diff options
Diffstat (limited to 'documentation')
122 files changed, 6918 insertions, 1985 deletions
diff --git a/documentation/Makefile b/documentation/Makefile index 189bd1dfac..65e29713d4 100644 --- a/documentation/Makefile +++ b/documentation/Makefile | |||
@@ -3,17 +3,18 @@ | |||
3 | 3 | ||
4 | # You can set these variables from the command line, and also | 4 | # You can set these variables from the command line, and also |
5 | # from the environment for the first two. | 5 | # from the environment for the first two. |
6 | SPHINXOPTS ?= -W --keep-going -j auto | 6 | SPHINXOPTS ?= -W --keep-going -j auto |
7 | SPHINXBUILD ?= sphinx-build | 7 | SPHINXBUILD ?= sphinx-build |
8 | # Release notes are excluded because they contain contributor names and commit messages which can't be modified | 8 | # Release notes are excluded because they contain contributor names and commit messages which can't be modified |
9 | VALEOPTS ?= --no-wrap --glob '!migration-guides/release-notes-*.rst' | 9 | VALEOPTS ?= --no-wrap --glob '!migration-guides/release-notes-*.rst' |
10 | VALEDOCS ?= . | 10 | SOURCEDIR = . |
11 | SOURCEDIR = . | 11 | VALEDOCS ?= $(SOURCEDIR) |
12 | IMAGEDIRS = */svg | 12 | SPHINXLINTDOCS ?= $(SOURCEDIR) |
13 | BUILDDIR = _build | 13 | IMAGEDIRS = */svg |
14 | DESTDIR = final | 14 | BUILDDIR = _build |
15 | SVG2PNG = inkscape | 15 | DESTDIR = final |
16 | SVG2PDF = inkscape | 16 | SVG2PNG = rsvg-convert |
17 | SVG2PDF = rsvg-convert | ||
17 | 18 | ||
18 | ifeq ($(shell if which $(SPHINXBUILD) >/dev/null 2>&1; then echo 1; else echo 0; fi),0) | 19 | ifeq ($(shell if which $(SPHINXBUILD) >/dev/null 2>&1; then echo 1; else echo 0; fi),0) |
19 | $(error "The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed") | 20 | $(error "The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed") |
@@ -25,10 +26,12 @@ help: | |||
25 | 26 | ||
26 | .PHONY: all help Makefile clean stylecheck publish epub latexpdf | 27 | .PHONY: all help Makefile clean stylecheck publish epub latexpdf |
27 | 28 | ||
28 | publish: Makefile html singlehtml | 29 | publish: Makefile epub latexpdf html singlehtml |
29 | rm -rf $(BUILDDIR)/$(DESTDIR)/ | 30 | rm -rf $(BUILDDIR)/$(DESTDIR)/ |
30 | mkdir -p $(BUILDDIR)/$(DESTDIR)/ | 31 | mkdir -p $(BUILDDIR)/$(DESTDIR)/ |
31 | cp -r $(BUILDDIR)/html/* $(BUILDDIR)/$(DESTDIR)/ | 32 | cp -r $(BUILDDIR)/html/* $(BUILDDIR)/$(DESTDIR)/ |
33 | mkdir -p $(BUILDDIR)/$(DESTDIR)/_static | ||
34 | cp $(BUILDDIR)/epub/TheYoctoProject.epub $(BUILDDIR)/latex/theyoctoproject.pdf $(BUILDDIR)/$(DESTDIR)/_static/ | ||
32 | cp $(BUILDDIR)/singlehtml/index.html $(BUILDDIR)/$(DESTDIR)/singleindex.html | 35 | cp $(BUILDDIR)/singlehtml/index.html $(BUILDDIR)/$(DESTDIR)/singleindex.html |
33 | sed -i -e 's@index.html#@singleindex.html#@g' $(BUILDDIR)/$(DESTDIR)/singleindex.html | 36 | sed -i -e 's@index.html#@singleindex.html#@g' $(BUILDDIR)/$(DESTDIR)/singleindex.html |
34 | 37 | ||
@@ -40,11 +43,11 @@ PNGs := $(foreach dir, $(IMAGEDIRS), $(patsubst %.svg,%.png,$(wildcard $(SOURCED | |||
40 | 43 | ||
41 | # Pattern rule for converting SVG to PDF | 44 | # Pattern rule for converting SVG to PDF |
42 | %.pdf : %.svg | 45 | %.pdf : %.svg |
43 | $(SVG2PDF) --export-filename=$@ $< | 46 | $(SVG2PDF) --format=Pdf --output=$@ $< |
44 | 47 | ||
45 | # Pattern rule for converting SVG to PNG | 48 | # Pattern rule for converting SVG to PNG |
46 | %.png : %.svg | 49 | %.png : %.svg |
47 | $(SVG2PNG) --export-filename=$@ $< | 50 | $(SVG2PNG) --format=Png --output=$@ $< |
48 | 51 | ||
49 | clean: | 52 | clean: |
50 | @rm -rf $(BUILDDIR) $(PNGs) $(PDFs) poky.yaml sphinx-static/switchers.js releases.rst | 53 | @rm -rf $(BUILDDIR) $(PNGs) $(PDFs) poky.yaml sphinx-static/switchers.js releases.rst |
@@ -54,15 +57,18 @@ stylecheck: | |||
54 | vale $(VALEOPTS) $(VALEDOCS) | 57 | vale $(VALEOPTS) $(VALEDOCS) |
55 | 58 | ||
56 | sphinx-lint: | 59 | sphinx-lint: |
57 | sphinx-lint $(SOURCEDIR) | 60 | sphinx-lint $(SPHINXLINTDOCS) |
58 | 61 | ||
59 | epub: $(PNGs) | 62 | epub: $(PNGs) |
60 | $(SOURCEDIR)/set_versions.py | 63 | $(SOURCEDIR)/set_versions.py |
61 | @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) | 64 | @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) |
62 | 65 | ||
66 | # Note: we need to pass buf_size here (which is also configurable from | ||
67 | # texmf.cnf), to avoid following error: | ||
68 | # Unable to read an entire line---bufsize=200000. Please increase buf_size in texmf.cnf. | ||
63 | latexpdf: $(PDFs) | 69 | latexpdf: $(PDFs) |
64 | $(SOURCEDIR)/set_versions.py | 70 | $(SOURCEDIR)/set_versions.py |
65 | @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) | 71 | buf_size=10000000 $(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) |
66 | 72 | ||
67 | all: html epub latexpdf | 73 | all: html epub latexpdf |
68 | 74 | ||
diff --git a/documentation/README b/documentation/README index b60472fcbf..c394ab9288 100644 --- a/documentation/README +++ b/documentation/README | |||
@@ -165,7 +165,15 @@ To run Vale: | |||
165 | 165 | ||
166 | $ make stylecheck | 166 | $ make stylecheck |
167 | 167 | ||
168 | Link checking the Yocto Project documentation | 168 | Style checking the whole documentation might take some time and generate a |
169 | lot of warnings/errors, thus one can run Vale on a subset of files or | ||
170 | directories: | ||
171 | |||
172 | $ make stylecheck VALEDOCS=<file> | ||
173 | $ make stylecheck VALEDOCS="<file1> <file2>" | ||
174 | $ make stylecheck VALEDOCS=<dir> | ||
175 | |||
176 | Lint checking the Yocto Project documentation | ||
169 | ============================================= | 177 | ============================================= |
170 | 178 | ||
171 | To fix errors which are not reported by Sphinx itself, | 179 | To fix errors which are not reported by Sphinx itself, |
@@ -179,6 +187,14 @@ To run sphinx-lint: | |||
179 | 187 | ||
180 | $ make sphinx-lint | 188 | $ make sphinx-lint |
181 | 189 | ||
190 | Lint checking the whole documentation might take some time and generate a | ||
191 | lot of warnings/errors, thus one can run sphinx-lint on a subset of files | ||
192 | or directories: | ||
193 | |||
194 | $ make sphinx-lint SPHINXLINTDOCS=<file> | ||
195 | $ make sphinx-lint SPHINXLINTDOCS="<file1> <file2>" | ||
196 | $ make sphinx-lint SPHINXLINTDOCS=<dir> | ||
197 | |||
182 | Sphinx theme and CSS customization | 198 | Sphinx theme and CSS customization |
183 | ================================== | 199 | ================================== |
184 | 200 | ||
@@ -413,5 +429,22 @@ both the Yocto Project and BitBake manuals: | |||
413 | Submitting documentation changes | 429 | Submitting documentation changes |
414 | ================================ | 430 | ================================ |
415 | 431 | ||
416 | Please see the top level README file in this repository for details of where | 432 | Please refer to our contributor guide here: https://docs.yoctoproject.org/contributor-guide/ |
417 | to send patches. | 433 | for full details on how to submit changes. |
434 | |||
435 | As a quick guide, patches should be sent to docs@lists.yoctoproject.org | ||
436 | The git command to do that would be: | ||
437 | |||
438 | git send-email -M -1 --to docs@lists.yoctoproject.org | ||
439 | |||
440 | The 'To' header can be set as default for this repository: | ||
441 | |||
442 | git config sendemail.to docs@lists.yoctoproject.org | ||
443 | |||
444 | Now you can just do 'git send-email origin/master..' to send all local patches. | ||
445 | |||
446 | Read the other sections in this document and documentation/standards.md for | ||
447 | rules to follow when contributing to the documentation. | ||
448 | |||
449 | Git repository: https://git.yoctoproject.org/yocto-docs | ||
450 | Mailing list: docs@lists.yoctoproject.org | ||
diff --git a/documentation/brief-yoctoprojectqs/index.rst b/documentation/brief-yoctoprojectqs/index.rst index c5400e4ac8..b37142ef14 100644 --- a/documentation/brief-yoctoprojectqs/index.rst +++ b/documentation/brief-yoctoprojectqs/index.rst | |||
@@ -44,7 +44,7 @@ following requirements: | |||
44 | much more will help to run multiple builds and increase | 44 | much more will help to run multiple builds and increase |
45 | performance by reusing build artifacts. | 45 | performance by reusing build artifacts. |
46 | 46 | ||
47 | - At least &MIN_RAM; Gbytes of RAM, though a modern modern build host with as | 47 | - At least &MIN_RAM; Gbytes of RAM, though a modern build host with as |
48 | much RAM and as many CPU cores as possible is strongly recommended to | 48 | much RAM and as many CPU cores as possible is strongly recommended to |
49 | maximize build performance. | 49 | maximize build performance. |
50 | 50 | ||
@@ -57,7 +57,7 @@ following requirements: | |||
57 | :ref:`dev-manual/start:preparing the build host` | 57 | :ref:`dev-manual/start:preparing the build host` |
58 | section in the Yocto Project Development Tasks Manual. | 58 | section in the Yocto Project Development Tasks Manual. |
59 | 59 | ||
60 | - | 60 | - Ensure that the following utilities have these minimum version numbers: |
61 | 61 | ||
62 | - Git &MIN_GIT_VERSION; or greater | 62 | - Git &MIN_GIT_VERSION; or greater |
63 | - tar &MIN_TAR_VERSION; or greater | 63 | - tar &MIN_TAR_VERSION; or greater |
@@ -65,7 +65,7 @@ following requirements: | |||
65 | - gcc &MIN_GCC_VERSION; or greater. | 65 | - gcc &MIN_GCC_VERSION; or greater. |
66 | - GNU make &MIN_MAKE_VERSION; or greater | 66 | - GNU make &MIN_MAKE_VERSION; or greater |
67 | 67 | ||
68 | If your build host does not meet any of these three listed version | 68 | If your build host does not satisfy all of the above version |
69 | requirements, you can take steps to prepare the system so that you | 69 | requirements, you can take steps to prepare the system so that you |
70 | can still use the Yocto Project. See the | 70 | can still use the Yocto Project. See the |
71 | :ref:`ref-manual/system-requirements:required git, tar, python, make and gcc versions` | 71 | :ref:`ref-manual/system-requirements:required git, tar, python, make and gcc versions` |
@@ -78,7 +78,7 @@ You must install essential host packages on your build host. The | |||
78 | following command installs the host packages based on an Ubuntu | 78 | following command installs the host packages based on an Ubuntu |
79 | distribution:: | 79 | distribution:: |
80 | 80 | ||
81 | $ sudo apt install &UBUNTU_HOST_PACKAGES_ESSENTIAL; | 81 | $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL; |
82 | 82 | ||
83 | .. note:: | 83 | .. note:: |
84 | 84 | ||
@@ -182,7 +182,7 @@ an entire Linux distribution, including the toolchain, from source. | |||
182 | page of the Yocto Project Wiki. | 182 | page of the Yocto Project Wiki. |
183 | 183 | ||
184 | #. **Initialize the Build Environment:** From within the ``poky`` | 184 | #. **Initialize the Build Environment:** From within the ``poky`` |
185 | directory, run the :ref:`ref-manual/structure:\`\`oe-init-build-env\`\`` | 185 | directory, run the :ref:`ref-manual/structure:``oe-init-build-env``` |
186 | environment | 186 | environment |
187 | setup script to define Yocto Project's build environment on your | 187 | setup script to define Yocto Project's build environment on your |
188 | build host. | 188 | build host. |
@@ -252,7 +252,7 @@ an entire Linux distribution, including the toolchain, from source. | |||
252 | file in the :term:`Build Directory`:: | 252 | file in the :term:`Build Directory`:: |
253 | 253 | ||
254 | BB_HASHSERVE_UPSTREAM = "wss://hashserv.yoctoproject.org/ws" | 254 | BB_HASHSERVE_UPSTREAM = "wss://hashserv.yoctoproject.org/ws" |
255 | SSTATE_MIRRORS ?= "file://.* http://cdn.jsdelivr.net/yocto/sstate/all/PATH;downloadfilename=PATH" | 255 | SSTATE_MIRRORS ?= "file://.* http://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" |
256 | BB_HASHSERVE = "auto" | 256 | BB_HASHSERVE = "auto" |
257 | BB_SIGNATURE_HANDLER = "OEEquivHash" | 257 | BB_SIGNATURE_HANDLER = "OEEquivHash" |
258 | 258 | ||
diff --git a/documentation/bsp-guide/bsp.rst b/documentation/bsp-guide/bsp.rst index 11ca5d8b76..73e31670d6 100644 --- a/documentation/bsp-guide/bsp.rst +++ b/documentation/bsp-guide/bsp.rst | |||
@@ -81,7 +81,7 @@ directory of that Layer. This directory is what you add to the | |||
81 | ``conf/bblayers.conf`` file found in your | 81 | ``conf/bblayers.conf`` file found in your |
82 | :term:`Build Directory`, which is | 82 | :term:`Build Directory`, which is |
83 | established after you run the OpenEmbedded build environment setup | 83 | established after you run the OpenEmbedded build environment setup |
84 | script (i.e. :ref:`ref-manual/structure:\`\`oe-init-build-env\`\``). | 84 | script (i.e. :ref:`ref-manual/structure:``oe-init-build-env```). |
85 | Adding the root directory allows the :term:`OpenEmbedded Build System` | 85 | Adding the root directory allows the :term:`OpenEmbedded Build System` |
86 | to recognize the BSP | 86 | to recognize the BSP |
87 | layer and from it build an image. Here is an example:: | 87 | layer and from it build an image. Here is an example:: |
@@ -166,7 +166,7 @@ section. | |||
166 | BSPs, which are maintained in their own layers or in layers designed | 166 | BSPs, which are maintained in their own layers or in layers designed |
167 | to contain several BSPs. To get an idea of machine support through | 167 | to contain several BSPs. To get an idea of machine support through |
168 | BSP layers, you can look at the | 168 | BSP layers, you can look at the |
169 | :yocto_dl:`index of machines </releases/yocto/yocto-&DISTRO;/machines>` | 169 | :yocto_dl:`index of machines </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines>` |
170 | for the release. | 170 | for the release. |
171 | 171 | ||
172 | #. *Optionally Clone the meta-intel BSP Layer:* If your hardware is | 172 | #. *Optionally Clone the meta-intel BSP Layer:* If your hardware is |
@@ -229,7 +229,7 @@ section. | |||
229 | 229 | ||
230 | #. *Initialize the Build Environment:* While in the root directory of | 230 | #. *Initialize the Build Environment:* While in the root directory of |
231 | the Source Directory (i.e. ``poky``), run the | 231 | the Source Directory (i.e. ``poky``), run the |
232 | :ref:`ref-manual/structure:\`\`oe-init-build-env\`\`` environment | 232 | :ref:`ref-manual/structure:``oe-init-build-env``` environment |
233 | setup script to define the OpenEmbedded build environment on your | 233 | setup script to define the OpenEmbedded build environment on your |
234 | build host. :: | 234 | build host. :: |
235 | 235 | ||
@@ -674,21 +674,21 @@ to the kernel recipe by using a similarly named append file, which is | |||
674 | located in the BSP Layer for your target device (e.g. the | 674 | located in the BSP Layer for your target device (e.g. the |
675 | ``meta-bsp_root_name/recipes-kernel/linux`` directory). | 675 | ``meta-bsp_root_name/recipes-kernel/linux`` directory). |
676 | 676 | ||
677 | Suppose you are using the ``linux-yocto_4.4.bb`` recipe to build the | 677 | Suppose you are using the ``linux-yocto_6.12.bb`` recipe to build the |
678 | kernel. In other words, you have selected the kernel in your | 678 | kernel. In other words, you have selected the kernel in your |
679 | ``"bsp_root_name".conf`` file by adding | 679 | ``"bsp_root_name".conf`` file by adding |
680 | :term:`PREFERRED_PROVIDER` and :term:`PREFERRED_VERSION` | 680 | :term:`PREFERRED_PROVIDER` and :term:`PREFERRED_VERSION` |
681 | statements as follows:: | 681 | statements as follows:: |
682 | 682 | ||
683 | PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" | 683 | PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" |
684 | PREFERRED_VERSION_linux-yocto ?= "4.4%" | 684 | PREFERRED_VERSION_linux-yocto ?= "6.12%" |
685 | 685 | ||
686 | .. note:: | 686 | .. note:: |
687 | 687 | ||
688 | When the preferred provider is assumed by default, the :term:`PREFERRED_PROVIDER` | 688 | When the preferred provider is assumed by default, the :term:`PREFERRED_PROVIDER` |
689 | statement does not appear in the ``"bsp_root_name".conf`` file. | 689 | statement does not appear in the ``"bsp_root_name".conf`` file. |
690 | 690 | ||
691 | You would use the ``linux-yocto_4.4.bbappend`` file to append specific | 691 | You would use the ``linux-yocto_6.12.bbappend`` file to append specific |
692 | BSP settings to the kernel, thus configuring the kernel for your | 692 | BSP settings to the kernel, thus configuring the kernel for your |
693 | particular BSP. | 693 | particular BSP. |
694 | 694 | ||
@@ -698,14 +698,19 @@ in the Yocto Project Linux Kernel Development Manual. | |||
698 | 698 | ||
699 | An alternate scenario is when you create your own kernel recipe for the | 699 | An alternate scenario is when you create your own kernel recipe for the |
700 | BSP. A good example of this is the Raspberry Pi BSP. If you examine the | 700 | BSP. A good example of this is the Raspberry Pi BSP. If you examine the |
701 | ``recipes-kernel/linux`` directory you see the following:: | 701 | ``recipes-kernel/linux`` directory in that layer you see the following |
702 | Raspberry Pi-specific recipes and associated files:: | ||
702 | 703 | ||
704 | files/ | ||
705 | linux-raspberrypi_6.12.bb | ||
706 | linux-raspberrypi_6.1.bb | ||
707 | linux-raspberrypi_6.6.bb | ||
703 | linux-raspberrypi-dev.bb | 708 | linux-raspberrypi-dev.bb |
704 | linux-raspberrypi.inc | 709 | linux-raspberrypi.inc |
705 | linux-raspberrypi_4.14.bb | 710 | linux-raspberrypi-v7_6.12.bb |
706 | linux-raspberrypi_4.9.bb | 711 | linux-raspberrypi-v7_6.1.bb |
707 | 712 | linux-raspberrypi-v7_6.6.bb | |
708 | The directory contains three kernel recipes and a common include file. | 713 | linux-raspberrypi-v7.inc |
709 | 714 | ||
710 | Developing a Board Support Package (BSP) | 715 | Developing a Board Support Package (BSP) |
711 | ======================================== | 716 | ======================================== |
@@ -1177,7 +1182,7 @@ Use these steps to create a BSP layer: | |||
1177 | 1182 | ||
1178 | - *Create a Kernel Recipe:* Create a kernel recipe in | 1183 | - *Create a Kernel Recipe:* Create a kernel recipe in |
1179 | ``recipes-kernel/linux`` by either using a kernel append file or a | 1184 | ``recipes-kernel/linux`` by either using a kernel append file or a |
1180 | new custom kernel recipe file (e.g. ``linux-yocto_4.12.bb``). The BSP | 1185 | new custom kernel recipe file (e.g. ``linux-yocto_6.12.bb``). The BSP |
1181 | layers mentioned in the previous step also contain different kernel | 1186 | layers mentioned in the previous step also contain different kernel |
1182 | examples. See the ":ref:`kernel-dev/common:modifying an existing recipe`" | 1187 | examples. See the ":ref:`kernel-dev/common:modifying an existing recipe`" |
1183 | section in the Yocto Project Linux Kernel Development Manual for | 1188 | section in the Yocto Project Linux Kernel Development Manual for |
@@ -1242,7 +1247,7 @@ located in :yocto_git:`poky/meta-yocto-bsp/conf/machine/beaglebone-yocto.conf | |||
1242 | 1247 | ||
1243 | PREFERRED_PROVIDER_virtual/xserver ?= "xserver-xorg" | 1248 | PREFERRED_PROVIDER_virtual/xserver ?= "xserver-xorg" |
1244 | 1249 | ||
1245 | MACHINE_EXTRA_RRECOMMENDS = "kernel-modules kernel-devicetree" | 1250 | MACHINE_EXTRA_RRECOMMENDS = "kernel-modules" |
1246 | 1251 | ||
1247 | EXTRA_IMAGEDEPENDS += "virtual/bootloader" | 1252 | EXTRA_IMAGEDEPENDS += "virtual/bootloader" |
1248 | 1253 | ||
@@ -1258,23 +1263,21 @@ located in :yocto_git:`poky/meta-yocto-bsp/conf/machine/beaglebone-yocto.conf | |||
1258 | SERIAL_CONSOLES ?= "115200;ttyS0 115200;ttyO0 115200;ttyAMA0" | 1263 | SERIAL_CONSOLES ?= "115200;ttyS0 115200;ttyO0 115200;ttyAMA0" |
1259 | 1264 | ||
1260 | PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" | 1265 | PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" |
1261 | PREFERRED_VERSION_linux-yocto ?= "6.1%" | 1266 | PREFERRED_VERSION_linux-yocto ?= "6.12%" |
1262 | 1267 | ||
1263 | KERNEL_IMAGETYPE = "zImage" | 1268 | KERNEL_IMAGETYPE = "zImage" |
1264 | KERNEL_DEVICETREE = "am335x-bone.dtb am335x-boneblack.dtb am335x-bonegreen.dtb" | 1269 | DTB_FILES = "am335x-bone.dtb am335x-boneblack.dtb am335x-bonegreen.dtb" |
1265 | KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}" | 1270 | KERNEL_DEVICETREE = '${@' '.join('ti/omap/%s' % d for d in '${DTB_FILES}'.split())}' |
1266 | 1271 | ||
1267 | PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot" | 1272 | PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot" |
1268 | 1273 | ||
1269 | SPL_BINARY = "MLO" | 1274 | SPL_BINARY = "MLO" |
1270 | UBOOT_SUFFIX = "img" | 1275 | UBOOT_SUFFIX = "img" |
1271 | UBOOT_MACHINE = "am335x_evm_defconfig" | 1276 | UBOOT_MACHINE = "am335x_evm_defconfig" |
1272 | UBOOT_ENTRYPOINT = "0x80008000" | ||
1273 | UBOOT_LOADADDRESS = "0x80008000" | ||
1274 | 1277 | ||
1275 | MACHINE_FEATURES = "usbgadget usbhost vfat alsa" | 1278 | MACHINE_FEATURES = "usbgadget usbhost vfat alsa" |
1276 | 1279 | ||
1277 | IMAGE_BOOT_FILES ?= "u-boot.${UBOOT_SUFFIX} ${SPL_BINARY} ${KERNEL_IMAGETYPE} ${KERNEL_DEVICETREE}" | 1280 | IMAGE_BOOT_FILES ?= "u-boot.${UBOOT_SUFFIX} ${SPL_BINARY} ${KERNEL_IMAGETYPE} ${DTB_FILES}" |
1278 | 1281 | ||
1279 | # support runqemu | 1282 | # support runqemu |
1280 | EXTRA_IMAGEDEPENDS += "qemu-native qemu-helper-native" | 1283 | EXTRA_IMAGEDEPENDS += "qemu-native qemu-helper-native" |
@@ -1328,12 +1331,12 @@ Project Reference Manual. | |||
1328 | needed in the root filesystem. In this case, the U-Boot recipe must | 1331 | needed in the root filesystem. In this case, the U-Boot recipe must |
1329 | be built for the image. | 1332 | be built for the image. |
1330 | 1333 | ||
1331 | At the end of the file, we also use this setings to implement | 1334 | At the end of the file, we also use this setting to implement |
1332 | ``runqemu`` support on the host machine. | 1335 | ``runqemu`` support on the host machine. |
1333 | 1336 | ||
1334 | - :term:`DEFAULTTUNE`: Machines | 1337 | - :term:`DEFAULTTUNE`: Machines |
1335 | use tunings to optimize machine, CPU, and application performance. | 1338 | use tunings to optimize machine, CPU, and application performance. |
1336 | These features, which are collectively known as "tuning features", | 1339 | These features --- collectively known as "tuning features" --- |
1337 | are set in the :term:`OpenEmbedded-Core (OE-Core)` layer. In this | 1340 | are set in the :term:`OpenEmbedded-Core (OE-Core)` layer. In this |
1338 | example, the default tuning file is :oe_git:`tune-cortexa8 | 1341 | example, the default tuning file is :oe_git:`tune-cortexa8 |
1339 | </openembedded-core/tree/meta/conf/machine/include/arm/armv7a/tune-cortexa8.inc>`. | 1342 | </openembedded-core/tree/meta/conf/machine/include/arm/armv7a/tune-cortexa8.inc>`. |
@@ -1363,8 +1366,7 @@ Project Reference Manual. | |||
1363 | to create the sysroot when building a Wic image. | 1366 | to create the sysroot when building a Wic image. |
1364 | 1367 | ||
1365 | - :term:`SERIAL_CONSOLES`: | 1368 | - :term:`SERIAL_CONSOLES`: |
1366 | Defines a serial console (TTY) to enable using getty. In this case, | 1369 | Defines one or more serial consoles (TTYs) to enable using getty. |
1367 | the baud rate is "115200" and the device name is "ttyO0". | ||
1368 | 1370 | ||
1369 | - :term:`PREFERRED_PROVIDER_virtual/kernel <PREFERRED_PROVIDER>`: | 1371 | - :term:`PREFERRED_PROVIDER_virtual/kernel <PREFERRED_PROVIDER>`: |
1370 | Specifies the recipe that provides "virtual/kernel" when more than | 1372 | Specifies the recipe that provides "virtual/kernel" when more than |
@@ -1374,7 +1376,7 @@ Project Reference Manual. | |||
1374 | 1376 | ||
1375 | - :term:`PREFERRED_VERSION_linux-yocto <PREFERRED_VERSION>`: | 1377 | - :term:`PREFERRED_VERSION_linux-yocto <PREFERRED_VERSION>`: |
1376 | Defines the version of the recipe used to build the kernel, which is | 1378 | Defines the version of the recipe used to build the kernel, which is |
1377 | "6.1" in this case. | 1379 | "6.12" in this case. |
1378 | 1380 | ||
1379 | - :term:`KERNEL_IMAGETYPE`: | 1381 | - :term:`KERNEL_IMAGETYPE`: |
1380 | The type of kernel to build for the device. In this case, the | 1382 | The type of kernel to build for the device. In this case, the |
@@ -1416,12 +1418,6 @@ Project Reference Manual. | |||
1416 | Specifies the value passed on the make command line when building | 1418 | Specifies the value passed on the make command line when building |
1417 | a U-Boot image. | 1419 | a U-Boot image. |
1418 | 1420 | ||
1419 | - :term:`UBOOT_ENTRYPOINT`: | ||
1420 | Specifies the entry point for the U-Boot image. | ||
1421 | |||
1422 | - :term:`UBOOT_LOADADDRESS`: | ||
1423 | Specifies the load address for the U-Boot image. | ||
1424 | |||
1425 | - :term:`MACHINE_FEATURES`: | 1421 | - :term:`MACHINE_FEATURES`: |
1426 | Specifies the list of hardware features the BeagleBone device is | 1422 | Specifies the list of hardware features the BeagleBone device is |
1427 | capable of supporting. In this case, the device supports "usbgadget | 1423 | capable of supporting. In this case, the device supports "usbgadget |
diff --git a/documentation/conf.py b/documentation/conf.py index 35c5c14535..1eca8756ab 100644 --- a/documentation/conf.py +++ b/documentation/conf.py | |||
@@ -13,6 +13,7 @@ | |||
13 | # documentation root, use os.path.abspath to make it absolute, like shown here. | 13 | # documentation root, use os.path.abspath to make it absolute, like shown here. |
14 | # | 14 | # |
15 | import os | 15 | import os |
16 | import re | ||
16 | import sys | 17 | import sys |
17 | import datetime | 18 | import datetime |
18 | try: | 19 | try: |
@@ -90,8 +91,9 @@ rst_prolog = """ | |||
90 | 91 | ||
91 | # external links and substitutions | 92 | # external links and substitutions |
92 | extlinks = { | 93 | extlinks = { |
93 | 'cve': ('https://nvd.nist.gov/vuln/detail/CVE-%s', 'CVE-%s'), | 94 | 'bitbake_git': ('https://git.openembedded.org/bitbake%s', None), |
94 | 'cve_mitre': ('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-%s', 'CVE-%s'), | 95 | 'cve_mitre': ('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-%s', 'CVE-%s'), |
96 | 'cve_nist': ('https://nvd.nist.gov/vuln/detail/CVE-%s', 'CVE-%s'), | ||
95 | 'yocto_home': ('https://www.yoctoproject.org%s', None), | 97 | 'yocto_home': ('https://www.yoctoproject.org%s', None), |
96 | 'yocto_wiki': ('https://wiki.yoctoproject.org/wiki%s', None), | 98 | 'yocto_wiki': ('https://wiki.yoctoproject.org/wiki%s', None), |
97 | 'yocto_dl': ('https://downloads.yoctoproject.org%s', None), | 99 | 'yocto_dl': ('https://downloads.yoctoproject.org%s', None), |
@@ -110,6 +112,9 @@ extlinks = { | |||
110 | 'wikipedia': ('https://en.wikipedia.org/wiki/%s', None), | 112 | 'wikipedia': ('https://en.wikipedia.org/wiki/%s', None), |
111 | } | 113 | } |
112 | 114 | ||
115 | # To be able to use :manpage:`<something>` in the docs. | ||
116 | manpages_url = 'https://manpages.debian.org/{path}' | ||
117 | |||
113 | # Intersphinx config to use cross reference with BitBake user manual | 118 | # Intersphinx config to use cross reference with BitBake user manual |
114 | intersphinx_mapping = { | 119 | intersphinx_mapping = { |
115 | 'bitbake': ('https://docs.yoctoproject.org/bitbake/' + bitbake_version, None) | 120 | 'bitbake': ('https://docs.yoctoproject.org/bitbake/' + bitbake_version, None) |
@@ -135,6 +140,7 @@ except ImportError: | |||
135 | sys.exit(1) | 140 | sys.exit(1) |
136 | 141 | ||
137 | html_logo = 'sphinx-static/YoctoProject_Logo_RGB.jpg' | 142 | html_logo = 'sphinx-static/YoctoProject_Logo_RGB.jpg' |
143 | html_favicon = 'sphinx-static/favicon.ico' | ||
138 | 144 | ||
139 | # Add any paths that contain custom static files (such as style sheets) here, | 145 | # Add any paths that contain custom static files (such as style sheets) here, |
140 | # relative to this directory. They are copied after the builtin static files, | 146 | # relative to this directory. They are copied after the builtin static files, |
@@ -158,11 +164,34 @@ html_last_updated_fmt = '%b %d, %Y' | |||
158 | # Remove the trailing 'dot' in section numbers | 164 | # Remove the trailing 'dot' in section numbers |
159 | html_secnumber_suffix = " " | 165 | html_secnumber_suffix = " " |
160 | 166 | ||
167 | # We need XeTeX to process special unicode character, sometimes the contributor | ||
168 | # list from the release note contains those. | ||
169 | # See https://docs.readthedocs.io/en/stable/guides/pdf-non-ascii-languages.html. | ||
170 | latex_engine = 'xelatex' | ||
171 | latex_use_xindy = False | ||
161 | latex_elements = { | 172 | latex_elements = { |
162 | 'passoptionstopackages': '\\PassOptionsToPackage{bookmarksdepth=5}{hyperref}', | 173 | 'passoptionstopackages': '\\PassOptionsToPackage{bookmarksdepth=5}{hyperref}', |
163 | 'preamble': '\\setcounter{tocdepth}{2}', | 174 | 'preamble': '\\usepackage[UTF8]{ctex}\n\\setcounter{tocdepth}{2}', |
164 | } | 175 | } |
165 | 176 | ||
177 | |||
178 | from sphinx.search import SearchEnglish | ||
179 | from sphinx.search import languages | ||
180 | class DashFriendlySearchEnglish(SearchEnglish): | ||
181 | |||
182 | # Accept words that can include hyphens | ||
183 | _word_re = re.compile(r'[\w\-]+') | ||
184 | |||
185 | js_splitter_code = r""" | ||
186 | function splitQuery(query) { | ||
187 | return query | ||
188 | .split(/[^\p{Letter}\p{Number}_\p{Emoji_Presentation}-]+/gu) | ||
189 | .filter(term => term.length > 0); | ||
190 | } | ||
191 | """ | ||
192 | |||
193 | languages['en'] = DashFriendlySearchEnglish | ||
194 | |||
166 | # Make the EPUB builder prefer PNG to SVG because of issues rendering Inkscape SVG | 195 | # Make the EPUB builder prefer PNG to SVG because of issues rendering Inkscape SVG |
167 | from sphinx.builders.epub3 import Epub3Builder | 196 | from sphinx.builders.epub3 import Epub3Builder |
168 | Epub3Builder.supported_image_types = ['image/png', 'image/gif', 'image/jpeg'] | 197 | Epub3Builder.supported_image_types = ['image/png', 'image/gif', 'image/jpeg'] |
diff --git a/documentation/contributor-guide/recipe-style-guide.rst b/documentation/contributor-guide/recipe-style-guide.rst index 08d8fb4259..617e202431 100644 --- a/documentation/contributor-guide/recipe-style-guide.rst +++ b/documentation/contributor-guide/recipe-style-guide.rst | |||
@@ -47,10 +47,10 @@ Debian policy closely. | |||
47 | 47 | ||
48 | When a recipe references a git revision that does not correspond to a released | 48 | When a recipe references a git revision that does not correspond to a released |
49 | version of software (e.g. is not a tagged version), the :term:`PV` variable | 49 | version of software (e.g. is not a tagged version), the :term:`PV` variable |
50 | should include the Git revision using the following to make the | 50 | should include the sign ``+``, so :term:`bitbake` automatically includes package |
51 | version clear:: | 51 | version information during the packaging phase:: |
52 | 52 | ||
53 | PV = "<version>+git${SRCPV}" | 53 | PV = "<version>+git" |
54 | 54 | ||
55 | In this case, ``<version>`` should be the most recently released version of the | 55 | In this case, ``<version>`` should be the most recently released version of the |
56 | software from the current source revision (``git describe`` can be useful for | 56 | software from the current source revision (``git describe`` can be useful for |
@@ -395,7 +395,7 @@ one CVE is fixed, separate them using spaces. | |||
395 | CVE Examples | 395 | CVE Examples |
396 | ------------ | 396 | ------------ |
397 | 397 | ||
398 | This should be the header of patch that fixes :cve:`2015-8370` in GRUB2:: | 398 | This should be the header of patch that fixes :cve_nist:`2015-8370` in GRUB2:: |
399 | 399 | ||
400 | grub2: Fix CVE-2015-8370 | 400 | grub2: Fix CVE-2015-8370 |
401 | 401 | ||
diff --git a/documentation/contributor-guide/submit-changes.rst b/documentation/contributor-guide/submit-changes.rst index 47a416b245..6d5d69d7cf 100644 --- a/documentation/contributor-guide/submit-changes.rst +++ b/documentation/contributor-guide/submit-changes.rst | |||
@@ -65,6 +65,13 @@ use to identify your commits:: | |||
65 | git config --global user.name "Ada Lovelace" | 65 | git config --global user.name "Ada Lovelace" |
66 | git config --global user.email "ada.lovelace@gmail.com" | 66 | git config --global user.email "ada.lovelace@gmail.com" |
67 | 67 | ||
68 | By default, Git adds a signature line at the end of patches containing the Git | ||
69 | version. We suggest to remove it as it doesn't add useful information. | ||
70 | |||
71 | Remove it with the following command:: | ||
72 | |||
73 | git config --global format.signature "" | ||
74 | |||
68 | Clone the Git repository for the component to modify | 75 | Clone the Git repository for the component to modify |
69 | ---------------------------------------------------- | 76 | ---------------------------------------------------- |
70 | 77 | ||
@@ -483,7 +490,7 @@ typical usage of ``git send-email``:: | |||
483 | git send-email --to <mailing-list-address> *.patch | 490 | git send-email --to <mailing-list-address> *.patch |
484 | 491 | ||
485 | Then, review each subject line and list of recipients carefully, and then | 492 | Then, review each subject line and list of recipients carefully, and then |
486 | and then allow the command to send each message. | 493 | allow the command to send each message. |
487 | 494 | ||
488 | You will see that ``git send-email`` will automatically copy the people listed | 495 | You will see that ``git send-email`` will automatically copy the people listed |
489 | in any commit tags such as ``Signed-off-by`` or ``Reported-by``. | 496 | in any commit tags such as ``Signed-off-by`` or ``Reported-by``. |
@@ -769,6 +776,38 @@ argument to ``git format-patch`` with a version number:: | |||
769 | 776 | ||
770 | git format-patch -v2 <ref-branch> | 777 | git format-patch -v2 <ref-branch> |
771 | 778 | ||
779 | |||
780 | After generating updated patches (v2, v3, and so on) via ``git | ||
781 | format-patch``, ideally developers will add a patch version changelog | ||
782 | to each patch that describes what has changed between each revision of | ||
783 | the patch. Add patch version changelogs after the ``---`` marker in the | ||
784 | patch, indicating that this information is part of this patch, but is not | ||
785 | suitable for inclusion in the commit message (i.e. the git history) itself. | ||
786 | Providing a patch version changelog makes it easier for maintainers and | ||
787 | reviewers to succinctly understand what changed in all versions of the | ||
788 | patch, without having to consult alternate sources of information, such as | ||
789 | searching through messages on a mailing list. For example:: | ||
790 | |||
791 | <patch title> | ||
792 | |||
793 | <commit message> | ||
794 | |||
795 | <Signed-off-by/other trailers> | ||
796 | --- | ||
797 | changes in v4: | ||
798 | - provide a clearer commit message | ||
799 | - fix spelling mistakes | ||
800 | |||
801 | changes in v3: | ||
802 | - replace func() to use other_func() instead | ||
803 | |||
804 | changes in v2: | ||
805 | - this patch was added in v2 | ||
806 | --- | ||
807 | <diffstat output> | ||
808 | |||
809 | <unified diff> | ||
810 | |||
772 | Lastly please ensure that you also test your revised changes. In particular | 811 | Lastly please ensure that you also test your revised changes. In particular |
773 | please don't just edit the patch file written out by ``git format-patch`` and | 812 | please don't just edit the patch file written out by ``git format-patch`` and |
774 | resend it. | 813 | resend it. |
@@ -825,3 +864,52 @@ Other layers may have similar testing branches but there is no formal | |||
825 | requirement or standard for these so please check the documentation for the | 864 | requirement or standard for these so please check the documentation for the |
826 | layers you are contributing to. | 865 | layers you are contributing to. |
827 | 866 | ||
867 | Acceptance of AI Generated Code | ||
868 | =============================== | ||
869 | |||
870 | The Yocto Project and OpenEmbedded follow the guidance of the Linux Foundation | ||
871 | in regards to the use of generative AI tools. See: | ||
872 | https://www.linuxfoundation.org/legal/generative-ai. | ||
873 | |||
874 | All of the existing guidelines in this document are expected to be followed, | ||
875 | including in the :doc:`recipe-style-guide`, and contributing the changes with | ||
876 | additional requirements to the items in section | ||
877 | :ref:`contributor-guide/submit-changes:Implement and commit changes`. | ||
878 | |||
879 | All AI Generated Code must be labeled as such in the commit message, | ||
880 | prior to your ``Signed-off-by`` line. It is also strongly recommended, | ||
881 | that any patches or code within the commit also have a comment or other | ||
882 | indication that this code was AI generated. | ||
883 | |||
884 | For example, here is a properly formatted commit message:: | ||
885 | |||
886 | component: Add the ability to ... | ||
887 | |||
888 | AI-Generated: Uses GitHub Copilot | ||
889 | |||
890 | Signed-off-by: Your Name <your.name@domain> | ||
891 | |||
892 | The ``Signed-off-by`` line must be written by you, and not the AI helper. | ||
893 | As a reminder, when contributing a change, your ``Signed-off-by`` line is | ||
894 | required and the stipulations in the `Developer's Statement of Origin | ||
895 | 1.1 <https://developercertificate.org/>`__ still apply. | ||
896 | |||
897 | Additionally, you must stipulate AI contributions conform to the Linux | ||
898 | Foundation policy, specifically: | ||
899 | |||
900 | #. Contributors should ensure that the terms and conditions of the generative AI | ||
901 | tool do not place any contractual restrictions on how the tool's output can | ||
902 | be used that are inconsistent with the project's open source software | ||
903 | license, the project's intellectual property policies, or the Open Source | ||
904 | Definition. | ||
905 | |||
906 | #. If any pre-existing copyrighted materials (including pre-existing open | ||
907 | source code) authored or owned by third parties are included in the AI tool's | ||
908 | output, prior to contributing such output to the project, the Contributor | ||
909 | should confirm that they have permission from the third party | ||
910 | owners -- such as the form of an open source license or public domain | ||
911 | declaration that complies with the project's licensing policies -- to use and | ||
912 | modify such pre-existing materials and contribute them to the project. | ||
913 | Additionally, the contributor should provide notice and attribution of such | ||
914 | third party rights, along with information about the applicable license | ||
915 | terms, with their contribution. | ||
diff --git a/documentation/dev-manual/bblock.rst b/documentation/dev-manual/bblock.rst new file mode 100644 index 0000000000..605bb75655 --- /dev/null +++ b/documentation/dev-manual/bblock.rst | |||
@@ -0,0 +1,129 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Locking and Unlocking Recipes Using ``bblock`` | ||
4 | ********************************************** | ||
5 | |||
6 | By design, the OpenEmbedded build system builds everything from scratch | ||
7 | unless BitBake determines that specific tasks do not require rebuilding. | ||
8 | At startup, it computes a signature for all tasks, based on the task's input. | ||
9 | Then, it compares these signatures with the ones from the sstate cache (if they | ||
10 | exist). Any changes cause the task to rerun. | ||
11 | |||
12 | During development, changes might trigger BitBake to rebuild certain | ||
13 | recipes, even when we know they do not require rebuilding at that stage. | ||
14 | For example, modifying a recipe can lead to rebuilding its native | ||
15 | counterpart, which might prove unnecessary. Editing the ``python3`` recipe, | ||
16 | for instance, can prompt BitBake to rebuild ``python3-native`` along with any | ||
17 | recipes that depend on it. | ||
18 | |||
19 | To prevent this, use ``bblock`` to lock specific tasks or recipes to | ||
20 | specific signatures, forcing BitBake to use the sstate cache for them. | ||
21 | |||
22 | .. warning:: | ||
23 | |||
24 | Use ``bblock`` only during the development phase. | ||
25 | |||
26 | Forcing BitBake to use the sstate cache, regardless of input changes, means | ||
27 | the recipe metadata no longer directly reflect the output. Use this feature | ||
28 | with caution. If you do not understand why signatures change, see the section | ||
29 | on :yocto_wiki:`understanding what changed </TipsAndTricks/Understanding_what_changed_(diffsigs_etc)>`. | ||
30 | |||
31 | |||
32 | Locking tasks and recipes | ||
33 | ------------------------- | ||
34 | |||
35 | To lock a recipe, use:: | ||
36 | |||
37 | $ bblock recipe | ||
38 | |||
39 | You can also use a space-separated list of recipes to lock multiple recipes:: | ||
40 | |||
41 | $ bblock recipe1 recipe2 | ||
42 | |||
43 | Locking a recipe means locking all tasks of the recipe. If you need to | ||
44 | lock only particular tasks, use the `-t` option with a comma-separated | ||
45 | list of tasks:: | ||
46 | |||
47 | $ bblock -t task1,task2 recipe | ||
48 | |||
49 | |||
50 | Unlocking tasks and recipes | ||
51 | --------------------------- | ||
52 | |||
53 | To unlock a recipe, use the ``-r`` option:: | ||
54 | |||
55 | $ bblock -r recipe | ||
56 | |||
57 | You can also use a space-separated list of recipes to unlock multiple recipes:: | ||
58 | |||
59 | $ bblock -r recipe1 recipe2 | ||
60 | |||
61 | Unlocking a recipe means unlocking all tasks of the recipe. If you need to | ||
62 | unlock only particular tasks use the ``-t`` option with a comma-separated | ||
63 | list of tasks:: | ||
64 | |||
65 | $ bblock -r -t task1,task2 recipe | ||
66 | |||
67 | To unlock all recipes, do not specify any recipe:: | ||
68 | |||
69 | $ bblock -r | ||
70 | |||
71 | |||
72 | Configuration file | ||
73 | ------------------ | ||
74 | |||
75 | ``bblock`` will dump the signatures in the ``build/conf/bblock.conf`` file, | ||
76 | included by default in :oe_git:`meta/conf/bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>`. | ||
77 | |||
78 | To dump the file, use the ``-d`` option:: | ||
79 | |||
80 | $ bblock -d | ||
81 | |||
82 | |||
83 | Locking mechanism | ||
84 | ----------------- | ||
85 | |||
86 | ``bblock`` computes the signature(s) of the task(s) and sets the 3 following | ||
87 | variables: :term:`SIGGEN_LOCKEDSIGS`, :term:`SIGGEN_LOCKEDSIGS_TYPES` | ||
88 | and :term:`SIGGEN_LOCKEDSIGS_TASKSIG_CHECK`. | ||
89 | |||
90 | In particular, ``bblock`` sets:: | ||
91 | |||
92 | SIGGEN_LOCKEDSIGS_TASKSIG_CHECK = "info" | ||
93 | SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}" | ||
94 | |||
95 | SIGGEN_LOCKEDSIGS_<package_arch> += "<recipe>:<task>:<signature>" | ||
96 | |||
97 | This produces architecture specific locks and reminds user that some tasks | ||
98 | have locked signatures. | ||
99 | |||
100 | Example | ||
101 | ------- | ||
102 | |||
103 | When working on the ``python3`` recipe, we can lock ``python3-native`` with | ||
104 | the following:: | ||
105 | |||
106 | $ bblock python3-native | ||
107 | $ bblock -d | ||
108 | # Generated by bblock | ||
109 | SIGGEN_LOCKEDSIGS_TASKSIG_CHECK = "info" | ||
110 | SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}" | ||
111 | |||
112 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_patch:865859c27e603ba42025b7bb766c3cd4c0f477e4962cfd39128c0619d695fce7" | ||
113 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_populate_sysroot:f8fa5d3194cef638416000252b959e86d0a19f6b7898e1f56b643c588cdd8605" | ||
114 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_prepare_recipe_sysroot:fe295ac505d9d1143313424b201c6f3f2a0a90da40a13a905b86b874705f226a" | ||
115 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_fetch:1b6e4728fee631bc7a8a7006855c5b8182a8224579e32e3d0a2db77c26459f25" | ||
116 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_unpack:2ad74d6f865ef75c35c0e6bbe3f9a90923a6b2c62c18a3ddef514ea31fbc588f" | ||
117 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_deploy_source_date_epoch:15f89b8483c1ad7507480f337619bb98c26e231227785eb3543db163593e7b42" | ||
118 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_configure:7960c13d23270fdb12b3a7c426ce1da0d2f5c7cf5e5d3f5bdce5fa330eb7d482" | ||
119 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_compile:012e1d4a63f1a78fc2143bd90d704dbcf5865c5257d6272aa7540ec1cd3063d9" | ||
120 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_install:d3401cc2afa4c996beb154beaad3e45fa0272b9c56fb86e9db14ec3544c68f9d" | ||
121 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_build:fa88bb7afb9046c0417c24a3fa98a058653805a8b00eda2c2d7fea68fc42f882" | ||
122 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_collect_spdx_deps:cc9c53ba7c495567e9a38ec4801830c425c0d1f895aa2fc66930a2edd510d9b4" | ||
123 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_spdx:766a1d09368438b7b5a1a8e2a8f823b2b731db44b57e67d8b3196de91966f9c5" | ||
124 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_package_spdx:46f80faeab25575e9977ba3bf14c819489c3d489432ae5145255635108c21020" | ||
125 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_recipe_qa:cb960cdb074e7944e894958db58f3dc2a0436ecf87c247feb3e095e214fec0e4" | ||
126 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_populate_lic:15657441621ee83f15c2e650e7edbb036870b56f55e72e046c6142da3c5783fd" | ||
127 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_manifest:24f0abbec221d27bbb2909b6e846288b12cab419f1faf9f5006ed80423d37e28" | ||
128 | SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_addto_recipe_sysroot:bcb6a1905f113128de3f88d702b706befd6a786267c045ee82532759a7c214d7" | ||
129 | |||
diff --git a/documentation/dev-manual/bmaptool.rst b/documentation/dev-manual/bmaptool.rst index f6f0e6afaf..87162a49c9 100644 --- a/documentation/dev-manual/bmaptool.rst +++ b/documentation/dev-manual/bmaptool.rst | |||
@@ -1,13 +1,13 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | 1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK |
2 | 2 | ||
3 | Flashing Images Using ``bmaptool`` | 3 | Flashing Images Using `bmaptool` |
4 | ********************************** | 4 | ******************************** |
5 | 5 | ||
6 | A fast and easy way to flash an image to a bootable device is to use | 6 | A fast and easy way to flash an image to a bootable device is to use |
7 | bmaptool, which is integrated into the OpenEmbedded build system. | 7 | `bmaptool`, which is integrated into the OpenEmbedded build system. |
8 | bmaptool is a generic tool that creates a file's block map (bmap) and | 8 | `bmaptool` is a generic tool that creates a file's block map (bmap) and |
9 | then uses that map to copy the file. As compared to traditional tools | 9 | then uses that map to copy the file. As compared to traditional tools |
10 | such as dd or cp, bmaptool can copy (or flash) large files like raw | 10 | such as `dd` or `cp`, `bmaptool` can copy (or flash) large files like raw |
11 | system image files much faster. | 11 | system image files much faster. |
12 | 12 | ||
13 | .. note:: | 13 | .. note:: |
@@ -20,13 +20,13 @@ system image files much faster. | |||
20 | $ sudo apt install bmap-tools | 20 | $ sudo apt install bmap-tools |
21 | 21 | ||
22 | - If you are unable to install the ``bmap-tools`` package, you will | 22 | - If you are unable to install the ``bmap-tools`` package, you will |
23 | need to build bmaptool before using it. Use the following command:: | 23 | need to build `bmaptool` before using it. Use the following command:: |
24 | 24 | ||
25 | $ bitbake bmaptool-native | 25 | $ bitbake bmaptool-native -caddto_recipe_sysroot |
26 | 26 | ||
27 | Following, is an example that shows how to flash a Wic image. Realize | 27 | Following, is an example that shows how to flash a Wic image. Realize |
28 | that while this example uses a Wic image, you can use bmaptool to flash | 28 | that while this example uses a Wic image, you can use `bmaptool` to flash |
29 | any type of image. Use these steps to flash an image using bmaptool: | 29 | any type of image. Use these steps to flash an image using `bmaptool`: |
30 | 30 | ||
31 | #. *Update your local.conf File:* You need to have the following set | 31 | #. *Update your local.conf File:* You need to have the following set |
32 | in your ``local.conf`` file before building your image:: | 32 | in your ``local.conf`` file before building your image:: |
@@ -39,18 +39,17 @@ any type of image. Use these steps to flash an image using bmaptool: | |||
39 | 39 | ||
40 | $ bitbake image | 40 | $ bitbake image |
41 | 41 | ||
42 | #. *Flash the Device:* Flash the device with the image by using bmaptool | 42 | #. *Flash the Device:* Flash the device with the image by using `bmaptool` |
43 | depending on your particular setup. The following commands assume the | 43 | depending on your particular setup. The following commands assume the |
44 | image resides in the :term:`Build Directory`'s ``deploy/images/`` area: | 44 | image resides in the :term:`Build Directory`'s ``deploy/images/`` area: |
45 | 45 | ||
46 | - If you have write access to the media, use this command form:: | 46 | - If you installed the package for `bmaptool`, you can directly run:: |
47 | 47 | ||
48 | $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX | 48 | $ sudo bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX |
49 | 49 | ||
50 | - If you do not have write access to the media, set your permissions | 50 | - Otherwise, if you built `bmaptool` with BitBake, run:: |
51 | first and then use the same command form:: | ||
52 | 51 | ||
53 | $ sudo chmod 666 /dev/sdX | 52 | $ sudo chmod a+w /dev/sdX # get write access to the media, needed only once after booting |
54 | $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX | 53 | $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX |
55 | 54 | ||
56 | For help on the ``bmaptool`` command, use the following command:: | 55 | For help on the ``bmaptool`` command, use the following command:: |
diff --git a/documentation/dev-manual/building.rst b/documentation/dev-manual/building.rst index fe502690dd..4770a5a184 100644 --- a/documentation/dev-manual/building.rst +++ b/documentation/dev-manual/building.rst | |||
@@ -280,7 +280,9 @@ Follow these steps to create an :term:`Initramfs` image: | |||
280 | #. *Create the Initramfs Image Recipe:* You can reference the | 280 | #. *Create the Initramfs Image Recipe:* You can reference the |
281 | ``core-image-minimal-initramfs.bb`` recipe found in the | 281 | ``core-image-minimal-initramfs.bb`` recipe found in the |
282 | ``meta/recipes-core`` directory of the :term:`Source Directory` | 282 | ``meta/recipes-core`` directory of the :term:`Source Directory` |
283 | as an example from which to work. | 283 | as an example from which to work. The ``core-image-minimal-initramfs`` recipe |
284 | is based on the :ref:`initramfs-framework <dev-manual/building:Customizing an | ||
285 | Initramfs using \`\`initramfs-framework\`\`>` recipe described below. | ||
284 | 286 | ||
285 | #. *Decide if You Need to Bundle the Initramfs Image Into the Kernel | 287 | #. *Decide if You Need to Bundle the Initramfs Image Into the Kernel |
286 | Image:* If you want the :term:`Initramfs` image that is built to be bundled | 288 | Image:* If you want the :term:`Initramfs` image that is built to be bundled |
@@ -308,6 +310,86 @@ Follow these steps to create an :term:`Initramfs` image: | |||
308 | and bundled with the kernel image if you used the | 310 | and bundled with the kernel image if you used the |
309 | :term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier. | 311 | :term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier. |
310 | 312 | ||
313 | Customizing an Initramfs using ``initramfs-framework`` | ||
314 | ------------------------------------------------------ | ||
315 | |||
316 | The ``core-image-minimal-initramfs.bb`` recipe found in | ||
317 | :oe_git:`meta/recipes-core/images | ||
318 | </openembedded-core/tree/meta/recipes-core/images>` uses the | ||
319 | :oe_git:`initramfs-framework_1.0.bb | ||
320 | </openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework_1.0.bb>` | ||
321 | recipe as its base component. The goal of the ``initramfs-framework`` recipe is | ||
322 | to provide the building blocks to build a customized :term:`Initramfs`. | ||
323 | |||
324 | The ``initramfs-framework`` recipe relies on shell initialization scripts | ||
325 | defined in :oe_git:`meta/recipes-core/initrdscripts/initramfs-framework | ||
326 | </openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework>`. Since some of | ||
327 | these scripts do not apply for all use cases, the ``initramfs-framework`` recipe | ||
328 | defines different packages: | ||
329 | |||
330 | - ``initramfs-framework-base``: this package installs the basic components of | ||
331 | an :term:`Initramfs`, such as the ``init`` script or the ``/dev/console`` | ||
332 | character special file. As this package is a runtime dependency of all | ||
333 | modules listed below, it is automatically pulled in when one of the modules | ||
334 | is installed in the image. | ||
335 | - ``initramfs-module-exec``: support for execution of applications. | ||
336 | - ``initramfs-module-mdev``: support for `mdev | ||
337 | <https://wiki.gentoo.org/wiki/Mdev>`__. | ||
338 | - ``initramfs-module-udev``: support for :wikipedia:`Udev <Udev>`. | ||
339 | - ``initramfs-module-e2fs``: support for :wikipedia:`ext4/ext3/ext2 | ||
340 | <Extended_file_system>` filesystems. | ||
341 | - ``initramfs-module-nfsrootfs``: support for locating and mounting the root | ||
342 | partition via :wikipedia:`NFS <Network_File_System>`. | ||
343 | - ``initramfs-module-rootfs``: support for locating and mounting the root | ||
344 | partition. | ||
345 | - ``initramfs-module-debug``: dynamic debug support. | ||
346 | - ``initramfs-module-lvm``: :wikipedia:`LVM <Logical_volume_management>` rootfs support. | ||
347 | - ``initramfs-module-overlayroot``: support for mounting a read-write overlay | ||
348 | on top of a read-only root filesystem. | ||
349 | |||
350 | In addition to the packages defined by the ``initramfs-framework`` recipe | ||
351 | itself, the following packages are defined by the recipes present in | ||
352 | :oe_git:`meta/recipes-core/initrdscripts </openembedded-core/tree/meta/recipes-core/initrdscripts>`: | ||
353 | |||
354 | - ``initramfs-module-install``: module to create and install a partition layout | ||
355 | on a selected block device. | ||
356 | - ``initramfs-module-install-efi``: module to create and install an EFI | ||
357 | partition layout on a selected block device. | ||
358 | - ``initramfs-module-setup-live``: module to start a shell in the | ||
359 | :term:`Initramfs` if ``root=/dev/ram0`` in passed in the `Kernel command-line | ||
360 | <https://www.kernel.org/doc/html/latest/admin-guide/kernel-parameters.html>`__ | ||
361 | or the ``root=`` parameter was not passed. | ||
362 | |||
363 | To customize the :term:`Initramfs`, you can add or remove packages listed | ||
364 | earlier from the :term:`PACKAGE_INSTALL` variable with a :ref:`bbappend | ||
365 | <dev-manual/layers:Appending Other Layers Metadata With Your Layer>` on the | ||
366 | ``core-image-minimal-initramfs`` recipe, or create a custom recipe for the | ||
367 | :term:`Initramfs` taking ``core-image-minimal-initramfs`` as example. | ||
368 | |||
369 | Custom scripts can be added to the :term:`Initramfs` by writing your own | ||
370 | recipes. The recipes are conventionally named ``initramfs-module-<module name>`` | ||
371 | where ``<module name>`` is the name of the module. The recipe should set its | ||
372 | :term:`RDEPENDS` package-specific variables to include | ||
373 | ``initramfs-framework-base`` and the other packages on which the module depends | ||
374 | at runtime. | ||
375 | |||
376 | The recipe must install shell initialization scripts in :term:`${D} <D>`\ | ||
377 | ``/init.d`` and must follow the ``<number>-<script name>`` naming scheme where: | ||
378 | |||
379 | - ``<number>`` is a *two-digit* number that affects the execution order of the | ||
380 | script compared to others. For example, the script ``80-setup-live`` would be | ||
381 | executed after ``01-udev`` because 80 is greater than 01. | ||
382 | |||
383 | This number being two-digits is important here as the scripts are executed | ||
384 | alphabetically. For example, the script ``10-script`` would be executed | ||
385 | before the script ``8-script``, because ``1`` is inferior to ``8``. | ||
386 | Therefore, the script should be named ``08-script``. | ||
387 | |||
388 | - ``<script name>`` is the script name which you can choose freely. | ||
389 | |||
390 | If two script use the same ``<number>``, they are sorted alphabetically based | ||
391 | on ``<script name>``. | ||
392 | |||
311 | Bundling an Initramfs Image From a Separate Multiconfig | 393 | Bundling an Initramfs Image From a Separate Multiconfig |
312 | ------------------------------------------------------- | 394 | ------------------------------------------------------- |
313 | 395 | ||
diff --git a/documentation/dev-manual/customizing-images.rst b/documentation/dev-manual/customizing-images.rst index 5b18958ade..53cad9c79c 100644 --- a/documentation/dev-manual/customizing-images.rst +++ b/documentation/dev-manual/customizing-images.rst | |||
@@ -80,15 +80,14 @@ recipe that are enabled with :term:`IMAGE_FEATURES`. The value of | |||
80 | :term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within | 80 | :term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within |
81 | ``meta/conf/bitbake.conf``. | 81 | ``meta/conf/bitbake.conf``. |
82 | 82 | ||
83 | To illustrate how you can use these variables to modify your image, | 83 | To illustrate how you can use these variables to modify your image, consider an |
84 | consider an example that selects the SSH server. The Yocto Project ships | 84 | example that selects the SSH server. The Yocto Project ships with two SSH |
85 | with two SSH servers you can use with your images: Dropbear and OpenSSH. | 85 | servers you can use with your images: Dropbear and OpenSSH. Dropbear is a |
86 | Dropbear is a minimal SSH server appropriate for resource-constrained | 86 | minimal SSH server appropriate for resource-constrained environments, while |
87 | environments, while OpenSSH is a well-known standard SSH server | 87 | OpenSSH is a well-known standard SSH server implementation. By default, the |
88 | implementation. By default, the ``core-image-sato`` image is configured | 88 | ``core-image-sato`` image is configured to use Dropbear. The |
89 | to use Dropbear. The ``core-image-full-cmdline`` and ``core-image-lsb`` | 89 | ``core-image-full-cmdline`` image includes OpenSSH. The ``core-image-minimal`` |
90 | images both include OpenSSH. The ``core-image-minimal`` image does not | 90 | image does not contain an SSH server. |
91 | contain an SSH server. | ||
92 | 91 | ||
93 | You can customize your image and change these defaults. Edit the | 92 | You can customize your image and change these defaults. Edit the |
94 | :term:`IMAGE_FEATURES` variable in your recipe or use the | 93 | :term:`IMAGE_FEATURES` variable in your recipe or use the |
diff --git a/documentation/dev-manual/debugging.rst b/documentation/dev-manual/debugging.rst index 92458a0c37..8552b26aea 100644 --- a/documentation/dev-manual/debugging.rst +++ b/documentation/dev-manual/debugging.rst | |||
@@ -36,7 +36,7 @@ section: | |||
36 | use the BitBake ``-e`` option to examine variable values after a | 36 | use the BitBake ``-e`` option to examine variable values after a |
37 | recipe has been parsed. | 37 | recipe has been parsed. |
38 | 38 | ||
39 | - ":ref:`dev-manual/debugging:viewing package information with \`\`oe-pkgdata-util\`\``" | 39 | - ":ref:`dev-manual/debugging:viewing package information with ``oe-pkgdata-util```" |
40 | describes how to use the ``oe-pkgdata-util`` utility to query | 40 | describes how to use the ``oe-pkgdata-util`` utility to query |
41 | :term:`PKGDATA_DIR` and | 41 | :term:`PKGDATA_DIR` and |
42 | display package-related information for built packages. | 42 | display package-related information for built packages. |
diff --git a/documentation/dev-manual/external-scm.rst b/documentation/dev-manual/external-scm.rst index 97a7e63e36..896b1b5ac7 100644 --- a/documentation/dev-manual/external-scm.rst +++ b/documentation/dev-manual/external-scm.rst | |||
@@ -12,10 +12,13 @@ revision number for changes. Currently, you can do this with Apache | |||
12 | Subversion (SVN), Git, and Bazaar (BZR) repositories. | 12 | Subversion (SVN), Git, and Bazaar (BZR) repositories. |
13 | 13 | ||
14 | To enable this behavior, the :term:`PV` of | 14 | To enable this behavior, the :term:`PV` of |
15 | the recipe needs to reference | 15 | the recipe needs to include a ``+`` sign in its assignment. |
16 | :term:`SRCPV`. Here is an example:: | 16 | Here is an example:: |
17 | 17 | ||
18 | PV = "1.2.3+git${SRCPV}" | 18 | PV = "1.2.3+git" |
19 | |||
20 | :term:`Bitbake` later includes the source control information in :term:`PKGV` | ||
21 | during the packaging phase. | ||
19 | 22 | ||
20 | Then, you can add the following to your | 23 | Then, you can add the following to your |
21 | ``local.conf``:: | 24 | ``local.conf``:: |
diff --git a/documentation/dev-manual/index.rst b/documentation/dev-manual/index.rst index 9ccf60f701..8243c0f4cb 100644 --- a/documentation/dev-manual/index.rst +++ b/documentation/dev-manual/index.rst | |||
@@ -39,7 +39,6 @@ Yocto Project Development Tasks Manual | |||
39 | external-scm | 39 | external-scm |
40 | read-only-rootfs | 40 | read-only-rootfs |
41 | build-quality | 41 | build-quality |
42 | runtime-testing | ||
43 | debugging | 42 | debugging |
44 | licenses | 43 | licenses |
45 | security-subjects | 44 | security-subjects |
@@ -48,5 +47,6 @@ Yocto Project Development Tasks Manual | |||
48 | error-reporting-tool | 47 | error-reporting-tool |
49 | wayland | 48 | wayland |
50 | qemu | 49 | qemu |
50 | bblock | ||
51 | 51 | ||
52 | .. include:: /boilerplate.rst | 52 | .. include:: /boilerplate.rst |
diff --git a/documentation/dev-manual/layers.rst b/documentation/dev-manual/layers.rst index 91889bd0ae..89c8466933 100644 --- a/documentation/dev-manual/layers.rst +++ b/documentation/dev-manual/layers.rst | |||
@@ -644,6 +644,96 @@ variable and append the layer's root name:: | |||
644 | order of ``.conf`` or ``.bbclass`` files. Future versions of BitBake | 644 | order of ``.conf`` or ``.bbclass`` files. Future versions of BitBake |
645 | might address this. | 645 | might address this. |
646 | 646 | ||
647 | Providing Global-level Configurations With Your Layer | ||
648 | ----------------------------------------------------- | ||
649 | |||
650 | When creating a layer, you may need to define configurations that should take | ||
651 | effect globally in your build environment when the layer is part of the build. | ||
652 | The ``layer.conf`` file is a :term:`configuration file` that affects the build | ||
653 | system globally, so it is a candidate for this use-case. | ||
654 | |||
655 | .. warning:: | ||
656 | |||
657 | Providing unconditional global level configuration from the ``layer.conf`` | ||
658 | file is *not* a good practice, and should be avoided. For this reason, the | ||
659 | section :ref:`ref-conditional-layer-confs` below shows how the ``layer.conf`` | ||
660 | file can be used to provide configurations only if a certain condition is | ||
661 | met. | ||
662 | |||
663 | For example, if your layer provides a Linux kernel recipe named | ||
664 | ``linux-custom``, you may want to make :term:`PREFERRED_PROVIDER_virtual/kernel | ||
665 | <PREFERRED_PROVIDER>` point to ``linux-custom``:: | ||
666 | |||
667 | PREFERRED_PROVIDER_virtual/kernel = "linux-custom" | ||
668 | |||
669 | This can be defined in the ``layer.conf`` file. If your layer is at the last | ||
670 | position in the :term:`BBLAYERS` list, it will take precedence over previous | ||
671 | ``PREFERRED_PROVIDER_virtual/kernel`` assignments (unless one is set from a | ||
672 | :term:`configuration file` that is parsed later, such as machine or distro | ||
673 | configuration files). | ||
674 | |||
675 | .. _ref-conditional-layer-confs: | ||
676 | |||
677 | Conditionally Provide Global-level Configurations With Your Layer | ||
678 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
679 | |||
680 | In some cases, your layer may provide global configurations only if some | ||
681 | features it provides are enabled. Since the ``layer.conf`` file is parsed at an | ||
682 | earlier stage in the parsing process, the :term:`DISTRO_FEATURES` and | ||
683 | :term:`MACHINE_FEATURES` variables are not yet available to ``layer.conf``, and | ||
684 | declaring conditional assignments based on these variables is not possible. The | ||
685 | following technique shows a way to bypass this limitation by using the | ||
686 | :term:`USER_CLASSES` variable and a conditional ``require`` command. | ||
687 | |||
688 | In the following steps, let's assume our layer is named ``meta-mylayer`` and | ||
689 | that this layer defines a custom :ref:`distro feature <ref-features-distro>` | ||
690 | named ``mylayer-kernel``. We will set the :term:`PREFERRED_PROVIDER` variable | ||
691 | for the kernel only if our feature ``mylayer-kernel`` is part of the | ||
692 | :term:`DISTRO_FEATURES`: | ||
693 | |||
694 | #. Create an include file in the directory | ||
695 | ``meta-mylayer/conf/distro/include/``, for example a file named | ||
696 | ``mylayer-kernel-provider.inc`` that sets the kernel provider to | ||
697 | ``linux-custom``:: | ||
698 | |||
699 | PREFERRED_PROVIDER_virtual/kernel = "linux-custom" | ||
700 | |||
701 | #. Provide a path to this include file in your ``layer.conf``:: | ||
702 | |||
703 | META_MYLAYER_KERNEL_PROVIDER_PATH = "${LAYERDIR}/conf/distro/include/mylayer-kernel-provider.inc" | ||
704 | |||
705 | #. Create a new class in ``meta-mylayer/classes-global/``, for example a class | ||
706 | ``meta-mylayer-cfg.bbclass``. Make it conditionally require the file | ||
707 | ``mylayer-kernel-provider.inc`` defined above, using the variable | ||
708 | ``META_MYLAYER_KERNEL_PROVIDER_PATH`` defined in ``layer.conf``:: | ||
709 | |||
710 | require ${@bb.utils.contains('DISTRO_FEATURES', 'mylayer-kernel', '${META_MYLAYER_KERNEL_PROVIDER_PATH}', '', d)} | ||
711 | |||
712 | For details on the ``bb.utils.contains`` function, see its definition in | ||
713 | :bitbake_git:`lib/bb/utils.py </tree/lib/bb/utils.py>`. | ||
714 | |||
715 | .. note:: | ||
716 | |||
717 | The ``require`` command is designed to not fail if the function | ||
718 | ``bb.utils.contains`` returns an empty string. | ||
719 | |||
720 | #. Back to your ``layer.conf`` file, add the class ``meta-mylayer-cfg`` class to | ||
721 | the :term:`USER_CLASSES` variable:: | ||
722 | |||
723 | USER_CLASSES:append = " meta-mylayer-cfg" | ||
724 | |||
725 | This will add the class ``meta-mylayer-cfg`` to the list of classes to | ||
726 | globally inherit. Since the ``require`` command is conditional in | ||
727 | ``meta-mylayer-cfg.bbclass``, even though inherited the class will have no | ||
728 | effect unless the feature ``mylayer-kernel`` is enabled through | ||
729 | :term:`DISTRO_FEATURES`. | ||
730 | |||
731 | This technique can also be used for :ref:`Machine features | ||
732 | <ref-features-machine>` by following the same steps. Though not mandatory, it is | ||
733 | recommended to put include files for :term:`DISTRO_FEATURES` in your layer's | ||
734 | ``conf/distro/include`` and the ones for :term:`MACHINE_FEATURES` in your | ||
735 | layer's ``conf/machine/include``. | ||
736 | |||
647 | Managing Layers | 737 | Managing Layers |
648 | =============== | 738 | =============== |
649 | 739 | ||
diff --git a/documentation/dev-manual/new-recipe.rst b/documentation/dev-manual/new-recipe.rst index 61fc2eb122..af88db937b 100644 --- a/documentation/dev-manual/new-recipe.rst +++ b/documentation/dev-manual/new-recipe.rst | |||
@@ -56,7 +56,7 @@ necessary when adding a recipe to build a new piece of software to be | |||
56 | included in a build. | 56 | included in a build. |
57 | 57 | ||
58 | You can find a complete description of the ``devtool add`` command in | 58 | You can find a complete description of the ``devtool add`` command in |
59 | the ":ref:`sdk-manual/extensible:a closer look at \`\`devtool add\`\``" section | 59 | the ":ref:`sdk-manual/extensible:a closer look at ``devtool add```" section |
60 | in the Yocto Project Application Development and the Extensible Software | 60 | in the Yocto Project Application Development and the Extensible Software |
61 | Development Kit (eSDK) manual. | 61 | Development Kit (eSDK) manual. |
62 | 62 | ||
@@ -291,13 +291,13 @@ another example that specifies these types of files, see the | |||
291 | 291 | ||
292 | Another way of specifying source is from an SCM. For Git repositories, | 292 | Another way of specifying source is from an SCM. For Git repositories, |
293 | you must specify :term:`SRCREV` and you should specify :term:`PV` to include | 293 | you must specify :term:`SRCREV` and you should specify :term:`PV` to include |
294 | the revision with :term:`SRCPV`. Here is an example from the recipe | 294 | a ``+`` sign in its definition. Here is an example from the recipe |
295 | ``meta/recipes-core/musl/gcompat_git.bb``:: | 295 | :oe_git:`meta/recipes-sato/l3afpad/l3afpad_git.bb </openembedded-core/tree/meta/recipes-sato/l3afpad/l3afpad_git.bb>`:: |
296 | 296 | ||
297 | SRC_URI = "git://git.adelielinux.org/adelie/gcompat.git;protocol=https;branch=current" | 297 | SRC_URI = "git://github.com/stevenhoneyman/l3afpad.git;branch=master;protocol=https" |
298 | 298 | ||
299 | PV = "1.0.0+1.1+git${SRCPV}" | 299 | PV = "0.8.18.1.11+git" |
300 | SRCREV = "af5a49e489fdc04b9cf02547650d7aeaccd43793" | 300 | SRCREV ="3cdccdc9505643e50f8208171d9eee5de11a42ff" |
301 | 301 | ||
302 | If your :term:`SRC_URI` statement includes URLs pointing to individual files | 302 | If your :term:`SRC_URI` statement includes URLs pointing to individual files |
303 | fetched from a remote server other than a version control system, | 303 | fetched from a remote server other than a version control system, |
diff --git a/documentation/dev-manual/packages.rst b/documentation/dev-manual/packages.rst index e5028fffdc..4ba2dcae3a 100644 --- a/documentation/dev-manual/packages.rst +++ b/documentation/dev-manual/packages.rst | |||
@@ -16,7 +16,7 @@ This section describes a few tasks that involve packages: | |||
16 | - :ref:`dev-manual/packages:generating and using signed packages` | 16 | - :ref:`dev-manual/packages:generating and using signed packages` |
17 | 17 | ||
18 | - :ref:`Setting up and running package test | 18 | - :ref:`Setting up and running package test |
19 | (ptest) <dev-manual/packages:testing packages with ptest>` | 19 | (ptest) <test-manual/ptest:testing packages with ptest>` |
20 | 20 | ||
21 | - :ref:`dev-manual/packages:creating node package manager (npm) packages` | 21 | - :ref:`dev-manual/packages:creating node package manager (npm) packages` |
22 | 22 | ||
@@ -84,10 +84,6 @@ the following: | |||
84 | 84 | ||
85 | - :term:`PR`: The recipe revision. | 85 | - :term:`PR`: The recipe revision. |
86 | 86 | ||
87 | - :term:`SRCPV`: The OpenEmbedded | ||
88 | build system uses this string to help define the value of :term:`PV` when | ||
89 | the source code revision needs to be included in it. | ||
90 | |||
91 | - :yocto_wiki:`PR Service </PR_Service>`: A | 87 | - :yocto_wiki:`PR Service </PR_Service>`: A |
92 | network-based service that helps automate keeping package feeds | 88 | network-based service that helps automate keeping package feeds |
93 | compatible with existing package manager applications such as RPM, | 89 | compatible with existing package manager applications such as RPM, |
@@ -256,15 +252,14 @@ the software:: | |||
256 | 252 | ||
257 | SRCREV = "${AUTOREV}" | 253 | SRCREV = "${AUTOREV}" |
258 | 254 | ||
259 | Furthermore, you need to reference :term:`SRCPV` in :term:`PV` in order to | 255 | Furthermore, you need to include a ``+`` sign in :term:`PV` in order to |
260 | automatically update the version whenever the revision of the source | 256 | automatically update the version whenever the revision of the source |
261 | code changes. Here is an example:: | 257 | code changes. Here is an example:: |
262 | 258 | ||
263 | PV = "1.0+git${SRCPV}" | 259 | PV = "1.0+git" |
264 | |||
265 | The OpenEmbedded build system substitutes :term:`SRCPV` with the following: | ||
266 | 260 | ||
267 | .. code-block:: none | 261 | The OpenEmbedded build system will automatically add the source control |
262 | information to the end of the variable :term:`PKGV`, in this format:: | ||
268 | 263 | ||
269 | AUTOINC+source_code_revision | 264 | AUTOINC+source_code_revision |
270 | 265 | ||
@@ -887,114 +882,8 @@ related to signed package feeds are available: | |||
887 | Testing Packages With ptest | 882 | Testing Packages With ptest |
888 | =========================== | 883 | =========================== |
889 | 884 | ||
890 | A Package Test (ptest) runs tests against packages built by the | 885 | See the :ref:`test-manual/ptest:Testing Packages With ptest` section of the |
891 | OpenEmbedded build system on the target machine. A ptest contains at | 886 | Yocto Project Test Environment Manual. |
892 | least two items: the actual test, and a shell script (``run-ptest``) | ||
893 | that starts the test. The shell script that starts the test must not | ||
894 | contain the actual test --- the script only starts the test. On the other | ||
895 | hand, the test can be anything from a simple shell script that runs a | ||
896 | binary and checks the output to an elaborate system of test binaries and | ||
897 | data files. | ||
898 | |||
899 | The test generates output in the format used by Automake:: | ||
900 | |||
901 | result: testname | ||
902 | |||
903 | where the result can be ``PASS``, ``FAIL``, or ``SKIP``, and | ||
904 | the testname can be any identifying string. | ||
905 | |||
906 | For a list of Yocto Project recipes that are already enabled with ptest, | ||
907 | see the :yocto_wiki:`Ptest </Ptest>` wiki page. | ||
908 | |||
909 | .. note:: | ||
910 | |||
911 | A recipe is "ptest-enabled" if it inherits the :ref:`ref-classes-ptest` | ||
912 | class. | ||
913 | |||
914 | Adding ptest to Your Build | ||
915 | -------------------------- | ||
916 | |||
917 | To add package testing to your build, add the :term:`DISTRO_FEATURES` and | ||
918 | :term:`EXTRA_IMAGE_FEATURES` variables to your ``local.conf`` file, which | ||
919 | is found in the :term:`Build Directory`:: | ||
920 | |||
921 | DISTRO_FEATURES:append = " ptest" | ||
922 | EXTRA_IMAGE_FEATURES += "ptest-pkgs" | ||
923 | |||
924 | Once your build is complete, the ptest files are installed into the | ||
925 | ``/usr/lib/package/ptest`` directory within the image, where ``package`` | ||
926 | is the name of the package. | ||
927 | |||
928 | Running ptest | ||
929 | ------------- | ||
930 | |||
931 | The ``ptest-runner`` package installs a shell script that loops through | ||
932 | all installed ptest test suites and runs them in sequence. Consequently, | ||
933 | you might want to add this package to your image. | ||
934 | |||
935 | Getting Your Package Ready | ||
936 | -------------------------- | ||
937 | |||
938 | In order to enable a recipe to run installed ptests on target hardware, | ||
939 | you need to prepare the recipes that build the packages you want to | ||
940 | test. Here is what you have to do for each recipe: | ||
941 | |||
942 | - *Be sure the recipe inherits the* :ref:`ref-classes-ptest` *class:* | ||
943 | Include the following line in each recipe:: | ||
944 | |||
945 | inherit ptest | ||
946 | |||
947 | - *Create run-ptest:* This script starts your test. Locate the | ||
948 | script where you will refer to it using | ||
949 | :term:`SRC_URI`. Here is an | ||
950 | example that starts a test for ``dbus``:: | ||
951 | |||
952 | #!/bin/sh | ||
953 | cd test | ||
954 | make -k runtest-TESTS | ||
955 | |||
956 | - *Ensure dependencies are met:* If the test adds build or runtime | ||
957 | dependencies that normally do not exist for the package (such as | ||
958 | requiring "make" to run the test suite), use the | ||
959 | :term:`DEPENDS` and | ||
960 | :term:`RDEPENDS` variables in | ||
961 | your recipe in order for the package to meet the dependencies. Here | ||
962 | is an example where the package has a runtime dependency on "make":: | ||
963 | |||
964 | RDEPENDS:${PN}-ptest += "make" | ||
965 | |||
966 | - *Add a function to build the test suite:* Not many packages support | ||
967 | cross-compilation of their test suites. Consequently, you usually | ||
968 | need to add a cross-compilation function to the package. | ||
969 | |||
970 | Many packages based on Automake compile and run the test suite by | ||
971 | using a single command such as ``make check``. However, the host | ||
972 | ``make check`` builds and runs on the same computer, while | ||
973 | cross-compiling requires that the package is built on the host but | ||
974 | executed for the target architecture (though often, as in the case | ||
975 | for ptest, the execution occurs on the host). The built version of | ||
976 | Automake that ships with the Yocto Project includes a patch that | ||
977 | separates building and execution. Consequently, packages that use the | ||
978 | unaltered, patched version of ``make check`` automatically | ||
979 | cross-compiles. | ||
980 | |||
981 | Regardless, you still must add a ``do_compile_ptest`` function to | ||
982 | build the test suite. Add a function similar to the following to your | ||
983 | recipe:: | ||
984 | |||
985 | do_compile_ptest() { | ||
986 | oe_runmake buildtest-TESTS | ||
987 | } | ||
988 | |||
989 | - *Ensure special configurations are set:* If the package requires | ||
990 | special configurations prior to compiling the test code, you must | ||
991 | insert a ``do_configure_ptest`` function into the recipe. | ||
992 | |||
993 | - *Install the test suite:* The :ref:`ref-classes-ptest` class | ||
994 | automatically copies the file ``run-ptest`` to the target and then runs make | ||
995 | ``install-ptest`` to run the tests. If this is not enough, you need | ||
996 | to create a ``do_install_ptest`` function and make sure it gets | ||
997 | called after the "make install-ptest" completes. | ||
998 | 887 | ||
999 | Creating Node Package Manager (NPM) Packages | 888 | Creating Node Package Manager (NPM) Packages |
1000 | ============================================ | 889 | ============================================ |
diff --git a/documentation/dev-manual/qemu.rst b/documentation/dev-manual/qemu.rst index 19f3e40d63..253aff9977 100644 --- a/documentation/dev-manual/qemu.rst +++ b/documentation/dev-manual/qemu.rst | |||
@@ -75,7 +75,7 @@ available. Follow these general steps to run QEMU: | |||
75 | your :term:`Build Directory`. | 75 | your :term:`Build Directory`. |
76 | 76 | ||
77 | - If you have not built an image, you can go to the | 77 | - If you have not built an image, you can go to the |
78 | :yocto_dl:`machines/qemu </releases/yocto/yocto-&DISTRO;/machines/qemu/>` area and download a | 78 | :yocto_dl:`machines/qemu </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/qemu/>` area and download a |
79 | pre-built image that matches your architecture and can be run on | 79 | pre-built image that matches your architecture and can be run on |
80 | QEMU. | 80 | QEMU. |
81 | 81 | ||
@@ -280,12 +280,11 @@ present, the toolchain is also automatically used. | |||
280 | networking. | 280 | networking. |
281 | 281 | ||
