nist:`2024-49855`, :cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49859`, :cve_nist:`2024-49860`, :cve_nist:`2024-49861` and :cve_nist:`2024-49862`
11- linux-yocto/6.10: Fix :cve_nist:`2023-52917`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46720`, :cve_nist:`2024-46721`, :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`, :cve_nist:`2024-46726`, :cve_nist:`2024-46727`, :cve_nist:`2024-46728`, :cve_nist:`2024-46730`, :cve_nist:`2024-46731`, :cve_nist:`2024-46732`, :cve_nist:`2024-46735`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46741`, :cve_nist:`2024-46742`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46749`, :cve_nist:`2024-46750`, :cve_nist:`2024-46751`, :cve_nist:`2024-46755`, :cve_nist:`2024-46756`, :cve_nist:`2024-46757`, :cve_nist:`2024-46758`, :cve_nist:`2024-46759`, :cve_nist:`2024-46760`, :cve_nist:`2024-46761`, :cve_nist:`2024-46762`, :cve_nist:`2024-46763`, :cve_nist:`2024-46765`, :cve_nist:`2024-46766`, :cve_nist:`2024-46768`, :cve_nist:`2024-46769`, :cve_nist:`2024-46770`, :cve_nist:`2024-46771`, :cve_nist:`2024-46772`, :cve_nist:`2024-46773`, :cve_nist:`2024-46774`, :cve_nist:`2024-46775`, :cve_nist:`2024-46776`, :cve_nist:`2024-46777`, :cve_nist:`2024-46778`, :cve_nist:`2024-46779`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46784`, :cve_nist:`2024-46785`, :cve_nist:`2024-46786`, :cve_nist:`2024-46787`, :cve_nist:`2024-46788`, :cve_nist:`2024-46789`, :cve_nist:`2024-46790`, :cve_nist:`2024-46791`, :cve_nist:`2024-46792`, :cve_nist:`2024-46793`, :cve_nist:`2024-46794`, :cve_nist:`2024-46795`, :cve_nist:`2024-46796`, :cve_nist:`2024-46797`, :cve_nist:`2024-46798`, :cve_nist:`2024-46799`, :cve_nist:`2024-46800`, :cve_nist:`2024-46801`, :cve_nist:`2024-46802`, :cve_nist:`2024-46803`, :cve_nist:`2024-46804`, :cve_nist:`2024-46805`, :cve_nist:`2024-46806`, :cve_nist:`2024-46807`, :cve_nist:`2024-46808`, :cve_nist:`2024-46809`, :cve_nist:`2024-46810`, :cve_nist:`2024-46811`, :cve_nist:`2024-46812`, :cve_nist:`2024-46813`, :cve_nist:`2024-46814`, :cve_nist:`2024-46815`, :cve_nist:`2024-46816`, :cve_nist:`2024-46817`, :cve_nist:`2024-46818`, :cve_nist:`2024-46819`, :cve_nist:`2024-46820`, :cve_nist:`2024-46821`, :cve_nist:`2024-46822`, :cve_nist:`2024-46823`, :cve_nist:`2024-46824`, :cve_nist:`2024-46825`, :cve_nist:`2024-46826`, :cve_nist:`2024-46827`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46830`, :cve_nist:`2024-46831`, :cve_nist:`2024-46832`, :cve_nist:`2024-46833`, :cve_nist:`2024-46834`, :cve_nist:`2024-46835`, :cve_nist:`2024-46836`, :cve_nist:`2024-46837`, :cve_nist:`2024-46838`, :cve_nist:`2024-46840`, :cve_nist:`2024-46841`, :cve_nist:`2024-46842`, :cve_nist:`2024-46843`, :cve_nist:`2024-46844`, :cve_nist:`2024-46845`, :cve_nist:`2024-46846`, :cve_nist:`2024-46847`, :cve_nist:`2024-46848`, :cve_nist:`2024-46849`, :cve_nist:`2024-46850`, :cve_nist:`2024-46851`, :cve_nist:`2024-46852`, :cve_nist:`2024-46853`, :cve_nist:`2024-46854`, :cve_nist:`2024-46855`, :cve_nist:`2024-46856`, :cve_nist:`2024-46857`, :cve_nist:`2024-46858`, :cve_nist:`2024-46859`, :cve_nist:`2024-46860`, :cve_nist:`2024-46861`, :cve_nist:`2024-46862`, :cve_nist:`2024-46863`, :cve_nist:`2024-46864`, :cve_nist:`2024-46866`, :cve_nist:`2024-46867`, :cve_nist:`2024-46868`, :cve_nist:`2024-46869`, :cve_nist:`2024-46870`, :cve_nist:`2024-46871`, :cve_nist:`2024-47658`, :cve_nist:`2024-47659`, :cve_nist:`2024-47660`, :cve_nist:`2024-47661`, :cve_nist:`2024-47662`, :cve_nist:`2024-47663`, :cve_nist:`2024-47664`, :cve_nist:`2024-47665`, :cve_nist:`2024-47666`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47670`, :cve_nist:`2024-47671`, :cve_nist:`2024-47672`, :cve_nist:`2024-47673`, :cve_nist:`2024-47674`, :cve_nist:`2024-47675`, :cve_nist:`2024-47676`, :cve_nist:`2024-47677`, :cve_nist:`2024-47678`, :cve_nist:`2024-47679`, :cve_nist:`2024-47680`, :cve_nist:`2024-47681`, :cve_nist:`2024-47682`, :cve_nist:`2024-47683`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47686`, :cve_nist:`2024-47687`, :cve_nist:`2024-47688`, :cve_nist:`2024-47689`, :cve_nist:`2024-47690`, :cve_nist:`2024-47691`, :cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`, :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47700`, :cve_nist:`2024-47701`, :cve_nist:`2024-47702`, :cve_nist:`2024-47703`, :cve_nist:`2024-47704`, :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47707`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`, :cve_nist:`2024-47713`, :cve_nist:`2024-47714`, :cve_nist:`2024-47715`, :cve_nist:`2024-47716`, :cve_nist:`2024-47717`, :cve_nist:`2024-47718`, :cve_nist:`2024-47719`, :cve_nist:`2024-47720`, :cve_nist:`2024-47721`, :cve_nist:`2024-47723`, :cve_nist:`2024-47724`, :cve_nist:`2024-47727`, :cve_nist:`2024-47728`, :cve_nist:`2024-47730`, :cve_nist:`2024-47731`, :cve_nist:`2024-47732`, :cve_nist:`2024-47733`, :cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47736`, :cve_nist:`2024-47737`, :cve_nist:`2024-47738`, :cve_nist:`2024-47739`, :cve_nist:`2024-47741`, :cve_nist:`2024-47742`, :cve_nist:`2024-47743`, :cve_nist:`2024-47744`, :cve_nist:`2024-47745`, :cve_nist:`2024-47746`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47750`, :cve_nist:`2024-47751`, :cve_nist:`2024-47752`, :cve_nist:`2024-47753`, :cve_nist:`2024-47754`, :cve_nist:`2024-47757`, :cve_nist:`2024-49850`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49853`, :cve_nist:`2024-49854`, :cve_nist:`2024-49855`, :cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49859`, :cve_nist:`2024-49860`, :cve_nist:`2024-49861`, :cve_nist:`2024-49862`, :cve_nist:`2024-49863`, :cve_nist:`2024-49864`, :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, :cve_nist:`2024-49870`, :cve_nist:`2024-49871`, :cve_nist:`2024-49874` and :cve_nist:`2024-49875`
12- orc: Fix :cve_nist:`2024-40897` (follow-up fix)
13- vim: Fix :cve_nist:`2024-45306` and :cve_nist:`2024-47814`
14- wpa-supplicant: Ignore :cve_nist:`2024-5290`
15- xserver-xorg: Fix :cve_nist:`2024-9632`
16- xwayland: Fix :cve_nist:`2024-9632`
17
18
19Fixes in Yocto-5.1.1
20~~~~~~~~~~~~~~~~~~~~
21
22- binutils: Add missing perl modules to :term:`RDEPENDS` for nativsdk variant
23- binutils: Fix binutils mingw packaging
24- bitbake.conf: Mark VOLATILE_LOG_DIR & VOLATILE_TMP_DIR as obsolete
25- bitbake: Remove custom exception backtrace formatting
26- bitbake: bitbake: doc/user-manual: Update the :term:`BB_HASHSERVE_UPSTREAM`
27- bitbake: fetch2/git: Use quote from shlex, not pipes
28- bitbake: fetch2: don't try to preserve all attributes when unpacking files
29- bitbake: fetch2: use persist_data context managers
30- bitbake: fetch/wget: Increase timeout to 100s from 30s
31- bitbake: gitsm: Add call_process_submodules() to remove duplicated code
32- bitbake: gitsm: Remove downloads/tmpdir when failed
33- bitbake: persist_data: close connection in SQLTable __exit__
34- bitbake: tests/fetch: Update GoModTest and GoModGitTest
35- bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab
36- bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab
37- bluez: Fix mesh builds on musl
38- build-appliance-image: Update to styhead head revision
39- cml1.bbclass: do_diffconfig: Don't override .config with .config.orig
40- contributor-guide: Remove duplicated words
41- cve-check: add field "modified" to JSON report
42- cve-check: add support for cvss v4.0
43- cve-check: do not skip cve status description after :
44- cve-check: fix malformed cve status description with : characters
45- dev-manual: add bblock documentation
46- dev-manual: bblock: use warning block instead of attention
47- dev-manual: document how to provide confs from layer.conf
48- documentation: features: describe distribution feature pni-name
49- documentation; features: remove duplicate word in distribution feature ext2
50- documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint
51- documentation: Makefile: add support for xelatex
52- documentation: Makefile: publish pdf and epub versions too
53- documentation: Makefile: remove inkscape, replace by rsvg-convert
54- documentation: README: add instruction to run Vale on a subset
55- documentation: Replace VOLATILE_LOG_DIR with :term:`FILESYSTEM_PERMS_TABLES`
56- documentation: Replace VOLATILE_TMP_DIR with :term:`FILESYSTEM_PERMS_TABLES`
57- documentation: add a download page for epub and pdf
58- documentation: conf.py: add a bitbake_git extlink
59- documentation: conf.py: rename :cve: role to :cve_nist:
60- documentation: sphinx-static/switchers.js.in: do not refer to URL_ROOT anymore
61- documentation: styles: vocabularies: Yocto: add sstate
62- e2fsprogs: removed 'sed -u' option
63- efi-bootdisk.wks: Increase overhead-factor to avoid test failures
64- ffmpeg: Add "libswresample libavcodec" to :term:`CVE_PRODUCT`
65- ffmpeg: Disable asm optimizations on x86
66- ffmpeg: fix packaging examples
67- ffmpeg: nasm is x86 only, so only DEPEND if x86
68- ffmpeg: no need for textrel :term:`INSANE_SKIP`
69- gcc-source: Fix racing on building gcc-source-14.2.0 and lib32-gcc-source-14.2.0
70- gcc: add a backport patch to fix an issue with tzdata 2024b
71- git: upgrade to 2.46.1
72- glib-2.0: fix glib-2.0 ptest failure when upgrading tzdata2024b
73- glibc: Fix missing randomness in __gen_tempname
74- glibc: stable 2.40 branch updates
75- go: upgrade to 1.22.8
76- groff: fix rare build race in hdtbl
77- icu: update patch Upstream-Status
78- image.bbclass: Drop support for ImageQAFailed exceptions in image_qa
79- json-c: avoid ptest failure caused by valgrind
80- kexec-tools: update :term:`COMPATIBLE_HOST` because of makedumpfile
81- kmscube: Upgrade to latest revision (b2f97f53e0..)
82- lib/oe/package-manager: skip processing installed-pkgs with empty globs
83- libevdev: upgrade to 1.13.3
84- libgfortran: fix buildpath QA issue
85- libpam: use libdir in conditional
86- linux-yocto/6.6: update to v6.6.54
87- linux-yocto/6.10: bsp/genericarm64: disable ARM64_SME
88- linux-yocto/6.10: cfg: gpio: allow to re-enable the deprecated GPIO sysfs interface
89- linux-yocto/6.10: genericarm64.cfg: enable CONFIG_DMA_CMA
90- linux-yocto/6.10: update to v6.10.14
91- linux-yocto: Enable l2tp drivers when ptest featuee is on
92- lsb-release: fix Distro Codename shell escaping
93- migration-guides/release-notes-4.0: update :term:`BB_HASHSERVE_UPSTREAM` for new infrastructure
94- migration-guides/release-notes-5.0: NO_OUTPUT -> NO_COLOR
95- migration-guides/release-notes-5.1: add beaglebone-yocto parselogs test oeqa failure
96- migration-guides/release-notes-5.1: document added python3-libarchive-c ptest
97- migration-guides/release-notes-5.1: document fixed _test_devtool_add_git_url test
98- migration-guides/release-notes-5.1: document oeqa/selftest envvars change
99- migration-guides/release-notes-5.1: document spirv-tools reproducibility
100- migration-guides/release-notes-5.1: fix spdx bullet point
101- migration-guides/release-notes-5.1: update for several section
102- migration-guides/release-notes-5.1: update release note for styhead
103- migration-guides: 5.1: fix titles
104- migration-guides: add release notes for 4.0.21 and 4.0.22
105- oeqa/postactions: Fix archive retrieval from target
106- oeqa/runtime/ssh: Fix incorrect timeout fix
107- oeqa/runtime/ssh: Rework ssh timeout
108- oeqa/selftest/gcc: Fix kex exchange identification error
109- oeqa/selftest: Update the :term:`BB_HASHSERVE_UPSTREAM`
110- openssl: Fix SDK environment script to avoid unbound variable
111- orc: upgrade to 0.4.40
112- overview-manual: concepts: add details on package splitting
113- ovmf-native: remove .pyc files from install
114- package_rpm: Check if file exists before open()
115- package_rpm: restrict rpm to 4 threads
116- package_rpm: use zstd's default compression level
117- poky.conf: bump version for 5.1.1
118- pseudo: Fix envp bug and add posix_spawn wrapper
119- python3-maturin: sort external libs in wheel files
120- python3-setuptools: Add "python:setuptools" to :term:`CVE_PRODUCT`
121- qemu: Fix build on musl/riscv64
122- qemurunner: Clean up serial_lock handling
123- ref-manual: add missing CVE_CHECK manifest variables
124- ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable
125- ref-manual: add missing :term:`OPKGBUILDCMD` variable
126- ref-manual: add missing :term:`TESTIMAGE_FAILED_QA_ARTIFACTS`
127- ref-manual: add missing image manifest variables
128- ref-manual: add missing nospdx class
129- ref-manual: add missing variable :term:`PRSERV_UPSTREAM`
130- ref-manual: add mission pep517-backend sanity check
131- ref-manual: add new :term:`RECIPE_UPGRADE_EXTRA_TASKS` variable
132- ref-manual: add new retain class and variables
133- ref-manual: add new vex class
134- ref-manual: devtool-reference: document missing commands
135- ref-manual: devtool-reference: refresh example outputs
136- ref-manual: drop TCLIBCAPPEND variable
137- ref-manual: drop siteconfig class
138- ref-manual: faq: add q&a on class appends
139- ref-manual: fix ordering of insane checks list
140- ref-manual: merge patch-status-* to patch-status
141- ref-manual: release-process: add a reference to the doc's release
142- ref-manual: release-process: refresh the current LTS releases
143- ref-manual: release-process: update releases.svg
144- ref-manual: release-process: update releases.svg with month after "Current"
145- ref-manual: structure.rst: document missing tmp/ dirs
146- ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables
147- rootfs-postcommands.bbclass: make opkg status reproducible
148- scripts/install-buildtools: Update to 5.1
149- selftest/sstatetests: run CDN mirror check only once
150- shadow: use update-alternatives to handle groups.1
151- strace: download release tarballs from GitHub
152- systemd: fix broken links for sysvinit-compatible commands
153- tcl: skip io-13.6 test case
154- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
155- tune-cortexa32: set tune feature as armv8a
156- tzdata/tzcode-native: upgrade to 2024b
157- uboot-sign: fix concat_dtb arguments
158- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
159- util-linux: Add `findmnt` to the bash completion :term:`RDEPENDS`
160- vim: Upgrade to 9.1.0764
161- virglrenderer: Add patch to fix -int-conversion build issue
162- weston: Add missing runtime dependency on freerdp
163- weston: backport patch to allow neatvnc < v0.9.0
164- wireless-regdb: upgrade to 2024.10.07
165- xserver-xorg: upgrade to 21.1.14
166- xwayland: upgrade to 24.1.4
167
168
169Known Issues in Yocto-5.1.1
170~~~~~~~~~~~~~~~~~~~~~~~~~~~
171
172- N/A
173
174Contributors to Yocto-5.1.1
175~~~~~~~~~~~~~~~~~~~~~~~~~~~
176
177- Aditya Tayade
178- Alban Bedel
179- Aleksandar Nikolic
180- Alexander Kanavin
181- Antonin Godard
182- Bruce Ashfield
183- Chen Qi
184- Chris Laplante
185- Christian Lindeberg
186- Claus Stovgaard
187- Clayton Casciato
188- Daniel McGregor
189- Deepthi Hemraj
190- Harish Sadineni
191- Hiago De Franco
192- Hongxu Jia
193- Jagadeesh Krishnanjanappa
194- Jinfeng Wang
195- Jonas Gorski
196- Jose Quaresma
197- Joshua Watt
198- Julien Stephan
199- Jörg Sommer
200- Kai Kang
201- Katawann
202- Khem Raj
203- Lee Chee Yang
204- Markus Volk
205- Martin Jansa
206- Mathieu Dubois-Briand
207- Michael Opdenacker
208- Mikko Rapeli
209- Niko Mauno
210- Ola x Nilsson
211- Pavel Zhukov
212- Peter Kjellerstedt
213- Peter Marko
214- Purushottam Choudhary
215- Regis Dargent
216- Richard Purdie
217- Robert Yang
218- Rohini Sangam
219- Ross Burton
220- Sergei Zhmylev
221- Shunsuke Tokumoto
222- Steve Sakoman
223- Talel BELHAJSALEM
224- Tom Hochstein
225- Vijay Anusuri
226- Wang Mingyu
227- Yi Zhao
228- Yoann Congal
229- Zahir Hussain
230
231
232Repositories / Downloads for Yocto-5.1.1
233~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
234
235poky
236
237- Repository Location: :yocto_git:`/poky`
238- Branch: :yocto_git:`styhead </poky/log/?h=styhead>`
239- Tag: :yocto_git:`yocto-5.1.1 </poky/log/?h=yocto-5.1.1>`
240- Git Revision: :yocto_git:`7e081bd98fdc5435e850d1df79a5e0f1e30293d0 </poky/commit/?id=7e081bd98fdc5435e850d1df79a5e0f1e30293d0>`
241- Release Artefact: poky-7e081bd98fdc5435e850d1df79a5e0f1e30293d0
242- sha: 1ae688856bcd4aa2d1a14c2659217143cc2050151a8c194b99e6b472b0a99710
243- Download Locations:
244 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.1/poky-7e081bd98fdc5435e850d1df79a5e0f1e30293d0.tar.bz2
245 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.1/poky-7e081bd98fdc5435e850d1df79a5e0f1e30293d0.tar.bz2
246
247openembedded-core
248
249- Repository Location: :oe_git:`/openembedded-core`
250- Branch: :oe_git:`styhead </openembedded-core/log/?h=styhead>`
251- Tag: :oe_git:`yocto-5.1.1 </openembedded-core/log/?h=yocto-5.1.1>`
252- Git Revision: :oe_git:`b511d0146a2e8f316f4aecc90c853215674013ea </openembedded-core/commit/?id=b511d0146a2e8f316f4aecc90c853215674013ea>`
253- Release Artefact: oecore-b511d0146a2e8f316f4aecc90c853215674013ea
254- sha: 71eb36bf898b3eb5a7a79c2f1c057755405740e82b21a57ac540cebc1337e151
255- Download Locations:
256 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.1/oecore-b511d0146a2e8f316f4aecc90c853215674013ea.tar.bz2
257 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.1/oecore-b511d0146a2e8f316f4aecc90c853215674013ea.tar.bz2
258
259meta-mingw
260
261- Repository Location: :yocto_git:`/meta-mingw`
262- Branch: :yocto_git:`styhead </meta-mingw/log/?h=styhead>`
263- Tag: :yocto_git:`yocto-5.1.1 </meta-mingw/log/?h=yocto-5.1.1>`
264- Git Revision: :yocto_git:`77fe18d4f8ec34501045c5d92ce7e13b1bd129e9 </meta-mingw/commit/?id=77fe18d4f8ec34501045c5d92ce7e13b1bd129e9>`
265- Release Artefact: meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9
266- sha: 4c7f8100a3675d9863e51825def3df5b263ffc81cd57bae26eedbc156d771534
267- Download Locations:
268 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.1/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
269 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.1/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
270
271bitbake
272
273- Repository Location: :bitbake_git:`/`
274- Branch: :bitbake_git:`2.10 </log/?h=2.10>`
275- Tag: :bitbake_git:`yocto-5.1.1 </log/?h=yocto-5.1.1>`
276- Git Revision: :bitbake_git:`9602a684568910fd333ffce907fa020ad3661c26 </commit/?id=9602a684568910fd333ffce907fa020ad3661c26>`
277- Release Artefact: bitbake-9602a684568910fd333ffce907fa020ad3661c26
278- sha: 8f5304b7a71cf7ad5dc8e5ee8bbfc041780bd402712f314d2c3c8be79c89a526
279- Download Locations:
280 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.1/bitbake-9602a684568910fd333ffce907fa020ad3661c26.tar.bz2
281 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.1/bitbake-9602a684568910fd333ffce907fa020ad3661c26.tar.bz2
282
283yocto-docs
284
285- Repository Location: :yocto_git:`/yocto-docs`
286- Branch: :yocto_git:`styhead </yocto-docs/log/?h=styhead>`
287- Tag: :yocto_git:`yocto-5.1.1 </yocto-docs/log/?h=yocto-5.1.1>`
288- Git Revision: :yocto_git:`8288c8cae7fe7303e89d8ed286de91fc26ce6cc3 </yocto-docs/commit/?id=8288c8cae7fe7303e89d8ed286de91fc26ce6cc3>`
289
diff --git a/documentation/migration-guides/release-notes-5.1.2.rst b/documentation/migration-guides/release-notes-5.1.2.rst
new file mode 100644
index 0000000000..9226949ca8
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.1.2.rst
@@ -0,0 +1,312 @@
1Release notes for Yocto-5.1.2 (Styhead)
2---------------------------------------
3
4Security Fixes in Yocto-5.1.2
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- binutils: Fix :cve_nist:`2024-53589`
8- curl: Fix :cve_nist:`2024-9681`
9- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
10 :cve_nist:`2024-46954`, :cve_nist:`2024-46955` and :cve_nist:`2024-46956`
11- gstreamer1.0: Fix :cve_nist:`2024-47606`
12- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
13 :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
14 and :cve_nist:`2024-47835`
15- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
16 :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
17 :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
18 :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
19 :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
20 :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
21- gstreamer1.0-rtsp-server: Fix :cve_nist:`2024-44331`
22- libarchive: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958`
23- libexpat: Fix :cve_nist:`2024-50602`
24- libsndfile1: Fix :cve_nist:`2024-50612`
25- linux-yocto/6.6: Fix :cve_nist:`2024-27059`, :cve_nist:`2024-47704`, :cve_nist:`2024-49863`,
26 :cve_nist:`2024-49864`, :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`,
27 :cve_nist:`2024-49870`, :cve_nist:`2024-49871`, :cve_nist:`2024-49874`, :cve_nist:`2024-49875`,
28 :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`, :cve_nist:`2024-49881`,
29 :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`, :cve_nist:`2024-49886`,
30 :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, :cve_nist:`2024-49894`,