282 | - SSH servers are available in some QEMU images. The ``core-image-sato`` | 282 | - SSH servers are available in some QEMU images. The ``core-image-sato`` |
283 | QEMU image has a Dropbear secure shell (SSH) server that runs with | 283 | QEMU image has a Dropbear secure shell (SSH) server that runs with the |
284 | the root password disabled. The ``core-image-full-cmdline`` and | 284 | root password disabled. The ``core-image-full-cmdline`` QEMU image has |
285 | ``core-image-lsb`` QEMU images have OpenSSH instead of Dropbear. | 285 | OpenSSH instead of Dropbear. Including these SSH servers allow you to use |
286 | Including these SSH servers allow you to use standard ``ssh`` and | 286 | standard ``ssh`` and ``scp`` commands. The ``core-image-minimal`` QEMU |
287 | ``scp`` commands. The ``core-image-minimal`` QEMU image, however, | 287 | image, however, contains no SSH server. |
288 | contains no SSH server. | ||
289 | 288 | ||
290 | - You can use a provided, user-space NFS server to boot the QEMU | 289 | - You can use a provided, user-space NFS server to boot the QEMU |
291 | session using a local copy of the root filesystem on the host. In | 290 | session using a local copy of the root filesystem on the host. In |
diff --git a/documentation/dev-manual/sbom.rst b/documentation/dev-manual/sbom.rst index b72bad1554..7c4b5804fb 100644 --- a/documentation/dev-manual/sbom.rst +++ b/documentation/dev-manual/sbom.rst | |||
@@ -30,16 +30,9 @@ To make this happen, you must inherit the | |||
30 | 30 | ||
31 | INHERIT += "create-spdx" | 31 | INHERIT += "create-spdx" |
32 | 32 | ||
33 | Upon building an image, you will then get: | 33 | Upon building an image, you will then get the compressed archive |
34 | 34 | ``IMAGE-MACHINE.spdx.tar.zst`` contains the index and the files for the single | |
35 | - :term:`SPDX` output in JSON format as an ``IMAGE-MACHINE.spdx.json`` file in | 35 | recipes. |
36 | ``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`. | ||
37 | |||
38 | - This toplevel file is accompanied by an ``IMAGE-MACHINE.spdx.index.json`` | ||
39 | containing an index of JSON :term:`SPDX` files for individual recipes. | ||
40 | |||
41 | - The compressed archive ``IMAGE-MACHINE.spdx.tar.zst`` contains the index | ||
42 | and the files for the single recipes. | ||
43 | 36 | ||
44 | The :ref:`ref-classes-create-spdx` class offers options to include | 37 | The :ref:`ref-classes-create-spdx` class offers options to include |
45 | more information in the output :term:`SPDX` data: | 38 | more information in the output :term:`SPDX` data: |
@@ -56,7 +49,7 @@ more information in the output :term:`SPDX` data: | |||
56 | 49 | ||
57 | Though the toplevel :term:`SPDX` output is available in | 50 | Though the toplevel :term:`SPDX` output is available in |
58 | ``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`, ancillary | 51 | ``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`, ancillary |
59 | generated files are available in ``tmp/deploy/spdx/MACHINE`` too, such as: | 52 | generated files are available in ``tmp/deploy/spdx`` too, such as: |
60 | 53 | ||
61 | - The individual :term:`SPDX` JSON files in the ``IMAGE-MACHINE.spdx.tar.zst`` | 54 | - The individual :term:`SPDX` JSON files in the ``IMAGE-MACHINE.spdx.tar.zst`` |
62 | archive. | 55 | archive. |
diff --git a/documentation/dev-manual/start.rst b/documentation/dev-manual/start.rst index 386e5f5d29..f4da61b53f 100644 --- a/documentation/dev-manual/start.rst +++ b/documentation/dev-manual/start.rst | |||
@@ -615,7 +615,7 @@ Accessing Source Archives | |||
615 | The Yocto Project also provides source archives of its releases, which | 615 | The Yocto Project also provides source archives of its releases, which |
616 | are available on :yocto_dl:`/releases/yocto/`. Then, choose the subdirectory | 616 | are available on :yocto_dl:`/releases/yocto/`. Then, choose the subdirectory |
617 | containing the release you wish to use, for example | 617 | containing the release you wish to use, for example |
618 | :yocto_dl:`yocto-&DISTRO; </releases/yocto/yocto-&DISTRO;/>`. | 618 | :yocto_dl:`&DISTRO_REL_LATEST_TAG; </releases/yocto/&DISTRO_REL_LATEST_TAG;/>`. |
619 | 619 | ||
620 | You will find there source archives of individual components (if you wish | 620 | You will find there source archives of individual components (if you wish |
621 | to use them individually), and of the corresponding Poky release bundling | 621 | to use them individually), and of the corresponding Poky release bundling |
diff --git a/documentation/dev-manual/upgrading-recipes.rst b/documentation/dev-manual/upgrading-recipes.rst index 4fac78bdfb..a38fd7837c 100644 --- a/documentation/dev-manual/upgrading-recipes.rst +++ b/documentation/dev-manual/upgrading-recipes.rst | |||
@@ -333,7 +333,7 @@ Manually Upgrading a Recipe | |||
333 | 333 | ||
334 | If for some reason you choose not to upgrade recipes using | 334 | If for some reason you choose not to upgrade recipes using |
335 | :ref:`dev-manual/upgrading-recipes:Using the Auto Upgrade Helper (AUH)` or | 335 | :ref:`dev-manual/upgrading-recipes:Using the Auto Upgrade Helper (AUH)` or |
336 | by :ref:`dev-manual/upgrading-recipes:Using \`\`devtool upgrade\`\``, | 336 | by :ref:`dev-manual/upgrading-recipes:Using ``devtool upgrade```, |
337 | you can manually edit the recipe files to upgrade the versions. | 337 | you can manually edit the recipe files to upgrade the versions. |
338 | 338 | ||
339 | .. note:: | 339 | .. note:: |
diff --git a/documentation/dev-manual/vulnerabilities.rst b/documentation/dev-manual/vulnerabilities.rst index 1bc2a85929..f5f9fe3a0c 100644 --- a/documentation/dev-manual/vulnerabilities.rst +++ b/documentation/dev-manual/vulnerabilities.rst | |||
@@ -62,37 +62,77 @@ found in ``build/tmp/deploy/cve``. | |||
62 | 62 | ||
63 | For example the CVE check report for the ``flex-native`` recipe looks like:: | 63 | For example the CVE check report for the ``flex-native`` recipe looks like:: |
64 | 64 | ||
65 | $ cat poky/build/tmp/deploy/cve/flex-native | 65 | $ cat ./tmp/deploy/cve/flex-native_cve.json |
66 | LAYER: meta | 66 | { |
67 | PACKAGE NAME: flex-native | 67 | "version": "1", |
68 | PACKAGE VERSION: 2.6.4 | 68 | "package": [ |
69 | CVE: CVE-2016-6354 | 69 | { |
70 | CVE STATUS: Patched | 70 | "name": "flex-native", |
71 | CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. | 71 | "layer": "meta", |
72 | CVSS v2 BASE SCORE: 7.5 | 72 | "version": "2.6.4", |
73 | CVSS v3 BASE SCORE: 9.8 | 73 | "products": [ |
74 | VECTOR: NETWORK | 74 | { |
75 | MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354 | 75 | "product": "flex", |
76 | 76 | "cvesInRecord": "No" | |
77 | LAYER: meta | 77 | }, |
78 | PACKAGE NAME: flex-native | 78 | { |
79 | PACKAGE VERSION: 2.6.4 | 79 | "product": "flex", |
80 | CVE: CVE-2019-6293 | 80 | "cvesInRecord": "Yes" |
81 | CVE STATUS: Ignored | 81 | } |
82 | CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service. | 82 | ], |
83 | CVSS v2 BASE SCORE: 4.3 | 83 | "issue": [ |
84 | CVSS v3 BASE SCORE: 5.5 | 84 | { |
85 | VECTOR: NETWORK | 85 | "id": "CVE-2006-0459", |
86 | MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293 | 86 | "status": "Patched", |
87 | "link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459", | ||
88 | "summary": "flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.", | ||
89 | "scorev2": "7.5", | ||
90 | "scorev3": "0.0", | ||
91 | "scorev4": "0.0", | ||
92 | "modified": "2024-11-21T00:06Z", | ||
93 | "vector": "NETWORK", | ||
94 | "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", | ||
95 | "detail": "version-not-in-range" | ||
96 | }, | ||
97 | { | ||
98 | "id": "CVE-2016-6354", | ||
99 | "status": "Patched", | ||
100 | "link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354", | ||
101 | "summary": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.", | ||
102 | "scorev2": "7.5", | ||
103 | "scorev3": "9.8", | ||
104 | "scorev4": "0.0", | ||
105 | "modified": "2024-11-21T02:55Z", | ||
106 | "vector": "NETWORK", | ||
107 | "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", | ||
108 | "detail": "version-not-in-range" | ||
109 | }, | ||
110 | { | ||
111 | "id": "CVE-2019-6293", | ||
112 | "status": "Ignored", | ||
113 | "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293", | ||
114 | "summary": "An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.", | ||
115 | "scorev2": "4.3", | ||
116 | "scorev3": "5.5", | ||
117 | "scorev4": "0.0", | ||
118 | "modified": "2024-11-21T04:46Z", | ||
119 | "vector": "NETWORK", | ||
120 | "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", | ||
121 | "detail": "upstream-wontfix", | ||
122 | "description": "there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address this." | ||
123 | } | ||
124 | ] | ||
125 | } | ||
126 | ] | ||
127 | } | ||
87 | 128 | ||
88 | For images, a summary of all recipes included in the image and their CVEs is also | 129 | For images, a summary of all recipes included in the image and their CVEs is also |
89 | generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found | 130 | generated in the JSON format. These ``.json`` reports can be found |
90 | in the ``tmp/deploy/images`` directory for each compiled image. | 131 | in the ``tmp/deploy/images`` directory for each compiled image. |
91 | 132 | ||
92 | At build time CVE check will also throw warnings about ``Unpatched`` CVEs:: | 133 | At build time CVE check will also throw warnings about ``Unpatched`` CVEs:: |
93 | 134 | ||
94 | WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log | 135 | WARNING: qemu-native-9.2.0-r0 do_cve_check: Found unpatched CVE (CVE-2023-1386) |
95 | WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log | ||
96 | 136 | ||
97 | It is also possible to check the CVE status of individual packages as follows:: | 137 | It is also possible to check the CVE status of individual packages as follows:: |
98 | 138 | ||
@@ -111,10 +151,10 @@ upstream `NIST CVE database <https://nvd.nist.gov/>`__. | |||
111 | 151 | ||
112 | The variable supports using vendor and product names like this:: | 152 | The variable supports using vendor and product names like this:: |
113 | 153 | ||
114 | CVE_PRODUCT = "flex_project:flex" | 154 | CVE_PRODUCT = "flex_project:flex westes:flex" |
115 | 155 | ||
116 | In this example the vendor name used in the CVE database is ``flex_project`` and the | 156 | In this example we have two possible vendors names, ``flex_project`` and ``westes``, |
117 | product is ``flex``. With this setting the ``flex`` recipe only maps to this specific | 157 | with the product name ``flex``. With this setting the ``flex`` recipe only maps to this specific |
118 | product and not products from other vendors with same name ``flex``. | 158 | product and not products from other vendors with same name ``flex``. |
119 | 159 | ||
120 | Similarly, when the recipe version :term:`PV` is not compatible with software versions used by | 160 | Similarly, when the recipe version :term:`PV` is not compatible with software versions used by |
diff --git a/documentation/dev-manual/wic.rst b/documentation/dev-manual/wic.rst index a3880f3a1c..fced0e170c 100644 --- a/documentation/dev-manual/wic.rst +++ b/documentation/dev-manual/wic.rst | |||
@@ -513,7 +513,7 @@ or :: | |||
513 | 513 | ||
514 | For more information on how to use the ``bmaptool`` | 514 | For more information on how to use the ``bmaptool`` |
515 | to flash a device with an image, see the | 515 | to flash a device with an image, see the |
516 | ":ref:`dev-manual/bmaptool:flashing images using \`\`bmaptool\`\``" | 516 | ":ref:`dev-manual/bmaptool:flashing images using \`bmaptool\``" |
517 | section. | 517 | section. |
518 | 518 | ||
519 | Using a Modified Kickstart File | 519 | Using a Modified Kickstart File |
@@ -721,7 +721,7 @@ the existing kernel, and then inserts a new kernel: | |||
721 | 721 | ||
722 | Once the new kernel is added back into the image, you can use the | 722 | Once the new kernel is added back into the image, you can use the |
723 | ``dd`` command or :ref:`bmaptool | 723 | ``dd`` command or :ref:`bmaptool |
724 | <dev-manual/bmaptool:flashing images using \`\`bmaptool\`\`>` | 724 | <dev-manual/bmaptool:flashing images using \`bmaptool\`>` commands |
725 | to flash your wic image onto an SD card or USB stick and test your | 725 | to flash your wic image onto an SD card or USB stick and test your |
726 | target. | 726 | target. |
727 | 727 | ||
diff --git a/documentation/downloads.rst b/documentation/downloads.rst new file mode 100644 index 0000000000..7ec978ef2d --- /dev/null +++ b/documentation/downloads.rst | |||
@@ -0,0 +1,11 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | ======================= | ||
4 | Documentation Downloads | ||
5 | ======================= | ||
6 | |||
7 | The documentation can be downloaded in file formats to be read offline or on | ||
8 | another device. The currently supported formats are linked below: | ||
9 | |||
10 | - `EPub <_static/TheYoctoProject.epub>`_ | ||
11 | - `PDF <_static/theyoctoproject.pdf>`_ | ||
diff --git a/documentation/index.rst b/documentation/index.rst index 3fef1704a4..6c6be38a7e 100644 --- a/documentation/index.rst +++ b/documentation/index.rst | |||
@@ -51,3 +51,10 @@ Welcome to the Yocto Project Documentation | |||
51 | :hidden: | 51 | :hidden: |
52 | 52 | ||
53 | genindex | 53 | genindex |
54 | |||
55 | .. toctree:: | ||
56 | :maxdepth: 1 | ||
57 | :caption: Documentation Downloads | ||
58 | :hidden: | ||
59 | |||
60 | downloads | ||
diff --git a/documentation/kernel-dev/common.rst b/documentation/kernel-dev/common.rst index fda41694dc..654c4e0a01 100644 --- a/documentation/kernel-dev/common.rst +++ b/documentation/kernel-dev/common.rst | |||
@@ -672,7 +672,7 @@ The steps in this procedure show you how you can patch the kernel using | |||
672 | 672 | ||
673 | Before attempting this procedure, be sure you have performed the | 673 | Before attempting this procedure, be sure you have performed the |
674 | steps to get ready for updating the kernel as described in the | 674 | steps to get ready for updating the kernel as described in the |
675 | ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" | 675 | ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" |
676 | section. | 676 | section. |
677 | 677 | ||
678 | Patching the kernel involves changing or adding configurations to an | 678 | Patching the kernel involves changing or adding configurations to an |
@@ -685,7 +685,7 @@ output at boot time through ``printk`` statements in the kernel's | |||
685 | ``calibrate.c`` source code file. Applying the patch and booting the | 685 | ``calibrate.c`` source code file. Applying the patch and booting the |
686 | modified image causes the added messages to appear on the emulator's | 686 | modified image causes the added messages to appear on the emulator's |
687 | console. The example is a continuation of the setup procedure found in | 687 | console. The example is a continuation of the setup procedure found in |
688 | the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Section. | 688 | the ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" Section. |
689 | 689 | ||
690 | #. *Check Out the Kernel Source Files:* First you must use ``devtool`` | 690 | #. *Check Out the Kernel Source Files:* First you must use ``devtool`` |
691 | to checkout the kernel source code in its workspace. | 691 | to checkout the kernel source code in its workspace. |
@@ -693,7 +693,7 @@ the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Se | |||
693 | .. note:: | 693 | .. note:: |
694 | 694 | ||
695 | See this step in the | 695 | See this step in the |
696 | ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" | 696 | ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" |
697 | section for more information. | 697 | section for more information. |
698 | 698 | ||
699 | Use the following ``devtool`` command to check out the code:: | 699 | Use the following ``devtool`` command to check out the code:: |
@@ -804,7 +804,7 @@ the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Se | |||
804 | .. note:: | 804 | .. note:: |
805 | 805 | ||
806 | See Step 3 of the | 806 | See Step 3 of the |
807 | ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" | 807 | ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" |
808 | section for information on setting up this layer. | 808 | section for information on setting up this layer. |
809 | 809 | ||
810 | Once the command | 810 | Once the command |
@@ -1190,7 +1190,7 @@ appear in the ``.config`` file, which is in the :term:`Build Directory`. | |||
1190 | 1190 | ||
1191 | For more information about where the ``.config`` file is located, see the | 1191 | For more information about where the ``.config`` file is located, see the |
1192 | example in the | 1192 | example in the |
1193 | ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" | 1193 | ":ref:`kernel-dev/common:using ``menuconfig```" |
1194 | section. | 1194 | section. |
1195 | 1195 | ||
1196 | It is simple to create a configuration fragment. One method is to use | 1196 | It is simple to create a configuration fragment. One method is to use |
@@ -1286,7 +1286,7 @@ when you override a policy configuration in a hardware configuration | |||
1286 | fragment. | 1286 | fragment. |
1287 | 1287 | ||
1288 | In order to run this task, you must have an existing ``.config`` file. | 1288 | In order to run this task, you must have an existing ``.config`` file. |
1289 | See the ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" section for | 1289 | See the ":ref:`kernel-dev/common:using ``menuconfig```" section for |
1290 | information on how to create a configuration file. | 1290 | information on how to create a configuration file. |
1291 | 1291 | ||
1292 | Here is sample output from the :ref:`ref-tasks-kernel_configcheck` task: | 1292 | Here is sample output from the :ref:`ref-tasks-kernel_configcheck` task: |
@@ -1359,7 +1359,7 @@ and | |||
1359 | tasks until they produce no warnings. | 1359 | tasks until they produce no warnings. |
1360 | 1360 | ||
1361 | For more information on how to use the ``menuconfig`` tool, see the | 1361 | For more information on how to use the ``menuconfig`` tool, see the |
1362 | :ref:`kernel-dev/common:using \`\`menuconfig\`\`` section. | 1362 | :ref:`kernel-dev/common:using ``menuconfig``` section. |
1363 | 1363 | ||
1364 | Fine-Tuning the Kernel Configuration File | 1364 | Fine-Tuning the Kernel Configuration File |
1365 | ----------------------------------------- | 1365 | ----------------------------------------- |
@@ -1562,16 +1562,9 @@ Here are some basic steps you can use to work with your own sources: | |||
1562 | changed. | 1562 | changed. |
1563 | 1563 | ||
1564 | - :term:`PV`: The default :term:`PV` | 1564 | - :term:`PV`: The default :term:`PV` |
1565 | assignment is typically adequate. It combines the | 1565 | assignment is typically adequate. It combines the value of |
1566 | :term:`LINUX_VERSION` with the Source Control Manager (SCM) revision | 1566 | :term:`LINUX_VERSION` and the value ``+git`` which adds source control |
1567 | as derived from the :term:`SRCPV` | 1567 | information to :term:`PKGV` later during the packaging phase. |
1568 | variable. The combined results are a string with the following | ||
1569 | form:: | ||
1570 | |||
1571 | 3.19.11+git1+68a635bf8dfb64b02263c1ac80c948647cc76d5f_1+218bd8d2022b9852c60d32f0d770931e3cf343e2 | ||
1572 | |||
1573 | While lengthy, the extra verbosity in :term:`PV` helps ensure you are | ||
1574 | using the exact sources from which you intend to build. | ||
1575 | 1568 | ||
1576 | - :term:`COMPATIBLE_MACHINE`: | 1569 | - :term:`COMPATIBLE_MACHINE`: |
1577 | A list of the machines supported by your new recipe. This variable | 1570 | A list of the machines supported by your new recipe. This variable |
diff --git a/documentation/kernel-dev/intro.rst b/documentation/kernel-dev/intro.rst index a663733a1d..7df342f8d5 100644 --- a/documentation/kernel-dev/intro.rst +++ b/documentation/kernel-dev/intro.rst | |||
@@ -122,7 +122,7 @@ general information and references for further information. | |||
122 | Using ``devtool`` requires that you have a clean build | 122 | Using ``devtool`` requires that you have a clean build |
123 | of the image. For | 123 | of the image. For |
124 | more information, see the | 124 | more information, see the |
125 | ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" | 125 | ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" |
126 | section. | 126 | section. |
127 | 127 | ||
128 | Using traditional kernel development requires that you have the | 128 | Using traditional kernel development requires that you have the |
diff --git a/documentation/migration-guides/migration-1.5.rst b/documentation/migration-guides/migration-1.5.rst index c8f3cbc165..da26cca63d 100644 --- a/documentation/migration-guides/migration-1.5.rst +++ b/documentation/migration-guides/migration-1.5.rst | |||
@@ -248,8 +248,8 @@ A new automated image testing framework has been added through the | |||
248 | framework replaces the older ``imagetest-qemu`` framework. | 248 | framework replaces the older ``imagetest-qemu`` framework. |
249 | 249 | ||
250 | You can learn more about performing automated image tests in the | 250 | You can learn more about performing automated image tests in the |
251 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 251 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
252 | section in the Yocto Project Development Tasks Manual. | 252 | section in the Yocto Project Test Environment Manual. |
253 | 253 | ||
254 | .. _migration-1.5-build-history: | 254 | .. _migration-1.5-build-history: |
255 | 255 | ||
diff --git a/documentation/migration-guides/migration-1.6.rst b/documentation/migration-guides/migration-1.6.rst index 916169e836..b052a43a31 100644 --- a/documentation/migration-guides/migration-1.6.rst +++ b/documentation/migration-guides/migration-1.6.rst | |||
@@ -221,7 +221,7 @@ Package Test (ptest) | |||
221 | 221 | ||
222 | Package Tests (ptest) are built but not installed by default. For | 222 | Package Tests (ptest) are built but not installed by default. For |
223 | information on using Package Tests, see the | 223 | information on using Package Tests, see the |
224 | ":ref:`dev-manual/packages:testing packages with ptest`" section in the | 224 | ":ref:`test-manual/ptest:testing packages with ptest`" section in the |
225 | Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`" | 225 | Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`" |
226 | section. | 226 | section. |
227 | 227 | ||
diff --git a/documentation/migration-guides/release-4.0.rst b/documentation/migration-guides/release-4.0.rst index 4954ea678b..1053ec4c0b 100644 --- a/documentation/migration-guides/release-4.0.rst +++ b/documentation/migration-guides/release-4.0.rst | |||
@@ -27,4 +27,10 @@ Release 4.0 (kirkstone) | |||
27 | release-notes-4.0.18 | 27 | release-notes-4.0.18 |
28 | release-notes-4.0.19 | 28 | release-notes-4.0.19 |
29 | release-notes-4.0.20 | 29 | release-notes-4.0.20 |
30 | 30 | release-notes-4.0.21 | |
31 | release-notes-4.0.22 | ||
32 | release-notes-4.0.23 | ||
33 | release-notes-4.0.24 | ||
34 | release-notes-4.0.25 | ||
35 | release-notes-4.0.26 | ||
36 | release-notes-4.0.27 | ||
diff --git a/documentation/migration-guides/release-5.0.rst b/documentation/migration-guides/release-5.0.rst index 1d6ba7692e..b3e7a67912 100644 --- a/documentation/migration-guides/release-5.0.rst +++ b/documentation/migration-guides/release-5.0.rst | |||
@@ -10,3 +10,10 @@ Release 5.0 (scarthgap) | |||
10 | release-notes-5.0.1 | 10 | release-notes-5.0.1 |
11 | release-notes-5.0.2 | 11 | release-notes-5.0.2 |
12 | release-notes-5.0.3 | 12 | release-notes-5.0.3 |
13 | release-notes-5.0.4 | ||
14 | release-notes-5.0.5 | ||
15 | release-notes-5.0.6 | ||
16 | release-notes-5.0.7 | ||
17 | release-notes-5.0.8 | ||
18 | release-notes-5.0.9 | ||
19 | release-notes-5.0.10 | ||
diff --git a/documentation/migration-guides/release-notes-3.4.1.rst b/documentation/migration-guides/release-notes-3.4.1.rst index 097c249a90..c4b99a269b 100644 --- a/documentation/migration-guides/release-notes-3.4.1.rst +++ b/documentation/migration-guides/release-notes-3.4.1.rst | |||
@@ -11,14 +11,14 @@ Known Issues in 3.4.1 | |||
11 | Security Fixes in 3.4.1 | 11 | Security Fixes in 3.4.1 |
12 | ~~~~~~~~~~~~~~~~~~~~~~~ | 12 | ~~~~~~~~~~~~~~~~~~~~~~~ |
13 | 13 | ||
14 | - glibc: Backport fix for :cve:`2021-43396` | 14 | - glibc: Backport fix for :cve_nist:`2021-43396` |
15 | - vim: add patch number to :cve:`2021-3778` patch | 15 | - vim: add patch number to :cve_nist:`2021-3778` patch |
16 | - vim: fix :cve:`2021-3796`, :cve:`2021-3872`, and :cve:`2021-3875` | 16 | - vim: fix :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, and :cve_nist:`2021-3875` |
17 | - squashfs-tools: follow-up fix for :cve:`2021-41072` | 17 | - squashfs-tools: follow-up fix for :cve_nist:`2021-41072` |
18 | - avahi: update CVE id fixed by local-ping.patch | 18 | - avahi: update CVE id fixed by local-ping.patch |
19 | - squashfs-tools: fix :cve:`2021-41072` | 19 | - squashfs-tools: fix :cve_nist:`2021-41072` |
20 | - ffmpeg: fix :cve:`2021-38114` | 20 | - ffmpeg: fix :cve_nist:`2021-38114` |
21 | - curl: fix :cve:`2021-22945`, :cve:`2021-22946` and :cve:`2021-22947` | 21 | - curl: fix :cve_nist:`2021-22945`, :cve_nist:`2021-22946` and :cve_nist:`2021-22947` |
22 | 22 | ||
23 | Fixes in 3.4.1 | 23 | Fixes in 3.4.1 |
24 | ~~~~~~~~~~~~~~ | 24 | ~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-3.4.2.rst b/documentation/migration-guides/release-notes-3.4.2.rst index 5ff42d3900..94dffcb79e 100644 --- a/documentation/migration-guides/release-notes-3.4.2.rst +++ b/documentation/migration-guides/release-notes-3.4.2.rst | |||
@@ -6,29 +6,29 @@ Release notes for 3.4.2 (honister) | |||
6 | Security Fixes in 3.4.2 | 6 | Security Fixes in 3.4.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - tiff: backport fix for :cve:`2022-22844` | 9 | - tiff: backport fix for :cve_nist:`2022-22844` |
10 | - glibc : Fix :cve:`2021-3999` | 10 | - glibc : Fix :cve_nist:`2021-3999` |
11 | - glibc : Fix :cve:`2021-3998` | 11 | - glibc : Fix :cve_nist:`2021-3998` |
12 | - glibc : Fix :cve:`2022-23219` | 12 | - glibc : Fix :cve_nist:`2022-23219` |
13 | - glibc : Fix :cve:`2022-23218` | 13 | - glibc : Fix :cve_nist:`2022-23218` |
14 | - lighttpd: backport a fix for :cve:`2022-22707` | 14 | - lighttpd: backport a fix for :cve_nist:`2022-22707` |
15 | - speex: fix :cve:`2020-23903` | 15 | - speex: fix :cve_nist:`2020-23903` |
16 | - linux-yocto/5.10: amdgpu: updates for :cve:`2021-42327` | 16 | - linux-yocto/5.10: amdgpu: updates for :cve_nist:`2021-42327` |
17 | - libsndfile1: fix :cve:`2021-4156` | 17 | - libsndfile1: fix :cve_nist:`2021-4156` |
18 | - xserver-xorg: whitelist two CVEs | 18 | - xserver-xorg: whitelist two CVEs |
19 | - grub2: fix :cve:`2021-3981` | 19 | - grub2: fix :cve_nist:`2021-3981` |
20 | - xserver-xorg: update :term:`CVE_PRODUCT` | 20 | - xserver-xorg: update :term:`CVE_PRODUCT` |
21 | - binutils: :cve:`2021-42574` | 21 | - binutils: :cve_nist:`2021-42574` |
22 | - gcc: Fix :cve:`2021-42574` | 22 | - gcc: Fix :cve_nist:`2021-42574` |
23 | - gcc: Fix :cve:`2021-35465` | 23 | - gcc: Fix :cve_nist:`2021-35465` |
24 | - cve-extra-exclusions: add db CVEs to exclusion list | 24 | - cve-extra-exclusions: add db CVEs to exclusion list |
25 | - gcc: Add :cve:`2021-37322` to the list of CVEs to ignore | 25 | - gcc: Add :cve_nist:`2021-37322` to the list of CVEs to ignore |
26 | - bind: fix :cve:`2021-25219` | 26 | - bind: fix :cve_nist:`2021-25219` |
27 | - openssh: fix :cve:`2021-41617` | 27 | - openssh: fix :cve_nist:`2021-41617` |
28 | - ncurses: fix :cve:`2021-39537` | 28 | - ncurses: fix :cve_nist:`2021-39537` |
29 | - vim: fix :cve:`2021-3968` and :cve:`2021-3973` | 29 | - vim: fix :cve_nist:`2021-3968` and :cve_nist:`2021-3973` |
30 | - vim: fix :cve:`2021-3927` and :cve:`2021-3928` | 30 | - vim: fix :cve_nist:`2021-3927` and :cve_nist:`2021-3928` |
31 | - gmp: fix :cve:`2021-43618` | 31 | - gmp: fix :cve_nist:`2021-43618` |
32 | 32 | ||
33 | Fixes in 3.4.2 | 33 | Fixes in 3.4.2 |
34 | ~~~~~~~~~~~~~~ | 34 | ~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-3.4.3.rst b/documentation/migration-guides/release-notes-3.4.3.rst index 2af802307d..cd9698d0e8 100644 --- a/documentation/migration-guides/release-notes-3.4.3.rst +++ b/documentation/migration-guides/release-notes-3.4.3.rst | |||
@@ -6,12 +6,12 @@ Release notes for 3.4.3 (honister) | |||
6 | Security Fixes in 3.4.3 | 6 | Security Fixes in 3.4.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - ghostscript: fix :cve:`2021-3781` | 9 | - ghostscript: fix :cve_nist:`2021-3781` |
10 | - ghostscript: fix :cve:`2021-45949` | 10 | - ghostscript: fix :cve_nist:`2021-45949` |
11 | - tiff: Add backports for two CVEs from upstream (:cve:`2022-0561` & :cve:`2022-0562`) | 11 | - tiff: Add backports for two CVEs from upstream (:cve_nist:`2022-0561` & :cve_nist:`2022-0562`) |
12 | - gcc : Fix :cve:`2021-46195` | 12 | - gcc : Fix :cve_nist:`2021-46195` |
13 | - virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__ | 13 | - virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__ |
14 | - binutils: Add fix for :cve:`2021-45078` | 14 | - binutils: Add fix for :cve_nist:`2021-45078` |
15 | 15 | ||
16 | 16 | ||
17 | Fixes in 3.4.3 | 17 | Fixes in 3.4.3 |
diff --git a/documentation/migration-guides/release-notes-3.4.4.rst b/documentation/migration-guides/release-notes-3.4.4.rst index 0bf9a16209..3ab858b0b9 100644 --- a/documentation/migration-guides/release-notes-3.4.4.rst +++ b/documentation/migration-guides/release-notes-3.4.4.rst | |||
@@ -6,11 +6,11 @@ Release notes for 3.4.4 (honister) | |||
6 | Security Fixes in 3.4.4 | 6 | Security Fixes in 3.4.4 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - tiff: fix :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909` and :cve:`2022-0924` | 9 | - tiff: fix :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909` and :cve_nist:`2022-0924` |
10 | - xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__ | 10 | - xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__ |
11 | - unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__ | 11 | - unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__ |
12 | - zlib: fix :cve:`2018-25032` | 12 | - zlib: fix :cve_nist:`2018-25032` |
13 | - grub: ignore :cve:`2021-46705` | 13 | - grub: ignore :cve_nist:`2021-46705` |
14 | 14 | ||
15 | Fixes in 3.4.4 | 15 | Fixes in 3.4.4 |
16 | ~~~~~~~~~~~~~~ | 16 | ~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-3.4.rst b/documentation/migration-guides/release-notes-3.4.rst index d76bb004b1..6eca9956be 100644 --- a/documentation/migration-guides/release-notes-3.4.rst +++ b/documentation/migration-guides/release-notes-3.4.rst | |||
@@ -220,34 +220,34 @@ Other license-related notes: | |||
220 | Security Fixes in 3.4 | 220 | Security Fixes in 3.4 |
221 | ~~~~~~~~~~~~~~~~~~~~~ | 221 | ~~~~~~~~~~~~~~~~~~~~~ |
222 | 222 | ||
223 | - apr: :cve:`2021-35940` | 223 | - apr: :cve_nist:`2021-35940` |
224 | - aspell: :cve:`2019-25051` | 224 | - aspell: :cve_nist:`2019-25051` |
225 | - avahi: :cve:`2021-3468`, :cve:`2021-36217` | 225 | - avahi: :cve_nist:`2021-3468`, :cve_nist:`2021-36217` |
226 | - binutils: :cve:`2021-20197` | 226 | - binutils: :cve_nist:`2021-20197` |
227 | - bluez: :cve:`2021-3658` | 227 | - bluez: :cve_nist:`2021-3658` |
228 | - busybox: :cve:`2021-28831` | 228 | - busybox: :cve_nist:`2021-28831` |
229 | - cairo: :cve:`2020-35492` | 229 | - cairo: :cve_nist:`2020-35492` |
230 | - cpio: :cve:`2021-38185` | 230 | - cpio: :cve_nist:`2021-38185` |
231 | - expat: :cve:`2013-0340` | 231 | - expat: :cve_nist:`2013-0340` |
232 | - ffmpeg: :cve:`2020-20446`, :cve:`2020-22015`, :cve:`2020-22021`, :cve:`2020-22033`, :cve:`2020-22019`, :cve:`2021-33815`, :cve:`2021-38171`, :cve:`2020-20453` | 232 | - ffmpeg: :cve_nist:`2020-20446`, :cve_nist:`2020-22015`, :cve_nist:`2020-22021`, :cve_nist:`2020-22033`, :cve_nist:`2020-22019`, :cve_nist:`2021-33815`, :cve_nist:`2021-38171`, :cve_nist:`2020-20453` |
233 | - glibc: :cve:`2021-33574`, :cve:`2021-38604` | 233 | - glibc: :cve_nist:`2021-33574`, :cve_nist:`2021-38604` |
234 | - inetutils: :cve:`2021-40491` | 234 | - inetutils: :cve_nist:`2021-40491` |
235 | - libgcrypt: :cve:`2021-40528` | 235 | - libgcrypt: :cve_nist:`2021-40528` |
236 | - linux-yocto/5.10, 5.14: :cve:`2021-3653`, :cve:`2021-3656` | 236 | - linux-yocto/5.10, 5.14: :cve_nist:`2021-3653`, :cve_nist:`2021-3656` |
237 | - lz4: :cve:`2021-3520` | 237 | - lz4: :cve_nist:`2021-3520` |
238 | - nettle: :cve:`2021-20305` | 238 | - nettle: :cve_nist:`2021-20305` |
239 | - openssl: :cve:`2021-3711`, :cve:`2021-3712` | 239 | - openssl: :cve_nist:`2021-3711`, :cve_nist:`2021-3712` |
240 | - perl: :cve:`2021-36770` | 240 | - perl: :cve_nist:`2021-36770` |
241 | - python3: :cve:`2021-29921` | 241 | - python3: :cve_nist:`2021-29921` |
242 | - python3-pip: :cve:`2021-3572` | 242 | - python3-pip: :cve_nist:`2021-3572` |
243 | - qemu: :cve:`2020-27821`, :cve:`2020-29443`, :cve:`2020-35517`, :cve:`2021-3392`, :cve:`2021-3409`, :cve:`2021-3416`, :cve:`2021-3527`, :cve:`2021-3544`, :cve:`2021-3545`, :cve:`2021-3546`, :cve:`2021-3682`, :cve:`2021-20181`, :cve:`2021-20221`, :cve:`2021-20257`, :cve:`2021-20263` | 243 | - qemu: :cve_nist:`2020-27821`, :cve_nist:`2020-29443`, :cve_nist:`2020-35517`, :cve_nist:`2021-3392`, :cve_nist:`2021-3409`, :cve_nist:`2021-3416`, :cve_nist:`2021-3527`, :cve_nist:`2021-3544`, :cve_nist:`2021-3545`, :cve_nist:`2021-3546`, :cve_nist:`2021-3682`, :cve_nist:`2021-20181`, :cve_nist:`2021-20221`, :cve_nist:`2021-20257`, :cve_nist:`2021-20263` |
244 | - rpm: :cve:`2021-3421`, :cve:`2021-20271` | 244 | - rpm: :cve_nist:`2021-3421`, :cve_nist:`2021-20271` |
245 | - rsync: :cve:`2020-14387` | 245 | - rsync: :cve_nist:`2020-14387` |
246 | - util-linux: :cve:`2021-37600` | 246 | - util-linux: :cve_nist:`2021-37600` |
247 | - vim: :cve:`2021-3770`, :cve:`2021-3778` | 247 | - vim: :cve_nist:`2021-3770`, :cve_nist:`2021-3778` |
248 | - wpa-supplicant: :cve:`2021-30004` | 248 | - wpa-supplicant: :cve_nist:`2021-30004` |
249 | - xdg-utils: :cve:`2020-27748` | 249 | - xdg-utils: :cve_nist:`2020-27748` |
250 | - xserver-xorg: :cve:`2021-3472` | 250 | - xserver-xorg: :cve_nist:`2021-3472` |
251 | 251 | ||
252 | Recipe Upgrades in 3.4 | 252 | Recipe Upgrades in 3.4 |
253 | ~~~~~~~~~~~~~~~~~~~~~~ | 253 | ~~~~~~~~~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-4.0.1.rst b/documentation/migration-guides/release-notes-4.0.1.rst index 5529f71c6f..5b972f899e 100644 --- a/documentation/migration-guides/release-notes-4.0.1.rst +++ b/documentation/migration-guides/release-notes-4.0.1.rst | |||
@@ -6,11 +6,11 @@ Release notes for 4.0.1 (kirkstone) | |||
6 | Security Fixes in 4.0.1 | 6 | Security Fixes in 4.0.1 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - linux-yocto/5.15: fix :cve:`2022-28796` | 9 | - linux-yocto/5.15: fix :cve_nist:`2022-28796` |
10 | - python3: ignore :cve:`2015-20107` | 10 | - python3: ignore :cve_nist:`2015-20107` |
11 | - e2fsprogs: fix :cve:`2022-1304` | 11 | - e2fsprogs: fix :cve_nist:`2022-1304` |
12 | - lua: fix :cve:`2022-28805` | 12 | - lua: fix :cve_nist:`2022-28805` |
13 | - busybox: fix :cve:`2022-28391` | 13 | - busybox: fix :cve_nist:`2022-28391` |
14 | 14 | ||
15 | Fixes in 4.0.1 | 15 | Fixes in 4.0.1 |
16 | ~~~~~~~~~~~~~~ | 16 | ~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-4.0.10.rst b/documentation/migration-guides/release-notes-4.0.10.rst index f37c3471ea..4e88bafe8a 100644 --- a/documentation/migration-guides/release-notes-4.0.10.rst +++ b/documentation/migration-guides/release-notes-4.0.10.rst | |||
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.10 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.10 | 6 | Security Fixes in Yocto-4.0.10 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils: Fix :cve:`2023-1579`, :cve:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588` | 9 | - binutils: Fix :cve_nist:`2023-1579`, :cve_nist:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588` |
10 | - cargo : Ignore :cve:`2022-46176` | 10 | - cargo : Ignore :cve_nist:`2022-46176` |
11 | - connman: Fix :cve:`2023-28488` | 11 | - connman: Fix :cve_nist:`2023-28488` |
12 | - curl: Fix :cve:`2023-27533`, :cve:`2023-27534`, :cve:`2023-27535`, :cve:`2023-27536` and :cve:`2023-27538` | 12 | - curl: Fix :cve_nist:`2023-27533`, :cve_nist:`2023-27534`, :cve_nist:`2023-27535`, :cve_nist:`2023-27536` and :cve_nist:`2023-27538` |
13 | - ffmpeg: Fix :cve:`2022-48434` | 13 | - ffmpeg: Fix :cve_nist:`2022-48434` |
14 | - freetype: Fix :cve:`2023-2004` | 14 | - freetype: Fix :cve_nist:`2023-2004` |
15 | - ghostscript: Fix :cve_mitre:`2023-29979` | 15 | - ghostscript: Fix :cve_mitre:`2023-29979` |
16 | - git: Fix :cve:`2023-25652` and :cve:`2023-29007` | 16 | - git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007` |
17 | - go: Fix :cve:`2022-41722`, :cve:`2022-41724`, :cve:`2022-41725`, :cve:`2023-24534`, :cve:`2023-24537` and :cve:`2023-24538` | 17 | - go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725`, :cve_nist:`2023-24534`, :cve_nist:`2023-24537` and :cve_nist:`2023-24538` |
18 | - go: Ignore :cve:`2022-41716` | 18 | - go: Ignore :cve_nist:`2022-41716` |
19 | - libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` | 19 | - libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469` |
20 | - libxpm: Fix :cve:`2022-44617`, :cve:`2022-46285` and :cve:`2022-4883` | 20 | - libxpm: Fix :cve_nist:`2022-44617`, :cve_nist:`2022-46285` and :cve_nist:`2022-4883` |
21 | - linux-yocto: Ignore :cve:`2021-3759`, :cve:`2021-4135`, :cve:`2021-4155`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-1016`, :cve:`2022-1184`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1462`, :cve:`2022-1734`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1998`, :cve:`2022-2078`, :cve:`2022-2196`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-2503`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2873`, :cve:`2022-2905`, :cve:`2022-2959`, :cve:`2022-3028`, :cve:`2022-3078`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3115`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3629`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-39188`, :cve:`2022-39190`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-41218`, :cve:`2022-4139`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42703`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-4382`, :cve:`2022-4662`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47929`, :cve:`2023-0179`, :cve:`2023-0394`, :cve:`2023-0461`, :cve:`2023-0590`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1382`, :cve:`2023-1513`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1998`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2162`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-22999`, :cve:`2023-23002`, :cve:`2023-23004`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-25012`, :cve:`2023-26545`, :cve:`2023-28327` and :cve:`2023-28328` | 21 | - linux-yocto: Ignore :cve_nist:`2021-3759`, :cve_nist:`2021-4135`, :cve_nist:`2021-4155`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-1016`, :cve_nist:`2022-1184`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1462`, :cve_nist:`2022-1734`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1998`, :cve_nist:`2022-2078`, :cve_nist:`2022-2196`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-2503`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2873`, :cve_nist:`2022-2905`, :cve_nist:`2022-2959`, :cve_nist:`2022-3028`, :cve_nist:`2022-3078`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3115`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3629`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-39188`, :cve_nist:`2022-39190`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-41218`, :cve_nist:`2022-4139`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42703`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-4382`, :cve_nist:`2022-4662`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47929`, :cve_nist:`2023-0179`, :cve_nist:`2023-0394`, :cve_nist:`2023-0461`, :cve_nist:`2023-0590`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1382`, :cve_nist:`2023-1513`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1998`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2162`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-22999`, :cve_nist:`2023-23002`, :cve_nist:`2023-23004`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-25012`, :cve_nist:`2023-26545`, :cve_nist:`2023-28327` and :cve_nist:`2023-28328` |
22 | - nasm: Fix :cve:`2022-44370` | 22 | - nasm: Fix :cve_nist:`2022-44370` |
23 | - python3-cryptography: Fix :cve:`2023-23931` | 23 | - python3-cryptography: Fix :cve_nist:`2023-23931` |
24 | - qemu: Ignore :cve:`2023-0664` | 24 | - qemu: Ignore :cve_nist:`2023-0664` |
25 | - ruby: Fix :cve:`2023-28755` and :cve:`2023-28756` | 25 | - ruby: Fix :cve_nist:`2023-28755` and :cve_nist:`2023-28756` |
26 | - screen: Fix :cve:`2023-24626` | 26 | - screen: Fix :cve_nist:`2023-24626` |
27 | - shadow: Fix :cve:`2023-29383` | 27 | - shadow: Fix :cve_nist:`2023-29383` |
28 | - tiff: Fix :cve:`2022-4645` | 28 | - tiff: Fix :cve_nist:`2022-4645` |
29 | - webkitgtk: Fix :cve:`2022-32888` and :cve:`2022-32923` | 29 | - webkitgtk: Fix :cve_nist:`2022-32888` and :cve_nist:`2022-32923` |
30 | - xserver-xorg: Fix :cve:`2023-1393` | 30 | - xserver-xorg: Fix :cve_nist:`2023-1393` |
31 | 31 | ||
32 | 32 | ||
33 | Fixes in Yocto-4.0.10 | 33 | Fixes in Yocto-4.0.10 |
diff --git a/documentation/migration-guides/release-notes-4.0.11.rst b/documentation/migration-guides/release-notes-4.0.11.rst index 8a15884908..baef380586 100644 --- a/documentation/migration-guides/release-notes-4.0.11.rst +++ b/documentation/migration-guides/release-notes-4.0.11.rst | |||
@@ -6,18 +6,18 @@ Release notes for Yocto-4.0.11 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.11 | 6 | Security Fixes in Yocto-4.0.11 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - cups: Fix :cve:`2023-32324` | 9 | - cups: Fix :cve_nist:`2023-32324` |
10 | - curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` | 10 | - curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322` |
11 | - git: Ignore :cve:`2023-25815` | 11 | - git: Ignore :cve_nist:`2023-25815` |
12 | - go: Fix :cve:`2023-24539` and :cve:`2023-24540` | 12 | - go: Fix :cve_nist:`2023-24539` and :cve_nist:`2023-24540` |
13 | - nasm: Fix :cve:`2022-46457` | 13 | - nasm: Fix :cve_nist:`2022-46457` |
14 | - openssh: Fix :cve:`2023-28531` | 14 | - openssh: Fix :cve_nist:`2023-28531` |
15 | - openssl: Fix :cve:`2023-1255` and :cve:`2023-2650` | 15 | - openssl: Fix :cve_nist:`2023-1255` and :cve_nist:`2023-2650` |
16 | - perl: Fix :cve:`2023-31484` | 16 | - perl: Fix :cve_nist:`2023-31484` |
17 | - python3-requests: Fix for :cve:`2023-32681` | 17 | - python3-requests: Fix for :cve_nist:`2023-32681` |
18 | - sysstat: Fix :cve:`2023-33204` | 18 | - sysstat: Fix :cve_nist:`2023-33204` |
19 | - vim: Fix :cve:`2023-2426` | 19 | - vim: Fix :cve_nist:`2023-2426` |
20 | - webkitgtk: fix :cve:`2022-42867`, :cve:`2022-46691`, :cve:`2022-46699` and :cve:`2022-46700` | 20 | - webkitgtk: fix :cve_nist:`2022-42867`, :cve_nist:`2022-46691`, :cve_nist:`2022-46699` and :cve_nist:`2022-46700` |
21 | 21 | ||
22 | 22 | ||
23 | Fixes in Yocto-4.0.11 | 23 | Fixes in Yocto-4.0.11 |
diff --git a/documentation/migration-guides/release-notes-4.0.12.rst b/documentation/migration-guides/release-notes-4.0.12.rst index 0ea92a453d..ead33e1854 100644 --- a/documentation/migration-guides/release-notes-4.0.12.rst +++ b/documentation/migration-guides/release-notes-4.0.12.rst | |||
@@ -6,30 +6,30 @@ Release notes for Yocto-4.0.12 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.12 | 6 | Security Fixes in Yocto-4.0.12 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-2828` and :cve:`2023-2911` | 9 | - bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911` |
10 | - cups: Fix :cve:`2023-34241` | 10 | - cups: Fix :cve_nist:`2023-34241` |
11 | - curl: Added :cve:`2023-28320` Follow-up patch | 11 | - curl: Added :cve_nist:`2023-28320` Follow-up patch |
12 | - dbus: Fix :cve:`2023-34969` | 12 | - dbus: Fix :cve_nist:`2023-34969` |
13 | - dmidecode: fix :cve:`2023-30630` | 13 | - dmidecode: fix :cve_nist:`2023-30630` |
14 | - ghostscript: fix :cve:`2023-36664` | 14 | - ghostscript: fix :cve_nist:`2023-36664` |
15 | - go: fix :cve_mitre:`2023-24531`, :cve:`2023-24536`, :cve:`2023-29400`, :cve:`2023-29402`, :cve:`2023-29404`, :cve:`2023-29405` and :cve:`2023-29406` | 15 | - go: fix :cve_mitre:`2023-24531`, :cve_nist:`2023-24536`, :cve_nist:`2023-29400`, :cve_nist:`2023-29402`, :cve_nist:`2023-29404`, :cve_nist:`2023-29405` and :cve_nist:`2023-29406` |
16 | - libarchive: Ignore :cve:`2023-30571` | 16 | - libarchive: Ignore :cve_nist:`2023-30571` |
17 | - libcap: Fix :cve:`2023-2602` and :cve:`2023-2603` | 17 | - libcap: Fix :cve_nist:`2023-2602` and :cve_nist:`2023-2603` |
18 | - libjpeg-turbo: Fix :cve:`2023-2804` | 18 | - libjpeg-turbo: Fix :cve_nist:`2023-2804` |
19 | - libpcre2: Fix :cve:`2022-41409` | 19 | - libpcre2: Fix :cve_nist:`2022-41409` |
20 | - libtiff: fix :cve:`2023-26965` | 20 | - libtiff: fix :cve_nist:`2023-26965` |
21 | - libwebp: Fix :cve:`2023-1999` | 21 | - libwebp: Fix :cve_nist:`2023-1999` |
22 | - libx11: Fix :cve:`2023-3138` | 22 | - libx11: Fix :cve_nist:`2023-3138` |
23 | - libxpm: Fix :cve:`2022-44617` | 23 | - libxpm: Fix :cve_nist:`2022-44617` |
24 | - ninja: Ignore :cve:`2021-4336` | 24 | - ninja: Ignore :cve_nist:`2021-4336` |
25 | - openssh: Fix :cve:`2023-38408` | 25 | - openssh: Fix :cve_nist:`2023-38408` |
26 | - openssl: Fix :cve:`2023-2975`, :cve:`2023-3446` and :cve:`2023-3817` | 26 | - openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446` and :cve_nist:`2023-3817` |
27 | - perl: Fix :cve:`2023-31486` | 27 | - perl: Fix :cve_nist:`2023-31486` |
28 | - python3: Ignore :cve:`2023-36632` | 28 | - python3: Ignore :cve_nist:`2023-36632` |
29 | - qemu: Fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` | 29 | - qemu: Fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` |
30 | - sqlite3: Fix :cve:`2023-36191` | 30 | - sqlite3: Fix :cve_nist:`2023-36191` |
31 | - tiff: Fix :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-25433`, :cve:`2023-25434` and :cve:`2023-25435` | 31 | - tiff: Fix :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-25433`, :cve_nist:`2023-25434` and :cve_nist:`2023-25435` |
32 | - vim: :cve:`2023-2609` and :cve:`2023-2610` | 32 | - vim: :cve_nist:`2023-2609` and :cve_nist:`2023-2610` |
33 | 33 | ||
34 | 34 | ||
35 | Fixes in Yocto-4.0.12 | 35 | Fixes in Yocto-4.0.12 |
diff --git a/documentation/migration-guides/release-notes-4.0.13.rst b/documentation/migration-guides/release-notes-4.0.13.rst index 3c096c356f..641c9d1f05 100644 --- a/documentation/migration-guides/release-notes-4.0.13.rst +++ b/documentation/migration-guides/release-notes-4.0.13.rst | |||
@@ -6,43 +6,43 @@ Release notes for Yocto-4.0.13 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.13 | 6 | Security Fixes in Yocto-4.0.13 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-2829` | 9 | - bind: Fix :cve_nist:`2023-2829` |
10 | - binutils: Fix :cve:`2022-48065` | 10 | - binutils: Fix :cve_nist:`2022-48065` |
11 | - busybox: Fix :cve:`2022-48174` | 11 | - busybox: Fix :cve_nist:`2022-48174` |
12 | - cups: Fix :cve:`2023-32360` | 12 | - cups: Fix :cve_nist:`2023-32360` |
13 | - curl: Fix :cve:`2023-32001` | 13 | - curl: Fix :cve_nist:`2023-32001` |
14 | - dmidecode: Fix :cve:`2023-30630` | 14 | - dmidecode: Fix :cve_nist:`2023-30630` |
15 | - dropbear: Fix :cve:`2023-36328` | 15 | - dropbear: Fix :cve_nist:`2023-36328` |
16 | - ffmpeg: Ignored :cve:`2023-39018` | 16 | - ffmpeg: Ignored :cve_nist:`2023-39018` |
17 | - file: Fix :cve:`2022-48554` | 17 | - file: Fix :cve_nist:`2022-48554` |
18 | - flac: Fix :cve:`2020-22219` | 18 | - flac: Fix :cve_nist:`2020-22219` |
19 | - gcc: Fix :cve:`2023-4039` | 19 | - gcc: Fix :cve_nist:`2023-4039` |
20 | - gdb: Fix :cve:`2023-39128` | 20 | - gdb: Fix :cve_nist:`2023-39128` |
21 | - ghostscript: Fix :cve:`2023-38559` | 21 | - ghostscript: Fix :cve_nist:`2023-38559` |
22 | - glib-2.0: Fix :cve:`2023-29499`, :cve:`2023-32611`, :cve:`2023-32636`, :cve:`2023-32643` and :cve:`2023-32665` | 22 | - glib-2.0: Fix :cve_nist:`2023-29499`, :cve_nist:`2023-32611`, :cve_nist:`2023-32636`, :cve_nist:`2023-32643` and :cve_nist:`2023-32665` |
23 | - go: Fix :cve:`2023-29409` and :cve:`2023-39319` | 23 | - go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39319` |
24 | - gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329` | 24 | - gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329` |
25 | - gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328` | 25 | - gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328` |
26 | - gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327` | 26 | - gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327` |
27 | - inetutils: Fix :cve:`2023-40303` | 27 | - inetutils: Fix :cve_nist:`2023-40303` |
28 | - json-c: Fix :cve:`2021-32292` | 28 | - json-c: Fix :cve_nist:`2021-32292` |
29 | - librsvg: Fix :cve:`2023-38633` | 29 | - librsvg: Fix :cve_nist:`2023-38633` |
30 | - libssh2: Fix :cve:`2020-22218` | 30 | - libssh2: Fix :cve_nist:`2020-22218` |
31 | - libtiff: Fix :cve:`2023-26966` | 31 | - libtiff: Fix :cve_nist:`2023-26966` |
32 | - libxml2: Fix :cve:`2023-39615` | 32 | - libxml2: Fix :cve_nist:`2023-39615` |
33 | - linux-yocto/5.15: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965` and :cve:`2019-1999` | 33 | - linux-yocto/5.15: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965` and :cve_nist:`2019-1999` |
34 | - nasm: Fix :cve:`2020-21528` | 34 | - nasm: Fix :cve_nist:`2020-21528` |
35 | - ncurses: Fix :cve:`2023-29491` | 35 | - ncurses: Fix :cve_nist:`2023-29491` |
36 | - nghttp2: Fix :cve:`2023-35945` | 36 | - nghttp2: Fix :cve_nist:`2023-35945` |
37 | - procps: Fix :cve:`2023-4016` | 37 | - procps: Fix :cve_nist:`2023-4016` |
38 | - python3-certifi: Fix :cve:`2023-37920` | 38 | - python3-certifi: Fix :cve_nist:`2023-37920` |
39 | - python3-git: Fix :cve:`2022-24439` and :cve:`2023-40267` | 39 | - python3-git: Fix :cve_nist:`2022-24439` and :cve_nist:`2023-40267` |
40 | - python3-pygments: Fix :cve:`2022-40896` | 40 | - python3-pygments: Fix :cve_nist:`2022-40896` |
41 | - python3: Fix :cve:`2023-40217` | 41 | - python3: Fix :cve_nist:`2023-40217` |
42 | - qemu: Fix :cve:`2020-14394`, :cve:`2021-3638`, :cve_mitre:`2023-2861`, :cve:`2023-3180` and :cve:`2023-3354` | 42 | - qemu: Fix :cve_nist:`2020-14394`, :cve_nist:`2021-3638`, :cve_mitre:`2023-2861`, :cve_nist:`2023-3180` and :cve_nist:`2023-3354` |
43 | - tiff: fix :cve:`2023-2908`, :cve:`2023-3316` and :cve:`2023-3618` | 43 | - tiff: fix :cve_nist:`2023-2908`, :cve_nist:`2023-3316` and :cve_nist:`2023-3618` |
44 | - vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750` and :cve:`2023-4752` | 44 | - vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750` and :cve_nist:`2023-4752` |
45 | - webkitgtk: fix :cve:`2022-48503` and :cve:`2023-23529` | 45 | - webkitgtk: fix :cve_nist:`2022-48503` and :cve_nist:`2023-23529` |
46 | 46 | ||
47 | 47 | ||
48 | 48 | ||
diff --git a/documentation/migration-guides/release-notes-4.0.14.rst b/documentation/migration-guides/release-notes-4.0.14.rst index 02253f33f7..ad6590a887 100644 --- a/documentation/migration-guides/release-notes-4.0.14.rst +++ b/documentation/migration-guides/release-notes-4.0.14.rst | |||
@@ -6,37 +6,37 @@ Release notes for Yocto-4.0.14 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.14 | 6 | Security Fixes in Yocto-4.0.14 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-3341` and :cve:`2023-4236` | 9 | - bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236` |
10 | - binutils: Fix :cve:`2022-44840`, :cve:`2022-45703`, :cve:`2022-47008`, :cve:`2022-47011`, :cve:`2022-47673`, :cve:`2022-47695`, :cve:`2022-47696` and :cve:`2022-48063` | 10 | - binutils: Fix :cve_nist:`2022-44840`, :cve_nist:`2022-45703`, :cve_nist:`2022-47008`, :cve_nist:`2022-47011`, :cve_nist:`2022-47673`, :cve_nist:`2022-47695`, :cve_nist:`2022-47696` and :cve_nist:`2022-48063` |
11 | - cups: Fix :cve:`2023-4504` | 11 | - cups: Fix :cve_nist:`2023-4504` |
12 | - curl: Fix :cve:`2023-38545` and :cve:`2023-38546` | 12 | - curl: Fix :cve_nist:`2023-38545` and :cve_nist:`2023-38546` |
13 | - gawk: Fix :cve:`2023-4156` | 13 | - gawk: Fix :cve_nist:`2023-4156` |
14 | - ghostscript: Fix :cve:`2023-43115` | 14 | - ghostscript: Fix :cve_nist:`2023-43115` |
15 | - glibc: Fix :cve:`2023-4806`, :cve:`2023-4813`, :cve:`2023-4911` and :cve:`2023-5156` | 15 | - glibc: Fix :cve_nist:`2023-4806`, :cve_nist:`2023-4813`, :cve_nist:`2023-4911` and :cve_nist:`2023-5156` |
16 | - glibc: Ignore :cve:`2023-4527` | 16 | - glibc: Ignore :cve_nist:`2023-4527` |
17 | - go: Fix :cve:`2023-24538` and :cve:`2023-39318` | 17 | - go: Fix :cve_nist:`2023-24538` and :cve_nist:`2023-39318` |
18 | - gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` | 18 | - gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` |
19 | - libtiff: Fix :cve:`2022-40090` and :cve:`2023-1916` | 19 | - libtiff: Fix :cve_nist:`2022-40090` and :cve_nist:`2023-1916` |
20 | - libwebp: Fix :cve:`2023-5129` | 20 | - libwebp: Fix :cve_nist:`2023-5129` |
21 | - libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` | 21 | - libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787` |
22 | - libxml2: Fix :cve:`2023-45322` | 22 | - libxml2: Fix :cve_nist:`2023-45322` |
23 | - libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` | 23 | - libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789` |
24 | - linux-firmware: Fix :cve:`2022-40982`, :cve:`2023-20569` and :cve:`2023-20593` | 24 | - linux-firmware: Fix :cve_nist:`2022-40982`, :cve_nist:`2023-20569` and :cve_nist:`2023-20593` |
25 | - linux-yocto: update CVE exclusions | 25 | - linux-yocto: update CVE exclusions |
26 | - linux-yocto/5.10: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27418`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-3910`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45888`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-21264`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23005`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42755`, :cve:`2023-42756`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-44466`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-45862`, :cve:`2023-45871`, :cve:`2023-4611`, :cve:`2023-4623`, :cve:`2023-4732`, :cve:`2023-4921` and :cve:`2023-5345` | 26 | - linux-yocto/5.10: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27418`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-3910`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45888`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-21264`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23005`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42755`, :cve_nist:`2023-42756`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-44466`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-45862`, :cve_nist:`2023-45871`, :cve_nist:`2023-4611`, :cve_nist:`2023-4623`, :cve_nist:`2023-4732`, :cve_nist:`2023-4921` and :cve_nist:`2023-5345` |
27 | - linux-yocto/5.15: Ignore :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-48502`, :cve:`2023-0160`, :cve:`2023-1206`, :cve:`2023-20593`, :cve:`2023-21264`, :cve:`2023-2898`, :cve:`2023-31248`, :cve:`2023-33250`, :cve:`2023-34319`, :cve:`2023-35001`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4194`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459` and :cve:`2023-4611` | 27 | - linux-yocto/5.15: Ignore :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-48502`, :cve_nist:`2023-0160`, :cve_nist:`2023-1206`, :cve_nist:`2023-20593`, :cve_nist:`2023-21264`, :cve_nist:`2023-2898`, :cve_nist:`2023-31248`, :cve_nist:`2023-33250`, :cve_nist:`2023-34319`, :cve_nist:`2023-35001`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4194`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459` and :cve_nist:`2023-4611` |
28 | - openssl: Fix :cve:`2023-4807` and :cve:`2023-5363` | 28 | - openssl: Fix :cve_nist:`2023-4807` and :cve_nist:`2023-5363` |
29 | - python3-git: Fix :cve:`2023-40590` and :cve:`2023-41040` | 29 | - python3-git: Fix :cve_nist:`2023-40590` and :cve_nist:`2023-41040` |
30 | - python3-urllib3: Fix :cve:`2023-43804` | 30 | - python3-urllib3: Fix :cve_nist:`2023-43804` |
31 | - qemu: Ignore :cve:`2023-2680` | 31 | - qemu: Ignore :cve_nist:`2023-2680` |
32 | - ruby: Fix :cve:`2023-36617` | 32 | - ruby: Fix :cve_nist:`2023-36617` |
33 | - shadow: Fix :cve_mitre:`2023-4641` | 33 | - shadow: Fix :cve_mitre:`2023-4641` |
34 | - tiff: Fix :cve:`2023-3576` and :cve:`2023-40745` | 34 | - tiff: Fix :cve_nist:`2023-3576` and :cve_nist:`2023-40745` |
35 | - vim: Fix :cve:`2023-5441` and :cve:`2023-5535` | 35 | - vim: Fix :cve_nist:`2023-5441` and :cve_nist:`2023-5535` |
36 | - webkitgtk: Fix :cve:`2023-32439` | 36 | - webkitgtk: Fix :cve_nist:`2023-32439` |
37 | - xdg-utils: Fix :cve:`2022-4055` | 37 | - xdg-utils: Fix :cve_nist:`2022-4055` |
38 | - xserver-xorg: ignore :cve:`2022-3553` (XQuartz-specific) | 38 | - xserver-xorg: ignore :cve_nist:`2022-3553` (XQuartz-specific) |
39 | - zlib: Fix :cve:`2023-45853` | 39 | - zlib: Fix :cve_nist:`2023-45853` |
40 | 40 | ||
41 | 41 | ||
42 | 42 | ||
diff --git a/documentation/migration-guides/release-notes-4.0.15.rst b/documentation/migration-guides/release-notes-4.0.15.rst index b2731530e8..e05cd6f143 100644 --- a/documentation/migration-guides/release-notes-4.0.15.rst +++ b/documentation/migration-guides/release-notes-4.0.15.rst | |||
@@ -6,24 +6,24 @@ Release notes for Yocto-4.0.15 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.15 | 6 | Security Fixes in Yocto-4.0.15 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` | 9 | - avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473` |
10 | - binutils: Fix :cve:`2022-47007`, :cve:`2022-47010` and :cve:`2022-48064` | 10 | - binutils: Fix :cve_nist:`2022-47007`, :cve_nist:`2022-47010` and :cve_nist:`2022-48064` |
11 | - bluez5: Fix :cve:`2023-45866` | 11 | - bluez5: Fix :cve_nist:`2023-45866` |
12 | - ghostscript: Ignore GhostPCL :cve:`2023-38560` | 12 | - ghostscript: Ignore GhostPCL :cve_nist:`2023-38560` |
13 | - gnutls: Fix :cve:`2023-5981` | 13 | - gnutls: Fix :cve_nist:`2023-5981` |
14 | - go: Ignore :cve:`2023-45283` and :cve:`2023-45284` | 14 | - go: Ignore :cve_nist:`2023-45283` and :cve_nist:`2023-45284` |
15 | - grub: Fix :cve:`2023-4692` and :cve:`2023-4693` | 15 | - grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693` |
16 | - gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429` | 16 | - gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429` |
17 | - libsndfile: Fix :cve:`2022-33065` | 17 | - libsndfile: Fix :cve_nist:`2022-33065` |
18 | - libwebp: Fix :cve:`2023-4863` | 18 | - libwebp: Fix :cve_nist:`2023-4863` |
19 | - openssl: Fix :cve:`2023-5678` | 19 | - openssl: Fix :cve_nist:`2023-5678` |
20 | - python3-cryptography: Fix :cve:`2023-49083` | 20 | - python3-cryptography: Fix :cve_nist:`2023-49083` |
21 | - qemu: Fix :cve:`2023-1544` | 21 | - qemu: Fix :cve_nist:`2023-1544` |
22 | - sudo: :cve:`2023-42456` and :cve_mitre:`2023-42465` | 22 | - sudo: :cve_nist:`2023-42456` and :cve_mitre:`2023-42465` |
23 | - tiff: Fix :cve:`2023-41175` | 23 | - tiff: Fix :cve_nist:`2023-41175` |
24 | - vim: Fix :cve:`2023-46246`, :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236`, :cve:`2023-48237` and :cve:`2023-48706` | 24 | - vim: Fix :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237` and :cve_nist:`2023-48706` |
25 | - xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` | 25 | - xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380` |
26 | - xwayland: Fix :cve:`2023-5367` | 26 | - xwayland: Fix :cve_nist:`2023-5367` |
27 | 27 | ||
28 | 28 | ||
29 | Fixes in Yocto-4.0.15 | 29 | Fixes in Yocto-4.0.15 |
diff --git a/documentation/migration-guides/release-notes-4.0.16.rst b/documentation/migration-guides/release-notes-4.0.16.rst index 0eb31832ab..dea5b4c2bf 100644 --- a/documentation/migration-guides/release-notes-4.0.16.rst +++ b/documentation/migration-guides/release-notes-4.0.16.rst | |||
@@ -8,22 +8,22 @@ Security Fixes in Yocto-4.0.16 | |||
8 | 8 | ||
9 | - cpio: Fix :cve_mitre:`2023-7207` | 9 | - cpio: Fix :cve_mitre:`2023-7207` |
10 | - curl: Revert "curl: Backport fix CVE-2023-32001" | 10 | - curl: Revert "curl: Backport fix CVE-2023-32001" |
11 | - curl: Fix :cve:`2023-46218` | 11 | - curl: Fix :cve_nist:`2023-46218` |
12 | - dropbear:Fix :cve:`2023-48795` | 12 | - dropbear:Fix :cve_nist:`2023-48795` |
13 | - ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` | 13 | - ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965` |
14 | - ghostscript: Fix :cve:`2023-46751` | 14 | - ghostscript: Fix :cve_nist:`2023-46751` |
15 | - gnutls: Fix :cve:`2024-0553` and :cve:`2024-0567` | 15 | - gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567` |
16 | - go: Fix :cve:`2023-39326` | 16 | - go: Fix :cve_nist:`2023-39326` |
17 | - openssh: Fix :cve:`2023-48795`, :cve:`2023-51384` and :cve:`2023-51385` | 17 | - openssh: Fix :cve_nist:`2023-48795`, :cve_nist:`2023-51384` and :cve_nist:`2023-51385` |
18 | - openssl: Fix :cve:`2023-6129` and :cve_mitre:`2023-6237` | 18 | - openssl: Fix :cve_nist:`2023-6129` and :cve_mitre:`2023-6237` |
19 | - pam: Fix :cve_mitre:`2024-22365` | 19 | - pam: Fix :cve_mitre:`2024-22365` |
20 | - perl: Fix :cve:`2023-47038` | 20 | - perl: Fix :cve_nist:`2023-47038` |
21 | - qemu: Fix :cve:`2023-5088` | 21 | - qemu: Fix :cve_nist:`2023-5088` |
22 | - sqlite3: Fix :cve:`2023-7104` | 22 | - sqlite3: Fix :cve_nist:`2023-7104` |
23 | - systemd: Fix :cve:`2023-7008` | 23 | - systemd: Fix :cve_nist:`2023-7008` |
24 | - tiff: Fix :cve:`2023-6228` | 24 | - tiff: Fix :cve_nist:`2023-6228` |
25 | - xserver-xorg: Fix :cve:`2023-6377`, :cve:`2023-6478`, :cve:`2023-6816`, :cve_mitre:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886` | 25 | - xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_mitre:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886` |
26 | - zlib: Ignore :cve:`2023-6992` | 26 | - zlib: Ignore :cve_nist:`2023-6992` |
27 | 27 | ||
28 | 28 | ||
29 | Fixes in Yocto-4.0.16 | 29 | Fixes in Yocto-4.0.16 |
diff --git a/documentation/migration-guides/release-notes-4.0.17.rst b/documentation/migration-guides/release-notes-4.0.17.rst index 07242584b8..e917dc9bf8 100644 --- a/documentation/migration-guides/release-notes-4.0.17.rst +++ b/documentation/migration-guides/release-notes-4.0.17.rst | |||
@@ -6,27 +6,27 @@ Release notes for Yocto-4.0.17 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.17 | 6 | Security Fixes in Yocto-4.0.17 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679`, :cve:`2023-50868` and :cve:`2023-50387` | 9 | - bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50868` and :cve_nist:`2023-50387` |
10 | - binutils: Fix :cve:`2023-39129` and :cve:`2023-39130` | 10 | - binutils: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130` |
11 | - curl: Fix :cve:`2023-46219` | 11 | - curl: Fix :cve_nist:`2023-46219` |
12 | - curl: Ignore :cve:`2023-42915` | 12 | - curl: Ignore :cve_nist:`2023-42915` |
13 | - gcc: Ignore :cve:`2023-4039` | 13 | - gcc: Ignore :cve_nist:`2023-4039` |
14 | - gdb: Fix :cve:`2023-39129` and :cve:`2023-39130` | 14 | - gdb: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130` |
15 | - glibc: Ignore :cve:`2023-0687` | 15 | - glibc: Ignore :cve_nist:`2023-0687` |
16 | - go: Fix :cve:`2023-29406`, :cve:`2023-45285`, :cve:`2023-45287`, :cve:`2023-45289`, :cve:`2023-45290`, :cve:`2024-24784` and :cve:`2024-24785` | 16 | - go: Fix :cve_nist:`2023-29406`, :cve_nist:`2023-45285`, :cve_nist:`2023-45287`, :cve_nist:`2023-45289`, :cve_nist:`2023-45290`, :cve_nist:`2024-24784` and :cve_nist:`2024-24785` |
17 | - less: Fix :cve:`2022-48624` | 17 | - less: Fix :cve_nist:`2022-48624` |
18 | - libgit2: Fix :cve:`2024-24575` and :cve:`2024-24577` | 18 | - libgit2: Fix :cve_nist:`2024-24575` and :cve_nist:`2024-24577` |
19 | - libuv: fix :cve:`2024-24806` | 19 | - libuv: fix :cve_nist:`2024-24806` |
20 | - libxml2: Fix for :cve:`2024-25062` | 20 | - libxml2: Fix for :cve_nist:`2024-25062` |
21 | - linux-yocto/5.15: Fix :cve:`2022-36402`, :cve:`2022-40982`, :cve:`2022-47940`, :cve:`2023-1193`, :cve:`2023-1194`, :cve:`2023-3772`, :cve_mitre:`2023-3867`, :cve:`2023-4128`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4244`, :cve:`2023-4273`, :cve:`2023-4563`, :cve:`2023-4569`, :cve:`2023-4623`, :cve:`2023-4881`, :cve:`2023-4921`, :cve:`2023-5158`, :cve:`2023-5717`, :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6176`, :cve:`2023-6546`, :cve:`2023-6606`, :cve:`2023-6622`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-25775`, :cve:`2023-31085`, :cve:`2023-32247`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-34324`, :cve:`2023-35827`, :cve:`2023-38427`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-39198`, :cve:`2023-40283`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42754`, :cve:`2023-42755`, :cve:`2023-45871`, :cve:`2023-46343`, :cve:`2023-46813`, :cve:`2023-46838`, :cve:`2023-46862`, :cve:`2023-51042`, :cve:`2023-51779`, :cve_mitre:`2023-52340`, :cve:`2023-52429`, :cve:`2023-52435`, :cve:`2023-52436`, :cve:`2023-52438`, :cve:`2023-52439`, :cve:`2023-52441`, :cve:`2023-52442`, :cve:`2023-52443`, :cve:`2023-52444`, :cve:`2023-52445`, :cve:`2023-52448`, :cve:`2023-52449`, :cve:`2023-52451`, :cve:`2023-52454`, :cve:`2023-52456`, :cve:`2023-52457`, :cve:`2023-52458`, :cve:`2023-52463`, :cve:`2023-52464`, :cve:`2024-0340`, :cve:`2024-0584`, :cve:`2024-0607`, :cve:`2024-0641`, :cve:`2024-0646`, :cve:`2024-1085`, :cve:`2024-1086`, :cve:`2024-1151`, :cve:`2024-22705`, :cve:`2024-23849`, :cve:`2024-23850`, :cve:`2024-23851`, :cve:`2024-24860`, :cve:`2024-26586`, :cve:`2024-26589`, :cve:`2024-26591`, :cve:`2024-26592`, :cve:`2024-26593`, :cve:`2024-26594`, :cve:`2024-26597` and :cve:`2024-26598` | 21 | - linux-yocto/5.15: Fix :cve_nist:`2022-36402`, :cve_nist:`2022-40982`, :cve_nist:`2022-47940`, :cve_nist:`2023-1193`, :cve_nist:`2023-1194`, :cve_nist:`2023-3772`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4128`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4244`, :cve_nist:`2023-4273`, :cve_nist:`2023-4563`, :cve_nist:`2023-4569`, :cve_nist:`2023-4623`, :cve_nist:`2023-4881`, :cve_nist:`2023-4921`, :cve_nist:`2023-5158`, :cve_nist:`2023-5717`, :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6176`, :cve_nist:`2023-6546`, :cve_nist:`2023-6606`, :cve_nist:`2023-6622`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-25775`, :cve_nist:`2023-31085`, :cve_nist:`2023-32247`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-34324`, :cve_nist:`2023-35827`, :cve_nist:`2023-38427`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-39198`, :cve_nist:`2023-40283`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42754`, :cve_nist:`2023-42755`, :cve_nist:`2023-45871`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46838`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51779`, :cve_mitre:`2023-52340`, :cve_nist:`2023-52429`, :cve_nist:`2023-52435`, :cve_nist:`2023-52436`, :cve_nist:`2023-52438`, :cve_nist:`2023-52439`, :cve_nist:`2023-52441`, :cve_nist:`2023-52442`, :cve_nist:`2023-52443`, :cve_nist:`2023-52444`, :cve_nist:`2023-52445`, :cve_nist:`2023-52448`, :cve_nist:`2023-52449`, :cve_nist:`2023-52451`, :cve_nist:`2023-52454`, :cve_nist:`2023-52456`, :cve_nist:`2023-52457`, :cve_nist:`2023-52458`, :cve_nist:`2023-52463`, :cve_nist:`2023-52464`, :cve_nist:`2024-0340`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086`, :cve_nist:`2024-1151`, :cve_nist:`2024-22705`, :cve_nist:`2024-23849`, :cve_nist:`2024-23850`, :cve_nist:`2024-23851`, :cve_nist:`2024-24860`, :cve_nist:`2024-26586`, :cve_nist:`2024-26589`, :cve_nist:`2024-26591`, :cve_nist:`2024-26592`, :cve_nist:`2024-26593`, :cve_nist:`2024-26594`, :cve_nist:`2024-26597` and :cve_nist:`2024-26598` |
22 | - linux-yocto/5.15: Ignore :cve:`2020-27418`, :cve:`2020-36766`, :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-4610`, :cve:`2023-4732`, :cve:`2023-5090`, :cve:`2023-5178`, :cve:`2023-5197`, :cve:`2023-5345`, :cve:`2023-5633`, :cve:`2023-5972`, :cve:`2023-6111`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2023-40791`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45898`, :cve:`2023-51043`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve:`2023-52433`, :cve:`2023-52440`, :cve:`2023-52446`, :cve:`2023-52450`, :cve:`2023-52453`, :cve:`2023-52455`, :cve:`2023-52459`, :cve:`2023-52460`, :cve:`2023-52461`, :cve:`2023-52462`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0775`, :cve:`2024-26581`, :cve:`2024-26582`, :cve:`2024-26590`, :cve:`2024-26596` and :cve:`2024-26599` | 22 | - linux-yocto/5.15: Ignore :cve_nist:`2020-27418`, :cve_nist:`2020-36766`, :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-4732`, :cve_nist:`2023-5090`, :cve_nist:`2023-5178`, :cve_nist:`2023-5197`, :cve_nist:`2023-5345`, :cve_nist:`2023-5633`, :cve_nist:`2023-5972`, :cve_nist:`2023-6111`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-40791`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45898`, :cve_nist:`2023-51043`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_nist:`2023-52433`, :cve_nist:`2023-52440`, :cve_nist:`2023-52446`, :cve_nist:`2023-52450`, :cve_nist:`2023-52453`, :cve_nist:`2023-52455`, :cve_nist:`2023-52459`, :cve_nist:`2023-52460`, :cve_nist:`2023-52461`, :cve_nist:`2023-52462`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0775`, :cve_nist:`2024-26581`, :cve_nist:`2024-26582`, :cve_nist:`2024-26590`, :cve_nist:`2024-26596` and :cve_nist:`2024-26599` |
23 | - linux-yocto/5.10: Fix :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6606`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-39198`, :cve:`2023-46838`, :cve:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve_mitre:`2023-52340`, :cve:`2024-0584` and :cve:`2024-0646` | 23 | - linux-yocto/5.10: Fix :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6606`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-39198`, :cve_nist:`2023-46838`, :cve_nist:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0584` and :cve_nist:`2024-0646` |
24 | - linux-yocto/5.10: Ignore :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-1508`, :cve:`2022-36402`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-4610`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2023-46343`, :cve:`2023-51042`, :cve:`2023-51043`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0641`, :cve:`2024-0775`, :cve:`2024-1085` and :cve:`2024-22705` | 24 | - linux-yocto/5.10: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-1508`, :cve_nist:`2022-36402`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-46343`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0775`, :cve_nist:`2024-1085` and :cve_nist:`2024-22705` |
25 | - openssl: Fix :cve:`2024-0727` | 25 | - openssl: Fix :cve_nist:`2024-0727` |
26 | - python3-pycryptodome: Fix :cve:`2023-52323` | 26 | - python3-pycryptodome: Fix :cve_nist:`2023-52323` |
27 | - qemu: Fix :cve:`2023-6693`, :cve:`2023-42467` and :cve:`2024-24474` | 27 | - qemu: Fix :cve_nist:`2023-6693`, :cve_nist:`2023-42467` and :cve_nist:`2024-24474` |
28 | - vim: Fix :cve:`2024-22667` | 28 | - vim: Fix :cve_nist:`2024-22667` |
29 | - xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` | 29 | - xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478` |
30 | 30 | ||
31 | 31 | ||
32 | Fixes in Yocto-4.0.17 | 32 | Fixes in Yocto-4.0.17 |
diff --git a/documentation/migration-guides/release-notes-4.0.18.rst b/documentation/migration-guides/release-notes-4.0.18.rst index fc8cd83c02..890148b5d6 100644 --- a/documentation/migration-guides/release-notes-4.0.18.rst +++ b/documentation/migration-guides/release-notes-4.0.18.rst | |||
@@ -6,22 +6,22 @@ Release notes for Yocto-4.0.18 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.18 | 6 | Security Fixes in Yocto-4.0.18 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - curl: Fix :cve:`2024-2398` | 9 | - curl: Fix :cve_nist:`2024-2398` |
10 | - expat: fix :cve:`2023-52426` and :cve:`2024-28757` | 10 | - expat: fix :cve_nist:`2023-52426` and :cve_nist:`2024-28757` |
11 | - libssh2: fix :cve:`2023-48795` | 11 | - libssh2: fix :cve_nist:`2023-48795` |
12 | - ncurses: Fix :cve:`2023-50495` | 12 | - ncurses: Fix :cve_nist:`2023-50495` |
13 | - nghttp2: Fix :cve:`2024-28182` and :cve:`2023-44487` | 13 | - nghttp2: Fix :cve_nist:`2024-28182` and :cve_nist:`2023-44487` |
14 | - openssh: Ignore :cve:`2023-51767` | 14 | - openssh: Ignore :cve_nist:`2023-51767` |
15 | - openssl: Fix :cve:`2024-2511` | 15 | - openssl: Fix :cve_nist:`2024-2511` |
16 | - perl: Ignore :cve:`2023-47100` | 16 | - perl: Ignore :cve_nist:`2023-47100` |
17 | - python3-cryptography: Fix :cve:`2024-26130` | 17 | - python3-cryptography: Fix :cve_nist:`2024-26130` |
18 | - python3-urllib3: Fix :cve:`2023-45803` | 18 | - python3-urllib3: Fix :cve_nist:`2023-45803` |
19 | - qemu: Fix :cve:`2023-6683` | 19 | - qemu: Fix :cve_nist:`2023-6683` |
20 | - ruby: fix :cve_mitre:`2024-27281` | 20 | - ruby: fix :cve_mitre:`2024-27281` |
21 | - rust: Ignore :cve:`2024-24576` | 21 | - rust: Ignore :cve_nist:`2024-24576` |
22 | - tiff: Fix :cve:`2023-52356` and :cve:`2023-6277` | 22 | - tiff: Fix :cve_nist:`2023-52356` and :cve_nist:`2023-6277` |
23 | - xserver-xorg: Fix :cve:`2024-31080` and :cve:`2024-31081` | 23 | - xserver-xorg: Fix :cve_nist:`2024-31080` and :cve_nist:`2024-31081` |
24 | - xwayland: Fix :cve:`2023-6816`, :cve:`2024-0408` and :cve:`2024-0409` | 24 | - xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409` |
25 | 25 | ||
26 | 26 | ||
27 | Fixes in Yocto-4.0.18 | 27 | Fixes in Yocto-4.0.18 |
@@ -31,7 +31,7 @@ Fixes in Yocto-4.0.18 | |||
31 | - common-licenses: Backport missing license | 31 | - common-licenses: Backport missing license |
32 | - contributor-guide: add notes for tests | 32 | - contributor-guide: add notes for tests |
33 | - contributor-guide: be more specific about meta-* trees | 33 | - contributor-guide: be more specific about meta-* trees |
34 | - cups: fix typo in :cve:`2023-32360` backport patch | 34 | - cups: fix typo in :cve_nist:`2023-32360` backport patch |
35 | - cve-update-nvd2-native: Add an age threshold for incremental update | 35 | - cve-update-nvd2-native: Add an age threshold for incremental update |
36 | - cve-update-nvd2-native: Fix CVE configuration update | 36 | - cve-update-nvd2-native: Fix CVE configuration update |
37 | - cve-update-nvd2-native: Fix typo in comment | 37 | - cve-update-nvd2-native: Fix typo in comment |
diff --git a/documentation/migration-guides/release-notes-4.0.19.rst b/documentation/migration-guides/release-notes-4.0.19.rst index 5dcc977252..e363f05d7d 100644 --- a/documentation/migration-guides/release-notes-4.0.19.rst +++ b/documentation/migration-guides/release-notes-4.0.19.rst | |||
@@ -6,30 +6,30 @@ Release notes for Yocto-4.0.19 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.19 | 6 | Security Fixes in Yocto-4.0.19 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bluez5: Fix :cve:`2023-27349`, :cve:`2023-50229` and :cve:`2023-50230` | 9 | - bluez5: Fix :cve_nist:`2023-27349`, :cve_nist:`2023-50229` and :cve_nist:`2023-50230` |
10 | - ghostscript: Fix :cve:`2023-52722`, :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` | 10 | - ghostscript: Fix :cve_nist:`2023-52722`, :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` |
11 | - git: Fix :cve:`2024-32002`, :cve:`2024-32004`, :cve:`2024-32020`, :cve:`2024-32021` and :cve:`2024-32465` | 11 | - git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465` |
12 | - glibc: Fix :cve:`2024-2961`, :cve:`2024-33599`, :cve:`2024-33600`, :cve:`2024-33601` and :cve:`2024-33602` | 12 | - glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602` |
13 | - gnutls: Fix :cve:`2024-28834` and :cve:`2024-28835` | 13 | - gnutls: Fix :cve_nist:`2024-28834` and :cve_nist:`2024-28835` |
14 | - go: Fix :cve:`2023-45288` | 14 | - go: Fix :cve_nist:`2023-45288` |
15 | - gstreamer1.0-plugins-bad: Fix :cve:`2023-44446`, :cve:`2023-50186` and :cve_mitre:`2024-0444` | 15 | - gstreamer1.0-plugins-bad: Fix :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_mitre:`2024-0444` |
16 | - less: Fix :cve:`2024-32487` | 16 | - less: Fix :cve_nist:`2024-32487` |
17 | - libarchive: Fix :cve:`2024-26256` | 17 | - libarchive: Fix :cve_nist:`2024-26256` |
18 | - libarchive: Fix multiple null deference and heap overflow in pax writer (no CVE assigned) | 18 | - libarchive: Fix multiple null deference and heap overflow in pax writer (no CVE assigned) |
19 | - linux-yocto/5.15: Fix :cve:`2023-6270`, :cve:`2023-7042`, :cve:`2023-52447`, :cve:`2023-52620`, :cve:`2024-22099`, :cve:`2024-26622`, :cve:`2024-26651`, :cve:`2024-26659`, :cve:`2024-26688`, :cve:`2024-26782`, :cve:`2024-26787`, :cve:`2024-26788`, :cve:`2024-26790`, :cve:`2024-26791`, :cve:`2024-26793`, :cve:`2024-26795`, :cve:`2024-26798`, :cve:`2024-26801`, :cve:`2024-26802`, :cve:`2024-26803`, :cve:`2024-26804`, :cve:`2024-26805` and :cve:`2024-26809` | 19 | - linux-yocto/5.15: Fix :cve_nist:`2023-6270`, :cve_nist:`2023-7042`, :cve_nist:`2023-52447`, :cve_nist:`2023-52620`, :cve_nist:`2024-22099`, :cve_nist:`2024-26622`, :cve_nist:`2024-26651`, :cve_nist:`2024-26659`, :cve_nist:`2024-26688`, :cve_nist:`2024-26782`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26793`, :cve_nist:`2024-26795`, :cve_nist:`2024-26798`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805` and :cve_nist:`2024-26809` |
20 | - linux-yocto/5.15: Ignore :cve:`2019-25160`, :cve:`2019-25162`, :cve:`2020-36775`, :cve:`2020-36776`, :cve:`2020-36777`, :cve:`2020-36778`, :cve:`2020-36779`, :cve:`2020-36780`, :cve:`2020-36781`, :cve:`2020-36782`, :cve:`2020-36783`, :cve:`2020-36784`, :cve:`2020-36785`, :cve:`2020-36786`, :cve:`2020-36787`, :cve:`2021-46904`, :cve:`2021-46905`, :cve:`2021-46906`, :cve:`2021-46908`, :cve:`2021-46909`, :cve:`2021-46910`, :cve:`2021-46911`, :cve:`2021-46912`, :cve:`2021-46913`, :cve:`2021-46914`, :cve:`2021-46915`, :cve:`2021-46916`, :cve:`2021-46917`, :cve:`2021-46918`, :cve:`2021-46919`, :cve:`2021-46920`, :cve:`2021-46921`, :cve:`2021-46922`, :cve:`2021-46923`, :cve:`2021-46924`, :cve:`2021-46925`, :cve:`2021-46926`, :cve:`2021-46927`, :cve:`2021-46928`, :cve:`2021-46929`, :cve:`2021-46930`, :cve:`2021-46931`, :cve:`2021-46932`, :cve:`2021-46933`, :cve:`2021-46934`, :cve:`2021-46935`, :cve:`2021-46936`, :cve:`2021-46937`, :cve:`2021-46938`, :cve:`2021-46939`, :cve:`2021-46940`, :cve:`2021-46941`, :cve:`2021-46942`, :cve:`2021-46943`, :cve:`2021-46944`, :cve:`2021-46945`, :cve:`2021-46947`, :cve:`2021-46948`, :cve:`2021-46949`, :cve:`2021-46950`, :cve:`2021-46951`, :cve:`2021-46952`, :cve:`2021-46953`, :cve:`2021-46954`, :cve:`2021-46955`, :cve:`2021-46956`, :cve:`2021-46957`, :cve:`2021-46958`, :cve:`2021-46959`, :cve:`2021-46960`, :cve:`2021-46961`, :cve:`2021-46962`, :cve:`2021-46963`, :cve:`2021-46964`, :cve:`2021-46965`, :cve:`2021-46966`, :cve:`2021-46967`, :cve:`2021-46968`, :cve:`2021-46969`, :cve:`2021-46970`, :cve:`2021-46971`, :cve:`2021-46972`, :cve:`2021-46973`, :cve:`2021-46974`, :cve:`2021-46976`, :cve:`2021-46977`, :cve:`2021-46978`, :cve:`2021-46979`, :cve:`2021-46980`, :cve:`2021-46981`, :cve:`2021-46982`, :cve:`2021-46983`, :cve:`2021-46984`, :cve:`2021-46985`, :cve:`2021-46986`, :cve:`2021-46987`, :cve:`2021-46988`, :cve:`2021-46989`, :cve:`2021-46990`, :cve:`2021-46991`, :cve:`2021-46992`, :cve:`2021-46993`, :cve:`2021-46994`, :cve:`2021-46995`, :cve:`2021-46996`, :cve:`2021-46997`, :cve:`2021-46998`, :cve:`2021-46999`, :cve:`2021-47000`, :cve:`2021-47001`, :cve:`2021-47002`, :cve:`2021-47003`, :cve:`2021-47004`, :cve:`2021-47005`, :cve:`2021-47006`, :cve:`2021-47007`, :cve:`2021-47008`, :cve:`2021-47009`, :cve:`2021-47010`, :cve:`2021-47011`, :cve:`2021-47012`, :cve:`2021-47013`, :cve:`2021-47014`, :cve:`2021-47015`, :cve:`2021-47016`, :cve:`2021-47017`, :cve:`2021-47018`, :cve:`2021-47019`, :cve:`2021-47020`, :cve:`2021-47021`, :cve:`2021-47022`, :cve:`2021-47023`, :cve:`2021-47024`, :cve:`2021-47025`, :cve:`2021-47026`, :cve:`2021-47027`, :cve:`2021-47028`, :cve:`2021-47029`, :cve:`2021-47030`, :cve:`2021-47031`, :cve:`2021-47032`, :cve:`2021-47033`, :cve:`2021-47034`, :cve:`2021-47035`, :cve:`2021-47036`, :cve:`2021-47037`, :cve:`2021-47038`, :cve:`2021-47039`, :cve:`2021-47040`, :cve:`2021-47041`, :cve:`2021-47042`, :cve:`2021-47043`, :cve:`2021-47044`, :cve:`2021-47045`, :cve:`2021-47046`, :cve:`2021-47047`, :cve:`2021-47048`, :cve:`2021-47049`, :cve:`2021-47050`, :cve:`2021-47051`, :cve:`2021-47052`, :cve:`2021-47053`, :cve:`2021-47054`, :cve:`2021-47055`, :cve:`2021-47056`, :cve:`2021-47057`, :cve:`2021-47058`, :cve:`2021-47059`, :cve:`2021-47060`, :cve:`2021-47061`, :cve:`2021-47062`, :cve:`2021-47063`, :cve:`2021-47064`, :cve:`2021-47065`, :cve:`2021-47066`, :cve:`2021-47067`, :cve:`2021-47068`, :cve:`2021-47069`, :cve:`2021-47070`, :cve:`2021-47071`, :cve:`2021-47072`, :cve:`2021-47073`, :cve:`2021-47074`, :cve:`2021-47075`, :cve:`2021-47076`, :cve:`2021-47077`, :cve:`2021-47078`, :cve:`2021-47079`, :cve:`2021-47080`, :cve:`2021-47081`, :cve:`2021-47082`, :cve:`2021-47083`, :cve:`2021-47086`, :cve:`2021-47087`, :cve:`2021-47088`, :cve:`2021-47089`, :cve:`2021-47090`, :cve:`2021-47091`, :cve:`2021-47092`, :cve:`2021-47093`, :cve:`2021-47094`, :cve:`2021-47095`, :cve:`2021-47096`, :cve:`2021-47097`, :cve:`2021-47098`, :cve:`2021-47099`, :cve:`2021-47100`, :cve:`2021-47101`, :cve:`2021-47102`, :cve:`2021-47103`, :cve:`2021-47104`, :cve:`2021-47105`, :cve:`2021-47106`, :cve:`2021-47107`, :cve:`2021-47108`, :cve:`2021-47109`, :cve:`2021-47110`, :cve:`2021-47111`, :cve:`2021-47112`, :cve:`2021-47113`, :cve:`2021-47114`, :cve:`2021-47116`, :cve:`2021-47117`, :cve:`2021-47118`, :cve:`2021-47119`, :cve:`2021-47120`, :cve:`2021-47121`, :cve:`2021-47122`, :cve:`2021-47123`, :cve:`2021-47124`, :cve:`2021-47125`, :cve:`2021-47126`, :cve:`2021-47127`, :cve:`2021-47128`, :cve:`2021-47129`, :cve:`2021-47130`, :cve:`2021-47131`, :cve:`2021-47132`, :cve:`2021-47133`, :cve:`2021-47134`, :cve:`2021-47135`, :cve:`2021-47136`, :cve:`2021-47137`, :cve:`2021-47138`, :cve:`2021-47139`, :cve:`2021-47140`, :cve:`2021-47141`, :cve:`2021-47142`, :cve:`2021-47143`, :cve:`2021-47144`, :cve:`2021-47145`, :cve:`2021-47146`, :cve:`2021-47147`, :cve:`2021-47148`, :cve:`2021-47149`, :cve:`2021-47150`, :cve:`2021-47151`, :cve:`2021-47152`, :cve:`2021-47153`, :cve:`2021-47158`, :cve:`2021-47159`, :cve:`2021-47160`, :cve:`2021-47161`, :cve:`2021-47162`, :cve:`2021-47163`, :cve:`2021-47164`, :cve:`2021-47165`, :cve:`2021-47166`, :cve:`2021-47167`, :cve:`2021-47168`, :cve:`2021-47169`, :cve:`2021-47170`, :cve:`2021-47171`, :cve:`2021-47172`, :cve:`2021-47173`, :cve:`2021-47174`, :cve:`2021-47175`, :cve:`2021-47176`, :cve:`2021-47177`, :cve:`2021-47178`, :cve:`2021-47179` and :cve:`2021-47180` | 20 | - linux-yocto/5.15: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179` and :cve_nist:`2021-47180` |
21 | - linux-yocto/5.15 (cont.): Ignore :cve:`2022-48626`, :cve:`2022-48627`, :cve:`2022-48629`, :cve:`2022-48630`, :cve:`2023-6356`, :cve:`2023-6536`, :cve:`2023-52434`, :cve:`2023-52465`, :cve:`2023-52467`, :cve:`2023-52468`, :cve:`2023-52469`, :cve:`2023-52470`, :cve:`2023-52471`, :cve:`2023-52472`, :cve:`2023-52473`, :cve:`2023-52474`, :cve:`2023-52475`, :cve:`2023-52476`, :cve:`2023-52477`, :cve:`2023-52478`, :cve:`2023-52479`, :cve:`2023-52480`, :cve:`2023-52482`, :cve:`2023-52483`, :cve:`2023-52484`, :cve:`2023-52486`, :cve:`2023-52487`, :cve:`2023-52489`, :cve:`2023-52490`, :cve:`2023-52491`, :cve:`2023-52492`, :cve:`2023-52493`, :cve:`2023-52494`, :cve:`2023-52495`, :cve:`2023-52497`, :cve:`2023-52498`, :cve:`2023-52499`, :cve:`2023-52500`, :cve:`2023-52501`, :cve:`2023-52502`, :cve:`2023-52503`, :cve:`2023-52504`, :cve:`2023-52505`, :cve:`2023-52507`, :cve:`2023-52509`, :cve:`2023-52510`, :cve:`2023-52511`, :cve:`2023-52512`, :cve:`2023-52513`, :cve:`2023-52515`, :cve:`2023-52516`, :cve:`2023-52517`, :cve:`2023-52518`, :cve:`2023-52519`, :cve:`2023-52520`, :cve:`2023-52522`, :cve:`2023-52523`, :cve:`2023-52524`, :cve:`2023-52525`, :cve:`2023-52526`, :cve:`2023-52527`, :cve:`2023-52528`, :cve:`2023-52529`, :cve:`2023-52531`, :cve:`2023-52559`, :cve:`2023-52560`, :cve:`2023-52562`, :cve:`2023-52563`, :cve:`2023-52564`, :cve:`2023-52566`, :cve:`2023-52567`, :cve:`2023-52570`, :cve:`2023-52573`, :cve:`2023-52574`, :cve:`2023-52575`, :cve:`2023-52577`, :cve:`2023-52578`, :cve:`2023-52580`, :cve:`2023-52581`, :cve:`2023-52583`, :cve:`2023-52587`, :cve:`2023-52588`, :cve:`2023-52594`, :cve:`2023-52595`, :cve:`2023-52597`, :cve:`2023-52598`, :cve:`2023-52599`, :cve:`2023-52600`, :cve:`2023-52601`, :cve:`2023-52602`, :cve:`2023-52603`, :cve:`2023-52604`, :cve:`2023-52606`, :cve:`2023-52607`, :cve:`2023-52608`, :cve:`2023-52609`, :cve:`2023-52610`, :cve:`2023-52611`, :cve:`2023-52612`, :cve:`2023-52613`, :cve:`2023-52614`, :cve:`2023-52615`, :cve:`2023-52616`, :cve:`2023-52617`, :cve:`2023-52618`, :cve:`2023-52619`, :cve:`2023-52622`, :cve:`2023-52623`, :cve:`2023-52626`, :cve:`2023-52627`, :cve:`2023-52628`, :cve:`2023-52630`, :cve:`2023-52631`, :cve:`2023-52633`, :cve:`2023-52635`, :cve:`2023-52636`, :cve:`2023-52637`, :cve:`2023-52638`, :cve:`2023-52640`, :cve:`2023-52641`, :cve:`2024-0565`, :cve:`2024-0841`, :cve:`2024-23196`, :cve:`2024-26587`, :cve:`2024-26588`, :cve:`2024-26600`, :cve:`2024-26601`, :cve:`2024-26602`, :cve:`2024-26603`, :cve:`2024-26604`, :cve:`2024-26605`, :cve:`2024-26606`, :cve:`2024-26608`, :cve:`2024-26610`, :cve:`2024-26611`, :cve:`2024-26612`, :cve:`2024-26614`, :cve:`2024-26615`, :cve:`2024-26616`, :cve:`2024-26617`, :cve:`2024-26618`, :cve:`2024-26619`, :cve:`2024-26620`, :cve:`2024-26621`, :cve:`2024-26625`, :cve:`2024-26626`, :cve:`2024-26627`, :cve:`2024-26629`, :cve:`2024-26630`, :cve:`2024-26631`, :cve:`2024-26632`, :cve:`2024-26633`, :cve:`2024-26634`, :cve:`2024-26635`, :cve:`2024-26636`, :cve:`2024-26637`, :cve:`2024-26638`, :cve:`2024-26639`, :cve:`2024-26640`, :cve:`2024-26641`, :cve:`2024-26643`, :cve:`2024-26644`, :cve:`2024-26645`, :cve:`2024-26649`, :cve:`2024-26652`, :cve:`2024-26653`, :cve:`2024-26657`, :cve:`2024-26660`, :cve:`2024-26663`, :cve:`2024-26664`, :cve:`2024-26665`, :cve:`2024-26666`, :cve:`2024-26667`, :cve:`2024-26668`, :cve:`2024-26670`, :cve:`2024-26671`, :cve:`2024-26673`, :cve:`2024-26674`, :cve:`2024-26675`, :cve:`2024-26676`, :cve:`2024-26678`, :cve:`2024-26679`, :cve:`2024-26681`, :cve:`2024-26682`, :cve:`2024-26683`, :cve:`2024-26684`, :cve:`2024-26685`, :cve:`2024-26689`, :cve:`2024-26690`, :cve:`2024-26692`, :cve:`2024-26693`, :cve:`2024-26694`, :cve:`2024-26695`, :cve:`2024-26696`, :cve:`2024-26697`, :cve:`2024-26698`, :cve:`2024-26702`, :cve:`2024-26703`, :cve:`2024-26704`, :cve:`2024-26705`, :cve:`2024-26707`, :cve:`2024-26708`, :cve:`2024-26709`, :cve:`2024-26710`, :cve:`2024-26711`, :cve:`2024-26712`, :cve:`2024-26715`, :cve:`2024-26716`, :cve:`2024-26717`, :cve:`2024-26720`, :cve:`2024-26721`, :cve:`2024-26722`, :cve:`2024-26723`, :cve:`2024-26724`, :cve:`2024-26725`, :cve:`2024-26727`, :cve:`2024-26728`, :cve:`2024-26729`, :cve:`2024-26730`, :cve:`2024-26731`, :cve:`2024-26732`, :cve:`2024-26733`, :cve:`2024-26734`, :cve:`2024-26735`, :cve:`2024-26736`, :cve:`2024-26737`, :cve:`2024-26741`, :cve:`2024-26742`, :cve:`2024-26743`, :cve:`2024-26744`, :cve:`2024-26746`, :cve:`2024-26747`, :cve:`2024-26748`, :cve:`2024-26749`, :cve:`2024-26750`, :cve:`2024-26751`, :cve:`2024-26752`, :cve:`2024-26753`, :cve:`2024-26754`, :cve:`2024-26755`, :cve:`2024-26760`, :cve:`2024-26761`, :cve:`2024-26762`, :cve:`2024-26763`, :cve:`2024-26764`, :cve:`2024-26766`, :cve:`2024-26769`, :cve:`2024-26771`, :cve:`2024-26772`, :cve:`2024-26773`, :cve:`2024-26774`, :cve:`2024-26776`, :cve:`2024-26777`, :cve:`2024-26778`, :cve:`2024-26779`, :cve:`2024-26780`, :cve:`2024-26781`, :cve:`2024-26783`, :cve:`2024-26785`, :cve:`2024-26786`, :cve:`2024-26792`, :cve:`2024-26794`, :cve:`2024-26796`, :cve:`2024-26799`, :cve:`2024-26800`, :cve:`2024-26807` and :cve:`2024-26808` | 21 | - linux-yocto/5.15 (cont.): Ignore :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48629`, :cve_nist:`2022-48630`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-52434`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52507`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52531`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52570`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52583`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0565`, :cve_nist:`2024-0841`, :cve_nist:`2024-23196`, :cve_nist:`2024-26587`, :cve_nist:`2024-26588`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26643`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26649`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26660`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26766`, :cve_nist:`2024-26769`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26783`, :cve_nist:`2024-26785`, :cve_nist:`2024-26786`, :cve_nist:`2024-26792`, :cve_nist:`2024-26794`, :cve_nist:`2024-26796`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26807` and :cve_nist:`2024-26808` |
22 | - ncurses: Fix :cve:`2023-45918` | 22 | - ncurses: Fix :cve_nist:`2023-45918` |
23 | - ofono: Fix :cve:`2023-4233` and :cve:`2023-4234` | 23 | - ofono: Fix :cve_nist:`2023-4233` and :cve_nist:`2023-4234` |
24 | - openssl: Fix :cve:`2024-4603` | 24 | - openssl: Fix :cve_nist:`2024-4603` |
25 | - util-linux: Fix :cve:`2024-28085` | 25 | - util-linux: Fix :cve_nist:`2024-28085` |
26 | - xserver-xorg: Fix :cve:`2024-31082` and :cve:`2024-31083` | 26 | - xserver-xorg: Fix :cve_nist:`2024-31082` and :cve_nist:`2024-31083` |
27 | 27 | ||
28 | 28 | ||
29 | Fixes in Yocto-4.0.19 | 29 | Fixes in Yocto-4.0.19 |
30 | ~~~~~~~~~~~~~~~~~~~~~ | 30 | ~~~~~~~~~~~~~~~~~~~~~ |
31 | 31 | ||
32 | - binutils: Rename CVE-2022-38126 patch to :cve:`2022-35205` | 32 | - binutils: Rename CVE-2022-38126 patch to :cve_nist:`2022-35205` |
33 | - bitbake: parse: Improve/fix cache invalidation via mtime | 33 | - bitbake: parse: Improve/fix cache invalidation via mtime |
34 | - build-appliance-image: Update to kirkstone head revision | 34 | - build-appliance-image: Update to kirkstone head revision |
35 | - go-mod.bbclass: do not pack go mod cache | 35 | - go-mod.bbclass: do not pack go mod cache |
diff --git a/documentation/migration-guides/release-notes-4.0.2.rst b/documentation/migration-guides/release-notes-4.0.2.rst index 2f724e33c4..57881fa359 100644 --- a/documentation/migration-guides/release-notes-4.0.2.rst +++ b/documentation/migration-guides/release-notes-4.0.2.rst | |||
@@ -6,13 +6,13 @@ Release notes for Yocto-4.0.2 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.2 | 6 | Security Fixes in Yocto-4.0.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - libxslt: Mark :cve:`2022-29824` as not applying | 9 | - libxslt: Mark :cve_nist:`2022-29824` as not applying |
10 | - tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve:`2022-1210` | 10 | - tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve_nist:`2022-1210` |
11 | - tiff: mark :cve:`2022-1622` and :cve:`2022-1623` as invalid | 11 | - tiff: mark :cve_nist:`2022-1622` and :cve_nist:`2022-1623` as invalid |
12 | - pcre2:fix :cve:`2022-1586` Out-of-bounds read | 12 | - pcre2:fix :cve_nist:`2022-1586` Out-of-bounds read |
13 | - curl: fix :cve:`2022-22576`, :cve:`2022-27775`, :cve:`2022-27776`, :cve:`2022-27774`, :cve:`2022-30115`, :cve:`2022-27780`, :cve:`2022-27781`, :cve:`2022-27779` and :cve:`2022-27782` | 13 | - curl: fix :cve_nist:`2022-22576`, :cve_nist:`2022-27775`, :cve_nist:`2022-27776`, :cve_nist:`2022-27774`, :cve_nist:`2022-30115`, :cve_nist:`2022-27780`, :cve_nist:`2022-27781`, :cve_nist:`2022-27779` and :cve_nist:`2022-27782` |
14 | - qemu: fix :cve:`2021-4206` and :cve:`2021-4207` | 14 | - qemu: fix :cve_nist:`2021-4206` and :cve_nist:`2021-4207` |
15 | - freetype: fix :cve:`2022-27404`, :cve:`2022-27405` and :cve:`2022-27406` | 15 | - freetype: fix :cve_nist:`2022-27404`, :cve_nist:`2022-27405` and :cve_nist:`2022-27406` |
16 | 16 | ||
17 | Fixes in Yocto-4.0.2 | 17 | Fixes in Yocto-4.0.2 |
18 | ~~~~~~~~~~~~~~~~~~~~ | 18 | ~~~~~~~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-4.0.20.rst b/documentation/migration-guides/release-notes-4.0.20.rst index 97e0a3e91d..d0f95fff50 100644 --- a/documentation/migration-guides/release-notes-4.0.20.rst +++ b/documentation/migration-guides/release-notes-4.0.20.rst | |||
@@ -6,14 +6,14 @@ Release notes for Yocto-4.0.20 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.20 | 6 | Security Fixes in Yocto-4.0.20 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - acpica: Fix :cve:`2024-24856` | 9 | - acpica: Fix :cve_nist:`2024-24856` |
10 | - glib-2.0: Fix :cve:`2024-34397` | 10 | - glib-2.0: Fix :cve_nist:`2024-34397` |
11 | - gstreamer1.0-plugins-base: Fix :cve:`2024-4453` | 11 | - gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453` |
12 | - libxml2: Fix :cve:`2024-34459` | 12 | - libxml2: Fix :cve_nist:`2024-34459` |
13 | - openssh: fix :cve:`2024-6387` | 13 | - openssh: fix :cve_nist:`2024-6387` |
14 | - openssl: Fix :cve_mitre:`2024-4741` and :cve:`2024-5535` | 14 | - openssl: Fix :cve_mitre:`2024-4741` and :cve_nist:`2024-5535` |
15 | - ruby: fix :cve:`2024-27280` | 15 | - ruby: fix :cve_nist:`2024-27280` |
16 | - wget: Fix for :cve:`2024-38428` | 16 | - wget: Fix for :cve_nist:`2024-38428` |
17 | 17 | ||
18 | 18 | ||
19 | Fixes in Yocto-4.0.20 | 19 | Fixes in Yocto-4.0.20 |
diff --git a/documentation/migration-guides/release-notes-4.0.21.rst b/documentation/migration-guides/release-notes-4.0.21.rst new file mode 100644 index 0000000000..abf2199ee5 --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.21.rst | |||
@@ -0,0 +1,166 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-4.0.21 (Kirkstone) | ||
4 | ------------------------------------------ | ||
5 | |||
6 | Security Fixes in Yocto-4.0.21 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - bind: Fix :cve_nist:`2024-4076`, :cve_nist:`2024-1737`, :cve_nist:`2024-0760` and :cve_nist:`2024-1975` | ||
10 | - apr: Fix :cve_nist:`2023-49582` | ||
11 | - busybox: Fix :cve_nist:`2023-42363`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2023-42366` and :cve_nist:`2021-42380` | ||
12 | - curl: Ignore :cve_nist:`2024-32928` | ||
13 | - curl: Fix :cve_nist:`2024-7264` | ||
14 | - ghostscript: Fix :cve_nist:`2024-29506`, :cve_nist:`2024-29509` and :cve_nist:`2024-29511` | ||
15 | - go: Fix :cve_nist:`2024-24789` and :cve_nist:`2024-24791` | ||
16 | - gtk+3: Fix :cve_nist:`2024-6655` | ||
17 | - libarchive: Ignore :cve_nist:`2024-37407` | ||
18 | - libyaml: Ignore :cve_nist:`2024-35325`, :cve_nist:`2024-35326` and :cve_nist:`2024-35328` | ||
19 | - linux-yocto/5.15: Fix :cve_nist:`2022-48772`, :cve_nist:`2024-35972`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36897`, :cve_nist:`2024-36938`, :cve_nist:`2024-36965`, :cve_nist:`2024-36967`, :cve_nist:`2024-36969`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38571`, :cve_nist:`2024-38583`, :cve_nist:`2024-38591`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38600`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39277`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39466`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39493`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40911`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40954`, :cve_nist:`2024-40956`, :cve_nist:`2024-40957`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40967`, :cve_nist:`2024-40970`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40994`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41002`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41055`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41073`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41093`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42068`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42080`, :cve_nist:`2024-42082`, :cve_nist:`2024-42085`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42109`, :cve_nist:`2024-42140`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42225`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247` | ||
20 | - llvm: Fix :cve_nist:`2023-46049` and :cve_nist:`2024-31852` | ||
21 | - ofono: fix :cve_nist:`2023-2794` | ||
22 | - orc: Fix :cve_nist:`2024-40897` | ||
23 | - python3-certifi: Fix :cve_nist:`2024-39689` | ||
24 | - python3-jinja2: Fix :cve_nist:`2024-34064` | ||
25 | - python3: Fix :cve_nist:`2024-8088` | ||
26 | - qemu: Fix :cve_nist:`2024-7409` | ||
27 | - ruby: Fix for :cve_nist:`2024-27282` | ||
28 | - tiff: Fix :cve_nist:`2024-7006` | ||
29 | - vim: Fix :cve_nist:`2024-22667`, :cve_nist:`2024-41957`, :cve_nist:`2024-41965` and :cve_nist:`2024-43374` | ||
30 | - wpa-supplicant: Fix :cve_nist:`2023-52160` | ||
31 | |||
32 | |||
33 | Fixes in Yocto-4.0.21 | ||
34 | ~~~~~~~~~~~~~~~~~~~~~ | ||
35 | |||
36 | - apr: upgrade to 1.7.5 | ||
37 | - bind: Upgrade to 9.18.28 | ||
38 | - bitbake: data_smart: Improve performance for VariableHistory | ||
39 | - build-appliance-image: Update to kirkstone head revision | ||
40 | - cryptodev-module: Fix build for linux 5.10.220 | ||
41 | - gcc-runtime: remove bashism | ||
42 | - grub: fs/fat: Don't error when mtime is 0 | ||
43 | - image_types.bbclass: Use --force also with lz4,lzop | ||
44 | - libsoup: fix compile error on centos7 | ||
45 | - linux-yocto/5.15: upgrade to v5.15.164 | ||
46 | - lttng-modules: Upgrade to 2.13.14 | ||
47 | - migration-guide: add release notes for 4.0.20 | ||
48 | - orc: upgrade to 0.4.39 | ||
49 | - poky.conf: bump version for 4.0.21 | ||
50 | - python3-jinja2: upgrade to 3.1.4 | ||
51 | - python3-pycryptodome(x): use python_setuptools_build_meta build class | ||
52 | - python3: add PACKAGECONFIG[editline] | ||
53 | - ref-manual: fix typo and move :term:`SYSROOT_DIRS` example | ||
54 | - sqlite3: CVE_ID correction for :cve_nist:`2023-7104` as patched | ||
55 | - sqlite3: Rename patch for :cve_nist:`2022-35737` | ||
56 | - uboot-sign: Fix index error in concat_dtb_helper() with multiple configs | ||
57 | - vim: upgrade to 9.1.0682 | ||
58 | - wireless-regdb: upgrade to 2024.07.04 | ||
59 | |||
60 | |||
61 | Known Issues in Yocto-4.0.21 | ||
62 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
63 | |||
64 | - N/A | ||
65 | |||
66 | |||
67 | Contributors to Yocto-4.0.21 | ||
68 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
69 | |||
70 | - Archana Polampalli | ||
71 | - Ashish Sharma | ||
72 | - Bruce Ashfield | ||
73 | - Deepthi Hemraj | ||
74 | - Divya Chellam | ||
75 | - Florian Amstutz | ||
76 | - Guocai He | ||
77 | - Hitendra Prajapati | ||
78 | - Hugo SIMELIERE | ||
79 | - Lee Chee Yang | ||
80 | - Leon Anavi | ||
81 | - Matthias Pritschet | ||
82 | - Ming Liu | ||
83 | - Niko Mauno | ||
84 | - Peter Marko | ||
85 | - Robert Yang | ||
86 | - Rohini Sangam | ||
87 | - Ross Burton | ||
88 | - Siddharth Doshi | ||
89 | - Soumya Sambu | ||
90 | - Steve Sakoman | ||
91 | - Vijay Anusuri | ||
92 | - Vrushti Dabhi | ||
93 | - Wang Mingyu | ||
94 | - Yogita Urade | ||
95 | |||
96 | |||
97 | Repositories / Downloads for Yocto-4.0.21 | ||
98 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
99 | |||
100 | poky | ||
101 | |||
102 | - Repository Location: :yocto_git:`/poky` | ||
103 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
104 | - Tag: :yocto_git:`yocto-4.0.21 </poky/log/?h=yocto-4.0.21>` | ||
105 | - Git Revision: :yocto_git:`4cdc553814640851cce85f84ee9c0b58646cd33b </poky/commit/?id=4cdc553814640851cce85f84ee9c0b58646cd33b>` | ||
106 | - Release Artefact: poky-4cdc553814640851cce85f84ee9c0b58646cd33b | ||
107 | - sha: 460e3a4ede491a9b66c5d262cd9498d5bcca1f2d880885342b08dc32b967f33d | ||
108 | - Download Locations: | ||
109 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2 | ||
110 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2 | ||
111 | |||
112 | openembedded-core | ||
113 | |||
114 | - Repository Location: :oe_git:`/openembedded-core` | ||
115 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
116 | - Tag: :oe_git:`yocto-4.0.21 </openembedded-core/log/?h=yocto-4.0.21>` | ||
117 | - Git Revision: :oe_git:`c40a3fec49942ac6d25ba33e57e801a550e252c9 </openembedded-core/commit/?id=c40a3fec49942ac6d25ba33e57e801a550e252c9>` | ||
118 | - Release Artefact: oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9 | ||
119 | - sha: afc2aaf312f9fb2590ae006615557ec605c98eff42bc380a1b2d6e39cfdf8930 | ||
120 | - Download Locations: | ||
121 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2 | ||
122 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2 | ||
123 | |||
124 | meta-mingw | ||
125 | |||
126 | - Repository Location: :yocto_git:`/meta-mingw` | ||
127 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
128 | - Tag: :yocto_git:`yocto-4.0.21 </meta-mingw/log/?h=yocto-4.0.21>` | ||
129 | - Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>` | ||
130 | - Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7 | ||
131 | - sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25 | ||
132 | - Download Locations: | ||
133 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2 | ||
134 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2 | ||
135 | |||
136 | meta-gplv2 | ||
137 | |||
138 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
139 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
140 | - Tag: :yocto_git:`yocto-4.0.21 </meta-gplv2/log/?h=yocto-4.0.21>` | ||
141 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
142 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
143 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
144 | - Download Locations: | ||
145 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
146 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
147 | |||
148 | bitbake | ||
149 | |||
150 | - Repository Location: :oe_git:`/bitbake` | ||
151 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
152 | - Tag: :oe_git:`yocto-4.0.21 </bitbake/log/?h=yocto-4.0.21>` | ||
153 | - Git Revision: :oe_git:`ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1 </bitbake/commit/?id=ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1>` | ||
154 | - Release Artefact: bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1 | ||
155 | - sha: 1cb102f4c8dbd067f0262072e4e629ec7cb423103111ccdde75a09fcb8f55e5f | ||
156 | - Download Locations: | ||
157 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2 | ||
158 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2 | ||
159 | |||
160 | yocto-docs | ||
161 | |||
162 | - Repository Location: :yocto_git:`/yocto-docs` | ||
163 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
164 | - Tag: :yocto_git:`yocto-4.0.21 </yocto-docs/log/?h=yocto-4.0.21>` | ||
165 | - Git Revision: :yocto_git:`512025edd9b3b6b8d0938b35bb6188c9f3b7f17d </yocto-docs/commit/?id=512025edd9b3b6b8d0938b35bb6188c9f3b7f17d>` | ||
166 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.22.rst b/documentation/migration-guides/release-notes-4.0.22.rst new file mode 100644 index 0000000000..b2b98bd907 --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.22.rst | |||
@@ -0,0 +1,196 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-4.0.22 (Kirkstone) | ||
4 | ------------------------------------------ | ||
5 | |||
6 | Security Fixes in Yocto-4.0.22 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - cups: Fix :cve_nist:`2024-35235` and :cve_nist:`2024-47175` | ||
10 | - curl: Fix :cve_nist:`2024-8096` | ||
11 | - expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492` | ||
12 | - gnupg: Ignore :cve_nist:`2022-3219` | ||
13 | - libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006` | ||
14 | - linux-yocto/5.10: Fix :cve_nist:`2022-48772`, :cve_nist:`2023-52434`, :cve_nist:`2023-52447`, :cve_nist:`2023-52458`, :cve_nist:`2024-0841`, :cve_nist:`2024-26601`, :cve_nist:`2024-26882`, :cve_nist:`2024-26883`, :cve_nist:`2024-26884`, :cve_nist:`2024-26885`, :cve_nist:`2024-26898`, :cve_nist:`2024-26901`, :cve_nist:`2024-26903`, :cve_nist:`2024-26907`, :cve_nist:`2024-26934`, :cve_nist:`2024-26978`, :cve_nist:`2024-27013`, :cve_nist:`2024-27020`, :cve_nist:`2024-35972`, :cve_nist:`2024-35978`, :cve_nist:`2024-35982`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36902`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38583`, :cve_nist:`2024-38590`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40904`, :cve_nist:`2024-40905`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41012`, :cve_nist:`2024-41040`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41059`, :cve_nist:`2024-41063`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42082`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42131`, :cve_nist:`2024-42137`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247` | ||
15 | - linux-yocto/5.15: Fix :cve_nist:`2023-52889`, :cve_nist:`2024-41011`, :cve_nist:`2024-42114`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`, :cve_nist:`2024-42277`, :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`, :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`, :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`, :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43817`, :cve_nist:`2024-43828`, :cve_nist:`2024-43854`, :cve_nist:`2024-43856`, :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43863`, :cve_nist:`2024-43871`, :cve_nist:`2024-43873`, :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`, :cve_nist:`2024-43894`, :cve_nist:`2024-43902`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43909`, :cve_nist:`2024-43914`, :cve_nist:`2024-44934`, :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44952`, :cve_nist:`2024-44954`, :cve_nist:`2024-44958`, :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44966`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`, :cve_nist:`2024-44982`, :cve_nist:`2024-44983`, :cve_nist:`2024-44985`, :cve_nist:`2024-44986`, :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`, :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`, :cve_nist:`2024-45006`, :cve_nist:`2024-45011`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`, :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`, :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`, :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702` and :cve_nist:`2024-46707` | ||
16 | - openssl: Fix :cve_nist:`2024-6119` | ||
17 | - procps: Fix :cve_nist:`2023-4016` | ||
18 | - python3: Fix :cve_nist:`2023-27043`, :cve_nist:`2024-4030`, :cve_nist:`2024-4032`, :cve_nist:`2024-6923`, :cve_nist:`2024-6232`, :cve_nist:`2024-7592` and :cve_nist:`2024-8088` | ||
19 | - qemu: Fix :cve_nist:`2024-4467` | ||
20 | - rust: Ignore :cve_nist:`2024-43402` | ||
21 | - webkitgtk: Fix :cve_nist:`2024-40779` | ||
22 | - wpa-supplicant: Ignore :cve_nist:`2024-5290` | ||
23 | - wpa-supplicant: Fix :cve_nist:`2024-3596` | ||
24 | |||
25 | |||
26 | Fixes in Yocto-4.0.22 | ||
27 | ~~~~~~~~~~~~~~~~~~~~~ | ||
28 | |||
29 | - bintuils: stable 2.38 branch update | ||
30 | - bitbake: fetch2/wget: Canonicalize :term:`DL_DIR` paths for wget2 compatibility | ||
31 | - bitbake: fetch/wget: Move files into place atomically | ||
32 | - bitbake: hashserv: tests: Omit client in slow server start test | ||
33 | - bitbake: tests/fetch: Tweak to work on Fedora40 | ||
34 | - bitbake: wget: Make wget --passive-ftp option conditional on ftp/ftps | ||
35 | - build-appliance-image: Update to kirkstone head revision | ||
36 | - buildhistory: Fix intermittent package file list creation | ||
37 | - buildhistory: Restoring files from preserve list | ||
38 | - buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage | ||
39 | - busybox: Fix cut with "-s" flag | ||
40 | - cdrtools-native: fix build with gcc-14 | ||
41 | - curl: free old conn better on reuse | ||
42 | - cve-exclusion: Drop the version comparision/warning | ||
43 | - dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only) | ||
44 | - doc/features: remove duplicate word in distribution feature ext2 | ||
45 | - gcc: upgrade to v11.5 | ||
46 | - gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only) | ||
47 | - glibc: stable 2.35 branch updates | ||
48 | - install-buildtools: fix "test installation" step | ||
49 | - install-buildtools: remove md5 checksum validation | ||
50 | - install-buildtools: support buildtools-make-tarball and update to 4.1 | ||
51 | - iw: Fix :term:`LICENSE` (change to ISC) | ||
52 | - kmscube: Add patch to fix -int-conversion build error | ||
53 | - lib/oeqa: rename assertRaisesRegexp to assertRaisesRegex | ||
54 | - libedit: Make docs generation deterministic | ||
55 | - linux-yocto/5.10: fix NFSV3 config warning | ||
56 | - linux-yocto/5.10: remove obsolete options | ||
57 | - linux-yocto/5.10: update to v5.10.223 | ||
58 | - linux-yocto/5.15: update to v5.15.166 | ||
59 | - meta-world-pkgdata: Inherit nopackages | ||
60 | - migration-guide: add release notes for 4.0.21 | ||
61 | - openssl: Upgrade to 3.0.15 | ||
62 | - poky.conf: bump version for 4.0.22 | ||
63 | - populate_sdk_base: inherit nopackages | ||
64 | - python3: Upgrade to 3.10.15 | ||
65 | - ruby: Make docs generation deterministic | ||
66 | - runqemu: keep generating tap devices | ||
67 | - scripts/install-buildtools: Update to 4.0.21 | ||
68 | - selftest/runtime_test/virgl: Disable for all fedora | ||
69 | - testexport: fallback for empty :term:`IMAGE_LINK_NAME` | ||
70 | - testimage: fallback for empty :term:`IMAGE_LINK_NAME` | ||
71 | - tiff: Fix :term:`LICENSE` (change to libtiff) | ||
72 | - udev-extraconf: Add collect flag to mount | ||
73 | - unzip: Fix :term:`LICENSE` (change to Info-ZIP) | ||
74 | - valgrind: disable avx_estimate_insn.vgtest | ||
75 | - wpa-supplicant: Patch security advisory 2024-2 | ||
76 | - yocto-uninative: Update to 4.5 for gcc 14 | ||
77 | - yocto-uninative: Update to 4.6 for glibc 2.40 | ||
78 | - zip: Fix :term:`LICENSE` (change to Info-ZIP) | ||
79 | - zstd: fix :term:`LICENSE` statement (change to "BSD-3-Clause | GPL-2.0-only") | ||
80 | |||
81 | |||
82 | Known Issues in Yocto-4.0.22 | ||
83 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
84 | |||
85 | - ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the ``parselogs`` | ||
86 | runtime test due to unexpected kernel error messages in the log (see | ||
87 | :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla). | ||
88 | |||
89 | |||
90 | Contributors to Yocto-4.0.22 | ||
91 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
92 | |||
93 | - Aleksandar Nikolic | ||
94 | - Alexandre Belloni | ||
95 | - Archana Polampalli | ||
96 | - Bruce Ashfield | ||
97 | - Colin McAllister | ||
98 | - Deepthi Hemraj | ||
99 | - Divya Chellam | ||
100 | - Hitendra Prajapati | ||
101 | - Hugo SIMELIERE | ||
102 | - Jinfeng Wang | ||
103 | - Joshua Watt | ||
104 | - Jörg Sommer | ||
105 | - Konrad Weihmann | ||
106 | - Lee Chee Yang | ||
107 | - Martin Jansa | ||
108 | - Massimiliano Minella | ||
109 | - Michael Halstead | ||
110 | - Mingli Yu | ||
111 | - Niko Mauno | ||
112 | - Paul Eggleton | ||
113 | - Pedro Ferreira | ||
114 | - Peter Marko | ||
115 | - Purushottam Choudhary | ||
116 | - Richard Purdie | ||
117 | - Rob Woolley | ||
118 | - Rohini Sangam | ||
119 | - Ross Burton | ||
120 | - Rudolf J Streif | ||
121 | - Siddharth Doshi | ||
122 | - Steve Sakoman | ||
123 | - Vijay Anusuri | ||
124 | - Vivek Kumbhar | ||
125 | |||
126 | |||
127 | Repositories / Downloads for Yocto-4.0.22 | ||
128 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
129 | |||
130 | poky | ||
131 | |||
132 | - Repository Location: :yocto_git:`/poky` | ||
133 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
134 | - Tag: :yocto_git:`yocto-4.0.22 </poky/log/?h=yocto-4.0.22>` | ||
135 | - Git Revision: :yocto_git:`7e87dc422d972e0dc98372318fcdc63a76347d16 </poky/commit/?id=7e87dc422d972e0dc98372318fcdc63a76347d16>` | ||
136 | - Release Artefact: poky-7e87dc422d972e0dc98372318fcdc63a76347d16 | ||
137 | - sha: 5058e7b2474f8cb73c19e776ef58d9784321ef42109d5982747c8c432531239f | ||
138 | - Download Locations: | ||
139 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2 | ||
140 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2 | ||
141 | |||
142 | openembedded-core | ||
143 | |||
144 | - Repository Location: :oe_git:`/openembedded-core` | ||
145 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
146 | - Tag: :oe_git:`yocto-4.0.22 </openembedded-core/log/?h=yocto-4.0.22>` | ||
147 | - Git Revision: :oe_git:`f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf </openembedded-core/commit/?id=f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf>` | ||
148 | - Release Artefact: oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf | ||
149 | - sha: 378bcc840ba9fbf06a15fea1b5dacdd446f3ad4d85115d708e7bbb20629cdeb4 | ||
150 | - Download Locations: | ||
151 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2 | ||
152 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2 | ||
153 | |||
154 | meta-mingw | ||
155 | |||
156 | - Repository Location: :yocto_git:`/meta-mingw` | ||
157 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
158 | - Tag: :yocto_git:`yocto-4.0.22 </meta-mingw/log/?h=yocto-4.0.22>` | ||
159 | - Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>` | ||
160 | - Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7 | ||
161 | - sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25 | ||
162 | - Download Locations: | ||
163 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2 | ||
164 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2 | ||
165 | |||
166 | meta-gplv2 | ||
167 | |||
168 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
169 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
170 | - Tag: :yocto_git:`yocto-4.0.22 </meta-gplv2/log/?h=yocto-4.0.22>` | ||
171 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
172 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
173 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
174 | - Download Locations: | ||
175 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
176 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
177 | |||
178 | bitbake | ||
179 | |||
180 | - Repository Location: :oe_git:`/bitbake` | ||
181 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
182 | - Tag: :oe_git:`yocto-4.0.22 </bitbake/log/?h=yocto-4.0.22>` | ||
183 | - Git Revision: :oe_git:`eb5c1ce6b1b8f33535ff7b9263ec7648044163ea </bitbake/commit/?id=eb5c1ce6b1b8f33535ff7b9263ec7648044163ea>` | ||
184 | - Release Artefact: bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea | ||
185 | - sha: 473d3e9539160633f3de9d88cce69123f6c623e4c8ab35beb7875868564593cf | ||
186 | - Download Locations: | ||
187 | http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2 | ||
188 | http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2 | ||
189 | |||
190 | yocto-docs | ||
191 | |||
192 | - Repository Location: :yocto_git:`/yocto-docs` | ||
193 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
194 | - Tag: :yocto_git:`yocto-4.0.22 </yocto-docs/log/?h=yocto-4.0.22>` | ||
195 | - Git Revision: :yocto_git:`2169a52a24ebd1906039c42632bae6c4285a3aca </yocto-docs/commit/?id=2169a52a24ebd1906039c42632bae6c4285a3aca>` | ||
196 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.23.rst b/documentation/migration-guides/release-notes-4.0.23.rst new file mode 100644 index 0000000000..abf7c69759 --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.23.rst | |||
@@ -0,0 +1,209 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-4.0.23 (Kirkstone) | ||
4 | ------------------------------------------ | ||
5 | |||
6 | Security Fixes in Yocto-4.0.23 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - ``curl``: Fix :cve_nist:`2024-9681` | ||
10 | - ``expat``: Fix :cve_nist:`2024-50602` | ||
11 | - ``gcc``: Ignore :cve_nist:`2023-4039` | ||
12 | - ``ghostscript``: Fix :cve_nist:`2023-46361` and :cve_nist:`2024-29508` | ||
13 | - ``gstreamer1.0``: Ignore :cve_nist:`2024-0444` | ||
14 | - ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958` | ||
15 | - ``openssl``: Fix :cve_nist:`2024-9143` | ||
16 | - ``orc``: Fix :cve_nist:`2024-40897` | ||
17 | - ``python3``: Ignore :cve_nist:`2023-27043`, :cve_nist:`2024-6232` and :cve_nist:`2024-7592` | ||
18 | - ``qemu``: Fix :cve_nist:`2023-3019` | ||
19 | - ``vim``: Fix :cve_nist:`2024-43790`, :cve_nist:`2024-43802`, :cve_nist:`2024-45306` and :cve_nist:`2024-47814` | ||
20 | - ``zstd``: Fix :cve_nist:`2022-4899` | ||
21 | |||
22 | |||
23 | Fixes in Yocto-4.0.23 | ||
24 | ~~~~~~~~~~~~~~~~~~~~~ | ||
25 | |||
26 | - at-spi2-core: backport a patch to fix build with gcc-14 on host | ||
27 | - bitbake: bitbake: doc/user-manual: Update the BB_HASHSERVE_UPSTREAM | ||
28 | - bitbake: codeparser: Fix handling of string AST nodes with older Python versions | ||
29 | - bitbake: fetch2/git: Use quote from shlex, not pipes | ||
30 | - bitbake: gitsm: Add call_process_submodules() to remove duplicated code | ||
31 | - bitbake: gitsm: Remove downloads/tmpdir when failed | ||
32 | - bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab | ||
33 | - bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab | ||
34 | - bmap-tools: update :term:`HOMEPAGE` and :term:`SRC_URI` | ||
35 | - build-appliance-image: Update to kirkstone head revision | ||
36 | - cmake: Fix sporadic issues when determining compiler internals | ||
37 | - cracklib: Modify patch to compile with GCC 14 | ||
38 | - cve-check: add CVSS vector string to CVE database and reports | ||
39 | - cve-check: add support for cvss v4.0 | ||
40 | - cve_check: Use a local copy of the database during builds | ||
41 | - dev-manual: document how to provide confs from layer.conf | ||
42 | - documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint | ||
43 | - documentation: Makefile: fix epub and latexpdf targets | ||
44 | - documentation: README: add instruction to run Vale on a subset | ||
45 | - documentation: brief-yoctoprojectqs: update BB_HASHSERVE_UPSTREAM for new infrastructure | ||
46 | - documentation: conf.py: add a bitbake_git extlink | ||
47 | - documentation: rename :cve: role to :cve_nist: | ||
48 | - documentation: styles: vocabularies: Yocto: add sstate | ||
49 | - documnetation: contributor-guide: Remove duplicated words | ||
50 | - gcc: restore a patch for Neoverse N2 core | ||
51 | - glib-2.0: patch regression of :cve_nist:`2023-32665` | ||
52 | - kmscube: create_framebuffer: backport modifier fix | ||
53 | - libffi: backport a fix to build libffi-native with gcc-14 | ||
54 | - linux-firmware: Upgrade to 20240909 | ||
55 | - local.conf.sample: update BB_HASHSERVE_UPSTREAM for new infrastructure | ||
56 | - migration-guide: add release notes for 4.0.22 | ||
57 | - migration-guide: release-notes-4.0: update BB_HASHSERVE_UPSTREAM for new infrastructure | ||
58 | - nativesdk-intercept: Fix bad intercept chgrp/chown logic | ||
59 | - orc: Upgrade to 0.4.40 | ||
60 | - overlayfs-etc: add option to skip creation of mount dirs | ||
61 | - overview-manual: concepts: add details on package splitting | ||
62 | - package: Switch debug source handling to use prefix map | ||
63 | - patch.py: Use shlex instead of deprecated pipe | ||
64 | - poky.conf: bump version for 4.0.23 | ||
65 | - pseudo: Disable LFS on 32bit arches | ||
66 | - pseudo: Fix envp bug and add posix_spawn wrapper | ||
67 | - pseudo: Fix to work with glibc 2.40 | ||
68 | - pseudo: Switch back to the master branch | ||
69 | - pseudo: Update to include logic fix | ||
70 | - pseudo: Update to include open symlink handling bugfix | ||
71 | - pseudo: Update to pull in fchmodat fix | ||
72 | - pseudo: Update to pull in fd leak fix | ||
73 | - pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept | ||
74 | - pseudo: Update to pull in linux-libc-headers race fix | ||
75 | - pseudo: Update to pull in python 3.12+ fix | ||
76 | - pseudo: Update to pull in syncfs probe fix | ||
77 | - ref-manual: add description for the "sysroot" term | ||
78 | - ref-manual: add missing CVE_CHECK manifest variables | ||
79 | - ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable | ||
80 | - ref-manual: add missing :term:`OPKGBUILDCMD` variable | ||
81 | - ref-manual: devtool-reference: document missing commands | ||
82 | - ref-manual: devtool-reference: refresh example outputs | ||
83 | - ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable | ||
84 | - ref-manual: release-process: add a reference to the doc's release | ||
85 | - ref-manual: release-process: refresh the current LTS releases | ||
86 | - ref-manual: release-process: update releases.svg | ||
87 | - ref-manual: release-process: update releases.svg with month after "Current" | ||
88 | - ref-manual: structure.rst: document missing tmp/ dirs | ||
89 | - ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables | ||
90 | - syslinux: Disable error on implicit-function-declaration | ||
91 | - util-linux: Define pidfd_* function signatures | ||
92 | - vala: add -Wno-error=incompatible-pointer-types work around | ||
93 | - vim: Upgrade to 9.1.0764 | ||
94 | - xmlto: backport a patch to fix build with gcc-14 on host | ||
95 | - zip: Fix build with gcc-14 | ||
96 | - zip: Make configure checks to be more robust | ||
97 | |||
98 | |||
99 | Known Issues in Yocto-4.0.23 | ||
100 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
101 | |||
102 | -N/A | ||
103 | |||
104 | |||
105 | Contributors to Yocto-4.0.23 | ||
106 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
107 | |||
108 | - Aleksandar Nikolic | ||
109 | - Alexandre Belloni | ||
110 | - Antoine Lubineau | ||
111 | - Antonin Godard | ||
112 | - Archana Polampalli | ||
113 | - Ashish Sharma | ||
114 | - Baruch Siach | ||
115 | - EilÃs 'pidge' Nà Fhlannagáin | ||
116 | - Jose Quaresma | ||
117 | - Julien Stephan | ||
118 | - Khem Raj | ||
119 | - Lee Chee Yang | ||
120 | - Macpaul Lin | ||
121 | - Martin Jansa | ||
122 | - Michael Opdenacker | ||
123 | - Ola x Nilsson | ||
124 | - Peter Marko | ||
125 | - Philip Lorenz | ||
126 | - Randolph Sapp | ||
127 | - Richard Purdie | ||
128 | - Robert Yang | ||
129 | - Rohini Sangam | ||
130 | - Ruiqiang Hao | ||
131 | - Siddharth Doshi | ||
132 | - Steve Sakoman | ||
133 | - Talel BELHAJSALEM | ||
134 | - Wang Mingyu | ||
135 | - Yogita Urade | ||
136 | - Zoltan Boszormenyi | ||
137 | |||
138 | |||
139 | Repositories / Downloads for Yocto-4.0.23 | ||
140 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
141 | |||
142 | poky | ||
143 | |||
144 | - Repository Location: :yocto_git:`/poky` | ||
145 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
146 | - Tag: :yocto_git:`yocto-4.0.23 </poky/log/?h=yocto-4.0.23>` | ||
147 | - Git Revision: :yocto_git:`8e092852b63e998d990b8f8e1aa91297dec4430f </poky/commit/?id=8e092852b63e998d990b8f8e1aa91297dec4430f>` | ||
148 | - Release Artefact: poky-8e092852b63e998d990b8f8e1aa91297dec4430f | ||
149 | - sha: 339d34d8432070dac948449e732ebf06a888eeb27ff548958b2395c9446b029d | ||
150 | - Download Locations: | ||
151 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2 | ||
152 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2 | ||
153 | |||
154 | openembedded-core | ||
155 | |||
156 | - Repository Location: :oe_git:`/openembedded-core` | ||
157 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
158 | - Tag: :oe_git:`yocto-4.0.23 </openembedded-core/log/?h=yocto-4.0.23>` | ||
159 | - Git Revision: :oe_git:`fb45c5cf8c2b663af293acb069d446610f77ff1a </openembedded-core/commit/?id=fb45c5cf8c2b663af293acb069d446610f77ff1a>` | ||
160 | - Release Artefact: oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a | ||
161 | - sha: 1d394370ea7d43fb885ab8a952d6d1e43f1a850745a5152d5ead5565a283a0f5 | ||
162 | - Download Locations: | ||
163 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2 | ||
164 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2 | ||
165 | |||
166 | meta-mingw | ||
167 | |||
168 | - Repository Location: :yocto_git:`/meta-mingw` | ||
169 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
170 | - Tag: :yocto_git:`yocto-4.0.23 </meta-mingw/log/?h=yocto-4.0.23>` | ||
171 | - Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>` | ||
172 | - Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e | ||
173 | - sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8 | ||
174 | - Download Locations: | ||
175 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
176 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
177 | |||
178 | meta-gplv2 | ||
179 | |||
180 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
181 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
182 | - Tag: :yocto_git:`yocto-4.0.23 </meta-gplv2/log/?h=yocto-4.0.23>` | ||
183 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
184 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
185 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
186 | - Download Locations: | ||
187 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
188 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
189 | |||
190 | bitbake | ||
191 | |||
192 | - Repository Location: :oe_git:`/bitbake` | ||
193 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
194 | - Tag: :oe_git:`yocto-4.0.23 </bitbake/log/?h=yocto-4.0.23>` | ||
195 | - Git Revision: :oe_git:`fb73c495c45d1d4107cfd60b67a5b4f11a99647b </bitbake/commit/?id=fb73c495c45d1d4107cfd60b67a5b4f11a99647b>` | ||
196 | - Release Artefact: bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b | ||
197 | - sha: 5cd271299951f25912a2e8d4de6d8769a4c0bb3bbcfc90815be41f23fd299a0b | ||
198 | - Download Locations: | ||
199 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2 | ||
200 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2 | ||
201 | |||
202 | yocto-docs | ||
203 | |||
204 | - Repository Location: :yocto_git:`/yocto-docs` | ||
205 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
206 | - Tag: :yocto_git:`yocto-4.0.23 </yocto-docs/log/?h=yocto-4.0.23>` | ||
207 | - Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>` | ||
208 | |||
209 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.24.rst b/documentation/migration-guides/release-notes-4.0.24.rst new file mode 100644 index 0000000000..33372dc89e --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.24.rst | |||
@@ -0,0 +1,383 @@ | |||
1 | Release notes for Yocto-4.0.24 (Kirkstone) | ||
2 | ------------------------------------------ | ||
3 | |||
4 | Security Fixes in Yocto-4.0.24 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | - coreutils: Fix :cve_nist:`2024-0684` | ||
8 | - cpio: Ignore :cve_nist:`2023-7216` | ||
9 | - diffoscope: Fix :cve_nist:`2024-25711` | ||
10 | - ffmpeg: fix :cve_mitre:`2023-47342`, :cve_nist:`2023-50007`, :cve_nist:`2023-50008`, | ||
11 | :cve_nist:`2023-51793`, :cve_nist:`2023-51794`, :cve_nist:`2023-51796`, :cve_nist:`2023-51798`, | ||
12 | :cve_nist:`2024-7055`, :cve_nist:`2024-31578`, :cve_nist:`2024-31582`, :cve_nist:`2024-32230`, | ||
13 | :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368` | ||
14 | - ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`, | ||
15 | :cve_nist:`2024-46955` and :cve_nist:`2024-46956` | ||
16 | - ghostscript: Ignore :cve_nist:`2024-46954` | ||
17 | - glib-2.0: Fix :cve_nist:`2024-52533` | ||
18 | - gnupg: Ignore :cve_nist:`2022-3515` | ||
19 | - grub: Ignore :cve_nist:`2024-1048` and :cve_nist:`2023-4001` | ||
20 | - gstreame1.0: Ignore :cve_nist:`2023-40474`, :cve_nist:`2023-40475`, :cve_nist:`2023-40476`, | ||
21 | :cve_nist:`2023-44429`, :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_nist:`2024-0444` | ||
22 | - gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`, | ||
23 | :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615` | ||
24 | and :cve_nist:`2024-47835` | ||
25 | - gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, | ||
26 | :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, | ||
27 | :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, | ||
28 | :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, | ||
29 | :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`, | ||
30 | :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834` | ||
31 | - gstreamer1.0: Fix :cve_nist:`2024-47606` | ||
32 | - libarchive: Fix :cve_nist:`2024-20696` | ||
33 | - libpam: Fix :cve_nist:`2024-10041` | ||
34 | - libsdl2: Ignore :cve_nist:`2020-14409` and :cve_nist:`2020-14410` | ||
35 | - libsndfile1: Fix :cve_nist:`2022-33065` and :cve_nist:`2024-50612` | ||
36 | - libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532` | ||
37 | - libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532` | ||
38 | - linux-yocto/5.10: Fix :cve_nist:`2023-52889`, :cve_nist:`2023-52917`, :cve_nist:`2023-52918`, | ||
39 | :cve_nist:`2024-41011`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`, | ||
40 | :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`, | ||
41 | :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`, | ||
42 | :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`, | ||
43 | :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43828`, :cve_nist:`2024-43856`, | ||
44 | :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43871`, | ||
45 | :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`, | ||
46 | :cve_nist:`2024-43894`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43914`, | ||
47 | :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44954`, | ||
48 | :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`, | ||
49 | :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`, | ||
50 | :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`, | ||
51 | :cve_nist:`2024-45006`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`, | ||
52 | :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`, | ||
53 | :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`, | ||
54 | :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702`, | ||
55 | :cve_nist:`2024-46707`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`, | ||
56 | :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`, | ||
57 | :cve_nist:`2024-46731`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`, | ||
58 | :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46747`, | ||
59 | :cve_nist:`2024-46750`, :cve_nist:`2024-46755`, :cve_nist:`2024-46759`, :cve_nist:`2024-46761`, | ||
60 | :cve_nist:`2024-46763`, :cve_nist:`2024-46771`, :cve_nist:`2024-46777`, :cve_nist:`2024-46780`, | ||
61 | :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46791`, | ||
62 | :cve_nist:`2024-46798`, :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46814`, | ||
63 | :cve_nist:`2024-46815`, :cve_nist:`2024-46817`, :cve_nist:`2024-46818`, :cve_nist:`2024-46819`, | ||
64 | :cve_nist:`2024-46822`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46832`, | ||
65 | :cve_nist:`2024-46840`, :cve_nist:`2024-46844`, :cve_nist:`2024-47659`, :cve_nist:`2024-47660`, | ||
66 | :cve_nist:`2024-47663`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, | ||
67 | :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47692`, | ||
68 | :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`, | ||
69 | :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`, | ||
70 | :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47723`, :cve_nist:`2024-47735`, | ||
71 | :cve_nist:`2024-47737`, :cve_nist:`2024-47739`, :cve_nist:`2024-47742`, :cve_nist:`2024-47747`, | ||
72 | :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47757`, :cve_nist:`2024-49851`, | ||
73 | :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`, :cve_nist:`2024-49867`, | ||
74 | :cve_nist:`2024-49868`, :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, | ||
75 | :cve_nist:`2024-49879`, :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, | ||
76 | :cve_nist:`2024-49884`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, | ||
77 | :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, | ||
78 | :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`, | ||
79 | :cve_nist:`2024-49924`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`, :cve_nist:`2024-49936`, | ||
80 | :cve_nist:`2024-49938`, :cve_nist:`2024-49944`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, | ||
81 | :cve_nist:`2024-49952`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, | ||
82 | :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`, | ||
83 | :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`, | ||
84 | :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`, | ||
85 | :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50001`, | ||
86 | :cve_nist:`2024-50006`, :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`, | ||
87 | :cve_nist:`2024-50015`, :cve_nist:`2024-50024`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`, | ||
88 | :cve_nist:`2024-50039`, :cve_nist:`2024-50040`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, | ||
89 | :cve_nist:`2024-50046`, :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50095`, | ||
90 | :cve_nist:`2024-50096`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, | ||
91 | :cve_nist:`2024-50184` and :cve_nist:`2024-50188` | ||
92 | - linux-yocto/5.15: Fix :cve_nist:`2022-48695`, :cve_nist:`2023-52530`, :cve_nist:`2023-52917`, | ||
93 | :cve_nist:`2024-45009`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`, | ||
94 | :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`, | ||
95 | :cve_nist:`2024-46731`, :cve_nist:`2024-46732`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, | ||
96 | :cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, | ||
97 | :cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46750`, :cve_nist:`2024-46755`, | ||
98 | :cve_nist:`2024-46759`, :cve_nist:`2024-46761`, :cve_nist:`2024-46763`, :cve_nist:`2024-46771`, | ||
99 | :cve_nist:`2024-46777`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, | ||
100 | :cve_nist:`2024-46783`, :cve_nist:`2024-46791`, :cve_nist:`2024-46795`, :cve_nist:`2024-46798`, | ||
101 | :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46805`, :cve_nist:`2024-46807`, | ||
102 | :cve_nist:`2024-46810`, :cve_nist:`2024-46814`, :cve_nist:`2024-46815`, :cve_nist:`2024-46817`, | ||
103 | :cve_nist:`2024-46818`, :cve_nist:`2024-46819`, :cve_nist:`2024-46822`, :cve_nist:`2024-46828`, | ||
104 | :cve_nist:`2024-46829`, :cve_nist:`2024-46832`, :cve_nist:`2024-46840`, :cve_nist:`2024-46844`, | ||
105 | :cve_nist:`2024-47659`, :cve_nist:`2024-47660`, :cve_nist:`2024-47663`, :cve_nist:`2024-47665`, | ||
106 | :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47674`, | ||
107 | :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47690`, | ||
108 | :cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`, | ||
109 | :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`, | ||
110 | :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`, | ||
111 | :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47720`, :cve_nist:`2024-47723`, | ||
112 | :cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47737`, :cve_nist:`2024-47739`, | ||
113 | :cve_nist:`2024-47742`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, | ||
114 | :cve_nist:`2024-47757`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49854`, | ||
115 | :cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`, | ||
116 | :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, :cve_nist:`2024-49871`, | ||
117 | :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`, | ||
118 | :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`, | ||
119 | :cve_nist:`2024-49886`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, | ||
120 | :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, | ||
121 | :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`, | ||
122 | :cve_nist:`2024-49924`, :cve_nist:`2024-49927`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`, | ||
123 | :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49938`, :cve_nist:`2024-49944`, | ||
124 | :cve_nist:`2024-49946`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49952`, | ||
125 | :cve_nist:`2024-49954`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, | ||
126 | :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`, | ||
127 | :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`, | ||
128 | :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`, | ||
129 | :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`, | ||
130 | :cve_nist:`2024-50001`, :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50006`, | ||
131 | :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`, :cve_nist:`2024-50015`, | ||
132 | :cve_nist:`2024-50019`, :cve_nist:`2024-50024`, :cve_nist:`2024-50031`, :cve_nist:`2024-50033`, | ||
133 | :cve_nist:`2024-50035`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`, | ||
134 | :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`, | ||
135 | :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50062`, :cve_nist:`2024-50074`, | ||
136 | :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50093`, :cve_nist:`2024-50095`, | ||
137 | :cve_nist:`2024-50096`, :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`, | ||
138 | :cve_nist:`2024-50110`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`, :cve_nist:`2024-50117`, | ||
139 | :cve_nist:`2024-50127`, :cve_nist:`2024-50128`, :cve_nist:`2024-50131`, :cve_nist:`2024-50134`, | ||
140 | :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, :cve_nist:`2024-50148`, | ||
141 | :cve_nist:`2024-50150`, :cve_nist:`2024-50151`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`, | ||
142 | :cve_nist:`2024-50156`, :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`, | ||
143 | :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`, :cve_nist:`2024-50179`, | ||
144 | :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, :cve_nist:`2024-50182`, :cve_nist:`2024-50184`, | ||
145 | :cve_nist:`2024-50185`, :cve_nist:`2024-50186`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`, | ||
146 | :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`, | ||
147 | :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, | ||
148 | :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, | ||
149 | :cve_nist:`2024-50229`, :cve_nist:`2024-50230`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`, | ||
150 | :cve_nist:`2024-50234`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50244`, | ||
151 | :cve_nist:`2024-50245`, :cve_nist:`2024-50247`, :cve_nist:`2024-50251`, :cve_nist:`2024-50257`, | ||
152 | :cve_nist:`2024-50259`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, :cve_nist:`2024-50265`, | ||
153 | :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, :cve_nist:`2024-50273`, | ||
154 | :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, :cve_nist:`2024-50287`, | ||
155 | :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`, :cve_nist:`2024-50301`, | ||
156 | :cve_nist:`2024-50302`, :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`, | ||
157 | :cve_nist:`2024-53058`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, | ||
158 | :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53088`, :cve_nist:`2024-53096`, | ||
159 | :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53145`, :cve_nist:`2024-53146`, | ||
160 | :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`, | ||
161 | :cve_nist:`2024-53157`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`, :cve_nist:`2024-53173`, | ||
162 | :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`, :cve_nist:`2024-56567`, | ||
163 | :cve_nist:`2024-56572`, :cve_nist:`2024-56574`, :cve_nist:`2024-56578`, :cve_nist:`2024-56581`, | ||
164 | :cve_nist:`2024-56593`, :cve_nist:`2024-56600`, :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, | ||
165 | :cve_nist:`2024-56603`, :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56614`, | ||
166 | :cve_nist:`2024-56622`, :cve_nist:`2024-56623`, :cve_nist:`2024-56629`, :cve_nist:`2024-56634`, | ||
167 | :cve_nist:`2024-56640`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`, | ||
168 | :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`, :cve_nist:`2024-56670`, | ||
169 | :cve_nist:`2024-56688`, :cve_nist:`2024-56694`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`, | ||
170 | :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, :cve_nist:`2024-56726`, | ||
171 | :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56745`, | ||
172 | :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`, :cve_nist:`2024-56754`, | ||
173 | :cve_nist:`2024-56756`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`, :cve_nist:`2024-56776`, | ||
174 | :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`, :cve_nist:`2024-56780`, | ||
175 | :cve_nist:`2024-56781`, :cve_nist:`2024-56785` and :cve_nist:`2024-56787` | ||
176 | - ovmf: Fix :cve_nist:`2022-36763`, :cve_nist:`2022-36764`, :cve_nist:`2022-36765`, | ||
177 | :cve_nist:`2023-45229`, :cve_nist:`2023-45230`, :cve_nist:`2023-45231`, :cve_nist:`2023-45232`, | ||
178 | :cve_nist:`2023-45233`, :cve_nist:`2023-45234`, :cve_nist:`2023-45235`, :cve_nist:`2023-45236`, | ||
179 | :cve_nist:`2023-45237`, :cve_nist:`2024-1298` and :cve_nist:`2024-38796` | ||
180 | - pixman: Ignore :cve_nist:`2023-37769` | ||
181 | - python3: Fix :cve_nist:`2024-9287`, :cve_nist:`2024-11168` and :cve_nist:`2024-50602` | ||
182 | - python3-pip: Fix :cve_nist:`2023-5752` | ||
183 | - python3-requests: Fix :cve_nist:`2024-35195` | ||
184 | - python3-zipp: Fix :cve_nist:`2024-5569` | ||
185 | - qemu: Fix :cve_nist:`2024-3446`, :cve_nist:`2024-3447` and :cve_nist:`2024-6505` | ||
186 | - qemu: Ignore :cve_nist:`2022-36648` | ||
187 | - subversion: Fix :cve_nist:`2024-46901` | ||
188 | - tiff: Fix :cve_nist:`2023-3164` | ||
189 | - tiff: Ignore :cve_nist:`2023-2731` | ||
190 | - webkitgtk: Fix :cve_nist:`2024-40776` and :cve_nist:`2024-40780` | ||
191 | - xserver-xorg: Fix :cve_nist:`2024-9632` | ||
192 | - xwayland: Fix :cve_nist:`2023-5380` and :cve_nist:`2024-0229` | ||
193 | |||
194 | |||
195 | Fixes in Yocto-4.0.24 | ||
196 | ~~~~~~~~~~~~~~~~~~~~~ | ||
197 | |||
198 | - base-passwd: Add the sgx group | ||
199 | - base-passwd: Regenerate the patches | ||
200 | - base-passwd: Update the status for two patches | ||
201 | - base-passwd: Update to 3.5.52 | ||
202 | - base-passwd: add the wheel group | ||
203 | - base-passwd: fix patchreview warning | ||
204 | - bitbake: fetch2: use persist_data context managers | ||
205 | - bitbake: fetch/wget: Increase timeout to 100s from 30s | ||
206 | - bitbake: persist_data: close connection in SQLTable __exit__ | ||
207 | - build-appliance-image: Update to kirkstone head revision | ||
208 | - builder: set :term:`CVE_PRODUCT` | ||
209 | - contributor-guide: submit-changes.rst: suggest to remove the git signature | ||
210 | - cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR` | ||
211 | - dbus: disable assertions and enable only modular tests | ||
212 | - do_package/sstate/sstatesig: Change timestamp clamping to hash output only | ||
213 | - docs: Gather dependencies in poky.yaml.in | ||
214 | - docs: standards.md: add a section on admonitions | ||
215 | - gstreamer1.0: improve test reliability | ||
216 | - linux-yocto/5.10: update to v5.10.227 | ||
217 | - linux-yocto/5.15: update to v5.15.175 | ||
218 | - llvm: reduce size of -dbg package | ||
219 | - lttng-modules: fix build error after kernel update to 5.15.171 | ||
220 | - migration-guides: add release notes for 4.0.23 | ||
221 | - ninja: fix build with python 3.13 | ||
222 | - oeqa/utils/gitarchive: Return tag name and improve exclude handling | ||
223 | - ovmf-native: remove .pyc files from install | ||
224 | - package.bbclass: Use shlex instead of deprecated pipes | ||
225 | - package_rpm: restrict rpm to 4 threads | ||
226 | - package_rpm: use zstd's default compression level | ||
227 | - poky.conf: add new tested distros | ||
228 | - poky.conf: bump version for 4.0.24 | ||
229 | - poky.yaml.in: add missing locales dependency | ||
230 | - python3: upgrade to 3.10.16 | ||
231 | - ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication | ||
232 | - ref-manual: classes: fix bin_package description | ||
233 | - ref-manual: devtool-reference: add warning note on deploy-target and shared objects | ||
234 | - ref-manual: move runtime-testing section to the test-manual | ||
235 | - ref-manual: packages: move ptest section to the test-manual | ||
236 | - ref-manual: system-requirements: update list of supported distros | ||
237 | - ref-manual: use standardized method accross both ubuntu and debian for locale install | ||
238 | - resulttool: Add --logfile-archive option to store mode | ||
239 | - resulttool: Allow store to filter to specific revisions | ||
240 | - resulttool: Clean up repoducible build logs | ||
241 | - resulttool: Fix passthrough of --all files in store mode | ||
242 | - resulttool: Handle ltp rawlogs as well as ptest | ||
243 | - resulttool: Improve repo layout for oeselftest results | ||
244 | - resulttool: Trim the precision of duration information | ||
245 | - resulttool: Use single space indentation in json output | ||
246 | - rootfs-postcommands.bbclass: make opkg status reproducible | ||
247 | - rxvt-unicode.inc: disable the terminfo installation by setting TIC to : | ||
248 | - sanity: check for working user namespaces | ||
249 | - scripts/install-buildtools: Update to 4.0.22 | ||
250 | - selftest/reproducible: Clean up pathnames | ||
251 | - selftest/reproducible: Drop rawlogs | ||
252 | - test-manual: reproducible-builds.rst: document :term:`OEQA_REPRODUCIBLE_TEST_TARGET` and | ||
253 | :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS` | ||
254 | - test-manual: reproducible-builds.rst: show how to build a single package | ||
255 | - toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails | ||
256 | - tzdata & tzcode-native: upgrade 2024b | ||
257 | - udev-extraconf: fix network.sh script did not configure hotplugged interfaces | ||
258 | - unzip: Fix configure tests to use modern C | ||
259 | - webkitgtk: Fix build on 32bit arm | ||
260 | - webkitgtk: fix perl-native dependency | ||
261 | - webkitgtk: reduce size of -dbg package | ||
262 | - wireless-regdb: upgrade to 2024.10.07 | ||
263 | |||
264 | |||
265 | Known Issues in Yocto-4.0.24 | ||
266 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
267 | |||
268 | - N/A | ||
269 | |||
270 | Contributors to Yocto-4.0.24 | ||
271 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
272 | |||
273 | Thanks to the following people who contributed to this release: | ||
274 | |||
275 | - Aleksandar Nikolic | ||
276 | - Alex Kiernan | ||
277 | - Alexander Kanavin | ||
278 | - Alexandre Belloni | ||
279 | - Antonin Godard | ||
280 | - Archana Polampalli | ||
281 | - Bruce Ashfield | ||
282 | - Changqing Li | ||
283 | - Chen Qi | ||
284 | - Chris Laplante | ||
285 | - Divya Chellam | ||
286 | - Ernst Persson | ||
287 | - Guénaël Muller | ||
288 | - Hitendra Prajapati | ||
289 | - Hongxu Jia | ||
290 | - Jiaying Song | ||
291 | - Jinfeng Wang | ||
292 | - Khem Raj | ||
293 | - Lee Chee Yang | ||
294 | - Liyin Zhang | ||
295 | - Louis Rannou | ||
296 | - Markus Volk | ||
297 | - Mikko Rapeli | ||
298 | - Ovidiu Panait | ||
299 | - Peter Kjellerstedt | ||
300 | - Peter Marko | ||
301 | - Regis Dargent | ||
302 | - Richard Purdie | ||
303 | - Rohini Sangam | ||
304 | - Ross Burton | ||
305 | - Soumya Sambu | ||
306 | - Steve Sakoman | ||
307 | - Trevor Gamblin | ||
308 | - Vijay Anusuri | ||
309 | - Wang Mingyu | ||
310 | - Yogita Urade | ||
311 | - Zahir Hussain | ||
312 | |||
313 | |||
314 | Repositories / Downloads for Yocto-4.0.24 | ||
315 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
316 | |||
317 | poky | ||
318 | |||
319 | - Repository Location: :yocto_git:`/poky` | ||
320 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
321 | - Tag: :yocto_git:`yocto-4.0.24 </poky/log/?h=yocto-4.0.24>` | ||
322 | - Git Revision: :yocto_git:`f50532593651dff82bc952288d786c55038c2c86 </poky/commit/?id=f50532593651dff82bc952288d786c55038c2c86>` | ||
323 | - Release Artefact: poky-f50532593651dff82bc952288d786c55038c2c86 | ||
324 | - sha: 0aa062d19510394748db9a2d6ded2d764f435383296d9c94fb6b25755280556e | ||
325 | - Download Locations: | ||
326 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2 | ||
327 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2 | ||
328 | |||
329 | openembedded-core | ||
330 | |||
331 | - Repository Location: :oe_git:`/openembedded-core` | ||
332 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
333 | - Tag: :oe_git:`yocto-4.0.24 </openembedded-core/log/?h=yocto-4.0.24>` | ||
334 | - Git Revision: :oe_git:`a270d4c957259761bcc7382fcc54642a02f9fc7d </openembedded-core/commit/?id=a270d4c957259761bcc7382fcc54642a02f9fc7d>` | ||
335 | - Release Artefact: oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d | ||
336 | - sha: b08b9b16c8ffa587d521ad28e24e38c79d757a6f0839d18165ebac3081a34b68 | ||
337 | - Download Locations: | ||
338 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2 | ||
339 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2 | ||
340 | |||
341 | meta-mingw | ||
342 | |||
343 | - Repository Location: :yocto_git:`/meta-mingw` | ||
344 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
345 | - Tag: :yocto_git:`yocto-4.0.24 </meta-mingw/log/?h=yocto-4.0.24>` | ||
346 | - Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>` | ||
347 | - Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e | ||
348 | - sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8 | ||
349 | - Download Locations: | ||
350 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
351 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
352 | |||
353 | meta-gplv2 | ||
354 | |||
355 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
356 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
357 | - Tag: :yocto_git:`yocto-4.0.24 </meta-gplv2/log/?h=yocto-4.0.24>` | ||
358 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
359 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
360 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
361 | - Download Locations: | ||
362 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
363 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
364 | |||
365 | bitbake | ||
366 | |||
367 | - Repository Location: :oe_git:`/bitbake` | ||
368 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
369 | - Tag: :oe_git:`yocto-4.0.24 </bitbake/log/?h=yocto-4.0.24>` | ||
370 | - Git Revision: :oe_git:`3f88b005244a0afb5d5c7260e54a94a453ec9b3e </bitbake/commit/?id=3f88b005244a0afb5d5c7260e54a94a453ec9b3e>` | ||
371 | - Release Artefact: bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e | ||
372 | - sha: 31f442b72ec7d81ca75509b1a7179c3fe3942528b1e31c823b21a413244bd15b | ||
373 | - Download Locations: | ||
374 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2 | ||
375 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2 | ||
376 | |||
377 | yocto-docs | ||
378 | |||
379 | - Repository Location: :yocto_git:`/yocto-docs` | ||
380 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
381 | - Tag: :yocto_git:`yocto-4.0.24 </yocto-docs/log/?h=yocto-4.0.24>` | ||
382 | - Git Revision: :yocto_git:`3128bf149f40928e6c2a3e264590a0c6c9778c6a </yocto-docs/commit/?id=3128bf149f40928e6c2a3e264590a0c6c9778c6a>` | ||
383 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.25.rst b/documentation/migration-guides/release-notes-4.0.25.rst new file mode 100644 index 0000000000..e52f57913f --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.25.rst | |||
@@ -0,0 +1,167 @@ | |||
1 | Release notes for Yocto-4.0.25 (Kirkstone) | ||
2 | ------------------------------------------ | ||
3 | |||
4 | Security Fixes in Yocto-4.0.25 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | - avahi: Fix :cve_nist:`2024-52616` | ||
8 | - binutils: Fix :cve_nist:`2024-53589` | ||
9 | - gdb: Fix :cve_nist:`2024-53589` | ||
10 | - go: Fix :cve_nist:`2024-34155`, :cve_nist:`2024-34156`, :cve_nist:`2024-34158` and | ||
11 | :cve_nist:`2024-45336` | ||
12 | - gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`, | ||
13 | :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`, | ||
14 | :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, | ||
15 | :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, | ||
16 | :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, | ||
17 | :cve_nist:`2024-47777`, :cve_nist:`2024-47778`, :cve_nist:`2024-47834`, :cve_nist:`2024-47602`, | ||
18 | :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775` | ||
19 | and :cve_nist:`2024-47776` | ||
20 | - linux-yocto/5.15: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-55916`, :cve_nist:`2024-56369`, | ||
21 | :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56715`, :cve_nist:`2024-56716`, | ||
22 | :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57841`, :cve_nist:`2024-57890`, | ||
23 | :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, | ||
24 | :cve_nist:`2024-57938`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21665`, | ||
25 | :cve_nist:`2025-21666`, :cve_nist:`2025-21669`, :cve_nist:`2025-21680`, :cve_nist:`2025-21683`, | ||
26 | :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699` | ||
27 | - ofono: Fix :cve_nist:`2024-7539`, :cve_nist:`2024-7540`, :cve_nist:`2024-7541`, | ||
28 | :cve_nist:`2024-7542`, :cve_nist:`2024-7543`, :cve_nist:`2024-7544`, :cve_nist:`2024-7545`, | ||
29 | :cve_nist:`2024-7546` and :cve_nist:`2024-7547` | ||
30 | - openssl: Fix :cve_nist:`2024-13176` | ||
31 | - rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`, | ||
32 | :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747` | ||
33 | - ruby: Fix :cve_nist:`2024-49761` | ||
34 | - socat: Fix :cve_nist:`2024-54661` | ||
35 | - vte: Fix :cve_nist:`2024-37535` | ||
36 | - wget: Fix :cve_nist:`2024-10524` | ||
37 | |||
38 | |||
39 | Fixes in Yocto-4.0.25 | ||
40 | ~~~~~~~~~~~~~~~~~~~~~ | ||
41 | |||
42 | - bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48 | ||
43 | - build-appliance-image: Update to kirkstone head revision | ||
44 | - classes-global/insane: Look up all runtime providers for file-rdeps | ||
45 | - classes/nativesdk: also override :term:`TUNE_PKGARCH` | ||
46 | - classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture | ||
47 | - cmake: apply parallel build settings to ptest tasks | ||
48 | - dev-manual/building: document the initramfs-framework recipe | ||
49 | - docs: Update autobuilder URLs to valkyrie | ||
50 | - documentation: Fix typo in standards.md | ||
51 | - glibc: Suppress GCC -Os warning on user2netname for sunrpc | ||
52 | - glibc: stable 2.35 branch updates | ||
53 | - lib/packagedata.py: Add API to iterate over rprovides | ||
54 | - linux-yocto/5.15: upgrade to v5.15.178 | ||
55 | - migration-guides: add release notes for 4.0.24 | ||
56 | - openssl: upgrade to 3.0.16 | ||
57 | - poky.conf: bump version for 4.0.25 | ||
58 | - python3: Treat UID/GID overflow as failure | ||
59 | - rsync: Delete pedantic errors re-ordering patch | ||
60 | - rsync: upgrade to 3.2.7 | ||
61 | - rust-common.bbclass: soft assignment for RUSTLIB path | ||
62 | - scripts/install-buildtools: Update to 4.0.23 | ||
63 | - test-manual/reproducible-builds: fix reproducible links | ||
64 | |||
65 | |||
66 | Known Issues in Yocto-4.0.25 | ||
67 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
68 | |||
69 | - N/A | ||
70 | |||
71 | |||
72 | Contributors to Yocto-4.0.25 | ||
73 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
74 | |||
75 | - Aleksandar Nikolic | ||
76 | - Alexander Kanavin | ||
77 | - Antonin Godard | ||
78 | - Archana Polampalli | ||
79 | - Bruce Ashfield | ||
80 | - Deepesh Varatharajan | ||
81 | - Divya Chellam | ||
82 | - Joshua Watt | ||
83 | - Khem Raj | ||
84 | - Lee Chee Yang | ||
85 | - Nikhil R | ||
86 | - Pedro Ferreira | ||
87 | - Peter Marko | ||
88 | - Praveen Kumar | ||
89 | - Richard Purdie | ||
90 | - Ross Burton | ||
91 | - Simon A. Eugster | ||
92 | - Steve Sakoman | ||
93 | - Yash Shinde | ||
94 | - Yogita Urade | ||
95 | - Zhang Peng | ||
96 | |||
97 | |||
98 | Repositories / Downloads for Yocto-4.0.25 | ||
99 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
100 | |||
101 | poky | ||
102 | |||
103 | - Repository Location: :yocto_git:`/poky` | ||
104 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
105 | - Tag: :yocto_git:`yocto-4.0.25 </poky/log/?h=yocto-4.0.25>` | ||
106 | - Git Revision: :yocto_git:`b5aa03f336c121269551f9e7baed4c677c76bb39 </poky/commit/?id=b5aa03f336c121269551f9e7baed4c677c76bb39>` | ||
107 | - Release Artefact: poky-b5aa03f336c121269551f9e7baed4c677c76bb39 | ||
108 | - sha: 7afbcb25f0dd89a4fb6dd4c5945061705ef9ce79a6863806278603273c2b3b4a | ||
109 | - Download Locations: | ||
110 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2 | ||
111 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2 | ||
112 | |||
113 | openembedded-core | ||
114 | |||
115 | - Repository Location: :oe_git:`/openembedded-core` | ||
116 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
117 | - Tag: :oe_git:`yocto-4.0.25 </openembedded-core/log/?h=yocto-4.0.25>` | ||
118 | - Git Revision: :oe_git:`5a794fd244f7fdeb426bd5e3def6b4effc0e8c62 </openembedded-core/commit/?id=5a794fd244f7fdeb426bd5e3def6b4effc0e8c62>` | ||
119 | - Release Artefact: oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62 | ||
120 | - sha: 8fc93109693e5f4702b3fe0633b6be833605291b3d595dc8bdeb6379f40cd2de | ||
121 | - Download Locations: | ||
122 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2 | ||
123 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2 | ||
124 | |||
125 | meta-mingw | ||
126 | |||
127 | - Repository Location: :yocto_git:`/meta-mingw` | ||
128 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
129 | - Tag: :yocto_git:`yocto-4.0.25 </meta-mingw/log/?h=yocto-4.0.25>` | ||
130 | - Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>` | ||
131 | - Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e | ||
132 | - sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8 | ||
133 | - Download Locations: | ||
134 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
135 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
136 | |||
137 | meta-gplv2 | ||
138 | |||
139 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
140 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
141 | - Tag: :yocto_git:`yocto-4.0.25 </meta-gplv2/log/?h=yocto-4.0.25>` | ||
142 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
143 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
144 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
145 | - Download Locations: | ||
146 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
147 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
148 | |||
149 | bitbake | ||
150 | |||
151 | - Repository Location: :oe_git:`/bitbake` | ||
152 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
153 | - Tag: :oe_git:`yocto-4.0.25 </bitbake/log/?h=yocto-4.0.25>` | ||
154 | - Git Revision: :oe_git:`e71f1ce53cf3b8320caa481ae62d1ce2900c4670 </bitbake/commit/?id=e71f1ce53cf3b8320caa481ae62d1ce2900c4670>` | ||
155 | - Release Artefact: bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670 | ||
156 | - sha: 007eef35174586c85b233f4ec91578956fe21e0236f7ca2c3f90f9d034f94b5b | ||
157 | - Download Locations: | ||
158 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2 | ||