31 :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, :cve_nist:`2024-49901`,
32 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49905`, :cve_nist:`2024-49907`,
33 :cve_nist:`2024-49912`, :cve_nist:`2024-49913`, :cve_nist:`2024-49924`, :cve_nist:`2024-49925`,
34 :cve_nist:`2024-49927`, :cve_nist:`2024-49929`, :cve_nist:`2024-49930`, :cve_nist:`2024-49931`,
35 :cve_nist:`2024-49933`, :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49937`,
36 :cve_nist:`2024-49938`, :cve_nist:`2024-49939`, :cve_nist:`2024-49944`, :cve_nist:`2024-49946`,
37 :cve_nist:`2024-49947`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49950`,
38 :cve_nist:`2024-49951`, :cve_nist:`2024-49952`, :cve_nist:`2024-49953`, :cve_nist:`2024-49954`,
39 :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, :cve_nist:`2024-49959`,
40 :cve_nist:`2024-49960`, :cve_nist:`2024-49961`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`,
41 :cve_nist:`2024-49965`, :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`,
42 :cve_nist:`2024-49975`, :cve_nist:`2024-49976`, :cve_nist:`2024-49977`, :cve_nist:`2024-49978`,
43 :cve_nist:`2024-49980`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
44 :cve_nist:`2024-49985`, :cve_nist:`2024-49986`, :cve_nist:`2024-49987`, :cve_nist:`2024-49988`,
45 :cve_nist:`2024-49989`, :cve_nist:`2024-49991`, :cve_nist:`2024-49992`, :cve_nist:`2024-49995`,
46 :cve_nist:`2024-49996`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`, :cve_nist:`2024-50001`,
47 :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50005`, :cve_nist:`2024-50006`,
48 :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50012`, :cve_nist:`2024-50013`,
49 :cve_nist:`2024-50015`, :cve_nist:`2024-50016`, :cve_nist:`2024-50019`, :cve_nist:`2024-50022`,
50 :cve_nist:`2024-50023`, :cve_nist:`2024-50024`, :cve_nist:`2024-50026`, :cve_nist:`2024-50029`,
51 :cve_nist:`2024-50031`, :cve_nist:`2024-50032`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
52 :cve_nist:`2024-50036`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
53 :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
54 :cve_nist:`2024-50047`, :cve_nist:`2024-50048`, :cve_nist:`2024-50049`, :cve_nist:`2024-50055`,
55 :cve_nist:`2024-50057`, :cve_nist:`2024-50058`, :cve_nist:`2024-50059`, :cve_nist:`2024-50060`,
56 :cve_nist:`2024-50061`, :cve_nist:`2024-50062`, :cve_nist:`2024-50063`, :cve_nist:`2024-50064`,
57 :cve_nist:`2024-50065`, :cve_nist:`2024-50066`, :cve_nist:`2024-50069`, :cve_nist:`2024-50070`,
58 :cve_nist:`2024-50072`, :cve_nist:`2024-50073`, :cve_nist:`2024-50074`, :cve_nist:`2024-50075`,
59 :cve_nist:`2024-50076`, :cve_nist:`2024-50077`, :cve_nist:`2024-50078`, :cve_nist:`2024-50080`,
60 :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50084`, :cve_nist:`2024-50085`,
61 :cve_nist:`2024-50086`, :cve_nist:`2024-50087`, :cve_nist:`2024-50088`, :cve_nist:`2024-50093`,
62 :cve_nist:`2024-50095`, :cve_nist:`2024-50096`, :cve_nist:`2024-50098`, :cve_nist:`2024-50099`,
63 :cve_nist:`2024-50101`, :cve_nist:`2024-50103`, :cve_nist:`2024-50108`, :cve_nist:`2024-50110`,
64 :cve_nist:`2024-50111`, :cve_nist:`2024-50112`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`,
65 :cve_nist:`2024-50117`, :cve_nist:`2024-50120`, :cve_nist:`2024-50121`, :cve_nist:`2024-50124`,
66 :cve_nist:`2024-50125`, :cve_nist:`2024-50126`, :cve_nist:`2024-50127`, :cve_nist:`2024-50128`,
67 :cve_nist:`2024-50130`, :cve_nist:`2024-50131`, :cve_nist:`2024-50133`, :cve_nist:`2024-50134`,
68 :cve_nist:`2024-50135`, :cve_nist:`2024-50136`, :cve_nist:`2024-50139`, :cve_nist:`2024-50140`,
69 :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, :cve_nist:`2024-50145`,
70 :cve_nist:`2024-50147`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`, :cve_nist:`2024-50151`,
71 :cve_nist:`2024-50152`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`, :cve_nist:`2024-50155`,
72 :cve_nist:`2024-50156`, :cve_nist:`2024-50158`, :cve_nist:`2024-50159`, :cve_nist:`2024-50160`,
73 :cve_nist:`2024-50162`, :cve_nist:`2024-50163`, :cve_nist:`2024-50164`, :cve_nist:`2024-50166`,
74 :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50169`, :cve_nist:`2024-50170`,
75 :cve_nist:`2024-50171`, :cve_nist:`2024-50172`, :cve_nist:`2024-50175`, :cve_nist:`2024-50176`,
76 :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, :cve_nist:`2024-50182`,
77 :cve_nist:`2024-50183`, :cve_nist:`2024-50184`, :cve_nist:`2024-50185`, :cve_nist:`2024-50186`,
78 :cve_nist:`2024-50187`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`, :cve_nist:`2024-50191`,
79 :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`, :cve_nist:`2024-50195`,
80 :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, :cve_nist:`2024-50202`,
81 :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, :cve_nist:`2024-50211`,
82 :cve_nist:`2024-50215`, :cve_nist:`2024-50222`, :cve_nist:`2024-50223`, :cve_nist:`2024-50224`,
83 :cve_nist:`2024-50226`, :cve_nist:`2024-50229`, :cve_nist:`2024-50230`, :cve_nist:`2024-50231`,
84 :cve_nist:`2024-50232`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`, :cve_nist:`2024-50235`,
85 :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50239`, :cve_nist:`2024-50240`,
86 :cve_nist:`2024-50242`, :cve_nist:`2024-50243`, :cve_nist:`2024-50244`, :cve_nist:`2024-50245`,
87 :cve_nist:`2024-50246`, :cve_nist:`2024-50247`, :cve_nist:`2024-50248`, :cve_nist:`2024-50249`,
88 :cve_nist:`2024-50250`, :cve_nist:`2024-50251`, :cve_nist:`2024-50252`, :cve_nist:`2024-50255`,
89 :cve_nist:`2024-50256`, :cve_nist:`2024-50257`, :cve_nist:`2024-50258`, :cve_nist:`2024-50259`,
90 :cve_nist:`2024-50261`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, :cve_nist:`2024-50265`,
91 :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, :cve_nist:`2024-50271`,
92 :cve_nist:`2024-50272`, :cve_nist:`2024-50273`, :cve_nist:`2024-50275`, :cve_nist:`2024-50276`,
93 :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, :cve_nist:`2024-50283`,
94 :cve_nist:`2024-50284`, :cve_nist:`2024-50285`, :cve_nist:`2024-50286`, :cve_nist:`2024-50287`,
95 :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50298`, :cve_nist:`2024-50299`,
96 :cve_nist:`2024-50300`, :cve_nist:`2024-50301`, :cve_nist:`2024-50302`, :cve_nist:`2024-53042`,
97 :cve_nist:`2024-53043`, :cve_nist:`2024-53046`, :cve_nist:`2024-53047`, :cve_nist:`2024-53052`,
98 :cve_nist:`2024-53055`, :cve_nist:`2024-53057`, :cve_nist:`2024-53058`, :cve_nist:`2024-53059`,
99 :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, :cve_nist:`2024-53063`, :cve_nist:`2024-53066`,
100 :cve_nist:`2024-53068`, :cve_nist:`2024-53072`, :cve_nist:`2024-53076`, :cve_nist:`2024-53079`,
101 :cve_nist:`2024-53081`, :cve_nist:`2024-53082`, :cve_nist:`2024-53083`, :cve_nist:`2024-53088`,
102 :cve_nist:`2024-53091`, :cve_nist:`2024-53093`, :cve_nist:`2024-53094`, :cve_nist:`2024-53096`,
103 :cve_nist:`2024-53099`, :cve_nist:`2024-53100`, :cve_nist:`2024-53101`, :cve_nist:`2024-53103`,
104 :cve_nist:`2024-53108`, :cve_nist:`2024-53109`, :cve_nist:`2024-53110`, :cve_nist:`2024-53112`,
105 :cve_nist:`2024-53113`, :cve_nist:`2024-53119`, :cve_nist:`2024-53120`, :cve_nist:`2024-53121`,
106 :cve_nist:`2024-53122`, :cve_nist:`2024-53123`, :cve_nist:`2024-53126`, :cve_nist:`2024-53127`,
107 :cve_nist:`2024-53129`, :cve_nist:`2024-53130`, :cve_nist:`2024-53131`, :cve_nist:`2024-53134`,
108 :cve_nist:`2024-53135`, :cve_nist:`2024-53138`, :cve_nist:`2024-53139`, :cve_nist:`2024-53140`,
109 :cve_nist:`2024-53141`, :cve_nist:`2024-53142`, :cve_nist:`2024-53145`, :cve_nist:`2024-53146`,
110 :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53154`, :cve_nist:`2024-53155`,
111 :cve_nist:`2024-53156`, :cve_nist:`2024-53157`, :cve_nist:`2024-53165`, :cve_nist:`2024-53166`,
112 :cve_nist:`2024-53171`, :cve_nist:`2024-53173`, :cve_nist:`2024-53180`, :cve_nist:`2024-53188`,
113 :cve_nist:`2024-53200`, :cve_nist:`2024-53202`, :cve_nist:`2024-53208`, :cve_nist:`2024-53210`,
114 :cve_nist:`2024-53213`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53230`,
115 :cve_nist:`2024-53231`, :cve_nist:`2024-53237`, :cve_nist:`2024-54683`, :cve_nist:`2024-55916`,
116 :cve_nist:`2024-56369`, :cve_nist:`2024-56538`, :cve_nist:`2024-56551`, :cve_nist:`2024-56567`,
117 :cve_nist:`2024-56572`, :cve_nist:`2024-56574`, :cve_nist:`2024-56577`, :cve_nist:`2024-56578`,
118 :cve_nist:`2024-56579`, :cve_nist:`2024-56581`, :cve_nist:`2024-56593`, :cve_nist:`2024-56595`,
119 :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`, :cve_nist:`2024-56601`,
120 :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56604`, :cve_nist:`2024-56605`,
121 :cve_nist:`2024-56606`, :cve_nist:`2024-56611`, :cve_nist:`2024-56613`, :cve_nist:`2024-56614`,
122 :cve_nist:`2024-56615`, :cve_nist:`2024-56617`, :cve_nist:`2024-56622`, :cve_nist:`2024-56623`,
123 :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56629`, :cve_nist:`2024-56631`,
124 :cve_nist:`2024-56634`, :cve_nist:`2024-56640`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`,
125 :cve_nist:`2024-56648`, :cve_nist:`2024-56649`, :cve_nist:`2024-56650`, :cve_nist:`2024-56651`,
126 :cve_nist:`2024-56653`, :cve_nist:`2024-56654`, :cve_nist:`2024-56657`, :cve_nist:`2024-56658`,
127 :cve_nist:`2024-56659`, :cve_nist:`2024-56660`, :cve_nist:`2024-56662`, :cve_nist:`2024-56663`,
128 :cve_nist:`2024-56664`, :cve_nist:`2024-56667`, :cve_nist:`2024-56670`, :cve_nist:`2024-56672`,
129 :cve_nist:`2024-56675`, :cve_nist:`2024-56688`, :cve_nist:`2024-56689`, :cve_nist:`2024-56692`,
130 :cve_nist:`2024-56694`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`, :cve_nist:`2024-56710`,
131 :cve_nist:`2024-56715`, :cve_nist:`2024-56716`, :cve_nist:`2024-56717`, :cve_nist:`2024-56718`,
132 :cve_nist:`2024-56720`, :cve_nist:`2024-56722`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`,
133 :cve_nist:`2024-56725`, :cve_nist:`2024-56726`, :cve_nist:`2024-56727`, :cve_nist:`2024-56728`,
134 :cve_nist:`2024-56729`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56744`,
135 :cve_nist:`2024-56745`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`,
136 :cve_nist:`2024-56751`, :cve_nist:`2024-56752`, :cve_nist:`2024-56754`, :cve_nist:`2024-56755`,
137 :cve_nist:`2024-56756`, :cve_nist:`2024-56760`, :cve_nist:`2024-56763`, :cve_nist:`2024-56765`,
138 :cve_nist:`2024-56767`, :cve_nist:`2024-56769`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`,
139 :cve_nist:`2024-56776`, :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`,
140 :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56783`, :cve_nist:`2024-56785`,
141 :cve_nist:`2024-56786`, :cve_nist:`2024-56787` and :cve_nist:`2024-57807`
142- qemu: Fix :cve_nist:`2024-6505`
143- rust: Ignore :cve_nist:`2024-43402`
144
145
146Fixes in Yocto-5.1.2
147~~~~~~~~~~~~~~~~~~~~
148
149- binutils: stable 2.43.1 branch update
150- bitbake: runqueue: Fix performance of multiconfigs with large overlap
151- bitbake: runqueue: Fix scenetask processing performance issue
152- bitbake: runqueue: Optimise setscene loop processing
153- build-appliance-image: Update to styhead head revision
154- builder: set :term:`CVE_PRODUCT`
155- buildtools-docs-tarball: Add rsvg so we can handle svg files in docs
156- connman: Fix restart script
157- contributor-guide: submit-changes.rst: suggest to remove the git signature
158- cve-update-nvd2-native: Handle :term:`BB_NO_NETWORK` and missing db
159- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
160- dev-manual: bmaptool.rst: correct command for bmaptool-native
161- dev-manual: bmaptool.rst: simplify and fix instructions
162- dev-manual: fix styling of references to bmaptool
163- dnf: drop python3-iniparse from :term:`DEPENDS` and :term:`RDEPENDS`
164- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
165- docs: Gather dependencies in poky.yaml.in
166- docs: Update the documentation for :term:`SRCPV`
167- docs: standards.md: add a section on admonitions
168- docs: update current releases
169- expat: upgrade to 2.6.4
170- gcc: Fix c++: tweak for Wrange-loop-construct
171- ghostscript: upgrade 10.04.0
172- glibc: stable 2.40 branch updates.
173- groff: Fix race issues for parallel build
174- gstreamer1.0-libav: explicitly disable documentation
175- gstreamer1.0: run ptests in parallel
176- gstreamer1.0: upgrade to 1.24.10
177- linux-yocto/6.6: bsp/genericarm64: disable ARM64_SME
178- linux-yocto/6.6: genericarm64.cfg: enable CONFIG_DMA_CMA
179- linux-yocto/6.6: update to v6.6.69
180- lttng-modules: fix sched_stat_runtime changed in Linux 6.6.66
181- migration-guides: add release notes for 4.0.23, 5.0.4, 5.0.5 and 5.1.1
182- oeqa/ssh: Improve performance and log sizes
183- oeqa/utils/gitarchive: Return tag name and improve exclude handling
184- poky.conf: add new tested distros
185- poky.conf: bump version for 5.1.2
186- poky.yaml.in: add missing locales dependency
187- poky.yaml.in: replace inkscape dependency by librsvg2-bin
188- populate_sdk_ext: write_local_conf add shutil import
189- python3-poetry-core: drop python3-six from :term:`RDEPENDS`
190- python3: upgrade to 3.12.8
191- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
192- ref-manual: classes: fix bin_package description
193- ref-manual: devtool-reference: add warning note on deploy-target and shared objects
194- ref-manual: merge two separate descriptions of :term:`RECIPE_UPGRADE_EXTRA_TASKS`
195- ref-manual: move runtime-testing section to the test-manual
196- ref-manual: packages: move ptest section to the test-manual
197- ref-manual: qa-checks: remove patch-status-core/patch-status-noncore
198- ref-manual: use standardized method accross both ubuntu and debian for locale install
199- reproducible-builds.rst: show how to build a single package
200- resulttool: Add --logfile-archive option to store mode
201- resulttool: Allow store to filter to specific revisions
202- resulttool: Clean up repoducible build logs
203- resulttool: Fix passthrough of --all files in store mode
204- resulttool: Handle ltp rawlogs as well as ptest
205- resulttool: Improve repo layout for oeselftest results
206- resulttool: Trim the precision of duration information
207- resulttool: Use single space indentation in json output
208- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
209- selftest/reproducible: Clean up pathnames
210- selftest/reproducible: Drop rawlogs
211- shadow: use update-alternatives to handle su.1 and nologin.8
212- system-requirements.rst: add dependencies for pdf builds
213- system-requirements: add fedora 39 to supported distros
214- system-requirements: update list of supported distros
215- systemd-boot: drop intltool-native from :term:`DEPENDS`
216- systemd: drop intltool-native from :term:`DEPENDS`
217
218
219Known Issues in Yocto-5.1.2
220~~~~~~~~~~~~~~~~~~~~~~~~~~~
221
222- N/A
223
224
225Contributors to Yocto-5.1.2
226~~~~~~~~~~~~~~~~~~~~~~~~~~~
227
228Thanks to the following people who contributed to this release:
229
230- Alexander Kanavin
231- Antonin Godard
232- Bruce Ashfield
233- Changqing Li
234- Deepthi Hemraj
235- Guénaël Muller
236- Guðni Már Gilbert
237- Hitendra Prajapati
238- Lee Chee Yang
239- Mark Hatle
240- Michael Nazzareno Trimarchi
241- Michael Opdenacker
242- Peter Marko
243- Richard Purdie
244- Robert Yang
245- Ross Burton
246- Sid-Ali
247- Steve Sakoman
248- Sunil Dora
249- Trevor Gamblin
250- Wang Mingyu
251- Xiangyu Chen
252- Yash Shinde
253
254
255Repositories / Downloads for Yocto-5.1.2
256~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
257
258poky
259
260- Repository Location: :yocto_git:`/poky`
261- Branch: :yocto_git:`styhead </poky/log/?h=styhead>`
262- Tag: :yocto_git:`yocto-5.1.2 </poky/log/?h=yocto-5.1.2>`
263- Git Revision: :yocto_git:`ff9ca74e170480578fcdb1f7bcd897f0e69e46a5 </poky/commit/?id=ff9ca74e170480578fcdb1f7bcd897f0e69e46a5>`
264- Release Artefact: poky-ff9ca74e170480578fcdb1f7bcd897f0e69e46a5
265- sha: 3c8d5504ebc988a6427e31d3a9e84e74f16f84b7e9b0884f77be6bd6231b7fef
266- Download Locations:
267 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.2/poky-ff9ca74e170480578fcdb1f7bcd897f0e69e46a5.tar.bz2
268 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.2/poky-ff9ca74e170480578fcdb1f7bcd897f0e69e46a5.tar.bz2
269
270openembedded-core
271
272- Repository Location: :oe_git:`/openembedded-core`
273- Branch: :oe_git:`styhead </openembedded-core/log/?h=styhead>`
274- Tag: :oe_git:`yocto-5.1.2 </openembedded-core/log/?h=yocto-5.1.2>`
275- Git Revision: :oe_git:`62dfe689246d648f9970a5476716e486b1a33765 </openembedded-core/commit/?id=62dfe689246d648f9970a5476716e486b1a33765>`
276- Release Artefact: oecore-62dfe689246d648f9970a5476716e486b1a33765
277- sha: 8118c0260e673dbf9f3d7cd0a6d8364fc337f3e8ff75f0c449be88d2157e78fb
278- Download Locations:
279 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.2/oecore-62dfe689246d648f9970a5476716e486b1a33765.tar.bz2
280 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.2/oecore-62dfe689246d648f9970a5476716e486b1a33765.tar.bz2
281
282meta-mingw
283
284- Repository Location: :yocto_git:`/meta-mingw`
285- Branch: :yocto_git:`styhead </meta-mingw/log/?h=styhead>`
286- Tag: :yocto_git:`yocto-5.1.2 </meta-mingw/log/?h=yocto-5.1.2>`
287- Git Revision: :yocto_git:`77fe18d4f8ec34501045c5d92ce7e13b1bd129e9 </meta-mingw/commit/?id=77fe18d4f8ec34501045c5d92ce7e13b1bd129e9>`
288- Release Artefact: meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9
289- sha: 4c7f8100a3675d9863e51825def3df5b263ffc81cd57bae26eedbc156d771534
290- Download Locations:
291 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.2/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
292 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.2/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
293
294bitbake
295
296- Repository Location: :oe_git:`/bitbake`
297- Branch: :oe_git:`2.10 </bitbake/log/?h=2.10>`
298- Tag: :oe_git:`yocto-5.1.2 </bitbake/log/?h=yocto-5.1.2>`
299- Git Revision: :oe_git:`1452e74cc4ddfaadc6537a049877a66cec253c8d </bitbake/commit/?id=1452e74cc4ddfaadc6537a049877a66cec253c8d>`
300- Release Artefact: bitbake-1452e74cc4ddfaadc6537a049877a66cec253c8d
301- sha: 26538d0b8ab907d962623707697bfc6826615239a724b1805e0c3acbd74fdcaa
302- Download Locations:
303 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.2/bitbake-1452e74cc4ddfaadc6537a049877a66cec253c8d.tar.bz2
304 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.2/bitbake-1452e74cc4ddfaadc6537a049877a66cec253c8d.tar.bz2
305
306yocto-docs
307
308- Repository Location: :yocto_git:`/yocto-docs`
309- Branch: :yocto_git:`styhead </yocto-docs/log/?h=styhead>`
310- Tag: :yocto_git:`yocto-5.1.2 </yocto-docs/log/?h=yocto-5.1.2>`
311- Git Revision: :yocto_git:`8ac3e2eb1dd4149b24af03666813dc6d94df466d </yocto-docs/commit/?id=8ac3e2eb1dd4149b24af03666813dc6d94df466d>`
312
diff --git a/documentation/migration-guides/release-notes-5.1.3.rst b/documentation/migration-guides/release-notes-5.1.3.rst
new file mode 100644
index 0000000000..641cb8d502
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.1.3.rst
@@ -0,0 +1,160 @@
1Release notes for Yocto-5.1.3 (Styhead)
2---------------------------------------
3
4Security Fixes in Yocto-5.1.3
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- go: Fix :cve_nist:`2024-45336`, :cve_nist:`2024-45341` and :cve_nist:`2025-22866`
8- linux-yocto/6.6: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-53179`, :cve_nist:`2024-56582`,
9 :cve_nist:`2024-56703`, :cve_nist:`2024-57801`, :cve_nist:`2024-57802`, :cve_nist:`2024-57841`,
10 :cve_nist:`2024-57882`, :cve_nist:`2024-57887`, :cve_nist:`2024-57890`, :cve_nist:`2024-57892`,
11 :cve_nist:`2024-57895`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`,
12 :cve_nist:`2024-57902`, :cve_nist:`2024-57906`, :cve_nist:`2024-57907`, :cve_nist:`2024-57908`,
13 :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57912`, :cve_nist:`2024-57913`,
14 :cve_nist:`2024-57916`, :cve_nist:`2024-57922`, :cve_nist:`2024-57925`, :cve_nist:`2024-57926`,
15 :cve_nist:`2024-57933`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57940`,
16 :cve_nist:`2024-57949`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21636`,
17 :cve_nist:`2025-21637`, :cve_nist:`2025-21638`, :cve_nist:`2025-21639`, :cve_nist:`2025-21640`,
18 :cve_nist:`2025-21642`, :cve_nist:`2025-21652`, :cve_nist:`2025-21658`, :cve_nist:`2025-21665`,
19 :cve_nist:`2025-21666`, :cve_nist:`2025-21667`, :cve_nist:`2025-21669`, :cve_nist:`2025-21670`,
20 :cve_nist:`2025-21671`, :cve_nist:`2025-21673`, :cve_nist:`2025-21674`, :cve_nist:`2025-21675`,
21 :cve_nist:`2025-21676`, :cve_nist:`2025-21680`, :cve_nist:`2025-21681`, :cve_nist:`2025-21683`,
22 :cve_nist:`2025-21684`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`, :cve_nist:`2025-21690`,
23 :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
24- pyhton3: Fix CVE-2024-12254, :cve_nist:`2025-0938` and 3 other vulnerabilities (gh-80222, gh-119511
25 and gh-126108).
26- socat: Fix :cve_nist:`2024-54661`
27- vim: Fix :cve_nist:`2025-22134` and :cve_nist:`2025-24014`
28
29
30Fixes in Yocto-5.1.3
31~~~~~~~~~~~~~~~~~~~~
32
33- bitbake: bblayers/query: Fix using "removeprefix" string method
34- bitbake: cooker: Make cooker 'skiplist' per-multiconfig/mc
35- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
36- boost: fix do_fetch error
37- build-appliance-image: Update to styhead head revision
38- classes/nativesdk: also override :term:`TUNE_PKGARCH`
39- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
40- cmake: apply parallel build settings to ptest tasks
41- contributor-guide/submit-changes: add policy on AI generated code
42- cve-check: fix cvesInRecord
43- cve-check: restore :term:`CVE_CHECK_SHOW_WARNINGS` functionality
44- dev-manual/building: document the initramfs-framework recipe
45- devtool: ide-sdk recommend :term:`DEBUG_BUILD`
46- devtool: ide-sdk remove the plugin from eSDK installer
47- devtool: ide-sdk sort cmake preset
48- devtool: modify support debug-builds
49- docs: Add favicon for the documentation html
50- docs: Fix typo in standards.md
51- docs: Update autobuilder URLs to valkyrie
52- enchant2: correct :term:`SRC_URI` and other uris
53- go: upgrade to 1.22.12
54- libnsl2: set :term:`CVE_PRODUCT`
55- libxml-parser-perl: correct :term:`SRC_URI`
56- linux-yocto/6.6: update to v6.6.75
57- linux: Modify kernel configuration to fix runqlat issue
58- lrzsz: update :term:`SRC_URI` to avoid redirect
59- migration-guides: add release notes for 4.0.24, 5.0.6, 5.0.7 and 5.1.2
60- oe-selftest: devtool ide-sdk use modify debug-build
61- oeqa/gitarchive: Fix syntax warning
62- poky.conf: bump version for 5.1.3
63- python3: upgrade 3.12.9
64- ref-manual/faq: add q&a on systemd as default
65- resulttool/store: Fix permissions of logarchive
66- rust-target-config: Fix TARGET_C_INT_WIDTH with correct size
67- scripts/install-buildtools: Update to 5.1.2
68- sdk-manual: extensible.rst: devtool ide-sdk improve
69- sdk-manual: extensible.rst: update devtool ide-sdk
70- systemd: set :term:`CVE_PRODUCT`
71- test-manual/ptest: link to common framework ptest classes
72- test-manual/reproducible-builds: fix reproducible links
73- vim: Upgrade 9.1.1043
74
75
76Known Issues in Yocto-5.1.3
77~~~~~~~~~~~~~~~~~~~~~~~~~~~
78
79- N/A
80
81
82Contributors to Yocto-5.1.3
83~~~~~~~~~~~~~~~~~~~~~~~~~~~
84
85- Adrian Freihofer
86- Aleksandar Nikolic
87- Alexander Kanavin
88- Antonin Godard
89- Bruce Ashfield
90- Chris Laplante
91- Divya Chellam
92- Harish Sadineni
93- Jiaying Song
94- Joerg Schmidt
95- Lee Chee Yang
96- Mikko Rapeli
97- Peter Marko
98- Richard Purdie
99- Ross Burton
100- Simon A. Eugster
101- Steve Sakoman
102
103Repositories / Downloads for Yocto-5.1.3
104~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
105
106poky
107
108- Repository Location: :yocto_git:`/poky`
109- Branch: :yocto_git:`styhead </poky/log/?h=styhead>`
110- Tag: :yocto_git:`yocto-5.1.3 </poky/log/?h=yocto-5.1.3>`
111- Git Revision: :yocto_git:`11a8dec6e29ac0b2fd942c0fc00dd7fc30658841 </poky/commit/?id=11a8dec6e29ac0b2fd942c0fc00dd7fc30658841>`
112- Release Artefact: poky-11a8dec6e29ac0b2fd942c0fc00dd7fc30658841
113- sha: 9ebcacaab53058fd97b06134e06b5883df3c7ddb25dae43a2f3809c4f65d24b5
114- Download Locations:
115 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.3/poky-11a8dec6e29ac0b2fd942c0fc00dd7fc30658841.tar.bz2
116 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.3/poky-11a8dec6e29ac0b2fd942c0fc00dd7fc30658841.tar.bz2
117
118openembedded-core
119
120- Repository Location: :oe_git:`/openembedded-core`
121- Branch: :oe_git:`styhead </openembedded-core/log/?h=styhead>`
122- Tag: :oe_git:`yocto-5.1.3 </openembedded-core/log/?h=yocto-5.1.3>`
123- Git Revision: :oe_git:`35ffa0ed523ba95f069dff5b7df3f819ef031015 </openembedded-core/commit/?id=35ffa0ed523ba95f069dff5b7df3f819ef031015>`
124- Release Artefact: oecore-35ffa0ed523ba95f069dff5b7df3f819ef031015
125- sha: 67efedf0afa9ac9e4664f02923a4c5c2429f2f1be697e39f9cbffb9e3f2d9d2c
126- Download Locations:
127 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.3/oecore-35ffa0ed523ba95f069dff5b7df3f819ef031015.tar.bz2
128 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.3/oecore-35ffa0ed523ba95f069dff5b7df3f819ef031015.tar.bz2
129
130meta-mingw
131
132- Repository Location: :yocto_git:`/meta-mingw`
133- Branch: :yocto_git:`styhead </meta-mingw/log/?h=styhead>`
134- Tag: :yocto_git:`yocto-5.1.3 </meta-mingw/log/?h=yocto-5.1.3>`
135- Git Revision: :yocto_git:`77fe18d4f8ec34501045c5d92ce7e13b1bd129e9 </meta-mingw/commit/?id=77fe18d4f8ec34501045c5d92ce7e13b1bd129e9>`
136- Release Artefact: meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9
137- sha: 4c7f8100a3675d9863e51825def3df5b263ffc81cd57bae26eedbc156d771534
138- Download Locations:
139 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.3/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
140 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.3/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
141
142bitbake
143
144- Repository Location: :oe_git:`/bitbake`
145- Branch: :oe_git:`2.10 </bitbake/log/?h=2.10>`
146- Tag: :oe_git:`yocto-5.1.3 </bitbake/log/?h=yocto-5.1.3>`
147- Git Revision: :oe_git:`58e5c70a0572ff5994dc181694e05cd5d3ddaf66 </bitbake/commit/?id=58e5c70a0572ff5994dc181694e05cd5d3ddaf66>`
148- Release Artefact: bitbake-58e5c70a0572ff5994dc181694e05cd5d3ddaf66
149- sha: 8b1d8aa3de6ca8c520f1b528e342e06de0cff918a11d77862c499185a9ba8fec
150- Download Locations:
151 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.3/bitbake-58e5c70a0572ff5994dc181694e05cd5d3ddaf66.tar.bz2
152 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.3/bitbake-58e5c70a0572ff5994dc181694e05cd5d3ddaf66.tar.bz2
153
154yocto-docs
155
156- Repository Location: :yocto_git:`/yocto-docs`
157- Branch: :yocto_git:`styhead </yocto-docs/log/?h=styhead>`
158- Tag: :yocto_git:`yocto-5.1.3 </yocto-docs/log/?h=yocto-5.1.3>`
159- Git Revision: :yocto_git:`fd9c744d6e73a5719e61a3c0063b1602ca386e91 </yocto-docs/commit/?id=fd9c744d6e73a5719e61a3c0063b1602ca386e91>`
160
diff --git a/documentation/migration-guides/release-notes-5.1.4.rst b/documentation/migration-guides/release-notes-5.1.4.rst
new file mode 100644
index 0000000000..4df7840972
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.1.4.rst
@@ -0,0 +1,137 @@
1Release notes for Yocto-5.1.4 (Styhead)
2---------------------------------------
3
4Security Fixes in Yocto-5.1.4
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- binutils: Fix :cve_nist:`2025-0840`
8- grub: Fix :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, :cve_nist:`2024-45776`,
9 :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, :cve_nist:`2024-45780`,
10 :cve_nist:`2024-45781`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`,
11 :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0678`,
12 :cve_nist:`2025-0684`, :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`,
13 :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125`
14- libtasn1: fix :cve_nist:`2024-12133`
15- libxml2: fix :cve_nist:`2024-56171`, :cve_nist:`2025-24928` and :cve_nist:`2025-27113`
16- openssh: Fix :cve_nist:`2025-26465` and :cve_nist:`2025-26466`
17- puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837`
18- subversion: Ignore :cve_nist:`2024-45720`
19- xserver-xorg: Fix :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`,
20 :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`
21 and :cve_nist:`2025-26601`
22- xwayland: Fix :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`,
23 :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`
24 and :cve_nist:`2025-26601`
25
26
27Fixes in Yocto-5.1.4
28~~~~~~~~~~~~~~~~~~~~
29
30- bitbake: event/utils: Avoid deadlock from lock_timeout() and recursive events
31- bitbake: utils: Add signal blocking for lock_timeout
32- bitbake: utils: Print information about lock issue before exiting
33- bitbake: utils: Tweak lock_timeout logic
34- build-appliance-image: Update to styhead head revision
35- docs: Remove all mention of core-image-lsb
36- grub: backport strlcpy function
37- grub: drop obsolete CVE statuses
38- icu: Adjust ICU_DATA_DIR path on big endian targets
39- libtasn1: upgrade to 4.20.0
40- libxml2: upgrade to 2.13.6
41- migration-guides: add release notes for 4.0.25 and 5.1.3
42- poky.conf: bump version for 5.1.4
43- ref-manual: Add missing variable :term:`IMAGE_ROOTFS_MAXSIZE`
44- ref-manual: don't refer to poky-lsb
45- ref-manual: remove OE_IMPORTS
46- tzcode-native: Fix compiler setting from 2023d version
47- tzdata/tzcode-native: upgrade to 2025a
48- vulnerabilities/classes: remove references to cve-check text format
49- xserver-xf86-config: add a configuration fragment to disable screen blanking
50- xserver-xf86-config: remove obsolete configuration files
51- xserver-xorg: upgrade to 21.1.16
52- xwayland: upgrade to 21.1.6
53
54
55Known Issues in Yocto-5.1.4
56~~~~~~~~~~~~~~~~~~~~~~~~~~~
57
58- NA
59
60Contributors to Yocto-5.1.4
61~~~~~~~~~~~~~~~~~~~~~~~~~~~
62
63
64Thanks to the following people who contributed to this release:
65
66- Alessio Cascone
67- Lee Chee Yang
68- Makarios Christakis
69- Marta Rybczynska
70- Peter Marko
71- Priyal Doshi
72- Richard Purdie
73- Ross Burton
74- Steve Sakoman
75- Vijay Anusuri
76- Wang Mingyu
77- Weisser, Pascal
78
79
80Repositories / Downloads for Yocto-5.1.4
81~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
82
83poky
84
85- Repository Location: :yocto_git:`/poky`
86- Branch: :yocto_git:`styhead </poky/log/?h=styhead>`
87- Tag: :yocto_git:`yocto-5.1.4 </poky/log/?h=yocto-5.1.4>`
88- Git Revision: :yocto_git:`70dc28ac287bf35541270cae1d99130a0f6b7b5f </poky/commit/?id=70dc28ac287bf35541270cae1d99130a0f6b7b5f>`
89- Release Artefact: poky-70dc28ac287bf35541270cae1d99130a0f6b7b5f
90- sha: 63f1d3d47a28bd9b41c89db6e1f2657c04233a00d10210795e766c0bc265d766
91- Download Locations:
92 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.4/poky-70dc28ac287bf35541270cae1d99130a0f6b7b5f.tar.bz2
93 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.4/poky-70dc28ac287bf35541270cae1d99130a0f6b7b5f.tar.bz2
94
95openembedded-core
96
97- Repository Location: :oe_git:`/openembedded-core`
98- Branch: :oe_git:`styhead </openembedded-core/log/?h=styhead>`
99- Tag: :oe_git:`yocto-5.1.4 </openembedded-core/log/?h=yocto-5.1.4>`
100- Git Revision: :oe_git:`2d94f4b8a852dc761f89e5106347e239382df5fb </openembedded-core/commit/?id=2d94f4b8a852dc761f89e5106347e239382df5fb>`
101- Release Artefact: oecore-2d94f4b8a852dc761f89e5106347e239382df5fb
102- sha: 344ac23f814c049d69b06cee42c43b7b422506ce84397406caef09becb2555bf
103- Download Locations:
104 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.4/oecore-2d94f4b8a852dc761f89e5106347e239382df5fb.tar.bz2
105 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.4/oecore-2d94f4b8a852dc761f89e5106347e239382df5fb.tar.bz2
106
107meta-mingw
108
109- Repository Location: :yocto_git:`/meta-mingw`
110- Branch: :yocto_git:`styhead </meta-mingw/log/?h=styhead>`
111- Tag: :yocto_git:`yocto-5.1.4 </meta-mingw/log/?h=yocto-5.1.4>`
112- Git Revision: :yocto_git:`77fe18d4f8ec34501045c5d92ce7e13b1bd129e9 </meta-mingw/commit/?id=77fe18d4f8ec34501045c5d92ce7e13b1bd129e9>`
113- Release Artefact: meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9
114- sha: 4c7f8100a3675d9863e51825def3df5b263ffc81cd57bae26eedbc156d771534
115- Download Locations:
116 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.4/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
117 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.4/meta-mingw-77fe18d4f8ec34501045c5d92ce7e13b1bd129e9.tar.bz2
118
119bitbake
120
121- Repository Location: :oe_git:`/bitbake`
122- Branch: :oe_git:`2.10 </bitbake/log/?h=2.10>`
123- Tag: :oe_git:`yocto-5.1.4 </bitbake/log/?h=yocto-5.1.4>`
124- Git Revision: :oe_git:`82b9f42126983579da03bdbb4e3ebf07346118a7 </bitbake/commit/?id=82b9f42126983579da03bdbb4e3ebf07346118a7>`
125- Release Artefact: bitbake-82b9f42126983579da03bdbb4e3ebf07346118a7
126- sha: 209d62c5262f2287af60e7fe2343c29ab25b5088de4da71de89016e75900285a
127- Download Locations:
128 https://downloads.yoctoproject.org/releases/yocto/yocto-5.1.4/bitbake-82b9f42126983579da03bdbb4e3ebf07346118a7.tar.bz2
129 https://mirrors.kernel.org/yocto/yocto/yocto-5.1.4/bitbake-82b9f42126983579da03bdbb4e3ebf07346118a7.tar.bz2
130
131yocto-docs
132
133- Repository Location: :yocto_git:`/yocto-docs`
134- Branch: :yocto_git:`styhead </yocto-docs/log/?h=styhead>`
135- Tag: :yocto_git:`yocto-5.1.4 </yocto-docs/log/?h=yocto-5.1.4>`
136- Git Revision: :yocto_git:`f0324b8f14881227336f84325cdebd0518e17796 </yocto-docs/commit/?id=f0324b8f14881227336f84325cdebd0518e17796>`
137
diff --git a/documentation/migration-guides/release-notes-5.1.rst b/documentation/migration-guides/release-notes-5.1.rst
new file mode 100644
index 0000000000..bab0c14581
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.1.rst
@@ -0,0 +1,1076 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for 5.1 (styhead)
4---------------------------------
5
6New Features / Enhancements in 5.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- Linux kernel 6.10, gcc 14.2, glibc 2.40, LLVM 18.1.18, and over 300 other
10 recipe upgrades.
11
12- New variables:
13
14 - :term:`CVE_CHECK_MANIFEST_JSON_SUFFIX`: suffix for the CVE JSON manifest file.
15
16 - :term:`PRSERV_UPSTREAM`: Upstream PR service (``host:port``) for the local
17 PR server to connect to.
18
19 - :term:`RECIPE_UPGRADE_EXTRA_TASKS`: space-delimited list of tasks to run
20 after the new sources have been unpacked in the
21 ``scripts/lib/devtool/upgrade.py`` upgrade() method.
22
23 - :term:`UNPACKDIR`: allow change of the :ref:`ref-tasks-unpack` task
24 directory.
25
26- Kernel-related changes:
27
28 - The default kernel is the current stable (6.10), and there is also support
29 for the latest long-term release (6.6).
30
31- New core recipes:
32
33 - `fmt <https://fmt.dev>`__: an open-source formatting library for C++
34 (imported from meta-oe).
35
36 - `xcb-util-errors <http://xcb.freedesktop.org/XcbUtil/>`__: gives human
37 readable names to error codes and event codes
38
39- QEMU / ``runqemu`` changes:
40
41 - runqemu: ``QB_DRIVE_TYPE`` now support for sd card (``/dev/mmcblk``)
42
43 - Trigger ``write_qemuboot_conf`` task on changes of kernel image realpath
44 (:term:`KERNEL_IMAGE_NAME`).
45
46- Go changes:
47
48 - New Go module fetcher (``gomod://``) for downloading module dependencies
49 to the module cache from a module proxy.
50
51 - New Go module fetcher (``gomodgit://``) for downloading module
52 dependencies to the module cache directly from a git repository.
53
54 - The old 1.4 Go bootstrap written in C has been dropped. The default
55 Go bootstrap provider is now ``go-binary-native`` only.
56
57- Rust changes:
58
59 - Cargo dependencies specified as git repositories now also have their git
60 submodules checked out.
61
62 - Rust is now built with its default set of tools instead of just
63 ``rust-demangler``.
64
65- wic Image Creator changes:
66
67 - Add the ``truncate`` utility in :term:`HOSTTOOLS`, needed by some wic
68 commands.
69
70 - The ``get_boot_files`` function is no longer part of the
71 ``bootimg-partition`` plugin and is part of the common ``bootfiles.py``
72 library.
73
74- SDK-related changes:
75
76 - Included ``nativesdk-python3-pip`` in :term:`buildtools` by default.
77
78 - :ref:`ref-classes-nativesdk` now have :ref:`ref-tasks-package_qa` run when
79 calling :ref:`ref-tasks-populate_sdk`.
80
81 - A new 7zip archive type can be used to create the SDK by setting
82 :term:`SDK_ARCHIVE_TYPE` to ``7zip``.
83
84 - The :ref:`ref-classes-toolchain-scripts` class now exports the target
85 endianness and wordsize in environment variables ``OECORE_TARGET_BITS``
86 and ``OECORE_TARGET_ENDIAN``.
87
88- Testing-related changes:
89
90 - oeqa/selftest: Only rewrite envvars paths that absolutely point to
91 :term:`BUILDDIR`.
92
93 - oeqa/manual: remove obsolete CROPS and Eclipse manually testing scripts
94
95 - Enable ptests for ``python3-cffi``, ``python3-idna``,
96 ``python3-libarchive-c``, ``python3-mako``, ``python3-packaging``,
97 ``python3-uritools`` and ``python3-rpds-py``.
98
99 - Running tests on target with :ref:`ref-classes-testimage` can now be done
100 over a serial connection.
101
102 - Artifact collection when using the :ref:`ref-classes-testimage` class is
103 now optional and allowed by making :term:`TESTIMAGE_FAILED_QA_ARTIFACTS`
104 empty.
105
106 - Artifacts from ``oeqa`` post-actions are now retrieved as whole archives
107 instead of individual copies. The archive is left uncompressed on the
108 host.
109
110 - A test for the ``minidebuginfo`` feature of :term:`DISTRO_FEATURES` is now
111 part of the test suite.
112
113 - A test for building a kernel module was added to the SDK test suite.
114
115 - oeqa/selftest: run test serially if neither the ``testtools`` or
116 ``subunit`` Python modules have been found.
117
118 - Artifact collection and test result collection are now separated and
119 artifact collection can be controlled with the ``OEQA_ARTEFACT_DIR``
120 variable.
121
122- Utility script changes:
123
124 - New ``cve-json-to-text`` script that converts the ``cve-check`` result
125 from the JSON format to the TEXT format as ``cve-check`` removed text
126 format.
127
128 - New ``makefile-getvar`` script to extract value from a Makefile.
129
130 - New ``pull-spdx-licenses`` script to pull SPDX license data, update
131 license list JSON data and update license directory.
132
133 - Several improvements in ``oe-build-perf-report`` report.
134
135 - ``oe-debuginfod``: add parameter "-d" to store debuginfod files in project
136 sub-directory.
137
138 - ``resulttool``: support test report generation in JUnit XML format.
139
140 - Remove ``install-buildtools`` "test installation" step harmless error
141 messages.
142
143 - ``bitbake-layers``: add a new subcommand ``show-machines`` to list the
144 machines available in the currently configured layers.
145
146- BitBake changes:
147
148 - Fetcher for Rust crates: added a check for latest upstream version.
149
150 - ``syncrpc`` now requires a minimum version of the websockets module depend
151 on Python version.
152
153 - Improve ``bitbake-hashclient`` stress statistics reporting.
154
155 - ``bitbake-hashserv`` added ``reuseport`` parameter to enable SO_REUSEPORT,
156 allowing multiple servers to bind to the same port for load balancing
157
158 - Improve cloning speed with :term:`BB_GIT_SHALLOW` and
159 :term:`BB_GENERATE_MIRROR_TARBALLS`.
160
161 - `BitBake` UI now includes log paths for failed task.
162
163 - ``fetcher2``: support for wget and wget2.
164
165 - ``fetcher2``: support npm package name with '@' character.
166
167 - ``fetcher2``: remote name for ``git://`` is now ``origin`` by default.
168
169 - Codeparser now support shell substitution in quotes, for example::
170
171 var1="$(cmd1 ...)"
172
173 - Function code of pylib functions are now taken into account when computing
174 taskhashes.
175
176 - Fix ``_test_devtool_add_git_url`` test
177
178 - Hashserv: add a batch stream API that reduces the round trip latency on the
179 server.
180
181 - The :ref:`ref-classes-prserv` class now uses a shared sqlite3 database to
182 allow multiple processes to access the database.
183
184 - The Python codeparser now skips the checksumming of external Python
185 modules imported with ``from module import something``.
186
187 - Enable batching of ``unihash`` queries to reduce the effect of latency
188 when making multiple queries to the server.
189
190 - Parser: improve cache invalidation reliability by using the mtime's
191 nanoseconds, inode number and size of files.
192
193 - When using the syntax ``addtask do_XXX before YYY after ZZZ``, bitbake now
194 ensures that ``YYY`` and ``ZZZ`` are prefixed with ``do_``, to avoid
195 unexpected failures.
196
197- ``devtool`` changes:
198
199 - Fix ``_test_devtool_add_git_url`` test
200
201 - ``update-recipe``, ``finish``: fix error when calling on another layer and
202 having a localfile.
203
204 - ``devtool check-upgrade-status`` now groups recipes when they need to be
205 upgraded together.
206
207- Packaging changes:
208
209 - When processing ``pkgconfig``'s ``pc`` files, also process
210 "Requires.private" in addition to "Requires". This fixes a broken
211 dependency list for IPKs and avoids installing unecessary recommended
212 additional packages (and save disk usage).
213
214 - Package management: make the extraction of IPK packages not depend on
215 ``zst`` compression, as it can be changed with :term:`OPKGBUILDCMD`.
216
217 - Remove support for ``DIRFILES`` of :ref:`ref-classes-package_rpm` as it is
218 rpm-specific and untested.
219
220 - Bump ``abi_version`` and ``package`` versions after recent ``pkgconfig``
221 changes.
222
223- Security changes:
224
225 - The ``busybox`` default configuration now disables internal TLS code to
226 use the ``openssl`` backend instead, for a more secure initial set of
227 settings.
228
229 - Limit ssh host keys pre-generation to qemu machines by default, for
230 security purposes.
231
232- LLVM related changes:
233
234 - Enable ``libllvm`` in :term:`PACKAGECONFIG` for native builds.
235
236 - Fetch release tarballs instead of git checkouts to reduce disk usage.
237
238- :ref:`ref-classes-cve-check` changes:
239
240 - The class :ref:`ref-classes-cve-check` now uses a local copy of the NVD
241 database during builds.
242
243 - New statuses can be reported by :ref:`ref-classes-cve-check`:
244
245 - ``fix-file-included``: when a fix file has been included (set automatically)
246 - ``version-not-in-range``: version number NOT in the vulnerable range (set automatically)
247 - ``version-in-range``: version number IS in the vulnerable range (set automatically)
248 - ``unknown``: impossible to conclude if the vulnerability is present or not
249
250 - The TEXT output format was removed to favor the JSON format which offers
251 more features.
252
253 - Allow overriding the default "policies" from
254 ``meta/conf/cve-check-map.conf`` by including it before distro include
255 files in ``meta/conf/bitbake.conf``.
256
257- SPDX-related changes:
258
259 - Update the SPDX license set too version 3.24.0, and produce SPDX output in
260 version 3.0 by default, instead of 2.2.
261
262 - New ``create-spdx-3.0`` class to generate SPDX 3.0 output (used by generic
263 class :ref:`ref-classes-create-spdx`). New ``create-spdx-image-3.0``
264 class that is used when generating images and ``create-spdx-sdk-3.0`` for SDK
265 based recipes.
266
267 - New :ref:`ref-classes-nospdx` class that allows recipes to opt out of
268 generating SPDX.
269
270 - Specify the SPDX image purposes for ``tar``, ``cpio`` and ``wic`` images.
271
272 - The :ref:`ref-classes-create-spdx` class now reports for
273 :ref:`ref-classes-multilib*` classes.
274
275- Miscellaneous changes:
276
277 - Fix reproducibility for ``spirv-tools``
278
279 - Allow selection of host key types used by openssh.
280
281 - New glibc task ``do_symlist`` to list exported symbols.
282
283 - ``initramfs-framework`` support for force reboot in the case of fatal error.
284
285 - The :ref:`ref-classes-insane` class now checks for ``patch-status`` and
286 ``pep517-backend`` by default.
287
288 - New ``yocto-space-optimize`` include file to allow turning off debug compiler options
289 for a small set of recipes to reduce build on disk footprint and package/sstate sizes.
290
291 - Image creation tasks inheriting from the :ref:`ref-classes-image` class
292 now produce a ``manifest.json`` file listing the images created. The
293 output manifest path is defined by the :term:`IMAGE_OUTPUT_MANIFEST`
294 variable.
295
296 - New :ref:`ref-classes-vex` class generates the minimum information that is necessary
297 for VEX generation by an external CVE checking tool.
298
299 - New :ref:`ref-classes-retain` class creates a tarball of the work directory for a recipe
300 when one of its tasks fails, or any other nominated directories.
301
302 - New ``localpkgfeed`` class in meta-selftest to create a subset of the
303 package feed that just contain the packages depended on by this recipe.
304
305 - New :term:`PACKAGECONFIG` options for individual recipes:
306
307 - ``appstream``: qt6
308 - ``cronie``: inotify
309 - ``gstreamer1``.0-plugins-bad: gtk3
310 - ``libsdl2``: libsamplerate
311 - ``mesa``: tegra
312 - ``openssh``: hostkey-rsa hostkey-ecdsa hostkey-ed25519
313 - ``pciutils``: kmod zlib
314 - ``piglit``: wayland
315 - ``pulseaudio``: oss-output
316 - ``python3``: staticlibpython
317 - ``python3-jsonschema``: format-nongpl (previously "nongpl")
318 - ``systemd``: bpf-framework
319 - ``util-linux``: libmount-mountfd-support
320
321 - Stop referring :term:`WORKDIR` for :term:`S` and :term:`B` and trigger
322 :ref:`ref-classes-insane` errors when :term:`S` or :term:`B` are equal to
323 :term:`WORKDIR`.
324
325 - ``picolibc`` can now be used with :term:`TCLIBC` to build with
326 ``picolibc`` as the C library.
327
328 - ``openssh`` now uses ``sd_notify`` patch from upstream instead of custom
329 one, which does not depend on libsystemd and is standalone.
330
331 - ``cmake`` now uses the ``${COREBASE}/scripts/git`` wrapper instead of the
332 host's, which is required during :ref:`ref-tasks-install` to call git
333 while disabling fakeroot, and avoid "dubious ownership" git errors.
334
335 - Default compiler option changes:
336
337 - :term:`BUILD_CFLAGS` now includes the `-pipe` option by default.
338
339 - Remove the ``eliminate-unused-debug-types`` option from
340 the default compiler options since it is now included by default.
341
342 - ``uninative`` updated to 4.6 for glibc 2.40
343
344 - Mark recipe ``meta-ide-support`` as machine specific with
345 :term:`PACKAGE_ARCH`.
346
347 - sstate: Drop intercept functions support which was only used by now
348 removed ``siteconfig`` class.
349
350 - sstate: Drop support for ``SSTATEPOSTINSTFUNC`` variable now that
351 ``postfunc`` is available.
352
353 - openssl: strip the test suite after building, reducing the build tree of
354 50% after installation.
355
356 - u-boot: Refactor some of the :ref:`ref-tasks-configure` tasks into new
357 functions, making it easier to modify using a bbappend.
358
359 - The ``musl`` recipe now shows an error if used with
360 :ref:`ref-classes-multilib*` enabled (``musl`` does not support multilib).
361
362 - The ``git`` recipe is now configured with default configuration pointing to
363 ``/etc/gitconfig`` for :ref:`ref-classes-native` recipes.
364
365 - The ``apt-native`` recipe, used to compile ``dpkg`` and handle ``deb``
366 packages, was modified to avoid files being overriden by other packages when
367 they share common files. Instead, prompt an error.
368
369 - The :ref:`ref-tasks-savedefconfig` was moved from the u-boot and kernel
370 recipes to the :ref:`ref-classes-cml1` class, so that more kbuild-based
371 recipes can use it.
372
373 - The :ref:`ref-classes-sanity` class now checks if user namespaces are
374 enabled on the host as they are required for network isolation.
375
376 - The recipe ``os-release`` is now part of
377 :term:`SIGGEN_EXCLUDERECIPES_ABISAFE` and does not trigger a rebuild on a
378 change for dependent tasks.
379
380 - In ``kernel-fitimage``, the existence of
381 :term:`EXTERNAL_KERNEL_DEVICETREE` is checked more thoroughly to avoid
382 false positives.
383
384 - rootfs: ensure ``run-postinsts`` is not uninstalled when the
385 *read-only-rootfs-delayed-postinsts* and *read-only-rootfs*
386 :term:`IMAGE_FEATURES` are enabled.
387
388 - Gcc can now use ``libc++`` as its runtime.
389
390 - The variable ``CMDLINE_CONSOLE`` was removed from the
391 :ref:`ref-classes-kernel` class, as it wasn't used anywhere.
392
393 - ``python3``: make ``-core`` depend on ``-compression`` as it needs to
394 import the ``zipfile`` module.
395
396 - The classes :ref:`ref-classes-native` and :ref:`ref-classes-nativesdk` do
397 not override the ``*FLAGS`` variables anymore, allowing users to use the
398 ``+=`` syntax in recipes.
399
400 - The ``multilib_script`` class (part of :ref:`ref-classes-multilib*`)
401 now expands the ``MULTILIB_SCRIPTS`` variable before splitting the
402 scripts, fixing some issues seen when :term:`PACKAGECONFIG` would
403 conditionally modify it.
404
405Known Issues in 5.1
406~~~~~~~~~~~~~~~~~~~
407
408- ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the ``parselogs``
409 runtime test due to unexpected kernel error messages in the log (see
410 :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla).
411
412Recipe License changes in 5.1
413~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
414
415The following corrections have been made to the :term:`LICENSE` values set by recipes:
416
417- ``ccache``: ``GPL-3.0-or-later`` to ``GPL-3.0-or-later & MIT & BSL-1.0 & ISC`` after adding third-party licenses.
418- ``dejagnu``: update to ``GPL-3.0-only``.
419- ``gcr``: update to ``LGPL-2.0-only``.
420- ``glibc``: update to ``GPL-2.0-only & LGPL-2.1-or-later``.
421- ``gpgme``: update for different packages.
422- ``iw``: update to ``ISC``.
423- ``json-glib``: ``LGPL-2.1-only`` to ``LGPL-2.1-or-later`` after update to 1.10.0.
424- ``libgcrypt``: ``GPL-2.0-or-later & LGPL-2.1-or-later`` to ``GPL-2.0-or-later & LGPL-2.1-or-later & BSD-3-Clause``. Add BSD-3-Clause for poly1305-amd64-avx512.S.