159 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2 | ||
160 | |||
161 | yocto-docs | ||
162 | |||
163 | - Repository Location: :yocto_git:`/yocto-docs` | ||
164 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
165 | - Tag: :yocto_git:`yocto-4.0.25 </yocto-docs/log/?h=yocto-4.0.25>` | ||
166 | - Git Revision: :yocto_git:`c6dce0c77481dee7b0a0fcdc803f755ceccef234 </yocto-docs/commit/?id=c6dce0c77481dee7b0a0fcdc803f755ceccef234>` | ||
167 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.26.rst b/documentation/migration-guides/release-notes-4.0.26.rst new file mode 100644 index 0000000000..42ff28c6a2 --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.26.rst | |||
@@ -0,0 +1,263 @@ | |||
1 | Release notes for Yocto-4.0.26 (Kirkstone) | ||
2 | ------------------------------------------ | ||
3 | |||
4 | Security Fixes in Yocto-4.0.26 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | |||
8 | - bind: Fix :cve_nist:`2024-11187` and :cve_nist:`2024-12705` | ||
9 | - binutils: Fix :cve_nist:`2025-0840` | ||
10 | - elfutils: Fix :cve_nist:`2025-1352` and :cve_nist:`2025-1372` | ||
11 | - ffmpeg: Fix CVE-2024-28661, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`, :cve_nist:`2024-36616`, | ||
12 | :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2025-0518` and :cve_nist:`2025-25473` | ||
13 | - ffmpeg: Ignore :cve_nist:`2023-46407`, :cve_nist:`2023-47470`, :cve_nist:`2024-7272`, | ||
14 | :cve_nist:`2024-22860`, :cve_nist:`2024-22861` and :cve_nist:`2024-22862` | ||
15 | - freetype: Fix :cve_nist:`2025-27363` | ||
16 | - gnutls: Fix :cve_nist:`2024-12243` | ||
17 | - grub: Fix :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, :cve_nist:`2024-45776`, | ||
18 | :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, :cve_nist:`2024-45780`, | ||
19 | :cve_nist:`2024-45781`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`, | ||
20 | :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0684`, | ||
21 | :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`, :cve_nist:`2025-0678`, | ||
22 | :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125` | ||
23 | - gstreamer1.0-rtsp-server: fix :cve_nist:`2024-44331` | ||
24 | - libarchive: Fix :cve_nist:`2025-25724` | ||
25 | - libarchive: Ignore :cve_nist:`2025-1632` | ||
26 | - libcap: Fix :cve_nist:`2025-1390` | ||
27 | - linux-yocto/5.10: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-43098`, :cve_nist:`2024-47143`, | ||
28 | :cve_nist:`2024-48881`, :cve_nist:`2024-50051`, :cve_nist:`2024-50074`, :cve_nist:`2024-50082`, | ||
29 | :cve_nist:`2024-50083`, :cve_nist:`2024-50099`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`, | ||
30 | :cve_nist:`2024-50117`, :cve_nist:`2024-50142`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`, | ||
31 | :cve_nist:`2024-50151`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`, | ||
32 | :cve_nist:`2024-50185`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`, | ||
33 | :cve_nist:`2024-50195`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, :cve_nist:`2024-50202`, | ||
34 | :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, :cve_nist:`2024-50229`, | ||
35 | :cve_nist:`2024-50230`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`, :cve_nist:`2024-50236`, | ||
36 | :cve_nist:`2024-50237`, :cve_nist:`2024-50251`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, | ||
37 | :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, | ||
38 | :cve_nist:`2024-50273`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, | ||
39 | :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`, | ||
40 | :cve_nist:`2024-50301`, :cve_nist:`2024-50302`, :cve_nist:`2024-53042`, :cve_nist:`2024-53052`, | ||
41 | :cve_nist:`2024-53057`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, | ||
42 | :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53096`, :cve_nist:`2024-53097`, | ||
43 | :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53104`, :cve_nist:`2024-53145`, | ||
44 | :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`, | ||
45 | :cve_nist:`2024-53157`, :cve_nist:`2024-53161`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`, | ||
46 | :cve_nist:`2024-53173`, :cve_nist:`2024-53174`, :cve_nist:`2024-53194`, :cve_nist:`2024-53197`, | ||
47 | :cve_nist:`2024-53217`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`, | ||
48 | :cve_nist:`2024-53239`, :cve_nist:`2024-55916`, :cve_nist:`2024-56548`, :cve_nist:`2024-56558`, | ||
49 | :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`, | ||
50 | :cve_nist:`2024-56574`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`, | ||
51 | :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`, | ||
52 | :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56605`, | ||
53 | :cve_nist:`2024-56606`, :cve_nist:`2024-56615`, :cve_nist:`2024-56619`, :cve_nist:`2024-56623`, | ||
54 | :cve_nist:`2024-56629`, :cve_nist:`2024-56634`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, | ||
55 | :cve_nist:`2024-56648`, :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`, | ||
56 | :cve_nist:`2024-56670`, :cve_nist:`2024-56688`, :cve_nist:`2024-56698`, :cve_nist:`2024-56704`, | ||
57 | :cve_nist:`2024-56716`, :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, | ||
58 | :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, | ||
59 | :cve_nist:`2024-56748`, :cve_nist:`2024-56754`, :cve_nist:`2024-56756`, :cve_nist:`2024-56770`, | ||
60 | :cve_nist:`2024-56779`, :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56785`, | ||
61 | :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57850`, :cve_nist:`2024-57874`, | ||
62 | :cve_nist:`2024-57890`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`, | ||
63 | :cve_nist:`2024-57902`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57913`, | ||
64 | :cve_nist:`2024-57922`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57946`, | ||
65 | :cve_nist:`2024-57951`, :cve_nist:`2025-21638`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`, | ||
66 | :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699` | ||
67 | - linux-yocto/5.15: Fix :cve_nist:`2024-57979`, :cve_nist:`2024-58034`, :cve_nist:`2024-58052`, | ||
68 | :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`, :cve_nist:`2024-58069`, | ||
69 | :cve_nist:`2024-58071`, :cve_nist:`2024-58076`, :cve_nist:`2024-58083`, :cve_nist:`2025-21700`, | ||
70 | :cve_nist:`2025-21703`, :cve_nist:`2025-21715`, :cve_nist:`2025-21722`, :cve_nist:`2025-21727`, | ||
71 | :cve_nist:`2025-21731`, :cve_nist:`2025-21753`, :cve_nist:`2025-21756`, :cve_nist:`2025-21760`, | ||
72 | :cve_nist:`2025-21761`, :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`, | ||
73 | :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21887`, :cve_nist:`2025-21898`, | ||
74 | :cve_nist:`2025-21904`, :cve_nist:`2025-21905`, :cve_nist:`2025-21912`, :cve_nist:`2025-21917`, | ||
75 | :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`, :cve_nist:`2025-21934`, | ||
76 | :cve_nist:`2025-21943`, :cve_nist:`2025-21948` and :cve_nist:`2025-21951` | ||
77 | - libpcre2: Ignore :cve_nist:`2022-1586` | ||
78 | - libtasn1: Fix :cve_nist:`2024-12133` | ||
79 | - libxml2: Fix :cve_nist:`2022-49043`, :cve_nist:`2024-56171`, :cve_nist:`2025-24928` and | ||
80 | :cve_nist:`2025-27113` | ||
81 | - libxslt: Fix :cve_nist:`2024-55549` and :cve_nist:`2025-24855` | ||
82 | - llvm: Fix :cve_nist:`2024-0151` | ||
83 | - mpg123: Fix :cve_nist:`2024-10573` | ||
84 | - openssh: Fix :cve_nist:`2025-26465` | ||
85 | - ovmf: Revert Fix for CVE-2023-45236 :cve_nist:`2023-45237` | ||
86 | - perl: Ignore :cve_nist:`2023-47038` | ||
87 | - puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837` | ||
88 | - python3: Fix :cve_nist:`2025-0938` | ||
89 | - ruby: Fix :cve_nist:`2024-41946`, :cve_nist:`2025-27219` and :cve_nist:`2025-27220` | ||
90 | - subversion: Ignore :cve_nist:`2024-45720` | ||
91 | - systemd: Fix :cve_nist:`2022-3821`, :cve_nist:`2022-4415`, :cve_nist:`2022-45873` and | ||
92 | :cve_nist:`2023-7008` | ||
93 | - tiff: mark :cve_nist:`2023-30774` as patched with existing patch | ||
94 | - u-boot: Fix :cve_nist:`2022-2347`, :cve_nist:`2022-30767`, :cve_nist:`2022-30790`, | ||
95 | :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`, :cve_nist:`2024-57257`, | ||
96 | :cve_nist:`2024-57258` and :cve_nist:`2024-57259` | ||
97 | - vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-22134`, :cve_nist:`2025-24014`, | ||
98 | :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and :cve_nist:`2025-29768` | ||
99 | - xserver-xorg: Fix :cve_nist:`2022-49737`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, | ||
100 | :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, | ||
101 | :cve_nist:`2025-26600` and :cve_nist:`2025-26601` | ||
102 | - xwayland: Fix :cve_nist:`2022-49737`, :cve_nist:`2024-9632`, :cve_nist:`2024-21885`, | ||
103 | :cve_nist:`2024-21886`, :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31083`, | ||
104 | :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, | ||
105 | :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600` and :cve_nist:`2025-26601` | ||
106 | - zlib: Fix :cve_nist:`2014-9485` | ||
107 | |||
108 | |||
109 | |||
110 | Fixes in Yocto-4.0.26 | ||
111 | ~~~~~~~~~~~~~~~~~~~~~ | ||
112 | |||
113 | - bind: Upgrade to 9.18.33 | ||
114 | - bitbake: cache: bump cache version | ||
115 | - bitbake: siggen.py: Improve taskhash reproducibility | ||
116 | - boost: fix do_fetch error | ||
117 | - build-appliance-image: Update to kirkstone head revision | ||
118 | - contributor-guide/submit-changes: add policy on AI generated code | ||
119 | - cve-update-nvd2-native: handle missing vulnStatus | ||
120 | - docs: Add favicon for the documentation html | ||
121 | - docs: Remove all mention of core-image-lsb | ||
122 | - libtasn1: upgrade to 4.20.0 | ||
123 | - libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt | ||
124 | - libxml2: fix compilation of explicit child axis in pattern | ||
125 | - linux-yocto/5.10: update to v5.10.234 | ||
126 | - linux-yocto/5.15: update to v5.15.179 | ||
127 | - mesa: Fix missing GLES3 headers in SDK sysroot | ||
128 | - mesa: Update :term:`SRC_URI` | ||
129 | - meta: Enable '-o pipefail' for the SDK installer | ||
130 | - migration-guides: add release notes for 4.0.25 | ||
131 | - poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS` | ||
132 | - poky.conf: bump version for 4.0.26 | ||
133 | - procps: replaced one use of fputs(3) with a write(2) call | ||
134 | - ref-manual: don't refer to poky-lsb | ||
135 | - scripts/install-buildtools: Update to 4.0.24 | ||
136 | - scritps/runqemu: Ensure we only have two serial ports | ||
137 | - systemd: upgrade to 250.14 | ||
138 | - tzcode-native: Fix compiler setting from 2023d version | ||
139 | - tzcode: Update :term:`SRC_URI` | ||
140 | - tzdata/tzcode-native: upgrade 2025a | ||
141 | - vim: Upgrade to 9.1.1198 | ||
142 | - virglrenderer: fix do_fetch error | ||
143 | - vulnerabilities/classes: remove references to cve-check text format | ||
144 | - xz: Update :term:`SRC_URI` | ||
145 | - yocto-uninative: Update to 4.7 for glibc 2.41 | ||
146 | |||
147 | |||
148 | Known Issues in Yocto-4.0.26 | ||
149 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
150 | |||
151 | - N/A | ||
152 | |||
153 | |||
154 | Contributors to Yocto-4.0.26 | ||
155 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
156 | |||
157 | Thanks to the following people who contributed to this release: | ||
158 | |||
159 | - Aleksandar Nikolic | ||
160 | - Alessio Cascone | ||
161 | - Antonin Godard | ||
162 | - Archana Polampalli | ||
163 | - Ashish Sharma | ||
164 | - Bruce Ashfield | ||
165 | - Carlos Dominguez | ||
166 | - Deepesh Varatharajan | ||
167 | - Divya Chellam | ||
168 | - Guocai He | ||
169 | - Hitendra Prajapati | ||
170 | - Hongxu Jia | ||
171 | - Jiaying Song | ||
172 | - Johannes Kauffmann | ||
173 | - Kai Kang | ||
174 | - Lee Chee Yang | ||
175 | - Libo Chen | ||
176 | - Marta Rybczynska | ||
177 | - Michael Halstead | ||
178 | - Mingli Yu | ||
179 | - Moritz Haase | ||
180 | - Narpat Mali | ||
181 | - Paulo Neves | ||
182 | - Peter Marko | ||
183 | - Priyal Doshi | ||
184 | - Richard Purdie | ||
185 | - Robert Yang | ||
186 | - Ross Burton | ||
187 | - Sakib Sajal | ||
188 | - Steve Sakoman | ||
189 | - Vijay Anusuri | ||
190 | - Yogita Urade | ||
191 | - Zhang Peng | ||
192 | |||
193 | |||
194 | Repositories / Downloads for Yocto-4.0.26 | ||
195 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
196 | |||
197 | poky | ||
198 | |||
199 | - Repository Location: :yocto_git:`/poky` | ||
200 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
201 | - Tag: :yocto_git:`yocto-4.0.26 </poky/log/?h=yocto-4.0.26>` | ||
202 | - Git Revision: :yocto_git:`d70d287a77d5026b698ac237ab865b2dafd36bb8 </poky/commit/?id=d70d287a77d5026b698ac237ab865b2dafd36bb8>` | ||
203 | - Release Artefact: poky-d70d287a77d5026b698ac237ab865b2dafd36bb8 | ||
204 | - sha: 3ebfadb8bff4c1ca12b3cf3e4ef6e3ac2ce52b73570266daa98436c9959249f2 | ||
205 | - Download Locations: | ||
206 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2 | ||
207 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2 | ||
208 | |||
209 | openembedded-core | ||
210 | |||
211 | - Repository Location: :oe_git:`/openembedded-core` | ||
212 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
213 | - Tag: :oe_git:`yocto-4.0.26 </openembedded-core/log/?h=yocto-4.0.26>` | ||
214 | - Git Revision: :oe_git:`1efbe1004bc82e7c14c1e8bd4ce644f5015c3346 </openembedded-core/commit/?id=1efbe1004bc82e7c14c1e8bd4ce644f5015c3346>` | ||
215 | - Release Artefact: oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346 | ||
216 | - sha: d3805e034dabd0865dbf55488b2c16d4ea0351d37aa826f0054a6bfdde5a8be9 | ||
217 | - Download Locations: | ||
218 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2 | ||
219 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2 | ||
220 | |||
221 | meta-mingw | ||
222 | |||
223 | - Repository Location: :yocto_git:`/meta-mingw` | ||
224 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
225 | - Tag: :yocto_git:`yocto-4.0.26 </meta-mingw/log/?h=yocto-4.0.26>` | ||
226 | - Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>` | ||
227 | - Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e | ||
228 | - sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8 | ||
229 | - Download Locations: | ||
230 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
231 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
232 | |||
233 | meta-gplv2 | ||
234 | |||
235 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
236 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
237 | - Tag: :yocto_git:`yocto-4.0.26 </meta-gplv2/log/?h=yocto-4.0.26>` | ||
238 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
239 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
240 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
241 | - Download Locations: | ||
242 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
243 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
244 | |||
245 | bitbake | ||
246 | |||
247 | - Repository Location: :oe_git:`/bitbake` | ||
248 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
249 | - Tag: :oe_git:`yocto-4.0.26 </bitbake/log/?h=yocto-4.0.26>` | ||
250 | - Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>` | ||
251 | - Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e | ||
252 | - sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a | ||
253 | - Download Locations: | ||
254 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2 | ||
255 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2 | ||
256 | |||
257 | yocto-docs | ||
258 | |||
259 | - Repository Location: :yocto_git:`/yocto-docs` | ||
260 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
261 | - Tag: :yocto_git:`yocto-4.0.26 </yocto-docs/log/?h=yocto-4.0.26>` | ||
262 | - Git Revision: :yocto_git:`9b4c36f7b02dd4bedfec90206744a1e90e37733c </yocto-docs/commit/?id=9b4c36f7b02dd4bedfec90206744a1e90e37733c>` | ||
263 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.27.rst b/documentation/migration-guides/release-notes-4.0.27.rst new file mode 100644 index 0000000000..e37e2f78b6 --- /dev/null +++ b/documentation/migration-guides/release-notes-4.0.27.rst | |||
@@ -0,0 +1,153 @@ | |||
1 | Release notes for Yocto-4.0.27 (Kirkstone) | ||
2 | ------------------------------------------ | ||
3 | |||
4 | Security Fixes in Yocto-4.0.27 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | - binutils: Fix :cve_nist:`2025-1178` | ||
8 | - busybox: fix :cve_nist:`2023-39810` | ||
9 | - connman :fix :cve_nist:`2025-32743` | ||
10 | - curl: Ignore :cve_nist:`2025-0725` | ||
11 | - ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`, | ||
12 | :cve_nist:`2025-27834`, :cve_nist:`2025-27835` and :cve_nist:`2025-27836` | ||
13 | - ghostscript: Ignore :cve_nist:`2024-29507`, :cve_nist:`2025-27833` and :cve_nist:`2025-27837` | ||
14 | - glib-2.0: Fix :cve_nist:`2025-3360` | ||
15 | - go: Fix :cve_nist:`2025-22871` | ||
16 | - libarchive: Ignore :cve_nist:`2024-48615` | ||
17 | - libpam: Fix :cve_nist:`2024-10041` | ||
18 | - libsoup-2.4: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906` and :cve_nist:`2025-32909` | ||
19 | - libsoup: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`, | ||
20 | :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913` | ||
21 | and :cve_nist:`2025-32914` | ||
22 | - libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415` | ||
23 | - ofono: Fix :cve_nist:`2024-7537` | ||
24 | - perl: Fix :cve_nist:`2024-56406` | ||
25 | - ppp: Fix :cve_nist:`2024-58250` | ||
26 | - python3-setuptools: Fix :cve_nist:`2024-6345` | ||
27 | - qemu: Ignore :cve_nist:`2023-1386` | ||
28 | - ruby: Fix :cve_nist:`2024-43398` | ||
29 | - sqlite3: Fix :cve_nist:`2025-29088` | ||
30 | - systemd: Ignore :cve_nist:`2022-3821`, :cve_nist:`2022-4415` and :cve_nist:`2022-45873` | ||
31 | |||
32 | |||
33 | Fixes in Yocto-4.0.27 | ||
34 | ~~~~~~~~~~~~~~~~~~~~~ | ||
35 | |||
36 | - Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR" | ||
37 | - build-appliance-image: Update to kirkstone head revision | ||
38 | - cve-update-nvd2-native: add workaround for json5 style list | ||
39 | - docs: Fix dead links that use the :term:`DISTRO` macro | ||
40 | - docs: manuals: remove repeated word | ||
41 | - docs: poky.yaml: introduce DISTRO_LATEST_TAG | ||
42 | - glibc: Add single-threaded fast path to rand() | ||
43 | - glibc: stable 2.35 branch updates | ||
44 | - module.bbclass: add KBUILD_EXTRA_SYMBOLS to install | ||
45 | - perl: enable _GNU_SOURCE define via d_gnulibc | ||
46 | - poky.conf: bump version for 4.0.27 | ||
47 | - ref-manual/variables.rst: document autotools class related variables | ||
48 | - scripts/install-buildtools: Update to 4.0.26 | ||
49 | - systemd: backport patch to fix journal issue | ||
50 | - systemd: systemd-journald fails to setup LogNamespace | ||
51 | - tzdata/tzcode-native: upgrade to 2025b | ||
52 | |||
53 | |||
54 | Known Issues in Yocto-4.0.27 | ||
55 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
56 | |||
57 | - N/A | ||
58 | |||
59 | |||
60 | Contributors to Yocto-4.0.27 | ||
61 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
62 | |||
63 | - Aleksandar Nikolic | ||
64 | - Alexander Kanavin | ||
65 | - Alon Bar-Lev | ||
66 | - Andrew Kreimer | ||
67 | - Antonin Godard | ||
68 | - Chen Qi | ||
69 | - Deepesh Varatharajan | ||
70 | - Divya Chellam | ||
71 | - Haitao Liu | ||
72 | - Haixiao Yan | ||
73 | - Hitendra Prajapati | ||
74 | - Peter Marko | ||
75 | - Praveen Kumar | ||
76 | - Priyal Doshi | ||
77 | - Shubham Kulkarni | ||
78 | - Soumya Sambu | ||
79 | - Steve Sakoman | ||
80 | - Vijay Anusuri | ||
81 | - Yogita Urade | ||
82 | |||
83 | |||
84 | Repositories / Downloads for Yocto-4.0.27 | ||
85 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
86 | |||
87 | poky | ||
88 | |||
89 | - Repository Location: :yocto_git:`/poky` | ||
90 | - Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>` | ||
91 | - Tag: :yocto_git:`yocto-4.0.27 </poky/log/?h=yocto-4.0.27>` | ||
92 | - Git Revision: :yocto_git:`ab9a994a8cd8e06b519a693db444030999d273b7 </poky/commit/?id=ab9a994a8cd8e06b519a693db444030999d273b7>` | ||
93 | - Release Artefact: poky-ab9a994a8cd8e06b519a693db444030999d273b7 | ||
94 | - sha: 77a366c17cf29eef15c6ff3f44e73f81c07288c723fd4a6dbd8c7ee9b79933f3 | ||
95 | - Download Locations: | ||
96 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2 | ||
97 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2 | ||
98 | |||
99 | openembedded-core | ||
100 | |||
101 | - Repository Location: :oe_git:`/openembedded-core` | ||
102 | - Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>` | ||
103 | - Tag: :oe_git:`yocto-4.0.27 </openembedded-core/log/?h=yocto-4.0.27>` | ||
104 | - Git Revision: :oe_git:`e8be08a624b2d024715a5c8b0c37f2345a02336b </openembedded-core/commit/?id=e8be08a624b2d024715a5c8b0c37f2345a02336b>` | ||
105 | - Release Artefact: oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b | ||
106 | - sha: cc5b0fadab021c6dc61f37fc4ff01a1cf657e7c219488ce264bede42f7f6212f | ||
107 | - Download Locations: | ||
108 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2 | ||
109 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2 | ||
110 | |||
111 | meta-mingw | ||
112 | |||
113 | - Repository Location: :yocto_git:`/meta-mingw` | ||
114 | - Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>` | ||
115 | - Tag: :yocto_git:`yocto-4.0.27 </meta-mingw/log/?h=yocto-4.0.27>` | ||
116 | - Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>` | ||
117 | - Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e | ||
118 | - sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8 | ||
119 | - Download Locations: | ||
120 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
121 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2 | ||
122 | |||
123 | meta-gplv2 | ||
124 | |||
125 | - Repository Location: :yocto_git:`/meta-gplv2` | ||
126 | - Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>` | ||
127 | - Tag: :yocto_git:`yocto-4.0.27 </meta-gplv2/log/?h=yocto-4.0.27>` | ||
128 | - Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>` | ||
129 | - Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a | ||
130 | - sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d | ||
131 | - Download Locations: | ||
132 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
133 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2 | ||
134 | |||
135 | bitbake | ||
136 | |||
137 | - Repository Location: :oe_git:`/bitbake` | ||
138 | - Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>` | ||
139 | - Tag: :oe_git:`yocto-4.0.27 </bitbake/log/?h=yocto-4.0.27>` | ||
140 | - Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>` | ||
141 | - Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e | ||
142 | - sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a | ||
143 | - Download Locations: | ||
144 | https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2 | ||
145 | https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2 | ||
146 | |||
147 | yocto-docs | ||
148 | |||
149 | - Repository Location: :yocto_git:`/yocto-docs` | ||
150 | - Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>` | ||
151 | - Tag: :yocto_git:`yocto-4.0.27 </yocto-docs/log/?h=yocto-4.0.27>` | ||
152 | - Git Revision: :yocto_git:`0d51e553d5f83eea6634e03ddc9c7740bf72fcea </yocto-docs/commit/?id=0d51e553d5f83eea6634e03ddc9c7740bf72fcea>` | ||
153 | |||
diff --git a/documentation/migration-guides/release-notes-4.0.3.rst b/documentation/migration-guides/release-notes-4.0.3.rst index 46fe858cb7..1b9559a962 100644 --- a/documentation/migration-guides/release-notes-4.0.3.rst +++ b/documentation/migration-guides/release-notes-4.0.3.rst | |||
@@ -6,21 +6,21 @@ Release notes for Yocto-4.0.3 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.3 | 6 | Security Fixes in Yocto-4.0.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils: fix :cve:`2019-1010204` | 9 | - binutils: fix :cve_nist:`2019-1010204` |
10 | - busybox: fix :cve:`2022-30065` | 10 | - busybox: fix :cve_nist:`2022-30065` |
11 | - cups: ignore :cve:`2022-26691` | 11 | - cups: ignore :cve_nist:`2022-26691` |
12 | - curl: Fix :cve:`2022-32205`, :cve:`2022-32206`, :cve:`2022-32207` and :cve:`2022-32208` | 12 | - curl: Fix :cve_nist:`2022-32205`, :cve_nist:`2022-32206`, :cve_nist:`2022-32207` and :cve_nist:`2022-32208` |
13 | - dpkg: fix :cve:`2022-1664` | 13 | - dpkg: fix :cve_nist:`2022-1664` |
14 | - ghostscript: fix :cve:`2022-2085` | 14 | - ghostscript: fix :cve_nist:`2022-2085` |
15 | - harfbuzz: fix :cve:`2022-33068` | 15 | - harfbuzz: fix :cve_nist:`2022-33068` |
16 | - libtirpc: fix :cve:`2021-46828` | 16 | - libtirpc: fix :cve_nist:`2021-46828` |
17 | - lua: fix :cve:`2022-33099` | 17 | - lua: fix :cve_nist:`2022-33099` |
18 | - nasm: ignore :cve:`2020-18974` | 18 | - nasm: ignore :cve_nist:`2020-18974` |
19 | - qemu: fix :cve:`2022-35414` | 19 | - qemu: fix :cve_nist:`2022-35414` |
20 | - qemu: ignore :cve:`2021-20255` and :cve:`2019-12067` | 20 | - qemu: ignore :cve_nist:`2021-20255` and :cve_nist:`2019-12067` |
21 | - tiff: fix :cve:`2022-1354`, :cve:`2022-1355`, :cve:`2022-2056`, :cve:`2022-2057` and :cve:`2022-2058` | 21 | - tiff: fix :cve_nist:`2022-1354`, :cve_nist:`2022-1355`, :cve_nist:`2022-2056`, :cve_nist:`2022-2057` and :cve_nist:`2022-2058` |
22 | - u-boot: fix :cve:`2022-34835` | 22 | - u-boot: fix :cve_nist:`2022-34835` |
23 | - unzip: fix :cve:`2022-0529` and :cve:`2022-0530` | 23 | - unzip: fix :cve_nist:`2022-0529` and :cve_nist:`2022-0530` |
24 | 24 | ||
25 | 25 | ||
26 | Fixes in Yocto-4.0.3 | 26 | Fixes in Yocto-4.0.3 |
diff --git a/documentation/migration-guides/release-notes-4.0.4.rst b/documentation/migration-guides/release-notes-4.0.4.rst index 1d6e525bbc..41ef095c45 100644 --- a/documentation/migration-guides/release-notes-4.0.4.rst +++ b/documentation/migration-guides/release-notes-4.0.4.rst | |||
@@ -6,17 +6,17 @@ Release notes for Yocto-4.0.4 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.4 | 6 | Security Fixes in Yocto-4.0.4 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils : fix :cve:`2022-38533` | 9 | - binutils : fix :cve_nist:`2022-38533` |
10 | - curl: fix :cve:`2022-35252` | 10 | - curl: fix :cve_nist:`2022-35252` |
11 | - sqlite: fix :cve:`2022-35737` | 11 | - sqlite: fix :cve_nist:`2022-35737` |
12 | - grub2: fix :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734` and :cve:`2022-28735` | 12 | - grub2: fix :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734` and :cve_nist:`2022-28735` |
13 | - u-boot: fix :cve:`2022-30552` and :cve:`2022-33967` | 13 | - u-boot: fix :cve_nist:`2022-30552` and :cve_nist:`2022-33967` |
14 | - libxml2: Ignore :cve:`2016-3709` | 14 | - libxml2: Ignore :cve_nist:`2016-3709` |
15 | - libtiff: fix :cve:`2022-34526` | 15 | - libtiff: fix :cve_nist:`2022-34526` |
16 | - zlib: fix :cve:`2022-37434` | 16 | - zlib: fix :cve_nist:`2022-37434` |
17 | - gnutls: fix :cve:`2022-2509` | 17 | - gnutls: fix :cve_nist:`2022-2509` |
18 | - u-boot: fix :cve:`2022-33103` | 18 | - u-boot: fix :cve_nist:`2022-33103` |
19 | - qemu: fix :cve:`2021-3507`, :cve:`2021-3929`, :cve:`2021-4158`, :cve:`2022-0216` and :cve:`2022-0358` | 19 | - qemu: fix :cve_nist:`2021-3507`, :cve_nist:`2021-3929`, :cve_nist:`2021-4158`, :cve_nist:`2022-0216` and :cve_nist:`2022-0358` |
20 | 20 | ||
21 | 21 | ||
22 | Fixes in Yocto-4.0.4 | 22 | Fixes in Yocto-4.0.4 |
diff --git a/documentation/migration-guides/release-notes-4.0.5.rst b/documentation/migration-guides/release-notes-4.0.5.rst index cdfe85b750..ae061ed633 100644 --- a/documentation/migration-guides/release-notes-4.0.5.rst +++ b/documentation/migration-guides/release-notes-4.0.5.rst | |||
@@ -6,11 +6,11 @@ Release notes for Yocto-4.0.5 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.5 | 6 | Security Fixes in Yocto-4.0.5 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - qemu: fix :cve:`2021-3750`, :cve:`2021-3611` and :cve:`2022-2962` | 9 | - qemu: fix :cve_nist:`2021-3750`, :cve_nist:`2021-3611` and :cve_nist:`2022-2962` |
10 | - binutils : fix :cve:`2022-38126`, :cve:`2022-38127` and :cve:`2022-38128` | 10 | - binutils : fix :cve_nist:`2022-38126`, :cve_nist:`2022-38127` and :cve_nist:`2022-38128` |
11 | - tff: fix :cve:`2022-2867`, :cve:`2022-2868` and :cve:`2022-2869` | 11 | - tff: fix :cve_nist:`2022-2867`, :cve_nist:`2022-2868` and :cve_nist:`2022-2869` |
12 | - inetutils: fix :cve:`2022-39028` | 12 | - inetutils: fix :cve_nist:`2022-39028` |
13 | - go: fix :cve:`2022-27664` | 13 | - go: fix :cve_nist:`2022-27664` |
14 | 14 | ||
15 | Fixes in Yocto-4.0.5 | 15 | Fixes in Yocto-4.0.5 |
16 | ~~~~~~~~~~~~~~~~~~~~ | 16 | ~~~~~~~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-4.0.6.rst b/documentation/migration-guides/release-notes-4.0.6.rst index 76d23fcf0c..e0c0cc09b9 100644 --- a/documentation/migration-guides/release-notes-4.0.6.rst +++ b/documentation/migration-guides/release-notes-4.0.6.rst | |||
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.6 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.6 | 6 | Security Fixes in Yocto-4.0.6 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bash: Fix :cve:`2022-3715` | 9 | - bash: Fix :cve_nist:`2022-3715` |
10 | - curl: Fix :cve:`2022-32221`, :cve:`2022-42915` and :cve:`2022-42916` | 10 | - curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916` |
11 | - dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` | 11 | - dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012` |
12 | - dropbear: Fix :cve:`2021-36369` | 12 | - dropbear: Fix :cve_nist:`2021-36369` |
13 | - ffmpeg: Fix :cve:`2022-3964`, :cve:`2022-3965` | 13 | - ffmpeg: Fix :cve_nist:`2022-3964`, :cve_nist:`2022-3965` |
14 | - go: Fix :cve:`2022-2880` | 14 | - go: Fix :cve_nist:`2022-2880` |
15 | - grub2: Fix :cve:`2022-2601`, :cve:`2022-3775` and :cve:`2022-28736` | 15 | - grub2: Fix :cve_nist:`2022-2601`, :cve_nist:`2022-3775` and :cve_nist:`2022-28736` |
16 | - libarchive: Fix :cve:`2022-36227` | 16 | - libarchive: Fix :cve_nist:`2022-36227` |
17 | - libpam: Fix :cve:`2022-28321` | 17 | - libpam: Fix :cve_nist:`2022-28321` |
18 | - libsndfile1: Fix :cve:`2021-4156` | 18 | - libsndfile1: Fix :cve_nist:`2021-4156` |
19 | - lighttpd: Fix :cve:`2022-41556` | 19 | - lighttpd: Fix :cve_nist:`2022-41556` |
20 | - openssl: Fix :cve:`2022-3358` | 20 | - openssl: Fix :cve_nist:`2022-3358` |
21 | - pixman: Fix :cve:`2022-44638` | 21 | - pixman: Fix :cve_nist:`2022-44638` |
22 | - python3-mako: Fix :cve:`2022-40023` | 22 | - python3-mako: Fix :cve_nist:`2022-40023` |
23 | - python3: Fix :cve:`2022-42919` | 23 | - python3: Fix :cve_nist:`2022-42919` |
24 | - qemu: Fix :cve:`2022-3165` | 24 | - qemu: Fix :cve_nist:`2022-3165` |
25 | - sysstat: Fix :cve:`2022-39377` | 25 | - sysstat: Fix :cve_nist:`2022-39377` |
26 | - systemd: Fix :cve:`2022-3821` | 26 | - systemd: Fix :cve_nist:`2022-3821` |
27 | - tiff: Fix :cve:`2022-2953`, :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598` and :cve:`2022-3970` | 27 | - tiff: Fix :cve_nist:`2022-2953`, :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598` and :cve_nist:`2022-3970` |
28 | - vim: Fix :cve:`2022-3352`, :cve:`2022-3705` and :cve:`2022-4141` | 28 | - vim: Fix :cve_nist:`2022-3352`, :cve_nist:`2022-3705` and :cve_nist:`2022-4141` |
29 | - wayland: Fix :cve:`2021-3782` | 29 | - wayland: Fix :cve_nist:`2021-3782` |
30 | - xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` | 30 | - xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551` |
31 | 31 | ||
32 | 32 | ||
33 | Fixes in Yocto-4.0.6 | 33 | Fixes in Yocto-4.0.6 |
diff --git a/documentation/migration-guides/release-notes-4.0.7.rst b/documentation/migration-guides/release-notes-4.0.7.rst index c3885d9e0e..a11a29889d 100644 --- a/documentation/migration-guides/release-notes-4.0.7.rst +++ b/documentation/migration-guides/release-notes-4.0.7.rst | |||
@@ -6,25 +6,25 @@ Release notes for Yocto-4.0.7 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.7 | 6 | Security Fixes in Yocto-4.0.7 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils: Fix :cve:`2022-4285` | 9 | - binutils: Fix :cve_nist:`2022-4285` |
10 | - curl: Fix :cve:`2022-43551` and :cve_mitre:`2022-43552` | 10 | - curl: Fix :cve_nist:`2022-43551` and :cve_mitre:`2022-43552` |
11 | - ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341` | 11 | - ffmpeg: Fix :cve_nist:`2022-3109` and :cve_nist:`2022-3341` |
12 | - go: Fix :cve:`2022-41715` and :cve:`2022-41717` | 12 | - go: Fix :cve_nist:`2022-41715` and :cve_nist:`2022-41717` |
13 | - libX11: Fix :cve:`2022-3554` and :cve:`2022-3555` | 13 | - libX11: Fix :cve_nist:`2022-3554` and :cve_nist:`2022-3555` |
14 | - libarchive: Fix :cve:`2022-36227` | 14 | - libarchive: Fix :cve_nist:`2022-36227` |
15 | - libksba: Fix :cve:`2022-47629` | 15 | - libksba: Fix :cve_nist:`2022-47629` |
16 | - libpng: Fix :cve:`2019-6129` | 16 | - libpng: Fix :cve_nist:`2019-6129` |
17 | - libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` | 17 | - libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304` |
18 | - openssl: Fix :cve:`2022-3996` | 18 | - openssl: Fix :cve_nist:`2022-3996` |
19 | - python3: Fix :cve:`2022-45061` | 19 | - python3: Fix :cve_nist:`2022-45061` |
20 | - python3-git: Fix :cve:`2022-24439` | 20 | - python3-git: Fix :cve_nist:`2022-24439` |
21 | - python3-setuptools: Fix :cve:`2022-40897` | 21 | - python3-setuptools: Fix :cve_nist:`2022-40897` |
22 | - python3-wheel: Fix :cve:`2022-40898` | 22 | - python3-wheel: Fix :cve_nist:`2022-40898` |
23 | - qemu: Fix :cve:`2022-4144` | 23 | - qemu: Fix :cve_nist:`2022-4144` |
24 | - sqlite: Fix :cve:`2022-46908` | 24 | - sqlite: Fix :cve_nist:`2022-46908` |
25 | - systemd: Fix :cve:`2022-45873` | 25 | - systemd: Fix :cve_nist:`2022-45873` |
26 | - vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054` and :cve:`2023-0088` | 26 | - vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054` and :cve_nist:`2023-0088` |
27 | - webkitgtk: Fix :cve:`2022-32886`, :cve_mitre:`2022-32891` and :cve:`2022-32912` | 27 | - webkitgtk: Fix :cve_nist:`2022-32886`, :cve_mitre:`2022-32891` and :cve_nist:`2022-32912` |
28 | 28 | ||
29 | 29 | ||
30 | Fixes in Yocto-4.0.7 | 30 | Fixes in Yocto-4.0.7 |
@@ -39,7 +39,7 @@ Fixes in Yocto-4.0.7 | |||
39 | - busybox: always start do_compile with orig config files | 39 | - busybox: always start do_compile with orig config files |
40 | - busybox: rm temporary files if do_compile was interrupted | 40 | - busybox: rm temporary files if do_compile was interrupted |
41 | - cairo: fix CVE patches assigned wrong CVE number | 41 | - cairo: fix CVE patches assigned wrong CVE number |
42 | - cairo: update patch for :cve:`2019-6461` with upstream solution | 42 | - cairo: update patch for :cve_nist:`2019-6461` with upstream solution |
43 | - classes/create-spdx: Add SPDX_PRETTY option | 43 | - classes/create-spdx: Add SPDX_PRETTY option |
44 | - classes: image: Set empty weak default IMAGE_LINGUAS | 44 | - classes: image: Set empty weak default IMAGE_LINGUAS |
45 | - combo-layer: add sync-revs command | 45 | - combo-layer: add sync-revs command |
diff --git a/documentation/migration-guides/release-notes-4.0.8.rst b/documentation/migration-guides/release-notes-4.0.8.rst index 223b74fbaf..af58d0462c 100644 --- a/documentation/migration-guides/release-notes-4.0.8.rst +++ b/documentation/migration-guides/release-notes-4.0.8.rst | |||
@@ -6,16 +6,16 @@ Release notes for Yocto-4.0.8 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.8 | 6 | Security Fixes in Yocto-4.0.8 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - apr-util: Fix :cve:`2022-25147` | 9 | - apr-util: Fix :cve_nist:`2022-25147` |
10 | - apr: Fix :cve:`2022-24963`, :cve:`2022-28331` and :cve:`2021-35940` | 10 | - apr: Fix :cve_nist:`2022-24963`, :cve_nist:`2022-28331` and :cve_nist:`2021-35940` |
11 | - bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` | 11 | - bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924` |
12 | - git: Ignore :cve:`2022-41953` | 12 | - git: Ignore :cve_nist:`2022-41953` |
13 | - git: Fix :cve:`2022-23521` and :cve:`2022-41903` | 13 | - git: Fix :cve_nist:`2022-23521` and :cve_nist:`2022-41903` |
14 | - libgit2: Fix :cve:`2023-22742` | 14 | - libgit2: Fix :cve_nist:`2023-22742` |
15 | - ppp: Fix :cve:`2022-4603` | 15 | - ppp: Fix :cve_nist:`2022-4603` |
16 | - python3-certifi: Fix :cve:`2022-23491` | 16 | - python3-certifi: Fix :cve_nist:`2022-23491` |
17 | - sudo: Fix :cve:`2023-22809` | 17 | - sudo: Fix :cve_nist:`2023-22809` |
18 | - tar: Fix :cve:`2022-48303` | 18 | - tar: Fix :cve_nist:`2022-48303` |
19 | 19 | ||
20 | 20 | ||
21 | Fixes in Yocto-4.0.8 | 21 | Fixes in Yocto-4.0.8 |
diff --git a/documentation/migration-guides/release-notes-4.0.9.rst b/documentation/migration-guides/release-notes-4.0.9.rst index 236477443a..a571e95724 100644 --- a/documentation/migration-guides/release-notes-4.0.9.rst +++ b/documentation/migration-guides/release-notes-4.0.9.rst | |||
@@ -6,26 +6,26 @@ Release notes for Yocto-4.0.9 (Kirkstone) | |||
6 | Security Fixes in Yocto-4.0.9 | 6 | Security Fixes in Yocto-4.0.9 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils: Fix :cve:`2023-22608` | 9 | - binutils: Fix :cve_nist:`2023-22608` |
10 | - curl: Fix :cve:`2023-23914`, :cve:`2023-23915` and :cve:`2023-23916` | 10 | - curl: Fix :cve_nist:`2023-23914`, :cve_nist:`2023-23915` and :cve_nist:`2023-23916` |
11 | - epiphany: Fix :cve:`2023-26081` | 11 | - epiphany: Fix :cve_nist:`2023-26081` |
12 | - git: Ignore :cve:`2023-22743` | 12 | - git: Ignore :cve_nist:`2023-22743` |
13 | - glibc: Fix :cve:`2023-0687` | 13 | - glibc: Fix :cve_nist:`2023-0687` |
14 | - gnutls: Fix :cve:`2023-0361` | 14 | - gnutls: Fix :cve_nist:`2023-0361` |
15 | - go: Fix :cve:`2022-2879`, :cve:`2022-41720` and :cve:`2022-41723` | 15 | - go: Fix :cve_nist:`2022-2879`, :cve_nist:`2022-41720` and :cve_nist:`2022-41723` |
16 | - harfbuzz: Fix :cve:`2023-25193` | 16 | - harfbuzz: Fix :cve_nist:`2023-25193` |
17 | - less: Fix :cve:`2022-46663` | 17 | - less: Fix :cve_nist:`2022-46663` |
18 | - libmicrohttpd: Fix :cve:`2023-27371` | 18 | - libmicrohttpd: Fix :cve_nist:`2023-27371` |
19 | - libsdl2: Fix :cve:`2022-4743` | 19 | - libsdl2: Fix :cve_nist:`2022-4743` |
20 | - openssl: Fix :cve:`2022-3996`, :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` | 20 | - openssl: Fix :cve_nist:`2022-3996`, :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466` |
21 | - pkgconf: Fix :cve:`2023-24056` | 21 | - pkgconf: Fix :cve_nist:`2023-24056` |
22 | - python3: Fix :cve:`2023-24329` | 22 | - python3: Fix :cve_nist:`2023-24329` |
23 | - shadow: Ignore :cve:`2016-15024` | 23 | - shadow: Ignore :cve_nist:`2016-15024` |
24 | - systemd: Fix :cve:`2022-4415` | 24 | - systemd: Fix :cve_nist:`2022-4415` |
25 | - tiff: Fix :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` | 25 | - tiff: Fix :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804` |
26 | - vim: Fix :cve:`2023-0433`, :cve:`2023-0512`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` | 26 | - vim: Fix :cve_nist:`2023-0433`, :cve_nist:`2023-0512`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355` |
27 | - xserver-xorg: Fix :cve:`2023-0494` | 27 | - xserver-xorg: Fix :cve_nist:`2023-0494` |
28 | - xwayland: Fix :cve:`2023-0494` | 28 | - xwayland: Fix :cve_nist:`2023-0494` |
29 | 29 | ||
30 | 30 | ||
31 | Fixes in Yocto-4.0.9 | 31 | Fixes in Yocto-4.0.9 |
@@ -90,7 +90,7 @@ Fixes in Yocto-4.0.9 | |||
90 | - pybootchartui: Fix python syntax issue | 90 | - pybootchartui: Fix python syntax issue |
91 | - python3-git: fix indent error | 91 | - python3-git: fix indent error |
92 | - python3-setuptools-rust-native: Add direct dependency of native python3 modules | 92 | - python3-setuptools-rust-native: Add direct dependency of native python3 modules |
93 | - qemu: Revert "fix :cve:`2021-3507`" as not applicable for qemu 6.2 | 93 | - qemu: Revert "fix :cve_nist:`2021-3507`" as not applicable for qemu 6.2 |
94 | - rsync: Add missing prototypes to function declarations | 94 | - rsync: Add missing prototypes to function declarations |
95 | - rsync: Turn on -pedantic-errors at the end of 'configure' | 95 | - rsync: Turn on -pedantic-errors at the end of 'configure' |
96 | - runqemu: kill qemu if it hangs | 96 | - runqemu: kill qemu if it hangs |
diff --git a/documentation/migration-guides/release-notes-4.0.rst b/documentation/migration-guides/release-notes-4.0.rst index a5d66c0410..e9e6949527 100644 --- a/documentation/migration-guides/release-notes-4.0.rst +++ b/documentation/migration-guides/release-notes-4.0.rst | |||
@@ -25,7 +25,7 @@ New Features / Enhancements in 4.0 | |||
25 | 25 | ||
26 | BB_SIGNATURE_HANDLER = "OEEquivHash" | 26 | BB_SIGNATURE_HANDLER = "OEEquivHash" |
27 | BB_HASHSERVE = "auto" | 27 | BB_HASHSERVE = "auto" |
28 | BB_HASHSERVE_UPSTREAM = "hashserv.yocto.io:8687" | 28 | BB_HASHSERVE_UPSTREAM = "hashserv.yoctoproject.org:8686" |
29 | SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" | 29 | SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" |
30 | 30 | ||
31 | - The Python package build process is now based on `wheels <https://pythonwheels.com/>`__ | 31 | - The Python package build process is now based on `wheels <https://pythonwheels.com/>`__ |
@@ -337,37 +337,37 @@ Other license-related notes: | |||
337 | Security Fixes in 4.0 | 337 | Security Fixes in 4.0 |
338 | ~~~~~~~~~~~~~~~~~~~~~ | 338 | ~~~~~~~~~~~~~~~~~~~~~ |
339 | 339 | ||
340 | - binutils: :cve:`2021-42574`, :cve:`2021-45078` | 340 | - binutils: :cve_nist:`2021-42574`, :cve_nist:`2021-45078` |
341 | - curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947` | 341 | - curl: :cve_nist:`2021-22945`, :cve_nist:`2021-22946`, :cve_nist:`2021-22947` |
342 | - epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088` | 342 | - epiphany: :cve_nist:`2021-45085`, :cve_nist:`2021-45086`, :cve_nist:`2021-45087`, :cve_nist:`2021-45088` |
343 | - expat: :cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve:`2022-22825`, :cve:`2022-22826`, :cve:`2022-22827`, :cve:`2022-23852`, :cve:`2022-23990`, :cve:`2022-25235`, :cve:`2022-25236`, :cve:`2022-25313`, :cve:`2022-25314`, :cve:`2022-25315` | 343 | - expat: :cve_nist:`2021-45960`, :cve_nist:`2021-46143`, :cve_nist:`2022-22822`, :cve_nist:`2022-22823`, :cve_nist:`2022-22824`, :cve_nist:`2022-22825`, :cve_nist:`2022-22826`, :cve_nist:`2022-22827`, :cve_nist:`2022-23852`, :cve_nist:`2022-23990`, :cve_nist:`2022-25235`, :cve_nist:`2022-25236`, :cve_nist:`2022-25313`, :cve_nist:`2022-25314`, :cve_nist:`2022-25315` |
344 | - ffmpeg: :cve:`2021-38114` | 344 | - ffmpeg: :cve_nist:`2021-38114` |
345 | - gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765` | 345 | - gcc: :cve_nist:`2021-35465`, :cve_nist:`2021-42574`, :cve_nist:`2021-46195`, :cve_nist:`2022-24765` |
346 | - glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219` | 346 | - glibc: :cve_nist:`2021-3998`, :cve_nist:`2021-3999`, :cve_nist:`2021-43396`, :cve_nist:`2022-23218`, :cve_nist:`2022-23219` |
347 | - gmp: :cve:`2021-43618` | 347 | - gmp: :cve_nist:`2021-43618` |
348 | - go: :cve:`2021-41771` and :cve:`2021-41772` | 348 | - go: :cve_nist:`2021-41771` and :cve_nist:`2021-41772` |
349 | - grub2: :cve:`2021-3981` | 349 | - grub2: :cve_nist:`2021-3981` |
350 | - gzip: :cve:`2022-1271` | 350 | - gzip: :cve_nist:`2022-1271` |
351 | - libarchive : :cve:`2021-31566`, :cve:`2021-36976` | 351 | - libarchive : :cve_nist:`2021-31566`, :cve_nist:`2021-36976` |
352 | - libxml2: :cve:`2022-23308` | 352 | - libxml2: :cve_nist:`2022-23308` |
353 | - libxslt: :cve:`2021-30560` | 353 | - libxslt: :cve_nist:`2021-30560` |
354 | - lighttpd: :cve:`2022-22707` | 354 | - lighttpd: :cve_nist:`2022-22707` |
355 | - linux-yocto/5.10: amdgpu: :cve:`2021-42327` | 355 | - linux-yocto/5.10: amdgpu: :cve_nist:`2021-42327` |
356 | - lua: :cve:`2021-43396` | 356 | - lua: :cve_nist:`2021-43396` |
357 | - openssl: :cve:`2021-4044`, :cve:`2022-0778` | 357 | - openssl: :cve_nist:`2021-4044`, :cve_nist:`2022-0778` |
358 | - qemu: :cve:`2022-1050`, :cve:`2022-26353`, :cve:`2022-26354` | 358 | - qemu: :cve_nist:`2022-1050`, :cve_nist:`2022-26353`, :cve_nist:`2022-26354` |
359 | - rpm: :cve:`2021-3521` | 359 | - rpm: :cve_nist:`2021-3521` |
360 | - seatd: :cve:`2022-25643` | 360 | - seatd: :cve_nist:`2022-25643` |
361 | - speex: :cve:`2020-23903` | 361 | - speex: :cve_nist:`2020-23903` |
362 | - squashfs-tools: :cve:`2021-41072` | 362 | - squashfs-tools: :cve_nist:`2021-41072` |
363 | - systemd: :cve:`2021-4034` | 363 | - systemd: :cve_nist:`2021-4034` |
364 | - tiff: :cve:`2022-0561`, :cve:`2022-0562`, :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909`, :cve:`2022-0924`, :cve:`2022-1056`, :cve:`2022-22844` | 364 | - tiff: :cve_nist:`2022-0561`, :cve_nist:`2022-0562`, :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909`, :cve_nist:`2022-0924`, :cve_nist:`2022-1056`, :cve_nist:`2022-22844` |
365 | - unzip: :cve:`2021-4217` | 365 | - unzip: :cve_nist:`2021-4217` |
366 | - vim: :cve:`2021-3796`, :cve:`2021-3872`, :cve:`2021-3875`, :cve:`2021-3927`, :cve:`2021-3928`, :cve:`2021-3968`, :cve:`2021-3973`, :cve:`2021-4187`, :cve:`2022-0128`, :cve:`2022-0156`, :cve:`2022-0158`, :cve:`2022-0261`, :cve:`2022-0318`, :cve:`2022-0319`, :cve:`2022-0554`, :cve:`2022-0696`, :cve:`2022-0714`, :cve:`2022-0729`, :cve:`2022-0943` | 366 | - vim: :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, :cve_nist:`2021-3875`, :cve_nist:`2021-3927`, :cve_nist:`2021-3928`, :cve_nist:`2021-3968`, :cve_nist:`2021-3973`, :cve_nist:`2021-4187`, :cve_nist:`2022-0128`, :cve_nist:`2022-0156`, :cve_nist:`2022-0158`, :cve_nist:`2022-0261`, :cve_nist:`2022-0318`, :cve_nist:`2022-0319`, :cve_nist:`2022-0554`, :cve_nist:`2022-0696`, :cve_nist:`2022-0714`, :cve_nist:`2022-0729`, :cve_nist:`2022-0943` |
367 | - virglrenderer: :cve:`2022-0135`, :cve:`2022-0175` | 367 | - virglrenderer: :cve_nist:`2022-0135`, :cve_nist:`2022-0175` |
368 | - webkitgtk: :cve:`2022-22589`, :cve:`2022-22590`, :cve:`2022-22592` | 368 | - webkitgtk: :cve_nist:`2022-22589`, :cve_nist:`2022-22590`, :cve_nist:`2022-22592` |
369 | - xz: :cve:`2022-1271` | 369 | - xz: :cve_nist:`2022-1271` |
370 | - zlib: :cve:`2018-25032` | 370 | - zlib: :cve_nist:`2018-25032` |
371 | 371 | ||
372 | 372 | ||
373 | 373 | ||
diff --git a/documentation/migration-guides/release-notes-4.1.1.rst b/documentation/migration-guides/release-notes-4.1.1.rst index 4f31fbf1c7..8393bc5320 100644 --- a/documentation/migration-guides/release-notes-4.1.1.rst +++ b/documentation/migration-guides/release-notes-4.1.1.rst | |||
@@ -6,16 +6,16 @@ Release notes for Yocto-4.1.1 (Langdale) | |||
6 | Security Fixes in Yocto-4.1.1 | 6 | Security Fixes in Yocto-4.1.1 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - curl: Fix :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915` and :cve:`2022-42916` | 9 | - curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916` |
10 | - libx11: Fix :cve:`2022-3554` | 10 | - libx11: Fix :cve_nist:`2022-3554` |
11 | - lighttpd: Fix :cve:`2022-41556` | 11 | - lighttpd: Fix :cve_nist:`2022-41556` |
12 | - openssl: Fix :cve:`2022-3358`, :cve:`2022-3602` and :cve:`2022-3786` | 12 | - openssl: Fix :cve_nist:`2022-3358`, :cve_nist:`2022-3602` and :cve_nist:`2022-3786` |
13 | - pixman: Fix :cve:`2022-44638` | 13 | - pixman: Fix :cve_nist:`2022-44638` |
14 | - qemu: Fix :cve:`2022-3165` | 14 | - qemu: Fix :cve_nist:`2022-3165` |
15 | - sudo: Fix :cve:`2022-43995` | 15 | - sudo: Fix :cve_nist:`2022-43995` |
16 | - tiff: Fix :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570` and :cve:`2022-3598` | 16 | - tiff: Fix :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570` and :cve_nist:`2022-3598` |
17 | - xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` | 17 | - xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551` |
18 | - xserver-xorg: Ignore :cve:`2022-3553` | 18 | - xserver-xorg: Ignore :cve_nist:`2022-3553` |
19 | 19 | ||
20 | 20 | ||
21 | Fixes in Yocto-4.1.1 | 21 | Fixes in Yocto-4.1.1 |
@@ -179,7 +179,7 @@ Fixes in Yocto-4.1.1 | |||
179 | - shadow: update 4.12.1 -> 4.12.3 | 179 | - shadow: update 4.12.1 -> 4.12.3 |
180 | - systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils | 180 | - systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils |
181 | - test-manual: fix typo in machine name | 181 | - test-manual: fix typo in machine name |
182 | - tiff: fix a typo for :cve:`2022-2953`.patch | 182 | - tiff: fix a typo for :cve_nist:`2022-2953`.patch |
183 | - u-boot: Add savedefconfig task | 183 | - u-boot: Add savedefconfig task |
184 | - u-boot: Remove duplicate inherit of cml1 | 184 | - u-boot: Remove duplicate inherit of cml1 |
185 | - uboot-sign: Fix using wrong KEY_REQ_ARGS | 185 | - uboot-sign: Fix using wrong KEY_REQ_ARGS |
diff --git a/documentation/migration-guides/release-notes-4.1.2.rst b/documentation/migration-guides/release-notes-4.1.2.rst index ee5d4ccc51..ea20ced1be 100644 --- a/documentation/migration-guides/release-notes-4.1.2.rst +++ b/documentation/migration-guides/release-notes-4.1.2.rst | |||
@@ -6,18 +6,18 @@ Release notes for Yocto-4.1.2 (Langdale) | |||
6 | Security Fixes in Yocto-4.1.2 | 6 | Security Fixes in Yocto-4.1.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - sudo: Fix :cve:`2022-43995` | 9 | - sudo: Fix :cve_nist:`2022-43995` |
10 | - binutils: Fix :cve:`2022-4285` | 10 | - binutils: Fix :cve_nist:`2022-4285` |
11 | - cairo: update patch for :cve:`2019-6461` with upstream solution | 11 | - cairo: update patch for :cve_nist:`2019-6461` with upstream solution |
12 | - expat: Fix :cve:`2022-43680` | 12 | - expat: Fix :cve_nist:`2022-43680` |
13 | - ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` | 13 | - ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965` |
14 | - grub: Fix :cve:`2022-28736` | 14 | - grub: Fix :cve_nist:`2022-28736` |
15 | - libarchive: Fix :cve:`2022-36227` | 15 | - libarchive: Fix :cve_nist:`2022-36227` |
16 | - libpam: Fix :cve:`2022-28321` | 16 | - libpam: Fix :cve_nist:`2022-28321` |
17 | - libpng: Fix :cve:`2019-6129` | 17 | - libpng: Fix :cve_nist:`2019-6129` |
18 | - ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` | 18 | - ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739` |
19 | - tiff: Fix :cve:`2022-3970` | 19 | - tiff: Fix :cve_nist:`2022-3970` |
20 | - vim: Fix :cve:`2022-4141` | 20 | - vim: Fix :cve_nist:`2022-4141` |
21 | 21 | ||
22 | 22 | ||
23 | Fixes in Yocto-4.1.2 | 23 | Fixes in Yocto-4.1.2 |
diff --git a/documentation/migration-guides/release-notes-4.1.3.rst b/documentation/migration-guides/release-notes-4.1.3.rst index d8474cda68..b07cfa4689 100644 --- a/documentation/migration-guides/release-notes-4.1.3.rst +++ b/documentation/migration-guides/release-notes-4.1.3.rst | |||
@@ -6,24 +6,24 @@ Release notes for Yocto-4.1.3 (Langdale) | |||
6 | Security Fixes in Yocto-4.1.3 | 6 | Security Fixes in Yocto-4.1.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - apr-util: Fix :cve:`2022-25147` | 9 | - apr-util: Fix :cve_nist:`2022-25147` |
10 | - apr: Fix :cve:`2022-24963` and :cve:`2022-28331` | 10 | - apr: Fix :cve_nist:`2022-24963` and :cve_nist:`2022-28331` |
11 | - bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` | 11 | - bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924` |
12 | - curl: Fix :cve:`2022-43551` and :cve:`2022-43552` | 12 | - curl: Fix :cve_nist:`2022-43551` and :cve_nist:`2022-43552` |
13 | - dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` | 13 | - dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012` |
14 | - git: Fix :cve:`2022-23521`, :cve:`2022-39253`, :cve:`2022-39260` and :cve:`2022-41903` | 14 | - git: Fix :cve_nist:`2022-23521`, :cve_nist:`2022-39253`, :cve_nist:`2022-39260` and :cve_nist:`2022-41903` |
15 | - git: Ignore :cve:`2022-41953` | 15 | - git: Ignore :cve_nist:`2022-41953` |
16 | - go: Fix :cve:`2022-41717` and :cve:`2022-41720` | 16 | - go: Fix :cve_nist:`2022-41717` and :cve_nist:`2022-41720` |
17 | - grub2: Fix :cve:`2022-2601` and :cve:`2022-3775` | 17 | - grub2: Fix :cve_nist:`2022-2601` and :cve_nist:`2022-3775` |
18 | - less: Fix :cve:`2022-46663` | 18 | - less: Fix :cve_nist:`2022-46663` |
19 | - libarchive: Fix :cve:`2022-36227` | 19 | - libarchive: Fix :cve_nist:`2022-36227` |
20 | - libksba: Fix :cve:`2022-47629` | 20 | - libksba: Fix :cve_nist:`2022-47629` |
21 | - openssl: Fix :cve:`2022-3996` | 21 | - openssl: Fix :cve_nist:`2022-3996` |
22 | - pkgconf: Fix :cve:`2023-24056` | 22 | - pkgconf: Fix :cve_nist:`2023-24056` |
23 | - ppp: Fix :cve:`2022-4603` | 23 | - ppp: Fix :cve_nist:`2022-4603` |
24 | - sudo: Fix :cve:`2023-22809` | 24 | - sudo: Fix :cve_nist:`2023-22809` |
25 | - tar: Fix :cve:`2022-48303` | 25 | - tar: Fix :cve_nist:`2022-48303` |
26 | - vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-0433` and :cve:`2023-0512` | 26 | - vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-0433` and :cve_nist:`2023-0512` |
27 | - xserver-xorg: Fix :cve_mitre:`2023-0494` | 27 | - xserver-xorg: Fix :cve_mitre:`2023-0494` |
28 | - xwayland: Fix :cve_mitre:`2023-0494` | 28 | - xwayland: Fix :cve_mitre:`2023-0494` |
29 | 29 | ||
diff --git a/documentation/migration-guides/release-notes-4.1.4.rst b/documentation/migration-guides/release-notes-4.1.4.rst index de469f4bee..147dd371b1 100644 --- a/documentation/migration-guides/release-notes-4.1.4.rst +++ b/documentation/migration-guides/release-notes-4.1.4.rst | |||
@@ -6,23 +6,23 @@ Release notes for Yocto-4.1.4 (Langdale) | |||
6 | Security Fixes in Yocto-4.1.4 | 6 | Security Fixes in Yocto-4.1.4 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - cve-extra-exclusions/linux-yocto: Ignore :cve:`2020-27784`, :cve:`2021-3669`, :cve:`2021-3759`, :cve:`2021-4218`, :cve:`2022-0480`, :cve:`2022-1184`, :cve:`2022-1462`, :cve:`2022-2308`, :cve:`2022-2327`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2785`, :cve:`2022-3176`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-3526`, :cve:`2022-3563`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3637`, :cve:`2022-3646` and :cve:`2022-3649` | 9 | - cve-extra-exclusions/linux-yocto: Ignore :cve_nist:`2020-27784`, :cve_nist:`2021-3669`, :cve_nist:`2021-3759`, :cve_nist:`2021-4218`, :cve_nist:`2022-0480`, :cve_nist:`2022-1184`, :cve_nist:`2022-1462`, :cve_nist:`2022-2308`, :cve_nist:`2022-2327`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2785`, :cve_nist:`2022-3176`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-3526`, :cve_nist:`2022-3563`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3637`, :cve_nist:`2022-3646` and :cve_nist:`2022-3649` |
10 | - cve-extra-exclusions/linux-yocto 5.15: Ignore :cve:`2022-3435`, :cve:`2022-3534`, :cve:`2022-3564`, :cve:`2022-3564`, :cve:`2022-3619`, :cve:`2022-3640`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-4382`, :cve:`2023-0266` and :cve:`2023-0394` | 10 | - cve-extra-exclusions/linux-yocto 5.15: Ignore :cve_nist:`2022-3435`, :cve_nist:`2022-3534`, :cve_nist:`2022-3564`, :cve_nist:`2022-3564`, :cve_nist:`2022-3619`, :cve_nist:`2022-3640`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-4382`, :cve_nist:`2023-0266` and :cve_nist:`2023-0394` |
11 | - epiphany: Fix :cve:`2023-26081` | 11 | - epiphany: Fix :cve_nist:`2023-26081` |
12 | - git: Ignore :cve:`2023-22743` | 12 | - git: Ignore :cve_nist:`2023-22743` |
13 | - go: Fix :cve:`2022-41722`, :cve:`2022-41723`, :cve:`2022-41724`, :cve:`2022-41725` and :cve:`2023-24532` | 13 | - go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41723`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725` and :cve_nist:`2023-24532` |
14 | - harfbuzz: Fix :cve:`2023-25193` | 14 | - harfbuzz: Fix :cve_nist:`2023-25193` |
15 | - libmicrohttpd: Fix :cve:`2023-27371` | 15 | - libmicrohttpd: Fix :cve_nist:`2023-27371` |
16 | - libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` | 16 | - libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304` |
17 | - openssl: Fix :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` | 17 | - openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466` |
18 | - python3-setuptools: Fix :cve:`2022-40897` | 18 | - python3-setuptools: Fix :cve_nist:`2022-40897` |
19 | - qemu: Fix :cve:`2022-4144` | 19 | - qemu: Fix :cve_nist:`2022-4144` |
20 | - screen: Fix :cve:`2023-24626` | 20 | - screen: Fix :cve_nist:`2023-24626` |
21 | - shadow: Ignore :cve:`2016-15024` | 21 | - shadow: Ignore :cve_nist:`2016-15024` |
22 | - tiff: Fix :cve:`2022-48281`, :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` | 22 | - tiff: Fix :cve_nist:`2022-48281`, :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804` |
23 | - vim: Fix :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` | 23 | - vim: Fix :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355` |
24 | - xdg-utils: Fix :cve:`2022-4055` | 24 | - xdg-utils: Fix :cve_nist:`2022-4055` |
25 | - xserver-xorg: Fix for :cve:`2023-1393` | 25 | - xserver-xorg: Fix for :cve_nist:`2023-1393` |
26 | 26 | ||
27 | 27 | ||
28 | Fixes in Yocto-4.1.4 | 28 | Fixes in Yocto-4.1.4 |
diff --git a/documentation/migration-guides/release-notes-4.1.rst b/documentation/migration-guides/release-notes-4.1.rst index a0d5196128..3ad3611b80 100644 --- a/documentation/migration-guides/release-notes-4.1.rst +++ b/documentation/migration-guides/release-notes-4.1.rst | |||
@@ -225,36 +225,36 @@ The following corrections have been made to the :term:`LICENSE` values set by re | |||
225 | Security Fixes in 4.1 | 225 | Security Fixes in 4.1 |
226 | ~~~~~~~~~~~~~~~~~~~~~ | 226 | ~~~~~~~~~~~~~~~~~~~~~ |
227 | 227 | ||
228 | - bind: :cve:`2022-1183`, :cve:`2022-2795`, :cve:`2022-2881`, :cve:`2022-2906`, :cve:`2022-3080`, :cve:`2022-38178` | 228 | - bind: :cve_nist:`2022-1183`, :cve_nist:`2022-2795`, :cve_nist:`2022-2881`, :cve_nist:`2022-2906`, :cve_nist:`2022-3080`, :cve_nist:`2022-38178` |
229 | - binutils: :cve:`2019-1010204`, :cve:`2022-38126`, :cve:`2022-38127`, :cve:`2022-38128`, :cve:`2022-38533` | 229 | - binutils: :cve_nist:`2019-1010204`, :cve_nist:`2022-38126`, :cve_nist:`2022-38127`, :cve_nist:`2022-38128`, :cve_nist:`2022-38533` |
230 | - busybox: :cve:`2022-30065` | 230 | - busybox: :cve_nist:`2022-30065` |
231 | - connman: :cve:`2022-32292`, :cve:`2022-32293` | 231 | - connman: :cve_nist:`2022-32292`, :cve_nist:`2022-32293` |
232 | - cups: :cve:`2022-26691` | 232 | - cups: :cve_nist:`2022-26691` |
233 | - e2fsprogs: :cve:`2022-1304` | 233 | - e2fsprogs: :cve_nist:`2022-1304` |
234 | - expat: :cve:`2022-40674` | 234 | - expat: :cve_nist:`2022-40674` |
235 | - freetype: :cve:`2022-27404` | 235 | - freetype: :cve_nist:`2022-27404` |
236 | - glibc: :cve:`2022-39046` | 236 | - glibc: :cve_nist:`2022-39046` |
237 | - gnupg: :cve:`2022-34903` | 237 | - gnupg: :cve_nist:`2022-34903` |
238 | - grub2: :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734`, :cve:`2022-28735` | 238 | - grub2: :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734`, :cve_nist:`2022-28735` |
239 | - inetutils: :cve:`2022-39028` | 239 | - inetutils: :cve_nist:`2022-39028` |
240 | - libtirpc: :cve:`2021-46828` | 240 | - libtirpc: :cve_nist:`2021-46828` |
241 | - libxml2: :cve:`2016-3709` (ignored) | 241 | - libxml2: :cve_nist:`2016-3709` (ignored) |
242 | - libxslt: :cve:`2022-29824` (not applicable) | 242 | - libxslt: :cve_nist:`2022-29824` (not applicable) |
243 | - linux-yocto/5.15: :cve:`2022-28796` | 243 | - linux-yocto/5.15: :cve_nist:`2022-28796` |
244 | - logrotate: :cve:`2022-1348` | 244 | - logrotate: :cve_nist:`2022-1348` |
245 | - lua: :cve:`2022-33099` | 245 | - lua: :cve_nist:`2022-33099` |
246 | - nasm: :cve:`2020-18974` (ignored) | 246 | - nasm: :cve_nist:`2020-18974` (ignored) |
247 | - ncurses: :cve:`2022-29458` | 247 | - ncurses: :cve_nist:`2022-29458` |
248 | - openssl: :cve:`2022-1292`, :cve:`2022-1343`, :cve:`2022-1434`, :cve:`2022-1473`, :cve:`2022-2068`, :cve:`2022-2274`, :cve:`2022-2097` | 248 | - openssl: :cve_nist:`2022-1292`, :cve_nist:`2022-1343`, :cve_nist:`2022-1434`, :cve_nist:`2022-1473`, :cve_nist:`2022-2068`, :cve_nist:`2022-2274`, :cve_nist:`2022-2097` |
249 | - python3: :cve:`2015-20107` (ignored) | 249 | - python3: :cve_nist:`2015-20107` (ignored) |
250 | - qemu: :cve:`2021-20255` (ignored), :cve:`2019-12067` (ignored), :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414` | 250 | - qemu: :cve_nist:`2021-20255` (ignored), :cve_nist:`2019-12067` (ignored), :cve_nist:`2021-3507`, :cve_nist:`2022-0216`, :cve_nist:`2022-2962`, :cve_nist:`2022-35414` |
251 | - rpm: :cve:`2021-35937`, :cve:`2021-35938`, :cve:`2021-35939` | 251 | - rpm: :cve_nist:`2021-35937`, :cve_nist:`2021-35938`, :cve_nist:`2021-35939` |
252 | - rsync: :cve:`2022-29154` | 252 | - rsync: :cve_nist:`2022-29154` |
253 | - subversion: :cve:`2021-28544`, :cve:`2022-24070` | 253 | - subversion: :cve_nist:`2021-28544`, :cve_nist:`2022-24070` |
254 | - tiff: :cve:`2022-1210` (not applicable), :cve:`2022-1622`, :cve:`2022-1623` (invalid), :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526` | 254 | - tiff: :cve_nist:`2022-1210` (not applicable), :cve_nist:`2022-1622`, :cve_nist:`2022-1623` (invalid), :cve_nist:`2022-2056`, :cve_nist:`2022-2057`, :cve_nist:`2022-2058`, :cve_nist:`2022-2953`, :cve_nist:`2022-34526` |
255 | - unzip: :cve:`2022-0529`, :cve:`2022-0530` | 255 | - unzip: :cve_nist:`2022-0529`, :cve_nist:`2022-0530` |
256 | - vim: :cve:`2022-1381`, :cve:`2022-1420`, :cve:`2022-1621`, :cve:`2022-1629`, :cve:`2022-1674`, :cve:`2022-1733`, :cve:`2022-1735`, :cve:`2022-1769`, :cve:`2022-1771`, :cve:`2022-1785`, :cve:`2022-1796`, :cve:`2022-1927`, :cve:`2022-1942`, :cve:`2022-2257`, :cve:`2022-2264`, :cve:`2022-2284`, :cve:`2022-2285`, :cve:`2022-2286`, :cve:`2022-2287`, :cve:`2022-2816`, :cve:`2022-2817`, :cve:`2022-2819`, :cve:`2022-2845`, :cve:`2022-2849`, :cve:`2022-2862`, :cve:`2022-2874`, :cve:`2022-2889`, :cve:`2022-2980`, :cve:`2022-2946`, :cve:`2022-2982`, :cve:`2022-3099`, :cve:`2022-3134`, :cve:`2022-3234`, :cve:`2022-3278` | 256 | - vim: :cve_nist:`2022-1381`, :cve_nist:`2022-1420`, :cve_nist:`2022-1621`, :cve_nist:`2022-1629`, :cve_nist:`2022-1674`, :cve_nist:`2022-1733`, :cve_nist:`2022-1735`, :cve_nist:`2022-1769`, :cve_nist:`2022-1771`, :cve_nist:`2022-1785`, :cve_nist:`2022-1796`, :cve_nist:`2022-1927`, :cve_nist:`2022-1942`, :cve_nist:`2022-2257`, :cve_nist:`2022-2264`, :cve_nist:`2022-2284`, :cve_nist:`2022-2285`, :cve_nist:`2022-2286`, :cve_nist:`2022-2287`, :cve_nist:`2022-2816`, :cve_nist:`2022-2817`, :cve_nist:`2022-2819`, :cve_nist:`2022-2845`, :cve_nist:`2022-2849`, :cve_nist:`2022-2862`, :cve_nist:`2022-2874`, :cve_nist:`2022-2889`, :cve_nist:`2022-2980`, :cve_nist:`2022-2946`, :cve_nist:`2022-2982`, :cve_nist:`2022-3099`, :cve_nist:`2022-3134`, :cve_nist:`2022-3234`, :cve_nist:`2022-3278` |
257 | - zlib: :cve:`2022-37434` | 257 | - zlib: :cve_nist:`2022-37434` |
258 | 258 | ||
259 | 259 | ||
260 | 260 | ||
diff --git a/documentation/migration-guides/release-notes-4.2.1.rst b/documentation/migration-guides/release-notes-4.2.1.rst index 948c35fd67..0b2ef060fc 100644 --- a/documentation/migration-guides/release-notes-4.2.1.rst +++ b/documentation/migration-guides/release-notes-4.2.1.rst | |||
@@ -6,13 +6,13 @@ Release notes for Yocto-4.2.1 (Mickledore) | |||
6 | Security Fixes in Yocto-4.2.1 | 6 | Security Fixes in Yocto-4.2.1 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - connman: Fix :cve:`2023-28488` | 9 | - connman: Fix :cve_nist:`2023-28488` |
10 | - linux-yocto: Ignore :cve:`2023-1652` and :cve:`2023-1829` | 10 | - linux-yocto: Ignore :cve_nist:`2023-1652` and :cve_nist:`2023-1829` |
11 | - ghostscript: Fix :cve:`2023-28879` | 11 | - ghostscript: Fix :cve_nist:`2023-28879` |
12 | - qemu: Ignore :cve:`2023-0664` | 12 | - qemu: Ignore :cve_nist:`2023-0664` |
13 | - ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` | 13 | - ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739` |
14 | - tiff: Fix :cve:`2022-4645` | 14 | - tiff: Fix :cve_nist:`2022-4645` |
15 | - xwayland: Fix :cve:`2023-1393` | 15 | - xwayland: Fix :cve_nist:`2023-1393` |
16 | 16 | ||
17 | 17 | ||
18 | Fixes in Yocto-4.2.1 | 18 | Fixes in Yocto-4.2.1 |
diff --git a/documentation/migration-guides/release-notes-4.2.2.rst b/documentation/migration-guides/release-notes-4.2.2.rst index 74f2d0e82a..0795c8e938 100644 --- a/documentation/migration-guides/release-notes-4.2.2.rst +++ b/documentation/migration-guides/release-notes-4.2.2.rst | |||
@@ -6,21 +6,21 @@ Release notes for Yocto-4.2.2 (Mickledore) | |||
6 | Security Fixes in Yocto-4.2.2 | 6 | Security Fixes in Yocto-4.2.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - binutils: Fix :cve:`2023-1972` | 9 | - binutils: Fix :cve_nist:`2023-1972` |
10 | - cups: Fix :cve:`2023-32324` | 10 | - cups: Fix :cve_nist:`2023-32324` |
11 | - curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` | 11 | - curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322` |
12 | - dbus: Fix :cve:`2023-34969` | 12 | - dbus: Fix :cve_nist:`2023-34969` |
13 | - git: Fix :cve:`2023-25652` and :cve:`2023-29007` | 13 | - git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007` |
14 | - git: Ignore :cve:`2023-25815` | 14 | - git: Ignore :cve_nist:`2023-25815` |
15 | - libwebp: Fix :cve:`2023-1999` | 15 | - libwebp: Fix :cve_nist:`2023-1999` |
16 | - libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` | 16 | - libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469` |
17 | - libxpm: Fix :cve:`2022-44617` | 17 | - libxpm: Fix :cve_nist:`2022-44617` |
18 | - ninja: Ignore :cve:`2021-4336` | 18 | - ninja: Ignore :cve_nist:`2021-4336` |
19 | - openssl: Fix :cve:`2023-0464`, :cve:`2023-0465`, :cve:`2023-0466`, :cve:`2023-1255` and :cve:`2023-2650` | 19 | - openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465`, :cve_nist:`2023-0466`, :cve_nist:`2023-1255` and :cve_nist:`2023-2650` |
20 | - perl: Fix :cve:`2023-31484` and :cve:`2023-31486` | 20 | - perl: Fix :cve_nist:`2023-31484` and :cve_nist:`2023-31486` |
21 | - sysstat: Fix :cve:`2023-33204` | 21 | - sysstat: Fix :cve_nist:`2023-33204` |
22 | - tiff: Fix :cve_mitre:`2023-25434`, :cve:`2023-26965` and :cve:`2023-2731` | 22 | - tiff: Fix :cve_mitre:`2023-25434`, :cve_nist:`2023-26965` and :cve_nist:`2023-2731` |
23 | - vim: Fix :cve:`2023-2426` | 23 | - vim: Fix :cve_nist:`2023-2426` |
24 | 24 | ||
25 | 25 | ||
26 | Fixes in Yocto-4.2.2 | 26 | Fixes in Yocto-4.2.2 |
diff --git a/documentation/migration-guides/release-notes-4.2.3.rst b/documentation/migration-guides/release-notes-4.2.3.rst index 3b568a1c29..86ce5b7025 100644 --- a/documentation/migration-guides/release-notes-4.2.3.rst +++ b/documentation/migration-guides/release-notes-4.2.3.rst | |||
@@ -6,24 +6,24 @@ Release notes for Yocto-4.2.3 (Mickledore) | |||
6 | Security Fixes in Yocto-4.2.3 | 6 | Security Fixes in Yocto-4.2.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-2828` and :cve:`2023-2911` | 9 | - bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911` |
10 | - cups: Fix :cve:`2023-34241` | 10 | - cups: Fix :cve_nist:`2023-34241` |
11 | - dmidecode: Fix :cve:`2023-30630` | 11 | - dmidecode: Fix :cve_nist:`2023-30630` |
12 | - erofs-utils: Fix :cve:`2023-33551` and :cve:`2023-33552` | 12 | - erofs-utils: Fix :cve_nist:`2023-33551` and :cve_nist:`2023-33552` |
13 | - ghostscript: Fix :cve:`2023-36664` | 13 | - ghostscript: Fix :cve_nist:`2023-36664` |
14 | - go: Fix :cve_mitre:`2023-24531` | 14 | - go: Fix :cve_mitre:`2023-24531` |
15 | - libarchive: ignore :cve:`2023-30571` | 15 | - libarchive: ignore :cve_nist:`2023-30571` |
16 | - libjpeg-turbo: Fix :cve:`2023-2804` | 16 | - libjpeg-turbo: Fix :cve_nist:`2023-2804` |
17 | - libx11: Fix :cve:`2023-3138` | 17 | - libx11: Fix :cve_nist:`2023-3138` |
18 | - ncurses: Fix :cve:`2023-29491` | 18 | - ncurses: Fix :cve_nist:`2023-29491` |
19 | - openssh: Fix :cve:`2023-38408` | 19 | - openssh: Fix :cve_nist:`2023-38408` |
20 | - python3-certifi: Fix :cve:`2023-37920` | 20 | - python3-certifi: Fix :cve_nist:`2023-37920` |
21 | - python3-requests: Fix :cve:`2023-32681` | 21 | - python3-requests: Fix :cve_nist:`2023-32681` |
22 | - python3: Ignore :cve:`2023-36632` | 22 | - python3: Ignore :cve_nist:`2023-36632` |
23 | - qemu: fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` | 23 | - qemu: fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` |
24 | - ruby: Fix :cve:`2023-36617` | 24 | - ruby: Fix :cve_nist:`2023-36617` |
25 | - vim: Fix :cve:`2023-2609` and :cve:`2023-2610` | 25 | - vim: Fix :cve_nist:`2023-2609` and :cve_nist:`2023-2610` |
26 | - webkitgtk: Fix :cve:`2023-27932` and :cve:`2023-27954` | 26 | - webkitgtk: Fix :cve_nist:`2023-27932` and :cve_nist:`2023-27954` |
27 | 27 | ||
28 | 28 | ||
29 | Fixes in Yocto-4.2.3 | 29 | Fixes in Yocto-4.2.3 |
diff --git a/documentation/migration-guides/release-notes-4.2.4.rst b/documentation/migration-guides/release-notes-4.2.4.rst index 3c20140e29..60f878c3b0 100644 --- a/documentation/migration-guides/release-notes-4.2.4.rst +++ b/documentation/migration-guides/release-notes-4.2.4.rst | |||
@@ -6,44 +6,44 @@ Release notes for Yocto-4.2.4 (Mickledore) | |||
6 | Security Fixes in Yocto-4.2.4 | 6 | Security Fixes in Yocto-4.2.4 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-3341` and :cve:`2023-4236` | 9 | - bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236` |
10 | - binutils: Fix :cve:`2023-39128` | 10 | - binutils: Fix :cve_nist:`2023-39128` |
11 | - cups: fix :cve:`2023-4504` | 11 | - cups: fix :cve_nist:`2023-4504` |
12 | - curl: Fix :cve:`2023-28320`, :cve:`2023-32001`, :cve:`2023-38039`, :cve:`2023-38545` and :cve:`2023-38546` | 12 | - curl: Fix :cve_nist:`2023-28320`, :cve_nist:`2023-32001`, :cve_nist:`2023-38039`, :cve_nist:`2023-38545` and :cve_nist:`2023-38546` |
13 | - dmidecode: fix for :cve:`2023-30630` | 13 | - dmidecode: fix for :cve_nist:`2023-30630` |
14 | - dropbear: fix :cve:`2023-36328` | 14 | - dropbear: fix :cve_nist:`2023-36328` |
15 | - ffmpeg: Ignore :cve:`2023-39018` | 15 | - ffmpeg: Ignore :cve_nist:`2023-39018` |
16 | - gcc: Fix :cve:`2023-4039` | 16 | - gcc: Fix :cve_nist:`2023-4039` |
17 | - gdb: Fix :cve:`2023-39128` | 17 | - gdb: Fix :cve_nist:`2023-39128` |
18 | - ghostscript: Fix :cve:`2023-38559` and :cve:`2023-43115` | 18 | - ghostscript: Fix :cve_nist:`2023-38559` and :cve_nist:`2023-43115` |
19 | - glibc: Fix :cve:`2023-4527` and :cve:`2023-4806` | 19 | - glibc: Fix :cve_nist:`2023-4527` and :cve_nist:`2023-4806` |
20 | - go: Fix :cve:`2023-29409` and :cve:`2023-39533` | 20 | - go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39533` |
21 | - grub: Fix :cve:`2023-4692` and :cve:`2023-4693` | 21 | - grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693` |
22 | - gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` | 22 | - gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` |
23 | - inetutils: fix :cve:`2023-40303` | 23 | - inetutils: fix :cve_nist:`2023-40303` |
24 | - librsvg: Fix :cve:`2023-38633` | 24 | - librsvg: Fix :cve_nist:`2023-38633` |
25 | - libssh2: Fix :cve:`2020-22218` | 25 | - libssh2: Fix :cve_nist:`2020-22218` |
26 | - libwebp: Fix :cve:`2023-4863` and :cve:`2023-5129` | 26 | - libwebp: Fix :cve_nist:`2023-4863` and :cve_nist:`2023-5129` |
27 | - libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` | 27 | - libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787` |
28 | - libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` | 28 | - libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789` |
29 | - linux-yocto/6.1: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568` | 29 | - linux-yocto/6.1: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568` |
30 | - linux-yocto/6.1 (Continued): Ignore :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12362`, :cve:`2020-12363`, :cve:`2020-12364`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24504`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32078`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33061`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve:`2021-3493`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3669`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4023`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4150`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4204`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-44879`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0382`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0480`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0500`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-0998`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1263`, :cve:`2022-1280`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1508`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20148`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20409`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve:`2022-20424`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20568`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-23222`, :cve:`2022-2327`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-27672`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-2991`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3108`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3176`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-3344`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3522`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-3595`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-38457`, :cve:`2022-3903`, :cve:`2022-3910`, :cve:`2022-39188`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40133`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4696`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-47946`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0386`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1295`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1872`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2007`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20928`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22995`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23000`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-23586`, :cve:`2023-2430`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3389`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-4611` and :cve:`2023-4623` | 30 | - linux-yocto/6.1 (Continued): Ignore :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12362`, :cve_nist:`2020-12363`, :cve_nist:`2020-12364`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24504`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32078`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33061`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_nist:`2021-3493`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3669`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4023`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4150`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4204`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-44879`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0382`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0480`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0500`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-0998`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1263`, :cve_nist:`2022-1280`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1508`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20148`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20409`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_nist:`2022-20424`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20568`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-23222`, :cve_nist:`2022-2327`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-27672`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-2991`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3108`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3176`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-3344`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3522`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-3595`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-38457`, :cve_nist:`2022-3903`, :cve_nist:`2022-3910`, :cve_nist:`2022-39188`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40133`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4696`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-47946`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0386`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1295`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1872`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2007`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20928`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22995`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23000`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-23586`, :cve_nist:`2023-2430`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3389`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-4611` and :cve_nist:`2023-4623` |
31 | - nghttp2: Fix :cve:`2023-35945` | 31 | - nghttp2: Fix :cve_nist:`2023-35945` |
32 | - openssl: Fix :cve:`2023-2975`, :cve:`2023-3446`, :cve:`2023-3817`, :cve:`2023-4807` and :cve:`2023-5363` | 32 | - openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446`, :cve_nist:`2023-3817`, :cve_nist:`2023-4807` and :cve_nist:`2023-5363` |
33 | - pixman: Ignore :cve:`2023-37769` | 33 | - pixman: Ignore :cve_nist:`2023-37769` |
34 | - procps: Fix :cve:`2023-4016` | 34 | - procps: Fix :cve_nist:`2023-4016` |
35 | - python3-git: Fix :cve:`2023-40267`, :cve:`2023-40590` and :cve:`2023-41040` | 35 | - python3-git: Fix :cve_nist:`2023-40267`, :cve_nist:`2023-40590` and :cve_nist:`2023-41040` |
36 | - python3-pygments: Fix :cve:`2022-40896` | 36 | - python3-pygments: Fix :cve_nist:`2022-40896` |
37 | - python3-urllib3: Fix :cve:`2023-43804` and :cve:`2023-45803` | 37 | - python3-urllib3: Fix :cve_nist:`2023-43804` and :cve_nist:`2023-45803` |
38 | - python3: Fix :cve:`2023-24329` and :cve:`2023-40217` | 38 | - python3: Fix :cve_nist:`2023-24329` and :cve_nist:`2023-40217` |
39 | - qemu: Fix :cve:`2023-3180`, :cve:`2023-3354` and :cve:`2023-42467` | 39 | - qemu: Fix :cve_nist:`2023-3180`, :cve_nist:`2023-3354` and :cve_nist:`2023-42467` |
40 | - qemu: Ignore :cve:`2023-2680` | 40 | - qemu: Ignore :cve_nist:`2023-2680` |
41 | - screen: Fix :cve:`2023-24626` | 41 | - screen: Fix :cve_nist:`2023-24626` |
42 | - shadow: Fix :cve_mitre:`2023-4641` | 42 | - shadow: Fix :cve_mitre:`2023-4641` |
43 | - tiff: Fix :cve:`2023-40745` and :cve:`2023-41175` | 43 | - tiff: Fix :cve_nist:`2023-40745` and :cve_nist:`2023-41175` |
44 | - vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750`, :cve:`2023-4752`, :cve:`2023-4781`, :cve:`2023-5441` and :cve:`2023-5535` | 44 | - vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750`, :cve_nist:`2023-4752`, :cve_nist:`2023-4781`, :cve_nist:`2023-5441` and :cve_nist:`2023-5535` |
45 | - webkitgtk: Fix :cve:`2023-32435` and :cve:`2023-32439` | 45 | - webkitgtk: Fix :cve_nist:`2023-32435` and :cve_nist:`2023-32439` |
46 | - xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` | 46 | - xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380` |
47 | 47 | ||
48 | 48 | ||
49 | Fixes in Yocto-4.2.4 | 49 | Fixes in Yocto-4.2.4 |
diff --git a/documentation/migration-guides/release-notes-4.2.rst b/documentation/migration-guides/release-notes-4.2.rst index 30049b89f6..81a052b413 100644 --- a/documentation/migration-guides/release-notes-4.2.rst +++ b/documentation/migration-guides/release-notes-4.2.rst | |||
@@ -348,39 +348,39 @@ The following corrections have been made to the :term:`LICENSE` values set by re | |||
348 | Security Fixes in 4.2 | 348 | Security Fixes in 4.2 |
349 | ~~~~~~~~~~~~~~~~~~~~~ | 349 | ~~~~~~~~~~~~~~~~~~~~~ |
350 | 350 | ||
351 | - binutils: :cve:`2022-4285`, :cve_mitre:`2023-25586` | 351 | - binutils: :cve_nist:`2022-4285`, :cve_mitre:`2023-25586` |
352 | - curl: :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915`, :cve:`2022-42916` | 352 | - curl: :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915`, :cve_nist:`2022-42916` |
353 | - epiphany: :cve:`2023-26081` | 353 | - epiphany: :cve_nist:`2023-26081` |
354 | - expat: :cve:`2022-43680` | 354 | - expat: :cve_nist:`2022-43680` |
355 | - ffmpeg: :cve:`2022-3964`, :cve:`2022-3965` | 355 | - ffmpeg: :cve_nist:`2022-3964`, :cve_nist:`2022-3965` |
356 | - git: :cve:`2022-39260`, :cve:`2022-41903`, :cve:`2022-23521`, :cve:`2022-41953` (ignored) | 356 | - git: :cve_nist:`2022-39260`, :cve_nist:`2022-41903`, :cve_nist:`2022-23521`, :cve_nist:`2022-41953` (ignored) |
357 | - glibc: :cve:`2023-25139` (ignored) | 357 | - glibc: :cve_nist:`2023-25139` (ignored) |
358 | - go: :cve:`2023-24532`, :cve:`2023-24537` | 358 | - go: :cve_nist:`2023-24532`, :cve_nist:`2023-24537` |
359 | - grub2: :cve:`2022-2601`, :cve:`2022-3775`, :cve_mitre:`2022-28736` | 359 | - grub2: :cve_nist:`2022-2601`, :cve_nist:`2022-3775`, :cve_mitre:`2022-28736` |
360 | - inetutils: :cve:`2019-0053` | 360 | - inetutils: :cve_nist:`2019-0053` |
361 | - less: :cve:`2022-46663` | 361 | - less: :cve_nist:`2022-46663` |
362 | - libarchive: :cve:`2022-36227` | 362 | - libarchive: :cve_nist:`2022-36227` |
363 | - libinput: :cve:`2022-1215` | 363 | - libinput: :cve_nist:`2022-1215` |
364 | - libpam: :cve:`2022-28321` | 364 | - libpam: :cve_nist:`2022-28321` |
365 | - libpng: :cve:`2019-6129` | 365 | - libpng: :cve_nist:`2019-6129` |
366 | - libx11: :cve:`2022-3554` | 366 | - libx11: :cve_nist:`2022-3554` |
367 | - openssh: :cve:`2023-28531` | 367 | - openssh: :cve_nist:`2023-28531` |
368 | - openssl: :cve:`2022-3358`, :cve:`2022-3786`, :cve:`2022-3602`, :cve:`2022-3996`, :cve:`2023-0286`, :cve:`2022-4304`, :cve:`2022-4203`, :cve:`2023-0215`, :cve:`2022-4450`, :cve:`2023-0216`, :cve:`2023-0217`, :cve:`2023-0401`, :cve:`2023-0464` | 368 | - openssl: :cve_nist:`2022-3358`, :cve_nist:`2022-3786`, :cve_nist:`2022-3602`, :cve_nist:`2022-3996`, :cve_nist:`2023-0286`, :cve_nist:`2022-4304`, :cve_nist:`2022-4203`, :cve_nist:`2023-0215`, :cve_nist:`2022-4450`, :cve_nist:`2023-0216`, :cve_nist:`2023-0217`, :cve_nist:`2023-0401`, :cve_nist:`2023-0464` |
369 | - ppp: :cve:`2022-4603` | 369 | - ppp: :cve_nist:`2022-4603` |
370 | - python3-cryptography{-vectors}: :cve:`2022-3602`, :cve:`2022-3786`, :cve:`2023-23931` | 370 | - python3-cryptography{-vectors}: :cve_nist:`2022-3602`, :cve_nist:`2022-3786`, :cve_nist:`2023-23931` |
371 | - python3: :cve_mitre:`2022-37460` | 371 | - python3: :cve_mitre:`2022-37460` |
372 | - qemu: :cve:`2022-3165` | 372 | - qemu: :cve_nist:`2022-3165` |
373 | - rust: :cve:`2022-46176` | 373 | - rust: :cve_nist:`2022-46176` |
374 | - rxvt-unicode: :cve:`2022-4170` | 374 | - rxvt-unicode: :cve_nist:`2022-4170` |
375 | - screen: :cve:`2023-24626` | 375 | - screen: :cve_nist:`2023-24626` |
376 | - shadow: :cve:`2023-29383`, :cve:`2016-15024` (ignored) | 376 | - shadow: :cve_nist:`2023-29383`, :cve_nist:`2016-15024` (ignored) |
377 | - sudo: :cve:`2022-43995` | 377 | - sudo: :cve_nist:`2022-43995` |
378 | - systemd: :cve:`2022-4415` (ignored) | 378 | - systemd: :cve_nist:`2022-4415` (ignored) |
379 | - tar: :cve:`2022-48303` | 379 | - tar: :cve_nist:`2022-48303` |
380 | - tiff: :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598`, :cve:`2022-3970`, :cve:`2022-48281` | 380 | - tiff: :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598`, :cve_nist:`2022-3970`, :cve_nist:`2022-48281` |
381 | - vim: :cve:`2022-3352`, :cve:`2022-4141`, :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264`, :cve:`2023-1355`, :cve:`2023-0433`, :cve:`2022-47024`, :cve:`2022-3705` | 381 | - vim: :cve_nist:`2022-3352`, :cve_nist:`2022-4141`, :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264`, :cve_nist:`2023-1355`, :cve_nist:`2023-0433`, :cve_nist:`2022-47024`, :cve_nist:`2022-3705` |
382 | - xdg-utils: :cve:`2022-4055` | 382 | - xdg-utils: :cve_nist:`2022-4055` |
383 | - xserver-xorg: :cve:`2022-3550`, :cve:`2022-3551`, :cve:`2023-1393`, :cve:`2023-0494`, :cve:`2022-3553` (ignored) | 383 | - xserver-xorg: :cve_nist:`2022-3550`, :cve_nist:`2022-3551`, :cve_nist:`2023-1393`, :cve_nist:`2023-0494`, :cve_nist:`2022-3553` (ignored) |
384 | 384 | ||
385 | Recipe Upgrades in 4.2 | 385 | Recipe Upgrades in 4.2 |
386 | ~~~~~~~~~~~~~~~~~~~~~~ | 386 | ~~~~~~~~~~~~~~~~~~~~~~ |
diff --git a/documentation/migration-guides/release-notes-4.3.1.rst b/documentation/migration-guides/release-notes-4.3.1.rst index cea9c538a2..afde1e7942 100644 --- a/documentation/migration-guides/release-notes-4.3.1.rst +++ b/documentation/migration-guides/release-notes-4.3.1.rst | |||
@@ -6,14 +6,14 @@ Release notes for Yocto-4.3.1 (Nanbield) | |||
6 | Security Fixes in Yocto-4.3.1 | 6 | Security Fixes in Yocto-4.3.1 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - libsndfile1: Fix :cve:`2022-33065` | 9 | - libsndfile1: Fix :cve_nist:`2022-33065` |
10 | - libxml2: Ignore :cve:`2023-45322` | 10 | - libxml2: Ignore :cve_nist:`2023-45322` |
11 | - linux-yocto/6.1: Ignore :cve:`2020-27418`, :cve:`2023-31085`, :cve_mitre:`2023-34324`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4244`, :cve:`2023-42754`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-4563`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45871`, :cve:`2023-45898`, :cve:`2023-4732`, :cve:`2023-5158`, :cve:`2023-5197` and :cve:`2023-5345` | 11 | - linux-yocto/6.1: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-31085`, :cve_mitre:`2023-34324`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4244`, :cve_nist:`2023-42754`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-4563`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45871`, :cve_nist:`2023-45898`, :cve_nist:`2023-4732`, :cve_nist:`2023-5158`, :cve_nist:`2023-5197` and :cve_nist:`2023-5345` |
12 | - linux-yocto/6.5: Ignore :cve:`2020-27418`, :cve:`2023-1193`, :cve:`2023-39191`, :cve:`2023-39194`, :cve:`2023-40791`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-4610` and :cve:`2023-4732` | 12 | - linux-yocto/6.5: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-1193`, :cve_nist:`2023-39191`, :cve_nist:`2023-39194`, :cve_nist:`2023-40791`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-4610` and :cve_nist:`2023-4732` |
13 | - openssl: Fix :cve:`2023-5363` | 13 | - openssl: Fix :cve_nist:`2023-5363` |
14 | - pixman: Ignore :cve:`2023-37769` | 14 | - pixman: Ignore :cve_nist:`2023-37769` |
15 | - vim: Fix :cve:`2023-46246` | 15 | - vim: Fix :cve_nist:`2023-46246` |
16 | - zlib: Ignore :cve:`2023-45853` | 16 | - zlib: Ignore :cve_nist:`2023-45853` |
17 | 17 | ||
18 | 18 | ||
19 | Fixes in Yocto-4.3.1 | 19 | Fixes in Yocto-4.3.1 |
diff --git a/documentation/migration-guides/release-notes-4.3.2.rst b/documentation/migration-guides/release-notes-4.3.2.rst index 3a40d83bc2..c32cd83b2a 100644 --- a/documentation/migration-guides/release-notes-4.3.2.rst +++ b/documentation/migration-guides/release-notes-4.3.2.rst | |||
@@ -6,19 +6,19 @@ Release notes for Yocto-4.3.2 (Nanbield) | |||
6 | Security Fixes in Yocto-4.3.2 | 6 | Security Fixes in Yocto-4.3.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` | 9 | - avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473` |
10 | - curl: Fix :cve:`2023-46218` | 10 | - curl: Fix :cve_nist:`2023-46218` |
11 | - ghostscript: Fix :cve:`2023-46751` | 11 | - ghostscript: Fix :cve_nist:`2023-46751` |
12 | - grub: fix :cve:`2023-4692` and :cve:`2023-4693` | 12 | - grub: fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693` |
13 | - gstreamer1.0: Fix :cve_mitre:`2023-44446` | 13 | - gstreamer1.0: Fix :cve_mitre:`2023-44446` |
14 | - linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5090`, :cve:`2023-5633`, :cve:`2023-6111`, :cve:`2023-6121` and :cve:`2023-6176` | 14 | - linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5090`, :cve_nist:`2023-5633`, :cve_nist:`2023-6111`, :cve_nist:`2023-6121` and :cve_nist:`2023-6176` |
15 | - linux-yocto/6.5: Ignore :cve:`2022-44034`, :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6111` and :cve:`2023-6176` | 15 | - linux-yocto/6.5: Ignore :cve_nist:`2022-44034`, :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6111` and :cve_nist:`2023-6176` |
16 | - perl: fix :cve:`2023-47100` | 16 | - perl: fix :cve_nist:`2023-47100` |
17 | - python3-urllib3: Fix :cve:`2023-45803` | 17 | - python3-urllib3: Fix :cve_nist:`2023-45803` |
18 | - rust: Fix :cve:`2023-40030` | 18 | - rust: Fix :cve_nist:`2023-40030` |
19 | - vim: Fix :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236` and :cve:`2023-48237` | 19 | - vim: Fix :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236` and :cve_nist:`2023-48237` |
20 | - xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` | 20 | - xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380` |
21 | - xwayland: Fix :cve:`2023-5367` | 21 | - xwayland: Fix :cve_nist:`2023-5367` |
22 | 22 | ||
23 | 23 | ||
24 | Fixes in Yocto-4.3.2 | 24 | Fixes in Yocto-4.3.2 |
diff --git a/documentation/migration-guides/release-notes-4.3.3.rst b/documentation/migration-guides/release-notes-4.3.3.rst index 2a0658a9c9..d30f4f5c2d 100644 --- a/documentation/migration-guides/release-notes-4.3.3.rst +++ b/documentation/migration-guides/release-notes-4.3.3.rst | |||
@@ -6,17 +6,17 @@ Release notes for Yocto-4.3.3 (Nanbield) | |||
6 | Security Fixes in Yocto-4.3.3 | 6 | Security Fixes in Yocto-4.3.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - curl: Fix :cve:`2023-46219` | 9 | - curl: Fix :cve_nist:`2023-46219` |
10 | - glibc: Ignore fixed :cve:`2023-0687` and :cve:`2023-5156` | 10 | - glibc: Ignore fixed :cve_nist:`2023-0687` and :cve_nist:`2023-5156` |
11 | - linux-yocto/6.1: Ignore :cve:`2022-48619`, :cve:`2023-4610`, :cve:`2023-5178`, :cve:`2023-5972`, :cve:`2023-6040`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-6817`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-7192`, :cve:`2024-0193` and :cve:`2024-0443` | 11 | - linux-yocto/6.1: Ignore :cve_nist:`2022-48619`, :cve_nist:`2023-4610`, :cve_nist:`2023-5178`, :cve_nist:`2023-5972`, :cve_nist:`2023-6040`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-6817`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-7192`, :cve_nist:`2024-0193` and :cve_nist:`2024-0443` |
12 | - linux-yocto/6.1: Fix :cve:`2023-1193`, :cve_mitre:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782` and :cve:`2023-6606` | 12 | - linux-yocto/6.1: Fix :cve_nist:`2023-1193`, :cve_mitre:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782` and :cve_nist:`2023-6606` |
13 | - qemu: Fix :cve:`2023-3019` | 13 | - qemu: Fix :cve_nist:`2023-3019` |
14 | - shadow: Fix :cve:`2023-4641` | 14 | - shadow: Fix :cve_nist:`2023-4641` |
15 | - sqlite3: Fix :cve:`2024-0232` | 15 | - sqlite3: Fix :cve_nist:`2024-0232` |
16 | - sqlite3: drop obsolete CVE ignore :cve:`2023-36191` | 16 | - sqlite3: drop obsolete CVE ignore :cve_nist:`2023-36191` |
17 | - sudo: Fix :cve:`2023-42456` and :cve:`2023-42465` | 17 | - sudo: Fix :cve_nist:`2023-42456` and :cve_nist:`2023-42465` |
18 | - tiff: Fix :cve:`2023-6277` | 18 | - tiff: Fix :cve_nist:`2023-6277` |
19 | - xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` | 19 | - xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478` |
20 | 20 | ||
21 | 21 | ||
22 | Fixes in Yocto-4.3.3 | 22 | Fixes in Yocto-4.3.3 |
diff --git a/documentation/migration-guides/release-notes-4.3.4.rst b/documentation/migration-guides/release-notes-4.3.4.rst index 4c9e67f2cb..b725ace369 100644 --- a/documentation/migration-guides/release-notes-4.3.4.rst +++ b/documentation/migration-guides/release-notes-4.3.4.rst | |||
@@ -6,23 +6,23 @@ Release notes for Yocto-4.3.4 (Nanbield) | |||
6 | Security Fixes in Yocto-4.3.4 | 6 | Security Fixes in Yocto-4.3.4 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679` and :cve:`2023-50387` | 9 | - bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679` and :cve_nist:`2023-50387` |
10 | - gcc: Update :term:`CVE_STATUS` for :cve:`2023-4039` as fixed | 10 | - gcc: Update :term:`CVE_STATUS` for :cve_nist:`2023-4039` as fixed |
11 | - glibc: Fix :cve:`2023-6246`, :cve:`2023-6779` and :cve:`2023-6780` | 11 | - glibc: Fix :cve_nist:`2023-6246`, :cve_nist:`2023-6779` and :cve_nist:`2023-6780` |
12 | - gnutls: Fix :cve:`2024-0553` and :cve:`2024-0567` | 12 | - gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567` |
13 | - gstreamer: Fix :cve_mitre:`2024-0444` | 13 | - gstreamer: Fix :cve_mitre:`2024-0444` |
14 | - libssh2: fix :cve:`2023-48795` | 14 | - libssh2: fix :cve_nist:`2023-48795` |
15 | - libxml2: Fix :cve:`2024-25062` | 15 | - libxml2: Fix :cve_nist:`2024-25062` |
16 | - linux-yocto/6.1: Fix :cve:`2023-6610`, :cve:`2023-6915`, :cve:`2023-46838`, :cve:`2023-50431`, :cve:`2024-1085`, :cve:`2024-1086` and :cve:`2024-23849` | 16 | - linux-yocto/6.1: Fix :cve_nist:`2023-6610`, :cve_nist:`2023-6915`, :cve_nist:`2023-46838`, :cve_nist:`2023-50431`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086` and :cve_nist:`2024-23849` |
17 | - linux-yocto/6.1: Ignore :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-36402`, :cve:`2023-5717`, :cve:`2023-6200`, :cve:`2023-35827`, :cve:`2023-40791`, :cve:`2023-46343`, :cve:`2023-46813`, :cve:`2023-46862`, :cve:`2023-51042`, :cve:`2023-51043`, :cve_mitre:`2023-52340`, :cve:`2024-0562`, :cve:`2024-0565`, :cve:`2024-0582`, :cve:`2024-0584`, :cve:`2024-0607`, :cve:`2024-0639`, :cve:`2024-0641`, :cve:`2024-0646`, :cve:`2024-0775` and :cve:`2024-22705` | 17 | - linux-yocto/6.1: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-36402`, :cve_nist:`2023-5717`, :cve_nist:`2023-6200`, :cve_nist:`2023-35827`, :cve_nist:`2023-40791`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0562`, :cve_nist:`2024-0565`, :cve_nist:`2024-0582`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-0775` and :cve_nist:`2024-22705` |
18 | - openssl: fix :cve:`2024-0727` | 18 | - openssl: fix :cve_nist:`2024-0727` |
19 | - python3-jinja2: Fix :cve:`2024-22195` | 19 | - python3-jinja2: Fix :cve_nist:`2024-22195` |
20 | - tiff: Fix :cve:`2023-6228`, :cve:`2023-52355` and :cve:`2023-52356` | 20 | - tiff: Fix :cve_nist:`2023-6228`, :cve_nist:`2023-52355` and :cve_nist:`2023-52356` |
21 | - vim: Fix :cve:`2024-22667` | 21 | - vim: Fix :cve_nist:`2024-22667` |
22 | - wpa-supplicant: Fix :cve:`2023-52160` | 22 | - wpa-supplicant: Fix :cve_nist:`2023-52160` |
23 | - xserver-xorg: Fix :cve:`2023-6377`, :cve:`2023-6478`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2024-21885` and :cve:`2024-21886` | 23 | - xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885` and :cve_nist:`2024-21886` |
24 | - xwayland: Fix :cve:`2023-6816`, :cve:`2024-0408` and :cve:`2024-0409` | 24 | - xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409` |
25 | - zlib: Ignore :cve:`2023-6992` | 25 | - zlib: Ignore :cve_nist:`2023-6992` |
26 | 26 | ||
27 | 27 | ||
28 | Fixes in Yocto-4.3.4 | 28 | Fixes in Yocto-4.3.4 |
@@ -59,7 +59,7 @@ Fixes in Yocto-4.3.4 | |||
59 | - docs: use "manual page(s)" | 59 | - docs: use "manual page(s)" |
60 | - docs: Makefile: remove releases.rst in "make clean" | 60 | - docs: Makefile: remove releases.rst in "make clean" |
61 | - externalsrc: fix task dependency for do_populate_lic | 61 | - externalsrc: fix task dependency for do_populate_lic |
62 | - glibc: Remove duplicate :term:`CVE_STATUS` for :cve:`2023-4527` | 62 | - glibc: Remove duplicate :term:`CVE_STATUS` for :cve_nist:`2023-4527` |
63 | - glibc: stable 2.38 branch updates (2.38+gitd37c2b20a4) | 63 | - glibc: stable 2.38 branch updates (2.38+gitd37c2b20a4) |
64 | - gnutls: Upgrade to 3.8.3 | 64 | - gnutls: Upgrade to 3.8.3 |
65 | - gstreamer1.0: skip a test that is known to be flaky | 65 | - gstreamer1.0: skip a test that is known to be flaky |
diff --git a/documentation/migration-guides/release-notes-4.3.rst b/documentation/migration-guides/release-notes-4.3.rst index 0e175067da..0103ac985e 100644 --- a/documentation/migration-guides/release-notes-4.3.rst +++ b/documentation/migration-guides/release-notes-4.3.rst | |||
@@ -295,7 +295,7 @@ New Features / Enhancements in 4.3 | |||
295 | - Generation of :term:`SPDX` manifests is now enabled by default. | 295 | - Generation of :term:`SPDX` manifests is now enabled by default. |
296 | 296 | ||
297 | - Git based recipes in OE-Core which used the ``git`` protocol have been | 297 | - Git based recipes in OE-Core which used the ``git`` protocol have been |
298 | changed to use `https`` where possible, as it is typically faster and | 298 | changed to use ``https`` where possible, as it is typically faster and |
299 | more reliable. | 299 | more reliable. |
300 | 300 | ||
301 | - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the | 301 | - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the |
@@ -337,47 +337,47 @@ The following corrections have been made to the :term:`LICENSE` values set by re | |||
337 | Security Fixes in 4.3 | 337 | Security Fixes in 4.3 |
338 | ~~~~~~~~~~~~~~~~~~~~~ | 338 | ~~~~~~~~~~~~~~~~~~~~~ |
339 | 339 | ||
340 | - bind: :cve:`2023-2911`, :cve:`2023-2828`, :cve:`2023-3341`, :cve:`2023-4236` | 340 | - bind: :cve_nist:`2023-2911`, :cve_nist:`2023-2828`, :cve_nist:`2023-3341`, :cve_nist:`2023-4236` |
341 | - binutils: :cve:`2023-1972` | 341 | - binutils: :cve_nist:`2023-1972` |
342 | - connman: :cve:`2023-28488` | 342 | - connman: :cve_nist:`2023-28488` |
343 | - cups: :cve:`2023-32324`, :cve:`2023-34241`, :cve:`2023-4504` | 343 | - cups: :cve_nist:`2023-32324`, :cve_nist:`2023-34241`, :cve_nist:`2023-4504` |
344 | - dbus: :cve:`2023-34969` | 344 | - dbus: :cve_nist:`2023-34969` |
345 | - dmidecode: :cve:`2023-30630` | 345 | - dmidecode: :cve_nist:`2023-30630` |
346 | - dropbear: :cve:`2023-36328` | 346 | - dropbear: :cve_nist:`2023-36328` |
347 | - erofs-utils: :cve:`2023-33551`, :cve:`2023-33552` | 347 | - erofs-utils: :cve_nist:`2023-33551`, :cve_nist:`2023-33552` |
348 | - gcc: :cve:`2023-4039` | 348 | - gcc: :cve_nist:`2023-4039` |
349 | - ghostscript: :cve:`2023-28879`, :cve:`2023-36664`, :cve:`2023-38559;` ignore :cve:`2023-38560` | 349 | - ghostscript: :cve_nist:`2023-28879`, :cve_nist:`2023-36664`, :cve_nist:`2023-38559;` ignore :cve_nist:`2023-38560` |
350 | - git: :cve:`2023-25652`, :cve:`2023-29007` | 350 | - git: :cve_nist:`2023-25652`, :cve_nist:`2023-29007` |
351 | - glibc: :cve:`2023-4527`, :cve:`2023-4806` | 351 | - glibc: :cve_nist:`2023-4527`, :cve_nist:`2023-4806` |
352 | - go: :cve:`2023-24537`, :cve:`2023-39325` | 352 | - go: :cve_nist:`2023-24537`, :cve_nist:`2023-39325` |
353 | - gstreamer: :cve:`2023-40475`, :cve:`2023-40476` | 353 | - gstreamer: :cve_nist:`2023-40475`, :cve_nist:`2023-40476` |
354 | - inetutils: :cve:`2023-40303` | 354 | - inetutils: :cve_nist:`2023-40303` |
355 | - libarchive: ignore :cve:`2023-30571` | 355 | - libarchive: ignore :cve_nist:`2023-30571` |
356 | - librsvg: :cve:`2023-38633` | 356 | - librsvg: :cve_nist:`2023-38633` |
357 | - libwebp: :cve:`2023-1999`, :cve:`2023-4863` | 357 | - libwebp: :cve_nist:`2023-1999`, :cve_nist:`2023-4863` |
358 | - libx11: :cve:`2023-3138`, :cve:`2023-43785`, :cve:`2023-43786`, :cve:`2023-43787` | 358 | - libx11: :cve_nist:`2023-3138`, :cve_nist:`2023-43785`, :cve_nist:`2023-43786`, :cve_nist:`2023-43787` |
359 | - libxml2: :cve:`2023-28484`, :cve:`2023-29469;` ignore disputed :cve:`2023-45322` | 359 | - libxml2: :cve_nist:`2023-28484`, :cve_nist:`2023-29469;` ignore disputed :cve_nist:`2023-45322` |
360 | - libxpm: :cve:`2023-43788`, :cve:`2023-43789`, :cve:`2022-44617` | 360 | - libxpm: :cve_nist:`2023-43788`, :cve_nist:`2023-43789`, :cve_nist:`2022-44617` |
361 | - linux: update CVE exclusions | 361 | - linux: update CVE exclusions |
362 | - ncurses: :cve:`2023-29491` | 362 | - ncurses: :cve_nist:`2023-29491` |
363 | - nghttp2: :cve:`2023-44487` | 363 | - nghttp2: :cve_nist:`2023-44487` |
364 | - ninja: ignore :cve:`2021-4336`, wrong ninja | 364 | - ninja: ignore :cve_nist:`2021-4336`, wrong ninja |
365 | - openssh: :cve:`2023-38408` | 365 | - openssh: :cve_nist:`2023-38408` |
366 | - openssl: :cve:`2023-2650`, :cve:`2023-1255`, :cve:`2023-0466`, :cve:`2023-0465`, :cve:`2023-0464`, :cve:`2023-3817`, :cve:`2023-3446`, :cve:`2023-2975`, :cve:`2023-4807` | 366 | - openssl: :cve_nist:`2023-2650`, :cve_nist:`2023-1255`, :cve_nist:`2023-0466`, :cve_nist:`2023-0465`, :cve_nist:`2023-0464`, :cve_nist:`2023-3817`, :cve_nist:`2023-3446`, :cve_nist:`2023-2975`, :cve_nist:`2023-4807` |
367 | - perl: :cve:`2023-31484`, :cve:`2023-31486` | 367 | - perl: :cve_nist:`2023-31484`, :cve_nist:`2023-31486` |
368 | - pixman: ignore :cve:`2023-37769` | 368 | - pixman: ignore :cve_nist:`2023-37769` |
369 | - procps: :cve:`2023-4016` | 369 | - procps: :cve_nist:`2023-4016` |
370 | - python3-git: :cve:`2023-41040` | 370 | - python3-git: :cve_nist:`2023-41040` |
371 | - python3: ignore :cve:`2023-36632` | 371 | - python3: ignore :cve_nist:`2023-36632` |
372 | - python3-urllib3: :cve:`2023-43804` | 372 | - python3-urllib3: :cve_nist:`2023-43804` |
373 | - qemu: :cve:`2023-40360`, :cve:`2023-42467;` ignore :cve:`2023-0664` (Windows-specific), ignore :cve:`2023-2680` (RHEL specific) | 373 | - qemu: :cve_nist:`2023-40360`, :cve_nist:`2023-42467;` ignore :cve_nist:`2023-0664` (Windows-specific), ignore :cve_nist:`2023-2680` (RHEL specific) |
374 | - screen: :cve:`2023-24626` | 374 | - screen: :cve_nist:`2023-24626` |
375 | - shadow: :cve:`2023-29383` | 375 | - shadow: :cve_nist:`2023-29383` |
376 | - sqlite3: ignore :cve:`2023-36191` | 376 | - sqlite3: ignore :cve_nist:`2023-36191` |
377 | - sysstat: :cve:`2023-33204` | 377 | - sysstat: :cve_nist:`2023-33204` |
378 | - tiff: :cve:`2022-4645`, :cve:`2023-2731`, :cve:`2023-26965`, :cve:`2023-40745`, :cve:`2023-41175` | 378 | - tiff: :cve_nist:`2022-4645`, :cve_nist:`2023-2731`, :cve_nist:`2023-26965`, :cve_nist:`2023-40745`, :cve_nist:`2023-41175` |
379 | - vim: :cve:`2023-2426`, :cve:`2023-2609`, :cve:`2023-2610`, :cve:`2023-3896`, :cve:`2023-5441`, :cve:`2023-5535` | 379 | - vim: :cve_nist:`2023-2426`, :cve_nist:`2023-2609`, :cve_nist:`2023-2610`, :cve_nist:`2023-3896`, :cve_nist:`2023-5441`, :cve_nist:`2023-5535` |
380 | - zlib: ignore :cve:`2023-45853` | 380 | - zlib: ignore :cve_nist:`2023-45853` |
381 | 381 | ||
382 | 382 | ||
383 | Recipe Upgrades in 4.3 | 383 | Recipe Upgrades in 4.3 |
diff --git a/documentation/migration-guides/release-notes-5.0.10.rst b/documentation/migration-guides/release-notes-5.0.10.rst new file mode 100644 index 0000000000..e9845aa315 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.10.rst | |||
@@ -0,0 +1,208 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-5.0.10 (Scarthgap) | ||
4 | ------------------------------------------ | ||
5 | |||
6 | Security Fixes in Yocto-5.0.10 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - binutils: Fix :cve_nist:`2025-1153`, :cve_nist:`2025-1179`, :cve_nist:`2025-1180` and | ||
10 | :cve_nist:`2025-1182` | ||
11 | - connman: Fix :cve_nist:`2025-32366` and :cve_nist:`2025-32743` | ||
12 | - curl: Fix :cve_nist:`2024-11053` and :cve_nist:`2025-0167` | ||
13 | - elfutils: Fix :cve_nist:`2025-1371` | ||
14 | - ffmpeg: Fix :cve_nist:`2024-7055`, :cve_nist:`2024-32230`, :cve_nist:`2024-35366`, | ||
15 | :cve_nist:`2024-36613`, :cve_nist:`2024-36616`, :cve_nist:`2024-36617` and :cve_nist:`2024-36619` | ||
16 | - git: Fix :cve_nist:`2024-50349` and :cve_nist:`2024-52006` | ||
17 | - glib-2.0: fix :cve_nist:`2025-3360` and :cve_nist:`2025-4373` | ||
18 | - iputils: Fix :cve_nist:`2025-47268` | ||
19 | - libpam: Fix :cve_nist:`2024-10041` | ||
20 | - libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531`, :cve_nist:`2024-52532`, | ||
21 | :cve_nist:`2025-32906`, :cve_nist:`2025-32909`, :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, | ||
22 | :cve_nist:`2025-32912`, :cve_nist:`2025-32913`, :cve_nist:`2025-32914` and :cve_nist:`2025-46420` | ||
23 | - libsoup: Fix :cve_nist:`2025-4476`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`, | ||
24 | :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913`, | ||
25 | :cve_nist:`2025-32914` and :cve_nist:`2025-46420` | ||
26 | - libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415` | ||
27 | - openssh: Fix :cve_nist:`2025-32728` | ||
28 | - perl: Fix :cve_nist:`2024-56406` | ||
29 | - ppp: Fix :cve_nist:`2024-58250` | ||
30 | - python3-jinja2: Fix :cve_nist:`2024-56201`, :cve_nist:`2024-56326` and :cve_nist:`2025-27516` | ||
31 | - ruby: Fix :cve_nist:`2025-27221` | ||
32 | - sqlite3: Fix :cve_nist:`2025-3277`, :cve_nist:`2025-29087` and :cve_nist:`2025-29088` | ||
33 | |||
34 | |||
35 | Fixes in Yocto-5.0.10 | ||
36 | ~~~~~~~~~~~~~~~~~~~~~ | ||
37 | |||
38 | - binutils: stable 2.42 branch updates | ||
39 | - bluez5: add missing tools to noinst-tools package | ||
40 | - bluez5: backport a patch to fix btmgmt -i | ||
41 | - bluez5: make media control a :term:`PACKAGECONFIG` option | ||
42 | - build-appliance-image: Update to scarthgap head revision | ||
43 | - buildtools-tarball: Make buildtools respects host CA certificates | ||
44 | - buildtools-tarball: add envvars into :term:`BB_ENV_PASSTHROUGH_ADDITIONS` | ||
45 | - buildtools-tarball: move setting of envvars to respective envfile | ||
46 | - contributor-guide/submit-changes: encourage patch version changelogs | ||
47 | - cve-check.bbclass: Fix symlink handling also for text files | ||
48 | - cve-update-nvd2-native: Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR" | ||
49 | - dev-manual/sbom.rst: fix wrong build outputs | ||
50 | - docs: Fix dead links that use the :term:`DISTRO` macro | ||
51 | - docs: conf.py: tweak SearchEnglish to be hyphen-friendly | ||
52 | - docs:conf.py: define a manpage url | ||
53 | - ffmpeg: upgrade to 6.1.2 | ||
54 | - git: upgrade to 2.44.3 | ||
55 | - glibc-y2038-tests: remove glibc-y2038-tests_2.39.bb recipe | ||
56 | - glibc: Add single-threaded fast path to rand() | ||
57 | - glibc: stable 2.39 branch updates | ||
58 | - initscripts: add function log_success_msg/log_failure_msg/log_warning_msg | ||
59 | - libatomic-ops: Update :term:`GITHUB_BASE_URI` | ||
60 | - manuals: remove repeated word | ||
61 | - migration-guides: add release notes for 4.0.26, 5.0.8, 5.0.9 | ||
62 | - module.bbclass: add KBUILD_EXTRA_SYMBOLS to install | ||
63 | - perl: upgrade to 5.38.4 | ||
64 | - perlcross: upgrade to 1.6.2 | ||
65 | - poky.conf: bump version for 5.0.10 | ||
66 | - poky.yaml: introduce DISTRO_LATEST_TAG | ||
67 | - python3-jinja2: upgrade to 3.1.6 | ||
68 | - ref-manual/release-process: update releases.svg | ||
69 | - ref-manual/variables.rst: HOST_CC_ARCH: fix wrong SDK reference | ||
70 | - ref-manual/variables.rst: WATCHDOG_TIMEOUT: fix recipe name | ||
71 | - ref-manual/variables.rst: add manpage links for toolchain variables | ||
72 | - ref-manual/variables.rst: add missing documentation for BUILD_* variables | ||
73 | - ref-manual/variables.rst: document HOST_*_ARCH variables | ||
74 | - ref-manual/variables.rst: document :term:`INHIBIT_DEFAULT_RUST_DEPS` | ||
75 | - ref-manual/variables.rst: document :term:`INHIBIT_UPDATERCD_BBCLASS` | ||
76 | - ref-manual/variables.rst: document :term:`SSTATE_SKIP_CREATION` | ||
77 | - ref-manual/variables.rst: document :term:`WIC_CREATE_EXTRA_ARGS` | ||
78 | - ref-manual/variables.rst: document autotools class related variables | ||
79 | - ref-manual/variables.rst: document missing SDK_*_ARCH variables | ||
80 | - ref-manual/variables.rst: document the :term:`IMAGE_ROOTFS_MAXSIZE` variable | ||
81 | - ref-manual/variables.rst: document the :term:`INITRAMFS_MAXSIZE` variable | ||
82 | - ref-manual/variables.rst: improve the :term:`PKGV` documentation | ||
83 | - ref-manual/variables.rst: update :term:`ROOT_HOME` documentation | ||
84 | - ref-manual: kernel-fitimage.bbclass does not use :term:`SPL_SIGN_KEYNAME` | ||
85 | - scripts/install-buildtools: Update to 5.0.9 | ||
86 | - sphinx-lint: missing space after literal | ||
87 | - sphinx-lint: trailing whitespace | ||
88 | - sphinx-lint: unbalanced inline literal markup | ||
89 | - systemd: Password agents shouldn't be optional | ||
90 | - systemd: upgrade to 255.18 | ||
91 | - test-manual/intro: remove Buildbot version used | ||
92 | - tzdata/tzcode-native: upgrade 2025a -> 2025b | ||
93 | - u-boot: ensure keys are generated before assembling U-Boot FIT image | ||
94 | - util-linux: Add fix to isolate test fstab entries using CUSTOM_FSTAB | ||
95 | - wic: bootimg-efi: Support + symbol in filenames | ||
96 | |||
97 | |||
98 | Known Issues in Yocto-5.0.10 | ||
99 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
100 | |||
101 | - There is an issue where the target libsoup-2.4 build may fail if apachectl is present on the build | ||
102 | host. The issue only affects test binaries which aren't actually used. The issue can be fixed by | ||
103 | disabling the tests or updating to more recent changes on the scarthgap branch which fix this. | ||
104 | |||
105 | |||
106 | Contributors to Yocto-5.0.10 | ||
107 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
108 | |||
109 | Thanks to the following people who contributed to this release: | ||
110 | |||
111 | - Adrian Freihofer | ||
112 | - Aleksandar Nikolic | ||
113 | - Alexander Kanavin | ||
114 | - Alon Bar-Lev | ||
115 | - Alper Ak | ||
116 | - Andrew Kreimer | ||
117 | - Antonin Godard | ||
118 | - Archana Polampalli | ||
119 | - Ashish Sharma | ||
120 | - Changqing Li | ||
121 | - Christos Gavros | ||
122 | - Deepesh Varatharajan | ||
123 | - Divya Chellam | ||
124 | - Divyanshu Rathore | ||
125 | - Enrico Jörns | ||
126 | - Etienne Cordonnier | ||
127 | - Guðni Már Gilbert | ||
128 | - Haixiao Yan | ||
129 | - Harish Sadineni | ||
130 | - Igor Opaniuk | ||
131 | - Jeroen Hofstee | ||
132 | - Lee Chee Yang | ||
133 | - Nguyen Dat Tho | ||
134 | - Niko Mauno | ||
135 | - Peter Marko | ||
136 | - Praveen Kumar | ||
137 | - Priyal Doshi | ||
138 | - Rogerio Guerra Borin | ||
139 | - Shubham Kulkarni | ||
140 | - Soumya Sambu | ||
141 | - Steve Sakoman | ||
142 | - Sunil Dora | ||
143 | - Trevor Woerner | ||
144 | - Vijay Anusuri | ||
145 | - Virendra Thakur | ||
146 | - Vyacheslav Yurkov | ||
147 | - Yi Zhao | ||
148 | - Yogita Urade | ||
149 | - rajmohan r | ||
150 | |||
151 | Repositories / Downloads for Yocto-5.0.10 | ||
152 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
153 | |||
154 | poky | ||
155 | |||
156 | - Repository Location: :yocto_git:`/poky` | ||
157 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
158 | - Tag: :yocto_git:`yocto-5.0.10 </poky/log/?h=yocto-5.0.10>` | ||
159 | - Git Revision: :yocto_git:`ac257900c33754957b2696529682029d997a8f28 </poky/commit/?id=ac257900c33754957b2696529682029d997a8f28>` | ||
160 | - Release Artefact: poky-ac257900c33754957b2696529682029d997a8f28 | ||
161 | - sha: ddca7e54b331e78214bea65b346320d4fbcddf4b51103bfbbd9fc3960f32cdc7 | ||
162 | - Download Locations: | ||
163 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2 | ||
164 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2 | ||
165 | |||
166 | openembedded-core | ||
167 | |||
168 | - Repository Location: :oe_git:`/openembedded-core` | ||
169 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
170 | - Tag: :oe_git:`yocto-5.0.10 </openembedded-core/log/?h=yocto-5.0.10>` | ||
171 | - Git Revision: :oe_git:`d5342ffc570d47a723b18297d75bd2f63c2088db </openembedded-core/commit/?id=d5342ffc570d47a723b18297d75bd2f63c2088db>` | ||
172 | - Release Artefact: oecore-d5342ffc570d47a723b18297d75bd2f63c2088db | ||
173 | - sha: daa62094f2327f4b3fbcc485e8964d1b86a4722f58fb37e0d8e8e9885094a262 | ||
174 | - Download Locations: | ||
175 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2 | ||
176 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2 | ||
177 | |||
178 | meta-mingw | ||
179 | |||
180 | - Repository Location: :yocto_git:`/meta-mingw` | ||
181 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
182 | - Tag: :yocto_git:`yocto-5.0.10 </meta-mingw/log/?h=yocto-5.0.10>` | ||
183 | - Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>` | ||
184 | - Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f | ||
185 | - sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65 | ||
186 | - Download Locations: | ||
187 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
188 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
189 | |||
190 | bitbake | ||
191 | |||
192 | - Repository Location: :oe_git:`/bitbake` | ||
193 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
194 | - Tag: :oe_git:`yocto-5.0.10 </bitbake/log/?h=yocto-5.0.10>` | ||
195 | - Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>` | ||
196 | - Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e | ||
197 | - sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f | ||
198 | - Download Locations: | ||
199 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2 | ||
200 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2 | ||
201 | |||
202 | yocto-docs | ||
203 | |||
204 | - Repository Location: :yocto_git:`/yocto-docs` | ||
205 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
206 | - Tag: :yocto_git:`yocto-5.0.10 </yocto-docs/log/?h=yocto-5.0.10>` | ||
207 | - Git Revision: :yocto_git:`3996388e337377bedc113d072a51fe9d68dd40c6 </yocto-docs/commit/?id=3996388e337377bedc113d072a51fe9d68dd40c6>` | ||
208 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.2.rst b/documentation/migration-guides/release-notes-5.0.2.rst index 820e33189e..b60fd73190 100644 --- a/documentation/migration-guides/release-notes-5.0.2.rst +++ b/documentation/migration-guides/release-notes-5.0.2.rst | |||
@@ -6,17 +6,17 @@ Release notes for Yocto-5.0.2 (Scarthgap) | |||
6 | Security Fixes in Yocto-5.0.2 | 6 | Security Fixes in Yocto-5.0.2 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - cups: Fix :cve:`2024-35235` | 9 | - cups: Fix :cve_nist:`2024-35235` |
10 | - gcc: Fix :cve:`2024-0151` | 10 | - gcc: Fix :cve_nist:`2024-0151` |
11 | - gdk-pixbuf: Fix :cve:`2022-48622` | 11 | - gdk-pixbuf: Fix :cve_nist:`2022-48622` |
12 | - ghostscript: fix :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` | 12 | - ghostscript: fix :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` |
13 | - git: Fix :cve:`2024-32002`, :cve:`2024-32004`, :cve:`2024-32020`, :cve:`2024-32021` and :cve:`2024-32465` | 13 | - git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465` |
14 | - glib-2.0: Fix :cve:`2024-34397` | 14 | - glib-2.0: Fix :cve_nist:`2024-34397` |
15 | - glibc: Fix :cve:`2024-2961`, :cve:`2024-33599`, :cve:`2024-33600`, :cve:`2024-33601` and :cve:`2024-33602` | 15 | - glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602` |
16 | - ncurses: Fix :cve:`2023-45918` and :cve:`2023-50495` | 16 | - ncurses: Fix :cve_nist:`2023-45918` and :cve_nist:`2023-50495` |
17 | - openssl: Fix :cve:`2024-4603` and :cve_mitre:`2024-4741` | 17 | - openssl: Fix :cve_nist:`2024-4603` and :cve_mitre:`2024-4741` |
18 | - util-linux: Fix :cve:`2024-28085` | 18 | - util-linux: Fix :cve_nist:`2024-28085` |
19 | - xserver-xorg: Fix :cve:`2024-31080`, :cve:`2024-31081`, :cve:`2024-31082` and :cve:`2024-31083` | 19 | - xserver-xorg: Fix :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31082` and :cve_nist:`2024-31083` |
20 | 20 | ||
21 | 21 | ||
22 | Fixes in Yocto-5.0.2 | 22 | Fixes in Yocto-5.0.2 |
@@ -44,7 +44,7 @@ Fixes in Yocto-5.0.2 | |||
44 | - bitbake: tests/fetch: Tweak test to match upstream repo url change | 44 | - bitbake: tests/fetch: Tweak test to match upstream repo url change |
45 | - bitbake: tests/fetch: Tweak to work on Fedora40 | 45 | - bitbake: tests/fetch: Tweak to work on Fedora40 |
46 | - build-appliance-image: Update to scarthgap head revision | 46 | - build-appliance-image: Update to scarthgap head revision |
47 | - busybox: update :cve:`2022-28391` patches upstream status | 47 | - busybox: update :cve_nist:`2022-28391` patches upstream status |
48 | - cdrtools-native: Fix build with GCC 14 | 48 | - cdrtools-native: Fix build with GCC 14 |
49 | - classes: image_types: apply EXTRA_IMAGECMD:squashfs* in oe_mksquashfs() | 49 | - classes: image_types: apply EXTRA_IMAGECMD:squashfs* in oe_mksquashfs() |
50 | - classes: image_types: quote variable assignment needed by dash | 50 | - classes: image_types: quote variable assignment needed by dash |
diff --git a/documentation/migration-guides/release-notes-5.0.3.rst b/documentation/migration-guides/release-notes-5.0.3.rst index 5ed660c9ec..caf33c7c3f 100644 --- a/documentation/migration-guides/release-notes-5.0.3.rst +++ b/documentation/migration-guides/release-notes-5.0.3.rst | |||
@@ -6,30 +6,30 @@ Release notes for Yocto-5.0.3 (Scarthgap) | |||
6 | Security Fixes in Yocto-5.0.3 | 6 | Security Fixes in Yocto-5.0.3 |
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | 8 | ||
9 | - bind: Fix :cve:`2024-0760`, :cve:`2024-1737`, :cve:`2024-1975` and :cve:`2024-4076` | 9 | - bind: Fix :cve_nist:`2024-0760`, :cve_nist:`2024-1737`, :cve_nist:`2024-1975` and :cve_nist:`2024-4076` |
10 | - busybox: Fix :cve:`2023-42366`, :cve:`2023-42364`, :cve:`2023-42365`, :cve:`2021-42380` and :cve:`2023-42363` | 10 | - busybox: Fix :cve_nist:`2023-42366`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2021-42380` and :cve_nist:`2023-42363` |
11 | - cpio: Ignore :cve:`2023-7216` | 11 | - cpio: Ignore :cve_nist:`2023-7216` |
12 | - curl: Fix :cve:`2024-6197` | 12 | - curl: Fix :cve_nist:`2024-6197` |
13 | - ffmpeg: Fix :cve:`2023-49502`, :cve:`2024-31578` and :cve:`2024-31582` | 13 | - ffmpeg: Fix :cve_nist:`2023-49502`, :cve_nist:`2024-31578` and :cve_nist:`2024-31582` |
14 | - ghostscript: Fix :cve:`2023-52722` | 14 | - ghostscript: Fix :cve_nist:`2023-52722` |
15 | - go: Fix :cve:`2024-24790` | 15 | - go: Fix :cve_nist:`2024-24790` |
16 | - gstreamer1.0-plugins-base: Fix :cve:`2024-4453` | 16 | - gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453` |
17 | - less: Fix :cve:`2024-32487` | 17 | - less: Fix :cve_nist:`2024-32487` |
18 | - libxml2: Fix :cve:`2024-34459` | 18 | - libxml2: Fix :cve_nist:`2024-34459` |
19 | - libyaml: Ignore :cve:`2024-35328` | 19 | - libyaml: Ignore :cve_nist:`2024-35328` |
20 | - linux-yocto/6.6: Fix :cve:`2024-23307`, :cve:`2024-24861`, :cve:`2024-26642`, :cve:`2024-26643`, :cve:`2024-26654`, :cve:`2024-26656` and :cve:`2023-47233` | 20 | - linux-yocto/6.6: Fix :cve_nist:`2024-23307`, :cve_nist:`2024-24861`, :cve_nist:`2024-26642`, :cve_nist:`2024-26643`, :cve_nist:`2024-26654`, :cve_nist:`2024-26656` and :cve_nist:`2023-47233` |
21 | - linux-yocto/6.6: Ignore :cve:`2019-25160`, :cve:`2019-25162`, :cve:`2020-36775`, :cve:`2020-36776`, :cve:`2020-36777`, :cve:`2020-36778`, :cve:`2020-36779`, :cve:`2020-36780`, :cve:`2020-36781`, :cve:`2020-36782`, :cve:`2020-36783`, :cve:`2020-36784`, :cve:`2020-36785`, :cve:`2020-36786`, :cve:`2020-36787`, :cve:`2021-46904`, :cve:`2021-46905`, :cve:`2021-46906`, :cve:`2021-46908`, :cve:`2021-46909`, :cve:`2021-46910`, :cve:`2021-46911`, :cve:`2021-46912`, :cve:`2021-46913`, :cve:`2021-46914`, :cve:`2021-46915`, :cve:`2021-46916`, :cve:`2021-46917`, :cve:`2021-46918`, :cve:`2021-46919`, :cve:`2021-46920`, :cve:`2021-46921`, :cve:`2021-46922`, :cve:`2021-46923`, :cve:`2021-46924`, :cve:`2021-46925`, :cve:`2021-46926`, :cve:`2021-46927`, :cve:`2021-46928`, :cve:`2021-46929`, :cve:`2021-46930`, :cve:`2021-46931`, :cve:`2021-46932`, :cve:`2021-46933`, :cve:`2021-46934`, :cve:`2021-46935`, :cve:`2021-46936`, :cve:`2021-46937`, :cve:`2021-46938`, :cve:`2021-46939`, :cve:`2021-46940`, :cve:`2021-46941`, :cve:`2021-46942`, :cve:`2021-46943`, :cve:`2021-46944`, :cve:`2021-46945`, :cve:`2021-46947`, :cve:`2021-46948`, :cve:`2021-46949`, :cve:`2021-46950`, :cve:`2021-46951`, :cve:`2021-46952`, :cve:`2021-46953`, :cve:`2021-46954`, :cve:`2021-46955`, :cve:`2021-46956`, :cve:`2021-46957`, :cve:`2021-46958`, :cve:`2021-46959`, :cve:`2021-46960`, :cve:`2021-46961`, :cve:`2021-46962`, :cve:`2021-46963`, :cve:`2021-46964`, :cve:`2021-46965`, :cve:`2021-46966`, :cve:`2021-46967`, :cve:`2021-46968`, :cve:`2021-46969`, :cve:`2021-46970`, :cve:`2021-46971`, :cve:`2021-46972`, :cve:`2021-46973`, :cve:`2021-46974`, :cve:`2021-46976`, :cve:`2021-46977`, :cve:`2021-46978`, :cve:`2021-46979`, :cve:`2021-46980`, :cve:`2021-46981`, :cve:`2021-46982`, :cve:`2021-46983`, :cve:`2021-46984`, :cve:`2021-46985`, :cve:`2021-46986`, :cve:`2021-46987`, :cve:`2021-46988`, :cve:`2021-46989`, :cve:`2021-46990`, :cve:`2021-46991`, :cve:`2021-46992`, :cve:`2021-46993`, :cve:`2021-46994`, :cve:`2021-46995`, :cve:`2021-46996`, :cve:`2021-46997`, :cve:`2021-46998`, :cve:`2021-46999`, :cve:`2021-47000`, :cve:`2021-47001`, :cve:`2021-47002`, :cve:`2021-47003`, :cve:`2021-47004`, :cve:`2021-47005`, :cve:`2021-47006`, :cve:`2021-47007`, :cve:`2021-47008`, :cve:`2021-47009`, :cve:`2021-47010`, :cve:`2021-47011`, :cve:`2021-47012`, :cve:`2021-47013`, :cve:`2021-47014`, :cve:`2021-47015`, :cve:`2021-47016`, :cve:`2021-47017`, :cve:`2021-47018`, :cve:`2021-47019`, :cve:`2021-47020`, :cve:`2021-47021`, :cve:`2021-47022`, :cve:`2021-47023`, :cve:`2021-47024`, :cve:`2021-47025`, :cve:`2021-47026`, :cve:`2021-47027`, :cve:`2021-47028`, :cve:`2021-47029`, :cve:`2021-47030`, :cve:`2021-47031`, :cve:`2021-47032`, :cve:`2021-47033`, :cve:`2021-47034`, :cve:`2021-47035`, :cve:`2021-47036`, :cve:`2021-47037`, :cve:`2021-47038`, :cve:`2021-47039`, :cve:`2021-47040`, :cve:`2021-47041`, :cve:`2021-47042`, :cve:`2021-47043`, :cve:`2021-47044`, :cve:`2021-47045`, :cve:`2021-47046`, :cve:`2021-47047`, :cve:`2021-47048`, :cve:`2021-47049`, :cve:`2021-47050`, :cve:`2021-47051`, :cve:`2021-47052`, :cve:`2021-47053`, :cve:`2021-47054`, :cve:`2021-47055`, :cve:`2021-47056`, :cve:`2021-47057`, :cve:`2021-47058`, :cve:`2021-47059`, :cve:`2021-47060`, :cve:`2021-47061`, :cve:`2021-47062`, :cve:`2021-47063`, :cve:`2021-47064`, :cve:`2021-47065`, :cve:`2021-47066`, :cve:`2021-47067`, :cve:`2021-47068`, :cve:`2021-47069`, :cve:`2021-47070`, :cve:`2021-47071`, :cve:`2021-47072`, :cve:`2021-47073`, :cve:`2021-47074`, :cve:`2021-47075`, :cve:`2021-47076`, :cve:`2021-47077`, :cve:`2021-47078`, :cve:`2021-47079`, :cve:`2021-47080`, :cve:`2021-47081`, :cve:`2021-47082`, :cve:`2021-47083`, :cve:`2021-47086`, :cve:`2021-47087`, :cve:`2021-47088`, :cve:`2021-47089`, :cve:`2021-47090`, :cve:`2021-47091`, :cve:`2021-47092`, :cve:`2021-47093`, :cve:`2021-47094`, :cve:`2021-47095`, :cve:`2021-47096`, :cve:`2021-47097`, :cve:`2021-47098`, :cve:`2021-47099`, :cve:`2021-47100`, :cve:`2021-47101`, :cve:`2021-47102`, :cve:`2021-47103`, :cve:`2021-47104`, :cve:`2021-47105`, :cve:`2021-47106`, :cve:`2021-47107`, :cve:`2021-47108`, :cve:`2021-47109`, :cve:`2021-47110`, :cve:`2021-47111`, :cve:`2021-47112`, :cve:`2021-47113`, :cve:`2021-47114`, :cve:`2021-47116`, :cve:`2021-47117`, :cve:`2021-47118`, :cve:`2021-47119`, :cve:`2021-47120`, :cve:`2021-47121`, :cve:`2021-47122`, :cve:`2021-47123`, :cve:`2021-47124`, :cve:`2021-47125`, :cve:`2021-47126`, :cve:`2021-47127`, :cve:`2021-47128`, :cve:`2021-47129`, :cve:`2021-47130`, :cve:`2021-47131`, :cve:`2021-47132`, :cve:`2021-47133`, :cve:`2021-47134`, :cve:`2021-47135`, :cve:`2021-47136`, :cve:`2021-47137`, :cve:`2021-47138`, :cve:`2021-47139`, :cve:`2021-47140`, :cve:`2021-47141`, :cve:`2021-47142`, :cve:`2021-47143`, :cve:`2021-47144`, :cve:`2021-47145`, :cve:`2021-47146`, :cve:`2021-47147`, :cve:`2021-47148`, :cve:`2021-47149`, :cve:`2021-47150`, :cve:`2021-47151`, :cve:`2021-47152`, :cve:`2021-47153`, :cve:`2021-47158`, :cve:`2021-47159`, :cve:`2021-47160`, :cve:`2021-47161`, :cve:`2021-47162`, :cve:`2021-47163`, :cve:`2021-47164`, :cve:`2021-47165`, :cve:`2021-47166`, :cve:`2021-47167`, :cve:`2021-47168`, :cve:`2021-47169`, :cve:`2021-47170`, :cve:`2021-47171`, :cve:`2021-47172`, :cve:`2021-47173`, :cve:`2021-47174`, :cve:`2021-47175`, :cve:`2021-47176`, :cve:`2021-47177`, :cve:`2021-47178`, :cve:`2021-47179`, :cve:`2021-47180`, :cve:`2022-48626`, :cve:`2022-48627`, :cve:`2022-48628`, :cve:`2022-48629` and :cve:`2022-48630` | 21 | - linux-yocto/6.6: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179`, :cve_nist:`2021-47180`, :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48628`, :cve_nist:`2022-48629` and :cve_nist:`2022-48630` |
22 | - linux-yocto/6.6 (cont.): Ignore :cve:`2023-6270`, :cve:`2023-6356`, :cve:`2023-6536`, :cve:`2023-7042`, :cve:`2023-28746`, :cve:`2023-52465`, :cve:`2023-52467`, :cve:`2023-52468`, :cve:`2023-52469`, :cve:`2023-52470`, :cve:`2023-52471`, :cve:`2023-52472`, :cve:`2023-52473`, :cve:`2023-52474`, :cve:`2023-52475`, :cve:`2023-52476`, :cve:`2023-52477`, :cve:`2023-52478`, :cve:`2023-52479`, :cve:`2023-52480`, :cve:`2023-52481`, :cve:`2023-52482`, :cve:`2023-52483`, :cve:`2023-52484`, :cve:`2023-52486`, :cve:`2023-52487`, :cve:`2023-52488`, :cve:`2023-52489`, :cve:`2023-52490`, :cve:`2023-52491`, :cve:`2023-52492`, :cve:`2023-52493`, :cve:`2023-52494`, :cve:`2023-52495`, :cve:`2023-52497`, :cve:`2023-52498`, :cve:`2023-52499`, :cve:`2023-52500`, :cve:`2023-52501`, :cve:`2023-52502`, :cve:`2023-52503`, :cve:`2023-52504`, :cve:`2023-52505`, :cve:`2023-52506`, :cve:`2023-52507`, :cve:`2023-52508`, :cve:`2023-52509`, :cve:`2023-52510`, :cve:`2023-52511`, :cve:`2023-52512`, :cve:`2023-52513`, :cve:`2023-52515`, :cve:`2023-52516`, :cve:`2023-52517`, :cve:`2023-52518`, :cve:`2023-52519`, :cve:`2023-52520`, :cve:`2023-52522`, :cve:`2023-52523`, :cve:`2023-52524`, :cve:`2023-52525`, :cve:`2023-52526`, :cve:`2023-52527`, :cve:`2023-52528`, :cve:`2023-52529`, :cve:`2023-52530`, :cve:`2023-52531`, :cve:`2023-52532`, :cve:`2023-52559`, :cve:`2023-52560`, :cve:`2023-52561`, :cve:`2023-52562`, :cve:`2023-52563`, :cve:`2023-52564`, :cve:`2023-52565`, :cve:`2023-52566`, :cve:`2023-52567`, :cve:`2023-52568`, :cve:`2023-52569`, :cve:`2023-52570`, :cve:`2023-52571`, :cve:`2023-52572`, :cve:`2023-52573`, :cve:`2023-52574`, :cve:`2023-52575`, :cve:`2023-52576`, :cve:`2023-52577`, :cve:`2023-52578`, :cve:`2023-52580`, :cve:`2023-52581`, :cve:`2023-52582`, :cve:`2023-52583`, :cve:`2023-52584`, :cve:`2023-52587`, :cve:`2023-52588`, :cve:`2023-52589`, :cve:`2023-52591`, :cve:`2023-52593`, :cve:`2023-52594`, :cve:`2023-52595`, :cve:`2023-52596`, :cve:`2023-52597`, :cve:`2023-52598`, :cve:`2023-52599`, :cve:`2023-52600`, :cve:`2023-52601`, :cve:`2023-52602`, :cve:`2023-52603`, :cve:`2023-52604`, :cve:`2023-52606`, :cve:`2023-52607`, :cve:`2023-52608`, :cve:`2023-52609`, :cve:`2023-52610`, :cve:`2023-52611`, :cve:`2023-52612`, :cve:`2023-52613`, :cve:`2023-52614`, :cve:`2023-52615`, :cve:`2023-52616`, :cve:`2023-52617`, :cve:`2023-52618`, :cve:`2023-52619`, :cve:`2023-52620`, :cve:`2023-52621`, :cve:`2023-52622`, :cve:`2023-52623`, :cve:`2023-52626`, :cve:`2023-52627`, :cve:`2023-52628`, :cve:`2023-52629`, :cve:`2023-52630`, :cve:`2023-52631`, :cve:`2023-52632`, :cve:`2023-52633`, :cve:`2023-52635`, :cve:`2023-52636`, :cve:`2023-52637`, :cve:`2023-52638`, :cve:`2023-52639`, :cve:`2023-52640`, :cve:`2023-52641`, :cve:`2024-0841`, :cve:`2024-22099`, :cve:`2024-23196`, :cve:`2024-26600`, :cve:`2024-26601`, :cve:`2024-26602`, :cve:`2024-26603`, :cve:`2024-26604`, :cve:`2024-26605`, :cve:`2024-26606`, :cve:`2024-26607`, :cve:`2024-26608`, :cve:`2024-26610`, :cve:`2024-26611`, :cve:`2024-26612`, :cve:`2024-26614`, :cve:`2024-26615`, :cve:`2024-26616`, :cve:`2024-26617`, :cve:`2024-26618`, :cve:`2024-26619`, :cve:`2024-26620`, :cve:`2024-26621`, :cve:`2024-26622`, :cve:`2024-26623`, :cve:`2024-26625`, :cve:`2024-26626`, :cve:`2024-26627`, :cve:`2024-26629`, :cve:`2024-26630`, :cve:`2024-26631`, :cve:`2024-26632`, :cve:`2024-26633`, :cve:`2024-26634`, :cve:`2024-26635`, :cve:`2024-26636`, :cve:`2024-26637`, :cve:`2024-26638`, :cve:`2024-26639`, :cve:`2024-26640`, :cve:`2024-26641`, :cve:`2024-26644`, :cve:`2024-26645`, :cve:`2024-26646`, :cve:`2024-26647`, :cve:`2024-26648`, :cve:`2024-26649`, :cve:`2024-26650`, :cve:`2024-26651`, :cve:`2024-26652`, :cve:`2024-26653`, :cve:`2024-26657`, :cve:`2024-26659`, :cve:`2024-26660`, :cve:`2024-26661`, :cve:`2024-26662`, :cve:`2024-26663`, :cve:`2024-26664`, :cve:`2024-26665`, :cve:`2024-26666`, :cve:`2024-26667`, :cve:`2024-26668`, :cve:`2024-26669`, :cve:`2024-26670`, :cve:`2024-26671`, :cve:`2024-26673`, :cve:`2024-26674`, :cve:`2024-26675`, :cve:`2024-26676`, :cve:`2024-26677`, :cve:`2024-26678`, :cve:`2024-26679`, :cve:`2024-26680`, :cve:`2024-26681`, :cve:`2024-26682`, :cve:`2024-26683`, :cve:`2024-26684`, :cve:`2024-26685`, :cve:`2024-26687`, :cve:`2024-26688`, :cve:`2024-26689`, :cve:`2024-26690`, :cve:`2024-26691`, :cve:`2024-26692`, :cve:`2024-26693`, :cve:`2024-26694`, :cve:`2024-26695`, :cve:`2024-26696`, :cve:`2024-26697`, :cve:`2024-26698`, :cve:`2024-26700`, :cve:`2024-26702`, :cve:`2024-26703`, :cve:`2024-26704`, :cve:`2024-26705`, :cve:`2024-26706`, :cve:`2024-26707`, :cve:`2024-26708`, :cve:`2024-26709`, :cve:`2024-26710`, :cve:`2024-26711`, :cve:`2024-26712`, :cve:`2024-26713`, :cve:`2024-26714`, :cve:`2024-26715`, :cve:`2024-26716`, :cve:`2024-26717`, :cve:`2024-26718`, :cve:`2024-26719`, :cve:`2024-26720`, :cve:`2024-26721`, :cve:`2024-26722`, :cve:`2024-26723`, :cve:`2024-26724`, :cve:`2024-26725`, :cve:`2024-26726`, :cve:`2024-26727`, :cve:`2024-26728`, :cve:`2024-26729`, :cve:`2024-26730`, :cve:`2024-26731`, :cve:`2024-26732`, :cve:`2024-26733`, :cve:`2024-26734`, :cve:`2024-26735`, :cve:`2024-26736`, :cve:`2024-26737`, :cve:`2024-26738`, :cve:`2024-26739`, :cve:`2024-26740`, :cve:`2024-26741`, :cve:`2024-26742`, :cve:`2024-26743`, :cve:`2024-26744`, :cve:`2024-26745`, :cve:`2024-26746`, :cve:`2024-26747`, :cve:`2024-26748`, :cve:`2024-26749`, :cve:`2024-26750`, :cve:`2024-26751`, :cve:`2024-26752`, :cve:`2024-26753`, :cve:`2024-26754`, :cve:`2024-26755`, :cve:`2024-26759`, :cve:`2024-26760`, :cve:`2024-26761`, :cve:`2024-26762`, :cve:`2024-26763`, :cve:`2024-26764`, :cve:`2024-26765`, :cve:`2024-26766`, :cve:`2024-26767`, :cve:`2024-26768`, :cve:`2024-26769`, :cve:`2024-26770`, :cve:`2024-26771`, :cve:`2024-26772`, :cve:`2024-26773`, :cve:`2024-26774`, :cve:`2024-26775`, :cve:`2024-26776`, :cve:`2024-26777`, :cve:`2024-26778`, :cve:`2024-26779`, :cve:`2024-26780`, :cve:`2024-26781`, :cve:`2024-26782`, :cve:`2024-26783`, :cve:`2024-26786`, :cve:`2024-26787`, :cve:`2024-26788`, :cve:`2024-26789`, :cve:`2024-26790`, :cve:`2024-26791`, :cve:`2024-26792`, :cve:`2024-26793`, :cve:`2024-26794`, :cve:`2024-26795`, :cve:`2024-26796`, :cve:`2024-26798`, :cve:`2024-26799`, :cve:`2024-26800`, :cve:`2024-26801`, :cve:`2024-26802`, :cve:`2024-26803`, :cve:`2024-26804`, :cve:`2024-26805`, :cve:`2024-26807`, :cve:`2024-26808` and :cve:`2024-26809` | 22 | - linux-yocto/6.6 (cont.): Ignore :cve_nist:`2023-6270`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-7042`, :cve_nist:`2023-28746`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52481`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52488`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52506`, :cve_nist:`2023-52507`, :cve_nist:`2023-52508`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52530`, :cve_nist:`2023-52531`, :cve_nist:`2023-52532`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52561`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52565`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52568`, :cve_nist:`2023-52569`, :cve_nist:`2023-52570`, :cve_nist:`2023-52571`, :cve_nist:`2023-52572`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52576`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52582`, :cve_nist:`2023-52583`, :cve_nist:`2023-52584`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52589`, :cve_nist:`2023-52591`, :cve_nist:`2023-52593`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52596`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52620`, :cve_nist:`2023-52621`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52629`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52632`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52639`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0841`, :cve_nist:`2024-22099`, :cve_nist:`2024-23196`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26607`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26622`, :cve_nist:`2024-26623`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26646`, :cve_nist:`2024-26647`, :cve_nist:`2024-26648`, :cve_nist:`2024-26649`, :cve_nist:`2024-26650`, :cve_nist:`2024-26651`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26659`, :cve_nist:`2024-26660`, :cve_nist:`2024-26661`, :cve_nist:`2024-26662`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26669`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26677`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26680`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26687`, :cve_nist:`2024-26688`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26691`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26700`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26706`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26713`, :cve_nist:`2024-26714`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26718`, :cve_nist:`2024-26719`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26726`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26738`, :cve_nist:`2024-26739`, :cve_nist:`2024-26740`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26745`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26759`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26765`, :cve_nist:`2024-26766`, :cve_nist:`2024-26767`, :cve_nist:`2024-26768`, :cve_nist:`2024-26769`, :cve_nist:`2024-26770`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26775`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26782`, :cve_nist:`2024-26783`, :cve_nist:`2024-26786`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26789`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26792`, :cve_nist:`2024-26793`, :cve_nist:`2024-26794`, :cve_nist:`2024-26795`, :cve_nist:`2024-26796`, :cve_nist:`2024-26798`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805`, :cve_nist:`2024-26807`, :cve_nist:`2024-26808` and :cve_nist:`2024-26809` |
23 | - llvm: Fix :cve:`2024-0151` | 23 | - llvm: Fix :cve_nist:`2024-0151` |
24 | - ofono: Fix :cve:`2023-2794` | 24 | - ofono: Fix :cve_nist:`2023-2794` |
25 | - openssh: Fix :cve:`2024-6387` and :cve:`2024-39894` | 25 | - openssh: Fix :cve_nist:`2024-6387` and :cve_nist:`2024-39894` |
26 | - openssl: Fix :cve:`2024-5535` | 26 | - openssl: Fix :cve_nist:`2024-5535` |
27 | - pam: Fix :cve:`2024-22365` | 27 | - pam: Fix :cve_nist:`2024-22365` |
28 | - python3-idna: Fix :cve:`2024-3651` | 28 | - python3-idna: Fix :cve_nist:`2024-3651` |
29 | - qemu: Fix :cve:`2023-6683`, :cve:`2024-3446`, :cve_mitre:`2024-3447`, :cve:`2024-3567`, :cve:`2024-26327` and :cve:`2024-26328` | 29 | - qemu: Fix :cve_nist:`2023-6683`, :cve_nist:`2024-3446`, :cve_mitre:`2024-3447`, :cve_nist:`2024-3567`, :cve_nist:`2024-26327` and :cve_nist:`2024-26328` |
30 | - ruby: Fix :cve:`2023-36617` and :cve:`2024-27281` | 30 | - ruby: Fix :cve_nist:`2023-36617` and :cve_nist:`2024-27281` |
31 | - vte: Fix :cve:`2024-37535` | 31 | - vte: Fix :cve_nist:`2024-37535` |
32 | - wget: Fix for :cve:`2024-38428` | 32 | - wget: Fix for :cve_nist:`2024-38428` |
33 | 33 | ||
34 | 34 | ||
35 | Fixes in Yocto-5.0.3 | 35 | Fixes in Yocto-5.0.3 |
diff --git a/documentation/migration-guides/release-notes-5.0.4.rst b/documentation/migration-guides/release-notes-5.0.4.rst new file mode 100644 index 0000000000..14fbe3f6f8 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.4.rst | |||
@@ -0,0 +1,212 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-5.0.4 (Scarthgap) | ||
4 | ----------------------------------------- | ||
5 | |||
6 | Security Fixes in Yocto-5.0.4 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - apr: Fix :cve_nist:`2023-49582` | ||
10 | - curl: Ignore :cve_nist:`2024-32928` | ||
11 | - curl: Fix :cve_nist:`2024-7264` | ||
12 | - expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492` | ||
13 | - ffmpeg: Fix :cve_nist:`2023-50008` and :cve_nist:`2024-32230` | ||
14 | - libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006` | ||
15 | - libyaml: Ignore :cve_nist:`2024-35325` and :cve_nist:`2024-35326` | ||
16 | - openssl: Fix :cve_nist:`2024-5535` and :cve_nist:`2024-6119` | ||
17 | - python3-certifi: Fix :cve_nist:`2024-39689` | ||
18 | - python3-setuptools: Fix :cve_nist:`2024-6345` | ||
19 | - python3: Fix :cve_nist:`2024-6232`, :cve_nist:`2024-7592`, :cve_nist:`2024-8088` and :cve_nist:`2024-27034` | ||
20 | - qemu: Fix :cve_nist:`2024-4467` and :cve_nist:`2024-7409` | ||
21 | - ruby: Fix :cve_nist:`2024-27282` | ||
22 | - tiff: Fix :cve_nist:`2024-7006` | ||
23 | - vim: Fix :cve_nist:`2024-41957`, :cve_nist:`2024-41965`, :cve_nist:`2024-43374`, :cve_nist:`2024-43790` and :cve_nist:`2024-43802` | ||
24 | |||
25 | |||
26 | Fixes in Yocto-5.0.4 | ||
27 | ~~~~~~~~~~~~~~~~~~~~ | ||
28 | |||
29 | - apr: drop 0007-explicitly-link-libapr-against-phtread-to-make-gold-.patch | ||
30 | - apr: upgrade to 1.7.5 | ||
31 | - bind: Fix build with the `httpstats` package config enabled | ||
32 | - bitbake: data_smart: Improve performance for VariableHistory | ||
33 | - bluez5: remove redundant patch for MAX_INPUT | ||
34 | - build-appliance-image: Update to scarthgap head revision | ||
35 | - buildhistory: Fix intermittent package file list creation | ||
36 | - buildhistory: Restoring files from preserve list | ||
37 | - buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage | ||
38 | - busybox: Fix cut with "-s" flag | ||
39 | - create-sdpx-2.2.bbclass: Switch from exists to isfile checking debugsrc | ||
40 | - cups: upgrade to 2.4.10 | ||
41 | - dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only) | ||
42 | - doc: features: describe distribution feature pni-name | ||
43 | - doc: features: remove duplicate word in distribution feature ext2 | ||
44 | - expat: upgrade to 2.6.3 | ||
45 | - expect-native: fix do_compile failure with gcc-14 | ||
46 | - gcc: Fix spurious '/' in GLIBC_DYNAMIC_LINKER on microblaze | ||
47 | - gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only) | ||
48 | - glibc: fix fortran header file conflict for arm | ||
49 | - go: upgrade to 1.22.6 | ||
50 | - gstreamer1.0: disable flaky baseparser tests | ||
51 | - image_types.bbclass: Use --force also with lz4,lzop | ||
52 | - initramfs-framework: fix typos | ||
53 | - iw: Fix :term:`LICENSE` (change to ISC) | ||
54 | - libadwaita: upgrade to 1.5.2 | ||
55 | - libcap-ng: update :term:`SRC_URI` | ||
56 | - libdnf: upgrade to 0.73.2 | ||
57 | - libedit: Make docs generation deterministic | ||
58 | - libgfortran.inc: fix nativesdk-libgfortran dependencies | ||
59 | - librsvg: don't try to run target code at build time | ||
60 | - linux-firmware: add a package for ath12k firmware | ||
61 | - llvm: Enable libllvm for native build | ||
62 | - maintainers.inc: add maintainer for python(-setuptools, -smmap, -subunit, -testtools) | ||
63 | - mc: fix source URL | ||
64 | - migration-guide: add release notes for 4.0.20 and 5.0.3 | ||
65 | - oeqa/postactions: fix exception handling | ||
66 | - oeqa/runtime/ssh: In case of failure, show exit code and handle -15 (SIGTERM) | ||
67 | - oeqa/runtime/ssh: add retry logic and sleeps to allow for slower systems | ||
68 | - oeqa/runtime/ssh: check for all errors at the end | ||
69 | - oeqa/runtime/ssh: increase the number of attempts | ||
70 | - oeqa/selftest/reproducibile: Explicitly list virtual targets | ||
71 | - oeqa/utils/postactions: transfer whole archive over ssh instead of doing individual copies | ||
72 | - openssh: add backported header file include | ||
73 | - openssl: upgrade to 3.2.3 | ||
74 | - os-release: Fix VERSION_CODENAME in case it is empty | ||
75 | - poky.conf: bump version for 5.0.4 | ||
76 | - populate_sdk_ext.bclass: make sure OECORE_NATIVE_SYSROOT is exported. | ||
77 | - python3-maturin: Fix cross compilation issue for armv7l, mips64, ppc | ||
78 | - python3-pycryptodome(x): use python_setuptools_build_meta build class | ||
79 | - python3: upgrade to 3.12.6 | ||
80 | - python3: skip readline limited history tests | ||
81 | - qemu: backport patches to fix riscv64 build failure | ||
82 | - qemuboot: Trigger write_qemuboot_conf task on changes of kernel image realpath | ||
83 | - ref-manual: fix typo and move :term:`SYSROOT_DIRS` example | ||
84 | - ruby: Make docs generation deterministic | ||
85 | - systemd: Mitigate /var/log type mismatch issue | ||
86 | - systemd: Mitigate /var/tmp type mismatch issue | ||
87 | - tiff: Fix :term:`LICENSE` (change to libtiff) | ||
88 | - u-boot.inc: Refactor do_* steps into functions that can be overridden | ||
89 | - udev-extraconf: Add collect flag to mount | ||
90 | - unzip: Fix :term:`LICENSE` (change to Info-ZIP) | ||
91 | - util-linux: Add :term:`PACKAGECONFIG` option (libmount-mountfd-support) to mitigate rootfs remount error | ||
92 | - vim: upgrade to 9.1.0698 | ||
93 | - weston-init: fix weston not starting when xwayland is enabled | ||
94 | - wireless-regdb: upgrade to 2024.07.04 | ||
95 | - wpa-supplicant: upgrade to 2.11 | ||
96 | - xserver-xorg: mark :cve_nist:`2023-5574` as unpatched when xvfb enabled | ||
97 | - yocto-uninative: Update to 4.6 for glibc 2.40 | ||
98 | - zip: Fix :term:`LICENSE` (change to Info-ZIP) | ||
99 | |||
100 | |||
101 | Known Issues in Yocto-5.0.4 | ||
102 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
103 | |||
104 | - N/A | ||
105 | |||
106 | |||
107 | Contributors to Yocto-5.0.4 | ||
108 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
109 | |||
110 | - Alban Bedel | ||
111 | - Alexander Kanavin | ||
112 | - Alexis Lothoré | ||
113 | - Archana Polampalli | ||
114 | - Ashish Sharma | ||
115 | - Bartosz Golaszewski | ||
116 | - Benjamin Szőke | ||
117 | - Changqing Li | ||
118 | - Chen Qi | ||
119 | - Colin McAllister | ||
120 | - Daniel Semkowicz | ||
121 | - Dmitry Baryshkov | ||
122 | - Gauthier HADERER | ||
123 | - Guðni Már Gilbert | ||
124 | - Jon Mason | ||
125 | - Jose Quaresma | ||
126 | - Jörg Sommer | ||
127 | - Kai Kang | ||
128 | - Khem Raj | ||
129 | - Lee Chee Yang | ||
130 | - Mark Hatle | ||
131 | - Martin Jansa | ||
132 | - Matthias Pritschet | ||
133 | - Michael Halstead | ||
134 | - Mingli Yu | ||
135 | - Niko Mauno | ||
136 | - Pedro Ferreira | ||
137 | - Peter Marko | ||
138 | - Quentin Schulz | ||
139 | - Richard Purdie | ||
140 | - Robert Yang | ||
141 | - Ross Burton | ||
142 | - Ryan Eatmon | ||
143 | - Siddharth Doshi | ||
144 | - Simone Weiß | ||
145 | - Soumya Sambu | ||
146 | - Steve Sakoman | ||
147 | - Trevor Gamblin | ||
148 | - Ulrich Ölmann | ||
149 | - Vijay Anusuri | ||
150 | - Wang Mingyu | ||
151 | - Weisser, Pascal.ext | ||
152 | - Yogita Urade | ||
153 | |||
154 | |||
155 | Repositories / Downloads for Yocto-5.0.4 | ||
156 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
157 | |||
158 | poky | ||
159 | |||
160 | - Repository Location: :yocto_git:`/poky` | ||
161 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
162 | - Tag: :yocto_git:`yocto-5.0.4 </poky/log/?h=yocto-5.0.4>` | ||
163 | - Git Revision: :yocto_git:`2034fc38eb4e63984d9bd6b260aa1bf95ce562e4 </poky/commit/?id=2034fc38eb4e63984d9bd6b260aa1bf95ce562e4>` | ||
164 | - Release Artefact: poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4 | ||
165 | - sha: 697ed099793d6c86d5ffe590e96f99689bd28dcb2d4451dc4585496fa4a20400 | ||
166 | - Download Locations: | ||
167 | http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2 | ||
168 | http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2 | ||
169 | |||
170 | openembedded-core | ||
171 | |||
172 | - Repository Location: :oe_git:`/openembedded-core` | ||
173 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
174 | - Tag: :oe_git:`yocto-5.0.4 </openembedded-core/log/?h=yocto-5.0.4>` | ||
175 | - Git Revision: :oe_git:`f888dd911529a828820799a7a1b75dfd3a44847c </openembedded-core/commit/?id=f888dd911529a828820799a7a1b75dfd3a44847c>` | ||
176 | - Release Artefact: oecore-f888dd911529a828820799a7a1b75dfd3a44847c | ||
177 | - sha: 93cb4c3c8e0f77edab20814d155847dc3452c6b083e3dd9c7a801e80a7e4d228 | ||
178 | - Download Locations: | ||
179 | http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2 | ||
180 | http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2 | ||
181 | |||
182 | meta-mingw | ||
183 | |||
184 | - Repository Location: :yocto_git:`/meta-mingw` | ||
185 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
186 | - Tag: :yocto_git:`yocto-5.0.4 </meta-mingw/log/?h=yocto-5.0.4>` | ||
187 | - Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>` | ||
188 | - Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852 | ||
189 | - sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c | ||
190 | - Download Locations: | ||
191 | http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
192 | http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
193 | |||
194 | bitbake | ||
195 | |||
196 | - Repository Location: :oe_git:`/bitbake` | ||
197 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
198 | - Tag: :oe_git:`yocto-5.0.4 </bitbake/log/?h=yocto-5.0.4>` | ||
199 | - Git Revision: :oe_git:`d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3 </bitbake/commit/?id=d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3>` | ||
200 | - Release Artefact: bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3 | ||
201 | - sha: d873f4d3a471d26680dc39200d8f3851a6863f15daa9bed978ba31b930f9a1c1 | ||
202 | - Download Locations: | ||
203 | http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2 | ||
204 | http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2 | ||
205 | |||
206 | yocto-docs | ||
207 | |||
208 | - Repository Location: :yocto_git:`/yocto-docs` | ||
209 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
210 | - Tag: :yocto_git:`yocto-5.0.4 </yocto-docs/log/?h=yocto-5.0.4>` | ||
211 | - Git Revision: :yocto_git:`d71081dd14a9d75ace4d1c62472374f37b4a888d </yocto-docs/commit/?id=d71081dd14a9d75ace4d1c62472374f37b4a888d>` | ||
212 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.5.rst b/documentation/migration-guides/release-notes-5.0.5.rst new file mode 100644 index 0000000000..c8cf9a85d1 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.5.rst | |||
@@ -0,0 +1,227 @@ | |||
1 | Release notes for Yocto-5.0.5 (Scarthgap) | ||
2 | ----------------------------------------- | ||
3 | |||
4 | Security Fixes in Yocto-5.0.5 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | - ``cups``: Fix :cve_nist:`2024-47175` | ||
8 | - ``curl``: Fix :cve_nist:`2024-8096` | ||
9 | - ``gnupg``: Ignore :cve_nist:`2022-3219` (wont-fix) | ||
10 | - ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958` | ||
11 | - ``openssh``: Ignore :cve_nist:`2023-51767` (wont-fix) | ||
12 | - ``openssl``: Fix :cve_nist:`2024-9143` | ||
13 | - ``ruby``: Fix :cve_nist:`2024-41123` and :cve_mitre:`2024-41496` | ||
14 | - ``rust-llvm``: Fix :cve_nist:`2024-0151` | ||
15 | - ``rust``, ``libstd-rs``: Ignore :cve_nist:`2024-43402` | ||
16 | - ``wpa-supplicant``: Patch SAE H2E and incomplete downgrade protection for group negotiation | ||
17 | - ``wpa-supplicant``: Fix :cve_nist:`2024-3596` | ||
18 | - ``wpa-supplicant``: Ignore :cve_nist:`2024-5290` | ||
19 | |||
20 | |||
21 | Fixes in Yocto-5.0.5 | ||
22 | ~~~~~~~~~~~~~~~~~~~~ | ||
23 | |||
24 | - binutils: stable 2.42 branch updates | ||
25 | - bitbake.conf: Add truncate to :term:`HOSTTOOLS` | ||
26 | - bitbake: asyncrpc: Use client timeout for websocket open timeout | ||
27 | - bitbake: bitbake: doc/user-manual: Update the :term:`BB_HASHSERVE_UPSTREAM` | ||
28 | - bitbake: gitsm: Add call_process_submodules() to remove duplicated code | ||
29 | - bitbake: gitsm: Remove downloads/tmpdir when failed | ||
30 | - bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab | ||
31 | - bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab | ||
32 | - build-appliance-image: Update to scarthgap head revision | ||
33 | - cryptodev: upgrade to 1.14 | ||
34 | - cve-check: add support for cvss v4.0 | ||
35 | - cve_check: Use a local copy of the database during builds | ||
36 | - dev-manual: add bblock documentation | ||
37 | - documentation: conf.py: rename :cve: role to :cve_nist: | ||
38 | - documentation: README: add instruction to run Vale on a subset | ||
39 | - documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint | ||
40 | - e2fsprogs: removed 'sed -u' option | ||
41 | - ffmpeg: Add "libswresample libavcodec" to :term:`CVE_PRODUCT` | ||
42 | - glibc: stable 2.39 branch updates. | ||
43 | - go: upgrade to 1.22.8 | ||
44 | - icu: update patch Upstream-Status | ||
45 | - image.bbclass: Drop support for ImageQAFailed exceptions in image_qa | ||
46 | - image_qa: fix error handling | ||
47 | - install-buildtools: fix "test installation" step | ||
48 | - install-buildtools: remove md5 checksum validation | ||
49 | - install-buildtools: update base-url, release and installer version | ||
50 | - kernel-devsrc: remove 64 bit vdso cmd files | ||
51 | - kernel-fitimage: fix external dtb check | ||
52 | - kernel-fitimage: fix intentation | ||
53 | - lib/oe/package-manager: skip processing installed-pkgs with empty globs | ||
54 | - liba52: fix do_fetch error | ||
55 | - libpcre2: Update base uri PhilipHazel -> PCRE2Project | ||
56 | - libsdl2: Fix non-deterministic configure option for libsamplerate | ||
57 | - license: Fix directory layout issues | ||
58 | - linux-firmware: upgrade to 20240909 | ||
59 | - linux-yocto/6.6: fix genericarm64 config warning | ||
60 | - linux-yocto/6.6: upgrade to v6.6.54 | ||
61 | - lsb-release: fix Distro Codename shell escaping | ||
62 | - makedevs: Fix issue when rootdir of / is given | ||
63 | - makedevs: Fix matching uid/gid | ||
64 | - meta-ide-support: Mark recipe as MACHINE-specific | ||
65 | - meta-world-pkgdata: Inherit nopackages | ||
66 | - migration-guide: add release notes for 4.0.21, 4.0.22 and 5.0.4 | ||
67 | - migration-guide: release-notes-4.0: update :term:`BB_HASHSERVE_UPSTREAM` for new infrastructure | ||
68 | - migration-guide: release-notes-5.0.rst: update NO_OUTPUT -> NO_COLOR | ||
69 | - orc: upgrade to 0.4.40 | ||
70 | - overview-manual: concepts: add details on package splitting | ||
71 | - poky.conf: bump version for 5.0.5 | ||
72 | - populate_sdk_base: inherit nopackages | ||
73 | - ptest-runner: upgrade to 2.4.5 | ||
74 | - pulseaudio: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI` | ||
75 | - desktop-file-utils: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI` | ||
76 | - python3-lxml: upgrade to v5.0.2 | ||
77 | - python3-setuptools: Add "python:setuptools" to :term:`CVE_PRODUCT` | ||
78 | - recipes-bsp: usbutils: Fix usb-devices command using busybox | ||
79 | - ref-manual: add missing CVE_CHECK manifest variables | ||
80 | - ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable | ||
81 | - ref-manual: add missing :term:`OPKGBUILDCMD` variable | ||
82 | - ref-manual: add missing :term:`TESTIMAGE_FAILED_QA_ARTIFACTS` | ||
83 | - ref-manual: devtool-reference: document missing commands | ||
84 | - ref-manual: devtool-reference: refresh example outputs | ||
85 | - ref-manual: faq: add q&a on class appends | ||
86 | - ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable | ||
87 | - ref-manual: merge patch-status-* to patch-status | ||
88 | - ref-manual: release-process: add a reference to the doc's release | ||
89 | - ref-manual: release-process: refresh the current LTS releases | ||
90 | - ref-manual: release-process: update releases.svg | ||
91 | - ref-manual: release-process: update releases.svg with month after "Current" | ||
92 | - ref-manual: structure.rst: document missing tmp/ dirs | ||
93 | - ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables | ||
94 | - rootfs-postcommands.bbclass: make opkg status reproducible | ||
95 | - rpm: fix expansion of %_libdir in macros | ||
96 | - ruby: upgrade to 3.3.5 | ||
97 | - runqemu: Fix detection of -serial parameter | ||
98 | - runqemu: keep generating tap devices | ||
99 | - scripts/install-buildtools: Update to 5.0.3 | ||
100 | - sqlite3: upgrade to 3.45.3 | ||
101 | - styles: vocabularies: Yocto: add sstate | ||
102 | - systemtap: fix systemtap-native build error on Fedora 40 | ||
103 | - sysvinit: take release tarballs from github | ||
104 | - testexport: fallback for empty :term:`IMAGE_LINK_NAME` | ||
105 | - testimage: fallback for empty :term:`IMAGE_LINK_NAME` | ||
106 | - uboot-sign: fix counters in do_uboot_assemble_fitimage | ||
107 | - vim: upgrade to 9.1.0764 | ||
108 | - virglrenderer: Add patch to fix -int-conversion build issue | ||
109 | - webkitgtk: upgrade to 2.44.3 | ||
110 | - weston: backport patch to allow neatvnc < v0.9.0 | ||
111 | - wpa-supplicant: Patch security advisory 2024-2 | ||
112 | - xserver-xorg: upgrade to 21.1.14 | ||
113 | |||
114 | |||
115 | Known Issues in Yocto-5.0.5 | ||
116 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
117 | |||
118 | - ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the parselogs runtime test due to unexpected kernel error messages in the log (see :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla). | ||
119 | |||
120 | |||
121 | Contributors to Yocto-5.0.5 | ||
122 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
123 | |||
124 | - Aditya Tayade | ||
125 | - Adrian Freihofer | ||
126 | - Aleksandar Nikolic | ||
127 | - Alexander Kanavin | ||
128 | - Antonin Godard | ||
129 | - Anuj Mittal | ||
130 | - Bruce Ashfield | ||
131 | - Claus Stovgaard | ||
132 | - Deepesh Varatharajan | ||
133 | - Deepthi Hemraj | ||
134 | - Hiago De Franco | ||
135 | - Hitendra Prajapati | ||
136 | - Jaeyoon Jung | ||
137 | - Jiaying Song | ||
138 | - Jonas Gorski | ||
139 | - Jose Quaresma | ||
140 | - Joshua Watt | ||
141 | - Julien Stephan | ||
142 | - Jörg Sommer | ||
143 | - Khem Raj | ||
144 | - Konrad Weihmann | ||
145 | - Lee Chee Yang | ||
146 | - Louis Rannou | ||
147 | - Macpaul Lin | ||
148 | - Martin Jansa | ||
149 | - Paul Barker | ||
150 | - Paul Gerber | ||
151 | - Peter Kjellerstedt | ||
152 | - Peter Marko | ||
153 | - Purushottam Choudhary | ||
154 | - Richard Purdie | ||
155 | - Robert Yang | ||
156 | - Rohini Sangam | ||
157 | - Ross Burton | ||
158 | - Sergei Zhmylev | ||
159 | - Shunsuke Tokumoto | ||
160 | - Steve Sakoman | ||
161 | - Teresa Remmet | ||
162 | - Victor Kamensky | ||
163 | - Vijay Anusuri | ||
164 | - Wang Mingyu | ||
165 | - Yi Zhao | ||
166 | - Yogita Urade | ||
167 | - Zahir Hussain | ||
168 | |||
169 | |||
170 | Repositories / Downloads for Yocto-5.0.5 | ||
171 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
172 | |||
173 | poky | ||
174 | |||
175 | - Repository Location: :yocto_git:`/poky` | ||
176 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
177 | - Tag: :yocto_git:`yocto-5.0.5 </poky/log/?h=yocto-5.0.5>` | ||
178 | - Git Revision: :yocto_git:`dce4163d42f7036ea216b52b9135968d51bec4c1 </poky/commit/?id=dce4163d42f7036ea216b52b9135968d51bec4c1>` | ||
179 | - Release Artefact: poky-dce4163d42f7036ea216b52b9135968d51bec4c1 | ||
180 | - sha: ad35a965a284490a962f6854ace536b8795f96514e14bf5c79f91f6d76ac25d3 | ||
181 | - Download Locations: | ||
182 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2 | ||
183 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2 | ||
184 | |||
185 | openembedded-core | ||
186 | |||
187 | - Repository Location: :oe_git:`/openembedded-core` | ||
188 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
189 | - Tag: :oe_git:`yocto-5.0.5 </openembedded-core/log/?h=yocto-5.0.5>` | ||
190 | - Git Revision: :oe_git:`a051a066da2874b95680d0353dfa18c1d56b2670 </openembedded-core/commit/?id=a051a066da2874b95680d0353dfa18c1d56b2670>` | ||
191 | - Release Artefact: oecore-a051a066da2874b95680d0353dfa18c1d56b2670 | ||
192 | - sha: 16d252aade00161ade2692f41b2da3effeb1f41816a66db843bb1c5495125e93 | ||
193 | - Download Locations: | ||
194 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2 | ||
195 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2 | ||
196 | |||
197 | meta-mingw | ||
198 | |||
199 | - Repository Location: :yocto_git:`/meta-mingw` | ||
200 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
201 | - Tag: :yocto_git:`yocto-5.0.5 </meta-mingw/log/?h=yocto-5.0.5>` | ||
202 | - Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>` | ||
203 | - Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852 | ||
204 | - sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c | ||
205 | - Download Locations: | ||
206 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
207 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
208 | |||
209 | bitbake | ||
210 | |||
211 | - Repository Location: :bitbake_git:`/` | ||
212 | - Branch: :bitbake_git:`2.8 </log/?h=2.8>` | ||
213 | - Tag: :bitbake_git:`yocto-5.0.5 </log/?h=yocto-5.0.5>` | ||
214 | - Git Revision: :bitbake_git:`377eba2361850adfb8ce7e761ef9c76be287f88c </commit/?id=377eba2361850adfb8ce7e761ef9c76be287f88c>` | ||
215 | - Release Artefact: bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c | ||
216 | - sha: 4a5a35098eec719bbb879706d50e552a2b709295db4055c8050ae7dda1eb2994 | ||
217 | - Download Locations: | ||
218 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2 | ||
219 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2 | ||
220 | |||
221 | yocto-docs | ||
222 | |||
223 | - Repository Location: :yocto_git:`/yocto-docs` | ||
224 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
225 | - Tag: :yocto_git:`yocto-5.0.5 </yocto-docs/log/?h=yocto-5.0.5>` | ||
226 | - Git Revision: :yocto_git:`e882cb3e5816d081eb05cb83488f286cca70e0c6 </yocto-docs/commit/?id=e882cb3e5816d081eb05cb83488f286cca70e0c6>` | ||
227 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.6.rst b/documentation/migration-guides/release-notes-5.0.6.rst new file mode 100644 index 0000000000..b6f42198a1 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.6.rst | |||
@@ -0,0 +1,223 @@ | |||
1 | Release notes for Yocto-5.0.6 (Scarthgap) | ||
2 | ----------------------------------------- | ||
3 | |||
4 | Security Fixes in Yocto-5.0.6 | ||
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
6 | |||
7 | - acpica: Fix :cve_nist:`2024-24856` | ||
8 | - curl: Fix :cve_nist:`2024-9681` | ||
9 | - dropbear: Fix :cve_nist:`2023-48795` | ||
10 | - expat: Fix :cve_nist:`2024-50602` | ||
11 | - ffmpeg: Fix :cve_nist:`2023-49501`, :cve_nist:`2023-49528`, :cve_nist:`2023-50007`, | ||
12 | :cve_nist:`2024-7055` and :cve_mitre:`2024-28661` | ||
13 | - glib-2.0: Fix :cve_nist:`2024-52533` | ||
14 | - ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`, | ||
15 | :cve_nist:`2024-46954`, :cve_nist:`2024-46955` and :cve_nist:`2024-46956` | ||
16 | - gstreamer1.0: Ignore :cve_nist:`2024-0444` | ||
17 | - libpam: Fix :cve_nist:`2024-10041` | ||
18 | - libsndfile: Fix :cve_nist:`2024-50612` | ||
19 | - libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532` | ||
20 | - ovmf: Fix :cve_nist:`2024-1298` and :cve_nist:`2024-38796` | ||
21 | - python3-zipp: Fix :cve_nist:`2024-5569` | ||
22 | - qemu: Fix :cve_nist:`2024-4693`, :cve_nist:`2024-6505` and :cve_nist:`2024-7730` | ||
23 | - qemu: Ignore :cve_nist:`2024-6505` | ||
24 | |||
25 | |||
26 | Fixes in Yocto-5.0.6 | ||
27 | ~~~~~~~~~~~~~~~~~~~~ | ||
28 | |||
29 | - binutils: Add missing perl modules to :term:`RDEPENDS` for nativesdk variant | ||
30 | - binutils: stable 2.42 branch update | ||
31 | - bitbake: Remove custom exception backtrace formatting | ||
32 | - bitbake: fetch2/git: Use quote from shlex, not pipes | ||
33 | - bitbake: fetch2: use persist_data context managers | ||
34 | - bitbake: fetch/wget: Increase timeout to 100s from 30s | ||
35 | - bitbake: persist_data: close connection in SQLTable __exit__ | ||
36 | - bitbake: runqueue: Fix performance of multiconfigs with large overlap | ||
37 | - bitbake: runqueue: Fix scenetask processing performance issue | ||