425- ``linux-firmware``: set package :term:`LICENSE` for following firmware packages:
426 - ``cc33xx``
427 - ``ath10k-wcn3990``
428 - ``qcom-adreno-g750``
429 - ``qcom-x1e80100-adreno``
430 - ``wfx``
431 - ``qcom-vpu``
432 - ``qcom-sm8550-audio-tplg``
433 - ``qcom-sm8650-audio-tplg``
434 - ``linaro-license``
435 - ``mali-csffw-arch108``
436- ``lz4``: ``BSD-2-Clause | GPL-2.0-only`` to ``BSD-2-Clause | GPL-2.0-or-later`` after update to 1.10.0.
437- ``ppp``: add license ``RSA-MD`` .
438- ``python3-docutils``: ``PSF-2.0 & BSD-2-Clause & GPL-3.0-only`` to ``CC0-1.0 & ZPL-2.1 & BSD-2-Clause & GPL-3.0-only``. Add CC0 after update to 0.21.2.
439- ``tiff``: update to ``libtiff``.
440- ``unzip``: update to ``Info-ZIP``.
441- ``util-linux``: Add ``GPL-2.0-only`` after update to 2.40.1 (``GPL-2.0`` changed to ``GPL-2.0-only`` in README.licensing).
442- ``xz``: ``PD`` removed and ``0BSD`` added after update to 5.6.2.
443- ``xz``: add ``PD`` for xz, xz-dev and xz-doc package.
444- ``zip``: update to ``Info-ZIP``.
445
446Security Fixes in 5.1
447~~~~~~~~~~~~~~~~~~~~~
448
449- ``apr``: :cve_nist:`2023-49582`
450- ``busybox``: :cve_nist:`2021-42380`, :cve_nist:`2023-42363`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2023-42366`
451- ``cups``: :cve_nist:`2024-35235`
452- ``curl``: :cve_nist:`2024-6197`, :cve_nist:`2024-6874`, :cve_nist:`2024-7264`
453- ``expat``: :cve_nist:`2024-45490`, :cve_nist:`2024-45491`, :cve_nist:`2024-45492`.
454- ``gcc``: :cve_nist:`2023-4039`
455- ``gdk-pixbuf``: :cve_nist:`2022-48622`
456- ``ghostscript``: :cve_nist:`2024-33869`, :cve_nist:`2023-52722`, :cve_nist:`2024-33870`, :cve_nist:`2024-33871`, :cve_nist:`2024-29510`
457- ``git``: :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021`, :cve_nist:`2024-32465`
458- ``glibc``: :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601`, :cve_nist:`2024-33602`
459- ``go``: :cve_nist:`2024-24790`
460- ``gtk+3``: :cve_nist:`2024-6655`
461- ``linux-yocto/6.10``: :cve_nist:`2020-16119`
462- ``linux-yocto/6.6``: :cve_nist:`2020-16119`
463- ``llvm``: :cve_nist:`2024-0151`
464- ``ncurses``: :cve_nist:`2023-50495`, :cve_nist:`2023-45918`
465- ``openssh``: :cve_nist:`2024-6387`
466- ``openssl``: :cve_nist:`2024-4603`, :cve_nist:`2024-4741`
467- ``ovmf``: :cve_nist:`2023-45236`, :cve_nist:`2023-45237`, :cve_nist:`2024-25742`
468- ``python3``: :cve_nist:`2024-7592`, :cve_nist:`2024-8088`, :cve_nist:`2024-6232`
469- ``ruby``: :cve_nist:`2024-27282`, :cve_nist:`2024-27281`, :cve_nist:`2024-27280`
470- ``tiff``: :cve_nist:`2024-7006`
471- ``vim``: :cve_nist:`2024-41957`, :cve_nist:`2024-41965`, :cve_nist:`2024-43374`, :cve_nist:`2024-43790`, :cve_nist:`2024-43802`
472- ``wget``: :cve_nist:`2024-38428`
473- ``wpa-supplicant``: :cve_nist:`2024-5290`, :cve_nist:`2023-52160`
474- ``xserver-xorg``: :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31082`, :cve_nist:`2024-31083`
475
476Recipe Upgrades in 5.1
477~~~~~~~~~~~~~~~~~~~~~~
478
479- ``acpica`` 20240322 -> 20240827
480- ``adwaita-icon-theme`` 45.0 -> 46.2
481- ``alsa-lib`` 1.2.11 -> 1.2.12
482- ``alsa-plugins`` 1.2.7.1 -> 1.2.12
483- ``alsa-ucm-conf`` 1.2.11 -> 1.2.12
484- ``alsa-utils`` 1.2.11 -> 1.2.12
485- ``asciidoc`` 10.2.0 -> 10.2.1
486- ``at-spi2-core`` 2.50.1 -> 2.52.0
487- ``attr`` 2.5.1 -> 2.5.2
488- ``automake`` 1.16.5 -> 1.17
489- ``base-passwd`` 3.6.3 -> 3.6.4
490- ``bash`` 5.2.21 -> 5.2.32
491- ``bash-completion`` 2.12.0 -> 2.14.0
492- ``bind`` 9.18.28 -> 9.20.1
493- ``binutils`` 2.42 -> 2.43.1
494- ``binutils-cross`` 2.42 -> 2.43.1
495- ``binutils-cross-canadian`` 2.42 -> 2.43.1
496- ``binutils-crosssdk`` 2.42 -> 2.43.1
497- ``bluez5`` 5.72 -> 5.78
498- ``boost`` 1.84.0 -> 1.86.0
499- ``boost-build-native`` 1.84.0 -> 1.86.0
500- ``btrfs-tools`` 6.7.1 -> 6.10.1
501- ``build-appliance-image`` 15.0.0 (bf88a67b4523…) -> 15.0.0 (7cc8bf7af794…)
502- ``ca-certificates`` 20211016 -> 20240203
503- ``cairo`` 1.18.0 -> 1.18.2
504- ``cargo`` 1.75.0 -> 1.79.0
505- ``cargo-c-native`` 0.9.30+cargo-0.77.0 -> 0.10.3+cargo-0.81.0
506- ``ccache`` 4.9.1 -> 4.10.2
507- ``cmake`` 3.28.3 -> 3.30.2
508- ``cmake-native`` 3.28.3 -> 3.30.2
509- ``connman`` 1.42 -> 1.43
510- ``coreutils`` 9.4 -> 9.5
511- ``cracklib`` 2.9.11 -> 2.10.2
512- ``createrepo-c`` 1.0.4 -> 1.1.4
513- ``cross-localedef-native`` 2.39+git -> 2.40+git
514- ``cryptodev-linux`` 1.13+gitX -> 1.14
515- ``cryptodev-module`` 1.13+gitX -> 1.14
516- ``cryptodev-tests`` 1.13+gitX -> 1.14
517- ``curl`` 8.7.1 -> 8.9.1
518- ``debianutils`` 5.16 -> 5.20
519- ``dhcpcd`` 10.0.6 -> 10.0.10
520- ``diffoscope`` 259 -> 277
521- ``dmidecode`` 3.5 -> 3.6
522- ``dnf`` 4.19.0 -> 4.21.1
523- ``dpkg`` 1.22.0 -> 1.22.11
524- ``dropbear`` 2022.83 -> 2024.85
525- ``e2fsprogs`` 1.47.0 -> 1.47.1
526- ``ell`` 0.64 -> 0.68
527- ``enchant2`` 2.6.7 -> 2.8.2
528- ``encodings`` 1.0.7 -> 1.1.0
529- ``epiphany`` 46.0 -> 46.3
530- ``erofs-utils`` 1.7.1 -> 1.8.1
531- ``ethtool`` 6.7 -> 6.10
532- ``ffmpeg`` 6.1.1 -> 7.0.2
533- ``findutils`` 4.9.0 -> 4.10.0
534- ``freetype`` 2.13.2 -> 2.13.3
535- ``fribidi`` 1.0.14 -> 1.0.15
536- ``gcc`` 13.3.0 -> 14.2.0
537- ``gcc-cross`` 13.3.0 -> 14.2.0
538- ``gcc-cross-canadian`` 13.3.0 -> 14.2.0
539- ``gcc-crosssdk`` 13.3.0 -> 14.2.0
540- ``gcc-runtime`` 13.3.0 -> 14.2.0
541- ``gcc-sanitizers`` 13.3.0 -> 14.2.0
542- ``gcc-source`` 13.3.0 -> 14.2.0
543- ``gcr`` 4.2.1 -> 4.3.0
544- ``gdb`` 14.2 -> 15.1
545- ``gdb-cross`` 14.2 -> 15.1
546- ``gdb-cross-canadian`` 14.2 -> 15.1
547- ``gdbm`` 1.23 -> 1.24
548- ``gi-docgen`` 2023.3 -> 2024.1
549- ``git`` 2.44.1 -> 2.46.0
550- ``glib-2.0`` 2.78.6 -> 2.82.1
551- ``glib-networking`` 2.78.1 -> 2.80.0
552- ``glibc`` 2.39+git -> 2.40+git
553- ``glibc-locale`` 2.39+git -> 2.40+git
554- ``glibc-mtrace`` 2.39+git -> 2.40+git
555- ``glibc-scripts`` 2.39+git -> 2.40+git
556- ``glibc-testsuite`` 2.39+git -> 2.40+git
557- ``glibc-y2038-tests`` 2.39+git -> 2.40+git
558- ``glslang`` 1.3.275.0 -> 1.3.290.0
559- ``gnu-config`` 20240101+git -> 20240823+git
560- ``gnu-efi`` 3.0.17 -> 3.0.18
561- ``gnupg`` 2.4.4 -> 2.5.0
562- ``gnutls`` 3.8.4 -> 3.8.6
563- ``go-helloworld`` 0.1 (d9923f6970e9…) -> 0.1 (39e772fc2670…)
564- ``gobject-introspection`` 1.78.1 -> 1.80.1
565- ``gptfdisk`` 1.0.9 -> 1.0.10
566- ``gsettings-desktop-schemas`` 46.0 -> 47.1
567- ``gst-devtools`` 1.22.12 -> 1.24.6
568- ``gstreamer1.0`` 1.22.12 -> 1.24.6
569- ``gstreamer1.0-libav`` 1.22.12 -> 1.24.6
570- ``gstreamer1.0-plugins-bad`` 1.22.12 -> 1.24.6
571- ``gstreamer1.0-plugins-base`` 1.22.12 -> 1.24.6
572- ``gstreamer1.0-plugins-good`` 1.22.12 -> 1.24.6
573- ``gstreamer1.0-plugins-ugly`` 1.22.12 -> 1.24.6
574- ``gstreamer1.0-python`` 1.22.12 -> 1.24.6
575- ``gstreamer1.0-rtsp-server`` 1.22.12 -> 1.24.6
576- ``gstreamer1.0-vaapi`` 1.22.12 -> 1.24.6
577- ``gtk+3`` 3.24.41 -> 3.24.43
578- ``gtk-doc`` 1.33.2 -> 1.34.0
579- ``gtk4`` 4.14.1 -> 4.16.0
580- ``harfbuzz`` 8.3.0 -> 9.0.0
581- ``hicolor-icon-theme`` 0.17 -> 0.18
582- ``hwlatdetect`` 2.6 -> 2.7
583- ``icu`` 74-2 -> 75-1
584- ``ifupdown`` 0.8.41 -> 0.8.43
585- ``iproute2`` 6.7.0 -> 6.10.0
586- ``iputils`` 20240117 -> 20240905
587- ``iw`` 6.7 -> 6.9
588- ``json-glib`` 1.8.0 -> 1.10.0
589- ``kea`` 2.4.1 -> 2.6.1
590- ``kexec-tools`` 2.0.28 -> 2.0.29
591- ``kmod`` 31 -> 33
592- ``kmscube`` 0.0.1+git (6ab022fdfcfe…) -> 0.0.1+git (467e86c5cbeb…)
593- ``less`` 643 -> 661
594- ``libadwaita`` 1.5.2 -> 1.6.0
595- ``libassuan`` 2.5.6 -> 3.0.1
596- ``libbsd`` 0.12.1 -> 0.12.2
597- ``libcap`` 2.69 -> 2.70
598- ``libcomps`` 0.1.20 -> 0.1.21
599- ``libdnf`` 0.73.2 -> 0.73.3
600- ``libdrm`` 2.4.120 -> 2.4.123
601- ``libedit`` 20230828-3.1 -> 20240808-3.1
602- ``libevdev`` 1.13.1 -> 1.13.2
603- ``libfontenc`` 1.1.7 -> 1.1.8
604- ``libgcc`` 13.3.0 -> 14.2.0
605- ``libgcc-initial`` 13.3.0 -> 14.2.0
606- ``libgcrypt`` 1.10.3 -> 1.11.0
607- ``libgfortran`` 13.3.0 -> 14.2.0
608- ``libgit2`` 1.7.2 -> 1.8.1
609- ``libgpg-error`` 1.48 -> 1.50
610- ``libical`` 3.0.17 -> 3.0.18
611- ``libinput`` 1.25.0 -> 1.26.1
612- ``libjitterentropy`` 3.4.1 -> 3.5.0
613- ``libksba`` 1.6.6 -> 1.6.7
614- ``libnl`` 3.9.0 -> 3.10.0
615- ``libpam`` 1.5.3 -> 1.6.1
616- ``libpcap`` 1.10.4 -> 1.10.5
617- ``libpciaccess`` 0.18 -> 0.18.1
618- ``libpcre2`` 10.43 -> 10.44
619- ``libpng`` 1.6.42 -> 1.6.43
620- ``libportal`` 0.7.1 -> 0.8.1
621- ``libproxy`` 0.5.4 -> 0.5.8
622- ``librepo`` 1.17.0 -> 1.18.1
623- ``librsvg`` 2.57.1 -> 2.58.2
624- ``libsdl2`` 2.30.1 -> 2.30.7
625- ``libslirp`` 4.7.0 -> 4.8.0
626- ``libsolv`` 0.7.28 -> 0.7.30
627- ``libsoup`` 3.4.4 -> 3.6.0
628- ``libstd-rs`` 1.75.0 -> 1.79.0
629- ``libtirpc`` 1.3.4 -> 1.3.5
630- ``libtool`` 2.4.7 -> 2.5.2
631- ``libtool-cross`` 2.4.7 -> 2.5.2
632- ``libtool-native`` 2.4.7 -> 2.5.2
633- ``libtraceevent`` 1.7.3 -> 1.8.3
634- ``liburcu`` 0.14.0 -> 0.14.1
635- ``liburi-perl`` 5.27 -> 5.28
636- ``libva`` 2.20.0 -> 2.22.0
637- ``libva-initial`` 2.20.0 -> 2.22.0
638- ``libva-utils`` 2.20.1 -> 2.22.0
639- ``libwebp`` 1.3.2 -> 1.4.0
640- ``libwpe`` 1.14.2 -> 1.16.0
641- ``libx11`` 1.8.9 -> 1.8.10
642- ``libxcb`` 1.16 -> 1.17.0
643- ``libxdmcp`` 1.1.4 -> 1.1.5
644- ``libxfont2`` 2.0.6 -> 2.0.7
645- ``libxkbcommon`` 1.6.0 -> 1.7.0
646- ``libxml2`` 2.12.8 -> 2.13.3
647- ``libxmlb`` 0.3.15 -> 0.3.19
648- ``libxmu`` 1.1.4 -> 1.2.1
649- ``libxslt`` 1.1.39 -> 1.1.42
650- ``libxtst`` 1.2.4 -> 1.2.5
651- ``lighttpd`` 1.4.74 -> 1.4.76
652- ``linux-firmware`` 20240312 -> 20240909
653- ``linux-libc-headers`` 6.6 -> 6.10
654- ``linux-yocto`` 6.6.35+git -> 6.6.50+git, 6.10.8+git
655- ``linux-yocto-dev`` 6.9+git -> 6.11+git
656- ``linux-yocto-rt`` 6.6.35+git -> 6.6.50+git, 6.10.8+git
657- ``linux-yocto-tiny`` 6.6.35+git -> 6.6.50+git, 6.10.8+git
658- ``llvm`` 18.1.6 -> 18.1.8
659- ``logrotate`` 3.21.0 -> 3.22.0
660- ``ltp`` 20240129 -> 20240524
661- ``lttng-modules`` 2.13.12 -> 2.13.14
662- ``lttng-tools`` 2.13.13 -> 2.13.14
663- ``lua`` 5.4.6 -> 5.4.7
664- ``lz4`` 1.9.4 -> 1.10.0
665- ``lzip`` 1.24 -> 1.24.1
666- ``man-db`` 2.12.0 -> 2.12.1
667- ``man-pages`` 6.06 -> 6.9.1
668- ``mc`` 4.8.31 -> 4.8.32
669- ``mdadm`` 4.2 -> 4.3
670- ``meson`` 1.3.1 -> 1.5.1
671- ``mkfontscale`` 1.2.2 -> 1.2.3
672- ``mmc-utils`` 0.1+git (b5ca140312d2…) -> 0.1+git (123fd8b2ac39…)
673- ``mpg123`` 1.32.6 -> 1.32.7
674- ``msmtp`` 1.8.25 -> 1.8.26
675- ``mtd-utils`` 2.1.6 -> 2.2.0
676- ``mtdev`` 1.1.6 -> 1.1.7
677- ``mtools`` 4.0.43 -> 4.0.44
678- ``musl`` 1.2.4+git -> 1.2.5+git
679- ``nativesdk-libtool`` 2.4.7 -> 2.5.2
680- ``ncurses`` 6.4 -> 6.5
681- ``nettle`` 3.9.1 -> 3.10
682- ``nfs-utils`` 2.6.4 -> 2.7.1
683- ``nghttp2`` 1.61.0 -> 1.63.0
684- ``ninja`` 1.11.1 -> 1.12.1
685- ``npth`` 1.6 -> 1.7
686- ``ofono`` 2.4 -> 2.10
687- ``opensbi`` 1.4 -> 1.5.1
688- ``openssh`` 9.6p1 -> 9.8p1
689- ``openssl`` 3.2.3 -> 3.3.1
690- ``opkg`` 0.6.3 -> 0.7.0
691- ``opkg-utils`` 0.6.3 -> 0.7.0
692- ``ovmf`` edk2-stable202402 -> edk2-stable202408
693- ``p11-kit`` 0.25.3 -> 0.25.5
694- ``pango`` 1.52.1 -> 1.54.0
695- ``pciutils`` 3.11.1 -> 3.13.0
696- ``perl`` 5.38.2 -> 5.40.0
697- ``perlcross`` 1.5.2 -> 1.6
698- ``piglit`` 1.0+gitr (22eaf6a91cfd…) -> 1.0+gitr (c11c9374c144…)
699- ``pinentry`` 1.2.1 -> 1.3.1
700- ``pkgconf`` 2.1.1 -> 2.3.0
701- ``psmisc`` 23.6 -> 23.7
702- ``ptest-runner`` 2.4.4+git -> 2.4.5+git
703- ``puzzles`` 0.0+git (80aac3104096…) -> 0.0+git (1c1899ee1c4e…)
704- ``python3-alabaster`` 0.7.16 -> 1.0.0
705- ``python3-attrs`` 23.2.0 -> 24.2.0
706- ``python3-babel`` 2.14.0 -> 2.16.0
707- ``python3-bcrypt`` 4.1.2 -> 4.2.0
708- ``python3-beartype`` 0.17.2 -> 0.18.5
709- ``python3-build`` 1.1.1 -> 1.2.1
710- ``python3-certifi`` 2024.2.2 -> 2024.8.30
711- ``python3-cffi`` 1.16.0 -> 1.17.0
712- ``python3-cryptography`` 42.0.5 -> 42.0.8
713- ``python3-cryptography-vectors`` 42.0.5 -> 42.0.8
714- ``python3-cython`` 3.0.8 -> 3.0.11
715- ``python3-dbusmock`` 0.31.1 -> 0.32.1
716- ``python3-docutils`` 0.20.1 -> 0.21.2
717- ``python3-dtschema`` 2024.2 -> 2024.5
718- ``python3-git`` 3.1.42 -> 3.1.43
719- ``python3-hatchling`` 1.21.1 -> 1.25.0
720- ``python3-hypothesis`` 6.98.15 -> 6.111.2
721- ``python3-idna`` 3.7 -> 3.8
722- ``python3-jsonpointer`` 2.4 -> 3.0.0
723- ``python3-jsonschema`` 4.21.1 -> 4.23.0
724- ``python3-libarchive-c`` 5.0 -> 5.1
725- ``python3-license-expression`` 30.2.0 -> 30.3.1
726- ``python3-lxml`` 5.0.0 -> 5.3.0
727- ``python3-mako`` 1.3.2 -> 1.3.5
728- ``python3-markdown`` 3.5.2 -> 3.6
729- ``python3-maturin`` 1.4.0 -> 1.7.1
730- ``python3-meson-python`` 0.15.0 -> 0.16.0
731- ``python3-more-itertools`` 10.2.0 -> 10.4.0
732- ``python3-packaging`` 23.2 -> 24.1
733- ``python3-pbr`` 6.0.0 -> 6.1.0
734- ``python3-pip`` 24.0 -> 24.2
735- ``python3-pluggy`` 1.4.0 -> 1.5.0
736- ``python3-psutil`` 5.9.8 -> 6.0.0
737- ``python3-pyasn1`` 0.5.1 -> 0.6.0
738- ``python3-pycairo`` 1.26.0 -> 1.26.1
739- ``python3-pycparser`` 2.21 -> 2.22
740- ``python3-pyelftools`` 0.30 -> 0.31
741- ``python3-pygments`` 2.17.2 -> 2.18.0
742- ``python3-pygobject`` 3.46.0 -> 3.48.2
743- ``python3-pyopenssl`` 24.0.0 -> 24.2.1
744- ``python3-pyparsing`` 3.1.1 -> 3.1.4
745- ``python3-pyproject-metadata`` 0.7.1 -> 0.8.0
746- ``python3-pytest`` 8.0.2 -> 8.3.2
747- ``python3-pytest-subtests`` 0.11.0 -> 0.13.1
748- ``python3-pyyaml`` 6.0.1 -> 6.0.2
749- ``python3-referencing`` 0.33.0 -> 0.35.1
750- ``python3-requests`` 2.31.0 -> 2.32.3
751- ``python3-rpds-py`` 0.18.0 -> 0.20.0
752- ``python3-scons`` 4.6.0 -> 4.8.0
753- ``python3-setuptools`` 69.1.1 -> 72.1.0
754- ``python3-setuptools-rust`` 1.9.0 -> 1.10.1
755- ``python3-setuptools-scm`` 8.0.4 -> 8.1.0
756- ``python3-sphinx`` 7.2.6 -> 8.0.2
757- ``python3-sphinxcontrib-applehelp`` 1.0.8 -> 2.0.0
758- ``python3-sphinxcontrib-devhelp`` 1.0.6 -> 2.0.0
759- ``python3-sphinxcontrib-htmlhelp`` 2.0.5 -> 2.1.0
760- ``python3-sphinxcontrib-qthelp`` 1.0.7 -> 2.0.0
761- ``python3-sphinxcontrib-serializinghtml`` 1.1.10 -> 2.0.0
762- ``python3-testtools`` 2.7.1 -> 2.7.2
763- ``python3-trove-classifiers`` 2024.2.23 -> 2024.7.2
764- ``python3-typing-extensions`` 4.10.0 -> 4.12.2
765- ``python3-uritools`` 4.0.2 -> 4.0.3
766- ``python3-urllib3`` 2.2.1 -> 2.2.2
767- ``python3-webcolors`` 1.13 -> 24.8.0
768- ``python3-websockets`` 12.0 -> 13.0.1
769- ``python3-wheel`` 0.42.0 -> 0.44.0
770- ``python3-zipp`` 3.17.0 -> 3.20.1
771- ``qemu`` 8.2.3 -> 9.0.2
772- ``qemu-native`` 8.2.3 -> 9.0.2
773- ``qemu-system-native`` 8.2.3 -> 9.0.2
774- ``quilt`` 0.67 -> 0.68
775- ``quilt-native`` 0.67 -> 0.68
776- ``readline`` 8.2 -> 8.2.13
777- ``repo`` 2.42 -> 2.46
778- ``rng-tools`` 6.16 -> 6.17
779- ``rpcbind`` 1.2.6 -> 1.2.7
780- ``rsync`` 3.2.7 -> 3.3.0
781- ``rt-tests`` 2.6 -> 2.7
782- ``ruby`` 3.2.2 -> 3.3.4
783- ``rust`` 1.75.0 -> 1.79.0
784- ``rust-cross-canadian`` 1.75.0 -> 1.79.0
785- ``rust-llvm`` 1.75.0 -> 1.79.0
786- ``shaderc`` 2023.8 -> 2024.1
787- ``shadow`` 4.14.2 -> 4.16.0
788- ``spirv-headers`` 1.3.275.0 -> 1.3.290.0
789- ``spirv-tools`` 1.3.275.0 -> 1.3.290.0
790- ``sqlite3`` 3.45.1 -> 3.46.1
791- ``strace`` 6.7 -> 6.10
792- ``stress-ng`` 0.17.05 -> 0.18.02
793- ``sysklogd`` 2.5.2 -> 2.6.1
794- ``sysstat`` 12.7.5 -> 12.7.6
795- ``systemd`` 255.4 -> 256.5
796- ``systemd-boot`` 255.4 -> 256.5
797- ``systemd-boot-native`` 255.4 -> 256.5
798- ``systemtap`` 5.0 -> 5.1
799- ``systemtap-native`` 5.0 -> 5.1
800- ``taglib`` 2.0.1 -> 2.0.2
801- ``tcl`` 8.6.13 -> 8.6.14
802- ``texinfo`` 7.0.3 -> 7.1
803- ``ttyrun`` 2.31.0 -> 2.34.0
804- ``u-boot`` 2024.01 -> 2024.07
805- ``u-boot-tools`` 2024.01 -> 2024.07
806- ``util-linux`` 2.39.3 -> 2.40.2
807- ``util-linux-libuuid`` 2.39.3 -> 2.40.2
808- ``util-macros`` 1.20.0 -> 1.20.1
809- ``vala`` 0.56.15 -> 0.56.17
810- ``valgrind`` 3.22.0 -> 3.23.0
811- ``vte`` 0.74.2 -> 0.76.3
812- ``vulkan-headers`` 1.3.275.0 -> 1.3.290.0
813- ``vulkan-loader`` 1.3.275.0 -> 1.3.290.0
814- ``vulkan-samples`` git (2307c3eb5608…) -> git (fdce530c0295…)
815- ``vulkan-tools`` 1.3.275.0 -> 1.3.290.0
816- ``vulkan-utility-libraries`` 1.3.275.0 -> 1.3.290.0
817- ``vulkan-validation-layers`` 1.3.275.0 -> 1.3.290.0
818- ``vulkan-volk`` 1.3.275.0 -> 1.3.290.0
819- ``waffle`` 1.7.2 -> 1.8.1
820- ``wayland`` 1.22.0 -> 1.23.1
821- ``wayland-protocols`` 1.33 -> 1.37
822- ``webkitgtk`` 2.44.1 -> 2.44.3
823- ``weston`` 13.0.1 -> 13.0.3
824- ``wget`` 1.21.4 -> 1.24.5
825- ``wpa-supplicant`` 2.10 -> 2.11
826- ``x264`` r3039+git (baee400fa9ce…) -> r3039+git (31e19f92f00c…)
827- ``xauth`` 1.1.2 -> 1.1.3
828- ``xcb-proto`` 1.16.0 -> 1.17.0
829- ``xev`` 1.2.5 -> 1.2.6
830- ``xkeyboard-config`` 2.41 -> 2.42
831- ``xmlto`` 0.0.28+0.0.29+git -> 0.0.29
832- ``xorgproto`` 2023.2 -> 2024.1
833- ``xwayland`` 23.2.5 -> 24.1.2
834- ``xz`` 5.4.6 -> 5.6.2
835- ``zstd`` 1.5.5 -> 1.5.6
836
837
838Contributors to 5.1
839~~~~~~~~~~~~~~~~~~~
840
841Thanks to the following people who contributed to this release:
842
843- Adithya Balakumar
844- Adriaan Schmidt
845- Adrian Freihofer
846- Alban Bedel
847- Alejandro Hernandez Samaniego
848- Aleksandar Nikolic
849- Alessandro Pecugi
850- Alexander Kanavin
851- Alexander Sverdlin
852- Alexandre Belloni
853- Alexandre Truong
854- Alexis Lothoré
855- Andrew Fernandes
856- Andrew Oppelt
857- Andrey Zhizhikin
858- Anton Almqvist
859- Antonin Godard
860- Anuj Mittal
861- Archana Polampalli
862- Bartosz Golaszewski
863- Benjamin Bara
864- Benjamin Szőke
865- Bruce Ashfield
866- Carlos Alberto Lopez Perez
867- Changhyeok Bae
868- Changqing Li
869- Chen Qi
870- Chris Laplante
871- Chris Spencer
872- Christian Bräuner Sørensen
873- Christian Lindeberg
874- Christian Taedcke
875- Clara Kowalsky
876- Clément Péron
877- Colin McAllister
878- Corentin Lévy
879- Daniel Klauer
880- Daniel Semkowicz
881- Daniil Batalov
882- Dan McGregor
883- Deepesh Varatharajan
884- Deepthi Hemraj
885- Denys Dmytriyenko
886- Divya Chellam
887- Dmitry Baryshkov
888- Emil Kronborg
889- Enguerrand de Ribaucourt
890- Enrico Jörns
891- Esben Haabendal
892- Etienne Cordonnier
893- Fabio Estevam
894- Felix Nilsson
895- Florian Amstutz
896- Gassner, Tobias.ext
897- Gauthier HADERER
898- Guðni Már Gilbert
899- Harish Sadineni
900- Heiko Thole
901- Het Patel
902- Hongxu Jia
903- Igor Opaniuk
904- Intaek Hwang
905- Iskander Amara
906- Jaeyoon Jung
907- Jan Vermaete
908- Jasper Orschulko
909- Joe Slater
910- Johannes Schneider
911- John Ripple
912- Jonas Gorski
913- Jonas Munsin
914- Jonathan GUILLOT
915- Jon Mason
916- Jookia
917- Jordan Crouse
918- Jörg Sommer
919- Jose Quaresma
920- Joshua Watt
921- Julien Stephan
922- Kai Kang
923- Kari Sivonen
924- Khem Raj
925- Kirill Yatsenko
926- Konrad Weihmann
927- Lee Chee Yang
928- Lei Maohui
929- Leon Anavi
930- Leonard Göhrs
931- Louis Rannou
932- Marc Ferland
933- Marcus Folkesson
934- Marek Vasut
935- Mark Hatle
936- Markus Volk
937- Marlon Rodriguez Garcia
938- Marta Rybczynska
939- Martin Hundebøll
940- Martin Jansa
941- Matthew Bullock
942- Matthias Pritschet
943- Maxin B. John
944- Michael Glembotzki
945- Michael Haener
946- Michael Halstead
947- Michael Opdenacker
948- Michal Sieron
949- Mikko Rapeli
950- Mingli Yu
951- Naveen Saini
952- Niko Mauno
953- Ninette Adhikari
954- Noe Galea
955- Ola x Nilsson
956- Oleksandr Hnatiuk
957- Otavio Salvador
958- Patrick Wicki
959- Paul Barker
960- Paul Eggleton
961- Paul Gerber
962- Pedro Ferreira
963- Peter Kjellerstedt
964- Peter Marko
965- Philip Lorenz
966- Poonam Jadhav
967- Primoz Fiser
968- Quentin Schulz
969- Ralph Siemsen
970- Rasmus Villemoes
971- Ricardo Simoes
972- Richard Purdie
973- Robert Joslyn
974- Robert Kovacsics
975- Robert Yang
976- Ross Burton
977- Rudolf J Streif
978- Ryan Eatmon
979- Sabeeh Khan
980- Sakib Sajal
981- Samantha Jalabert
982- Siddharth Doshi
983- simit.ghane
984- Simone Weiß
985- Soumya Sambu
986- Sreejith Ravi
987- Stefan Mueller-Klieser
988- Sundeep KOKKONDA
989- Sven Schwermer
990- Teresa Remmet
991- Theodore A. Roth
992- Thomas Perrot
993- Tim Orling
994- Tom Hochstein
995- Trevor Gamblin
996- Troels Dalsgaard Hoffmeyer
997- Tronje Krabbe
998- Ulrich Ölmann
999- Victor Kamensky
1000- Vijay Anusuri
1001- Vincent Kriek
1002- Vivek Puar
1003- Wadim Egorov
1004- Wang Mingyu
1005- Weisser, Pascal.ext
1006- Willy Tu
1007- Xiangyu Chen
1008- Yang-Mark Zhang
1009- Yash Shinde
1010- Yi Zhao
1011- Yoann Congal
1012- Yogita Urade
1013- Yuri D'Elia
1014- Zahir Hussain
1015- Zev Weiss
1016- Zoltan Boszormenyi
1017
1018
1019Repositories / Downloads for Yocto-5.1
1020~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1021
1022poky
1023
1024- Repository Location: :yocto_git:`/poky`
1025- Branch: :yocto_git:`styhead </poky/log/?h=styhead>`
1026- Tag: :yocto_git:`yocto-5.1 </poky/log/?h=yocto-5.1>`
1027- Git Revision: :yocto_git:`8f01ae5c7cba251ed25c80f0141a950ebc8a5f73 </poky/commit/?id=8f01ae5c7cba251ed25c80f0141a950ebc8a5f73>`
1028- Release Artefact: poky-8f01ae5c7cba251ed25c80f0141a950ebc8a5f73
1029- sha: 91f5b2bc8a2be153ac2c358aa8ad71737b4f91e83d2c3ed1aac4f5f087991769
1030- Download Locations:
1031 http://downloads.yoctoproject.org/releases/yocto/yocto-5.1/poky-8f01ae5c7cba251ed25c80f0141a950ebc8a5f73.tar.bz2
1032 http://mirrors.kernel.org/yocto/yocto/yocto-5.1/poky-8f01ae5c7cba251ed25c80f0141a950ebc8a5f73.tar.bz2
1033
1034openembedded-core
1035
1036- Repository Location: :oe_git:`/openembedded-core`
1037- Branch: :oe_git:`styhead </openembedded-core/log/?h=styhead>`
1038- Tag: :oe_git:`yocto-5.1 </openembedded-core/log/?h=yocto-5.1>`
1039- Git Revision: :oe_git:`161c5b311f1aeb8f254dca96331b31d5b67fc92d </openembedded-core/commit/?id=161c5b311f1aeb8f254dca96331b31d5b67fc92d>`
1040- Release Artefact: oecore-161c5b311f1aeb8f254dca96331b31d5b67fc92d
1041- sha: 7b8ea61a3b811556f40b0912ee22b3ef37bccead1d65fb7e1c35a47aff4ca718
1042- Download Locations:
1043 http://downloads.yoctoproject.org/releases/yocto/yocto-5.1/oecore-161c5b311f1aeb8f254dca96331b31d5b67fc92d.tar.bz2
1044 http://mirrors.kernel.org/yocto/yocto/yocto-5.1/oecore-161c5b311f1aeb8f254dca96331b31d5b67fc92d.tar.bz2
1045
1046meta-mingw
1047
1048- Repository Location: :yocto_git:`/meta-mingw`
1049- Branch: :yocto_git:`styhead </meta-mingw/log/?h=styhead>`
1050- Tag: :yocto_git:`yocto-5.1 </meta-mingw/log/?h=yocto-5.1>`
1051- Git Revision: :yocto_git:`4ac6cbfdce1f85294bd54bcd8b074f7ef32c378f </meta-mingw/commit/?id=4ac6cbfdce1f85294bd54bcd8b074f7ef32c378f>`
1052- Release Artefact: meta-mingw-4ac6cbfdce1f85294bd54bcd8b074f7ef32c378f
1053- sha: 7759361e141654cc84aad486ad36a9ddaf7ee47feebe2cc6dca3175f1922b7c4
1054- Download Locations:
1055 http://downloads.yoctoproject.org/releases/yocto/yocto-5.1/meta-mingw-4ac6cbfdce1f85294bd54bcd8b074f7ef32c378f.tar.bz2
1056 http://mirrors.kernel.org/yocto/yocto/yocto-5.1/meta-mingw-4ac6cbfdce1f85294bd54bcd8b074f7ef32c378f.tar.bz2
1057
1058bitbake
1059
1060- Repository Location: :oe_git:`/bitbake`
1061- Branch: :oe_git:`2.10 </bitbake/log/?h=2.10>`
1062- Tag: :oe_git:`yocto-5.1 </bitbake/log/?h=yocto-5.1>`
1063- Git Revision: :oe_git:`d3c84198771b7f79aa84dc73061d8ca071fe18f3 </bitbake/commit/?id=d3c84198771b7f79aa84dc73061d8ca071fe18f3>`
1064- Release Artefact: bitbake-d3c84198771b7f79aa84dc73061d8ca071fe18f3
1065- sha: 4b64120f26878a661d1aaf0b0bb5009a21614e2db0649c728cc9d4c16b1050b6
1066- Download Locations:
1067 http://downloads.yoctoproject.org/releases/yocto/yocto-5.1/bitbake-d3c84198771b7f79aa84dc73061d8ca071fe18f3.tar.bz2
1068 http://mirrors.kernel.org/yocto/yocto/yocto-5.1/bitbake-d3c84198771b7f79aa84dc73061d8ca071fe18f3.tar.bz2
1069
1070yocto-docs
1071
1072- Repository Location: :yocto_git:`/yocto-docs`
1073- Branch: :yocto_git:`styhead </yocto-docs/log/?h=styhead>`
1074- Tag: :yocto_git:`yocto-5.1 </yocto-docs/log/?h=yocto-5.1>`
1075- Git Revision: :yocto_git:`c32b55b3403dcfd76a4694ff407d4b513e14c8f4 </yocto-docs/commit/?id=c32b55b3403dcfd76a4694ff407d4b513e14c8f4>`
1076
diff --git a/documentation/migration-guides/release-notes-5.2.1.rst b/documentation/migration-guides/release-notes-5.2.1.rst
new file mode 100644
index 0000000000..2b223cff17
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.2.1.rst
@@ -0,0 +1,161 @@
1Release notes for Yocto-5.2.1 (Walnascar)
2-----------------------------------------
3
4Security Fixes in Yocto-5.2.1
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- connman :Fix :cve_nist:`2025-32366` and :cve_nist:`2025-32743`
8- ffmpeg: Fix :cve_nist:`2025-22921`
9- go: Fix :cve_nist:`2025-22871` and CVE-2025-22873
10- iputils: Fix :cve_nist:`2025-47268`
11- libsoup-2.4: Fix :cve_nist:`2024-52532` and :cve_nist:`2025-32911`
12- libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415`
13- openssh: Fix :cve_nist:`2025-32728`
14- perl: Fix :cve_nist:`2024-56406`
15- qemu: Ignore :cve_nist:`2023-1386`
16- ruby: Fix :cve_nist:`2025-27219`, :cve_nist:`2025-27220` and :cve_nist:`2025-27221`
17- webkitgtk: Fix :cve_nist:`2024-54551`, :cve_nist:`2025-24208`, :cve_nist:`2025-24209`,
18 :cve_nist:`2025-24213`, :cve_nist:`2025-24216`, :cve_nist:`2025-24264` and :cve_nist:`2025-30427`
19
20
21Fixes in Yocto-5.2.1
22~~~~~~~~~~~~~~~~~~~~
23
24- binutils: stable 2.44 branch updates
25- bluez5: add missing tools to noinst-tools package
26- build-appliance-image: Update to walnascar head revision
27- buildtools-tarball: Make buildtools respects host CA certificates
28- buildtools-tarball: add envvars into :term:`BB_ENV_PASSTHROUGH_ADDITIONS`
29- buildtools-tarball: move setting of envvars to respective envfile
30- cdrtools-native: fix booting EFI ISO live failed
31- contributor-guide/submit-changes: encourage patch version changelogs
32- gcc: Fix LDRD register overlap in register-indexed mode
33- glibc-y2038-tests: remove glibc-y2038-tests_2.41.bb recipe
34- glibc: Add single-threaded fast path to rand()
35- glibc: stable 2.41 branch update
36- go: upgrade to 1.24.3
37- gobject-introspection: Fix wrong :term:`PN` used in MULTILIB_SCRIPTS
38- icu: set ac_cv_path_install to ensure install tool reproducibility
39- initscripts: add function log_success_msg/log_failure_msg/log_warning_msg
40- insane.bbclass: Move test for invalid PACKAGECONFIGs to do_recipe_qa
41- insane.bbclass: Report all invalid PACKAGECONFIGs for a recipe at once
42- libxml2: upgrade to 2.13.8
43- makedumpfile: upgrade to 1.7.7
44- migration-guides: add release notes for 4.0.26 and 5.0.9
45- module.bbclass: add KBUILD_EXTRA_SYMBOLS to install
46- patch.py: set commituser and commitemail for addNote
47- perl: upgrade to 5.40.2
48- perlcross: upgrade to 1.6.2
49- poky.conf: bump version for 5.2.1
50- ref-manual/release-process: update releases.svg
51- ref-manual/variables.rst: document :term:`WIC_CREATE_EXTRA_ARGS`
52- ref-manual/variables.rst: update :term:`ROOT_HOME` documentation
53- ref-manual: classes: uki: Fix git links
54- ref-manual: kernel-fitimage.bbclass does not use :term:`SPL_SIGN_KEYNAME`
55- ruby: upgrade to 3.4.3
56- sbom.rst: how to disable :term:`SPDX` generation
57- scripts/install-buildtools: Update to 5.2
58- sphinx-lint: various fixes
59- syslinux: improve isohybrid to process extra sector count for ISO 9660 image
60- test-manual/intro: remove Buildbot version used
61- tzdata/tzcode-native: upgrade to 2025b
62- webkitgtk: Use WTF_CPU_UNKNOWN when building for riscv64
63- webkitgtk: upgrade to 2.48.1
64
65
66Known Issues in Yocto-5.2.1
67~~~~~~~~~~~~~~~~~~~~~~~~~~~
68
69- N/A
70
71
72Contributors to Yocto-5.2.1
73~~~~~~~~~~~~~~~~~~~~~~~~~~~
74
75- Adrian Freihofer
76- Aleksandar Nikolic
77- Alon Bar-Lev
78- Antonin Godard
79- Archana Polampalli
80- Changqing Li
81- Deepesh Varatharajan
82- Divya Chellam
83- Enrico Jörns
84- Guðni Már Gilbert
85- Haixiao Yan
86- Hongxu Jia
87- Jiaying Song
88- Khem Raj
89- Lee Chee Yang
90- Leonard Anderweit
91- Madhu Marri
92- Mikko Rapeli
93- Peter Kjellerstedt
94- Peter Marko
95- Praveen Kumar
96- Priyal Doshi
97- Steve Sakoman
98- Trevor Woerner
99- Yi Zhao
100- Yogita Urade
101- rajmohan r
102
103
104Repositories / Downloads for Yocto-5.2.1
105~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
106
107poky
108
109- Repository Location: :yocto_git:`/poky`
110- Branch: :yocto_git:`walnascar </poky/log/?h=walnascar>`
111- Tag: :yocto_git:`yocto-5.2.1 </poky/log/?h=yocto-5.2.1>`
112- Git Revision: :yocto_git:`fd9b605507a20d850a9991316cd190c1d20dc4a6 </poky/commit/?id=fd9b605507a20d850a9991316cd190c1d20dc4a6>`
113- Release Artefact: poky-fd9b605507a20d850a9991316cd190c1d20dc4a6
114- sha: 0234a96fc28e60e0acaae2a03118ecde76810c47e8bb259f4950492bd75fc050
115- Download Locations:
116 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2.1/poky-fd9b605507a20d850a9991316cd190c1d20dc4a6.tar.bz2
117 https://mirrors.kernel.org/yocto/yocto/yocto-5.2.1/poky-fd9b605507a20d850a9991316cd190c1d20dc4a6.tar.bz2
118
119openembedded-core
120
121- Repository Location: :oe_git:`/openembedded-core`
122- Branch: :oe_git:`walnascar </openembedded-core/log/?h=walnascar>`
123- Tag: :oe_git:`yocto-5.2.1 </openembedded-core/log/?h=yocto-5.2.1>`
124- Git Revision: :oe_git:`17affdaa600896282e07fb4d64cb23195673baa1 </openembedded-core/commit/?id=17affdaa600896282e07fb4d64cb23195673baa1>`
125- Release Artefact: oecore-17affdaa600896282e07fb4d64cb23195673baa1
126- sha: b6c3c15004fcd1efbaa26c9695202806402730dde8e41552a70140cff67c97c9
127- Download Locations:
128 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2.1/oecore-17affdaa600896282e07fb4d64cb23195673baa1.tar.bz2
129 https://mirrors.kernel.org/yocto/yocto/yocto-5.2.1/oecore-17affdaa600896282e07fb4d64cb23195673baa1.tar.bz2
130
131meta-mingw
132
133- Repository Location: :yocto_git:`/meta-mingw`
134- Branch: :yocto_git:`walnascar </meta-mingw/log/?h=walnascar>`
135- Tag: :yocto_git:`yocto-5.2.1 </meta-mingw/log/?h=yocto-5.2.1>`
136- Git Revision: :yocto_git:`edce693e1b8fabd84651aa6c0888aafbcf238577 </meta-mingw/commit/?id=edce693e1b8fabd84651aa6c0888aafbcf238577>`
137- Release Artefact: meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577
138- sha: 6cfed41b54f83da91a6cf201ec1c2cd4ac284f642b1268c8fa89d2335ea2bce1
139- Download Locations:
140 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2.1/meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577.tar.bz2
141 https://mirrors.kernel.org/yocto/yocto/yocto-5.2.1/meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577.tar.bz2
142
143bitbake
144
145- Repository Location: :oe_git:`/bitbake`
146- Branch: :oe_git:`2.12 </bitbake/log/?h=2.12>`
147- Tag: :oe_git:`yocto-5.2.1 </bitbake/log/?h=yocto-5.2.1>`
148- Git Revision: :oe_git:`5b4e20377eea8d428edf1aeb2187c18f82ca6757 </bitbake/commit/?id=5b4e20377eea8d428edf1aeb2187c18f82ca6757>`
149- Release Artefact: bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757
150- sha: 48cff22c1e61f47adce474b636ca865e7e0b62293fc5c8829d09e7f1ac5252af
151- Download Locations:
152 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2.1/bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757.tar.bz2
153 https://mirrors.kernel.org/yocto/yocto/yocto-5.2.1/bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757.tar.bz2
154
155yocto-docs
156
157- Repository Location: :yocto_git:`/yocto-docs`
158- Branch: :yocto_git:`walnascar </yocto-docs/log/?h=walnascar>`
159- Tag: :yocto_git:`yocto-5.2.1 </yocto-docs/log/?h=yocto-5.2.1>`
160- Git Revision: :yocto_git:`6b7019c13054bf11fb16657a3fac85831352cea9 </yocto-docs/commit/?id=6b7019c13054bf11fb16657a3fac85831352cea9>`
161
diff --git a/documentation/migration-guides/release-notes-5.2.rst b/documentation/migration-guides/release-notes-5.2.rst
new file mode 100644
index 0000000000..5fc426c050
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.2.rst
@@ -0,0 +1,2300 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3.. |yocto-codename| replace:: walnascar
4.. |yocto-ver| replace:: 5.2
5
6Release notes for |yocto-ver| (|yocto-codename|)
7------------------------------------------------
8
9New Features / Enhancements in |yocto-ver|
10~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
11
12- Linux kernel 6.12, gcc 14.2, glibc 2.41, LLVM 19.1.7, and over 300 other
13 recipe upgrades.
14
15- Minimum Python version required on the host: 3.9.
16
17- New variables:
18
19 - ``linux-firmware``: Add the :term:`FIRMWARE_COMPRESSION` variable which
20 allows compression the firmwares provided by the ``linux-firmware`` recipe.
21 Possible values are ``xz`` and ``zst``.
22
23 - Reproducibility: Add the :term:`OEQA_REPRODUCIBLE_TEST_LEAF_TARGETS`
24 variable which enables a reproducibility test on recipes using
25 :ref:`Shared State <overview-manual/concepts:Shared State>` for the
26 dependencies. See :doc:`/test-manual/reproducible-builds`.
27
28 - ``systemd``: Add :term:`WATCHDOG_RUNTIME_SEC`: for controlling the
29 ``RuntimeWatchdogSec`` option in ``/etc/systemd/system.conf``.
30
31 - :term:`FIT_UBOOT_ENV` to allow including a u-boot script as a text in a
32 fit image. See the ``kernel-fitimage`` for more information.
33
34 - :ref:`ref-classes-meson`: :term:`MESON_INSTALL_TAGS` to allow passing
35 install tags (``--tags``) to the ``meson install`` command during the
36 :ref:`ref-tasks-install` task.
37
38 - :ref:`ref-classes-cve-check`: :term:`NVD_DB_VERSION` to allow choosing the
39 CVE feed when using the :ref:`ref-classes-cve-check` class.
40
41 - The :term:`BB_USE_HOME_NPMRC` controls whether or not BitBake uses the
42 user's ``.npmrc`` file within their home directory within the npm fetcher.
43 This can be used for authentication of private NPM registries, among other
44 uses.
45
46 - The :term:`GRUB_MKIMAGE_OPTS` can be used to control the flags to the
47 ``grub-mkimage`` command in the context of the GRUB recipe (``grub-efi``).
48
49 - The :term:`SPDX_PACKAGE_VERSION` variable controls the package version as
50 seen in the SPDX 3.0 JSON output (``software_packageVersion``).
51
52- Kernel-related changes:
53
54 - :ref:`ref-classes-cml1`: in :ref:`ref-tasks-diffconfig`, do not override
55 ``.config`` with ``.config.orig``. This applies to other recipes using the
56 class :ref:`ref-classes-cml1`.
57
58 - ``linux-firmware``: add following new firmware packages:
59
60 - ``qcom-qcm6490-audio``
61 - ``qcom-qcm6490-compute``
62 - ``qcom-adreno-a663``
63 - ``qcom-qcm6490-adreno``
64 - ``qcom-sa8775p-adreno``
65 - ``qcom-qcm6490-ipa``
66 - ``qcom-x1e80100-audio``
67 - ``qcom-qcs615-adreno``
68 - ``qcom-aic100``
69 - ``qcom-qdu100``
70 - ``qca-qca2066``
71 - ``qca-qca61x4-serial``
72 - ``qca-qca61x4-usb``
73 - ``qca-qca6390``
74 - ``qca-qca6698``
75 - ``qca-wcn3950``
76 - ``qca-wcn3988``
77 - ``qca-wcn399x``
78 - ``qca-wcn6750``
79 - ``qca-wcn7850``
80 - ``qcom-2-license``
81 - ``qcom-aic100``
82 - ``qcom-qcm6490-wifi``
83 - ``qcom-qdu100``
84 - ``qcom-sa8775p-audio``
85 - ``qcom-sa8775p-compute``
86 - ``qcom-sa8775p-generalpurpose``
87 - ``qcom-x1e80100-lenovo-t14s-g6-adreno``
88 - ``qcom-x1e80100-lenovo-t14s-g6-audio``
89 - ``qcom-x1e80100-lenovo-t14s-g6-compute``
90 - ``qcom-adreno-a623``
91 - ``qcom-qcs8300-adreno``
92 - ``qca-qca2066``
93 - ``qcom-adreno-a2xx``
94
95 - ``linux-firmware``: split ``amgpu``, ``ath10k``, ``ath11k`` and ``ath12k``
96 in separate packages.
97
98 - The :ref:`ref-classes-kernel-yocto` classes now supports in-tree
99 configuration fragments. These can be added with the
100 :term:`KERNEL_FEATURES` variable.
101
102 - Kernel configuration audit can now be disabled by setting
103 :term:`KMETA_AUDIT` to 1.
104
105 - The ``kern-tools`` recipe is now able to recognize files ending with
106 ``.config`` for :ref:`ref-classes-kernel-yocto`-based Kernel recipes.
107
108 - Support the LZMA compression algorithm in the
109 :ref:`ref-classes-kernel-uboot` class. This can be done by setting the
110 variable :term:`FIT_KERNEL_COMP_ALG` to ``lzma``.
111
112 - :ref:`ref-classes-kernel-yocto`: Reproducibility for commits created by
113 the :ref:`ref-classes-kernel-yocto` class was improved.
114
115 - ``kernel-arch``: add ``-fmacro-prefix-map`` in ``KERNEL_CC`` to fix a
116 reproducibility issue.
117
118- New core recipes:
119
120 - ``python3-pefile``: required for the :ref:`ref-classes-uki` class.
121
122 - Add initial support for the `Barebox <https://www.barebox.org>`__
123 bootloader, along with associated OEQA test cases. This adds the
124 ``barebox`` and the ``barebox-tools`` recipes.
125
126 - Import ``makedumpfile`` from meta-openembedded, as the ``kexec-tools``
127 recipe :term:`RDEPENDS` on it.
128
129 - The ``tcl-8`` recipe was added back to support the build of ``expect``.
130
131 - Add the ``libdisplay-info`` recipe, an EDID and DisplayID library,
132 required for Weston 14.0.1 and newer.
133
134 - The ``hwdata`` recipe was imported from :oe_git:`meta-openembedded
135 </meta-openembedded>`, a recipe for hardware identification and
136 configuration data, needed by ``libdisplay-info``.
137
138 - The ``cve-update-db-native`` was restored from kirkstone and can be used
139 to update the CVE National Vulnerability Database (NVD). Add support for
140 the FKIE-CAD (https://github.com/fkie-cad/nvd-json-data-feeds) CVE source
141 for it.