38 | - bitbake: runqueue: Optimise setscene loop processing | ||
39 | - build-appliance-image: Update to scarthgap head revision | ||
40 | - builder: set :term:`CVE_PRODUCT` | ||
41 | - cmake: Fix sporadic issues when determining compiler internals | ||
42 | - cml1: do_diffconfig: Don't override .config with .config.orig | ||
43 | - contributor-guide: Remove duplicated words | ||
44 | - dev-manual: bblock: use warning block instead of attention | ||
45 | - dev-manual: document how to provide confs from layer.conf | ||
46 | - dnf: drop python3-iniparse from :term:`DEPENDS` and :term:`RDEPENDS` | ||
47 | - do_package/sstate/sstatesig: Change timestamp clamping to hash output only | ||
48 | - doc: Makefile: add support for xelatex | ||
49 | - doc: Makefile: publish pdf and epub versions too | ||
50 | - doc: Makefile: remove inkscape, replace by rsvg-convert | ||
51 | - doc: add a download page for epub and pdf | ||
52 | - doc: conf.py: add a bitbake_git extlink | ||
53 | - doc: standards.md: add a section on admonitions | ||
54 | - doc: sphinx-static: switchers.js.in: do not refer to URL_ROOT anymore | ||
55 | - dropbear: backport fix for concurrent channel open/close | ||
56 | - enchant2: fix do_fetch error | ||
57 | - expat: upgrade to 2.6.4 | ||
58 | - gcc: backport patch to fix an issue with tzdata 2024b | ||
59 | - ghostscript: upgrade to 10.04.0 | ||
60 | - glibc: stable 2.39 branch updates | ||
61 | - groff: fix rare build race in hdtbl | ||
62 | - libgcrypt: Fix building error with '-O2' in sysroot path | ||
63 | - libpam: drop cracklib from :term:`DEPENDS` | ||
64 | - libxml-parser-perl: fix do_fetch error | ||
65 | - llvm: reduce size of -dbg package | ||
66 | - lttng-ust: backport patch to fix cmake-multiple-shared-libraries build error | ||
67 | - migration-guides: add release notes for 4.0.23 and 5.0.5 | ||
68 | - ninja: fix build with python 3.13 | ||
69 | - oeqa/runtime/ssh: Fix incorrect timeout fix | ||
70 | - oeqa/runtime/ssh: Rework ssh timeout | ||
71 | - oeqa/utils/gitarchive: Return tag name and improve exclude handling | ||
72 | - package_rpm: Check if file exists before open() | ||
73 | - package_rpm: restrict rpm to 4 threads | ||
74 | - package_rpm: use zstd's default compression level | ||
75 | - poky.conf: bump version for 5.0.6 | ||
76 | - pseudo: Fix envp bug and add posix_spawn wrapper | ||
77 | - python3-poetry-core: drop python3-six from :term:`RDEPENDS` | ||
78 | - python3-requests: upgrade to 2.32.2 | ||
79 | - python3-urllib3: upgrade to 2.2.2 | ||
80 | - qemu: upgrade to 8.2.7 | ||
81 | - qemurunner: Clean up serial_lock handling | ||
82 | - ref-manual: classes: fix bin_package description | ||
83 | - resulttool: Add --logfile-archive option to store mode | ||
84 | - resulttool: Allow store to filter to specific revisions | ||
85 | - resulttool: Clean up repoducible build logs | ||
86 | - resulttool: Fix passthrough of --all files in store mode | ||
87 | - resulttool: Handle ltp rawlogs as well as ptest | ||
88 | - resulttool: Improve repo layout for oeselftest results | ||
89 | - resulttool: Trim the precision of duration information | ||
90 | - resulttool: Use single space indentation in json output | ||
91 | - rootfs: Ensure run-postinsts is not uninstalled for read-only-rootfs-delayed-postinsts | ||
92 | - rxvt-unicode.inc: disable the terminfo installation by setting TIC to : | ||
93 | - sanity: check for working user namespaces | ||
94 | - scripts/install-buildtools: Update to 5.0.5 | ||
95 | - selftest/reproducible: Clean up pathnames | ||
96 | - selftest/reproducible: Drop rawlogs | ||
97 | - shared-mime-info: drop itstool-native from :term:`DEPENDS` | ||
98 | - strace: download release tarballs from GitHub | ||
99 | - systemd-boot: drop intltool-native from :term:`DEPENDS` | ||
100 | - systemd: drop intltool-native from :term:`DEPENDS` | ||
101 | - systemd: upgrade to 255.13 | ||
102 | - sysvinit: backport patch for fixing one issue of pidof | ||
103 | - tcl: skip io-13.6 test case | ||
104 | - toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails | ||
105 | - tune-cortexa32: set tune feature as armv8a | ||
106 | - tzcode-native: upgrade to 2024b | ||
107 | - tzdata: upgrade to 2024b | ||
108 | - uboot-sign: fix concat_dtb arguments | ||
109 | - udev-extraconf: fix network.sh script did not configure hotplugged interfaces | ||
110 | - webkitgtk: fix erroneous use of unsuported DEBUG_LEVELFLAG variable | ||
111 | - wireless-regdb: upgrade to 2024.10.07 | ||
112 | |||
113 | |||
114 | Known Issues in Yocto-5.0.6 | ||
115 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
116 | |||
117 | - N/A | ||
118 | |||
119 | |||
120 | Contributors to Yocto-5.0.6 | ||
121 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
122 | |||
123 | Thanks to the following people who contributed to this release: | ||
124 | |||
125 | - Aleksandar Nikolic | ||
126 | - Alexander Kanavin | ||
127 | - Antonin Godard | ||
128 | - Archana Polampalli | ||
129 | - Bin Lan | ||
130 | - Changqing Li | ||
131 | - Chen Qi | ||
132 | - Chris Laplante | ||
133 | - Clayton Casciato | ||
134 | - Deepthi Hemraj | ||
135 | - Divya Chellam | ||
136 | - Florian Kreutzer | ||
137 | - Gassner, Tobias.ext | ||
138 | - Guðni Már Gilbert | ||
139 | - Harish Sadineni | ||
140 | - Hitendra Prajapati | ||
141 | - Hongxu Jia | ||
142 | - Jagadeesh Krishnanjanappa | ||
143 | - Jiaying Song | ||
144 | - Jinfeng Wang | ||
145 | - Joshua Watt | ||
146 | - Lee Chee Yang | ||
147 | - Markus Volk | ||
148 | - Michael Opdenacker | ||
149 | - Pavel Zhukov | ||
150 | - Peter Marko | ||
151 | - Philip Lorenz | ||
152 | - Randy MacLeod | ||
153 | - Regis Dargent | ||
154 | - Richard Purdie | ||
155 | - Robert Yang | ||
156 | - Ross Burton | ||
157 | - Soumya Sambu | ||
158 | - Steve Sakoman | ||
159 | - Talel BELHAJSALEM | ||
160 | - Trevor Gamblin | ||
161 | - Vijay Anusuri | ||
162 | - Wang Mingyu | ||
163 | - Yogita Urade | ||
164 | |||
165 | |||
166 | Repositories / Downloads for Yocto-5.0.6 | ||
167 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
168 | |||
169 | poky | ||
170 | |||
171 | - Repository Location: :yocto_git:`/poky` | ||
172 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
173 | - Tag: :yocto_git:`yocto-5.0.6 </poky/log/?h=yocto-5.0.6>` | ||
174 | - Git Revision: :yocto_git:`2541a8171f91812a4b16e7dc4da0d77d2318a256 </poky/commit/?id=2541a8171f91812a4b16e7dc4da0d77d2318a256>` | ||
175 | - Release Artefact: poky-2541a8171f91812a4b16e7dc4da0d77d2318a256 | ||
176 | - sha: b77157596ae75d163387a08a317397a57ab8fa6cf4725f28e344fae3f69cca4d | ||
177 | - Download Locations: | ||
178 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2 | ||
179 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2 | ||
180 | |||
181 | openembedded-core | ||
182 | |||
183 | - Repository Location: :oe_git:`/openembedded-core` | ||
184 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
185 | - Tag: :oe_git:`yocto-5.0.6 </openembedded-core/log/?h=yocto-5.0.6>` | ||
186 | - Git Revision: :oe_git:`336eec6808710f260a5336ca8ca98139a80ccb14 </openembedded-core/commit/?id=336eec6808710f260a5336ca8ca98139a80ccb14>` | ||
187 | - Release Artefact: oecore-336eec6808710f260a5336ca8ca98139a80ccb14 | ||
188 | - sha: 38c4fa7e7e88c28361c012dd5baabe373e2ec3c8aba6194146768b146192cceb | ||
189 | - Download Locations: | ||
190 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2 | ||
191 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2 | ||
192 | |||
193 | meta-mingw | ||
194 | |||
195 | - Repository Location: :yocto_git:`/meta-mingw` | ||
196 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
197 | - Tag: :yocto_git:`yocto-5.0.6 </meta-mingw/log/?h=yocto-5.0.6>` | ||
198 | - Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>` | ||
199 | - Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852 | ||
200 | - sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c | ||
201 | - Download Locations: | ||
202 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
203 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
204 | |||
205 | bitbake | ||
206 | |||
207 | - Repository Location: :oe_git:`/bitbake` | ||
208 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
209 | - Tag: :oe_git:`yocto-5.0.6 </bitbake/log/?h=yocto-5.0.6>` | ||
210 | - Git Revision: :oe_git:`f40a3a477d5241b697bf2fb030dd804c1ff5839f </bitbake/commit/?id=f40a3a477d5241b697bf2fb030dd804c1ff5839f>` | ||
211 | - Release Artefact: bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f | ||
212 | - sha: dbfc056c7408a5547f624799621ab1261a05685112e0922a88007723b1edbc87 | ||
213 | - Download Locations: | ||
214 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2 | ||
215 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2 | ||
216 | |||
217 | yocto-docs | ||
218 | |||
219 | - Repository Location: :yocto_git:`/yocto-docs` | ||
220 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
221 | - Tag: :yocto_git:`yocto-5.0.6 </yocto-docs/log/?h=yocto-5.0.6>` | ||
222 | - Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>` | ||
223 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.7.rst b/documentation/migration-guides/release-notes-5.0.7.rst new file mode 100644 index 0000000000..1c8a4809a9 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.7.rst | |||
@@ -0,0 +1,331 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-5.0.7 (Scarthgap) | ||
4 | ----------------------------------------- | ||
5 | |||
6 | Security Fixes in Yocto-5.0.7 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - avahi: Fix :cve_nist:`2024-52616` | ||
10 | - binutils: Fix :cve_nist:`2024-53589` | ||
11 | - ffmpeg: Fix :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368` | ||
12 | - gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`, | ||
13 | :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615` | ||
14 | and :cve_nist:`2024-47835` | ||
15 | - gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, | ||
16 | :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, | ||
17 | :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, | ||
18 | :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, | ||
19 | :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`, | ||
20 | :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834` | ||
21 | - gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`, | ||
22 | :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`, | ||
23 | :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, | ||
24 | :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, | ||
25 | :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, | ||
26 | :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, | ||
27 | :cve_nist:`2024-47775`, :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` | ||
28 | and :cve_nist:`2024-47834` | ||
29 | - libarchive: Fix :cve_nist:`2024-20696` | ||
30 | - libxml2: Fix :cve_nist:`2024-40896` | ||
31 | - linux-yocto/6.6: Fix :cve_nist:`2024-27059`, :cve_nist:`2024-43098`, :cve_nist:`2024-45828`, | ||
32 | :cve_nist:`2024-47141`, :cve_nist:`2024-47143`, :cve_nist:`2024-47704`, :cve_nist:`2024-47809`, | ||
33 | :cve_nist:`2024-48873`, :cve_nist:`2024-48875`, :cve_nist:`2024-48881`, :cve_nist:`2024-49863`, | ||
34 | :cve_nist:`2024-49864`, :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, | ||
35 | :cve_nist:`2024-49870`, :cve_nist:`2024-49871`, :cve_nist:`2024-49874`, :cve_nist:`2024-49875`, | ||
36 | :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`, :cve_nist:`2024-49881`, | ||
37 | :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`, :cve_nist:`2024-49886`, | ||
38 | :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, :cve_nist:`2024-49894`, | ||
39 | :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, :cve_nist:`2024-49901`, | ||
40 | :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49905`, :cve_nist:`2024-49907`, | ||
41 | :cve_nist:`2024-49912`, :cve_nist:`2024-49913`, :cve_nist:`2024-49924`, :cve_nist:`2024-49925`, | ||
42 | :cve_nist:`2024-49927`, :cve_nist:`2024-49929`, :cve_nist:`2024-49930`, :cve_nist:`2024-49931`, | ||
43 | :cve_nist:`2024-49933`, :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49937`, | ||
44 | :cve_nist:`2024-49938`, :cve_nist:`2024-49939`, :cve_nist:`2024-49944`, :cve_nist:`2024-49946`, | ||
45 | :cve_nist:`2024-49947`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49950`, | ||
46 | :cve_nist:`2024-49951`, :cve_nist:`2024-49952`, :cve_nist:`2024-49953`, :cve_nist:`2024-49954`, | ||
47 | :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, :cve_nist:`2024-49959`, | ||
48 | :cve_nist:`2024-49960`, :cve_nist:`2024-49961`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, | ||
49 | :cve_nist:`2024-49965`, :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, | ||
50 | :cve_nist:`2024-49975`, :cve_nist:`2024-49976`, :cve_nist:`2024-49977`, :cve_nist:`2024-49978`, | ||
51 | :cve_nist:`2024-49980`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`, | ||
52 | :cve_nist:`2024-49985`, :cve_nist:`2024-49986`, :cve_nist:`2024-49987`, :cve_nist:`2024-49988`, | ||
53 | :cve_nist:`2024-49989`, :cve_nist:`2024-49991`, :cve_nist:`2024-49992`, :cve_nist:`2024-49995`, | ||
54 | :cve_nist:`2024-49996`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`, :cve_nist:`2024-50001`, | ||
55 | :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50005`, :cve_nist:`2024-50006`, | ||
56 | :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50012`, :cve_nist:`2024-50013`, | ||
57 | :cve_nist:`2024-50015`, :cve_nist:`2024-50016`, :cve_nist:`2024-50019`, :cve_nist:`2024-50022`, | ||
58 | :cve_nist:`2024-50023`, :cve_nist:`2024-50024`, :cve_nist:`2024-50026`, :cve_nist:`2024-50029`, | ||
59 | :cve_nist:`2024-50031`, :cve_nist:`2024-50032`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`, | ||
60 | :cve_nist:`2024-50036`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`, | ||
61 | :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`, | ||
62 | :cve_nist:`2024-50047`, :cve_nist:`2024-50048`, :cve_nist:`2024-50049`, :cve_nist:`2024-50051`, | ||
63 | :cve_nist:`2024-50055`, :cve_nist:`2024-50057`, :cve_nist:`2024-50058`, :cve_nist:`2024-50059`, | ||
64 | :cve_nist:`2024-50060`, :cve_nist:`2024-50061`, :cve_nist:`2024-50062`, :cve_nist:`2024-50063`, | ||
65 | :cve_nist:`2024-50064`, :cve_nist:`2024-50065`, :cve_nist:`2024-50066`, :cve_nist:`2024-50069`, | ||
66 | :cve_nist:`2024-50070`, :cve_nist:`2024-50072`, :cve_nist:`2024-50073`, :cve_nist:`2024-50074`, | ||
67 | :cve_nist:`2024-50075`, :cve_nist:`2024-50076`, :cve_nist:`2024-50077`, :cve_nist:`2024-50078`, | ||
68 | :cve_nist:`2024-50080`, :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50084`, | ||
69 | :cve_nist:`2024-50085`, :cve_nist:`2024-50086`, :cve_nist:`2024-50087`, :cve_nist:`2024-50088`, | ||
70 | :cve_nist:`2024-50093`, :cve_nist:`2024-50095`, :cve_nist:`2024-50096`, :cve_nist:`2024-50098`, | ||
71 | :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`, :cve_nist:`2024-50108`, | ||
72 | :cve_nist:`2024-50110`, :cve_nist:`2024-50111`, :cve_nist:`2024-50112`, :cve_nist:`2024-50115`, | ||
73 | :cve_nist:`2024-50116`, :cve_nist:`2024-50117`, :cve_nist:`2024-50120`, :cve_nist:`2024-50121`, | ||
74 | :cve_nist:`2024-50124`, :cve_nist:`2024-50125`, :cve_nist:`2024-50126`, :cve_nist:`2024-50127`, | ||
75 | :cve_nist:`2024-50128`, :cve_nist:`2024-50130`, :cve_nist:`2024-50131`, :cve_nist:`2024-50133`, | ||
76 | :cve_nist:`2024-50134`, :cve_nist:`2024-50135`, :cve_nist:`2024-50136`, :cve_nist:`2024-50139`, | ||
77 | :cve_nist:`2024-50140`, :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, | ||
78 | :cve_nist:`2024-50145`, :cve_nist:`2024-50147`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`, | ||
79 | :cve_nist:`2024-50151`, :cve_nist:`2024-50152`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`, | ||
80 | :cve_nist:`2024-50155`, :cve_nist:`2024-50156`, :cve_nist:`2024-50158`, :cve_nist:`2024-50159`, | ||
81 | :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`, :cve_nist:`2024-50164`, | ||
82 | :cve_nist:`2024-50166`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50169`, | ||
83 | :cve_nist:`2024-50170`, :cve_nist:`2024-50171`, :cve_nist:`2024-50172`, :cve_nist:`2024-50175`, | ||
84 | :cve_nist:`2024-50176`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, | ||
85 | :cve_nist:`2024-50182`, :cve_nist:`2024-50183`, :cve_nist:`2024-50184`, :cve_nist:`2024-50185`, | ||
86 | :cve_nist:`2024-50186`, :cve_nist:`2024-50187`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`, | ||
87 | :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`, | ||
88 | :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, | ||
89 | :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, | ||
90 | :cve_nist:`2024-50211`, :cve_nist:`2024-50215`, :cve_nist:`2024-50222`, :cve_nist:`2024-50223`, | ||
91 | :cve_nist:`2024-50224`, :cve_nist:`2024-50226`, :cve_nist:`2024-50229`, :cve_nist:`2024-50230`, | ||
92 | :cve_nist:`2024-50231`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`, | ||
93 | :cve_nist:`2024-50235`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50239`, | ||
94 | :cve_nist:`2024-50240`, :cve_nist:`2024-50242`, :cve_nist:`2024-50243`, :cve_nist:`2024-50244`, | ||
95 | :cve_nist:`2024-50245`, :cve_nist:`2024-50246`, :cve_nist:`2024-50247`, :cve_nist:`2024-50248`, | ||
96 | :cve_nist:`2024-50249`, :cve_nist:`2024-50250`, :cve_nist:`2024-50251`, :cve_nist:`2024-50252`, | ||
97 | :cve_nist:`2024-50255`, :cve_nist:`2024-50256`, :cve_nist:`2024-50257`, :cve_nist:`2024-50258`, | ||
98 | :cve_nist:`2024-50259`, :cve_nist:`2024-50261`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, | ||
99 | :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, | ||
100 | :cve_nist:`2024-50271`, :cve_nist:`2024-50272`, :cve_nist:`2024-50273`, :cve_nist:`2024-50275`, | ||
101 | :cve_nist:`2024-50276`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, | ||
102 | :cve_nist:`2024-50283`, :cve_nist:`2024-50284`, :cve_nist:`2024-50285`, :cve_nist:`2024-50286`, | ||
103 | :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50298`, | ||
104 | :cve_nist:`2024-50299`, :cve_nist:`2024-50300`, :cve_nist:`2024-50301`, :cve_nist:`2024-50302`, | ||
105 | :cve_nist:`2024-53042`, :cve_nist:`2024-53043`, :cve_nist:`2024-53046`, :cve_nist:`2024-53047`, | ||
106 | :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`, :cve_nist:`2024-53058`, | ||
107 | :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, :cve_nist:`2024-53063`, | ||
108 | :cve_nist:`2024-53066`, :cve_nist:`2024-53068`, :cve_nist:`2024-53072`, :cve_nist:`2024-53076`, | ||
109 | :cve_nist:`2024-53079`, :cve_nist:`2024-53081`, :cve_nist:`2024-53082`, :cve_nist:`2024-53083`, | ||
110 | :cve_nist:`2024-53088`, :cve_nist:`2024-53091`, :cve_nist:`2024-53093`, :cve_nist:`2024-53094`, | ||
111 | :cve_nist:`2024-53096`, :cve_nist:`2024-53099`, :cve_nist:`2024-53100`, :cve_nist:`2024-53101`, | ||
112 | :cve_nist:`2024-53103`, :cve_nist:`2024-53108`, :cve_nist:`2024-53109`, :cve_nist:`2024-53110`, | ||
113 | :cve_nist:`2024-53112`, :cve_nist:`2024-53113`, :cve_nist:`2024-53119`, :cve_nist:`2024-53120`, | ||
114 | :cve_nist:`2024-53121`, :cve_nist:`2024-53122`, :cve_nist:`2024-53123`, :cve_nist:`2024-53126`, | ||
115 | :cve_nist:`2024-53127`, :cve_nist:`2024-53129`, :cve_nist:`2024-53130`, :cve_nist:`2024-53131`, | ||
116 | :cve_nist:`2024-53134`, :cve_nist:`2024-53135`, :cve_nist:`2024-53138`, :cve_nist:`2024-53139`, | ||
117 | :cve_nist:`2024-53140`, :cve_nist:`2024-53141`, :cve_nist:`2024-53142`, :cve_nist:`2024-53145`, | ||
118 | :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53154`, | ||
119 | :cve_nist:`2024-53155`, :cve_nist:`2024-53156`, :cve_nist:`2024-53157`, :cve_nist:`2024-53161`, | ||
120 | :cve_nist:`2024-53165`, :cve_nist:`2024-53166`, :cve_nist:`2024-53168`, :cve_nist:`2024-53171`, | ||
121 | :cve_nist:`2024-53173`, :cve_nist:`2024-53175`, :cve_nist:`2024-53180`, :cve_nist:`2024-53188`, | ||
122 | :cve_nist:`2024-53191`, :cve_nist:`2024-53200`, :cve_nist:`2024-53202`, :cve_nist:`2024-53208`, | ||
123 | :cve_nist:`2024-53210`, :cve_nist:`2024-53213`, :cve_nist:`2024-53215`, :cve_nist:`2024-53217`, | ||
124 | :cve_nist:`2024-53224`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53230`, | ||
125 | :cve_nist:`2024-53231`, :cve_nist:`2024-53237`, :cve_nist:`2024-53239`, :cve_nist:`2024-54683`, | ||
126 | :cve_nist:`2024-55916`, :cve_nist:`2024-56369`, :cve_nist:`2024-56538`, :cve_nist:`2024-56551`, | ||
127 | :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`, | ||
128 | :cve_nist:`2024-56574`, :cve_nist:`2024-56575`, :cve_nist:`2024-56577`, :cve_nist:`2024-56578`, | ||
129 | :cve_nist:`2024-56579`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`, | ||
130 | :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`, | ||
131 | :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56604`, | ||
132 | :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56611`, :cve_nist:`2024-56613`, | ||
133 | :cve_nist:`2024-56614`, :cve_nist:`2024-56615`, :cve_nist:`2024-56617`, :cve_nist:`2024-56622`, | ||
134 | :cve_nist:`2024-56623`, :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56629`, | ||
135 | :cve_nist:`2024-56631`, :cve_nist:`2024-56634`, :cve_nist:`2024-56635`, :cve_nist:`2024-56640`, | ||
136 | :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`, :cve_nist:`2024-56649`, | ||
137 | :cve_nist:`2024-56650`, :cve_nist:`2024-56651`, :cve_nist:`2024-56653`, :cve_nist:`2024-56654`, | ||
138 | :cve_nist:`2024-56657`, :cve_nist:`2024-56658`, :cve_nist:`2024-56659`, :cve_nist:`2024-56660`, | ||
139 | :cve_nist:`2024-56662`, :cve_nist:`2024-56663`, :cve_nist:`2024-56664`, :cve_nist:`2024-56667`, | ||
140 | :cve_nist:`2024-56670`, :cve_nist:`2024-56672`, :cve_nist:`2024-56675`, :cve_nist:`2024-56687`, | ||
141 | :cve_nist:`2024-56688`, :cve_nist:`2024-56689`, :cve_nist:`2024-56692`, :cve_nist:`2024-56694`, | ||
142 | :cve_nist:`2024-56698`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`, :cve_nist:`2024-56710`, | ||
143 | :cve_nist:`2024-56715`, :cve_nist:`2024-56716`, :cve_nist:`2024-56717`, :cve_nist:`2024-56718`, | ||
144 | :cve_nist:`2024-56720`, :cve_nist:`2024-56722`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, | ||
145 | :cve_nist:`2024-56725`, :cve_nist:`2024-56726`, :cve_nist:`2024-56727`, :cve_nist:`2024-56728`, | ||
146 | :cve_nist:`2024-56729`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56744`, | ||
147 | :cve_nist:`2024-56745`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`, | ||
148 | :cve_nist:`2024-56751`, :cve_nist:`2024-56752`, :cve_nist:`2024-56754`, :cve_nist:`2024-56755`, | ||
149 | :cve_nist:`2024-56756`, :cve_nist:`2024-56760`, :cve_nist:`2024-56763`, :cve_nist:`2024-56765`, | ||
150 | :cve_nist:`2024-56767`, :cve_nist:`2024-56769`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`, | ||
151 | :cve_nist:`2024-56776`, :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`, | ||
152 | :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56783`, :cve_nist:`2024-56785`, | ||
153 | :cve_nist:`2024-56786`, :cve_nist:`2024-56787`, :cve_nist:`2024-57798`, :cve_nist:`2024-57807` | ||
154 | and :cve_nist:`2024-57874` | ||
155 | - ofono: Fix :cve_nist:`2023-4232`, :cve_nist:`2023-4235`, :cve_nist:`2024-7539`, | ||
156 | :cve_nist:`2024-7540`, :cve_nist:`2024-7541`, :cve_nist:`2024-7542`, :cve_nist:`2024-7543`, | ||
157 | :cve_nist:`2024-7544`, :cve_nist:`2024-7545`, :cve_nist:`2024-7546` and :cve_nist:`2024-7547` | ||
158 | - rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`, | ||
159 | :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747` | ||
160 | - socat: Fix :cve_nist:`2024-54661` | ||
161 | - subversion: Fix :cve_nist:`2024-46901` | ||
162 | - wget: Fix :cve_nist:`2024-10524` | ||
163 | |||
164 | |||
165 | Fixes in Yocto-5.0.7 | ||
166 | ~~~~~~~~~~~~~~~~~~~~ | ||
167 | |||
168 | - bitbake: cooker: Make cooker 'skiplist' per-multiconfig/mc | ||
169 | - bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48 | ||
170 | - bitbake: ui/knotty: print log paths for failed tasks in summary | ||
171 | - bitbake: ui/knotty: respect NO_COLOR & check for tty; rename print_hyperlink => format_hyperlink | ||
172 | - bluez5: Revert "bluez5: remove configuration files from install task" | ||
173 | - bluez5: backport patch to fix address type when loading keys | ||
174 | - boost: fix do_fetch error | ||
175 | - build-appliance-image: Update to scarthgap head revision | ||
176 | - classes/nativesdk: also override :term:`TUNE_PKGARCH` | ||
177 | - classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture | ||
178 | - contributor-guide/submit-changes.rst: suggest to remove the git signature | ||
179 | - cve-update-nvd2-native: Handle :term:`BB_NO_NETWORK` and missing db | ||
180 | - cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR` | ||
181 | - dev-manual/bmaptool.rst: correct command for bmaptool-native | ||
182 | - dev-manual/bmaptool.rst: simplify and fix instructions | ||
183 | - dev-manual: fix styling of references to bmaptool | ||
184 | - docs: Gather dependencies in poky.yaml.in | ||
185 | - docs: Update autobuilder URLs to valkyrie | ||
186 | - docs: Update the documentation for :term:`SRCPV` | ||
187 | - gcc: Fix c++: tweak for Wrange-loop-construct | ||
188 | - groff: Fix race issues for parallel build | ||
189 | - libgfortran: fix buildpath QA issue | ||
190 | - libxml2: Upgrade to 2.12.9 | ||
191 | - linux-yocto/6.6: bsp/genericarm64: disable ARM64_SME | ||
192 | - linux-yocto/6.6: genericarm64.cfg: enable CONFIG_DMA_CMA | ||
193 | - linux-yocto/6.6: update to v6.6.69 | ||
194 | - lttng-modules: fix sched_stat_runtime changed in Linux 6.6.66 | ||
195 | - migration-guides: add release notes for 5.0.6 | ||
196 | - oeqa/ssh: allow to retrieve raw, unformatted ouput | ||
197 | - ovmf-native: remove .pyc files from install | ||
198 | - poky.conf: add new tested distros | ||
199 | - poky.conf: bump version for 5.0.7 | ||
200 | - poky.yaml.in: add missing locales dependency | ||
201 | - poky.yaml.in: replace inkscape dependency by librsvg2-bin | ||
202 | - populate_sdk_ext: write_local_conf add shutil import | ||
203 | - pulseaudio: fix webrtc audio depdency | ||
204 | - python3-requests: upgrade to 2.32.3 | ||
205 | - python3: Drop empty patch | ||
206 | - python3: add dependency on -compression to -core | ||
207 | - python3: upgrade to 3.12.7 | ||
208 | - ref-manual: move runtime-testing section to the test-manual | ||
209 | - ref-manual: use standardized method accross both ubuntu and debian for locale install | ||
210 | - ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication | ||
211 | - reproducible-builds.rst: show how to build a single package | ||
212 | - rust-target-config: Fix TARGET_C_INT_WIDTH with correct size | ||
213 | - rust: Revert "rust: Add new varaible RUST_ENABLE_EXTRA_TOOLS" | ||
214 | - rust: add reproducibility patch to eliminate host leakage | ||
215 | - rust: build the default set of tools | ||
216 | - rust: correctly link rust-snapshot into build/stage0 | ||
217 | - rust: use rust-snapshot binaries only in rust-native | ||
218 | - sanity.bbclass: skip check_userns for non-local uid | ||
219 | - scripts/install-buildtools: Update to 5.0.6 | ||
220 | - system-requirements.rst: add dependencies for pdf builds | ||
221 | - system-requirements: add fedora 39 to supported distros | ||
222 | - system-requirements: update list of supported distros | ||
223 | - systemd: enable create-log-dirs | ||
224 | - test-manual/reproducible-builds: fix reproducible links | ||
225 | |||
226 | |||
227 | Known Issues in Yocto-5.0.7 | ||
228 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
229 | |||
230 | - N/A | ||
231 | |||
232 | Contributors to Yocto-5.0.7 | ||
233 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
234 | |||
235 | Thanks to the following people who contributed to this release: | ||
236 | |||
237 | - Aleksandar Nikolic | ||
238 | - Alexander Kanavin | ||
239 | - Alexis Lothoré | ||
240 | - Antonin Godard | ||
241 | - Archana Polampalli | ||
242 | - Bruce Ashfield | ||
243 | - Catalin Popescu | ||
244 | - Changqing Li | ||
245 | - Chen Qi | ||
246 | - Chris Laplante | ||
247 | - Divya Chellam | ||
248 | - Esben Haabendal | ||
249 | - Guénaël Muller | ||
250 | - Guðni Már Gilbert | ||
251 | - Harish Sadineni | ||
252 | - Hiago De Franco | ||
253 | - Hitendra Prajapati | ||
254 | - Jiaying Song | ||
255 | - Khem Raj | ||
256 | - Lee Chee Yang | ||
257 | - Mark Hatle | ||
258 | - Michael Opdenacker | ||
259 | - Mikko Rapeli | ||
260 | - Peter Marko | ||
261 | - Richard Purdie | ||
262 | - Robert Yang | ||
263 | - Ross Burton | ||
264 | - Soumya Sambu | ||
265 | - Steve Sakoman | ||
266 | - Sunil Dora | ||
267 | - Trevor Gamblin | ||
268 | - Xiangyu Chen | ||
269 | - Yash Shinde | ||
270 | - Zhang Peng | ||
271 | - Zahir Hussain | ||
272 | |||
273 | |||
274 | Repositories / Downloads for Yocto-5.0.7 | ||
275 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
276 | |||
277 | poky | ||
278 | |||
279 | - Repository Location: :yocto_git:`/poky` | ||
280 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
281 | - Tag: :yocto_git:`yocto-5.0.7 </poky/log/?h=yocto-5.0.7>` | ||
282 | - Git Revision: :yocto_git:`7dad83c7e5e9637c0ff5d5712409611fd4a14946 </poky/commit/?id=7dad83c7e5e9637c0ff5d5712409611fd4a14946>` | ||
283 | - Release Artefact: poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946 | ||
284 | - sha: ae688031b19b88582bb4a76d0525e3704b981ad1d21eb38a0873cd01dd9a4652 | ||
285 | - Download Locations: | ||
286 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2 | ||
287 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2 | ||
288 | |||
289 | openembedded-core | ||
290 | |||
291 | - Repository Location: :oe_git:`/openembedded-core` | ||
292 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
293 | - Tag: :oe_git:`yocto-5.0.7 </openembedded-core/log/?h=yocto-5.0.7>` | ||
294 | - Git Revision: :oe_git:`62cb12967391db709315820d48853ffa4c6b4740 </openembedded-core/commit/?id=62cb12967391db709315820d48853ffa4c6b4740>` | ||
295 | - Release Artefact: oecore-62cb12967391db709315820d48853ffa4c6b4740 | ||
296 | - sha: bc45429df1805445b678f1b0ed6ce017edfac38c7226dce92ce393b3ef311f95 | ||
297 | - Download Locations: | ||
298 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2 | ||
299 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2 | ||
300 | |||
301 | meta-mingw | ||
302 | |||
303 | - Repository Location: :yocto_git:`/meta-mingw` | ||
304 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
305 | - Tag: :yocto_git:`yocto-5.0.7 </meta-mingw/log/?h=yocto-5.0.7>` | ||
306 | - Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>` | ||
307 | - Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852 | ||
308 | - sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c | ||
309 | - Download Locations: | ||
310 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
311 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 | ||
312 | |||
313 | bitbake | ||
314 | |||
315 | - Repository Location: :oe_git:`/bitbake` | ||
316 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
317 | - Tag: :oe_git:`yocto-5.0.7 </bitbake/log/?h=yocto-5.0.7>` | ||
318 | - Git Revision: :oe_git:`aa0e540fc31a1c26839efd2c7785a751ce24ebfb </bitbake/commit/?id=aa0e540fc31a1c26839efd2c7785a751ce24ebfb>` | ||
319 | - Release Artefact: bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb | ||
320 | - sha: 169b68ed7d5e55015b1c35a82d35efaa25c87cba4722c85e66514a15d31e1d28 | ||
321 | - Download Locations: | ||
322 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2 | ||
323 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2 | ||
324 | |||
325 | yocto-docs | ||
326 | |||
327 | - Repository Location: :yocto_git:`/yocto-docs` | ||
328 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
329 | - Tag: :yocto_git:`yocto-5.0.7 </yocto-docs/log/?h=yocto-5.0.7>` | ||
330 | - Git Revision: :yocto_git:`bb9e018adcc10c642f87d0b95432783b5eb8057b </yocto-docs/commit/?id=bb9e018adcc10c642f87d0b95432783b5eb8057b>` | ||
331 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.8.rst b/documentation/migration-guides/release-notes-5.0.8.rst new file mode 100644 index 0000000000..5cb8b30246 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.8.rst | |||
@@ -0,0 +1,226 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-5.0.8 (Scarthgap) | ||
4 | ----------------------------------------- | ||
5 | |||
6 | Security Fixes in Yocto-5.0.8 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - binutils: Fix :cve_nist:`2025-0840` | ||
10 | - curl: Ignore :cve_nist:`2025-0725` | ||
11 | - elfutils: Fix :cve_nist:`2025-1352`, :cve_nist:`2025-1365` and :cve_nist:`2025-1372` | ||
12 | - ffmpeg: Fix :cve_nist:`2024-35365`, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`, | ||
13 | :cve_nist:`2024-36616`, :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2024-36619`, | ||
14 | :cve_nist:`2025-0518`, :cve_nist:`2025-22919`, :cve_nist:`2025-22921` and :cve_nist:`2025-25473` | ||
15 | - glibc: Fix :cve_nist:`2025-0395` | ||
16 | - gnutls: Fix :cve_nist:`2024-12243` | ||
17 | - go: Fix :cve_nist:`2024-45336`, :cve_nist:`2024-45341` and :cve_nist:`2025-22866` | ||
18 | - gstreamer1.0-rtsp-server: Fix :cve_nist:`2024-44331` | ||
19 | - libcap: Fix :cve_nist:`2025-1390` | ||
20 | - libtasn1: Fix :cve_nist:`2024-12133` | ||
21 | - libxml2: Fix :cve_nist:`2024-56171` and :cve_nist:`2025-24928` | ||
22 | - linux-yocto/6.6: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-53179`, :cve_nist:`2024-56582`, | ||
23 | :cve_nist:`2024-56703`, :cve_nist:`2024-57801`, :cve_nist:`2024-57802`, :cve_nist:`2024-57841`, | ||
24 | :cve_nist:`2024-57882`, :cve_nist:`2024-57887`, :cve_nist:`2024-57890`, :cve_nist:`2024-57892`, | ||
25 | :cve_nist:`2024-57895`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`, | ||
26 | :cve_nist:`2024-57902`, :cve_nist:`2024-57906`, :cve_nist:`2024-57907`, :cve_nist:`2024-57908`, | ||
27 | :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57912`, :cve_nist:`2024-57913`, | ||
28 | :cve_nist:`2024-57916`, :cve_nist:`2024-57922`, :cve_nist:`2024-57925`, :cve_nist:`2024-57926`, | ||
29 | :cve_nist:`2024-57933`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57940`, | ||
30 | :cve_nist:`2024-57949`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21636`, | ||
31 | :cve_nist:`2025-21637`, :cve_nist:`2025-21638`, :cve_nist:`2025-21639`, :cve_nist:`2025-21640`, | ||
32 | :cve_nist:`2025-21642`, :cve_nist:`2025-21652`, :cve_nist:`2025-21658`, :cve_nist:`2025-21665`, | ||
33 | :cve_nist:`2025-21666`, :cve_nist:`2025-21667`, :cve_nist:`2025-21669`, :cve_nist:`2025-21670`, | ||
34 | :cve_nist:`2025-21671`, :cve_nist:`2025-21673`, :cve_nist:`2025-21674`, :cve_nist:`2025-21675`, | ||
35 | :cve_nist:`2025-21676`, :cve_nist:`2025-21680`, :cve_nist:`2025-21681`, :cve_nist:`2025-21683`, | ||
36 | :cve_nist:`2025-21684`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`, :cve_nist:`2025-21690`, | ||
37 | :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699` | ||
38 | - openssh: Fix :cve_nist:`2025-26466` | ||
39 | - openssl: Fix :cve_nist:`2024-9143`, :cve_nist:`2024-12797` and :cve_nist:`2024-13176` | ||
40 | - pyhton3: Fix :cve_nist:`2024-12254` and :cve_nist:`2025-0938` | ||
41 | - subversion: Ignore :cve_nist:`2024-45720` | ||
42 | - u-boot: Fix :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`, | ||
43 | :cve_nist:`2024-57257`, :cve_nist:`2024-57258` and :cve_nist:`2024-57259` | ||
44 | - vim: Fix :cve_nist:`2025-22134` and :cve_nist:`2025-24014` | ||
45 | - xwayland: Fix :cve_nist:`2024-9632`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, | ||
46 | :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, | ||
47 | :cve_nist:`2025-26600` and :cve_nist:`2025-26601` | ||
48 | |||
49 | |||
50 | Fixes in Yocto-5.0.8 | ||
51 | ~~~~~~~~~~~~~~~~~~~~ | ||
52 | |||
53 | - base-files: Drop /bin/sh dependency | ||
54 | - bind: upgrade to 9.18.33 | ||
55 | - binutils: File name too long causing failure to open temporary head file in dlltool | ||
56 | - binutils: stable 2.42 branch update | ||
57 | - bitbake: bblayers/query: Fix using "removeprefix" string method | ||
58 | - bitbake: bitbake-diffsigs: fix handling when finding only a single sigfile | ||
59 | - bitbake: data_smart.py: clear expand_cache in _setvar_update_overridevars | ||
60 | - bitbake: data_smart.py: remove unnecessary ? from __expand_var_regexp__ | ||
61 | - bitbake: data_smart.py: simple clean up | ||
62 | - build-appliance-image: Update to scarthgap head revision | ||
63 | - ccache.conf: Add include_file_ctime to sloppiness | ||
64 | - cmake: apply parallel build settings to ptest tasks | ||
65 | - contributor-guide/submit-changes: add policy on AI generated code | ||
66 | - dev-manual/building: document the initramfs-framework recipe | ||
67 | - devtool: ide-sdk recommend :term:`DEBUG_BUILD` | ||
68 | - devtool: ide-sdk remove the plugin from eSDK installer | ||
69 | - devtool: ide-sdk sort cmake preset | ||
70 | - devtool: modify support debug-builds | ||
71 | - docs: Add favicon for the documentation html | ||
72 | - docs: Fix typo in standards.md | ||
73 | - docs: Remove all mention of core-image-lsb | ||
74 | - docs: vulnerabilities/classes: remove references to cve-check text format | ||
75 | - files: Amend overlayfs unit descriptions with path information | ||
76 | - files: overlayfs-create-dirs: Improve mount unit dependency | ||
77 | - glibc: stable 2.39 branch updates | ||
78 | - gnupg: upgrade to 2.4.5 | ||
79 | - go: upgrade 1.22.12 | ||
80 | - icu: remove host references in nativesdk to fix reproducibility | ||
81 | - libtasn1: upgrade to 4.20.0 | ||
82 | - libxml2: upgrade to 2.12.10 | ||
83 | - linux-yocto/6.6: upgrade to v6.6.75 | ||
84 | - meta: Enable '-o pipefail' for the SDK installer | ||
85 | - migration-guides: add release notes for 4.0.24, 4.0.25 and 5.0.7 | ||
86 | - oe-selftest: devtool ide-sdk use modify debug-build | ||
87 | - oeqa/sdk/context: fix for gtk3 test failure during do_testsdk | ||
88 | - oeqa/selftest/rust: skip on all MIPS platforms | ||
89 | - openssl: upgrade to 3.2.4 | ||
90 | - pkg-config-native: pick additional search paths from $EXTRA_NATIVE_PKGCONFIG_PATH | ||
91 | - poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS` | ||
92 | - poky.conf: bump version for 5.0.8 | ||
93 | - ppp: Revert lock path to /var/lock | ||
94 | - python3-setuptools-scm: respect GIT_CEILING_DIRECTORIES | ||
95 | - python3: upgrade to 3.12.9 | ||
96 | - qemu: Do not define sched_attr with glibc >= 2.41 | ||
97 | - ref-manual/faq: add q&a on systemd as default | ||
98 | - ref-manual: Add missing variable :term:`IMAGE_ROOTFS_MAXSIZE` | ||
99 | - ref-manual: don't refer to poky-lsb | ||
100 | - ref-manual: remove OE_IMPORTS | ||
101 | - rust-common.bbclass: soft assignment for RUSTLIB path | ||
102 | - rust: fix for rust multilib sdk configuration | ||
103 | - rust: remove redundant cargo config file | ||
104 | - scripts/install-buildtools: Update to 5.0.7 | ||
105 | - sdk-manual: extensible.rst: devtool ide-sdk improve | ||
106 | - sdk-manual: extensible.rst: update devtool ide-sdk | ||
107 | - selftest/rust: correctly form the PATH environment variable | ||
108 | - systemd: add libpcre2 as :term:`RRECOMMENDS` if pcre2 is enabled | ||
109 | - systemd: upgrade to 255.17 | ||
110 | - test-manual/ptest: link to common framework ptest classes | ||
111 | - tzcode-native: Fix compiler setting from 2023d version | ||
112 | - tzdata/tzcode-native: upgrade to 2025a | ||
113 | - u-boot: kernel-fitimage: Fix dependency loop if :term:`UBOOT_SIGN_ENABLE` and UBOOT_ENV enabled | ||
114 | - u-boot: kernel-fitimage: Restore FIT_SIGN_INDIVIDUAL="1" behavior | ||
115 | - uboot-config: fix devtool modify with kernel-fitimage | ||
116 | - vim: upgrade to 9.1.1043 | ||
117 | |||
118 | |||
119 | Known Issues in Yocto-5.0.8 | ||
120 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
121 | |||
122 | - N/A | ||
123 | |||
124 | Contributors to Yocto-5.0.8 | ||
125 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
126 | |||
127 | Thanks to the following people who contributed to this release: | ||
128 | |||
129 | - Adrian Freihofer | ||
130 | - Aleksandar Nikolic | ||
131 | - Alessio Cascone | ||
132 | - Alexander Kanavin | ||
133 | - Alexis Cellier | ||
134 | - Antonin Godard | ||
135 | - Archana Polampalli | ||
136 | - Bruce Ashfield | ||
137 | - Chen Qi | ||
138 | - Deepesh Varatharajan | ||
139 | - Divya Chellam | ||
140 | - Enrico Jörns | ||
141 | - Esben Haabendal | ||
142 | - Etienne Cordonnier | ||
143 | - Fabio Berton | ||
144 | - Guðni Már Gilbert | ||
145 | - Harish Sadineni | ||
146 | - Hitendra Prajapati | ||
147 | - Hongxu Jia | ||
148 | - Jiaying Song | ||
149 | - Joerg Schmidt | ||
150 | - Johannes Schneider | ||
151 | - Khem Raj | ||
152 | - Lee Chee Yang | ||
153 | - Marek Vasut | ||
154 | - Marta Rybczynska | ||
155 | - Moritz Haase | ||
156 | - Oleksandr Hnatiuk | ||
157 | - Pedro Ferreira | ||
158 | - Peter Marko | ||
159 | - Poonam Jadhav | ||
160 | - Priyal Doshi | ||
161 | - Ross Burton | ||
162 | - Simon A. Eugster | ||
163 | - Steve Sakoman | ||
164 | - Vijay Anusuri | ||
165 | - Wang Mingyu | ||
166 | - Weisser, Pascal | ||
167 | |||
168 | |||
169 | Repositories / Downloads for Yocto-5.0.8 | ||
170 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
171 | |||
172 | poky | ||
173 | |||
174 | - Repository Location: :yocto_git:`/poky` | ||
175 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
176 | - Tag: :yocto_git:`yocto-5.0.8 </poky/log/?h=yocto-5.0.8>` | ||
177 | - Git Revision: :yocto_git:`dc4827b3660bc1a03a2bc3b0672615b50e9137ff </poky/commit/?id=dc4827b3660bc1a03a2bc3b0672615b50e9137ff>` | ||
178 | - Release Artefact: poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff | ||
179 | - sha: ace7264e16e18ed02ef0ad2935fa10b5fad2c4de38b2356f4192b38ef2184504 | ||
180 | - Download Locations: | ||
181 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2 | ||
182 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2 | ||
183 | |||
184 | openembedded-core | ||
185 | |||
186 | - Repository Location: :oe_git:`/openembedded-core` | ||
187 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
188 | - Tag: :oe_git:`yocto-5.0.8 </openembedded-core/log/?h=yocto-5.0.8>` | ||
189 | - Git Revision: :oe_git:`cd2b6080a4c0f2ed2c9939ec0b87763aef595048 </openembedded-core/commit/?id=cd2b6080a4c0f2ed2c9939ec0b87763aef595048>` | ||
190 | - Release Artefact: oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048 | ||
191 | - sha: 14c7cd5c62a96ceb9c2141164ea0f087fdbaed99ca3e9a722977a3f12d6381f6 | ||
192 | - Download Locations: | ||
193 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2 | ||
194 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2 | ||
195 | |||
196 | meta-mingw | ||
197 | |||
198 | - Repository Location: :yocto_git:`/meta-mingw` | ||
199 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
200 | - Tag: :yocto_git:`yocto-5.0.8 </meta-mingw/log/?h=yocto-5.0.8>` | ||
201 | - Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>` | ||
202 | - Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f | ||
203 | - sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65 | ||
204 | - Download Locations: | ||
205 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
206 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
207 | |||
208 | bitbake | ||
209 | |||
210 | - Repository Location: :oe_git:`/bitbake` | ||
211 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
212 | - Tag: :oe_git:`yocto-5.0.8 </bitbake/log/?h=yocto-5.0.8>` | ||
213 | - Git Revision: :oe_git:`7375d32e8c1af20c51abec4eb3b072b4ca58b239 </bitbake/commit/?id=7375d32e8c1af20c51abec4eb3b072b4ca58b239>` | ||
214 | - Release Artefact: bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239 | ||
215 | - sha: 13dffbc162c5b6e2c95fa72936a430b9a542d52d81d502a5d0afc592fbf4a16b | ||
216 | - Download Locations: | ||
217 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2 | ||
218 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2 | ||
219 | |||
220 | yocto-docs | ||
221 | |||
222 | - Repository Location: :yocto_git:`/yocto-docs` | ||
223 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
224 | - Tag: :yocto_git:`yocto-5.0.8 </yocto-docs/log/?h=yocto-5.0.8>` | ||
225 | - Git Revision: :yocto_git:`7d3cce5b962ca9f73b29affceb7ebc6710627739 </yocto-docs/commit/?id=7d3cce5b962ca9f73b29affceb7ebc6710627739>` | ||
226 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.9.rst b/documentation/migration-guides/release-notes-5.0.9.rst new file mode 100644 index 0000000000..81b853cf31 --- /dev/null +++ b/documentation/migration-guides/release-notes-5.0.9.rst | |||
@@ -0,0 +1,206 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | Release notes for Yocto-5.0.9 (Scarthgap) | ||
4 | ----------------------------------------- | ||
5 | |||
6 | Security Fixes in Yocto-5.0.9 | ||
7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
8 | |||
9 | - binutils: Fix :cve_nist:`2024-57360`, :cve_nist:`2025-1176`, :cve_nist:`2025-1178` and | ||
10 | :cve_nist:`2025-1181` | ||
11 | - expat: Fix :cve_nist:`2024-8176` | ||
12 | - freetype: Fix :cve_nist:`2025-27363` | ||
13 | - ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`, | ||
14 | :cve_nist:`2025-27833`, :cve_nist:`2025-27833`, :cve_nist:`2025-27834`, :cve_nist:`2025-27835` | ||
15 | and :cve_nist:`2025-27836` | ||
16 | - go: fix :cve_nist:`2025-22870` and :cve_nist:`2025-22871` | ||
17 | - grub: Fix :cve_nist:`2024-45781`, :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, | ||
18 | :cve_nist:`2024-45776`, :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, | ||
19 | :cve_nist:`2024-45780`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`, | ||
20 | :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0678`, | ||
21 | :cve_nist:`2025-0684`, :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`, | ||
22 | :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125` | ||
23 | - libarchive: Fix :cve_nist:`2024-20696`, :cve_nist:`2024-48957`, :cve_nist:`2024-48958`, | ||
24 | :cve_nist:`2025-1632` and :cve_nist:`2025-25724` | ||
25 | - libxslt: Fix :cve_nist:`2024-24855` and :cve_nist:`2024-55549` | ||
26 | - linux-yocto/6.6: Fix :cve_nist:`2024-54458`, :cve_nist:`2024-57834`, :cve_nist:`2024-57973`, | ||
27 | :cve_nist:`2024-57978`, :cve_nist:`2024-57979`, :cve_nist:`2024-57980`, :cve_nist:`2024-57981`, | ||
28 | :cve_nist:`2024-57984`, :cve_nist:`2024-57996`, :cve_nist:`2024-57997`, :cve_nist:`2024-58002`, | ||
29 | :cve_nist:`2024-58005`, :cve_nist:`2024-58007`, :cve_nist:`2024-58010`, :cve_nist:`2024-58011`, | ||
30 | :cve_nist:`2024-58013`, :cve_nist:`2024-58017`, :cve_nist:`2024-58020`, :cve_nist:`2024-58034`, | ||
31 | :cve_nist:`2024-58052`, :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`, | ||
32 | :cve_nist:`2024-58068`, :cve_nist:`2024-58069`, :cve_nist:`2024-58070`, :cve_nist:`2024-58071`, | ||
33 | :cve_nist:`2024-58076`, :cve_nist:`2024-58080`, :cve_nist:`2024-58083`, :cve_nist:`2024-58088`, | ||
34 | :cve_nist:`2025-21700`, :cve_nist:`2025-21703`, :cve_nist:`2025-21707`, :cve_nist:`2025-21711`, | ||
35 | :cve_nist:`2025-21715`, :cve_nist:`2025-21716`, :cve_nist:`2025-21718`, :cve_nist:`2025-21726`, | ||
36 | :cve_nist:`2025-21727`, :cve_nist:`2025-21731`, :cve_nist:`2025-21735`, :cve_nist:`2025-21736`, | ||
37 | :cve_nist:`2025-21741`, :cve_nist:`2025-21742`, :cve_nist:`2025-21743`, :cve_nist:`2025-21744`, | ||
38 | :cve_nist:`2025-21745`, :cve_nist:`2025-21748`, :cve_nist:`2025-21749`, :cve_nist:`2025-21753`, | ||
39 | :cve_nist:`2025-21756`, :cve_nist:`2025-21759`, :cve_nist:`2025-21760`, :cve_nist:`2025-21761`, | ||
40 | :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`, :cve_nist:`2025-21773`, | ||
41 | :cve_nist:`2025-21775`, :cve_nist:`2025-21776`, :cve_nist:`2025-21779`, :cve_nist:`2025-21780`, | ||
42 | :cve_nist:`2025-21782`, :cve_nist:`2025-21783`, :cve_nist:`2025-21785`, :cve_nist:`2025-21787`, | ||
43 | :cve_nist:`2025-21789`, :cve_nist:`2025-21790`, :cve_nist:`2025-21791`, :cve_nist:`2025-21792`, | ||
44 | :cve_nist:`2025-21793`, :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21812`, | ||
45 | :cve_nist:`2025-21814`, :cve_nist:`2025-21820`, :cve_nist:`2025-21844`, :cve_nist:`2025-21846`, | ||
46 | :cve_nist:`2025-21847`, :cve_nist:`2025-21848`, :cve_nist:`2025-21853`, :cve_nist:`2025-21854`, | ||
47 | :cve_nist:`2025-21855`, :cve_nist:`2025-21856`, :cve_nist:`2025-21857`, :cve_nist:`2025-21858`, | ||
48 | :cve_nist:`2025-21859`, :cve_nist:`2025-21862`, :cve_nist:`2025-21863`, :cve_nist:`2025-21864`, | ||
49 | :cve_nist:`2025-21865`, :cve_nist:`2025-21866`, :cve_nist:`2025-21867`, :cve_nist:`2025-21887`, | ||
50 | :cve_nist:`2025-21891`, :cve_nist:`2025-21898`, :cve_nist:`2025-21904`, :cve_nist:`2025-21905`, | ||
51 | :cve_nist:`2025-21908`, :cve_nist:`2025-21912`, :cve_nist:`2025-21915`, :cve_nist:`2025-21917`, | ||
52 | :cve_nist:`2025-21918`, :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`, | ||
53 | :cve_nist:`2025-21928`, :cve_nist:`2025-21934`, :cve_nist:`2025-21936`, :cve_nist:`2025-21937`, | ||
54 | :cve_nist:`2025-21941`, :cve_nist:`2025-21943`, :cve_nist:`2025-21945`, :cve_nist:`2025-21947`, | ||
55 | :cve_nist:`2025-21948`, :cve_nist:`2025-21951`, :cve_nist:`2025-21957`, :cve_nist:`2025-21959`, | ||
56 | :cve_nist:`2025-21962`, :cve_nist:`2025-21963`, :cve_nist:`2025-21964`, :cve_nist:`2025-21966`, | ||
57 | :cve_nist:`2025-21967`, :cve_nist:`2025-21968`, :cve_nist:`2025-21969`, :cve_nist:`2025-21979`, | ||
58 | :cve_nist:`2025-21980`, :cve_nist:`2025-21981`, :cve_nist:`2025-21991` and :cve_nist:`2025-21993` | ||
59 | - mpg123: Fix :cve_nist:`2024-10573` | ||
60 | - ofono: Fix :cve_nist:`2024-7537` | ||
61 | - openssh: Fix :cve_nist:`2025-26465` | ||
62 | - puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837` | ||
63 | - qemu: Ignore :cve_nist:`2023-1386` | ||
64 | - ruby: Fix :cve_nist:`2025-27219` and :cve_nist:`2025-27220` | ||
65 | - rust-cross-canadian: Ignore :cve_nist:`2024-43402` | ||
66 | - vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and | ||
67 | :cve_nist:`2025-29768` | ||
68 | - xserver-xorg: Fix :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, | ||
69 | :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600` | ||
70 | and :cve_nist:`2025-26601` | ||
71 | - xz: Fix :cve_nist:`2025-31115` | ||
72 | |||
73 | |||
74 | Fixes in Yocto-5.0.9 | ||
75 | ~~~~~~~~~~~~~~~~~~~~ | ||
76 | |||
77 | - babeltrace2: extend to nativesdk | ||
78 | - babeltrace: extend to nativesdk | ||
79 | - bitbake: event/utils: Avoid deadlock from lock_timeout() and recursive events | ||
80 | - bitbake: utils: Add signal blocking for lock_timeout | ||
81 | - bitbake: utils: Print information about lock issue before exiting | ||
82 | - bitbake: utils: Tweak lock_timeout logic | ||
83 | - build-appliance-image: Update to scarthgap head revision | ||
84 | - cve-check.bbclass: Mitigate symlink related error | ||
85 | - cve-update-nvd2-native: add workaround for json5 style list | ||
86 | - cve-update-nvd2-native: handle missing vulnStatus | ||
87 | - gcc: remove paths to sysroot from configargs.h and checksum-options for gcc-cross-canadian | ||
88 | - gcc: unify cleanup of include-fixed, apply to cross-canadian | ||
89 | - ghostscript: upgrade to 10.05.0 | ||
90 | - grub: backport strlcpy function | ||
91 | - grub: drop obsolete CVE statuses | ||
92 | - icu: Adjust ICU_DATA_DIR path on big endian targets | ||
93 | - kernel-arch: add macro-prefix-map in KERNEL_CC | ||
94 | - libarchive: upgrade to 3.7.9 | ||
95 | - libxslt: upgrade to 1.1.43 | ||
96 | - linux-yocto/6.6: update to v6.6.84 | ||
97 | - mc: set ac_cv_path_ZIP to avoid buildpaths QA issues | ||
98 | - mpg123: upgrade to 1.32.10 | ||
99 | - nativesdk-libtool: sanitize the script, remove buildpaths | ||
100 | - openssl: rewrite ptest installation | ||
101 | - overview-manual/concepts: remove :term:`PR` from the build dir list | ||
102 | - patch.py: set commituser and commitemail for addNote | ||
103 | - poky.conf: bump version for 5.0.9 | ||
104 | - vim: Upgrade to 9.1.1198 | ||
105 | - xserver-xf86-config: add a configuration fragment to disable screen blanking | ||
106 | - xserver-xf86-config: remove obsolete configuration files | ||
107 | - xserver-xorg: upgrade to 21.1.16 | ||
108 | - xz: upgrade to 5.4.7 | ||
109 | - yocto-uninative: Update to 4.7 for glibc 2.41 | ||
110 | |||
111 | |||
112 | Known Issues in Yocto-5.0.9 | ||
113 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
114 | |||
115 | - N/A | ||
116 | |||
117 | Contributors to Yocto-5.0.9 | ||
118 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
119 | |||
120 | Thanks to the following people who contributed to this release: | ||
121 | |||
122 | - Antonin Godard | ||
123 | - Archana Polampalli | ||
124 | - Ashish Sharma | ||
125 | - Bruce Ashfield | ||
126 | - Changqing Li | ||
127 | - Denys Dmytriyenko | ||
128 | - Divya Chellam | ||
129 | - Hitendra Prajapati | ||
130 | - Madhu Marri | ||
131 | - Makarios Christakis | ||
132 | - Martin Jansa | ||
133 | - Michael Halstead | ||
134 | - Niko Mauno | ||
135 | - Oleksandr Hnatiuk | ||
136 | - Peter Marko | ||
137 | - Richard Purdie | ||
138 | - Ross Burton | ||
139 | - Sana Kazi | ||
140 | - Stefan Mueller-Klieser | ||
141 | - Steve Sakoman | ||
142 | - Vijay Anusuri | ||
143 | - Virendra Thakur | ||
144 | - Vishwas Udupa | ||
145 | - Wang Mingyu | ||
146 | - Zhang Peng | ||
147 | |||
148 | |||
149 | Repositories / Downloads for Yocto-5.0.9 | ||
150 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
151 | |||
152 | poky | ||
153 | |||
154 | - Repository Location: :yocto_git:`/poky` | ||
155 | - Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>` | ||
156 | - Tag: :yocto_git:`yocto-5.0.9 </poky/log/?h=yocto-5.0.9>` | ||
157 | - Git Revision: :yocto_git:`bab0f9f62af9af580744948dd3240f648a99879a </poky/commit/?id=bab0f9f62af9af580744948dd3240f648a99879a>` | ||
158 | - Release Artefact: poky-bab0f9f62af9af580744948dd3240f648a99879a | ||
159 | - sha: ee6811d9fb6c4913e19d6e3569f1edc8ccd793779b237520596506446a6b4531 | ||
160 | - Download Locations: | ||
161 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2 | ||
162 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2 | ||
163 | |||
164 | openembedded-core | ||
165 | |||
166 | - Repository Location: :oe_git:`/openembedded-core` | ||
167 | - Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>` | ||
168 | - Tag: :oe_git:`yocto-5.0.9 </openembedded-core/log/?h=yocto-5.0.9>` | ||
169 | - Git Revision: :oe_git:`04038ecd1edd6592b826665a2b787387bb7074fa </openembedded-core/commit/?id=04038ecd1edd6592b826665a2b787387bb7074fa>` | ||
170 | - Release Artefact: oecore-04038ecd1edd6592b826665a2b787387bb7074fa | ||
171 | - sha: 6e201a4b486dfbdfcb7e96d83b962a205ec4764db6ad0e34bd623db18910eddb | ||
172 | - Download Locations: | ||
173 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2 | ||
174 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2 | ||
175 | |||
176 | meta-mingw | ||
177 | |||
178 | - Repository Location: :yocto_git:`/meta-mingw` | ||
179 | - Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>` | ||
180 | - Tag: :yocto_git:`yocto-5.0.9 </meta-mingw/log/?h=yocto-5.0.9>` | ||
181 | - Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>` | ||
182 | - Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f | ||
183 | - sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65 | ||
184 | - Download Locations: | ||
185 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
186 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2 | ||
187 | |||
188 | bitbake | ||
189 | |||
190 | - Repository Location: :oe_git:`/bitbake` | ||
191 | - Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>` | ||
192 | - Tag: :oe_git:`yocto-5.0.9 </bitbake/log/?h=yocto-5.0.9>` | ||
193 | - Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>` | ||
194 | - Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e | ||
195 | - sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f | ||
196 | - Download Locations: | ||
197 | https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2 | ||
198 | https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2 | ||
199 | |||
200 | yocto-docs | ||
201 | |||
202 | - Repository Location: :yocto_git:`/yocto-docs` | ||
203 | - Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>` | ||
204 | - Tag: :yocto_git:`yocto-5.0.9 </yocto-docs/log/?h=yocto-5.0.9>` | ||
205 | - Git Revision: :yocto_git:`56db4fd81f6235428bef9e46a61c11ca0ba89733 </yocto-docs/commit/?id=56db4fd81f6235428bef9e46a61c11ca0ba89733>` | ||
206 | |||
diff --git a/documentation/migration-guides/release-notes-5.0.rst b/documentation/migration-guides/release-notes-5.0.rst index 800ba20a27..de11bd174a 100644 --- a/documentation/migration-guides/release-notes-5.0.rst +++ b/documentation/migration-guides/release-notes-5.0.rst | |||
@@ -217,7 +217,7 @@ New Features / Enhancements in 5.0 | |||
217 | state directory (i.e., ``/run``). | 217 | state directory (i.e., ``/run``). |
218 | 218 | ||
219 | - Allow to disable colored text output through the | 219 | - Allow to disable colored text output through the |
220 | `NO_OUTPUT <https://no-color.org/>`__ environment variable. | 220 | `NO_COLOR <https://no-color.org/>`__ environment variable. |
221 | 221 | ||
222 | - ``git-make-shallow`` script: add support for Git's ``safe.bareRepository=explicit`` | 222 | - ``git-make-shallow`` script: add support for Git's ``safe.bareRepository=explicit`` |
223 | configuration setting. | 223 | configuration setting. |
@@ -362,39 +362,39 @@ The following corrections have been made to the :term:`LICENSE` values set by re | |||
362 | Security Fixes in 5.0 | 362 | Security Fixes in 5.0 |
363 | ~~~~~~~~~~~~~~~~~~~~~ | 363 | ~~~~~~~~~~~~~~~~~~~~~ |
364 | 364 | ||
365 | - avahi: :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472`, :cve:`2023-38473` | 365 | - avahi: :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472`, :cve_nist:`2023-38473` |
366 | - bind: :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679`, :cve:`2023-50387` | 366 | - bind: :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50387` |
367 | - bluez5: :cve:`2023-45866` | 367 | - bluez5: :cve_nist:`2023-45866` |
368 | - coreutils: :cve:`2024-0684` | 368 | - coreutils: :cve_nist:`2024-0684` |
369 | - cups: :cve:`2023-4504` | 369 | - cups: :cve_nist:`2023-4504` |
370 | - curl: :cve:`2023-46218` | 370 | - curl: :cve_nist:`2023-46218` |
371 | - expat: :cve:`2024-28757` | 371 | - expat: :cve_nist:`2024-28757` |
372 | - gcc: :cve:`2023-4039` | 372 | - gcc: :cve_nist:`2023-4039` |
373 | - glibc: :cve:`2023-5156`, :cve:`2023-0687` | 373 | - glibc: :cve_nist:`2023-5156`, :cve_nist:`2023-0687` |
374 | - gnutls: :cve:`2024-0553`, :cve:`2024-0567`, :cve:`2024-28834`, :cve:`2024-28835` | 374 | - gnutls: :cve_nist:`2024-0553`, :cve_nist:`2024-0567`, :cve_nist:`2024-28834`, :cve_nist:`2024-28835` |
375 | - go: :cve:`2023-45288` | 375 | - go: :cve_nist:`2023-45288` |
376 | - grub: :cve:`2023-4692`, :cve:`2023-4693` | 376 | - grub: :cve_nist:`2023-4692`, :cve_nist:`2023-4693` |
377 | - grub2: :cve:`2023-4001` (ignored), :cve:`2024-1048` (ignored) | 377 | - grub2: :cve_nist:`2023-4001` (ignored), :cve_nist:`2024-1048` (ignored) |
378 | - libgit2: :cve:`2024-24575`, :cve:`2024-24577` | 378 | - libgit2: :cve_nist:`2024-24575`, :cve_nist:`2024-24577` |
379 | - libsndfile1: :cve:`2022-33065` | 379 | - libsndfile1: :cve_nist:`2022-33065` |
380 | - libssh2: :cve:`2023-48795` | 380 | - libssh2: :cve_nist:`2023-48795` |
381 | - libuv: :cve:`2024-24806` | 381 | - libuv: :cve_nist:`2024-24806` |
382 | - libxml2: :cve:`2023-45322` (ignored) | 382 | - libxml2: :cve_nist:`2023-45322` (ignored) |
383 | - linux-yocto/6.6: :cve:`2020-16119` | 383 | - linux-yocto/6.6: :cve_nist:`2020-16119` |
384 | - openssh: :cve:`2023-48795`, :cve:`2023-51384`, :cve:`2023-51385` | 384 | - openssh: :cve_nist:`2023-48795`, :cve_nist:`2023-51384`, :cve_nist:`2023-51385` |
385 | - openssl: :cve:`2023-5363`, :cve:`2023-5678`, :cve:`2023-6129`, :cve_mitre:`2023-6237`, :cve:`2024-0727`, :cve:`2024-2511` | 385 | - openssl: :cve_nist:`2023-5363`, :cve_nist:`2023-5678`, :cve_nist:`2023-6129`, :cve_mitre:`2023-6237`, :cve_nist:`2024-0727`, :cve_nist:`2024-2511` |
386 | - perl: :cve:`2023-47100` | 386 | - perl: :cve_nist:`2023-47100` |
387 | - pixman: :cve:`2023-37769` (ignored) | 387 | - pixman: :cve_nist:`2023-37769` (ignored) |
388 | - python3-cryptography{-vectors}: :cve:`2023-49083`, :cve:`2024-26130` | 388 | - python3-cryptography{-vectors}: :cve_nist:`2023-49083`, :cve_nist:`2024-26130` |
389 | - python3-urllib3: :cve:`2023-45803` | 389 | - python3-urllib3: :cve_nist:`2023-45803` |
390 | - shadow: :cve:`2023-4641` | 390 | - shadow: :cve_nist:`2023-4641` |
391 | - sudo: :cve:`2023-42456` | 391 | - sudo: :cve_nist:`2023-42456` |
392 | - tiff: :cve:`2023-6228`, :cve:`2023-6277`, :cve:`2023-52355`, :cve:`2023-52356` | 392 | - tiff: :cve_nist:`2023-6228`, :cve_nist:`2023-6277`, :cve_nist:`2023-52355`, :cve_nist:`2023-52356` |
393 | - vim: :cve:`2023-46246`, :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236`, :cve:`2023-48237`, :cve:`2024-22667` | 393 | - vim: :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237`, :cve_nist:`2024-22667` |
394 | - wpa-supplicant: :cve:`2023-52160` | 394 | - wpa-supplicant: :cve_nist:`2023-52160` |
395 | - xserver-xorg: :cve:`2023-5574`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2024-21885`, :cve:`2024-21886` | 395 | - xserver-xorg: :cve_nist:`2023-5574`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886` |
396 | - xwayland: :cve:`2023-5367`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-21885`, :cve:`2024-21886` | 396 | - xwayland: :cve_nist:`2023-5367`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886` |
397 | - zlib: :cve:`2023-45853` (ignored), :cve:`2023-6992` (ignored) | 397 | - zlib: :cve_nist:`2023-45853` (ignored), :cve_nist:`2023-6992` (ignored) |
398 | 398 | ||
399 | 399 | ||
400 | Recipe Upgrades in 5.0 | 400 | Recipe Upgrades in 5.0 |
diff --git a/documentation/overview-manual/concepts.rst b/documentation/overview-manual/concepts.rst index 62f2327a7e..56dd3b3b55 100644 --- a/documentation/overview-manual/concepts.rst +++ b/documentation/overview-manual/concepts.rst | |||
@@ -98,7 +98,7 @@ files, and how to package the compiled output. | |||
98 | 98 | ||
99 | The term "package" is sometimes used to refer to recipes. However, since | 99 | The term "package" is sometimes used to refer to recipes. However, since |
100 | the word "package" is used for the packaged output from the OpenEmbedded | 100 | the word "package" is used for the packaged output from the OpenEmbedded |
101 | build system (i.e. ``.ipk`` or ``.deb`` files), this document avoids | 101 | build system (i.e. ``.ipk``, ``.deb`` or ``.rpm`` files), this document avoids |
102 | using the term "package" when referring to recipes. | 102 | using the term "package" when referring to recipes. |
103 | 103 | ||
104 | Classes | 104 | Classes |
@@ -256,7 +256,7 @@ development environment. | |||
256 | .. note:: | 256 | .. note:: |
257 | 257 | ||
258 | The | 258 | The |
259 | scripts/oe-setup-builddir | 259 | ``scripts/oe-setup-builddir`` |
260 | script uses the | 260 | script uses the |
261 | ``$TEMPLATECONF`` | 261 | ``$TEMPLATECONF`` |
262 | variable to determine which sample configuration files to locate. | 262 | variable to determine which sample configuration files to locate. |
@@ -352,7 +352,7 @@ layers the build system uses to further control the build. These layers | |||
352 | provide Metadata for the software, machine, and policies. | 352 | provide Metadata for the software, machine, and policies. |
353 | 353 | ||
354 | In general, there are three types of layer input. You can see them below | 354 | In general, there are three types of layer input. You can see them below |
355 | the "User Configuration" box in the `general workflow | 355 | the "User Configuration" box in the :ref:`general workflow |
356 | figure <overview-manual/concepts:openembedded build system concepts>`: | 356 | figure <overview-manual/concepts:openembedded build system concepts>`: |
357 | 357 | ||
358 | - *Metadata (.bb + Patches):* Software layers containing | 358 | - *Metadata (.bb + Patches):* Software layers containing |
@@ -420,14 +420,14 @@ build. | |||
420 | Distro Layer | 420 | Distro Layer |
421 | ~~~~~~~~~~~~ | 421 | ~~~~~~~~~~~~ |
422 | 422 | ||
423 | The distribution layer provides policy configurations for your | 423 | A distribution layer provides policy configurations for your |
424 | distribution. Best practices dictate that you isolate these types of | 424 | distribution. Best practices dictate that you isolate these types of |
425 | configurations into their own layer. Settings you provide in | 425 | configurations into their own layer. Settings you provide in |
426 | ``conf/distro/distro.conf`` override similar settings that BitBake finds | 426 | ``conf/distro/distro.conf`` override similar settings that BitBake finds |
427 | in your ``conf/local.conf`` file in the :term:`Build Directory`. | 427 | in your ``conf/local.conf`` file in the :term:`Build Directory`. |
428 | 428 | ||
429 | The following list provides some explanation and references for what you | 429 | The following list provides some explanation and references for what you |
430 | typically find in the distribution layer: | 430 | typically find in a distribution layer: |
431 | 431 | ||
432 | - *classes:* Class files (``.bbclass``) hold common functionality that | 432 | - *classes:* Class files (``.bbclass``) hold common functionality that |
433 | can be shared among recipes in the distribution. When your recipes | 433 | can be shared among recipes in the distribution. When your recipes |
@@ -454,7 +454,7 @@ typically find in the distribution layer: | |||
454 | BSP Layer | 454 | BSP Layer |
455 | ~~~~~~~~~ | 455 | ~~~~~~~~~ |
456 | 456 | ||
457 | The BSP Layer provides machine configurations that target specific | 457 | A BSP layer provides machine configurations that target specific |
458 | hardware. Everything in this layer is specific to the machine for which | 458 | hardware. Everything in this layer is specific to the machine for which |
459 | you are building the image or the SDK. A common structure or form is | 459 | you are building the image or the SDK. A common structure or form is |
460 | defined for BSP layers. You can learn more about this structure in the | 460 | defined for BSP layers. You can learn more about this structure in the |
@@ -465,7 +465,7 @@ defined for BSP layers. You can learn more about this structure in the | |||
465 | In order for a BSP layer to be considered compliant with the Yocto | 465 | In order for a BSP layer to be considered compliant with the Yocto |
466 | Project, it must meet some structural requirements. | 466 | Project, it must meet some structural requirements. |
467 | 467 | ||
468 | The BSP Layer's configuration directory contains configuration files for | 468 | A BSP layer's configuration directory contains configuration files for |
469 | the machine (``conf/machine/machine.conf``) and, of course, the layer | 469 | the machine (``conf/machine/machine.conf``) and, of course, the layer |
470 | (``conf/layer.conf``). | 470 | (``conf/layer.conf``). |
471 | 471 | ||
@@ -477,18 +477,18 @@ formfactors, graphics support systems, and so forth. | |||
477 | .. note:: | 477 | .. note:: |
478 | 478 | ||
479 | While the figure shows several | 479 | While the figure shows several |
480 | recipes-\* | 480 | ``recipes-*`` |
481 | directories, not all these directories appear in all BSP layers. | 481 | directories, not all these directories appear in all BSP layers. |
482 | 482 | ||
483 | Software Layer | 483 | Software Layer |
484 | ~~~~~~~~~~~~~~ | 484 | ~~~~~~~~~~~~~~ |
485 | 485 | ||
486 | The software layer provides the Metadata for additional software | 486 | A software layer provides the Metadata for additional software |
487 | packages used during the build. This layer does not include Metadata | 487 | packages used during the build. This layer does not include Metadata |
488 | that is specific to the distribution or the machine, which are found in | 488 | that is specific to the distribution or the machine, which are found in |
489 | their respective layers. | 489 | their respective layers. |
490 | 490 | ||
491 | This layer contains any recipes, append files, and patches, that your | 491 | This layer contains any recipes, append files, and patches that your |
492 | project needs. | 492 | project needs. |
493 | 493 | ||
494 | Sources | 494 | Sources |
@@ -560,9 +560,8 @@ source tree used by the group). | |||
560 | 560 | ||
561 | The canonical method through which to include a local project is to use the | 561 | The canonical method through which to include a local project is to use the |
562 | :ref:`ref-classes-externalsrc` class to include that local project. You use | 562 | :ref:`ref-classes-externalsrc` class to include that local project. You use |
563 | either the ``local.conf`` or a recipe's append file to override or set the | 563 | either ``local.conf`` or a recipe's append file to override or set the |
564 | recipe to point to the local directory on your disk to pull in the whole | 564 | recipe to point to the local directory from which to fetch the source. |
565 | source tree. | ||
566 | 565 | ||
567 | Source Control Managers (Optional) | 566 | Source Control Managers (Optional) |
568 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 567 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
@@ -736,9 +735,6 @@ following list describe the :term:`Build Directory`'s hierarchy: | |||
736 | - :term:`PV`: The version of the | 735 | - :term:`PV`: The version of the |
737 | recipe used to build the package. | 736 | recipe used to build the package. |
738 | 737 | ||
739 | - :term:`PR`: The revision of the | ||
740 | recipe used to build the package. | ||
741 | |||
742 | - :term:`S`: Contains the unpacked source | 738 | - :term:`S`: Contains the unpacked source |
743 | files for a given recipe. | 739 | files for a given recipe. |
744 | 740 | ||
@@ -912,11 +908,62 @@ the analysis and package splitting process use several areas: | |||
912 | execute on a system and it generates code for yet another machine | 908 | execute on a system and it generates code for yet another machine |
913 | (e.g. :ref:`ref-classes-cross-canadian` recipes). | 909 | (e.g. :ref:`ref-classes-cross-canadian` recipes). |
914 | 910 | ||
915 | The :term:`FILES` variable defines the | 911 | Packages for a recipe are listed in the :term:`PACKAGES` variable. The |
916 | files that go into each package in | 912 | :oe_git:`bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>` |
917 | :term:`PACKAGES`. If you want | 913 | configuration file defines the following default list of packages:: |
918 | details on how this is accomplished, you can look at | 914 | |
919 | :yocto_git:`package.bbclass </poky/tree/meta/classes-global/package.bbclass>`. | 915 | PACKAGES = "${PN}-src ${PN}-dbg ${PN}-staticdev ${PN}-dev ${PN}-doc ${PN}-locale ${PACKAGE_BEFORE_PN} ${PN}" |
916 | |||
917 | Each of these packages contains a default list of files defined with the | ||
918 | :term:`FILES` variable. For example, the package ``${PN}-dev`` represents files | ||
919 | useful to the development of applications depending on ``${PN}``. The default | ||
920 | list of files for ``${PN}-dev``, also defined in :oe_git:`bitbake.conf | ||
921 | </openembedded-core/tree/meta/conf/bitbake.conf>`, is defined as follows:: | ||
922 | |||
923 | FILES:${PN}-dev = "${includedir} ${FILES_SOLIBSDEV} ${libdir}/*.la \ | ||
924 | ${libdir}/*.o ${libdir}/pkgconfig ${datadir}/pkgconfig \ | ||
925 | ${datadir}/aclocal ${base_libdir}/*.o \ | ||
926 | ${libdir}/${BPN}/*.la ${base_libdir}/*.la \ | ||
927 | ${libdir}/cmake ${datadir}/cmake" | ||
928 | |||
929 | The paths in this list must be *absolute* paths from the point of view of the | ||
930 | root filesystem on the target, and must *not* make a reference to the variable | ||
931 | :term:`D` or any :term:`WORKDIR` related variable. A correct example would be:: | ||
932 | |||
933 | ${sysconfdir}/foo.conf | ||
934 | |||
935 | .. note:: | ||
936 | |||
937 | The list of files for a package is defined using the override syntax by | ||
938 | separating :term:`FILES` and the package name by a semi-colon (``:``). | ||
939 | |||
940 | A given file can only ever be in one package. By iterating from the leftmost to | ||
941 | rightmost package in :term:`PACKAGES`, each file matching one of the patterns | ||
942 | defined in the corresponding :term:`FILES` definition is included in the | ||
943 | package. | ||
944 | |||
945 | .. note:: | ||
946 | |||
947 | To find out which package installs a file, the ``oe-pkgdata-util`` | ||
948 | command-line utility can be used:: | ||
949 | |||
950 | $ oe-pkgdata-util find-path '/etc/fstab' | ||
951 | base-files: /etc/fstab | ||
952 | |||
953 | For more information on the ``oe-pkgdata-util`` utility, see the section | ||
954 | :ref:`dev-manual/debugging:Viewing Package Information with | ||
955 | ``oe-pkgdata-util``` of the Yocto Project Development Tasks Manual. | ||
956 | |||
957 | To add a custom package variant of the ``${PN}`` recipe named | ||
958 | ``${PN}-extra`` (name is arbitrary), one can add it to the | ||
959 | :term:`PACKAGE_BEFORE_PN` variable:: | ||
960 | |||
961 | PACKAGE_BEFORE_PN += "${PN}-extra" | ||
962 | |||
963 | Alternatively, a custom package can be added by adding it to the | ||
964 | :term:`PACKAGES` variable using the prepend operator (``=+``):: | ||
965 | |||
966 | PACKAGES =+ "${PN}-extra" | ||
920 | 967 | ||
921 | Depending on the type of packages being created (RPM, DEB, or IPK), the | 968 | Depending on the type of packages being created (RPM, DEB, or IPK), the |
922 | :ref:`do_package_write_* <ref-tasks-package_write_deb>` | 969 | :ref:`do_package_write_* <ref-tasks-package_write_deb>` |
@@ -2153,7 +2200,7 @@ require root privileges, the fact that some earlier steps ran in a fake | |||
2153 | root environment does not cause problems. | 2200 | root environment does not cause problems. |
2154 | 2201 | ||
2155 | The capability to run tasks in a fake root environment is known as | 2202 | The capability to run tasks in a fake root environment is known as |
2156 | "`fakeroot <http://man.he.net/man1/fakeroot>`__", which is derived from | 2203 | ":manpage:`fakeroot <fakeroot(1)>`", which is derived from |
2157 | the BitBake keyword/variable flag that requests a fake root environment | 2204 | the BitBake keyword/variable flag that requests a fake root environment |
2158 | for a task. | 2205 | for a task. |
2159 | 2206 | ||
diff --git a/documentation/overview-manual/yp-intro.rst b/documentation/overview-manual/yp-intro.rst index 4a27e12e01..11e6d99e32 100644 --- a/documentation/overview-manual/yp-intro.rst +++ b/documentation/overview-manual/yp-intro.rst | |||
@@ -400,7 +400,7 @@ Yocto Project: | |||
400 | Autobuilder :doc:`here </test-manual/understand-autobuilder>`. | 400 | Autobuilder :doc:`here </test-manual/understand-autobuilder>`. |
401 | 401 | ||
402 | - *Pseudo:* Pseudo is the Yocto Project implementation of | 402 | - *Pseudo:* Pseudo is the Yocto Project implementation of |
403 | `fakeroot <http://man.he.net/man1/fakeroot>`__, which is used to run | 403 | :manpage:`fakeroot <fakeroot(1)>`, which is used to run |
404 | commands in an environment that seemingly has root privileges. | 404 | commands in an environment that seemingly has root privileges. |
405 | 405 | ||
406 | During a build, it can be necessary to perform operations that | 406 | During a build, it can be necessary to perform operations that |
diff --git a/documentation/poky.yaml.in b/documentation/poky.yaml.in index 0c04b615ea..9c03e9959b 100644 --- a/documentation/poky.yaml.in +++ b/documentation/poky.yaml.in | |||
@@ -1,41 +1,27 @@ | |||
1 | # | ||
2 | # Macros used in the documentation | ||
3 | # | ||
4 | |||
5 | # The DISTRO variable represents the current docs version. It should be used | ||
6 | # when referring to the current docs version. See also DISTRO_LATEST_TAG. | ||
1 | DISTRO : "5.0" | 7 | DISTRO : "5.0" |
8 | # The DISTRO_LATEST_TAG represents the latest tag on the current branch. It | ||
9 | # should be used in HTTP link referring to the current docs version. In these | ||
10 | # cases, the DISTRO may point to A.B.999 which does not exist (just used to | ||
11 | # represent the latest HEAD revision on the branch). DISTRO_LATEST_TAG should | ||
12 | # always point to an existing tag. | ||
13 | DISTRO_LATEST_TAG : "5.0" | ||
2 | DISTRO_NAME_NO_CAP : "scarthgap" | 14 | DISTRO_NAME_NO_CAP : "scarthgap" |
3 | DISTRO_NAME : "Scarthgap" | 15 | DISTRO_NAME : "Scarthgap" |
4 | DISTRO_NAME_NO_CAP_MINUS_ONE : "nanbield" | 16 | DISTRO_NAME_NO_CAP_MINUS_ONE : "nanbield" |
5 | DISTRO_NAME_NO_CAP_LTS : "scarthgap" | 17 | DISTRO_NAME_NO_CAP_LTS : "scarthgap" |
6 | YOCTO_DOC_VERSION : "5.0" | 18 | YOCTO_DOC_VERSION : "5.0" |
7 | DISTRO_REL_TAG : "yocto-5.0" | 19 | DISTRO_REL_TAG : "yocto-$DISTRO;" |
20 | DISTRO_REL_LATEST_TAG : "yocto-&DISTRO_LATEST_TAG;" | ||
8 | DOCCONF_VERSION : "dev" | 21 | DOCCONF_VERSION : "dev" |
9 | BITBAKE_SERIES : "" | 22 | BITBAKE_SERIES : "" |
10 | YOCTO_DL_URL : "https://downloads.yoctoproject.org" | 23 | YOCTO_DL_URL : "https://downloads.yoctoproject.org" |
11 | YOCTO_AB_URL : "https://autobuilder.yoctoproject.org" | ||
12 | YOCTO_RELEASE_DL_URL : "&YOCTO_DL_URL;/releases/yocto/yocto-&DISTRO;" | 24 | YOCTO_RELEASE_DL_URL : "&YOCTO_DL_URL;/releases/yocto/yocto-&DISTRO;" |
13 | UBUNTU_HOST_PACKAGES_ESSENTIAL : "gawk wget git diffstat unzip texinfo gcc \ | ||
14 | build-essential chrpath socat cpio python3 python3-pip python3-pexpect \ | ||
15 | xz-utils debianutils iputils-ping python3-git python3-jinja2 \ | ||
16 | python3-subunit zstd liblz4-tool file locales libacl1 | ||
17 | \n\ $ sudo locale-gen en_US.UTF-8" | ||
18 | FEDORA_HOST_PACKAGES_ESSENTIAL : "gawk make wget tar bzip2 gzip python3 unzip perl patch \ | ||
19 | diffutils diffstat git cpp gcc gcc-c++ glibc-devel texinfo chrpath \ | ||
20 | ccache perl-Data-Dumper perl-Text-ParseWords perl-Thread-Queue perl-bignum socat \ | ||
21 | python3-pexpect findutils which file cpio python python3-pip xz python3-GitPython \ | ||
22 | python3-jinja2 rpcgen perl-FindBin perl-File-Compare \ | ||
23 | perl-File-Copy perl-locale zstd lz4 hostname glibc-langpack-en libacl" | ||
24 | OPENSUSE_HOST_PACKAGES_ESSENTIAL : "python gcc gcc-c++ git chrpath make wget python-xml \ | ||
25 | diffstat makeinfo python-curses patch socat python3 python3-curses tar python3-pip \ | ||
26 | python3-pexpect xz which python3-Jinja2 rpcgen \ | ||
27 | zstd lz4 bzip2 gzip hostname libacl1 | ||
28 | \n\ $ sudo pip3 install GitPython" | ||
29 | ALMALINUX_HOST_PACKAGES_ESSENTIAL : "-y epel-release | ||
30 | \n\ $ sudo yum install dnf-plugins-core | ||
31 | \n\ $ sudo dnf config-manager --set-enabled crb | ||
32 | \n\ $ sudo dnf makecache | ||
33 | \n\ $ sudo dnf install gawk make wget tar bzip2 gzip python3 unzip perl patch \ | ||
34 | diffutils diffstat git cpp gcc gcc-c++ glibc-devel texinfo chrpath ccache \ | ||
35 | socat perl-Data-Dumper perl-Text-ParseWords perl-Thread-Queue python3-pip \ | ||
36 | python3-GitPython python3-jinja2 python3-pexpect xz which \ | ||
37 | rpcgen zstd lz4 cpio glibc-langpack-en libacl" | ||
38 | PIP3_HOST_PACKAGES_DOC : "$ sudo pip3 install sphinx sphinx_rtd_theme pyyaml" | ||
39 | MIN_PYTHON_VERSION : "3.8.0" | 25 | MIN_PYTHON_VERSION : "3.8.0" |
40 | MIN_TAR_VERSION : "1.28" | 26 | MIN_TAR_VERSION : "1.28" |
41 | MIN_GIT_VERSION : "1.8.3.1" | 27 | MIN_GIT_VERSION : "1.8.3.1" |
@@ -47,3 +33,237 @@ MIN_DISK_SPACE : "90" | |||
47 | MIN_DISK_SPACE_RM_WORK : "40" | 33 | MIN_DISK_SPACE_RM_WORK : "40" |