142
143 - The ``rpm-sequoia-crypto-policy`` to ship a crypto policy file for the
144 ``rpm-sequoia`` recipe.
145
146 - The ``libsass`` and ``sassc`` for the C/C++ port of the Sass CSS
147 pre-compiler, required by the ``libadwaita`` recipe.
148
149 - ``python3-roman-numerals-py``: module providing utilities for working with
150 well-formed Roman numerals. ``python3-sphinx`` relies on this recipe.
151
152 - The ``fastfloat`` recipe, a header-only library for fast number parsing.
153 This will be a dependency for the ``vte`` recipe in later versions.
154
155 - The ``avahi-libnss-mdns`` was renamed from ``libnss-mdns``.
156
157 - The ``cargo-c`` was renamed from ``cargo-c-native``.
158
159 - The ``tcl8`` recipe was added to support the failing build of ``expect``.
160 The ``tcl`` recipe (version 9) remains the main recipe for this component.
161
162 - The ``scdoc`` recipe is imported from
163 :oe_layerindex:`/layerindex/branch/master/layer/meta-wayland` to support
164 the generation of the man-pages of ``kdoc``.
165
166- New core classes:
167
168 - New :ref:`ref-classes-uki` class for building Unified Kernel Images (UKI).
169 Associated OEQA tests were also added for this class.
170
171 - New :ref:`ref-classes-cython` class for python recipes that require Cython
172 for their compilation. Existing recipes depending on Cython now inherit
173 this class. This class also strips potential build paths in the compilation
174 output for reproducibility.
175
176 - New :ref:`ref-classes-ptest-python-pytest` class to automatically
177 configure :ref:`ref-classes-ptest` for Python packages using the `pytest
178 <https://docs.pytest.org>`__ unit test framework.
179
180- Architecture-specific changes:
181
182 - ``tune-cortexa32``: set tune feature to ``armv8a``.
183
184 - Add the ``loongarch64`` architecture for the ``grub2`` and ``llvm``
185 recipes. It was also added to build with ``musl`` as the toolchain.
186
187- QEMU / ``runqemu`` changes:
188
189 - ``qemu/machine``: change the ``QEMU_EXTRAOPTIONS_${TUNE_PKGARCH}`` syntax
190 in QEMU machine definitions to ``QEMU_EXTRAOPTIONS:tune-${TUNE_PKGARCH}``
191 to follow the same patterns as other QEMU-related variables.
192
193- Documentation changes:
194
195 - Use ``rsvg`` as a replacement of ``inkscape`` to convert svg files in the
196 documentation.
197
198 - The ``cve`` role was replaced by ``cve_nist`` to avoid a conflict with
199 more recent version of Sphinx.
200
201 - New documentation on the multiconfig feature: :doc:`/dev-manual/multiconfig`.
202
203 - New documentation on ``bblock``: :doc:`/dev-manual/bblock`.
204
205- Go changes:
206
207 - The :ref:`ref-classes-go-mod` class now sets an internal variable
208 ``GO_MOD_CACHE_DIR`` to enable the use of the Go module fetchers for
209 downloading and unpacking module dependencies to the module cache.
210
211 - Make the :ref:`ref-tasks-compile` task run before
212 :ref:`ref-tasks-populate_lic` in the :ref:`ref-classes-go-mod` class so
213 license files are found by :ref:`ref-tasks-populate_lic` after the ``go
214 install`` command is run in :ref:`ref-tasks-compile`.
215
216- Rust changes:
217
218 - ``rust-target-config``: Update the data layout for the *x86-64* target, as
219 it was different in Rust from LLVM, which produced a data layout error.
220
221 - The :term:`PACKAGECONFIG_CONFARGS` value if now passed to the ``cargo
222 build`` command, which means that Rust recipes can now properly define
223 their :term:`PACKAGECONFIG` configuration.
224
225- Wic Image Creator changes:
226
227 - Allow the ``--exclude-path`` option to exclude symlinks.
228
229 - Add the variable :term:`WIC_SECTOR_SIZE` to control the sector size of Wic
230 images.
231
232 - ``bootimg-efi``: Support "+" symbol in filenames passed in
233 :term:`IMAGE_EFI_BOOT_FILES`.
234
235- SDK-related changes:
236
237 - Add support for ZST-compression through :term:`SDK_ARCHIVE_TYPE`, by
238 setting its value to ``tar.zst``.
239
240 - The ``debug-tweaks`` features were removed from ``-sdk`` images
241 (``core-image-*-sdk.bb``).
242
243 - Enable ``ipv6``, ``acl``, and ``xattr`` in :term:`DISTRO_FEATURES_NATIVESDK`.
244
245 - Toolchain SDKs (``meta-toolchain``) now properly supports the ``usrmerge``
246 feature (part of :term:`DISTRO_FEATURES`).
247
248 - The ``pipefail`` shell option is now added to the SDK installer script.
249
250- Testing-related changes:
251
252 - ``oeqa/postactions``: Fix archive retrieval from target.
253
254 - ``oeqa/selftest/gcc``: Fix kex exchange identification error.
255
256 - ``oeqa/utils/qemurunner``: support ignoring vt100 escape sequences.
257
258 - ``oeqa``: support passing custom boot patterns to runqemu.
259
260 - ``oeqa/selftest/cases``: add basic U-boot and Barebox tests.
261
262 - ``oeqa/selftest/rust``: skip on all MIPS platforms.
263
264 - Lots of changes and improvements to the :term:`Toaster` OEQA tests.
265
266 - ``oeqa/selftest``: add a test for bitbake "-e" and "-getvar" difference.
267
268 - ``oeqa/selftest``: Fix failure when configuration contains ``BBLAYERS:append``
269
270 - ``oeqa/ssh``: improve performance and log sizes when handling large files.
271
272 - ``oeqa/poisoning``: fix and improve gcc include poisoning tests.
273
274- Utility script changes:
275
276 - The ``patchreview.py`` script now uses the ``check_upstream_status`` from
277 ``oe.qa`` to get patch statuses.
278
279 - ``resulttool``:
280
281 - Allow store to filter to specific revisions (``--revision`` flag).
282
283 - Use single space indentation in JSON output, to save disk
284 space.
285
286 - Add ``--logfile-archive`` option to store and archive log files
287 separately.
288
289 - Handle LTP raw logs as well as Ptest.
290
291 - ``yocto-check-layer``:
292
293 - Check for the presence of a ``SECURITY.md`` file in layers and make it
294 mandatory.
295
296 - The :ref:`ref-classes-yocto-check-layer` class now uses
297 :term:`CHECKLAYER_REQUIRED_TESTS` to get the list of QA checks to verify
298 when running the ``yocto-check-layer`` script.
299
300 - New ``oe-image-files-spdx`` script utility directory under
301 ``scripts/contrib`` to that processes the SPDX 3.0.1 output from a build
302 and lists all the files on the root file system with their checksums.
303
304 - ``install-buildtools``:
305
306 - Add the ``--downloads-directory`` argument to the script to allow
307 specifying the location of the artifact download directory.
308
309 - The download URL are now stored next to the download artifacts for
310 traceability.
311
312 - New ``clean-hashserver-database`` under ``scripts/`` that can be used to
313 clean the hashserver database based on the files available in the sstate
314 directory (see :ref:`overview-manual/concepts:Hash Equivalence` for more
315 information).
316
317- BitBake changes:
318
319 - Add a new concept of configuration fragment, which allows providing
320 configuration snippets contained in layers in a structured and controlled
321 way. For more information, see the
322 :ref:`bitbake:bitbake-user-manual/bitbake-user-manual-metadata:\`\`addfragments\`\`
323 Directive` section of the BitBake User Manual.
324
325 - Add a new ``include_all`` directive, which can be used to include multiple
326 files present in the same location in different layers.
327
328 - Fetcher related changes (``fetch2``):
329
330 - Do not preserve ownership when unpacking.
331
332 - switch from Sqlite ``persist_data`` to a standard cache file
333 for checksums, and drop ``persist_data``.
334
335 - add support for GitHub codespaces by adding the
336 ``GITHUB_TOKEN`` to the list of variables exported during ``git``
337 invocations.
338
339 - set User-Agent to 'bitbake/version' instead of a "fake
340 mozilla" user agent.
341
342 - ``wget``: handle HTTP 308 Permanent Redirect.
343
344 - ``wget``: increase timeout to 100s from 30s to match CDN worst
345 response time.
346
347 - Add support for fast initial shallow fetch. The fetcher will prefer an
348 initial shallow clone, but will re-utilize an existing bare clone if
349 there is one. If the remote server does not allow shallow fetches, the
350 fetcher falls back to a bare clone. This improves the data transfer
351 size on the initial fetch of a repository, eliminates the need to use
352 an HTTPS tarball :term:`SRC_URI` to reduce data transfer, and allows
353 SSH-based authentication when using non-public repos, so additional
354 HTTPS tokens may not be required.
355
356 - ``compress``: use ``lz4`` instead of ``lz4c``, as ``lz4c`` as been
357 considered deprecated since 2018.
358
359 - ``server/process``: decrease idle/main loop frequency, as it is idle and
360 main loops have socket select calls to know when to execute.
361
362 - ``bitbake-worker``:
363
364 - improve bytearray truncation performance when large
365 amounts of data are being transferred from the cooker to the worker.
366
367 - ``cooker``: increase the default pipe size from 64KB to
368 512KB for better efficiency when transferring large amounts of data.
369
370 - ``bitbake-getvar``: catch ``NoProvider`` exception to improve error
371 readability when a recipe is not found with ``--recipe``.
372
373 - ``bb/build``: add a function ``bb.build.listtasks()`` to list the tasks in
374 a datastore.
375
376 - Remove custom exception backtrace formatting, and replace occurrences of
377 ``bb.exception.format_exception()`` by ``traceback.format_exception()``.
378
379 - ``runqueue``: various performance optimizations including:
380
381 - Fix performance of multiconfigs with large overlap.
382 - Optimise ``setscene`` loop processing by starting where it
383 was left off in the previous execution.
384
385 - ``knotty`` now hints the user if :term:`MACHINE` was not set in
386 the ``local.conf`` file.
387
388 - ``utils``: add Go mod h1 checksum support, specific to Go modules. Use
389 with ``goh1``.
390
391 - The parser now catches empty variable name assignments such as::
392
393 += "value"
394
395 The previous code would have assigned ``value`` to the variable named ``+``.
396
397 - ``hashserv``: Add the ``gc-mark-stream`` command for batch hash marking.
398
399
400- Packaging changes:
401
402 - ``systemd``: extract dependencies from ``.note.dlopen`` ELF segments, to
403 better detect dynamically linked libraries at runtime.
404
405 - ``package_rpm``: use ZSTD's default compression level from the variable
406 :term:`ZSTD_COMPRESSION_LEVEL`.
407
408 - ``package_rpm``: restrict RPM packaging to 4 threads to improve
409 the compression speed.
410
411 - ``sign_rpm``: ``rpm`` needs the ``sequoia`` :term:`PACKAGECONFIG`
412 config set to be able to generate signed packages.
413
414- LLVM related changes:
415
416 - Set ``LLVM_HOST_TRIPLE`` for cross-compilation, which is recommended when
417 cross-compiling Llvm.
418
419- SPDX-related changes:
420
421 - SPDX 3.0:
422
423 - Find local sources when searching for debug sources.
424
425 - Map ``gitsm`` URIs to ``git``.
426
427 - Link license and build by alias instead of SPDX ID.
428
429 - Fix SPDX tasks not running when code changes (use of ``file-checksums``).
430
431- ``devtool`` changes:
432
433 - Remove the "S = WORKDIR" workaround as now :term:`S` cannot be equal to
434 :term:`WORKDIR`.
435
436 - The already broken ``--debug-build-config`` option of
437 ``devtool ide-sdk`` has been replaced by a new ``--debug-build`` option
438 of ``devtool modify``. The new ``devtool ide-sdk`` workflow is:
439 ``devtool modify my-recipe --debug-build`` followed by
440 ``devtool ide-sdk my-recipe my-image``.
441
442 - ``create-spdx``: support line numbers for :term:`NO_GENERIC_LICENSE`
443 license types.
444
445 - ``spdx30``: Adds a "contains" relationship that relates the root file
446 system package to the files contained in it. If a package provides a file
447 with a matching hash and path, it will be linked, otherwise a new File
448 element will be created.
449
450 - The output of :ref:`devtool upgrade-status
451 <ref-manual/devtool-reference:Checking on the Upgrade Status of a Recipe>`
452 is now sorted by recipe name.
453
454- Patchtest-related changes:
455
456 - Refactor pattern definitions in a ``patterns`` module.
457
458 - Refactor and improve the ``mbox`` module.
459
460 - Split out result messages.
461
462 - Add a check for user name tags in patches (for example "fix added by
463 @username").
464
465- :ref:`ref-classes-insane` class related changes:
466
467 - Only parse ELF if they are files and not symlinks.
468
469 - Check for ``RUNPATH`` in addition to ``RPATH`` in binaries.
470
471 - Ensure :ref:`ref-classes-insane` tasks of dependencies run in builds when
472 expected.
473
474- Security changes:
475
476 - The ``PIE`` gcc flag is now passed for the *powerpc* architecture after a
477 bugfix in gcc (https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81170).
478
479 - ``openssh``: be more restrictive on private key file permissions by
480 setting them from the :ref:`ref-tasks-install` task.
481
482- :ref:`ref-classes-cve-check` changes:
483
484 - Update the :term:`DL_DIR` database location name
485 (``${DL_DIR}/CVE_CHECK2``).
486
487 - Add the field "modified" to the JSON report (from "NVD-modified").
488
489 - Add support for CVSS v4.0.
490
491 - Fix malformed cve status description with ``:`` characters.
492
493 - Restore the :term:`CVE_CHECK_SHOW_WARNINGS` variable and functionality. It
494 currently prints warning message for every unpatched CVE the
495 :ref:`ref-classes-cve-check` class finds.
496
497 - Users can control the NVD database source using the :term:`NVD_DB_VERSION`
498 variable with possible values ``NVD1``, ``NVD2``, or ``FKIE``.
499
500 - The default feed for CVEs is now ``FKIE`` instead of ``NVD2`` (see
501 :term:`NVD_DB_VERSION` for more information).
502
503- New :term:`PACKAGECONFIG` options for individual recipes:
504
505 - ``perf``: ``zstd``
506 - ``ppp``: ``pam``, ``openssl``
507 - ``libpciaccess``: ``zlib``
508 - ``gdk-pixbuf``: ``gif``, ``others``
509 - ``libpam``: ``selinux``
510 - ``libsecret``: ``pam``
511 - ``rpm``: ``sequoia``
512 - ``systemd``: ``apparmor``, ``fido``, ``mountfsd``, ``nsresourced``
513 - ``ovmf``: ``debug``
514 - ``webkitgtk``: ``assertions``
515 - ``iproute2``: ``iptables``
516 - ``man-db``: ``col``
517
518- Systemd related changes:
519
520 - ``systemd``:
521
522 - set better sane time at startup by creating the ``clock-epoch`` file in
523 ``${libdir}`` if the ``set-time-epoch`` :term:`PACKAGECONFIG` config is
524 set.
525
526 - really disable `Predictable Network Interface names
527 <https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/>`__
528 if the ``pni-names`` feature is not part of :term:`DISTRO_FEATURES`.
529 Previously it was only really disabled for QEMU machines.
530
531 - split ``networkd`` into its own package named ``systemd-networkd``.
532
533 - ``systemd-bootchart``: now supports the 32-bit *riscv* architecture.
534
535 - ``systemd-boot``: now supports the *riscv* architecture.
536
537 - ``systemd-serialgetty``:
538
539 - the recipe no longer sets a default value for
540 :term:`SERIAL_CONSOLES`, and uses the one set in ``bitbake.conf``.
541
542 - the recipe no longer ships a copy of the ``serial-getty@.service`` as
543 it is provided by systemd directly.
544
545 - Don't set a default :term:`SERIAL_CONSOLES` value in the
546 ``systemd-serialgetty`` recipe and take the global value that should
547 already be set.
548
549 - Replace custom unit files by existing unit files provided in the
550 systemd source code.
551
552 - User unit supports was improved. All the user units are now enabled by
553 default.
554
555 - The custom implementation of ``systemctl`` in :term:`OpenEmbedded-Core
556 (OE-Core)` was removed to use the upstream one. This ``systemctl`` binary
557 is now compiled and used for systemd-related operations.
558
559- :ref:`ref-classes-sanity` class changes:
560
561 - Add a sanity check to validate that the C++ toolchain is functional on the
562 host.
563
564 - Add a sanity check to check that the C++ compiler on the host supports
565 C++20.
566
567 - Add a sanity check to verify that :term:`TOPDIR` does not contain
568 non-ASCII characters, as it may lead to unexpected build errors.
569
570- Miscellaneous changes:
571
572 - ``bluez``: fix mesh build when building with musl.
573
574 - ``python3-pip``: the ``pip`` executable is now left and not deleted, and
575 can be used instead of ``pip3`` and ``pip2``.
576
577 - ``tar`` image types are now more reproducible as the :term:`IMAGE_CMD` for
578 ``tar`` now strips ``atime`` and ``ctime`` from the archive content.
579
580 - :term:`SOLIBSDEV` and :term:`SOLIBS` are now defined for the *mingw32*
581 architecture (``.dll``).
582
583 - :ref:`rootfs-postcommands <ref-classes-rootfs*>`: make ``opkg`` status
584 reproducible.
585
586 - The default :term:`KERNEL_CONSOLE` value is no longer ``ttyS0`` but the
587 first entry from the :term:`SERIAL_CONSOLES` variable.
588
589 - ``virglrenderer``: add a patch to fix ``-int-conversion`` build issue.
590
591 - ``ffmpeg``: disable asm optimizations for the *x86* architecture as PIC is
592 required and *x86* ASM code is not PIC.
593
594 - ``udev-extraconf``: fix the ``network.sh`` script that did not configure
595 hotplugged interfaces.
596
597 - ``classes-global/license``: move several functions and logic to library
598 code in :oe_git:`meta/lib/oe/license.py </openembedded-core/tree/meta/lib/oe/license.py>`.
599
600 - The recipe ``cairo`` now disables the features ``symbol-lookup``,
601 ``spectre``, and ``tests`` by default.
602
603 - The recipe ``glib-2.0`` now disables the feature ``sysprof`` by default.
604
605 - The recipe ``gstreamer1.0-libav`` now disables the feature ``doc`` by default.
606
607 - ``rxvt-unicode``: change ``virtual/x-terminal-emulator`` from
608 :term:`PROVIDES` to :term:`RPROVIDES` as ``virtual-x-terminal-emulator``.
609 Also make this recipe depend on the ``x11`` distro features with
610 :term:`REQUIRED_DISTRO_FEATURES`.
611
612 - ``rxvt-unicode.inc``: disable the ``terminfo`` installation by setting
613 ``TIC`` to ``:`` in :term:`EXTRA_OECONF`, to avoid host contamination.
614
615 - ``matchbox-terminal``: add ``x-terminal-emulator`` as :term:`RPROVIDES`
616 and set :term:`ALTERNATIVE` for the recipe.
617
618 - ``default-providers.conf``: set ``rxvt-unicode`` as the default
619 ``virtual-x-terminal-emulator`` runtime provider with
620 :term:`PREFERRED_RPROVIDER`.
621
622 - ``cve-update-nvd2-native``: updating the database will now result in an
623 error if :term:`BB_NO_NETWORK` is enabled and
624 :term:`CVE_DB_UPDATE_INTERVAL` is not set to ``-1``. Users can control the
625 NVD database source using the :term:`NVD_DB_VERSION` variable with
626 possible values ``NVD1``, ``NVD2``, or ``FKIE``.
627
628 - ``systemtap``: add ``--with-extra-version="oe"`` configure option to
629 improve the reproducibility of the recipe.
630
631 - ``python3``: package ``tkinter``'s shared objects separately in the
632 ``python3-tkinter`` package.
633
634 - ``init-manager``: set the variable ``VIRTUAL-RUNTIME_dev_manager`` to
635 ``udev`` by default in
636 :oe_git:`meta/conf/distro/include/init-manager-none.inc
637 </openembedded-core/tree/meta/conf/distro/include/init-manager-none.inc>`
638 and :oe_git:`meta/conf/distro/include/init-manager-sysvinit.inc
639 </openembedded-core/tree/meta/conf/distro/include/init-manager-sysvinit.inc>`,
640 instead of :oe_git:`meta/recipes-core/packagegroups/packagegroup-core-boot.bb
641 </openembedded-core/tree/meta/recipes-core/packagegroups/packagegroup-core-boot.bb>`
642 only.
643
644 Likewise, the same is done for ``VIRTUAL-RUNTIME_keymaps`` with
645 ``keymaps`` as its default value.
646
647 - ``seatd``: Create a ``seat`` group and package the systemd service
648 ``seatd.service`` with correct permissions.
649
650 That way, the ``weston`` user in ``weston-init.bb`` was added to the
651 ``seat`` group to be able to properly establish connection between the
652 Weston and the ``seatd`` socket.
653
654 - ``webkitgtk``:
655
656 - Fix build on 32bit arches with 64bit ``time_t`` only.
657
658 - Disable JIT on RISCV64.
659
660 - :ref:`ref-classes-report-error`: Add :term:`PN` to error report files.
661
662 - ``initrdscripts``: add UBI support for mounting a live ``ubifs`` rootfs.
663
664 - ``uboot-extlinux-config.bbclass``: add support for device tree overlays.
665
666 - ``glibc``: add ``ld.so.conf`` to :term:`CONFFILES`.
667
668 - ``udev-extraconf``: Allow FAT mount group to be specified with
669 :term:`MOUNT_GROUP`.
670
671 - New ``bbverbnote`` log utility which can be used to print on the console
672 (equivalent to the ``bb.verbnote`` Python implementation).
673
674 - :ref:`ref-classes-grub-efi`: Add :term:`GRUB_TITLE` variable to set
675 custom GRUB titles.
676
677 - ``gawk``: Enable high precision arithmetic support by default (``mpfr``
678 enabled by default in :term:`PACKAGECONFIG`).
679
680 - ``licenses``: Map the license ``SGIv1`` to ``SGI-OpenGL``, as ``SGIv1`` is
681 not an SPDX license identifier.
682
683 - Configuration files for the `b4 <https://b4.docs.kernel.org>`__
684 command-line tool was added to the different Yocto Project and OpenEmbedded
685 repositories.
686
687 - ``kernel-fitimage``: handle :doc:`multiconfig
688 </dev-manual/multiconfig>` dependency when
689 :term:`INITRAMFS_MULTICONFIG` is set.
690
691 - ``psplash``: when using the ``systemd`` feature from
692 :term:`DISTRO_FEATURES`, start the ``psplash`` service when the
693 ``/dev/fb0`` framebuffer is detected with Udev.
694
695 - ``gdb``: is now compiled with xz support by default (``--with-lzma``).
696
697 - ``busybox``: drop net-tools from the default ``defconfig``, since these tools
698 (``ifconfig``, etc.) have been deprecated since `2009
699 <https://lists.debian.org/debian-devel/2009/03/msg00780.html>`__.
700
701 - ``perf`` is built with ``zstd`` in :term:`PACKAGECONFIG` by default.
702
703 - ``boost``: add ``charconv`` to built libraries by default.
704
705 - ``mirrors``: rationalise Debian mirrors to point at the canonical server
706 (deb.debian.org) instead of country specific ones. This server is backed
707 by a :wikipedia:`CDN <Content_delivery_network>` to properly balance the
708 server load.
709
710 - ``lib: sbom30``: Add action statement for affected VEX statements with
711 "Mitigation action unknown", as these are not tracked by the existing
712 code.
713
714Known Issues in |yocto-ver|
715~~~~~~~~~~~~~~~~~~~~~~~~~~~
716
717- The :ref:`ref-classes-cve-check` class is based on the `National
718 Vulnerability Database <https://nvd.nist.gov/>`__ (NVD). Since the beginning
719 of 2024, the maintainers of this database have stopped annotating CVEs with
720 the affected CPEs. This prevents the :ref:`ref-classes-cve-check` class to
721 properly report CVEs as CPEs are used to match Yocto recipes with CVEs
722 affecting them. As a result, the current CVE reports may look good but the
723 reality is that some vulnerabilities are just not reported.
724
725 During that time, users may look up the 'CVE database
726 <https://www.cve.org/>'__ for entries concerning software they use, or follow
727 release notes of such projects closely.
728
729 Please note, that the :ref:`ref-classes-cve-check` tool has always been a
730 helper tool, and users are advised to always review the final result. Results
731 of an automatic scan may not take into account configuration options,
732 compiler options and other factors.
733
734Recipe License changes in |yocto-ver|
735~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
736
737The following changes have been made to the :term:`LICENSE` values set by recipes:
738
739.. list-table::
740 :widths: 20 40 40
741 :header-rows: 1
742
743 * - Recipe
744 - Previous value
745 - New value
746 * - ``babeltrace2``
747 - ``MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause``
748 - ``MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause & BSD-4-Clause & GPL-3.0-or-later & CC-BY-SA-4.0 & PSF-2.0``
749 * - ``busybox``
750 - ``GPL-2.0-only & bzip2-1.0.4``
751 - ``GPL-2.0-only & bzip2-1.0.6``
752 * - ``dbus-glib``
753 - ``AFL-2.1 | GPL-2.0-or-later``
754 - ``(AFL-2.1 & LGPL-2.0-or-later & MIT) | (GPL-2.0-or-later & LGPL-2.0-or-later & MIT)``
755 * - ``diffstat``
756 - ``MIT``
757 - ``X11``
758 * - ``docbook-xsl-stylesheets``
759 - ``XSL``
760 - ``DocBook-XML``
761 * - ``font-util``
762 - ``Unicode-TOU & BSD-4-Clause & BSD-2-Clause``
763 - ``Unicode-TOU & MIT & X11 & BSD-2-Clause``
764 * - ``json-glib``
765 - ``LGPL-2.1-only``
766 - ``LGPL-2.1-or-later``
767 * - ``libbsd``
768 - ``BSD-3-Clause & BSD-4-Clause & ISC & PD``
769 - ``BSD-3-Clause & ISC & PD``
770 * - ``libxfont2``
771 - ``MIT & MIT & BSD-4-Clause & BSD-2-Clause``
772 - ``MIT & MIT & BSD-4-Clause-UC & BSD-2-Clause``
773 * - ``libxkbcommon``
774 - ``MIT & MIT``
775 - ``MIT & MIT-open-group & HPND & HPND-sell-variant & X11``
776 * - ``man-pages``
777 - ``GPL-2.0-or-later & GPL-2.0-only & GPL-1.0-or-later & BSD-2-Clause & BSD-3-Clause & BSD-4-Clause & MIT``
778 - ``GPL-2.0-or-later & GPL-2.0-only & GPL-1.0-or-later & BSD-2-Clause & BSD-3-Clause & BSD-4-Clause-UC & MIT``
779 * - ``ppp``
780 - ``BSD-3-Clause & BSD-3-Clause-Attribution & GPL-2.0-or-later & LGPL-2.0-or-later & PD & RSA-MD & MIT``
781 - ``BSD-2-Clause & GPL-2.0-or-later & LGPL-2.0-or-later & PD & RSA-MD & MIT``
782 * - ``tcf-agent``
783 - ``EPL-1.0 | EDL-1.0``
784 - ``EPL-1.0 | BSD-3-Clause``
785 * - ``unfs3``
786 - ``unfs3``
787 - ``BSD-3-Clause``
788 * - ``usbutils``
789 - ``GPL-2.0-or-later & (GPL-2.0-only | GPL-3.0-only)``
790 - ``GPL-2.0-or-later & (GPL-2.0-only | GPL-3.0-only) & CC0-1.0 & LGPL-2.1-or-later & MIT``
791 * - ``util-linux``
792 - ``GPL-1.0-or-later & GPL-2.0-only & GPL-2.0-or-later & LGPL-2.1-or-later & BSD-2-Clause & BSD-3-Clause & BSD-4-Clause & MIT``
793 - ``GPL-1.0-or-later & GPL-2.0-only & GPL-2.0-or-later & LGPL-2.1-or-later & BSD-2-Clause & BSD-3-Clause & BSD-4-Clause-UC & MIT``
794
795Security Fixes in |yocto-ver|
796~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
797
798The following CVEs have been fixed:
799
800.. list-table::
801 :widths: 30 70
802 :header-rows: 1
803
804 * - Recipe
805 - CVE IDs
806 * - ``barebox``
807 - :cve_nist:`2025-26721`, :cve_nist:`2025-26722`, :cve_nist:`2025-26723`, :cve_nist:`2025-26724`, :cve_nist:`2025-26725`
808 * - ``binutils``
809 - :cve_nist:`2024-53589`, :cve_nist:`2025-1153`
810 * - ``curl``
811 - :cve_nist:`2024-8096`, :cve_nist:`2024-9681`, :cve_nist:`2024-11053`, :cve_nist:`2025-0167`, :cve_nist:`2025-0665`, :cve_nist:`2025-0725`
812 * - ``expat``
813 - :cve_nist:`2024-8176`, :cve_nist:`2024-50602`
814 * - ``ghostscript``
815 - :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`, :cve_nist:`2024-46954`, :cve_nist:`2024-46955`, :cve_nist:`2024-46956`
816 * - ``gnutls``
817 - :cve_nist:`2024-12243`
818 * - ``go``
819 - :cve_nist:`2024-34155`, :cve_nist:`2024-34156`, :cve_nist:`2024-34158`, :cve_nist:`2024-45336`, :cve_nist:`2024-45341`, :cve_nist:`2025-22866`, :cve_nist:`2025-22870`
820 * - ``grub``
821 - :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, :cve_nist:`2024-45776`, :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, :cve_nist:`2024-45780`, :cve_nist:`2024-45781`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`, :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0678`, :cve_nist:`2025-0684`, :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`, :cve_nist:`2025-0690`, :cve_nist:`2025-1118`, :cve_nist:`2025-1125`
822 * - ``gstreamer1.0``
823 - :cve_nist:`2024-47606`
824 * - ``gstreamer1.0-plugins-base``
825 - :cve_nist:`2024-47538`, :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`, :cve_nist:`2024-47835`
826 * - ``gstreamer1.0-plugins-good``
827 - :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`, :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778`, :cve_nist:`2024-47834`
828 * - ``libarchive``
829 - :cve_nist:`2024-57970`, :cve_nist:`2025-1632`, :cve_nist:`2025-25724`
830 * - ``libcap``
831 - :cve_nist:`2025-1390`
832 * - ``libsndfile1``
833 - :cve_nist:`2024-50612`
834 * - ``libtasn1``
835 - :cve_nist:`2024-12133`
836 * - ``libxml2``
837 - :cve_nist:`2024-56171`, :cve_nist:`2025-24928`
838 * - ``ofono``
839 - :cve_nist:`2024-7539`, :cve_nist:`2024-7540`, :cve_nist:`2024-7541`, :cve_nist:`2024-7542`
840 * - ``omvf``
841 - :cve_nist:`2023-45236`, :cve_nist:`2023-45237`, :cve_nist:`2024-25742`
842 * - ``openssh``
843 - :cve_nist:`2025-26465`, :cve_nist:`2025-26466`
844 * - ``openssl``
845 - :cve_nist:`2024-9143`, :cve_nist:`2024-12797`, :cve_nist:`2024-13176`
846 * - ``orc``
847 - :cve_nist:`2024-40897`
848 * - ``python3``
849 - :cve_nist:`2025-0938`, :cve_nist:`2024-12254`
850 * - ``qemu``
851 - :cve_nist:`2024-6505`
852 * - ``rsync``
853 - :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`, :cve_nist:`2024-12087`, :cve_nist:`2024-12088`, :cve_nist:`2024-12747`
854 * - ``ruby``
855 - :cve_nist:`2024-41123`, :cve_nist:`2024-41946`
856 * - ``rust``
857 - :cve_nist:`2024-43402`
858 * - ``socat``
859 - :cve_nist:`2024-54661`
860 * - ``tiff``
861 - :cve_nist:`2023-6277`, :cve_nist:`2023-6228`, :cve_nist:`2023-52356`
862 * - ``vim``
863 - :cve_nist:`2024-45306`, :cve_nist:`2024-47814`, :cve_nist:`2025-1215`, :cve_nist:`2025-22134`, :cve_nist:`2025-24014`, :cve_nist:`2025-26603`, :cve_nist:`2025-27423`, :cve_nist:`2025-29768`
864 * - ``webkitgtk``
865 - :cve_nist:`2025-24143`, :cve_nist:`2025-24150`, :cve_nist:`2025-24158`, :cve_nist:`2025-24162`
866 * - ``wpa-supplicant``
867 - :cve_nist:`2024-5290`
868 * - ``xserver-xorg``
869 - :cve_nist:`2024-9632`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`, :cve_nist:`2025-26601`
870 * - ``xwayland``
871 - :cve_nist:`2024-9632`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`, :cve_nist:`2025-26601`
872
873Recipe Upgrades in |yocto-ver|
874~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
875
876.. list-table::
877 :widths: 20 40 40
878 :header-rows: 1
879
880 * - Recipe
881 - Previous version
882 - New version
883 * - ``adwaita-icon-theme``
884 - 46.2
885 - 48.0
886 * - ``alsa-lib``
887 - 1.2.12
888 - 1.2.13
889 * - ``alsa-ucm-conf``
890 - 1.2.12
891 - 1.2.13
892 * - ``alsa-utils``
893 - 1.2.12
894 - 1.2.13
895 * - ``appstream``
896 - 1.0.3
897 - 1.0.4
898 * - ``at-spi2-core``
899 - 2.52.0
900 - 2.56.0
901 * - ``autoconf-archive``
902 - 2023.02.20
903 - 2024.10.16
904 * - ``babeltrace2``
905 - 2.0.6
906 - 2.1.0
907 * - ``base-passwd``
908 - 3.6.4
909 - 3.6.6
910 * - ``bash``
911 - 5.2.32
912 - 5.2.37
913 * - ``bash-completion``
914 - 2.14.0
915 - 2.16.0
916 * - ``bc``
917 - 1.07.1
918 - 1.08.1
919 * - ``bind``
920 - 9.20.1
921 - 9.20.6
922 * - ``binutils``
923 - 2.43.1
924 - 2.44
925 * - ``binutils-cross``
926 - 2.43.1
927 - 2.44
928 * - ``binutils-cross-canadian``
929 - 2.43.1
930 - 2.44
931 * - ``binutils-crosssdk``
932 - 2.43.1
933 - 2.44
934 * - ``binutils-testsuite``
935 - 2.43.1
936 - 2.44
937 * - ``bluez5``
938 - 5.78
939 - 5.79
940 * - ``boost``
941 - 1.86.0
942 - 1.87.0
943 * - ``boost-build-native``
944 - 1.86.0
945 - 1.87.0
946 * - ``btrfs-tools``
947 - 6.10.1
948 - 6.13
949 * - ``build-appliance-image``
950 - 15.0.0 (6a5ba188b79e…)
951 - 15.0.0 (2fe7f46e1779…)
952 * - ``busybox``
953 - 1.36.1
954 - 1.37.0
955 * - ``busybox-inittab``
956 - 1.36.1
957 - 1.37.0
958 * - ``ca-certificates``
959 - 20240203
960 - 20241223
961 * - ``cairo``
962 - 1.18.2
963 - 1.18.4
964 * - ``cargo``
965 - 1.79.0
966 - 1.84.1
967 * - ``ccache``
968 - 4.10.2
969 - 4.11
970 * - ``chrpath``
971 - 0.16
972 - 0.18
973 * - ``cmake``
974 - 3.30.2
975 - 3.31.6
976 * - ``cmake-native``
977 - 3.30.2
978 - 3.31.6
979 * - ``connman``
980 - 1.42
981 - 1.43
982 * - ``coreutils``
983 - 9.5
984 - 9.6
985 * - ``cracklib``
986 - 2.10.2
987 - 2.10.3
988 * - ``createrepo-c``
989 - 1.1.4
990 - 1.2.0
991 * - ``cross-localedef-native``
992 - 2.40+git
993 - 2.41+git
994 * - ``cups``
995 - 2.4.10
996 - 2.4.11
997 * - ``curl``
998 - 8.9.1
999 - 8.12.1
1000 * - ``dbus``
1001 - 1.14.10
1002 - 1.16.2
1003 * - ``dbus-glib``
1004 - 0.112
1005 - 0.114
1006 * - ``debianutils``
1007 - 5.20
1008 - 5.21
1009 * - ``debugedit``
1010 - 5.0
1011 - 5.1
1012 * - ``desktop-file-utils``
1013 - 0.27
1014 - 0.28
1015 * - ``dhcpcd``
1016 - 10.0.10
1017 - 10.2.2
1018 * - ``diffoscope``
1019 - 277
1020 - 289
1021 * - ``diffstat``
1022 - 1.66
1023 - 1.67
1024 * - ``diffutils``
1025 - 3.10
1026 - 3.11
1027 * - ``dnf``
1028 - 4.21.1
1029 - 4.22.0
1030 * - ``dropbear``
1031 - 2024.85
1032 - 2024.86
1033 * - ``dtc``
1034 - 1.7.0
1035 - 1.7.2
1036 * - ``ed``
1037 - 1.20.2
1038 - 1.21
1039 * - ``efivar``
1040 - 39+39+git
1041 - 39
1042 * - ``elfutils``
1043 - 0.191
1044 - 0.192
1045 * - ``ell``
1046 - 0.68
1047 - 0.74
1048 * - ``epiphany``
1049 - 46.3
1050 - 48.0
1051 * - ``erofs-utils``
1052 - 1.8.1
1053 - 1.8.5
1054 * - ``ethtool``
1055 - 6.10
1056 - 6.11
1057 * - ``expat``
1058 - 2.6.4
1059 - 2.7.0
1060 * - ``ffmpeg``
1061 - 7.0.2
1062 - 7.1.1
1063 * - ``file``
1064 - 5.45
1065 - 5.46
1066 * - ``fmt``
1067 - 11.0.2
1068 - 11.1.4
1069 * - ``fribidi``
1070 - 1.0.15
1071 - 1.0.16
1072 * - ``gawk``
1073 - 5.3.0
1074 - 5.3.1
1075 * - ``gcr``
1076 - 4.3.0
1077 - 4.3.1
1078 * - ``gdb``
1079 - 15.1
1080 - 16.2
1081 * - ``gdb-cross``
1082 - 15.1
1083 - 16.2
1084 * - ``gdb-cross-canadian``
1085 - 15.1
1086 - 16.2
1087 * - ``gettext``
1088 - 0.22.5
1089 - 0.23.1
1090 * - ``gettext-minimal-native``
1091 - 0.22.5
1092 - 0.23.1
1093 * - ``ghostscript``
1094 - 10.04.0
1095 - 10.05.0
1096 * - ``gi-docgen``
1097 - 2024.1
1098 - 2025.3
1099 * - ``git``
1100 - 2.46.1
1101 - 2.49.0
1102 * - ``glib-2``
1103 - .0 2.80.4
1104 - 2.84.0
1105 * - ``glib-2``
1106 - .0-initial 2.80.4
1107 - 2.84.0
1108 * - ``glibc``
1109 - 2.40+git
1110 - 2.41+git
1111 * - ``glibc-locale``
1112 - 2.40+git
1113 - 2.41+git
1114 * - ``glibc-mtrace``
1115 - 2.40+git
1116 - 2.41+git
1117 * - ``glibc-scripts``
1118 - 2.40+git
1119 - 2.41+git
1120 * - ``glibc-testsuite``
1121 - 2.40+git
1122 - 2.41+git
1123 * - ``glibc-y2038-tests``
1124 - 2.40+git
1125 - 2.41+git
1126 * - ``glslang``
1127 - 1.3.290.0
1128 - 1.4.309.0
1129 * - ``gnu-efi``
1130 - 3.0.18
1131 - 4.0.0
1132 * - ``gnupg``
1133 - 2.5.0
1134 - 2.5.5
1135 * - ``gnutls``
1136 - 3.8.6
1137 - 3.8.9
1138 * - ``go``
1139 - 1.22.12
1140 - 1.24.1
1141 * - ``go-binary-native``
1142 - 1.22.12
1143 - 1.24.1
1144 * - ``go-cross-canadian``
1145 - 1.22.12
1146 - 1.24.1
1147 * - ``go-cross-core2-32``
1148 - 1.22.12
1149 - 1.24.1
1150 * - ``go-crosssdk``
1151 - 1.22.12
1152 - 1.24.1
1153 * - ``go-helloworld``
1154 - 0.1 (39e772fc2670…)
1155 - 0.1 (d7b0ac127859…)
1156 * - ``go-runtime``
1157 - 1.22.12
1158 - 1.24.1
1159 * - ``gobject-introspection``
1160 - 1.80.1
1161 - 1.84.0
1162 * - ``gpgme``
1163 - 1.23.2
1164 - 1.24.2
1165 * - ``gsettings-desktop-schemas``
1166 - 46.1
1167 - 48.0
1168 * - ``gst-devtools``
1169 - 1.24.10
1170 - 1.24.12
1171 * - ``gstreamer1.0``
1172 - 1.24.10
1173 - 1.24.12
1174 * - ``gstreamer1.0-libav``
1175 - 1.24.10
1176 - 1.24.12
1177 * - ``gstreamer1.0-plugins-bad``
1178 - 1.24.10
1179 - 1.24.12
1180 * - ``gstreamer1.0-plugins-base``
1181 - 1.24.10
1182 - 1.24.12
1183 * - ``gstreamer1.0-plugins-good``
1184 - 1.24.10
1185 - 1.24.12
1186 * - ``gstreamer1.0-plugins-ugly``
1187 - 1.24.10
1188 - 1.24.12
1189 * - ``gstreamer1.0-python``
1190 - 1.24.10
1191 - 1.24.12
1192 * - ``gstreamer1.0-rtsp-server``
1193 - 1.24.10
1194 - 1.24.12
1195 * - ``gstreamer1.0-vaapi``
1196 - 1.24.10
1197 - 1.24.12
1198 * - ``gtk4``
1199 - 4.14.5
1200 - 4.18.1
1201 * - ``harfbuzz``
1202 - 9.0.0
1203 - 10.4.0
1204 * - ``hwlatdetect``
1205 - 2.7
1206 - 2.8
1207 * - ``i2c-tools``
1208 - 4.3
1209 - 4.4
1210 * - ``icu``
1211 - 75-1
1212 - 76-1
1213 * - ``ifupdown``
1214 - 0.8.43
1215 - 0.8.44
1216 * - ``igt-gpu-tools``
1217 - 1.28
1218 - 1.30
1219 * - ``inetutils``
1220 - 2.5
1221 - 2.6
1222 * - ``init-system-helpers``
1223 - 1.66
1224 - 1.68
1225 * - ``iproute2``
1226 - 6.10.0
1227 - 6.13.0
1228 * - ``iptables``
1229 - 1.8.10
1230 - 1.8.11
1231 * - ``iputils``
1232 - 20240117
1233 - 20240905
1234 * - ``iso-codes``
1235 - 4.16.0
1236 - 4.17.0
1237 * - ``json-c``
1238 - 0.17
1239 - 0.18
1240 * - ``json-glib``
1241 - 1.8.0
1242 - 1.10.6
1243 * - ``kbd``
1244 - 2.6.4
1245 - 2.7.1
1246 * - ``kern-tools-native``
1247 - 0.3+git (7160ebe8b865…)
1248 - 0.3+git (bfca22a52ec5…)
1249 * - ``kexec-tools``
1250 - 2.0.29
1251 - 2.0.30
1252 * - ``kmod``
1253 - 33
1254 - 34.1
1255 * - ``kmscube``
1256 - 0.0.1+git (b2f97f53e01e…)
1257 - 0.0.1+git (311eaaaa473d…)
1258 * - ``less``
1259 - 661
1260 - 668
1261 * - ``libadwaita``
1262 - 1.5.3
1263 - 1.7.0
1264 * - ``libarchive``
1265 - 3.7.4
1266 - 3.7.8
1267 * - ``libassuan``
1268 - 3.0.1
1269 - 3.0.2
1270 * - ``libcap``
1271 - 2.70
1272 - 2.75
1273 * - ``libdnf``
1274 - 0.73.3
1275 - 0.73.4
1276 * - ``libdrm``
1277 - 2.4.123
1278 - 2.4.124
1279 * - ``libedit``
1280 - 20240808-3.1
1281 - 20250104-3.1
1282 * - ``libexif``
1283 - 0.6.24
1284 - 0.6.25
1285 * - ``libffi``
1286 - 3.4.6
1287 - 3.4.7
1288 * - ``libgit2``
1289 - 1.8.1
1290 - 1.9.0
1291 * - ``libgpg-error``
1292 - 1.50
1293 - 1.51
1294 * - ``libical``
1295 - 3.0.18
1296 - 3.0.20
1297 * - ``libice``
1298 - 1.1.1
1299 - 1.1.2
1300 * - ``libidn2``
1301 - 2.3.7
1302 - 2.3.8
1303 * - ``libinput``
1304 - 1.26.1
1305 - 1.27.1
1306 * - ``libjitterentropy``
1307 - 3.5.0
1308 - 3.6.2
1309 * - ``libmatchbox``
1310 - 1.12
1311 - 1.13
1312 * - ``libnl``
1313 - 3.10.0
1314 - 3.11.0
1315 * - ``libnotify``
1316 - 0.8.3
1317 - 0.8.4
1318 * - ``libpam``
1319 - 1.6.1
1320 - 1.7.0
1321 * - ``libpcre2``
1322 - 10.44
1323 - 10.45
1324 * - ``libpipeline``
1325 - 1.5.7
1326 - 1.5.8
1327 * - ``libpng``
1328 - 1.6.43
1329 - 1.6.47
1330 * - ``libportal``
1331 - 0.7.1
1332 - 0.9.1
1333 * - ``libproxy``
1334 - 0.5.8
1335 - 0.5.9
1336 * - ``librepo``
1337 - 1.18.1
1338 - 1.19.0
1339 * - ``librsvg``
1340 - 2.58.2
1341 - 2.59.2
1342 * - ``libsdl2``
1343 - 2.30.7
1344 - 2.32.2
1345 * - ``libseccomp``
1346 - 2.5.5
1347 - 2.6.0
1348 * - ``libsecret``
1349 - 0.21.4
1350 - 0.21.6
1351 * - ``libslirp``
1352 - 4.8.0
1353 - 4.9.0
1354 * - ``libsm``
1355 - 1.2.4
1356 - 1.2.6
1357 * - ``libsolv``
1358 - 0.7.30
1359 - 0.7.31
1360 * - ``libsoup``
1361 - 3.6.0
1362 - 3.6.4
1363 * - ``libssh2``
1364 - 1.11.0
1365 - 1.11.1
1366 * - ``libstd-rs``
1367 - 1.79.0
1368 - 1.84.1
1369 * - ``libtest-warnings-perl``
1370 - 0.033
1371 - 0.038
1372 * - ``libtirpc``
1373 - 1.3.5
1374 - 1.3.6
1375 * - ``libtool``
1376 - 2.5.2
1377 - 2.5.4
1378 * - ``libtool-cross``
1379 - 2.5.2
1380 - 2.5.4
1381 * - ``libtool-native``
1382 - 2.5.2
1383 - 2.5.4
1384 * - ``libtraceevent``
1385 - 1.8.3
1386 - 1.8.4
1387 * - ``libtry-tiny-perl``
1388 - 0.31
1389 - 0.32
1390 * - ``libubootenv``
1391 - 0.3.5
1392 - 0.3.6
1393 * - ``libunistring``
1394 - 1.2
1395 - 1.3
1396 * - ``liburcu``
1397 - 0.14.1
1398 - 0.15.1
1399 * - ``libuv``
1400 - 1.48.0
1401 - 1.50.0
1402 * - ``libwebp``
1403 - 1.4.0
1404 - 1.5.0
1405 * - ``libwpe``
1406 - 1.16.0
1407 - 1.16.2
1408 * - ``libx11``
1409 - 1.8.10
1410 - 1.8.12
1411 * - ``libxau``
1412 - 1.0.11
1413 - 1.0.12
1414 * - ``libxcrypt``
1415 - 4.4.36
1416 - 4.4.38
1417 * - ``libxcrypt-compat``
1418 - 4.4.36
1419 - 4.4.38
1420 * - ``libxcursor``
1421 - 1.2.2
1422 - 1.2.3
1423 * - ``libxcvt``
1424 - 0.1.2
1425 - 0.1.3
1426 * - ``libxi``
1427 - 1.8.1
1428 - 1.8.2
1429 * - ``libxkbcommon``
1430 - 1.7.0
1431 - 1.8.1
1432 * - ``libxmlb``
1433 - 0.3.19
1434 - 0.3.22
1435 * - ``libxrender``
1436 - 0.9.11
1437 - 0.9.12
1438 * - ``libxshmfence``
1439 - 1.3.2
1440 - 1.3.3
1441 * - ``libxslt``
1442 - 1.1.42
1443 - 1.1.43
1444 * - ``libxt``
1445 - 1.3.0
1446 - 1.3.1
1447 * - ``libxv``
1448 - 1.0.12
1449 - 1.0.13
1450 * - ``libxxf86vm``
1451 - 1.1.5
1452 - 1.1.6
1453 * - ``lighttpd``
1454 - 1.4.76
1455 - 1.4.77
1456 * - ``linux-firmware``
1457 - 20240909
1458 - 20250311
1459 * - ``linux-libc-headers``
1460 - 6.10
1461 - 6.12
1462 * - ``linux-yocto``
1463 - 6.6.75+git, 6.10.14+git
1464 - 6.12.19+git
1465 * - ``linux-yocto-dev``
1466 - 6.11+git
1467 - 6.14+git
1468 * - ``linux-yocto-rt``
1469 - 6.6.75+git, 6.10.14+git
1470 - 6.12.19+git
1471 * - ``linux-yocto-tiny``
1472 - 6.6.75+git, 6.10.14+git
1473 - 6.12.19+git
1474 * - ``llvm``
1475 - 18.1.8
1476 - 20.1.0
1477 * - ``log4cplus``
1478 - 2.1.1
1479 - 2.1.2
1480 * - ``lsof``
1481 - 4.99.3
1482 - 4.99.4
1483 * - ``ltp``
1484 - 20240524
1485 - 20250130
1486 * - ``lttng-modules``
1487 - 2.13.14
1488 - 2.13.17
1489 * - ``lzip``
1490 - 1.24.1
1491 - 1.25
1492 * - ``lzlib``
1493 - 1.14
1494 - 1.15
1495 * - ``man-db``
1496 - 2.12.1
1497 - 2.13.0
1498 * - ``man-pages``
1499 - 6.9.1
1500 - 6.13
1501 * - ``mc``
1502 - 4.8.32
1503 - 4.8.33
1504 * - ``mesa-demos``
1505 - 8.5.0
1506 - 9.0.0
1507 * - ``meson``
1508 - 1.5.1
1509 - 1.7.0
1510 * - ``minicom``
1511 - 2.9
1512 - 2.10
1513 * - ``mmc-utils``
1514 - 0.1+git (123fd8b2ac39…)
1515 - 0.1+git (2aef4cd9a84d…)
1516 * - ``mpg123``
1517 - 1.32.7
1518 - 1.32.10
1519 * - ``msmtp``
1520 - 1.8.26
1521 - 1.8.28
1522 * - ``mtd-utils``
1523 - 2.2.0
1524 - 2.3.0
1525 * - ``mtools``
1526 - 4.0.44
1527 - 4.0.48
1528 * - ``musl``
1529 - 1.2.5+git (dd1e63c3638d…)
1530 - 1.2.5+git (c47ad25ea3b4…)
1531 * - ``nativesdk-libtool``
1532 - 2.5.2
1533 - 2.5.4
1534 * - ``netbase``
1535 - 6.4
1536 - 6.5
1537 * - ``nettle``
1538 - 3.10
1539 - 3.10.1
1540 * - ``nfs-utils``
1541 - 2.6.4
1542 - 2.8.2
1543 * - ``nghttp2``
1544 - 1.63.0
1545 - 1.65.0
1546 * - ``npth``
1547 - 1.7
1548 - 1.8
1549 * - ``numactl``
1550 - 2.0.18
1551 - 2.0.19
1552 * - ``ofono``
1553 - 2.10
1554 - 2.15
1555 * - ``opensbi``
1556 - 1.5.1
1557 - 1.6
1558 * - ``openssh``
1559 - 9.8p1
1560 - 9.9p2
1561 * - ``openssl``
1562 - 3.3.1
1563 - 3.4.1
1564 * - ``orc``
1565 - 0.4.40
1566 - 0.4.41
1567 * - ``ovmf``
1568 - edk2-stable202402
1569 - edk2-stable202411
1570 * - ``pango``
1571 - 1.54.0
1572 - 1.56.2
1573 * - ``piglit``
1574 - 1.0+gitr (c11c9374c144…)
1575 - 1.0+gitr (fc8179d31904…)
1576 * - ``pixman``
1577 - 0.42.2
1578 - 0.44.2
1579 * - ``pkgconf``
1580 - 2.3.0
1581 - 2.4.3
1582 * - ``ppp``
1583 - 2.5.0
1584 - 2.5.2
1585 * - ``procps``
1586 - 4.0.4
1587 - 4.0.5
1588 * - ``psplash``
1589 - 0.1+git (ecc191375669…)
1590 - 0.1+git (1f64c654129f…)
1591 * - ``ptest-runner``
1592 - 2.4.5+git