48 | # RAM (Gbytes) needed to generate qemux86-64 core-image-sato on Ubuntu 22.04 (x86-64) on a 4 core system | 34 | # RAM (Gbytes) needed to generate qemux86-64 core-image-sato on Ubuntu 22.04 (x86-64) on a 4 core system |
49 | MIN_RAM : "8" | 35 | MIN_RAM : "8" |
36 | |||
37 | # | ||
38 | # Dependencies | ||
39 | # | ||
40 | |||
41 | # Shared between distros | ||
42 | PIP3_HOST_PACKAGES_DOC: sphinx sphinx_rtd_theme pyyaml | ||
43 | |||
44 | UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL: >- | ||
45 | build-essential | ||
46 | chrpath | ||
47 | cpio | ||
48 | debianutils | ||
49 | diffstat | ||
50 | file | ||
51 | gawk | ||
52 | gcc | ||
53 | git | ||
54 | iputils-ping | ||
55 | libacl1 | ||
56 | liblz4-tool | ||
57 | locales | ||
58 | python3 | ||
59 | python3-git | ||
60 | python3-jinja2 | ||
61 | python3-pexpect | ||
62 | python3-pip | ||
63 | python3-subunit | ||
64 | socat | ||
65 | texinfo | ||
66 | unzip | ||
67 | wget | ||
68 | xz-utils | ||
69 | zstd | ||
70 | |||
71 | UBUNTU_DEBIAN_HOST_PACKAGES_DOC: >- | ||
72 | git | ||
73 | librsvg2-bin | ||
74 | locales | ||
75 | make | ||
76 | python3-saneyaml | ||
77 | python3-sphinx-rtd-theme | ||
78 | sphinx | ||
79 | |||
80 | UBUNTU_DEBIAN_HOST_PACKAGES_DOC_PDF: >- | ||
81 | fonts-freefont-otf | ||
82 | latexmk | ||
83 | tex-gyre | ||
84 | texlive-fonts-extra | ||
85 | texlive-fonts-recommended | ||
86 | texlive-lang-all | ||
87 | texlive-latex-extra | ||
88 | texlive-latex-recommended | ||
89 | texlive-xetex | ||
90 | |||
91 | FEDORA_HOST_PACKAGES_ESSENTIAL: >- | ||
92 | bzip2 | ||
93 | ccache | ||
94 | chrpath | ||
95 | cpio | ||
96 | cpp | ||
97 | diffstat | ||
98 | diffutils | ||
99 | file | ||
100 | findutils | ||
101 | gawk | ||
102 | gcc | ||
103 | gcc-c++ | ||
104 | git | ||
105 | glibc-devel | ||
106 | glibc-langpack-en | ||
107 | gzip | ||
108 | hostname | ||
109 | libacl | ||
110 | lz4 | ||
111 | make | ||
112 | patch | ||
113 | perl | ||
114 | perl-Data-Dumper | ||
115 | perl-File-Compare | ||
116 | perl-File-Copy | ||
117 | perl-FindBin | ||
118 | perl-Text-ParseWords | ||
119 | perl-Thread-Queue | ||
120 | perl-bignum | ||
121 | perl-locale | ||
122 | python | ||
123 | python3 | ||
124 | python3-GitPython | ||
125 | python3-jinja2 | ||
126 | python3-pexpect | ||
127 | python3-pip | ||
128 | rpcgen | ||
129 | socat | ||
130 | tar | ||
131 | texinfo | ||
132 | unzip | ||
133 | wget | ||
134 | which | ||
135 | xz | ||
136 | zstd | ||
137 | |||
138 | FEDORA_HOST_PACKAGES_DOC: >- | ||
139 | git | ||
140 | glibc-locale-source | ||
141 | librsvg2-tools | ||
142 | make | ||
143 | python3-pip | ||
144 | which | ||
145 | |||
146 | FEDORA_HOST_PACKAGES_DOC_PDF: >- | ||
147 | 'texlive-collection-lang*' | ||
148 | latexmk | ||
149 | texlive-collection-fontsextra | ||
150 | texlive-collection-fontsrecommended | ||
151 | texlive-collection-latex | ||
152 | texlive-collection-latexextra | ||
153 | texlive-collection-latexrecommended | ||
154 | texlive-collection-xetex | ||
155 | texlive-fncychap | ||
156 | texlive-gnu-freefont | ||
157 | texlive-tex-gyre | ||
158 | texlive-xetex | ||
159 | |||
160 | OPENSUSE_HOST_PACKAGES_ESSENTIAL: >- | ||
161 | bzip2 | ||
162 | chrpath | ||
163 | diffstat | ||
164 | gcc | ||
165 | gcc-c++ | ||
166 | git | ||
167 | gzip | ||
168 | hostname | ||
169 | libacl1 | ||
170 | lz4 | ||
171 | make | ||
172 | makeinfo | ||
173 | patch | ||
174 | python | ||
175 | python-curses | ||
176 | python-xml | ||
177 | python3 | ||
178 | python3-Jinja2 | ||
179 | python3-curses | ||
180 | python3-pexpect | ||
181 | python3-pip | ||
182 | rpcgen | ||
183 | socat | ||
184 | tar | ||
185 | wget | ||
186 | which | ||
187 | xz | ||
188 | zstd | ||
189 | |||
190 | OPENSUSE_PIP3_HOST_PACKAGES_ESSENTIAL: GitPython | ||
191 | |||
192 | OPENSUSE_HOST_PACKAGES_DOC: >- | ||
193 | git | ||
194 | glibc-i18ndata | ||
195 | make | ||
196 | python3-pip | ||
197 | rsvg-convert | ||
198 | which | ||
199 | |||
200 | OPENSUSE_HOST_PACKAGES_DOC_PDF: >- | ||
201 | 'texlive-collection-lang*' | ||
202 | texlive-collection-fontsextra | ||
203 | texlive-collection-fontsrecommended | ||
204 | texlive-collection-latex | ||
205 | texlive-collection-latexextra | ||
206 | texlive-collection-latexrecommended | ||
207 | texlive-collection-xetex | ||
208 | texlive-fncychap | ||
209 | texlive-gnu-freefont | ||
210 | texlive-latexmk | ||
211 | texlive-tex-gyre | ||
212 | texlive-xetex | ||
213 | |||
214 | ALMALINUX_HOST_PACKAGES_ESSENTIAL: >- | ||
215 | bzip2 | ||
216 | ccache | ||
217 | chrpath | ||
218 | cpio | ||
219 | cpp | ||
220 | diffstat | ||
221 | diffutils | ||
222 | gawk | ||
223 | gcc | ||
224 | gcc-c++ | ||
225 | git | ||
226 | glibc-devel | ||
227 | glibc-langpack-en | ||
228 | gzip | ||
229 | libacl | ||
230 | lz4 | ||
231 | make | ||
232 | patch | ||
233 | perl | ||
234 | perl-Data-Dumper | ||
235 | perl-Text-ParseWords | ||
236 | perl-Thread-Queue | ||
237 | python3 | ||
238 | python3-GitPython | ||
239 | python3-jinja2 | ||
240 | python3-pexpect | ||
241 | python3-pip | ||
242 | rpcgen | ||
243 | socat | ||
244 | tar | ||
245 | texinfo | ||
246 | unzip | ||
247 | wget | ||
248 | which | ||
249 | xz | ||
250 | zstd | ||
251 | |||
252 | ALMALINUX_HOST_PACKAGES_DOC: >- | ||
253 | git | ||
254 | glibc-locale-source | ||
255 | librsvg2-tools | ||
256 | make | ||
257 | python3-pip | ||
258 | which | ||
259 | |||
260 | ALMALINUX_HOST_PACKAGES_DOC_PDF: >- | ||
261 | latexmk | ||
262 | texlive-collection-fontsrecommended | ||
263 | texlive-collection-latex | ||
264 | texlive-collection-latexrecommended | ||
265 | texlive-collection-xetex | ||
266 | texlive-fncychap | ||
267 | texlive-gnu-freefont | ||
268 | texlive-tex-gyre | ||
269 | texlive-xetex | ||
diff --git a/documentation/ref-manual/classes.rst b/documentation/ref-manual/classes.rst index 9520d0bf7c..1d76b36d45 100644 --- a/documentation/ref-manual/classes.rst +++ b/documentation/ref-manual/classes.rst | |||
@@ -159,27 +159,38 @@ software that includes bash-completion data. | |||
159 | ``bin_package`` | 159 | ``bin_package`` |
160 | =============== | 160 | =============== |
161 | 161 | ||
162 | The :ref:`ref-classes-bin-package` class is a helper class for recipes that extract the | 162 | The :ref:`ref-classes-bin-package` class is a helper class for recipes, that |
163 | contents of a binary package (e.g. an RPM) and install those contents | 163 | disables the :ref:`ref-tasks-configure` and :ref:`ref-tasks-compile` tasks and |
164 | rather than building the binary from source. The binary package is | 164 | copies the content of the :term:`S` directory into the :term:`D` directory. This |
165 | extracted and new packages in the configured output package format are | 165 | is useful for installing binary packages (e.g. RPM packages) by passing the |
166 | created. Extraction and installation of proprietary binaries is a good | 166 | package in the :term:`SRC_URI` variable and inheriting this class. |
167 | example use for this class. | ||
168 | 167 | ||
169 | .. note:: | 168 | For RPMs and other packages that do not contain a subdirectory, you should set |
169 | the :term:`SRC_URI` option ``subdir`` to :term:`BP` so that the contents are | ||
170 | extracted to the directory expected by the default value of :term:`S`. For | ||
171 | example:: | ||
172 | |||
173 | SRC_URI = "https://example.com/downloads/somepackage.rpm;subdir=${BP}" | ||
174 | |||
175 | This class can also be used for tarballs. For example:: | ||
176 | |||
177 | SRC_URI = "file://somepackage.tar.xz;subdir=${BP}" | ||
178 | |||
179 | The :ref:`ref-classes-bin-package` class will copy the extracted content of the | ||
180 | tarball from :term:`S` to :term:`D`. | ||
170 | 181 | ||
171 | For RPMs and other packages that do not contain a subdirectory, you | 182 | This class assumes that the content of the package as installed in :term:`S` |
172 | should specify an appropriate fetcher parameter to point to the | 183 | mirrors the expected layout once installed on the target, which is generally the |
173 | subdirectory. For example, if BitBake is using the Git fetcher (``git://``), | 184 | case for binary packages. For example, an RPM package for a library would |
174 | the "subpath" parameter limits the checkout to a specific subpath | 185 | usually contain the ``usr/lib`` directory, and should be extracted to |
175 | of the tree. Here is an example where ``${BP}`` is used so that the files | 186 | ``${S}/usr/lib/<library>.so.<version>`` to be installed in :term:`D` correctly. |
176 | are extracted into the subdirectory expected by the default value of | ||
177 | :term:`S`:: | ||
178 | 187 | ||
179 | SRC_URI = "git://example.com/downloads/somepackage.rpm;branch=main;subpath=${BP}" | 188 | .. note:: |
180 | 189 | ||
181 | See the ":ref:`bitbake-user-manual/bitbake-user-manual-fetching:fetchers`" section in the BitBake User Manual for | 190 | The extraction of the package passed in :term:`SRC_URI` is not handled by the |
182 | more information on supported BitBake Fetchers. | 191 | :ref:`ref-classes-bin-package` class, but rather by the appropriate |
192 | :ref:`fetcher <bitbake-user-manual/bitbake-user-manual-fetching:fetchers>` | ||
193 | depending on the file extension. | ||
183 | 194 | ||
184 | .. _ref-classes-binconfig: | 195 | .. _ref-classes-binconfig: |
185 | 196 | ||
@@ -552,7 +563,7 @@ You can also look for vulnerabilities in specific packages by passing | |||
552 | ``-c cve_check`` to BitBake. | 563 | ``-c cve_check`` to BitBake. |
553 | 564 | ||
554 | After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve`` | 565 | After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve`` |
555 | and image specific summaries in ``tmp/deploy/images/*.cve`` or ``tmp/deploy/images/*.json`` files. | 566 | and image specific summaries in ``tmp/deploy/images/*.json`` files. |
556 | 567 | ||
557 | When building, the CVE checker will emit build time warnings for any detected | 568 | When building, the CVE checker will emit build time warnings for any detected |
558 | issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component | 569 | issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component |
@@ -1461,12 +1472,8 @@ The tests you can list with the :term:`WARN_QA` and | |||
1461 | - ``patch-fuzz:`` Checks for fuzz in patch files that may allow | 1472 | - ``patch-fuzz:`` Checks for fuzz in patch files that may allow |
1462 | them to apply incorrectly if the underlying code changes. | 1473 | them to apply incorrectly if the underlying code changes. |
1463 | 1474 | ||
1464 | - ``patch-status-core:`` Checks that the Upstream-Status is specified | 1475 | - ``patch-status:`` Checks that the ``Upstream-Status`` is specified and valid |
1465 | and valid in the headers of patches for recipes in the OE-Core layer. | 1476 | in the headers of patches for recipes. |
1466 | |||
1467 | - ``patch-status-noncore:`` Checks that the Upstream-Status is specified | ||
1468 | and valid in the headers of patches for recipes in layers other than | ||
1469 | OE-Core. | ||
1470 | 1477 | ||
1471 | - ``perllocalpod:`` Checks for ``perllocal.pod`` being erroneously | 1478 | - ``perllocalpod:`` Checks for ``perllocal.pod`` being erroneously |
1472 | installed and packaged by a recipe. | 1479 | installed and packaged by a recipe. |
@@ -1986,7 +1993,8 @@ a couple different ways: | |||
1986 | Not using this naming convention can lead to subtle problems | 1993 | Not using this naming convention can lead to subtle problems |
1987 | caused by existing code that depends on that naming convention. | 1994 | caused by existing code that depends on that naming convention. |
1988 | 1995 | ||
1989 | - Create or modify a target recipe that contains the following:: | 1996 | - Or, create a :ref:`ref-classes-native` variant of any target recipe (e.g. |
1997 | ``myrecipe.bb``) by adding the following to the recipe:: | ||
1990 | 1998 | ||
1991 | BBCLASSEXTEND = "native" | 1999 | BBCLASSEXTEND = "native" |
1992 | 2000 | ||
@@ -2017,24 +2025,25 @@ couple different ways: | |||
2017 | inherit statement in the recipe after all other inherit statements so | 2025 | inherit statement in the recipe after all other inherit statements so |
2018 | that the :ref:`ref-classes-nativesdk` class is inherited last. | 2026 | that the :ref:`ref-classes-nativesdk` class is inherited last. |
2019 | 2027 | ||
2020 | - Create a :ref:`ref-classes-nativesdk` variant of any recipe by adding the following:: | 2028 | .. note:: |
2021 | 2029 | ||
2022 | BBCLASSEXTEND = "nativesdk" | 2030 | When creating a recipe, you must follow this naming convention:: |
2023 | 2031 | ||
2024 | Inside the | 2032 | nativesdk-myrecipe.bb |
2025 | recipe, use ``:class-nativesdk`` and ``:class-target`` overrides to | ||
2026 | specify any functionality specific to the respective SDK machine or | ||
2027 | target case. | ||
2028 | 2033 | ||
2029 | .. note:: | ||
2030 | 2034 | ||
2031 | When creating a recipe, you must follow this naming convention:: | 2035 | Not doing so can lead to subtle problems because there is code that |
2036 | depends on the naming convention. | ||
2032 | 2037 | ||
2033 | nativesdk-myrecipe.bb | 2038 | - Or, create a :ref:`ref-classes-nativesdk` variant of any target recipe (e.g. |
2039 | ``myrecipe.bb``) by adding the following to the recipe:: | ||
2034 | 2040 | ||
2041 | BBCLASSEXTEND = "nativesdk" | ||
2035 | 2042 | ||
2036 | Not doing so can lead to subtle problems because there is code that | 2043 | Inside the |
2037 | depends on the naming convention. | 2044 | recipe, use ``:class-nativesdk`` and ``:class-target`` overrides to |
2045 | specify any functionality specific to the respective SDK machine or | ||
2046 | target case. | ||
2038 | 2047 | ||
2039 | Although applied differently, the :ref:`ref-classes-nativesdk` class is used with both | 2048 | Although applied differently, the :ref:`ref-classes-nativesdk` class is used with both |
2040 | methods. The advantage of the second method is that you do not need to | 2049 | methods. The advantage of the second method is that you do not need to |
@@ -2608,7 +2617,7 @@ runtime tests for recipes that build software that provides these tests. | |||
2608 | This class is intended to be inherited by individual recipes. However, | 2617 | This class is intended to be inherited by individual recipes. However, |
2609 | the class' functionality is largely disabled unless "ptest" appears in | 2618 | the class' functionality is largely disabled unless "ptest" appears in |
2610 | :term:`DISTRO_FEATURES`. See the | 2619 | :term:`DISTRO_FEATURES`. See the |
2611 | ":ref:`dev-manual/packages:testing packages with ptest`" | 2620 | ":ref:`test-manual/ptest:testing packages with ptest`" |
2612 | section in the Yocto Project Development Tasks Manual for more information | 2621 | section in the Yocto Project Development Tasks Manual for more information |
2613 | on ptest. | 2622 | on ptest. |
2614 | 2623 | ||
@@ -2632,7 +2641,7 @@ Enables package tests (ptests) specifically for GNOME packages, which | |||
2632 | have tests intended to be executed with ``gnome-desktop-testing``. | 2641 | have tests intended to be executed with ``gnome-desktop-testing``. |
2633 | 2642 | ||
2634 | For information on setting up and running ptests, see the | 2643 | For information on setting up and running ptests, see the |
2635 | ":ref:`dev-manual/packages:testing packages with ptest`" | 2644 | ":ref:`test-manual/ptest:testing packages with ptest`" |
2636 | section in the Yocto Project Development Tasks Manual. | 2645 | section in the Yocto Project Development Tasks Manual. |
2637 | 2646 | ||
2638 | .. _ref-classes-python3-dir: | 2647 | .. _ref-classes-python3-dir: |
@@ -3205,8 +3214,8 @@ after it is built, you can set :term:`TESTIMAGE_AUTO`:: | |||
3205 | TESTIMAGE_AUTO = "1" | 3214 | TESTIMAGE_AUTO = "1" |
3206 | 3215 | ||
3207 | For information on how to enable, run, and create new tests, see the | 3216 | For information on how to enable, run, and create new tests, see the |
3208 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 3217 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
3209 | section in the Yocto Project Development Tasks Manual. | 3218 | section in the Yocto Project Test Environment Manual. |
3210 | 3219 | ||
3211 | .. _ref-classes-testsdk: | 3220 | .. _ref-classes-testsdk: |
3212 | 3221 | ||
diff --git a/documentation/ref-manual/devtool-reference.rst b/documentation/ref-manual/devtool-reference.rst index 9319addc3c..2db2adde95 100644 --- a/documentation/ref-manual/devtool-reference.rst +++ b/documentation/ref-manual/devtool-reference.rst | |||
@@ -24,7 +24,7 @@ The ``devtool`` command line is organized similarly to Git in that it | |||
24 | has a number of sub-commands for each function. You can run | 24 | has a number of sub-commands for each function. You can run |
25 | ``devtool --help`` to see all the commands:: | 25 | ``devtool --help`` to see all the commands:: |
26 | 26 | ||
27 | $ devtool -h | 27 | $ devtool --help |
28 | NOTE: Starting bitbake server... | 28 | NOTE: Starting bitbake server... |
29 | usage: devtool [--basepath BASEPATH] [--bbpath BBPATH] [-d] [-q] [--color COLOR] [-h] <subcommand> ... | 29 | usage: devtool [--basepath BASEPATH] [--bbpath BBPATH] [-d] [-q] [--color COLOR] [-h] <subcommand> ... |
30 | 30 | ||
@@ -50,6 +50,7 @@ has a number of sub-commands for each function. You can run | |||
50 | search Search available recipes | 50 | search Search available recipes |
51 | Working on a recipe in the workspace: | 51 | Working on a recipe in the workspace: |
52 | build Build a recipe | 52 | build Build a recipe |
53 | ide-sdk Setup the SDK and configure the IDE | ||
53 | rename Rename a recipe file in the workspace | 54 | rename Rename a recipe file in the workspace |
54 | edit-recipe Edit a recipe file | 55 | edit-recipe Edit a recipe file |
55 | find-recipe Find a recipe file | 56 | find-recipe Find a recipe file |
@@ -63,17 +64,11 @@ has a number of sub-commands for each function. You can run | |||
63 | build-image Build image including workspace recipe packages | 64 | build-image Build image including workspace recipe packages |
64 | Advanced: | 65 | Advanced: |
65 | create-workspace Set up workspace in an alternative location | 66 | create-workspace Set up workspace in an alternative location |
67 | import Import exported tar archive into workspace | ||
68 | export Export workspace into a tar archive | ||
66 | extract Extract the source for an existing recipe | 69 | extract Extract the source for an existing recipe |
67 | sync Synchronize the source tree for an existing recipe | 70 | sync Synchronize the source tree for an existing recipe |
68 | menuconfig Alter build-time configuration for a recipe | 71 | menuconfig Alter build-time configuration for a recipe |
69 | import Import exported tar archive into workspace | ||
70 | export Export workspace into a tar archive | ||
71 | other: | ||
72 | selftest-reverse Reverse value (for selftest) | ||
73 | pluginfile Print the filename of this plugin | ||
74 | bbdir Print the BBPATH directory of this plugin | ||
75 | count How many times have this plugin been registered. | ||
76 | multiloaded How many times have this plugin been initialized | ||
77 | Use devtool <subcommand> --help to get help on a specific command | 72 | Use devtool <subcommand> --help to get help on a specific command |
78 | 73 | ||
79 | As directed in the general help output, you can | 74 | As directed in the general help output, you can |
@@ -82,8 +77,8 @@ using ``--help``:: | |||
82 | 77 | ||
83 | $ devtool add --help | 78 | $ devtool add --help |
84 | NOTE: Starting bitbake server... | 79 | NOTE: Starting bitbake server... |
85 | usage: devtool add [-h] [--same-dir | --no-same-dir] [--fetch URI] [--npm-dev] [--version VERSION] [--no-git] [--srcrev SRCREV | --autorev] [--srcbranch SRCBRANCH] [--binary] [--also-native] [--src-subdir SUBDIR] [--mirrors] | 80 | usage: devtool add [-h] [--same-dir | --no-same-dir] [--fetch URI] [--npm-dev] [--no-pypi] [--version VERSION] [--no-git] [--srcrev SRCREV | --autorev] |
86 | [--provides PROVIDES] | 81 | [--srcbranch SRCBRANCH] [--binary] [--also-native] [--src-subdir SUBDIR] [--mirrors] [--provides PROVIDES] |
87 | [recipename] [srctree] [fetchuri] | 82 | [recipename] [srctree] [fetchuri] |
88 | 83 | ||
89 | Adds a new recipe to the workspace to build a specified source tree. Can optionally fetch a remote URI and unpack it to create the source tree. | 84 | Adds a new recipe to the workspace to build a specified source tree. Can optionally fetch a remote URI and unpack it to create the source tree. |
@@ -99,6 +94,7 @@ using ``--help``:: | |||
99 | --no-same-dir Force build in a separate build directory | 94 | --no-same-dir Force build in a separate build directory |
100 | --fetch URI, -f URI Fetch the specified URI and extract it to create the source tree (deprecated - pass as positional argument instead) | 95 | --fetch URI, -f URI Fetch the specified URI and extract it to create the source tree (deprecated - pass as positional argument instead) |
101 | --npm-dev For npm, also fetch devDependencies | 96 | --npm-dev For npm, also fetch devDependencies |
97 | --no-pypi Do not inherit pypi class | ||
102 | --version VERSION, -V VERSION | 98 | --version VERSION, -V VERSION |
103 | Version to use within recipe (PV) | 99 | Version to use within recipe (PV) |
104 | --no-git, -g If fetching source, do not set up source tree as a git repository | 100 | --no-git, -g If fetching source, do not set up source tree as a git repository |
@@ -439,7 +435,7 @@ You can read more on the ``devtool upgrade`` workflow in the | |||
439 | ":ref:`sdk-manual/extensible:use \`\`devtool upgrade\`\` to create a version of the recipe that supports a newer version of the software`" | 435 | ":ref:`sdk-manual/extensible:use \`\`devtool upgrade\`\` to create a version of the recipe that supports a newer version of the software`" |
440 | section in the Yocto Project Application Development and the Extensible | 436 | section in the Yocto Project Application Development and the Extensible |
441 | Software Development Kit (eSDK) manual. You can also see an example of | 437 | Software Development Kit (eSDK) manual. You can also see an example of |
442 | how to use ``devtool upgrade`` in the ":ref:`dev-manual/upgrading-recipes:using \`\`devtool upgrade\`\``" | 438 | how to use ``devtool upgrade`` in the ":ref:`dev-manual/upgrading-recipes:using ``devtool upgrade```" |
443 | section in the Yocto Project Development Tasks Manual. | 439 | section in the Yocto Project Development Tasks Manual. |
444 | 440 | ||
445 | .. _devtool-resetting-a-recipe: | 441 | .. _devtool-resetting-a-recipe: |
@@ -467,6 +463,20 @@ Here is an example that resets the workspace directory that contains the | |||
467 | NOTE: Leaving source tree /home/scottrif/poky/build/workspace/sources/mtr as-is; if you no longer need it then please delete it manually | 463 | NOTE: Leaving source tree /home/scottrif/poky/build/workspace/sources/mtr as-is; if you no longer need it then please delete it manually |
468 | $ | 464 | $ |
469 | 465 | ||
466 | .. _devtool-finish-working-on-a-recipe: | ||
467 | |||
468 | Finish Working on a Recipe | ||
469 | ========================== | ||
470 | |||
471 | Use the ``devtool finish`` command to push any committed changes to the | ||
472 | specified recipe in the specified layer and remove it from your workspace. | ||
473 | |||
474 | This is roughly equivalent to the ``devtool update-recipe`` command followed by | ||
475 | the ``devtool reset`` command. The changes must have been committed to the git | ||
476 | repository created by ``devtool``. Here is an example:: | ||
477 | |||
478 | $ devtool finish recipe /path/to/custom/layer | ||
479 | |||
470 | .. _devtool-building-your-recipe: | 480 | .. _devtool-building-your-recipe: |
471 | 481 | ||
472 | Building Your Recipe | 482 | Building Your Recipe |
@@ -543,6 +553,26 @@ the packages are already on the target. Consequently, when a runtime | |||
543 | call is made in the application for a dependent function (e.g. a library | 553 | call is made in the application for a dependent function (e.g. a library |
544 | call), the function cannot be found. | 554 | call), the function cannot be found. |
545 | 555 | ||
556 | .. warning:: | ||
557 | |||
558 | Runtime dependencies can be explicitly listed in the :term:`RDEPENDS` | ||
559 | variable, but may also be the result of a :term:`DEPENDS` assignment in your | ||
560 | application's recipe. This is usually the case when your application depends | ||
561 | on libraries for compilation: these libraries are listed as build-time | ||
562 | dependencies in the :term:`DEPENDS` variable in your application's recipe. | ||
563 | However these may also be runtime dependencies if they install shared objects | ||
564 | on which your application will dynamically link to at runtime (e.g. shared | ||
565 | libraries ending with ``.so``). | ||
566 | |||
567 | These runtime dependencies are automatically resolved by the | ||
568 | :term:`OpenEmbedded Build System` during the packaging phase. Since | ||
569 | ``devtool`` ignores packaging dependencies, they will not be installed | ||
570 | automatically with ``devtool deploy-target``. | ||
571 | |||
572 | For more information on how the :term:`OpenEmbedded Build System` handles | ||
573 | packaging, see the :ref:`overview-manual/concepts:Automatically Added Runtime | ||
574 | Dependencies` section of the Yocto Project Overview and Concepts Manual. | ||
575 | |||
546 | To be sure you have all the dependencies local to the target, you need | 576 | To be sure you have all the dependencies local to the target, you need |
547 | to be sure that the packages are pre-deployed (installed) on the target | 577 | to be sure that the packages are pre-deployed (installed) on the target |
548 | before attempting to run your application. | 578 | before attempting to run your application. |
@@ -618,3 +648,43 @@ a match. | |||
618 | 648 | ||
619 | When you use the ``devtool search`` command, you must supply a keyword. | 649 | When you use the ``devtool search`` command, you must supply a keyword. |
620 | The command uses the keyword when searching for a match. | 650 | The command uses the keyword when searching for a match. |
651 | |||
652 | Alternatively, the ``devtool find-recipe`` command can be used to search for | ||
653 | recipe files instead of recipe names. Likewise, you must supply a keyword. | ||
654 | |||
655 | .. _devtool-get-the-configure-script-help: | ||
656 | |||
657 | Get Information on Recipe Configuration Scripts | ||
658 | =============================================== | ||
659 | |||
660 | Use the ``devtool configure-help`` command to get help on the configuration | ||
661 | script options for a given recipe. You must supply the recipe name to the | ||
662 | command. For example, it shows the output of ``./configure --help`` for | ||
663 | :ref:`autotools <ref-classes-autotools>`-based recipes. | ||
664 | |||
665 | The ``configure-help`` command will also display the configuration options | ||
666 | currently in use, including the ones passed through the :term:`EXTRA_OECONF` | ||
667 | variable. | ||
668 | |||
669 | .. _devtool-generate-an-ide-configuration-for-a-recipe: | ||
670 | |||
671 | Generate an IDE Configuration for a Recipe | ||
672 | ========================================== | ||
673 | |||
674 | The ``devtool ide-sdk`` automatically creates an IDE configuration and SDK to | ||
675 | work on a given recipe. Depending on the ``--mode`` parameter, different types | ||
676 | of SDKs are generated: | ||
677 | |||
678 | - ``modified`` mode: this creates an SDK and generates an IDE configuration in | ||
679 | the workspace directory. | ||
680 | |||
681 | - ``shared`` mode: this creates a cross-compiling toolchain and the | ||
682 | corresponding shared sysroot directories of the supplied recipe(s). | ||
683 | |||
684 | The ``--target`` option can be used to specify a ``username@hostname`` string | ||
685 | and create a remote debugging configuration for the recipe. Similarly to | ||
686 | ``devtool deploy-target``, it requires an SSH server running on the target. | ||
687 | |||
688 | For further details on the ``devtool ide-sdk`` command, see the | ||
689 | ":doc:`/sdk-manual/extensible`" chapter in the Yocto Project Application | ||
690 | Development and the Extensible Software Development Kit (eSDK) manual. | ||
diff --git a/documentation/ref-manual/faq.rst b/documentation/ref-manual/faq.rst index bab284bbfd..7dd37c7a5c 100644 --- a/documentation/ref-manual/faq.rst +++ b/documentation/ref-manual/faq.rst | |||
@@ -45,6 +45,28 @@ See :yocto_wiki:`Products that use the Yocto Project | |||
45 | Wiki. Don't hesitate to contribute to this page if you know other such | 45 | Wiki. Don't hesitate to contribute to this page if you know other such |
46 | products. | 46 | products. |
47 | 47 | ||
48 | Why isn't systemd the default init system for OpenEmbedded-Core/Yocto Project or in Poky? | ||
49 | ----------------------------------------------------------------------------------------- | ||
50 | |||
51 | `systemd <https://systemd.io/>`__ is a desktop Linux init system with a specific | ||
52 | focus that is not entirely aligned with a customisable "embedded" build | ||
53 | system/environment. | ||
54 | |||
55 | It understandably mandates certain layouts and configurations which may | ||
56 | or may not align with what the objectives and direction :term:`OpenEmbedded-Core | ||
57 | (OE-Core)` or Yocto Project want to take. It doesn't support all of our targets. | ||
58 | For example `musl <https://www.musl-libc.org/>`__ support in systemd is | ||
59 | problematic. | ||
60 | |||
61 | If it were our default, we would have to align with all their choices | ||
62 | and this doesn't make sense. It is therefore a configuration option and | ||
63 | available to anyone where the design goals align. But we are clear it | ||
64 | is not the only way to handle init. | ||
65 | |||
66 | Our automated testing includes it through the ``poky-altcfg`` :term:`DISTRO` and | ||
67 | we don't really need it to be the default: it is tested, it works, and people | ||
68 | can choose to use it. | ||
69 | |||
48 | Building environment | 70 | Building environment |
49 | ==================== | 71 | ==================== |
50 | 72 | ||
@@ -259,6 +281,25 @@ Within the :term:`Build Directory`, is the ``tmp`` directory. To remove all the | |||
259 | build output yet preserve any source code or downloaded files from | 281 | build output yet preserve any source code or downloaded files from |
260 | previous builds, simply remove the ``tmp`` directory. | 282 | previous builds, simply remove the ``tmp`` directory. |
261 | 283 | ||
284 | Why isn't there a way to append bbclass files like bbappend for recipes? | ||
285 | ------------------------------------------------------------------------ | ||
286 | |||
287 | The Yocto Project has consciously chosen not to implement such functionality. | ||
288 | Class code is designed to be shared and reused, and exposes some level of | ||
289 | configuration to its users. We want to encourage people to share these changes | ||
290 | so we can build the best classes. | ||
291 | |||
292 | If the ``append`` functionality was available for classes, our evidence and | ||
293 | experience suggest that people would create their custom changes in their | ||
294 | layer instead of sharing and discussing the issues and/or limitations they | ||
295 | encountered. This would lead to bizarre class interactions when new layers are | ||
296 | included. We therefore consciously choose to have a natural pressure to share | ||
297 | class code improvements or fixes. | ||
298 | |||
299 | There are also technical considerations like which recipes a class append would | ||
300 | apply to and how that would fit within the layer model. These are complications | ||
301 | we think we can live without! | ||
302 | |||
262 | Customizing generated images | 303 | Customizing generated images |
263 | ============================ | 304 | ============================ |
264 | 305 | ||
diff --git a/documentation/ref-manual/features.rst b/documentation/ref-manual/features.rst index b2ba731bb2..5574ecafe2 100644 --- a/documentation/ref-manual/features.rst +++ b/documentation/ref-manual/features.rst | |||
@@ -12,7 +12,7 @@ Features provide a mechanism for working out which packages should be | |||
12 | included in the generated images. Distributions can select which | 12 | included in the generated images. Distributions can select which |
13 | features they want to support through the :term:`DISTRO_FEATURES` variable, | 13 | features they want to support through the :term:`DISTRO_FEATURES` variable, |
14 | which is set or appended to in a distribution's configuration file such | 14 | which is set or appended to in a distribution's configuration file such |
15 | as ``poky.conf``, ``poky-tiny.conf``, ``poky-lsb.conf`` and so forth. | 15 | as ``poky.conf``, ``poky-tiny.conf``, ``poky-altcfg.conf`` and so forth. |
16 | Machine features are set in the :term:`MACHINE_FEATURES` variable, which is | 16 | Machine features are set in the :term:`MACHINE_FEATURES` variable, which is |
17 | set in the machine configuration file and specifies the hardware | 17 | set in the machine configuration file and specifies the hardware |
18 | features for a given machine. | 18 | features for a given machine. |
@@ -207,7 +207,7 @@ metadata, as extra layers can define their own: | |||
207 | 207 | ||
208 | - *ptest:* Enables building the package tests where supported by | 208 | - *ptest:* Enables building the package tests where supported by |
209 | individual recipes. For more information on package tests, see the | 209 | individual recipes. For more information on package tests, see the |
210 | ":ref:`dev-manual/packages:testing packages with ptest`" section | 210 | ":ref:`test-manual/ptest:testing packages with ptest`" section |
211 | in the Yocto Project Development Tasks Manual. | 211 | in the Yocto Project Development Tasks Manual. |
212 | 212 | ||
213 | - *pulseaudio:* Include support for | 213 | - *pulseaudio:* Include support for |
diff --git a/documentation/ref-manual/images.rst b/documentation/ref-manual/images.rst index c45f9104a9..c9d8989261 100644 --- a/documentation/ref-manual/images.rst +++ b/documentation/ref-manual/images.rst | |||
@@ -51,27 +51,6 @@ Here is a list of supported recipes: | |||
51 | - ``core-image-full-cmdline``: A console-only image with more | 51 | - ``core-image-full-cmdline``: A console-only image with more |
52 | full-featured Linux system functionality installed. | 52 | full-featured Linux system functionality installed. |
53 | 53 | ||
54 | - ``core-image-lsb``: An image that conforms to the Linux Standard Base | ||
55 | (LSB) specification. This image requires a distribution configuration | ||
56 | that enables LSB compliance (e.g. ``poky-lsb``). If you build | ||
57 | ``core-image-lsb`` without that configuration, the image will not be | ||
58 | LSB-compliant. | ||
59 | |||
60 | - ``core-image-lsb-dev``: A ``core-image-lsb`` image that is suitable | ||
61 | for development work using the host. The image includes headers and | ||
62 | libraries you can use in a host development environment. This image | ||
63 | requires a distribution configuration that enables LSB compliance | ||
64 | (e.g. ``poky-lsb``). If you build ``core-image-lsb-dev`` without that | ||
65 | configuration, the image will not be LSB-compliant. | ||
66 | |||
67 | - ``core-image-lsb-sdk``: A ``core-image-lsb`` that includes everything | ||
68 | in the cross-toolchain but also includes development headers and | ||
69 | libraries to form a complete standalone SDK. This image requires a | ||
70 | distribution configuration that enables LSB compliance (e.g. | ||
71 | ``poky-lsb``). If you build ``core-image-lsb-sdk`` without that | ||
72 | configuration, the image will not be LSB-compliant. This image is | ||
73 | suitable for development using the target. | ||
74 | |||
75 | - ``core-image-minimal``: A small image just capable of allowing a | 54 | - ``core-image-minimal``: A small image just capable of allowing a |
76 | device to boot. | 55 | device to boot. |
77 | 56 | ||
@@ -119,8 +98,8 @@ Here is a list of supported recipes: | |||
119 | deployed to a separate partition so that you can boot into it and use | 98 | deployed to a separate partition so that you can boot into it and use |
120 | it to deploy a second image to be tested. You can find more | 99 | it to deploy a second image to be tested. You can find more |
121 | information about runtime testing in the | 100 | information about runtime testing in the |
122 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 101 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
123 | section in the Yocto Project Development Tasks Manual. | 102 | section in the Yocto Project Test Environment Manual. |
124 | 103 | ||
125 | - ``core-image-testmaster-initramfs``: A RAM-based Initial Root | 104 | - ``core-image-testmaster-initramfs``: A RAM-based Initial Root |
126 | Filesystem (:term:`Initramfs`) image tailored for use with the | 105 | Filesystem (:term:`Initramfs`) image tailored for use with the |
diff --git a/documentation/ref-manual/qa-checks.rst b/documentation/ref-manual/qa-checks.rst index 53b1836e74..27d46de3fd 100644 --- a/documentation/ref-manual/qa-checks.rst +++ b/documentation/ref-manual/qa-checks.rst | |||
@@ -752,21 +752,17 @@ Errors and Warnings | |||
752 | 752 | ||
753 | .. _qa-check-patch-status: | 753 | .. _qa-check-patch-status: |
754 | 754 | ||
755 | - ``Missing Upstream-Status in patch <patchfile> Please add according to <url> [patch-status-core/patch-status-noncore]`` | 755 | - ``Missing Upstream-Status in patch <patchfile> Please add according to <url> [patch-status]`` |
756 | 756 | ||
757 | The ``Upstream-Status`` value is missing in the specified patch file's header. | 757 | The ``Upstream-Status`` value is missing in the specified patch file's header. |
758 | This value is intended to track whether or not the patch has been sent | 758 | This value is intended to track whether or not the patch has been sent |
759 | upstream, whether or not it has been merged, etc. | 759 | upstream, whether or not it has been merged, etc. |
760 | 760 | ||
761 | There are two options for this same check - ``patch-status-core`` (for | ||
762 | recipes in OE-Core) and ``patch-status-noncore`` (for recipes in any other | ||
763 | layer). | ||
764 | |||
765 | For more information, see the | 761 | For more information, see the |
766 | ":ref:`contributor-guide/recipe-style-guide:patch upstream status`" | 762 | ":ref:`contributor-guide/recipe-style-guide:patch upstream status`" |
767 | section in the Yocto Project and OpenEmbedded Contributor Guide. | 763 | section in the Yocto Project and OpenEmbedded Contributor Guide. |
768 | 764 | ||
769 | - ``Malformed Upstream-Status in patch <patchfile> Please correct according to <url> [patch-status-core/patch-status-noncore]`` | 765 | - ``Malformed Upstream-Status in patch <patchfile> Please correct according to <url> [patch-status]`` |
770 | 766 | ||
771 | The ``Upstream-Status`` value in the specified patch file's header is invalid - | 767 | The ``Upstream-Status`` value in the specified patch file's header is invalid - |
772 | it must be a specific format. See the "Missing Upstream-Status" entry above | 768 | it must be a specific format. See the "Missing Upstream-Status" entry above |
@@ -795,7 +791,7 @@ Errors and Warnings | |||
795 | 791 | ||
796 | This check will detect if the source of the package contains some | 792 | This check will detect if the source of the package contains some |
797 | upstream-provided tests and, if so, that ptests are implemented for this | 793 | upstream-provided tests and, if so, that ptests are implemented for this |
798 | recipe. See the ":ref:`dev-manual/packages:testing packages with ptest`" | 794 | recipe. See the ":ref:`test-manual/ptest:testing packages with ptest`" |
799 | section in the Yocto Project Development Tasks Manual. See also the | 795 | section in the Yocto Project Development Tasks Manual. See also the |
800 | ":ref:`ref-classes-ptest`" section. | 796 | ":ref:`ref-classes-ptest`" section. |
801 | 797 | ||
diff --git a/documentation/ref-manual/release-process.rst b/documentation/ref-manual/release-process.rst index 920794679d..639921b9f6 100644 --- a/documentation/ref-manual/release-process.rst +++ b/documentation/ref-manual/release-process.rst | |||
@@ -103,17 +103,22 @@ have reached their End of Life (EOL) won't receive such updates. | |||
103 | 103 | ||
104 | This started with version 3.1 ("Dunfell"), released in April 2020, which | 104 | This started with version 3.1 ("Dunfell"), released in April 2020, which |
105 | the project initially committed to supporting for two years, but this duration | 105 | the project initially committed to supporting for two years, but this duration |
106 | was later extended to four years. Similarly, the following :term:`LTS` release, | 106 | was later extended to four years. |
107 | version 4.0 ("Kirkstone"), was released two years later in May 2022 and the | ||
108 | project committed to supporting it for four years too. | ||
109 | 107 | ||
110 | Therefore, a new :term:`LTS` release is made every two years and is supported | 108 | A new :term:`LTS` release is made every two years and is supported for four |
111 | for four years. This offers more stability to project users and leaves more | 109 | years. This offers more stability to project users and leaves more time to |
112 | time to upgrade to the following :term:`LTS` release. | 110 | upgrade to the following :term:`LTS` release. |
111 | |||
112 | The currently supported :term:`LTS` releases are: | ||
113 | |||
114 | - Version 5.0 ("Scarthgap"), released in April 2024 and supported until April 2028. | ||
115 | - Version 4.0 ("Kirkstone"), released in May 2022 and supported until May 2026. | ||
113 | 116 | ||
114 | See :yocto_wiki:`/Stable_Release_and_LTS` for details about the management | 117 | See :yocto_wiki:`/Stable_Release_and_LTS` for details about the management |
115 | of stable and :term:`LTS` releases. | 118 | of stable and :term:`LTS` releases. |
116 | 119 | ||
120 | This documentation was built for the &DISTRO_NAME; release. | ||
121 | |||
117 | .. image:: svg/releases.* | 122 | .. image:: svg/releases.* |
118 | :width: 100% | 123 | :width: 100% |
119 | 124 | ||
@@ -143,8 +148,8 @@ Additionally, because the test strategies are visible to you as a | |||
143 | developer, you can validate your projects. This section overviews the | 148 | developer, you can validate your projects. This section overviews the |
144 | available test infrastructure used in the Yocto Project. For information | 149 | available test infrastructure used in the Yocto Project. For information |
145 | on how to run available tests on your projects, see the | 150 | on how to run available tests on your projects, see the |
146 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 151 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
147 | section in the Yocto Project Development Tasks Manual. | 152 | section in the Yocto Project Test Environment Manual. |
148 | 153 | ||
149 | The QA/testing infrastructure is woven into the project to the point | 154 | The QA/testing infrastructure is woven into the project to the point |
150 | where core developers take some of it for granted. The infrastructure | 155 | where core developers take some of it for granted. The infrastructure |
@@ -170,7 +175,7 @@ consists of the following pieces: | |||
170 | operation and functions. However, the test can also use the IP | 175 | operation and functions. However, the test can also use the IP |
171 | address of a machine to test. | 176 | address of a machine to test. |
172 | 177 | ||
173 | - :ref:`ptest <dev-manual/packages:testing packages with ptest>`: | 178 | - :ref:`ptest <test-manual/ptest:testing packages with ptest>`: |
174 | Runs tests against packages produced during the build for a given | 179 | Runs tests against packages produced during the build for a given |
175 | piece of software. The test allows the packages to be run within a | 180 | piece of software. The test allows the packages to be run within a |
176 | target image. | 181 | target image. |
@@ -185,7 +190,7 @@ effort has been made to automate the tests so that more people can use | |||
185 | them and the Yocto Project development team can run them faster and more | 190 | them and the Yocto Project development team can run them faster and more |
186 | efficiently. | 191 | efficiently. |
187 | 192 | ||
188 | The Yocto Project's main Autobuilder (&YOCTO_AB_URL;) publicly tests each Yocto | 193 | The Yocto Project's main :yocto_ab:`Autobuilder <>` publicly tests each Yocto |
189 | Project release's code in the :oe_git:`openembedded-core </openembedded-core>`, | 194 | Project release's code in the :oe_git:`openembedded-core </openembedded-core>`, |
190 | :yocto_git:`poky </poky>` and :oe_git:`bitbake </bitbake>` repositories. The | 195 | :yocto_git:`poky </poky>` and :oe_git:`bitbake </bitbake>` repositories. The |
191 | testing occurs for both the current state of the "master" branch and also for | 196 | testing occurs for both the current state of the "master" branch and also for |
diff --git a/documentation/ref-manual/structure.rst b/documentation/ref-manual/structure.rst index e4d8b54bb9..2190f5b90e 100644 --- a/documentation/ref-manual/structure.rst +++ b/documentation/ref-manual/structure.rst | |||
@@ -335,6 +335,15 @@ Once the build process gets the sample file, it uses ``sed`` to substitute final | |||
335 | version of the ``bblayers.conf.sample`` file in the ``meta-poky/conf/templates/default`` | 335 | version of the ``bblayers.conf.sample`` file in the ``meta-poky/conf/templates/default`` |
336 | directory. | 336 | directory. |
337 | 337 | ||
338 | .. _structure-build-conf-bblock.conf: | ||
339 | |||
340 | ``build/conf/bblock.conf`` | ||
341 | -------------------------- | ||
342 | |||
343 | This configuration file is generated by :doc:`bblock </dev-manual/bblock>` and | ||
344 | contains the signatures locked by ``bblock``. By default, it does not exist | ||
345 | and will be created upon the first invocation of ``bblock``. | ||
346 | |||
338 | .. _structure-build-downloads: | 347 | .. _structure-build-downloads: |
339 | 348 | ||
340 | ``build/downloads/`` | 349 | ``build/downloads/`` |
@@ -484,6 +493,30 @@ the ":ref:`sdk-manual/appendix-obtain:building an sdk installer`" | |||
484 | section in the Yocto Project Application Development and the Extensible | 493 | section in the Yocto Project Application Development and the Extensible |
485 | Software Development Kit (eSDK) manual. | 494 | Software Development Kit (eSDK) manual. |
486 | 495 | ||
496 | .. _structure-build-tmp-hosttools: | ||
497 | |||
498 | ``build/tmp/hosttools/`` | ||
499 | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
500 | |||
501 | The OpenEmbedded build system uses this directory to create symbolic links to | ||
502 | some of the host components that are allowed to be called within tasks. These | ||
503 | are basic components listed in the :ref:`ref-manual/system-requirements:required | ||
504 | packages for the build host` section. These components are also listed in the | ||
505 | :term:`HOSTTOOLS` variable and are limited to this list to prevent host | ||
506 | contamination. | ||
507 | |||
508 | .. _structure-build-tmp-pkgdata: | ||
509 | |||
510 | ``build/tmp/pkgdata/`` | ||
511 | ~~~~~~~~~~~~~~~~~~~~~~ | ||
512 | |||
513 | The OpenEmbedded build system uses this directory to store package metadata | ||
514 | generated during the :ref:`ref-tasks-packagedata` task. The files stored in this | ||
515 | directory contain information about each output package produced by the | ||
516 | OpenEmbedded build system, and are used in different ways by the build system | ||
517 | such as ":ref:`dev-manual/debugging:viewing package information with | ||
518 | ``oe-pkgdata-util```". | ||
519 | |||
487 | .. _structure-build-tmp-sstate-control: | 520 | .. _structure-build-tmp-sstate-control: |
488 | 521 | ||
489 | ``build/tmp/sstate-control/`` | 522 | ``build/tmp/sstate-control/`` |
@@ -657,8 +690,15 @@ Here are key subdirectories within each recipe work directory: | |||
657 | 690 | ||
658 | For efficiency, the OpenEmbedded build system creates and uses this | 691 | For efficiency, the OpenEmbedded build system creates and uses this |
659 | directory to hold recipes that share a work directory with other | 692 | directory to hold recipes that share a work directory with other |
660 | recipes. In practice, this is only used for ``gcc`` and its variants | 693 | recipes. This is for example used for ``gcc`` and its variants (e.g. |
661 | (e.g. ``gcc-cross``, ``libgcc``, ``gcc-runtime``, and so forth). | 694 | ``gcc-cross``, ``libgcc``, ``gcc-runtime``, and so forth), or by the |
695 | :ref:`ref-classes-kernel` class to make the kernel source code and kernel build | ||
696 | artifacts available to out-of-tree kernel modules or other kernel-dependent | ||
697 | recipes. | ||
698 | |||
699 | In practice, only a few recipes make use of the ``work-shared`` directory. This | ||
700 | directory is especially useful for recipes that would induce a lot of storage | ||
701 | space if they were to be shared with the standard :term:`Sysroot` mechanism. | ||
662 | 702 | ||
663 | .. _structure-meta: | 703 | .. _structure-meta: |
664 | 704 | ||
diff --git a/documentation/ref-manual/svg/releases.svg b/documentation/ref-manual/svg/releases.svg index 036aa467cc..3a379078b8 100644 --- a/documentation/ref-manual/svg/releases.svg +++ b/documentation/ref-manual/svg/releases.svg | |||
@@ -2,11 +2,14 @@ | |||
2 | <svg | 2 | <svg |
3 | version="1.1" | 3 | version="1.1" |
4 | id="svg2" | 4 | id="svg2" |
5 | width="2040.0006" | 5 | width="1992.7236" |
6 | height="669.30511" | 6 | height="613.35602" |
7 | viewBox="0 0 2040.0006 669.30509" | 7 | viewBox="0 0 1992.7236 613.35599" |
8 | sodipodi:docname="releases.svg" | 8 | sodipodi:docname="releases.svg" |
9 | inkscape:version="1.1.2 (0a00cf5339, 2022-02-04)" | 9 | inkscape:version="1.4.1 (93de688d07, 2025-03-30)" |
10 | inkscape:export-filename="../../../../../../../../tmp/releases.png" | ||
11 | inkscape:export-xdpi="96" | ||
12 | inkscape:export-ydpi="96" | ||
10 | xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" | 13 | xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" |
11 | xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" | 14 | xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" |
12 | xmlns="http://www.w3.org/2000/svg" | 15 | xmlns="http://www.w3.org/2000/svg" |
@@ -24,29 +27,29 @@ | |||
24 | <dc:format>image/svg+xml</dc:format> | 27 | <dc:format>image/svg+xml</dc:format> |
25 | <dc:type | 28 | <dc:type |
26 | rdf:resource="http://purl.org/dc/dcmitype/StillImage" /> | 29 | rdf:resource="http://purl.org/dc/dcmitype/StillImage" /> |
27 | <cc:license | ||
28 | rdf:resource="http://artlibre.org/licence/lal" /> | ||
29 | <dc:title>Yocto Project Release Timeline</dc:title> | 30 | <dc:title>Yocto Project Release Timeline</dc:title> |
30 | <dc:creator> | 31 | <dc:creator> |
31 | <cc:Agent> | 32 | <cc:Agent> |
32 | <dc:title>The Yocto Project</dc:title> | 33 | <dc:title>The Yocto Project</dc:title> |
33 | </cc:Agent> | 34 | </cc:Agent> |
34 | </dc:creator> | 35 | </dc:creator> |
36 | <cc:license | ||
37 | rdf:resource="http://artlibre.org/licence/lal" /> | ||
35 | </cc:Work> | 38 | </cc:Work> |
36 | <cc:License | 39 | <cc:License |
37 | rdf:about="http://creativecommons.org/licenses/by-sa/4.0/"> | 40 | rdf:about="http://artlibre.org/licence/lal"> |
38 | <cc:permits | 41 | <cc:permits |
39 | rdf:resource="http://creativecommons.org/ns#Reproduction" /> | 42 | rdf:resource="http://creativecommons.org/ns#Reproduction" /> |
40 | <cc:permits | 43 | <cc:permits |
41 | rdf:resource="http://creativecommons.org/ns#Distribution" /> | 44 | rdf:resource="http://creativecommons.org/ns#Distribution" /> |
42 | <cc:requires | ||
43 | rdf:resource="http://creativecommons.org/ns#Notice" /> | ||
44 | <cc:requires | ||
45 | rdf:resource="http://creativecommons.org/ns#Attribution" /> | ||
46 | <cc:permits | 45 | <cc:permits |
47 | rdf:resource="http://creativecommons.org/ns#DerivativeWorks" /> | 46 | rdf:resource="http://creativecommons.org/ns#DerivativeWorks" /> |
48 | <cc:requires | 47 | <cc:requires |
49 | rdf:resource="http://creativecommons.org/ns#ShareAlike" /> | 48 | rdf:resource="http://creativecommons.org/ns#ShareAlike" /> |
49 | <cc:requires | ||
50 | rdf:resource="http://creativecommons.org/ns#Notice" /> | ||
51 | <cc:requires | ||
52 | rdf:resource="http://creativecommons.org/ns#Attribution" /> | ||
50 | </cc:License> | 53 | </cc:License> |
51 | </rdf:RDF> | 54 | </rdf:RDF> |
52 | </metadata> | 55 | </metadata> |
@@ -66,7 +69,8 @@ | |||
66 | miter_limit="4" | 69 | miter_limit="4" |
67 | scale_width="1" | 70 | scale_width="1" |
68 | end_linecap_type="zerowidth" | 71 | end_linecap_type="zerowidth" |
69 | not_jump="false" /> | 72 | not_jump="false" |
73 | message="" /> | ||
70 | <marker | 74 | <marker |
71 | style="overflow:visible" | 75 | style="overflow:visible" |
72 | id="marker5783" | 76 | id="marker5783" |
@@ -404,15 +408,15 @@ | |||
404 | guidetolerance="10" | 408 | guidetolerance="10" |
405 | inkscape:pageopacity="0" | 409 | inkscape:pageopacity="0" |
406 | inkscape:pageshadow="2" | 410 | inkscape:pageshadow="2" |
407 | inkscape:window-width="1920" | 411 | inkscape:window-width="3826" |
408 | inkscape:window-height="1043" | 412 | inkscape:window-height="2069" |
409 | id="namedview4" | 413 | id="namedview4" |
410 | showgrid="true" | 414 | showgrid="true" |
411 | inkscape:zoom="1.4472045" | 415 | inkscape:zoom="1.5536106" |
412 | inkscape:cx="987.76641" | 416 | inkscape:cx="1158.2696" |
413 | inkscape:cy="357.93145" | 417 | inkscape:cy="273.55632" |
414 | inkscape:window-x="1728" | 418 | inkscape:window-x="2256" |
415 | inkscape:window-y="0" | 419 | inkscape:window-y="60" |
416 | inkscape:window-maximized="1" | 420 | inkscape:window-maximized="1" |
417 | inkscape:current-layer="g10" | 421 | inkscape:current-layer="g10" |
418 | inkscape:document-rotation="0" | 422 | inkscape:document-rotation="0" |
@@ -422,94 +426,109 @@ | |||
422 | fit-margin-left="30" | 426 | fit-margin-left="30" |
423 | fit-margin-right="30" | 427 | fit-margin-right="30" |
424 | fit-margin-bottom="30" | 428 | fit-margin-bottom="30" |
425 | inkscape:pagecheckerboard="0"> | 429 | inkscape:pagecheckerboard="0" |
430 | inkscape:showpageshadow="2" | ||
431 | inkscape:deskcolor="#d1d1d1" | ||
432 | showguides="true"> | ||
426 | <inkscape:grid | 433 | <inkscape:grid |
427 | type="xygrid" | 434 | type="xygrid" |
428 | id="grid1257" | 435 | id="grid1257" |
429 | originx="-289.99936" | 436 | originx="-289.06071" |
430 | originy="369.99998" /> | 437 | originy="478.43017" |
438 | spacingy="1" | ||
439 | spacingx="1" | ||
440 | units="px" | ||
441 | visible="true" /> | ||
431 | </sodipodi:namedview> | 442 | </sodipodi:namedview> |
432 | <g | 443 | <g |
433 | inkscape:groupmode="layer" | 444 | inkscape:groupmode="layer" |
434 | inkscape:label="Image" | 445 | inkscape:label="Image" |
435 | id="g10" | 446 | id="g10" |
436 | transform="translate(-289.99936,370.00003)"> | 447 | transform="translate(-289.06072,478.43022)"> |
437 | <path | 448 | <rect |
438 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 449 | style="fill:#333333;fill-opacity:0;stroke:#000000;stroke-width:0.713896;stroke-linejoin:bevel;stroke-miterlimit:0;stroke-opacity:0" |
439 | d="m 1080,220.00003 v -515.00007 0 0" | 450 | id="rect1" |
451 | width="1992.0098" | ||
452 | height="612.64215" | ||
453 | x="289.41766" | ||
454 | y="-478.07327" | ||
455 | ry="24.97636" /> | ||
456 | <path | ||
457 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
458 | d="m 563.40434,64.000628 v -524.414808 0 0" | ||
440 | id="path207708" /> | 459 | id="path207708" /> |
441 | <path | 460 | <path |
442 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 461 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
443 | d="m 1200,220.00003 v -515.00007 0 0" | 462 | d="m 683.40434,64.000628 v -524.414808 0 0" |
444 | id="path207708-4" /> | 463 | id="path207708-4" /> |
445 | <path | 464 | <path |
446 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 465 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
447 | d="m 1320,220.00003 v -515.00007 0 0" | 466 | d="m 803.40434,64.000628 v -524.414808 0 0" |
448 | id="path207708-4-3" /> | 467 | id="path207708-4-3" /> |
449 | <path | 468 | <path |
450 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 469 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
451 | d="m 1440,219.99998 v -515.00002 0 0" | 470 | d="m 923.40434,64.000577 v -524.414757 0 0" |
452 | id="path207708-4-3-6" /> | 471 | id="path207708-4-3-6" /> |
453 | <path | 472 | <path |
454 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 473 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
455 | d="m 1560,219.99998 v -515.00001 0 0" | 474 | d="m 1043.4043,64.000577 v -524.414757 0 0" |
456 | id="path207708-4-3-6-2" /> | 475 | id="path207708-4-3-6-2" /> |
457 | <path | 476 | <path |
458 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 477 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
459 | d="m 1680,219.99998 v -515.00002 0 0" | 478 | d="m 1163.4043,64.000577 v -524.414757 0 0" |
460 | id="path207708-4-3-6-2-8" /> | 479 | id="path207708-4-3-6-2-8" /> |
461 | <path | 480 | <path |
462 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 481 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
463 | d="m 1800,219.99998 v -515.00002 0 0" | 482 | d="m 1283.4043,64.000577 v -524.414757 0 0" |
464 | id="path207708-4-3-6-2-8-4" /> | 483 | id="path207708-4-3-6-2-8-4" /> |
465 | <path | 484 | <path |
466 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 485 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
467 | d="m 1920,219.99998 v -515.00002 0 0" | 486 | d="m 1403.4043,64.000577 v -524.414757 0 0" |
468 | id="path207708-4-3-6-2-8-4-3" /> | 487 | id="path207708-4-3-6-2-8-4-3" /> |
469 | <path | 488 | <path |
470 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 489 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.475347;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
471 | d="m 2040,219.99997 v -460.00002 0 0" | 490 | d="m 1523.4043,64.000568 v -415.757648 0 0" |
472 | id="path207708-4-3-6-2-8-4-3-8" /> | 491 | id="path207708-4-3-6-2-8-4-3-8" /> |
473 | <path | 492 | <path |
474 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 493 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
475 | d="m 2040,219.99998 v -515.00002 0 0" | 494 | d="m 1523.4043,64.000577 v -524.414757 0 0" |
476 | id="path207708-4-3-6-2-8-4-3-8-0" /> | 495 | id="path207708-4-3-6-2-8-4-3-8-0" /> |
477 | <path | 496 | <path |
478 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 497 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
479 | d="m 2159.954,219.99997 v -514.99999 0 0" | 498 | d="m 1643.3583,64.000565 v -524.414715 0 0" |
480 | id="path207708-4-3-6-2-8-4-3-8-4" /> | 499 | id="path207708-4-3-6-2-8-4-3-8-4" /> |
481 | <path | 500 | <path |
482 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 501 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
483 | d="m 2280,219.99997 v -514.99999 0 0" | 502 | d="m 1763.4043,64.000565 v -524.414715 0 0" |
484 | id="path207708-4-3-6-2-8-4-3-8-4-0" /> | 503 | id="path207708-4-3-6-2-8-4-3-8-4-0" /> |
485 | <path | 504 | <path |
486 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 505 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
487 | d="m 960,220.00003 v -515.00007 0 0" | 506 | d="m 1883.7877,64.878769 v -524.414709 0 0" |
488 | id="path207708-9" /> | 507 | id="path207708-4-3-6-2-8-4-3-8-4-0-8" /> |
489 | <path | 508 | <path |
490 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 509 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
491 | d="m 840,220.00001 v -375 0 0" | 510 | d="m 2002.9599,64.984489 v -524.414709 0 0" |
492 | id="path207708-9-6" /> | 511 | id="path207708-4-3-6-2-8-4-3-8-4-0-8-8" /> |
493 | <path | 512 | <path |
494 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 513 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
495 | d="m 840,220.00002 v -515.00004 0 0" | 514 | d="m 2123.2232,62.984489 v -524.414709 0 0" |
496 | id="path207708-9-6-2" /> | 515 | id="path207708-4-3-6-2-8-4-3-8-4-0-8-8-1" /> |
497 | <path | 516 | <path |
498 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 517 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
499 | d="m 720,220.00003 v -515.00007 0 0" | 518 | d="m 2243.313,63.984489 v -524.414709 0 0" |
500 | id="path207708-9-6-2-5" /> | 519 | id="path207708-4-3-6-2-8-4-3-8-4-0-8-8-1-9" /> |
501 | <path | 520 | <path |
502 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 521 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
503 | d="m 600,220.00003 v -515.00007 0 0" | 522 | d="m 443.40434,64.000628 v -524.414808 0 0" |
504 | id="path207708-9-6-2-5-9" /> | 523 | id="path207708-9" /> |
505 | <path | 524 | <path |
506 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 525 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
507 | d="m 480,220.00003 v -515.00007 0 0" | 526 | d="m 323.40434,64.000608 v -375.000008 0 0" |
508 | id="path207708-9-6-2-5-9-0" /> | 527 | id="path207708-9-6" /> |
509 | <path | 528 | <path |
510 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 529 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
511 | d="m 360,220.00003 v -515.00007 0 0" | 530 | d="m 323.40434,64.000616 v -524.414766 0 0" |
512 | id="path207708-9-6-2-5-9-0-5" /> | 531 | id="path207708-9-6-2" /> |
513 | <text | 532 | <text |
514 | xml:space="preserve" | 533 | xml:space="preserve" |
515 | style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 534 | style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
@@ -541,186 +560,152 @@ | |||
541 | x="-59.575905" | 560 | x="-59.575905" |
542 | y="580.05695" /></text> | 561 | y="580.05695" /></text> |
543 | <rect | 562 | <rect |
544 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 563 | style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
545 | id="rect917-0-0" | 564 | id="rect917-0-0-4-4-9-4" |
546 | width="980" | 565 | width="160.00002" |
547 | height="45.000004" | 566 | height="45.000004" |
548 | x="360" | 567 | x="443.40427" |
549 | y="154.99997" | 568 | y="-55.999405" |
550 | ry="2.2558987" /> | 569 | ry="2.2558987" /> |
551 | <text | 570 | <text |
552 | xml:space="preserve" | 571 | xml:space="preserve" |
553 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 572 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
554 | x="420.52835" | 573 | x="491.89841" |
555 | y="174.12433" | 574 | y="-36.604408" |
556 | id="text1185-3-55-4"><tspan | 575 | id="text1185-3-55-4-0-0-0"><tspan |
557 | sodipodi:role="line" | 576 | sodipodi:role="line" |
558 | x="420.52835" | 577 | x="491.89841" |
559 | y="174.12433" | 578 | y="-36.604408" |
560 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 579 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
561 | id="tspan957-2-8">Dunfell (LTS)</tspan><tspan | 580 | id="tspan957-2-8-6-3-9">Langdale</tspan><tspan |
562 | sodipodi:role="line" | 581 | sodipodi:role="line" |
563 | x="420.52835" | 582 | x="491.89841" |
564 | y="192.121" | 583 | y="-18.607729" |
565 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 584 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
566 | id="tspan10317">3.1</tspan></text> | 585 | id="tspan10317-2-9-1">4.1</tspan></text> |
567 | <rect | 586 | <rect |
568 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 587 | style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
569 | id="rect917-0-0-4" | 588 | id="rect917-0-0-4-4-9-4-5" |
570 | width="140.00002" | 589 | width="140.00003" |
571 | height="45.000004" | 590 | height="45.000004" |
572 | x="480" | 591 | x="583.40436" |
573 | y="99.999969" | 592 | y="-110.99944" |
574 | ry="2.2558987" /> | 593 | ry="2.2558987" /> |
575 | <text | 594 | <text |
576 | xml:space="preserve" | 595 | xml:space="preserve" |
577 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 596 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
578 | x="534.10651" | 597 | x="639.46136" |
579 | y="118.94971" | 598 | y="-91.498215" |
580 | id="text1185-3-55-4-0"><tspan | 599 | id="text1185-3-55-4-0-0-0-1"><tspan |
581 | sodipodi:role="line" | 600 | sodipodi:role="line" |
582 | x="534.10651" | 601 | x="639.46136" |
583 | y="118.94971" | 602 | y="-91.498215" |
584 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 603 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
585 | id="tspan957-2-8-6">Gatesgarth</tspan><tspan | 604 | id="tspan957-2-8-6-3-9-7">Mickledore</tspan><tspan |
586 | sodipodi:role="line" | 605 | sodipodi:role="line" |
587 | x="534.10651" | 606 | x="639.46136" |
588 | y="136.94638" | 607 | y="-73.501534" |
589 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 608 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
590 | id="tspan10317-2">3.2</tspan></text> | 609 | id="tspan10317-2-9-1-4">4.2</tspan></text> |
591 | <rect | ||
592 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | ||
593 | id="rect917-0-0-4-4" | ||
594 | width="260" | ||
595 | height="45.000004" | ||
596 | x="599.99994" | ||
597 | y="45.000011" | ||
598 | ry="2.2558987" /> | ||
599 | <rect | 610 | <rect |
600 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 611 | style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
601 | id="rect917-0-0-4-4-9" | 612 | id="rect917-0-0-4-4-9-4-5-3-9-2-3-6" |
602 | width="160.00002" | 613 | width="140" |
603 | height="45.000004" | 614 | height="45.000004" |
604 | x="720" | 615 | x="923.65302" |
605 | y="-9.9999905" | 616 | y="-275.19217" |
606 | ry="2.2558987" /> | 617 | ry="2.2558987" /> |
607 | <text | 618 | <text |
608 | xml:space="preserve" | 619 | xml:space="preserve" |
609 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 620 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
610 | x="766.10297" | 621 | x="970.63739" |
611 | y="9.57586" | 622 | y="-256.32867" |
612 | id="text1185-3-55-4-0-0"><tspan | 623 | id="text1185-3-55-4-0-0-0-1-1-6-4"><tspan |
613 | sodipodi:role="line" | 624 | sodipodi:role="line" |
614 | x="766.10297" | 625 | x="970.63739" |
615 | y="9.57586" | 626 | y="-256.32867" |
616 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 627 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
617 | id="tspan957-2-8-6-3">Honister</tspan><tspan | 628 | id="tspan957-2-8-6-3-9-7-4-2-0">Styhead</tspan><tspan |
618 | sodipodi:role="line" | 629 | sodipodi:role="line" |
619 | x="766.10297" | 630 | x="970.63739" |
620 | y="27.57254" | 631 | y="-238.332" |
621 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 632 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
622 | id="tspan10317-2-9">3.4</tspan></text> | 633 | id="tspan10317-2-9-1-4-6-5-6">5.1</tspan></text> |
623 | <rect | 634 | <rect |
624 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 635 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
625 | id="rect917-0-0-4-4-9-4" | 636 | id="rect917-0-0-4-4-9-4-5-3-9-2-3-6-2" |
626 | width="160.00002" | 637 | width="140" |
627 | height="45.000004" | 638 | height="45.000004" |
628 | x="959.99994" | 639 | x="1043.4697" |
629 | y="-120" | 640 | y="-328.48172" |
630 | ry="2.2558987" /> | 641 | ry="2.2558987" /> |
631 | <text | 642 | <text |
632 | xml:space="preserve" | 643 | xml:space="preserve" |
633 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 644 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
634 | x="1008.4941" | 645 | x="1090.4542" |
635 | y="-100.605" | 646 | y="-309.61823" |
636 | id="text1185-3-55-4-0-0-0"><tspan | 647 | id="text1185-3-55-4-0-0-0-1-1-6-4-7"><tspan |
637 | sodipodi:role="line" | 648 | sodipodi:role="line" |
638 | x="1008.4941" | 649 | x="1090.4542" |
639 | y="-100.605" | 650 | y="-309.61823" |
640 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 651 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
641 | id="tspan957-2-8-6-3-9">Langdale</tspan><tspan | 652 | id="tspan957-2-8-6-3-9-7-4-2-0-0">Walnascar</tspan><tspan |
642 | sodipodi:role="line" | 653 | sodipodi:role="line" |
643 | x="1008.4941" | 654 | x="1090.4542" |
644 | y="-82.608322" | 655 | y="-291.62155" |
645 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 656 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
646 | id="tspan10317-2-9-1">4.1</tspan></text> | 657 | id="tspan10317-2-9-1-4-6-5-6-9">5.2</tspan></text> |
647 | <rect | 658 | <rect |
648 | style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 659 | style="opacity:0.75;fill:#251f32;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
649 | id="rect917-0-0-4-4-9-4-5" | 660 | id="rect917-0-0-4-4-9-4-5-3-9-2-3-67" |
650 | width="140.00003" | 661 | width="140" |
651 | height="45.000004" | 662 | height="45.000004" |
652 | x="1100" | 663 | x="1163.6425" |
653 | y="-175.00003" | 664 | y="-382.27469" |
654 | ry="2.2558987" /> | 665 | ry="2.2558987" /> |
655 | <text | 666 | <text |
656 | xml:space="preserve" | 667 | xml:space="preserve" |
657 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 668 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
658 | x="1156.057" | 669 | x="1214.9716" |
659 | y="-155.49881" | 670 | y="-363.89413" |
660 | id="text1185-3-55-4-0-0-0-1"><tspan | 671 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-53"><tspan |
661 | sodipodi:role="line" | 672 | sodipodi:role="line" |
662 | x="1156.057" | 673 | x="1214.9716" |
663 | y="-155.49881" | 674 | y="-363.89413" |
664 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 675 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
665 | id="tspan957-2-8-6-3-9-7">Mickledore</tspan><tspan | 676 | id="tspan957-2-8-6-3-9-7-4-2-0-5-5">Whinlatter</tspan><tspan |
666 | sodipodi:role="line" | 677 | sodipodi:role="line" |
667 | x="1156.057" | 678 | x="1214.9716" |
668 | y="-137.50214" | 679 | y="-345.89746" |
669 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 680 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
670 | id="tspan10317-2-9-1-4">4.2</tspan></text> | 681 | id="tspan10317-2-9-1-4-6-5-6-6-6">5.3</tspan></text> |
671 | <g | ||
672 | id="g1258"> | ||
673 | <rect | ||
674 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | ||
675 | id="rect917-0-0-4-4-9-4-5-38" | ||
676 | width="120.00002" | ||
677 | height="45.000004" | ||
678 | x="1220" | ||
679 | y="-230.00005" | ||
680 | ry="2.2558987" /> | ||
681 | <text | ||
682 | xml:space="preserve" | ||
683 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
684 | x="1269.2329" | ||
685 | y="-210.32925" | ||
686 | id="text1185-3-55-4-0-0-0-1-1"><tspan | ||
687 | sodipodi:role="line" | ||
688 | x="1269.2329" | ||
689 | y="-210.32925" | ||
690 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
691 | id="tspan957-2-8-6-3-9-7-4">Nanbield</tspan><tspan | ||
692 | sodipodi:role="line" | ||
693 | x="1269.2329" | ||
694 | y="-192.33258" | ||
695 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
696 | id="tspan10317-2-9-1-4-6">4.3</tspan></text> | ||
697 | </g> | ||
698 | <rect | 682 | <rect |
699 | style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 683 | style="opacity:0.75;fill:#251f32;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:5.29752;stroke-opacity:1" |
700 | id="rect917-0-0-4-4-9-4-5-3-9-2" | 684 | id="rect917-0-0-4-4-9-4-5-3-9-2-3-67-6" |
701 | width="140" | 685 | width="982.23163" |
702 | height="45.000004" | 686 | height="45.000004" |
703 | x="1440" | 687 | x="1283.7023" |
704 | y="-340.00003" | 688 | y="-436.77539" |
705 | ry="2.2558987" /> | 689 | ry="2.2558987" /> |
706 | <text | 690 | <text |
707 | xml:space="preserve" | 691 | xml:space="preserve" |
708 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 692 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
709 | x="1487.233" | 693 | x="1335.1118" |
710 | y="-320.32928" | 694 | y="-418.39484" |
711 | id="text1185-3-55-4-0-0-0-1-1-6-4"><tspan | 695 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-53-0"><tspan |
712 | sodipodi:role="line" | 696 | sodipodi:role="line" |
713 | x="1487.233" | 697 | x="1335.1118" |
714 | y="-320.32928" | 698 | y="-418.39484" |
715 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 699 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
716 | id="tspan957-2-8-6-3-9-7-4-2-0">Styhead</tspan><tspan | 700 | id="tspan957-2-8-6-3-9-7-4-2-0-5-5-6">Wrynose</tspan><tspan |
717 | sodipodi:role="line" | 701 | sodipodi:role="line" |
718 | x="1487.233" | 702 | x="1335.1118" |
719 | y="-302.33261" | 703 | y="-400.39816" |
720 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 704 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
721 | id="tspan10317-2-9-1-4-6-5-6">5.1</tspan></text> | 705 | id="tspan10317-2-9-1-4-6-5-6-6-6-2">6.0</tspan></text> |
722 | <g | 706 | <g |
723 | id="g1591"> | 707 | id="g1591" |
708 | transform="translate(-516.59566,64.000598)"> | ||
724 | <rect | 709 | <rect |
725 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 710 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
726 | id="rect917-0-0-4-4-9-9" | 711 | id="rect917-0-0-4-4-9-9" |
@@ -749,42 +734,26 @@ | |||
749 | <path | 734 | <path |
750 | id="rect917-0-0-4-4-9-9-9" | 735 | id="rect917-0-0-4-4-9-9-9" |
751 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" | 736 | style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" |
752 | d="m 1322.3015,-285.00003 c -1.2753,0 -2.302,1.00609 -2.302,2.25586 v 40.48828 c 0,1.24977 1.0267,2.25586 2.302,2.25586 h 975.0412 c 1.2754,0 2.302,-1.00609 2.302,-2.25586 v -40.48828 c 0,-1.24977 -1.0266,-2.25586 -2.302,-2.25586 z" /> | 737 | d="m 805.70584,-220.99944 c -1.2753,0 -2.302,1.00609 -2.302,2.25586 v 40.48828 c 0,1.24977 1.0267,2.25586 2.302,2.25586 H 1780.747 c 1.2754,0 2.302,-1.00609 2.302,-2.25586 v -40.48828 c 0,-1.24977 -1.0266,-2.25586 -2.302,-2.25586 z" /> |
753 | <text | 738 | <text |
754 | xml:space="preserve" | 739 | xml:space="preserve" |
755 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 740 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
756 | x="1390.4988" | 741 | x="873.90314" |
757 | y="-265.64832" | 742 | y="-201.64772" |
758 | id="text1185-3-55-4-0-0-9-0"><tspan | 743 | id="text1185-3-55-4-0-0-9-0"><tspan |
759 | sodipodi:role="line" | 744 | sodipodi:role="line" |
760 | x="1390.4988" | 745 | x="873.90314" |
761 | y="-265.64832" | 746 | y="-201.64772" |
762 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 747 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
763 | id="tspan957-2-8-6-3-6-8">Scarthgap (LTS)</tspan><tspan | 748 | id="tspan957-2-8-6-3-6-8">Scarthgap (LTS)</tspan><tspan |
764 | sodipodi:role="line" | 749 | sodipodi:role="line" |
765 | x="1390.4988" | 750 | x="873.90314" |
766 | y="-247.65164" | 751 | y="-183.65105" |
767 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | 752 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" |
768 | id="tspan10317-2-9-0-1">5.0</tspan></text> | 753 | id="tspan10317-2-9-0-1">5.0</tspan></text> |
769 | <text | ||
770 | xml:space="preserve" | ||
771 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
772 | x="653.72168" | ||
773 | y="64.866302" | ||
774 | id="text1185-3-55-4-0-0-7"><tspan | ||
775 | sodipodi:role="line" | ||
776 | x="653.72168" | ||
777 | y="64.866302" | ||
778 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
779 | id="tspan957-2-8-6-3-2">Hardknott </tspan><tspan | ||
780 | sodipodi:role="line" | ||
781 | x="653.72168" | ||
782 | y="82.862984" | ||
783 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
784 | id="tspan10317-2-9-8">3.3</tspan></text> | ||
785 | <g | 754 | <g |
786 | id="g1125-0" | 755 | id="g1125-0" |
787 | transform="matrix(0.42240595,0,0,0.41654472,354.53445,-399.96314)" | 756 | transform="matrix(0.42240595,0,0,0.41654472,330.77064,-497.11721)" |
788 | style="stroke:none;stroke-width:2.38399"> | 757 | style="stroke:none;stroke-width:2.38399"> |
789 | <rect | 758 | <rect |
790 | style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:4.76797;stroke-opacity:1" | 759 | style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:4.76797;stroke-opacity:1" |
@@ -873,234 +842,149 @@ | |||
873 | <text | 842 | <text |
874 | xml:space="preserve" | 843 | xml:space="preserve" |
875 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 844 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
876 | x="1199.6055" | 845 | x="683.00983" |
877 | y="250.21216" | 846 | y="94.212761" |
878 | id="text1185-9-7-1-1"><tspan | 847 | id="text1185-9-7-1-1"><tspan |
879 | sodipodi:role="line" | 848 | sodipodi:role="line" |
880 | x="1199.6055" | 849 | x="683.00983" |
881 | y="250.21216" | 850 | y="94.212761" |
882 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 851 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
883 | id="tspan31345">Oct.</tspan><tspan | 852 | id="tspan31345">Oct.</tspan><tspan |
884 | sodipodi:role="line" | 853 | sodipodi:role="line" |
885 | x="1199.6055" | 854 | x="683.00983" |
886 | y="268.20883" | 855 | y="112.20944" |
887 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 856 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
888 | id="tspan49906">2023</tspan></text> | 857 | id="tspan49906">2023</tspan></text> |
889 | <text | 858 | <text |
890 | xml:space="preserve" | 859 | xml:space="preserve" |
891 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 860 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
892 | x="1439.3904" | 861 | x="922.79474" |
893 | y="249.86044" | 862 | y="93.861046" |
894 | id="text1185-9-7-1-1-89"><tspan | 863 | id="text1185-9-7-1-1-89"><tspan |
895 | sodipodi:role="line" | 864 | sodipodi:role="line" |
896 | x="1439.3904" | 865 | x="922.79474" |
897 | y="249.86044" | 866 | y="93.861046" |
898 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 867 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
899 | id="tspan31345-7">Oct.</tspan><tspan | 868 | id="tspan31345-7">Oct.</tspan><tspan |
900 | sodipodi:role="line" | 869 | sodipodi:role="line" |
901 | x="1439.3904" | 870 | x="922.79474" |
902 | y="267.85712" | 871 | y="111.85773" |
903 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 872 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
904 | id="tspan49906-76">2024</tspan></text> | 873 | id="tspan49906-76">2024</tspan></text> |
905 | <text | 874 | <text |
906 | xml:space="preserve" | 875 | xml:space="preserve" |
907 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 876 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
908 | x="1679.3094" | 877 | x="1162.7139" |
909 | y="250.58356" | 878 | y="94.58416" |
910 | id="text1185-9-7-1-1-89-6"><tspan | 879 | id="text1185-9-7-1-1-89-6"><tspan |
911 | sodipodi:role="line" | 880 | sodipodi:role="line" |
912 | x="1679.3094" | 881 | x="1162.7139" |
913 | y="250.58356" | 882 | y="94.58416" |
914 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 883 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
915 | id="tspan31345-7-8">Oct.</tspan><tspan | 884 | id="tspan31345-7-8">Oct.</tspan><tspan |
916 | sodipodi:role="line" | 885 | sodipodi:role="line" |
917 | x="1679.3094" | 886 | x="1162.7139" |
918 | y="268.58023" | 887 | y="112.58084" |
919 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 888 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
920 | id="tspan49906-76-0">2025</tspan></text> | 889 | id="tspan49906-76-0">2025</tspan></text> |
921 | <text | 890 | <text |
922 | xml:space="preserve" | 891 | xml:space="preserve" |
923 | style="font-weight:bold;font-size:6.66667px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
924 | x="849.49744" | ||
925 | y="61.106953" | ||
926 | id="text1185-9-7-1-1-0"><tspan | ||
927 | sodipodi:role="line" | ||
928 | x="849.49744" | ||
929 | y="61.106953" | ||
930 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none" | ||