1593 - 2.4.5.1
1594 * - ``puzzles``
1595 - 0.0+git (1c1899ee1c4e…)
1596 - 0.0+git (7da464122232…)
1597 * - ``python3``
1598 - 3.12.9
1599 - 3.13.2
1600 * - ``python3-attrs``
1601 - 24.2.0
1602 - 25.3.0
1603 * - ``python3-babel``
1604 - 2.16.0
1605 - 2.17.0
1606 * - ``python3-bcrypt``
1607 - 4.2.0
1608 - 4.3.0
1609 * - ``python3-beartype``
1610 - 0.18.5
1611 - 0.20.0
1612 * - ``python3-build``
1613 - 1.2.1
1614 - 1.2.2
1615 * - ``python3-certifi``
1616 - 2024.8.30
1617 - 2025.1.31
1618 * - ``python3-cffi``
1619 - 1.17.0
1620 - 1.17.1
1621 * - ``python3-click``
1622 - 8.1.7
1623 - 8.1.8
1624 * - ``python3-cryptography``
1625 - 42.0.8
1626 - 44.0.2
1627 * - ``python3-cryptography-vectors``
1628 - 42.0.8
1629 - 44.0.2
1630 * - ``python3-cython``
1631 - 3.0.11
1632 - 3.0.12
1633 * - ``python3-dbus``
1634 - 1.3.2
1635 - 1.4.0
1636 * - ``python3-dbusmock``
1637 - 0.32.1
1638 - 0.33.0
1639 * - ``python3-dtc``
1640 - 1.7.0
1641 - 1.7.2
1642 * - ``python3-dtschema``
1643 - 2024.5
1644 - 2025.2
1645 * - ``python3-flit-core``
1646 - 3.9.0
1647 - 3.11.0
1648 * - ``python3-gitdb``
1649 - 4.0.11
1650 - 4.0.12
1651 * - ``python3-hatchling``
1652 - 1.25.0
1653 - 1.27.0
1654 * - ``python3-hypothesis``
1655 - 6.111.2
1656 - 6.129.2
1657 * - ``python3-idna``
1658 - 3.8
1659 - 3.10
1660 * - ``python3-jinja2``
1661 - 3.1.4
1662 - 3.1.6
1663 * - ``python3-jsonschema-specifications``
1664 - 2023.12.1
1665 - 2024.10.1
1666 * - ``python3-license-expression``
1667 - 30.3.1
1668 - 30.4.1
1669 * - ``python3-lxml``
1670 - 5.3.0
1671 - 5.3.1
1672 * - ``python3-mako``
1673 - 1.3.5
1674 - 1.3.9
1675 * - ``python3-markdown``
1676 - 3.6
1677 - 3.7
1678 * - ``python3-markupsafe``
1679 - 2.1.5
1680 - 3.0.2
1681 * - ``python3-maturin``
1682 - 1.7.1
1683 - 1.8.3
1684 * - ``python3-meson-python``
1685 - 0.16.0
1686 - 0.17.1
1687 * - ``python3-more-itertools``
1688 - 10.4.0
1689 - 10.6.0
1690 * - ``python3-numpy``
1691 - 1.26.4
1692 - 2.2.3
1693 * - ``python3-packaging``
1694 - 24.1
1695 - 24.2
1696 * - ``python3-pip``
1697 - 24.2
1698 - 25.0.1
1699 * - ``python3-poetry-core``
1700 - 1.9.0
1701 - 2.1.1
1702 * - ``python3-psutil``
1703 - 6.0.0
1704 - 7.0.0
1705 * - ``python3-pyasn1``
1706 - 0.6.0
1707 - 0.6.1
1708 * - ``python3-pycairo``
1709 - 1.26.1
1710 - 1.27.0
1711 * - ``python3-pycryptodome``
1712 - 3.20.0
1713 - 3.22.0
1714 * - ``python3-pycryptodomex``
1715 - 3.20.0
1716 - 3.22.0
1717 * - ``python3-pyelftools``
1718 - 0.31
1719 - 0.32
1720 * - ``python3-pygments``
1721 - 2.18.0
1722 - 2.19.1
1723 * - ``python3-pygobject``
1724 - 3.48.2
1725 - 3.52.2
1726 * - ``python3-pyopenssl``
1727 - 24.2.1
1728 - 25.0.0
1729 * - ``python3-pyparsing``
1730 - 3.1.4
1731 - 3.2.1
1732 * - ``python3-pyproject-hooks``
1733 - 1.0.0
1734 - 1.2.0
1735 * - ``python3-pyproject-metadata``
1736 - 0.8.0
1737 - 0.9.1
1738 * - ``python3-pytest``
1739 - 8.3.2
1740 - 8.3.5
1741 * - ``python3-pytest-subtests``
1742 - 0.13.1
1743 - 0.14.1
1744 * - ``python3-pytz``
1745 - 2024.1
1746 - 2025.1
1747 * - ``python3-rdflib``
1748 - 7.0.0
1749 - 7.1.3
1750 * - ``python3-referencing``
1751 - 0.35.1
1752 - 0.36.2
1753 * - ``python3-rpds-py``
1754 - 0.20.0
1755 - 0.22.3
1756 * - ``python3-ruamel-yaml``
1757 - 0.18.6
1758 - 0.18.10
1759 * - ``python3-scons``
1760 - 4.8.0
1761 - 4.9.0
1762 * - ``python3-setuptools``
1763 - 72.1.0
1764 - 76.0.0
1765 * - ``python3-setuptools-rust``
1766 - 1.10.1
1767 - 1.11.0
1768 * - ``python3-setuptools-scm``
1769 - 8.1.0
1770 - 8.2.0
1771 * - ``python3-six``
1772 - 1.16.0
1773 - 1.17.0
1774 * - ``python3-spdx-tools``
1775 - 0.8.2
1776 - 0.8.3
1777 * - ``python3-sphinx``
1778 - 8.0.2
1779 - 8.2.1
1780 * - ``python3-sphinx-rtd-theme``
1781 - 2.0.0
1782 - 3.0.2
1783 * - ``python3-trove-classifiers``
1784 - 2024.7.2
1785 - 2025.3.13.13
1786 * - ``python3-typogrify``
1787 - 2.0.7
1788 - 2.1.0
1789 * - ``python3-urllib3``
1790 - 2.2.2
1791 - 2.3.0
1792 * - ``python3-websockets``
1793 - 13.0.1
1794 - 15.0.1
1795 * - ``python3-wheel``
1796 - 0.44.0
1797 - 0.45.1
1798 * - ``python3-xmltodict``
1799 - 0.13.0
1800 - 0.14.2
1801 * - ``python3-yamllint``
1802 - 1.35.1
1803 - 1.36.0
1804 * - ``python3-zipp``
1805 - 3.20.1
1806 - 3.21.0
1807 * - ``qemu``
1808 - 9.0.2
1809 - 9.2.0
1810 * - ``qemu-native``
1811 - 9.0.2
1812 - 9.2.0
1813 * - ``qemu-system-native``
1814 - 9.0.2
1815 - 9.2.0
1816 * - ``re2c``
1817 - 3.1
1818 - 4.1
1819 * - ``repo``
1820 - 2.46
1821 - 2.52
1822 * - ``rpm``
1823 - 4.19.1.1
1824 - 4.20.0
1825 * - ``rsync``
1826 - 3.3.0
1827 - 3.4.1
1828 * - ``rt-tests``
1829 - 2.7
1830 - 2.8
1831 * - ``ruby``
1832 - 3.3.4
1833 - 3.4.2
1834 * - ``rust``
1835 - 1.79.0
1836 - 1.84.1
1837 * - ``rust-cross-canadian``
1838 - 1.79.0
1839 - 1.84.1
1840 * - ``rust-llvm``
1841 - 1.79.0
1842 - 1.84.1
1843 * - ``screen``
1844 - 4.9.1
1845 - 5.0.0
1846 * - ``seatd``
1847 - 0.8.0
1848 - 0.9.1
1849 * - ``shaderc``
1850 - 2024.1
1851 - 2024.3
1852 * - ``shadow``
1853 - 4.16.0
1854 - 4.17.3
1855 * - ``socat``
1856 - 1.8.0.0
1857 - 1.8.0.3
1858 * - ``spirv-headers``
1859 - 1.3.290.0
1860 - 1.4.309.0
1861 * - ``spirv-tools``
1862 - 1.3.290.0
1863 - 1.4.309.0
1864 * - ``sqlite3``
1865 - 3.46.1
1866 - 3.48.0
1867 * - ``strace``
1868 - 6.10
1869 - 6.12
1870 * - ``stress-ng``
1871 - 0.18.02
1872 - 0.18.11
1873 * - ``subversion``
1874 - 1.14.3
1875 - 1.14.5
1876 * - ``sudo``
1877 - 1.9.15p5
1878 - 1.9.16p2
1879 * - ``swig``
1880 - 4.2.1
1881 - 4.3.0
1882 * - ``sysklogd``
1883 - 2.6.1
1884 - 2.7.1
1885 * - ``sysstat``
1886 - 12.7.6
1887 - 12.7.7
1888 * - ``systemd``
1889 - 256.5
1890 - 257.4
1891 * - ``systemd-boot``
1892 - 256.5
1893 - 257.4
1894 * - ``systemd-boot-native``
1895 - 256.5
1896 - 257.4
1897 * - ``systemd-systemctl-native``
1898 - 1.0
1899 - 257.4
1900 * - ``systemtap``
1901 - 5.1
1902 - 5.2
1903 * - ``systemtap-native``
1904 - 5.1
1905 - 5.2
1906 * - ``sysvinit``
1907 - 3.04
1908 - 3.14
1909 * - ``tcl``
1910 - 8.6.14
1911 - 9.0.1
1912 * - ``texinfo``
1913 - 7.1
1914 - 7.2
1915 * - ``tiff``
1916 - 4.6.0
1917 - 4.7.0
1918 * - ``ttyrun``
1919 - 2.34.0
1920 - 2.37.0
1921 * - ``u-boot``
1922 - 2024.07
1923 - 2025.01
1924 * - ``u-boot-tools``
1925 - 2024.07
1926 - 2025.01
1927 * - ``usbutils``
1928 - 017
1929 - 018
1930 * - ``utfcpp``
1931 - 4.0.5
1932 - 4.0.6
1933 * - ``util-linux``
1934 - 2.40.2
1935 - 2.40.4
1936 * - ``util-linux-libuuid``
1937 - 2.40.2
1938 - 2.40.4
1939 * - ``util-macros``
1940 - 1.20.1
1941 - 1.20.2
1942 * - ``vala``
1943 - 0.56.17
1944 - 0.56.18
1945 * - ``valgrind``
1946 - 3.23.0
1947 - 3.24.0
1948 * - ``vim``
1949 - 9.1.1043
1950 - 9.1.1198
1951 * - ``vim-tiny``
1952 - 9.1.1043
1953 - 9.1.1198
1954 * - ``virglrenderer``
1955 - 1.0.1
1956 - 1.1.0
1957 * - ``vte``
1958 - 0.76.3
1959 - 0.78.2
1960 * - ``vulkan-headers``
1961 - 1.3.290.0
1962 - 1.4.309.0
1963 * - ``vulkan-loader``
1964 - 1.3.290.0
1965 - 1.4.309.0
1966 * - ``vulkan-samples``
1967 - git (fdce530c0295…)
1968 - git (8547ce1022a1…)
1969 * - ``vulkan-tools``
1970 - 1.3.290.0
1971 - 1.4.309.0
1972 * - ``vulkan-utility-libraries``
1973 - 1.3.290.0
1974 - 1.4.309.0
1975 * - ``vulkan-validation-layers``
1976 - 1.3.290.0
1977 - 1.4.309.0
1978 * - ``vulkan-volk``
1979 - 1.3.290.0
1980 - 1.4.309.0
1981 * - ``wayland-protocols``
1982 - 1.37
1983 - 1.41
1984 * - ``webkitgtk``
1985 - 2.44.3
1986 - 2.48.0
1987 * - ``weston``
1988 - 13.0.3
1989 - 14.0.1
1990 * - ``wget``
1991 - 1.24.5
1992 - 1.25.0
1993 * - ``wireless-regdb``
1994 - 2024.10.07
1995 - 2025.02.20
1996 * - ``wpebackend-fdo``
1997 - 1.14.2
1998 - 1.16.0
1999 * - ``xauth``
2000 - 1.1.3
2001 - 1.1.4
2002 * - ``xcb-util-cursor``
2003 - 0.1.4
2004 - 0.1.5
2005 * - ``xf86-input-evdev``
2006 - 2.10.6
2007 - 2.11.0
2008 * - ``xf86-input-libinput``
2009 - 1.4.0
2010 - 1.5.0
2011 * - ``xf86-input-synaptics``
2012 - 1.9.2
2013 - 1.10.0
2014 * - ``xf86-video-fbdev``
2015 - 0.5.0
2016 - 0.5.1
2017 * - ``xhost``
2018 - 1.0.9
2019 - 1.0.10
2020 * - ``xinit``
2021 - 1.4.2
2022 - 1.4.4
2023 * - ``xkeyboard-config``
2024 - 2.42
2025 - 2.44
2026 * - ``xprop``
2027 - 1.2.7
2028 - 1.2.8
2029 * - ``xrandr``
2030 - 1.5.2
2031 - 1.5.3
2032 * - ``xtrans``
2033 - 1.5.0
2034 - 1.6.0
2035 * - ``xxhash``
2036 - 0.8.2
2037 - 0.8.3
2038 * - ``xz``
2039 - 5.6.2
2040 - 5.6.4
2041 * - ``zstd``
2042 - 1.5.6
2043 - 1.5.
2044 7
2045
2046Contributors to |yocto-ver|
2047~~~~~~~~~~~~~~~~~~~~~~~~~~~
2048
2049Thanks to the following people who contributed to this release:
2050
2051- Aditya Tayade
2052- Adrian Freihofer
2053- Alban Bedel
2054- Aleksandar Nikolic
2055- Alessio Cascone
2056- Alexander Hirsch
2057- Alexander Kanavin
2058- Alexander Sverdlin
2059- Alexander van Gessel
2060- Alexander Yurkov
2061- Alexandre Marques
2062- Alexis Cellier
2063- Alex Kiernan
2064- Andrej Valek
2065- Angelo Ribeiro
2066- Antonin Godard
2067- Archana Polampalli
2068- Artur Kowalski
2069- Awais Belal
2070- Balaji Pothunoori
2071- Bartosz Golaszewski
2072- Bastian Germann
2073- Bastian Krause
2074- Bastien JAUNY
2075- BELHADJ SALEM Talel
2076- Benjamin Bara
2077- Benjamin Grossschartner
2078- Benjamin Szőke
2079- Bin Lan
2080- Bruce Ashfield
2081- Changhyeok Bae
2082- Changqing Li
2083- Chen Qi
2084- Chris Laplante
2085- Christian Lindeberg
2086- Christian Taedcke
2087- Christos Gavros
2088- Claus Stovgaard
2089- Clayton Casciato
2090- Colin McAllister
2091- Daniel Ammann
2092- Daniel McGregor
2093- Dan McGregor
2094- Deepesh Varatharajan
2095- Deepthi Hemraj
2096- Denis OSTERLAND-HEIM
2097- Denys Dmytriyenko
2098- Derek Straka
2099- Divya Chellam
2100- Dmitry Baryshkov
2101- Enrico Jörns
2102- Enrico Scholz
2103- Eric Meyers
2104- Esben Haabendal
2105- Etienne Cordonnier
2106- Fabio Berton
2107- Fabio Estevam
2108- Gaël PORTAY
2109- Georgi, Tom
2110- Guðni Már Gilbert
2111- Guénaël Muller
2112- Harish Sadineni
2113- Haseeb Ashraf
2114- Hiago De Franco
2115- Hongxu Jia
2116- Igor Opaniuk
2117- Jagadeesh Krishnanjanappa
2118- Jamin Lin
2119- Jason Schonberg
2120- Jean-Pierre Geslin
2121- Jermain Horsman
2122- Jesse Riemens
2123- Jiaying Song
2124- Jinfeng Wang
2125- João Henrique Ferreira de Freitas
2126- Joerg Schmidt
2127- Jonas Gorski
2128- Jon Mason
2129- Jörg Sommer
2130- Jose Quaresma
2131- Joshua Watt
2132- Julien Stephan
2133- Justin Bronder
2134- Kai Kang
2135- Katariina Lounento
2136- Katawann
2137- Kevin Hao
2138- Khem Raj
2139- Koen Kooi
2140- Lee Chee Yang
2141- Lei Maohui
2142- Lei YU
2143- Leon Anavi
2144- Louis Rannou
2145- Maik Otto
2146- Makarios Christakis
2147- Marc Ferland
2148- Marco Felsch
2149- Marek Vasut
2150- Mark Hatle
2151- Markus Volk
2152- Marta Rybczynska
2153- Martin Jansa
2154- Mathieu Dubois-Briand
2155- Matthias Schiffer
2156- Maxin John
2157- Michael Estner
2158- Michael Halstead
2159- Michael Nazzareno Trimarchi
2160- Michael Opdenacker
2161- Michelle Lin
2162- Mikko Rapeli
2163- Ming Liu
2164- Moritz Haase
2165- Nick Owens
2166- Nicolas Dechesne
2167- Nikolai Merinov
2168- Niko Mauno
2169- Ninette Adhikari
2170- Ola x Nilsson
2171- Oleksandr Hnatiuk
2172- Oliver Kästner
2173- Omri Sarig
2174- Pascal Eberhard
2175- Patrik Nordvall
2176- Paul Barker
2177- Pavel Zhukov
2178- Pedro Ferreira
2179- Peter Bergin
2180- Peter Delevoryas
2181- Peter Kjellerstedt
2182- Peter Marko
2183- Peter Tatrai
2184- Philip Lorenz
2185- Priyal Doshi
2186- Purushottam Choudhary
2187- Quentin Schulz
2188- Ralph Siemsen
2189- Randy MacLeod
2190- Ranjitsinh Rathod
2191- Rasmus Villemoes
2192- Regis Dargent
2193- Ricardo Salveti
2194- Richard Purdie
2195- Robert Yang
2196- Rohini Sangam
2197- Roland Hieber
2198- Ross Burton
2199- Ryan Eatmon
2200- Savvas Etairidis
2201- Sean Nyekjaer
2202- Sebastian Zenker
2203- Sergei Zhmylev
2204- Shunsuke Tokumoto
2205- Sid-Ali
2206- Simon A. Eugster
2207- Simone Weiß
2208- Slawomir Stepien
2209- Sofiane HAMAM
2210- Stefan Gloor
2211- Stefan Herbrechtsmeier
2212- Stefan Koch
2213- Stefan Mueller-Klieser
2214- Steve Sakoman
2215- Sunil Dora
2216- Sven Kalmbach
2217- Talel BELHAJSALEM
2218- Thomas Perrot
2219- Thomas Roos
2220- Tim Orling
2221- Tom Hochstein
2222- Trevor Gamblin
2223- Ulrich Ölmann
2224- Valeria Petrov
2225- Victor J. Hansen
2226- Victor Kamensky
2227- Vijay Anusuri
2228- Vince Chang
2229- Vivek Puar
2230- Vyacheslav Yurkov
2231- Walter Schweizer
2232- Wang Mingyu
2233- Weisser, Pascal
2234- Xiangyu Chen
2235- Xiaotian Wu
2236- Yash Shinde
2237- Yi Zhao
2238- Yoann Congal
2239- Yogita Urade
2240- Zoltán Böszörményi
2241
2242Repositories / Downloads for Yocto-|yocto-ver|
2243~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2244
2245
2246poky
2247
2248- Repository Location: :yocto_git:`/poky`
2249- Branch: :yocto_git:`walnascar </poky/log/?h=walnascar>`
2250- Tag: :yocto_git:`yocto-5.2 </poky/log/?h=yocto-5.2>`
2251- Git Revision: :yocto_git:`9b96fdbb0cab02f4a6180e812b02bc9d4c41b1a5 </poky/commit/?id=9b96fdbb0cab02f4a6180e812b02bc9d4c41b1a5>`
2252- Release Artefact: poky-9b96fdbb0cab02f4a6180e812b02bc9d4c41b1a5
2253- sha: 2d3c0e216c7fa71a364986be6754549e2059d37581aad0a53f0f95c33fb1eefe
2254- Download Locations:
2255 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2/poky-9b96fdbb0cab02f4a6180e812b02bc9d4c41b1a5.tar.bz2
2256 https://mirrors.kernel.org/yocto/yocto/yocto-5.2/poky-9b96fdbb0cab02f4a6180e812b02bc9d4c41b1a5.tar.bz2
2257
2258openembedded-core
2259
2260- Repository Location: :oe_git:`/openembedded-core`
2261- Branch: :oe_git:`walnascar </openembedded-core/log/?h=walnascar>`
2262- Tag: :oe_git:`yocto-5.2 </openembedded-core/log/?h=yocto-5.2>`
2263- Git Revision: :oe_git:`6ec2c52b938302b894f119f701ffcf0a847eee85 </openembedded-core/commit/?id=6ec2c52b938302b894f119f701ffcf0a847eee85>`
2264- Release Artefact: oecore-6ec2c52b938302b894f119f701ffcf0a847eee85
2265- sha: 00453354efdd9c977d559f7c0047691bb974170ce313ac9a1e6cb94108d6c648
2266- Download Locations:
2267 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2/oecore-6ec2c52b938302b894f119f701ffcf0a847eee85.tar.bz2
2268 https://mirrors.kernel.org/yocto/yocto/yocto-5.2/oecore-6ec2c52b938302b894f119f701ffcf0a847eee85.tar.bz2
2269
2270meta-mingw
2271
2272- Repository Location: :yocto_git:`/meta-mingw`
2273- Branch: :yocto_git:`walnascar </meta-mingw/log/?h=walnascar>`
2274- Tag: :yocto_git:`yocto-5.2 </meta-mingw/log/?h=yocto-5.2>`
2275- Git Revision: :yocto_git:`edce693e1b8fabd84651aa6c0888aafbcf238577 </meta-mingw/commit/?id=edce693e1b8fabd84651aa6c0888aafbcf238577>`
2276- Release Artefact: meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577
2277- sha: 6cfed41b54f83da91a6cf201ec1c2cd4ac284f642b1268c8fa89d2335ea2bce1
2278- Download Locations:
2279 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2/meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577.tar.bz2
2280 https://mirrors.kernel.org/yocto/yocto/yocto-5.2/meta-mingw-edce693e1b8fabd84651aa6c0888aafbcf238577.tar.bz2
2281
2282bitbake
2283
2284- Repository Location: :oe_git:`/bitbake`
2285- Branch: :oe_git:`2.12 </bitbake/log/?h=2.12>`
2286- Tag: :oe_git:`yocto-5.2 </bitbake/log/?h=yocto-5.2>`
2287- Git Revision: :oe_git:`5b4e20377eea8d428edf1aeb2187c18f82ca6757 </bitbake/commit/?id=5b4e20377eea8d428edf1aeb2187c18f82ca6757>`
2288- Release Artefact: bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757
2289- sha: 48cff22c1e61f47adce474b636ca865e7e0b62293fc5c8829d09e7f1ac5252af
2290- Download Locations:
2291 https://downloads.yoctoproject.org/releases/yocto/yocto-5.2/bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757.tar.bz2
2292 https://mirrors.kernel.org/yocto/yocto/yocto-5.2/bitbake-5b4e20377eea8d428edf1aeb2187c18f82ca6757.tar.bz2
2293
2294yocto-docs
2295
2296- Repository Location: :yocto_git:`/yocto-docs`
2297- Branch: :yocto_git:`walnascar </yocto-docs/log/?h=walnascar>`
2298- Tag: :yocto_git:`yocto-5.2 </yocto-docs/log/?h=yocto-5.2>`
2299- Git Revision: :yocto_git:`b8d9cf79d299b2e553e6bc962527d835206022ec </yocto-docs/commit/?id=b8d9cf79d299b2e553e6bc962527d835206022ec>`
2300
diff --git a/documentation/migration-guides/release-notes-5.3.rst b/documentation/migration-guides/release-notes-5.3.rst
new file mode 100644
index 0000000000..181f1a401d
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.3.rst
@@ -0,0 +1,126 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3.. |yocto-codename| replace:: whinlatter
4.. |yocto-ver| replace:: 5.3
5.. Note: anchors id below cannot contain substitutions so replace them with the
6 value of |yocto-ver| above.
7
8Release notes for |yocto-ver| (|yocto-codename|)
9------------------------------------------------
10
11New Features / Enhancements in |yocto-ver|
12~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
13
14- Linux kernel XXX, gcc XXX, glibc XXX, LLVM XXX, and over XXX other
15 recipe upgrades.
16
17- Minimum Python version required on the host: XXX.
18
19- New variables:
20
21- Kernel-related changes:
22
23- New core recipes:
24
25- New core classes:
26
27- Architecture-specific changes:
28
29- QEMU / ``runqemu`` changes:
30
31- Documentation changes:
32
33- Go changes:
34
35- Rust changes:
36
37- Wic Image Creator changes:
38
39- SDK-related changes:
40
41- Testing-related changes:
42
43- Utility script changes:
44
45- BitBake changes:
46
47- Packaging changes:
48
49- LLVM related changes:
50
51- SPDX-related changes:
52
53- ``devtool`` changes:
54
55- Patchtest-related changes:
56
57- :ref:`ref-classes-insane` class related changes:
58
59- Security changes:
60
61- :ref:`ref-classes-cve-check` changes:
62
63- New :term:`PACKAGECONFIG` options for individual recipes:
64
65- Systemd related changes:
66
67- :ref:`ref-classes-sanity` class changes:
68
69- Miscellaneous changes:
70
71Known Issues in |yocto-ver|
72~~~~~~~~~~~~~~~~~~~~~~~~~~~
73
74Recipe License changes in |yocto-ver|
75~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
76
77The following changes have been made to the :term:`LICENSE` values set by recipes:
78
79.. list-table::
80 :widths: 20 40 40
81 :header-rows: 1
82
83 * - Recipe
84 - Previous value
85 - New value
86 * - ``recipe name``
87 - Previous value
88 - New value
89
90Security Fixes in |yocto-ver|
91~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92
93The following CVEs have been fixed:
94
95.. list-table::
96 :widths: 30 70
97 :header-rows: 1
98
99 * - Recipe
100 - CVE IDs
101 * - ``recipe name``
102 - :cve_nist:`xxx-xxxx`, ...
103
104Recipe Upgrades in |yocto-ver|
105~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
106
107The following recipes have been upgraded:
108
109.. list-table::
110 :widths: 20 40 40
111 :header-rows: 1
112
113 * - Recipe
114 - Previous version
115 - New version
116 * - ``recipe name``
117 - Previous version
118 - New version
119
120Contributors to |yocto-ver|
121~~~~~~~~~~~~~~~~~~~~~~~~~~~
122
123Thanks to the following people who contributed to this release:
124
125Repositories / Downloads for Yocto-|yocto-ver|
126~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~