931 | id="tspan46212">Support for this version was extended to leave</tspan><tspan | ||
932 | sodipodi:role="line" | ||
933 | x="849.49744" | ||
934 | y="70.105324" | ||
935 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none" | ||
936 | id="tspan120364">users more time to adapt to override syntax</tspan><tspan | ||
937 | sodipodi:role="line" | ||
938 | x="849.49744" | ||
939 | y="79.103691" | ||
940 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none" | ||
941 | id="tspan123280">changes in the 3.4 release.</tspan></text> | ||
942 | <text | ||
943 | xml:space="preserve" | ||
944 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 892 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
945 | x="959.52008" | 893 | x="442.92441" |
946 | y="250.67822" | 894 | y="94.678825" |
947 | id="text1185-9-7-1-1-0-7"><tspan | 895 | id="text1185-9-7-1-1-0-7"><tspan |
948 | sodipodi:role="line" | 896 | sodipodi:role="line" |
949 | x="959.52008" | 897 | x="442.92441" |
950 | y="250.67822" | 898 | y="94.678825" |
951 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 899 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
952 | id="tspan31345-42-7">Oct.</tspan><tspan | 900 | id="tspan31345-42-7">Oct.</tspan><tspan |
953 | sodipodi:role="line" | 901 | sodipodi:role="line" |
954 | x="959.52008" | 902 | x="442.92441" |
955 | y="268.6749" | 903 | y="112.67551" |
956 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 904 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
957 | id="tspan49906-9-6">2022</tspan></text> | 905 | id="tspan49906-9-6">2022</tspan></text> |
958 | <text | 906 | <text |
959 | xml:space="preserve" | 907 | xml:space="preserve" |
960 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 908 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
961 | x="719.13617" | 909 | x="324.32913" |
962 | y="250.21216" | 910 | y="94.076042" |
963 | id="text1185-9-7-1-1-2"><tspan | ||
964 | sodipodi:role="line" | ||
965 | x="719.13617" | ||
966 | y="250.21216" | ||
967 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
968 | id="tspan31345-1">Oct.</tspan><tspan | ||
969 | sodipodi:role="line" | ||
970 | x="719.13617" | ||
971 | y="268.20883" | ||
972 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
973 | id="tspan49906-5">2021</tspan></text> | ||
974 | <text | ||
975 | xml:space="preserve" | ||
976 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
977 | x="478.82367" | ||
978 | y="250.21216" | ||
979 | id="text1185-9-7-1-1-80"><tspan | ||
980 | sodipodi:role="line" | ||
981 | x="478.82367" | ||
982 | y="250.21216" | ||
983 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
984 | id="tspan31345-5">Oct.</tspan><tspan | ||
985 | sodipodi:role="line" | ||
986 | x="478.82367" | ||
987 | y="268.20883" | ||
988 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
989 | id="tspan49906-6">2020</tspan></text> | ||
990 | <text | ||
991 | xml:space="preserve" | ||
992 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
993 | x="361.81961" | ||
994 | y="250.07544" | ||
995 | id="text1185-9-7-1-1-8"><tspan | ||
996 | sodipodi:role="line" | ||
997 | x="361.81961" | ||
998 | y="250.07544" | ||
999 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1000 | id="tspan31345-4">Apr.</tspan><tspan | ||
1001 | sodipodi:role="line" | ||
1002 | x="361.81961" | ||
1003 | y="268.07211" | ||
1004 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1005 | id="tspan49906-7">2020</tspan></text> | ||
1006 | <text | ||
1007 | xml:space="preserve" | ||
1008 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1009 | x="840.9248" | ||
1010 | y="250.07544" | ||
1011 | id="text1185-9-7-1-1-8-1"><tspan | 911 | id="text1185-9-7-1-1-8-1"><tspan |
1012 | sodipodi:role="line" | 912 | sodipodi:role="line" |
1013 | x="840.9248" | 913 | x="324.32913" |
1014 | y="250.07544" | 914 | y="94.076042" |
1015 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 915 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1016 | id="tspan31345-4-0">Apr</tspan><tspan | 916 | id="tspan31345-4-0">Apr</tspan><tspan |
1017 | sodipodi:role="line" | 917 | sodipodi:role="line" |
1018 | x="840.9248" | 918 | x="324.32913" |
1019 | y="268.07211" | 919 | y="112.07272" |
1020 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 920 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1021 | id="tspan49906-7-3">2022</tspan></text> | 921 | id="tspan49906-7-3">2022</tspan></text> |
1022 | <text | 922 | <text |
1023 | xml:space="preserve" | 923 | xml:space="preserve" |
1024 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 924 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1025 | x="1321.8608" | 925 | x="805.2652" |
1026 | y="250.07544" | 926 | y="94.076042" |
1027 | id="text1185-9-7-1-1-8-1-0"><tspan | 927 | id="text1185-9-7-1-1-8-1-0"><tspan |
1028 | sodipodi:role="line" | 928 | sodipodi:role="line" |
1029 | x="1321.8608" | 929 | x="805.2652" |
1030 | y="250.07544" | 930 | y="94.076042" |
1031 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 931 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1032 | id="tspan31345-4-0-4">Apr.</tspan><tspan | 932 | id="tspan31345-4-0-4">Apr.</tspan><tspan |
1033 | sodipodi:role="line" | 933 | sodipodi:role="line" |
1034 | x="1321.8608" | 934 | x="805.2652" |
1035 | y="268.07211" | 935 | y="112.07272" |
1036 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 936 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1037 | id="tspan49906-7-3-8">2024</tspan></text> | 937 | id="tspan49906-7-3-8">2024</tspan></text> |
1038 | <text | 938 | <text |
1039 | xml:space="preserve" | 939 | xml:space="preserve" |
1040 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 940 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1041 | x="1561.8163" | 941 | x="1045.2207" |
1042 | y="249.66977" | 942 | y="93.670372" |
1043 | id="text1185-9-7-1-1-8-1-0-4"><tspan | 943 | id="text1185-9-7-1-1-8-1-0-4"><tspan |
1044 | sodipodi:role="line" | 944 | sodipodi:role="line" |
1045 | x="1561.8163" | 945 | x="1045.2207" |
1046 | y="249.66977" | 946 | y="93.670372" |
1047 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 947 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1048 | id="tspan31345-4-0-4-81">Apr.</tspan><tspan | 948 | id="tspan31345-4-0-4-81">Apr.</tspan><tspan |
1049 | sodipodi:role="line" | 949 | sodipodi:role="line" |
1050 | x="1561.8163" | 950 | x="1045.2207" |
1051 | y="267.66644" | 951 | y="111.66705" |
1052 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 952 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1053 | id="tspan49906-7-3-8-2">2025</tspan></text> | 953 | id="tspan49906-7-3-8-2">2025</tspan></text> |
1054 | <text | 954 | <text |
1055 | xml:space="preserve" | 955 | xml:space="preserve" |
1056 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 956 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1057 | x="1802.1477" | 957 | x="1285.5521" |
1058 | y="250.26334" | 958 | y="94.263939" |
1059 | id="text1185-9-7-1-1-8-1-0-4-2"><tspan | 959 | id="text1185-9-7-1-1-8-1-0-4-2"><tspan |
1060 | sodipodi:role="line" | 960 | sodipodi:role="line" |
1061 | x="1802.1477" | 961 | x="1285.5521" |
1062 | y="250.26334" | 962 | y="94.263939" |
1063 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 963 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1064 | id="tspan31345-4-0-4-81-5">Apr.</tspan><tspan | 964 | id="tspan31345-4-0-4-81-5">Apr.</tspan><tspan |
1065 | sodipodi:role="line" | 965 | sodipodi:role="line" |
1066 | x="1802.1477" | 966 | x="1285.5521" |
1067 | y="268.26001" | 967 | y="112.26062" |
1068 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 968 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1069 | id="tspan49906-7-3-8-2-8">2026</tspan></text> | 969 | id="tspan49906-7-3-8-2-8">2026</tspan></text> |
1070 | <text | 970 | <text |
1071 | xml:space="preserve" | 971 | xml:space="preserve" |
1072 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 972 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1073 | x="1081.4458" | 973 | x="564.85016" |
1074 | y="250.07544" | 974 | y="94.076042" |
1075 | id="text1185-9-7-1-1-8-1-0-2"><tspan | 975 | id="text1185-9-7-1-1-8-1-0-2"><tspan |
1076 | sodipodi:role="line" | 976 | sodipodi:role="line" |
1077 | x="1081.4458" | 977 | x="564.85016" |
1078 | y="250.07544" | 978 | y="94.076042" |
1079 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 979 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1080 | id="tspan31345-4-0-4-8">Apr.</tspan><tspan | 980 | id="tspan31345-4-0-4-8">Apr.</tspan><tspan |
1081 | sodipodi:role="line" | 981 | sodipodi:role="line" |
1082 | x="1081.4458" | 982 | x="564.85016" |
1083 | y="268.07211" | 983 | y="112.07272" |
1084 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 984 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1085 | id="tspan49906-7-3-8-3">2023</tspan></text> | 985 | id="tspan49906-7-3-8-3">2023</tspan></text> |
1086 | <text | 986 | <text |
1087 | xml:space="preserve" | 987 | xml:space="preserve" |
1088 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1089 | x="602.51526" | ||
1090 | y="250.07544" | ||
1091 | id="text1185-9-7-1-1-8-1-7"><tspan | ||
1092 | sodipodi:role="line" | ||
1093 | x="602.51526" | ||
1094 | y="250.07544" | ||
1095 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1096 | id="tspan31345-4-0-5">Apr.</tspan><tspan | ||
1097 | sodipodi:role="line" | ||
1098 | x="602.51526" | ||
1099 | y="268.07211" | ||
1100 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1101 | id="tspan49906-7-3-6">2021</tspan></text> | ||
1102 | <text | ||
1103 | xml:space="preserve" | ||
1104 | style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 988 | style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1105 | x="-16.290483" | 989 | x="-16.290483" |
1106 | y="345.7359" | 990 | y="345.7359" |
@@ -1111,252 +995,117 @@ | |||
1111 | y="345.7359" /></text> | 995 | y="345.7359" /></text> |
1112 | <path | 996 | <path |
1113 | id="path29430" | 997 | id="path29430" |
1114 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 998 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1.99503;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1115 | d="M 319.99936,219.99912 H 2300 Z" /> | 999 | d="M 307.54809,63.999718 H 2277.72 Z" /> |
1116 | <path | ||
1117 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1118 | d="m 360,219.99997 v 10.00004 0" | ||
1119 | id="path29548" /> | ||
1120 | <path | ||
1121 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1122 | d="m 480,219.99996 v 10 0" | ||
1123 | id="path29548-5" /> | ||
1124 | <path | 1000 | <path |
1125 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1001 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1126 | d="m 600,219.99992 v 10.00005 0" | 1002 | d="m 323.40434,64.000618 v 9.99995 0" |
1127 | id="path29548-5-1" /> | ||
1128 | <path | ||
1129 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1130 | d="m 720,220.00002 v 9.99999 0" | ||
1131 | id="path29548-5-1-3" /> | ||
1132 | <path | ||
1133 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1134 | d="m 840,220.00002 v 9.99995 0" | ||
1135 | id="path29548-5-1-3-6" /> | 1003 | id="path29548-5-1-3-6" /> |
1136 | <path | 1004 | <path |
1137 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1005 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1138 | d="m 960,220.00002 v 9.99999 0" | 1006 | d="m 443.40434,64.000618 v 9.99999 0" |
1139 | id="path29548-5-1-3-6-3" /> | 1007 | id="path29548-5-1-3-6-3" /> |
1140 | <path | 1008 | <path |
1141 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1009 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1142 | d="m 1080,220.00002 v 9.99999 0" | 1010 | d="m 563.40434,64.000618 v 9.99999 0" |
1143 | id="path29548-5-1-3-6-3-1" /> | 1011 | id="path29548-5-1-3-6-3-1" /> |
1144 | <path | 1012 | <path |
1145 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1013 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1146 | d="m 380,219.99997 v 5.00004 0" | 1014 | d="m 343.40434,64.000568 v 5.00004 0" |
1147 | id="path29548-8" | ||
1148 | inkscape:transform-center-x="14.782001" | ||
1149 | inkscape:transform-center-y="-0.085282837" /> | ||
1150 | <path | ||
1151 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1152 | d="m 400,219.99997 v 5.00004 0" | ||
1153 | id="path29548-8-5" | ||
1154 | inkscape:transform-center-x="14.782001" | ||
1155 | inkscape:transform-center-y="-0.085282837" /> | ||
1156 | <path | ||
1157 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1158 | d="m 420,219.99997 v 5 0" | ||
1159 | id="path29548-8-5-0" | ||
1160 | inkscape:transform-center-x="14.782001" | ||
1161 | inkscape:transform-center-y="-0.085282155" /> | ||
1162 | <path | ||
1163 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1164 | d="m 440,219.99997 v 5 0" | ||
1165 | id="path29548-8-5-0-6" | ||
1166 | inkscape:transform-center-x="14.782001" | ||
1167 | inkscape:transform-center-y="-0.085282155" /> | ||
1168 | <path | ||
1169 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1170 | d="m 460,219.99997 v 5.00004 0" | ||
1171 | id="path29548-8-5-0-6-4-6" | ||
1172 | inkscape:transform-center-x="14.782001" | ||
1173 | inkscape:transform-center-y="-0.085282837" /> | ||
1174 | <path | ||
1175 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1176 | d="m 500,219.99997 v 5.00004 0" | ||
1177 | id="path29548-8-5-0-6-4-6-2" | ||
1178 | inkscape:transform-center-x="14.782001" | ||
1179 | inkscape:transform-center-y="-0.085282837" /> | ||
1180 | <path | ||
1181 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1182 | d="m 520,219.99997 v 5 0" | ||
1183 | id="path29548-8-5-0-6-4-6-2-9" | ||
1184 | inkscape:transform-center-x="14.782001" | ||
1185 | inkscape:transform-center-y="-0.085282155" /> | ||
1186 | <path | ||
1187 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1188 | d="m 540,219.99997 v 5.00004 0" | ||
1189 | id="path29548-8-5-0-6-4-6-2-9-0" | ||
1190 | inkscape:transform-center-x="14.782001" | ||
1191 | inkscape:transform-center-y="-0.085282837" /> | ||
1192 | <path | ||
1193 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1194 | d="m 560,219.99997 v 5.00004 0" | ||
1195 | id="path29548-8-5-0-6-4-6-2-9-0-8" | ||
1196 | inkscape:transform-center-x="14.782001" | ||
1197 | inkscape:transform-center-y="-0.085282837" /> | ||
1198 | <path | ||
1199 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1200 | d="m 580,219.99997 v 5.00004 0" | ||
1201 | id="path29548-8-5-0-6-4-6-2-9-0-8-1" | ||
1202 | inkscape:transform-center-x="14.782001" | ||
1203 | inkscape:transform-center-y="-0.085282837" /> | ||
1204 | <path | ||
1205 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1206 | d="m 620.266,219.99997 v 5.00004 0" | ||
1207 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3" | ||
1208 | inkscape:transform-center-x="14.782001" | ||
1209 | inkscape:transform-center-y="-0.085282837" /> | ||
1210 | <path | ||
1211 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1212 | d="m 640,219.99997 v 5.00004 0" | ||
1213 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1" | ||
1214 | inkscape:transform-center-x="14.782001" | ||
1215 | inkscape:transform-center-y="-0.085282837" /> | ||
1216 | <path | ||
1217 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1218 | d="m 660,219.99997 v 5.00004 0" | ||
1219 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9" | ||
1220 | inkscape:transform-center-x="14.782001" | ||
1221 | inkscape:transform-center-y="-0.085282837" /> | ||
1222 | <path | ||
1223 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1224 | d="m 679.61073,219.99997 v 5.00004 0" | ||
1225 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6" | ||
1226 | inkscape:transform-center-x="14.782001" | ||
1227 | inkscape:transform-center-y="-0.085282837" /> | ||
1228 | <path | ||
1229 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1230 | d="m 700,219.99997 v 5.00004 0" | ||
1231 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9" | ||
1232 | inkscape:transform-center-x="14.782001" | ||
1233 | inkscape:transform-center-y="-0.085282837" /> | ||
1234 | <path | ||
1235 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1236 | d="m 740,219.99997 v 5.00004 0" | ||
1237 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3" | ||
1238 | inkscape:transform-center-x="14.782001" | ||
1239 | inkscape:transform-center-y="-0.085282837" /> | ||
1240 | <path | ||
1241 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1242 | d="m 760,219.99997 v 5.00004 0" | ||
1243 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4" | ||
1244 | inkscape:transform-center-x="14.782001" | ||
1245 | inkscape:transform-center-y="-0.085282837" /> | ||
1246 | <path | ||
1247 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1248 | d="m 780.36587,219.99997 v 5.00004 0" | ||
1249 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0" | ||
1250 | inkscape:transform-center-x="14.782001" | ||
1251 | inkscape:transform-center-y="-0.085282837" /> | ||
1252 | <path | ||
1253 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1254 | d="m 800,219.99997 v 5.00004 0" | ||
1255 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4" | ||
1256 | inkscape:transform-center-x="14.782001" | ||
1257 | inkscape:transform-center-y="-0.085282837" /> | ||
1258 | <path | ||
1259 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1260 | d="m 820,219.99997 v 5.00004 0" | ||
1261 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6" | ||
1262 | inkscape:transform-center-x="14.782001" | ||
1263 | inkscape:transform-center-y="-0.085282837" /> | ||
1264 | <path | ||
1265 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1266 | d="m 860,219.99997 v 5.00004 0" | ||
1267 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2" | 1015 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2" |
1268 | inkscape:transform-center-x="14.782001" | 1016 | inkscape:transform-center-x="14.782001" |
1269 | inkscape:transform-center-y="-0.085282837" /> | 1017 | inkscape:transform-center-y="-0.085282837" /> |
1270 | <path | 1018 | <path |
1271 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1019 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1272 | d="m 880,219.99997 v 5.00004 0" | 1020 | d="m 363.40434,64.000568 v 5.00004 0" |
1273 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2" | 1021 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2" |
1274 | inkscape:transform-center-x="14.782001" | 1022 | inkscape:transform-center-x="14.782001" |
1275 | inkscape:transform-center-y="-0.085282837" /> | 1023 | inkscape:transform-center-y="-0.085282837" /> |
1276 | <path | 1024 | <path |
1277 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1025 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1278 | d="m 899.72384,219.99997 v 5.00004 0" | 1026 | d="m 383.12818,64.000568 v 5.00004 0" |
1279 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7" | 1027 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7" |
1280 | inkscape:transform-center-x="14.782001" | 1028 | inkscape:transform-center-x="14.782001" |
1281 | inkscape:transform-center-y="-0.085282837" /> | 1029 | inkscape:transform-center-y="-0.085282837" /> |
1282 | <path | 1030 | <path |
1283 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1031 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1284 | d="m 920,219.99997 v 5.00004 0" | 1032 | d="m 403.40434,64.000568 v 5.00004 0" |
1285 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6" | 1033 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6" |
1286 | inkscape:transform-center-x="14.782001" | 1034 | inkscape:transform-center-x="14.782001" |
1287 | inkscape:transform-center-y="-0.085282837" /> | 1035 | inkscape:transform-center-y="-0.085282837" /> |
1288 | <path | 1036 | <path |
1289 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1037 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1290 | d="m 940,219.99997 v 5.00004 0" | 1038 | d="m 423.40434,64.000568 v 5.00004 0" |
1291 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1" | 1039 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1" |
1292 | inkscape:transform-center-x="14.782001" | 1040 | inkscape:transform-center-x="14.782001" |
1293 | inkscape:transform-center-y="-0.085282837" /> | 1041 | inkscape:transform-center-y="-0.085282837" /> |
1294 | <path | 1042 | <path |
1295 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1043 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1296 | d="m 980,219.99997 v 5.00004 0" | 1044 | d="m 463.40434,64.000568 v 5.00004 0" |
1297 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9" | 1045 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9" |
1298 | inkscape:transform-center-x="14.782001" | 1046 | inkscape:transform-center-x="14.782001" |
1299 | inkscape:transform-center-y="-0.085282837" /> | 1047 | inkscape:transform-center-y="-0.085282837" /> |
1300 | <path | 1048 | <path |
1301 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1049 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1302 | d="m 1000,219.99997 v 5.00004 0" | 1050 | d="m 483.40434,64.000568 v 5.00004 0" |
1303 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9" | 1051 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9" |
1304 | inkscape:transform-center-x="14.782001" | 1052 | inkscape:transform-center-x="14.782001" |
1305 | inkscape:transform-center-y="-0.085282837" /> | 1053 | inkscape:transform-center-y="-0.085282837" /> |
1306 | <path | 1054 | <path |
1307 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1055 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1308 | d="m 1020,219.99997 v 5.00004 0" | 1056 | d="m 503.40434,64.000568 v 5.00004 0" |
1309 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1" | 1057 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1" |
1310 | inkscape:transform-center-x="14.782001" | 1058 | inkscape:transform-center-x="14.782001" |
1311 | inkscape:transform-center-y="-0.085282837" /> | 1059 | inkscape:transform-center-y="-0.085282837" /> |
1312 | <path | 1060 | <path |
1313 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1061 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1314 | d="m 1040,219.99997 v 5.00004 0" | 1062 | d="m 523.40434,64.000568 v 5.00004 0" |
1315 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4" | 1063 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4" |
1316 | inkscape:transform-center-x="14.782001" | 1064 | inkscape:transform-center-x="14.782001" |
1317 | inkscape:transform-center-y="-0.085282837" /> | 1065 | inkscape:transform-center-y="-0.085282837" /> |
1318 | <path | 1066 | <path |
1319 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1067 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1320 | d="m 1059.7216,219.99997 v 5.00004 0" | 1068 | d="m 543.12594,64.000568 v 5.00004 0" |
1321 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9" | 1069 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9" |
1322 | inkscape:transform-center-x="-14.78205" | 1070 | inkscape:transform-center-x="-14.78205" |
1323 | inkscape:transform-center-y="-0.085282837" /> | 1071 | inkscape:transform-center-y="-0.085282837" /> |
1324 | <path | 1072 | <path |
1325 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1073 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1326 | d="m 1100,219.99997 v 5.00004 0" | 1074 | d="m 583.40434,64.000568 v 5.00004 0" |
1327 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0" | 1075 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0" |
1328 | inkscape:transform-center-x="14.782001" | 1076 | inkscape:transform-center-x="14.782001" |
1329 | inkscape:transform-center-y="-0.085282837" /> | 1077 | inkscape:transform-center-y="-0.085282837" /> |
1330 | <path | 1078 | <path |
1331 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1079 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1332 | d="m 1120,219.99997 v 5.00004 0" | 1080 | d="m 603.40434,64.000568 v 5.00004 0" |
1333 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7" | 1081 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7" |
1334 | inkscape:transform-center-x="14.782001" | 1082 | inkscape:transform-center-x="14.782001" |
1335 | inkscape:transform-center-y="-0.085282837" /> | 1083 | inkscape:transform-center-y="-0.085282837" /> |
1336 | <path | 1084 | <path |
1337 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1085 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1338 | d="m 1140,219.99997 v 5.00004 0" | 1086 | d="m 623.40434,64.000568 v 5.00004 0" |
1339 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5" | 1087 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5" |
1340 | inkscape:transform-center-x="14.782001" | 1088 | inkscape:transform-center-x="14.782001" |
1341 | inkscape:transform-center-y="-0.085282837" /> | 1089 | inkscape:transform-center-y="-0.085282837" /> |
1342 | <path | 1090 | <path |
1343 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1091 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1344 | d="m 1160,219.99997 v 5.00004 0" | 1092 | d="m 643.40434,64.000568 v 5.00004 0" |
1345 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8" | 1093 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8" |
1346 | inkscape:transform-center-x="14.782001" | 1094 | inkscape:transform-center-x="14.782001" |
1347 | inkscape:transform-center-y="-0.085282837" /> | 1095 | inkscape:transform-center-y="-0.085282837" /> |
1348 | <path | 1096 | <path |
1349 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1097 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1350 | d="m 1179.7216,219.99997 v 5.00004 0" | 1098 | d="m 663.12594,64.000568 v 5.00004 0" |
1351 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7" | 1099 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7" |
1352 | inkscape:transform-center-x="-14.78205" | 1100 | inkscape:transform-center-x="-14.78205" |
1353 | inkscape:transform-center-y="-0.085282837" /> | 1101 | inkscape:transform-center-y="-0.085282837" /> |
1354 | <path | 1102 | <path |
1355 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1103 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1356 | d="m 1320,219.99996 v 10 0" | 1104 | d="m 803.40434,64.000558 v 10 0" |
1357 | id="path29548-5-1-3-6-3-1-0-8" /> | 1105 | id="path29548-5-1-3-6-3-1-0-8" /> |
1358 | <g | 1106 | <g |
1359 | id="g1267"> | 1107 | id="g1267" |
1108 | transform="translate(-516.59566,-155.99941)"> | ||
1360 | <path | 1109 | <path |
1361 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1110 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1362 | d="m 1200,220.00002 v 9.99999 0" | 1111 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1394,7 +1143,7 @@ | |||
1394 | </g> | 1143 | </g> |
1395 | <g | 1144 | <g |
1396 | id="g1267-4" | 1145 | id="g1267-4" |
1397 | transform="translate(240,-4e-5)"> | 1146 | transform="translate(-276.59566,-155.99945)"> |
1398 | <path | 1147 | <path |
1399 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1148 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1400 | d="m 1200,220.00002 v 9.99999 0" | 1149 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1432,7 +1181,7 @@ | |||
1432 | </g> | 1181 | </g> |
1433 | <g | 1182 | <g |
1434 | id="g1267-4-5" | 1183 | id="g1267-4-5" |
1435 | transform="translate(480,-5e-5)"> | 1184 | transform="translate(-36.595659,-155.99946)"> |
1436 | <path | 1185 | <path |
1437 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1186 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1438 | d="m 1200,220.00002 v 9.99999 0" | 1187 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1470,7 +1219,7 @@ | |||
1470 | </g> | 1219 | </g> |
1471 | <g | 1220 | <g |
1472 | id="g1267-4-5-22" | 1221 | id="g1267-4-5-22" |
1473 | transform="translate(600,-4e-5)"> | 1222 | transform="translate(83.404341,-155.99945)"> |
1474 | <path | 1223 | <path |
1475 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1224 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1476 | d="m 1200,220.00002 v 9.99999 0" | 1225 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1508,7 +1257,7 @@ | |||
1508 | </g> | 1257 | </g> |
1509 | <g | 1258 | <g |
1510 | id="g1267-4-5-9" | 1259 | id="g1267-4-5-9" |
1511 | transform="translate(360,-4e-5)"> | 1260 | transform="translate(-156.59566,-155.99945)"> |
1512 | <path | 1261 | <path |
1513 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1262 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1514 | d="m 1200,220.00002 v 9.99999 0" | 1263 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1546,105 +1295,105 @@ | |||
1546 | </g> | 1295 | </g> |
1547 | <path | 1296 | <path |
1548 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1297 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1549 | d="m 1800,219.99997 v 9.99999 0" | 1298 | d="m 1283.4043,64.000568 v 9.99999 0" |
1550 | id="path29548-5-1-3-6-3-1-0-3-4-2-0" /> | 1299 | id="path29548-5-1-3-6-3-1-0-3-4-2-0" /> |
1551 | <path | 1300 | <path |
1552 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1301 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1553 | d="m 1340,219.99997 v 5.00004 0" | 1302 | d="m 823.40434,64.000568 v 5.00004 0" |
1554 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-3" | 1303 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-3" |
1555 | inkscape:transform-center-x="14.782001" | 1304 | inkscape:transform-center-x="14.782001" |
1556 | inkscape:transform-center-y="-0.085282837" /> | 1305 | inkscape:transform-center-y="-0.085282837" /> |
1557 | <path | 1306 | <path |
1558 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1307 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1559 | d="m 1360,219.99997 v 5.00004 0" | 1308 | d="m 843.40434,64.000568 v 5.00004 0" |
1560 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-0" | 1309 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-0" |
1561 | inkscape:transform-center-x="14.782001" | 1310 | inkscape:transform-center-x="14.782001" |
1562 | inkscape:transform-center-y="-0.085282837" /> | 1311 | inkscape:transform-center-y="-0.085282837" /> |
1563 | <path | 1312 | <path |
1564 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1313 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1565 | d="m 1380,219.99997 v 5.00004 0" | 1314 | d="m 863.40434,64.000568 v 5.00004 0" |
1566 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-3" | 1315 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-3" |
1567 | inkscape:transform-center-x="14.782001" | 1316 | inkscape:transform-center-x="14.782001" |
1568 | inkscape:transform-center-y="-0.085282837" /> | 1317 | inkscape:transform-center-y="-0.085282837" /> |
1569 | <path | 1318 | <path |
1570 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1319 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1571 | d="m 1400,219.99997 v 5.00004 0" | 1320 | d="m 883.40434,64.000568 v 5.00004 0" |
1572 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-0" | 1321 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-0" |
1573 | inkscape:transform-center-x="14.782001" | 1322 | inkscape:transform-center-x="14.782001" |
1574 | inkscape:transform-center-y="-0.085282837" /> | 1323 | inkscape:transform-center-y="-0.085282837" /> |
1575 | <path | 1324 | <path |
1576 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1325 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1577 | d="m 1419.7216,219.99997 v 5.00004 0" | 1326 | d="m 903.12594,64.000568 v 5.00004 0" |
1578 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-9" | 1327 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-9" |
1579 | inkscape:transform-center-x="-14.78205" | 1328 | inkscape:transform-center-x="-14.78205" |
1580 | inkscape:transform-center-y="-0.085282837" /> | 1329 | inkscape:transform-center-y="-0.085282837" /> |
1581 | <text | 1330 | <text |
1582 | xml:space="preserve" | 1331 | xml:space="preserve" |
1583 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 1332 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1584 | x="1919.3904" | 1333 | x="1402.7948" |
1585 | y="249.86044" | 1334 | y="93.861046" |
1586 | id="text1185-9-7-1-1-89-62"><tspan | 1335 | id="text1185-9-7-1-1-89-62"><tspan |
1587 | sodipodi:role="line" | 1336 | sodipodi:role="line" |
1588 | x="1919.3904" | 1337 | x="1402.7948" |
1589 | y="249.86044" | 1338 | y="93.861046" |
1590 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1339 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1591 | id="tspan31345-7-6">Oct.</tspan><tspan | 1340 | id="tspan31345-7-6">Oct.</tspan><tspan |
1592 | sodipodi:role="line" | 1341 | sodipodi:role="line" |
1593 | x="1919.3904" | 1342 | x="1402.7948" |
1594 | y="267.85712" | 1343 | y="111.85773" |
1595 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1344 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1596 | id="tspan49906-76-7">2026</tspan></text> | 1345 | id="tspan49906-76-7">2026</tspan></text> |
1597 | <text | 1346 | <text |
1598 | xml:space="preserve" | 1347 | xml:space="preserve" |
1599 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 1348 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1600 | x="2159.3093" | 1349 | x="1642.7137" |
1601 | y="250.58356" | 1350 | y="94.58416" |
1602 | id="text1185-9-7-1-1-89-6-5"><tspan | 1351 | id="text1185-9-7-1-1-89-6-5"><tspan |
1603 | sodipodi:role="line" | 1352 | sodipodi:role="line" |
1604 | x="2159.3093" | 1353 | x="1642.7137" |
1605 | y="250.58356" | 1354 | y="94.58416" |
1606 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1355 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1607 | id="tspan31345-7-8-6">Oct.</tspan><tspan | 1356 | id="tspan31345-7-8-6">Oct.</tspan><tspan |
1608 | sodipodi:role="line" | 1357 | sodipodi:role="line" |
1609 | x="2159.3093" | 1358 | x="1642.7137" |
1610 | y="268.58023" | 1359 | y="112.58084" |
1611 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1360 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1612 | id="tspan49906-76-0-9">2027</tspan></text> | 1361 | id="tspan49906-76-0-9">2027</tspan></text> |
1613 | <text | 1362 | <text |
1614 | xml:space="preserve" | 1363 | xml:space="preserve" |
1615 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 1364 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1616 | x="2041.8163" | 1365 | x="1525.2207" |
1617 | y="249.66977" | 1366 | y="93.670372" |
1618 | id="text1185-9-7-1-1-8-1-0-4-8"><tspan | 1367 | id="text1185-9-7-1-1-8-1-0-4-8"><tspan |
1619 | sodipodi:role="line" | 1368 | sodipodi:role="line" |
1620 | x="2041.8163" | 1369 | x="1525.2207" |
1621 | y="249.66977" | 1370 | y="93.670372" |
1622 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1371 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1623 | id="tspan31345-4-0-4-81-7">Apr.</tspan><tspan | 1372 | id="tspan31345-4-0-4-81-7">Apr.</tspan><tspan |
1624 | sodipodi:role="line" | 1373 | sodipodi:role="line" |
1625 | x="2041.8163" | 1374 | x="1525.2207" |
1626 | y="267.66644" | 1375 | y="111.66705" |
1627 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1376 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1628 | id="tspan49906-7-3-8-2-2">2027</tspan></text> | 1377 | id="tspan49906-7-3-8-2-2">2027</tspan></text> |
1629 | <text | 1378 | <text |
1630 | xml:space="preserve" | 1379 | xml:space="preserve" |
1631 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | 1380 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" |
1632 | x="2282.1477" | 1381 | x="1765.5521" |
1633 | y="250.26334" | 1382 | y="94.263939" |
1634 | id="text1185-9-7-1-1-8-1-0-4-2-8"><tspan | 1383 | id="text1185-9-7-1-1-8-1-0-4-2-8"><tspan |
1635 | sodipodi:role="line" | 1384 | sodipodi:role="line" |
1636 | x="2282.1477" | 1385 | x="1765.5521" |
1637 | y="250.26334" | 1386 | y="94.263939" |
1638 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1387 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1639 | id="tspan31345-4-0-4-81-5-2">Apr.</tspan><tspan | 1388 | id="tspan31345-4-0-4-81-5-2">Apr.</tspan><tspan |
1640 | sodipodi:role="line" | 1389 | sodipodi:role="line" |
1641 | x="2282.1477" | 1390 | x="1765.5521" |
1642 | y="268.26001" | 1391 | y="112.26062" |
1643 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | 1392 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" |
1644 | id="tspan49906-7-3-8-2-8-9">2028</tspan></text> | 1393 | id="tspan49906-7-3-8-2-8-9">2028</tspan></text> |
1645 | <g | 1394 | <g |
1646 | id="g1267-4-9" | 1395 | id="g1267-4-9" |
1647 | transform="translate(720,-3e-5)"> | 1396 | transform="translate(203.40434,-155.99944)"> |
1648 | <path | 1397 | <path |
1649 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1398 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1650 | d="m 1200,220.00002 v 9.99999 0" | 1399 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1682,7 +1431,7 @@ | |||
1682 | </g> | 1431 | </g> |
1683 | <g | 1432 | <g |
1684 | id="g1267-4-5-2" | 1433 | id="g1267-4-5-2" |
1685 | transform="translate(960,-4e-5)"> | 1434 | transform="translate(443.40434,-155.99945)"> |
1686 | <path | 1435 | <path |
1687 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1436 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1688 | d="m 1200,220.00002 v 9.99999 0" | 1437 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1720,7 +1469,7 @@ | |||
1720 | </g> | 1469 | </g> |
1721 | <g | 1470 | <g |
1722 | id="g1267-4-5-9-9" | 1471 | id="g1267-4-5-9-9" |
1723 | transform="translate(840,-3e-5)"> | 1472 | transform="translate(323.40434,-155.99944)"> |
1724 | <path | 1473 | <path |
1725 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1474 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1726 | d="m 1200,220.00002 v 9.99999 0" | 1475 | d="m 1200,220.00002 v 9.99999 0" |
@@ -1758,8 +1507,390 @@ | |||
1758 | </g> | 1507 | </g> |
1759 | <path | 1508 | <path |
1760 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | 1509 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" |
1761 | d="m 2280,219.99998 v 9.99999 0" | 1510 | d="m 1763.4043,64.000578 v 9.99999 0" |
1762 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0" /> | 1511 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0" /> |
1512 | <text | ||
1513 | xml:space="preserve" | ||
1514 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1515 | x="1885.6029" | ||
1516 | y="94.285194" | ||
1517 | id="text1185-9-7-1-1-8-1-0-4-2-8-2"><tspan | ||
1518 | sodipodi:role="line" | ||
1519 | x="1885.6029" | ||
1520 | y="94.285194" | ||
1521 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1522 | id="tspan31345-4-0-4-81-5-2-8">Oct.</tspan><tspan | ||
1523 | sodipodi:role="line" | ||
1524 | x="1885.6029" | ||
1525 | y="112.28188" | ||
1526 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1527 | id="tspan49906-7-3-8-2-8-9-9">2028</tspan></text> | ||
1528 | <g | ||
1529 | id="g1267-4-5-2-7" | ||
1530 | transform="translate(563.45518,-155.9782)"> | ||
1531 | <path | ||
1532 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1533 | d="m 1200,220.00002 v 9.99999 0" | ||
1534 | id="path29548-5-1-3-6-3-1-0-3-4-1-3" /> | ||
1535 | <path | ||
1536 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1537 | d="m 1220,219.99997 v 5.00004 0" | ||
1538 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6" | ||
1539 | inkscape:transform-center-x="14.782001" | ||
1540 | inkscape:transform-center-y="-0.085282837" /> | ||
1541 | <path | ||
1542 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1543 | d="m 1240,219.99997 v 5.00004 0" | ||
1544 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1" | ||
1545 | inkscape:transform-center-x="14.782001" | ||
1546 | inkscape:transform-center-y="-0.085282837" /> | ||
1547 | <path | ||
1548 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1549 | d="m 1260,219.99997 v 5.00004 0" | ||
1550 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2" | ||
1551 | inkscape:transform-center-x="14.782001" | ||
1552 | inkscape:transform-center-y="-0.085282837" /> | ||
1553 | <path | ||
1554 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1555 | d="m 1280,219.99997 v 5.00004 0" | ||
1556 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9" | ||
1557 | inkscape:transform-center-x="14.782001" | ||
1558 | inkscape:transform-center-y="-0.085282837" /> | ||
1559 | <path | ||
1560 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1561 | d="m 1299.7216,219.99997 v 5.00004 0" | ||
1562 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3" | ||
1563 | inkscape:transform-center-x="-14.78205" | ||
1564 | inkscape:transform-center-y="-0.085282837" /> | ||
1565 | </g> | ||
1566 | <path | ||
1567 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1568 | d="m 1883.4551,64.021829 v 9.99999 0" | ||
1569 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1" /> | ||
1570 | <text | ||
1571 | xml:space="preserve" | ||
1572 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1573 | x="2005.5908" | ||
1574 | y="94.339828" | ||
1575 | id="text1185-9-7-1-1-8-1-0-4-2-8-2-4"><tspan | ||
1576 | sodipodi:role="line" | ||
1577 | x="2005.5908" | ||
1578 | y="94.339828" | ||
1579 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1580 | id="tspan31345-4-0-4-81-5-2-8-7">Apr.</tspan><tspan | ||
1581 | sodipodi:role="line" | ||
1582 | x="2005.5908" | ||
1583 | y="112.33651" | ||
1584 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1585 | id="tspan49906-7-3-8-2-8-9-9-8">2029</tspan></text> | ||
1586 | <g | ||
1587 | id="g1267-4-5-2-7-4" | ||
1588 | transform="translate(683.44312,-155.92356)"> | ||
1589 | <path | ||
1590 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1591 | d="m 1200,220.00002 v 9.99999 0" | ||
1592 | id="path29548-5-1-3-6-3-1-0-3-4-1-3-5" /> | ||
1593 | <path | ||
1594 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1595 | d="m 1220,219.99997 v 5.00004 0" | ||
1596 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0" | ||
1597 | inkscape:transform-center-x="14.782001" | ||
1598 | inkscape:transform-center-y="-0.085282837" /> | ||
1599 | <path | ||
1600 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1601 | d="m 1240,219.99997 v 5.00004 0" | ||
1602 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3" | ||
1603 | inkscape:transform-center-x="14.782001" | ||
1604 | inkscape:transform-center-y="-0.085282837" /> | ||
1605 | <path | ||
1606 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1607 | d="m 1260,219.99997 v 5.00004 0" | ||
1608 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6" | ||
1609 | inkscape:transform-center-x="14.782001" | ||
1610 | inkscape:transform-center-y="-0.085282837" /> | ||
1611 | <path | ||
1612 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1613 | d="m 1280,219.99997 v 5.00004 0" | ||
1614 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1" | ||
1615 | inkscape:transform-center-x="14.782001" | ||
1616 | inkscape:transform-center-y="-0.085282837" /> | ||
1617 | <path | ||
1618 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1619 | d="m 1299.7216,219.99997 v 5.00004 0" | ||
1620 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0" | ||
1621 | inkscape:transform-center-x="-14.78205" | ||
1622 | inkscape:transform-center-y="-0.085282837" /> | ||
1623 | </g> | ||
1624 | <path | ||
1625 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1626 | d="m 2003.443,64.076464 v 9.99999 0" | ||
1627 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6" /> | ||
1628 | <text | ||
1629 | xml:space="preserve" | ||
1630 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1631 | x="2125.6079" | ||
1632 | y="94.692207" | ||
1633 | id="text1185-9-7-1-1-8-1-0-4-2-8-2-4-2"><tspan | ||
1634 | sodipodi:role="line" | ||
1635 | x="2125.6079" | ||
1636 | y="94.692207" | ||
1637 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1638 | id="tspan31345-4-0-4-81-5-2-8-7-0">Oct.</tspan><tspan | ||
1639 | sodipodi:role="line" | ||
1640 | x="2125.6079" | ||
1641 | y="112.68889" | ||
1642 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1643 | id="tspan49906-7-3-8-2-8-9-9-8-6">2029</tspan></text> | ||
1644 | <g | ||
1645 | id="g1267-4-5-2-7-4-1" | ||
1646 | transform="translate(803.46019,-155.57118)"> | ||
1647 | <path | ||
1648 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1649 | d="m 1200,220.00002 v 9.99999 0" | ||
1650 | id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5" /> | ||
1651 | <path | ||
1652 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1653 | d="m 1220,219.99997 v 5.00004 0" | ||
1654 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5" | ||
1655 | inkscape:transform-center-x="14.782001" | ||
1656 | inkscape:transform-center-y="-0.085282837" /> | ||
1657 | <path | ||
1658 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1659 | d="m 1240,219.99997 v 5.00004 0" | ||
1660 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4" | ||
1661 | inkscape:transform-center-x="14.782001" | ||
1662 | inkscape:transform-center-y="-0.085282837" /> | ||
1663 | <path | ||
1664 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1665 | d="m 1260,219.99997 v 5.00004 0" | ||
1666 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7" | ||
1667 | inkscape:transform-center-x="14.782001" | ||
1668 | inkscape:transform-center-y="-0.085282837" /> | ||
1669 | <path | ||
1670 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1671 | d="m 1280,219.99997 v 5.00004 0" | ||
1672 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6" | ||
1673 | inkscape:transform-center-x="14.782001" | ||
1674 | inkscape:transform-center-y="-0.085282837" /> | ||
1675 | <path | ||
1676 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1677 | d="m 1299.7216,219.99997 v 5.00004 0" | ||
1678 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5" | ||
1679 | inkscape:transform-center-x="-14.78205" | ||
1680 | inkscape:transform-center-y="-0.085282837" /> | ||
1681 | </g> | ||
1682 | <path | ||
1683 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1684 | d="m 2123.4601,64.428843 v 9.99999 0" | ||
1685 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-6" /> | ||
1686 | <path | ||
1687 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1688 | d="m 2123.3825,64.223284 v 9.99999 0" | ||
1689 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-3" /> | ||
1690 | <text | ||
1691 | xml:space="preserve" | ||
1692 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1693 | x="2245.5474" | ||
1694 | y="94.839027" | ||
1695 | id="text1185-9-7-1-1-8-1-0-4-2-8-2-4-2-7"><tspan | ||
1696 | sodipodi:role="line" | ||
1697 | x="2245.5474" | ||
1698 | y="94.839027" | ||
1699 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1700 | id="tspan31345-4-0-4-81-5-2-8-7-0-4">Apr.</tspan><tspan | ||
1701 | sodipodi:role="line" | ||
1702 | x="2245.5474" | ||
1703 | y="112.83571" | ||
1704 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" | ||
1705 | id="tspan49906-7-3-8-2-8-9-9-8-6-5">2030</tspan></text> | ||
1706 | <g | ||
1707 | id="g1267-4-5-2-7-4-1-2" | ||
1708 | transform="translate(923.39972,-155.42436)"> | ||
1709 | <path | ||
1710 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1711 | d="m 1200,220.00002 v 9.99999 0" | ||
1712 | id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5-5" /> | ||
1713 | <path | ||
1714 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1715 | d="m 1220,219.99997 v 5.00004 0" | ||
1716 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5-4" | ||
1717 | inkscape:transform-center-x="14.782001" | ||
1718 | inkscape:transform-center-y="-0.085282837" /> | ||
1719 | <path | ||
1720 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1721 | d="m 1240,219.99997 v 5.00004 0" | ||
1722 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4-7" | ||
1723 | inkscape:transform-center-x="14.782001" | ||
1724 | inkscape:transform-center-y="-0.085282837" /> | ||
1725 | <path | ||
1726 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1727 | d="m 1260,219.99997 v 5.00004 0" | ||
1728 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7-4" | ||
1729 | inkscape:transform-center-x="14.782001" | ||
1730 | inkscape:transform-center-y="-0.085282837" /> | ||
1731 | <path | ||
1732 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1733 | d="m 1280,219.99997 v 5.00004 0" | ||
1734 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6-4" | ||
1735 | inkscape:transform-center-x="14.782001" | ||
1736 | inkscape:transform-center-y="-0.085282837" /> | ||
1737 | <path | ||
1738 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1739 | d="m 1299.7216,219.99997 v 5.00004 0" | ||
1740 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5-3" | ||
1741 | inkscape:transform-center-x="-14.78205" | ||
1742 | inkscape:transform-center-y="-0.085282837" /> | ||
1743 | </g> | ||
1744 | <g | ||
1745 | id="g1267-4-5-2-7-4-1-2-0" | ||
1746 | transform="translate(1043.3579,-155.33829)"> | ||
1747 | <path | ||
1748 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1749 | d="m 1200,220.00002 v 9.99999 0" | ||
1750 | id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5-5-6" /> | ||
1751 | <path | ||
1752 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1753 | d="m 1220,219.99997 v 5.00004 0" | ||
1754 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5-4-8" | ||
1755 | inkscape:transform-center-x="14.782001" | ||
1756 | inkscape:transform-center-y="-0.085282837" /> | ||
1757 | <path | ||
1758 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1759 | d="m 1240,219.99997 v 5.00004 0" | ||
1760 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4-7-9" | ||
1761 | inkscape:transform-center-x="14.782001" | ||
1762 | inkscape:transform-center-y="-0.085282837" /> | ||
1763 | <path | ||
1764 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1765 | d="m 1260,219.99997 v 5.00004 0" | ||
1766 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7-4-2" | ||
1767 | inkscape:transform-center-x="14.782001" | ||
1768 | inkscape:transform-center-y="-0.085282837" /> | ||
1769 | <path | ||
1770 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1771 | d="m 1280,219.99997 v 5.00004 0" | ||
1772 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6-4-6" | ||
1773 | inkscape:transform-center-x="14.782001" | ||
1774 | inkscape:transform-center-y="-0.085282837" /> | ||
1775 | <path | ||
1776 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1777 | d="m 1299.7216,219.99997 v 5.00004 0" | ||
1778 | id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5-3-6" | ||
1779 | inkscape:transform-center-x="-14.78205" | ||
1780 | inkscape:transform-center-y="-0.085282837" /> | ||
1781 | </g> | ||
1782 | <path | ||
1783 | style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" | ||
1784 | d="m 2243.3996,64.575663 v 9.99999 0" | ||
1785 | id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-6-0" /> | ||
1786 | <rect | ||
1787 | style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.751473;stroke-opacity:1" | ||
1788 | id="rect917-0-0-4-4-9-4-5-3-9-2-36" | ||
1789 | width="38.418175" | ||
1790 | height="23.151052" | ||
1791 | x="2047.6135" | ||
1792 | y="-45.172161" | ||
1793 | ry="1.1605872" /> | ||
1794 | <rect | ||
1795 | style="opacity:1;fill:#ffffff;fill-opacity:1;fill-rule:evenodd;stroke:#000000;stroke-width:1.98878;stroke-dasharray:none;stroke-opacity:1" | ||
1796 | id="rect917-0-0-4-4-9-4-5-3-9-2-36-7" | ||
1797 | width="186.42949" | ||
1798 | height="110.40546" | ||
1799 | x="2036.5294" | ||
1800 | y="-77.753708" | ||
1801 | ry="5.5347452" /> | ||
1802 | <rect | ||
1803 | style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1" | ||
1804 | id="rect917-0-0-4-4-9-4-5-3-9-2-6" | ||
1805 | width="21.197233" | ||
1806 | height="19.28739" | ||
1807 | x="2053.8164" | ||
1808 | y="-45.883858" | ||
1809 | ry="0.96689767" /> | ||
1810 | <text | ||
1811 | xml:space="preserve" | ||
1812 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1813 | x="2132.4917" | ||
1814 | y="-57.687912" | ||
1815 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-5"><tspan | ||
1816 | sodipodi:role="line" | ||
1817 | x="2132.4917" | ||
1818 | y="-57.687912" | ||
1819 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none" | ||
1820 | id="tspan10317-2-9-1-4-6-5-6-6-5">Legend</tspan></text> | ||
1821 | <text | ||
1822 | xml:space="preserve" | ||
1823 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1824 | x="2098.0986" | ||
1825 | y="-31.899874" | ||
1826 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2"><tspan | ||
1827 | sodipodi:role="line" | ||
1828 | x="2098.0986" | ||
1829 | y="-31.899874" | ||
1830 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none" | ||
1831 | id="tspan10317-2-9-1-4-6-5-6-6-5-9">Future</tspan></text> | ||
1832 | <rect | ||
1833 | style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1" | ||
1834 | id="rect917-0-0-4-4-9-4-5-3-9-2-6-1" | ||
1835 | width="21.197233" | ||
1836 | height="19.28739" | ||
1837 | x="2053.8672" | ||
1838 | y="-21.756365" | ||
1839 | ry="0.96689767" /> | ||
1840 | <text | ||
1841 | xml:space="preserve" | ||
1842 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1843 | x="2128.7158" | ||
1844 | y="-7.6722765" | ||
1845 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2-2"><tspan | ||
1846 | sodipodi:role="line" | ||
1847 | x="2128.7158" | ||
1848 | y="-7.6722765" | ||
1849 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none" | ||
1850 | id="tspan10317-2-9-1-4-6-5-6-6-5-9-7">Current (Apr. 25)</tspan></text> | ||
1851 | <text | ||
1852 | xml:space="preserve" | ||
1853 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1854 | x="2109.363" | ||
1855 | y="16.03771" | ||
1856 | id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2-2-9"><tspan | ||
1857 | sodipodi:role="line" | ||
1858 | x="2109.363" | ||
1859 | y="16.03771" | ||
1860 | style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none" | ||
1861 | id="tspan10317-2-9-1-4-6-5-6-6-5-9-7-3">End-of-life</tspan></text> | ||
1862 | <rect | ||
1863 | style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1" | ||
1864 | id="rect917-0-0-4-4-9-4-5-3-9-2-6-1-0" | ||
1865 | width="21.197233" | ||
1866 | height="19.28739" | ||
1867 | x="2054.0239" | ||
1868 | y="1.9667883" | ||
1869 | ry="0.96689767" /> | ||
1870 | <rect | ||
1871 | style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:1.85786;stroke-opacity:1" | ||
1872 | id="rect917-0-0-4-4-9-4-5-6" | ||
1873 | width="120.80748" | ||
1874 | height="45.000004" | ||
1875 | x="703.10553" | ||
1876 | y="-165.72791" | ||
1877 | ry="2.2558987" /> | ||
1878 | <text | ||
1879 | xml:space="preserve" | ||
1880 | style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" | ||
1881 | x="752.16809" | ||
1882 | y="-147.18787" | ||
1883 | id="text1185-3-55-4-0-0-0-1-2"><tspan | ||
1884 | sodipodi:role="line" | ||
1885 | x="752.16809" | ||
1886 | y="-147.18787" | ||
1887 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
1888 | id="tspan1">Nanbield</tspan><tspan | ||
1889 | sodipodi:role="line" | ||
1890 | x="752.16809" | ||
1891 | y="-129.19119" | ||
1892 | style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" | ||
1893 | id="tspan2">4.3</tspan></text> | ||
1763 | </g> | 1894 | </g> |
1764 | <style | 1895 | <style |
1765 | type="text/css" | 1896 | type="text/css" |
diff --git a/documentation/ref-manual/system-requirements.rst b/documentation/ref-manual/system-requirements.rst index 0fc92550a5..b22572c6b4 100644 --- a/documentation/ref-manual/system-requirements.rst +++ b/documentation/ref-manual/system-requirements.rst | |||
@@ -62,8 +62,12 @@ supported on the following distributions: | |||
62 | 62 | ||
63 | - Ubuntu 22.04 (LTS) | 63 | - Ubuntu 22.04 (LTS) |
64 | 64 | ||
65 | - Ubuntu 23.04 | ||
66 | |||
65 | - Fedora 38 | 67 | - Fedora 38 |
66 | 68 | ||
69 | - Fedora 39 | ||
70 | |||
67 | - CentOS Stream 8 | 71 | - CentOS Stream 8 |
68 | 72 | ||
69 | - Debian GNU/Linux 11 (Bullseye) | 73 | - Debian GNU/Linux 11 (Bullseye) |
@@ -150,10 +154,27 @@ Ubuntu and Debian | |||
150 | Here are the packages needed to build an image on a headless system | 154 | Here are the packages needed to build an image on a headless system |
151 | with a supported Ubuntu or Debian Linux distribution:: | 155 | with a supported Ubuntu or Debian Linux distribution:: |
152 | 156 | ||
153 | $ sudo apt install &UBUNTU_HOST_PACKAGES_ESSENTIAL; | 157 | $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL; |
158 | |||
159 | You also need to ensure you have the ``en_US.UTF-8`` locale enabled:: | ||
160 | |||
161 | $ locale --all-locales | grep en_US.utf8 | ||
162 | |||
163 | If this is not the case, you can reconfigure the ``locales`` package to add it | ||
164 | (requires an interactive shell):: | ||
165 | |||
166 | $ sudo dpkg-reconfigure locales | ||
154 | 167 | ||
155 | .. note:: | 168 | .. note:: |
156 | 169 | ||
170 | - If you are not in an interactive shell, ``dpkg-reconfigure`` will | ||
171 | not work as expected. To add the locale you will need to edit | ||
172 | ``/etc/locale.gen`` file to add/uncomment the ``en_US.UTF-8`` locale. | ||
173 | A naive way to do this as root is:: | ||
174 | |||
175 | $ echo "en_US.UTF-8 UTF-8" >> /etc/locale.gen | ||
176 | $ locale-gen | ||
177 | |||
157 | - If your build system has the ``oss4-dev`` package installed, you | 178 | - If your build system has the ``oss4-dev`` package installed, you |
158 | might experience QEMU build failures due to the package installing | 179 | might experience QEMU build failures due to the package installing |
159 | its own custom ``/usr/include/linux/soundcard.h`` on the Debian | 180 | its own custom ``/usr/include/linux/soundcard.h`` on the Debian |
@@ -164,8 +185,12 @@ with a supported Ubuntu or Debian Linux distribution:: | |||
164 | 185 | ||
165 | Here are the packages needed to build Project documentation manuals:: | 186 | Here are the packages needed to build Project documentation manuals:: |
166 | 187 | ||
167 | $ sudo apt install git make inkscape texlive-latex-extra | 188 | $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_DOC; |
168 | $ sudo apt install sphinx python3-saneyaml python3-sphinx-rtd-theme | 189 | |
190 | In addition to the previous packages, here are the packages needed to build the | ||
191 | documentation in PDF format:: | ||
192 | |||
193 | $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_DOC_PDF; | ||
169 | 194 | ||
170 | Fedora Packages | 195 | Fedora Packages |
171 | --------------- | 196 | --------------- |
@@ -177,8 +202,13 @@ with a supported Fedora Linux distribution:: | |||
177 | 202 | ||
178 | Here are the packages needed to build Project documentation manuals:: | 203 | Here are the packages needed to build Project documentation manuals:: |
179 | 204 | ||
180 | $ sudo dnf install git make python3-pip which inkscape texlive-fncychap | 205 | $ sudo dnf install &FEDORA_HOST_PACKAGES_DOC; |
181 | &PIP3_HOST_PACKAGES_DOC; | 206 | $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC; |
207 | |||
208 | In addition to the previous packages, here are the packages needed to build the | ||
209 | documentation in PDF format:: | ||
210 | |||
211 | $ sudo dnf install &FEDORA_HOST_PACKAGES_DOC_PDF; | ||
182 | 212 | ||
183 | openSUSE Packages | 213 | openSUSE Packages |
184 | ----------------- | 214 | ----------------- |
@@ -187,11 +217,17 @@ Here are the packages needed to build an image on a headless system | |||
187 | with a supported openSUSE distribution:: | 217 | with a supported openSUSE distribution:: |
188 | 218 | ||
189 | $ sudo zypper install &OPENSUSE_HOST_PACKAGES_ESSENTIAL; | 219 | $ sudo zypper install &OPENSUSE_HOST_PACKAGES_ESSENTIAL; |
220 | $ sudo pip3 install &OPENSUSE_PIP3_HOST_PACKAGES_ESSENTIAL; | ||
190 | 221 | ||
191 | Here are the packages needed to build Project documentation manuals:: | 222 | Here are the packages needed to build Project documentation manuals:: |
192 | 223 | ||
193 | $ sudo zypper install git make python3-pip which inkscape texlive-fncychap | 224 | $ sudo zypper install &OPENSUSE_HOST_PACKAGES_DOC; |
194 | &PIP3_HOST_PACKAGES_DOC; | 225 | $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC; |
226 | |||
227 | In addition to the previous packages, here are the packages needed to build the | ||
228 | documentation in PDF format:: | ||
229 | |||
230 | $ sudo zypper install &OPENSUSE_HOST_PACKAGES_DOC_PDF; | ||
195 | 231 | ||
196 | 232 | ||
197 | AlmaLinux Packages | 233 | AlmaLinux Packages |
@@ -200,6 +236,10 @@ AlmaLinux Packages | |||
200 | Here are the packages needed to build an image on a headless system | 236 | Here are the packages needed to build an image on a headless system |
201 | with a supported AlmaLinux distribution:: | 237 | with a supported AlmaLinux distribution:: |
202 | 238 | ||
239 | $ sudo dnf install -y epel-release | ||
240 | $ sudo yum install dnf-plugins-core | ||
241 | $ sudo dnf config-manager --set-enabled crb | ||
242 | $ sudo dnf makecache | ||
203 | $ sudo dnf install &ALMALINUX_HOST_PACKAGES_ESSENTIAL; | 243 | $ sudo dnf install &ALMALINUX_HOST_PACKAGES_ESSENTIAL; |
204 | 244 | ||
205 | .. note:: | 245 | .. note:: |
@@ -217,8 +257,20 @@ with a supported AlmaLinux distribution:: | |||
217 | 257 | ||
218 | Here are the packages needed to build Project documentation manuals:: | 258 | Here are the packages needed to build Project documentation manuals:: |
219 | 259 | ||
220 | $ sudo dnf install git make python3-pip which inkscape texlive-fncychap | 260 | $ sudo dnf install &ALMALINUX_HOST_PACKAGES_DOC; |
221 | &PIP3_HOST_PACKAGES_DOC; | 261 | $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC; |
262 | |||
263 | In addition to the previous packages, here are the packages needed to build the | ||
264 | documentation in PDF format:: | ||
265 | |||
266 | $ sudo dnf install &ALMALINUX_HOST_PACKAGES_DOC_PDF; | ||
267 | |||
268 | .. warning:: | ||
269 | |||
270 | Unlike Fedora or OpenSUSE, AlmaLinux does not provide the packages | ||
271 | ``texlive-collection-fontsextra``, ``texlive-collection-lang*`` and | ||
272 | ``texlive-collection-latexextra``, so you may run into issues. These may be | ||
273 | installed using `tlmgr <https://tug.org/texlive/tlmgr.html>`_. | ||
222 | 274 | ||
223 | .. _system-requirements-buildtools: | 275 | .. _system-requirements-buildtools: |
224 | 276 | ||
@@ -319,7 +371,7 @@ If you would prefer not to use the ``install-buildtools`` script, you can instea | |||
319 | download and run a pre-built :term:`buildtools` installer yourself with the following | 371 | download and run a pre-built :term:`buildtools` installer yourself with the following |
320 | steps: | 372 | steps: |
321 | 373 | ||
322 | #. Go to :yocto_dl:`/releases/yocto/yocto-&DISTRO;/buildtools/`, locate and | 374 | #. Go to :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/buildtools/`, locate and |
323 | download the ``.sh`` file corresponding to your host architecture | 375 | download the ``.sh`` file corresponding to your host architecture |
324 | and to :term:`buildtools`, :term:`buildtools-extended` or :term:`buildtools-make`. | 376 | and to :term:`buildtools`, :term:`buildtools-extended` or :term:`buildtools-make`. |
325 | 377 | ||
diff --git a/documentation/ref-manual/tasks.rst b/documentation/ref-manual/tasks.rst index 2e4b23408d..cf6b9876ca 100644 --- a/documentation/ref-manual/tasks.rst +++ b/documentation/ref-manual/tasks.rst | |||
@@ -616,8 +616,8 @@ information on how the root filesystem is created. | |||
616 | 616 | ||
617 | Boots an image and performs runtime tests within the image. For | 617 | Boots an image and performs runtime tests within the image. For |
618 | information on automatically testing images, see the | 618 | information on automatically testing images, see the |
619 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 619 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
620 | section in the Yocto Project Development Tasks Manual. | 620 | section in the Yocto Project Test Environment Manual. |
621 | 621 | ||
622 | .. _ref-tasks-testimage_auto: | 622 | .. _ref-tasks-testimage_auto: |
623 | 623 | ||
@@ -629,8 +629,8 @@ after it has been built. This task is enabled when you set | |||
629 | :term:`TESTIMAGE_AUTO` equal to "1". | 629 | :term:`TESTIMAGE_AUTO` equal to "1". |
630 | 630 | ||
631 | For information on automatically testing images, see the | 631 | For information on automatically testing images, see the |
632 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 632 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
633 | section in the Yocto Project Development Tasks Manual. | 633 | section in the Yocto Project Test Environment Manual. |
634 | 634 | ||
635 | Kernel-Related Tasks | 635 | Kernel-Related Tasks |
636 | ==================== | 636 | ==================== |
@@ -727,7 +727,7 @@ tool, which you then use to modify the kernel configuration. | |||
727 | $ bitbake linux-yocto -c menuconfig | 727 | $ bitbake linux-yocto -c menuconfig |
728 | 728 | ||
729 | 729 | ||
730 | See the ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" | 730 | See the ":ref:`kernel-dev/common:using ``menuconfig```" |
731 | section in the Yocto Project Linux Kernel Development Manual for more | 731 | section in the Yocto Project Linux Kernel Development Manual for more |
732 | information on this configuration tool. | 732 | information on this configuration tool. |
733 | 733 | ||
@@ -751,7 +751,7 @@ which can then be applied by subsequent tasks such as | |||
751 | 751 | ||
752 | Runs ``make menuconfig`` for the kernel. For information on | 752 | Runs ``make menuconfig`` for the kernel. For information on |
753 | ``menuconfig``, see the | 753 | ``menuconfig``, see the |
754 | ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" | 754 | ":ref:`kernel-dev/common:using ``menuconfig```" |
755 | section in the Yocto Project Linux Kernel Development Manual. | 755 | section in the Yocto Project Linux Kernel Development Manual. |
756 | 756 | ||
757 | .. _ref-tasks-savedefconfig: | 757 | .. _ref-tasks-savedefconfig: |
diff --git a/documentation/ref-manual/terms.rst b/documentation/ref-manual/terms.rst index b18c4183b6..9f61061415 100644 --- a/documentation/ref-manual/terms.rst +++ b/documentation/ref-manual/terms.rst | |||
@@ -63,7 +63,7 @@ universal, the list includes them just in case: | |||
63 | This term refers to the area used by the OpenEmbedded build system for | 63 | This term refers to the area used by the OpenEmbedded build system for |
64 | builds. The area is created when you ``source`` the setup environment | 64 | builds. The area is created when you ``source`` the setup environment |
65 | script that is found in the Source Directory | 65 | script that is found in the Source Directory |
66 | (i.e. :ref:`ref-manual/structure:\`\`oe-init-build-env\`\``). The | 66 | (i.e. :ref:`ref-manual/structure:``oe-init-build-env```). The |
67 | :term:`TOPDIR` variable points to the :term:`Build Directory`. | 67 | :term:`TOPDIR` variable points to the :term:`Build Directory`. |
68 | 68 | ||
69 | You have a lot of flexibility when creating the :term:`Build Directory`. | 69 | You have a lot of flexibility when creating the :term:`Build Directory`. |
@@ -452,7 +452,7 @@ universal, the list includes them just in case: | |||
452 | the Source Directory, if you do, the top-level directory name of the | 452 | the Source Directory, if you do, the top-level directory name of the |
453 | Source Directory is derived from the Yocto Project release tarball. | 453 | Source Directory is derived from the Yocto Project release tarball. |
454 | For example, downloading and unpacking poky tarballs from | 454 | For example, downloading and unpacking poky tarballs from |
455 | :yocto_dl:`/releases/yocto/&DISTRO_REL_TAG;/` | 455 | :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/` |
456 | results in a Source Directory whose root folder is named poky. | 456 | results in a Source Directory whose root folder is named poky. |
457 | 457 | ||
458 | 458 | ||
diff --git a/documentation/ref-manual/variables.rst b/documentation/ref-manual/variables.rst index f694640c00..9406f3548c 100644 --- a/documentation/ref-manual/variables.rst +++ b/documentation/ref-manual/variables.rst | |||
@@ -143,7 +143,7 @@ system and gives an overview of their function and contents. | |||
143 | information on how this variable is used. | 143 | information on how this variable is used. |
144 | 144 | ||
145 | :term:`AR` | 145 | :term:`AR` |
146 | The minimal command and arguments used to run ``ar``. | 146 | The minimal command and arguments used to run :manpage:`ar <ar(1)>`. |
147 | 147 | ||
148 | :term:`ARCHIVER_MODE` | 148 | :term:`ARCHIVER_MODE` |
149 | When used with the :ref:`ref-classes-archiver` class, | 149 | When used with the :ref:`ref-classes-archiver` class, |
@@ -165,7 +165,8 @@ system and gives an overview of their function and contents. | |||
165 | ``meta/classes/archiver.bbclass`` file in the :term:`Source Directory`. | 165 | ``meta/classes/archiver.bbclass`` file in the :term:`Source Directory`. |
166 | 166 | ||
167 | :term:`AS` | 167 | :term:`AS` |
168 | Minimal command and arguments needed to run the assembler. | 168 | Minimal command and arguments needed to run the :manpage:`assembler |
169 | <as(1)>`. | ||
169 | 170 | ||
170 | :term:`ASSUME_PROVIDED` | 171 | :term:`ASSUME_PROVIDED` |
171 | Lists recipe names (:term:`PN` values) BitBake does not | 172 | Lists recipe names (:term:`PN` values) BitBake does not |
@@ -209,12 +210,11 @@ system and gives an overview of their function and contents. | |||
209 | SRCREV = "${AUTOREV}" | 210 | SRCREV = "${AUTOREV}" |
210 | 211 | ||
211 | If you use the previous statement to retrieve the latest version of | 212 | If you use the previous statement to retrieve the latest version of |
212 | software, you need to be sure :term:`PV` contains | 213 | software, you need to make sure :term:`PV` contains the ``+`` sign so |
213 | ``${``\ :term:`SRCPV`\ ``}``. For example, suppose you have a kernel | 214 | :term:`bitbake` includes source control information to :term:`PKGV` when |
214 | recipe that inherits the :ref:`ref-classes-kernel` class and you | 215 | packaging the recipe. For example:: |
215 | use the previous statement. In this example, ``${SRCPV}`` does not | 216 | |
216 | automatically get into :term:`PV`. Consequently, you need to change | 217 | PV = "6.10.y+git" |
217 | :term:`PV` in your recipe so that it does contain ``${SRCPV}``. | ||
218 | 218 | ||
219 | For more information see the | 219 | For more information see the |
220 | ":ref:`dev-manual/packages:automatically incrementing a package version number`" | 220 | ":ref:`dev-manual/packages:automatically incrementing a package version number`" |
@@ -225,6 +225,12 @@ system and gives an overview of their function and contents. | |||
225 | must set this variable in your recipe. The | 225 | must set this variable in your recipe. The |
226 | :ref:`ref-classes-syslinux` class checks this variable. | 226 | :ref:`ref-classes-syslinux` class checks this variable. |
227 | 227 | ||
228 | :term:`AUTOTOOLS_SCRIPT_PATH` | ||
229 | When using the :ref:`ref-classes-autotools` class, the | ||
230 | :term:`AUTOTOOLS_SCRIPT_PATH` variable stores the location of the | ||
231 | different scripts used by the Autotools build system. The default | ||
232 | value for this variable is :term:`S`. | ||
233 | |||
228 | :term:`AVAILTUNES` | 234 | :term:`AVAILTUNES` |
229 | The list of defined CPU and Application Binary Interface (ABI) | 235 | The list of defined CPU and Application Binary Interface (ABI) |
230 | tunings (i.e. "tunes") available for use by the OpenEmbedded build | 236 | tunings (i.e. "tunes") available for use by the OpenEmbedded build |
@@ -972,55 +978,165 @@ system and gives an overview of their function and contents. | |||
972 | variable is a useful pointer in case a bug in the software being | 978 | variable is a useful pointer in case a bug in the software being |
973 | built needs to be manually reported. | 979 | built needs to be manually reported. |
974 | 980 | ||
981 | :term:`BUILD_AR` | ||
982 | Specifies the architecture-specific :manpage:`archiver <ar(1)>` for the | ||
983 | build host, and its default definition is derived in part from | ||
984 | :term:`BUILD_PREFIX`:: | ||
985 | |||
986 | BUILD_AR = "${BUILD_PREFIX}ar" | ||
987 | |||
988 | When building a :ref:`ref-classes-native` recipe, :term:`AR` is set to the | ||
989 | value of this variable by default. | ||
990 | |||
991 | The :term:`BUILD_AR` variable should not be set manually, and is rarely | ||
992 | used in recipes as :term:`AR` contains the appropriate value depending on | ||
993 | the context (native or target recipes). Exception be made for target | ||
994 | recipes that need to use the :manpage:`archiver <ar(1)>` from the build | ||
995 | host at some point during the build. | ||
996 | |||
975 | :term:`BUILD_ARCH` | 997 | :term:`BUILD_ARCH` |
976 | Specifies the architecture of the build host (e.g. ``i686``). The | 998 | Specifies the architecture of the build host (e.g. ``i686``). The |
977 | OpenEmbedded build system sets the value of :term:`BUILD_ARCH` from the | 999 | OpenEmbedded build system sets the value of :term:`BUILD_ARCH` from the |
978 | machine name reported by the ``uname`` command. | 1000 | machine name reported by the ``uname`` command. |
979 | 1001 | ||
1002 | :term:`BUILD_AS` | ||
1003 | Specifies the architecture-specific :manpage:`assembler <as(1)>` for the | ||
1004 | build host, and its default definition is derived in part from | ||
1005 | :term:`BUILD_PREFIX`:: | ||
1006 | |||
1007 | BUILD_AS = "${BUILD_PREFIX}as ${BUILD_AS_ARCH}" | ||
1008 | |||
1009 | When building a :ref:`ref-classes-native` recipe, :term:`AS` is set to the | ||
1010 | value of this variable by default. | ||
1011 | |||
1012 | The :term:`BUILD_AS` variable should not be set manually, and is rarely | ||
1013 | used in recipes as :term:`AS` contains the appropriate value depending on | ||
1014 | the context (native or target recipes). Exception be made for target | ||
1015 | recipes that need to use the :manpage:`assembler <as(1)>` from the build | ||
1016 | host at some point during the build. | ||
1017 | |||
980 | :term:`BUILD_AS_ARCH` | 1018 | :term:`BUILD_AS_ARCH` |
981 | Specifies the architecture-specific assembler flags for the build | 1019 | Specifies the architecture-specific assembler flags for the build |
982 | host. By default, the value of :term:`BUILD_AS_ARCH` is empty. | 1020 | host. By default, the value of :term:`BUILD_AS_ARCH` is empty. |
983 | 1021 | ||
1022 | :term:`BUILD_CC` | ||
1023 | Specifies the architecture-specific C compiler for the build host, | ||
1024 | and its default definition is derived in part from :term:`BUILD_PREFIX` | ||
1025 | and :term:`BUILD_CC_ARCH`:: | ||
1026 | |||
1027 | BUILD_CC = "${CCACHE}${BUILD_PREFIX}gcc ${BUILD_CC_ARCH}" | ||
1028 | |||
1029 | When building a :ref:`ref-classes-native` recipe, :term:`CC` is set to the | ||
1030 | value of this variable by default. | ||
1031 | |||
1032 | The :term:`BUILD_CC` variable should not be set manually, and is rarely | ||
1033 | used in recipes as :term:`CC` contains the appropriate value depending on | ||
1034 | the context (native or target recipes). Exception be made for target | ||
1035 | recipes that need to use the compiler from the build host at some point | ||
1036 | during the build. | ||
1037 | |||
984 | :term:`BUILD_CC_ARCH` | 1038 | :term:`BUILD_CC_ARCH` |
985 | Specifies the architecture-specific C compiler flags for the build | 1039 | Specifies the architecture-specific C compiler flags for the build |
986 | host. By default, the value of :term:`BUILD_CC_ARCH` is empty. | 1040 | host. By default, the value of :term:`BUILD_CC_ARCH` is empty. |
987 | 1041 | ||
988 | :term:`BUILD_CCLD` | 1042 | :term:`BUILD_CCLD` |
989 | Specifies the linker command to be used for the build host when the C | 1043 | Specifies the :manpage:`linker <ld(1)>` command to be used for the build |
990 | compiler is being used as the linker. By default, :term:`BUILD_CCLD` | 1044 | host when the C compiler is being used as the linker, and its default |
991 | points to GCC and passes as arguments the value of | 1045 | definition is derived in part from :term:`BUILD_PREFIX` and |
992 | :term:`BUILD_CC_ARCH`, assuming | 1046 | :term:`BUILD_CC_ARCH`:: |
993 | :term:`BUILD_CC_ARCH` is set. | 1047 | |
1048 | BUILD_CCLD = "${BUILD_PREFIX}gcc ${BUILD_CC_ARCH}" | ||
1049 | |||
1050 | When building a :ref:`ref-classes-native` recipe, :term:`CCLD` is set to | ||
1051 | the value of this variable by default. | ||
1052 | |||
1053 | The :term:`BUILD_CCLD` variable should not be set manually, and is rarely | ||
1054 | used in recipes as :term:`CCLD` contains the appropriate value depending on | ||
1055 | the context (native or target recipes). Exception be made for target | ||
1056 | recipes that need to use the :manpage:`linker <ld(1)>` from the build host | ||
1057 | at some point during the build. | ||
994 | 1058 | ||
995 | :term:`BUILD_CFLAGS` | 1059 | :term:`BUILD_CFLAGS` |
996 | Specifies the flags to pass to the C compiler when building for the | 1060 | Specifies the flags to pass to the C compiler when building for the |
997 | build host. When building in the ``-native`` context, | 1061 | build host. When building a :ref:`ref-classes-native` recipe, |
998 | :term:`CFLAGS` is set to the value of this variable by | 1062 | :term:`CFLAGS` is set to the value of this variable by |
999 | default. | 1063 | default. |
1000 | 1064 | ||
1065 | :term:`BUILD_CPP` | ||
1066 | Specifies the C preprocessor command (to both the C and the C++ compilers) | ||
1067 | when building for the build host, and its default definition is derived in | ||
1068 | part from :term:`BUILD_PREFIX` and :term:`BUILD_CC_ARCH`:: | ||
1069 | |||
1070 | BUILD_CPP = "${BUILD_PREFIX}gcc ${BUILD_CC_ARCH} -E" | ||
1071 | |||
1072 | When building a :ref:`ref-classes-native` recipe, :term:`CPP` is set to | ||
1073 | the value of this variable by default. | ||
1074 | |||
1075 | The :term:`BUILD_CPP` variable should not be set manually, and is rarely | ||
1076 | used in recipes as :term:`CPP` contains the appropriate value depending on | ||
1077 | the context (native or target recipes). Exception be made for target | ||
1078 | recipes that need to use the preprocessor from the build host at some | ||
1079 | point during the build. | ||
1080 | |||
1001 | :term:`BUILD_CPPFLAGS` | 1081 | :term:`BUILD_CPPFLAGS` |
1002 | Specifies the flags to pass to the C preprocessor (i.e. to both the C | 1082 | Specifies the flags to pass to the C preprocessor (i.e. to both the C |
1003 | and the C++ compilers) when building for the build host. When | 1083 | and the C++ compilers) when building for the build host. When |
1004 | building in the ``-native`` context, :term:`CPPFLAGS` | 1084 | building in the ``-native`` context, :term:`CPPFLAGS` |
1005 | is set to the value of this variable by default. | 1085 | is set to the value of this variable by default. |
1006 | 1086 | ||
1087 | :term:`BUILD_CXX` | ||
1088 | Specifies the architecture-specific C++ compiler for the build host, | ||
1089 | and its default definition is derived in part from :term:`BUILD_PREFIX` | ||
1090 | and :term:`BUILD_CC_ARCH`:: | ||
1091 | |||
1092 | BUILD_CXX = "${CCACHE}${BUILD_PREFIX}g++ ${BUILD_CC_ARCH}" | ||
1093 | |||
1094 | When building a :ref:`ref-classes-native` recipe, :term:`CXX` is set to | ||
1095 | the value of this variable by default. | ||
1096 | |||
1097 | The :term:`BUILD_CXX` variable should not be set manually, and is rarely | ||
1098 | used in recipes as :term:`CXX` contains the appropriate value depending on | ||
1099 | the context (native or target recipes). Exception be made for target | ||
1100 | recipes that need to use the C++ compiler from the build host at some | ||
1101 | point during the build. | ||
1102 | |||
1007 | :term:`BUILD_CXXFLAGS` | 1103 | :term:`BUILD_CXXFLAGS` |
1008 | Specifies the flags to pass to the C++ compiler when building for the | 1104 | Specifies the flags to pass to the C++ compiler when building for the |
1009 | build host. When building in the ``-native`` context, | 1105 | build host. When building a :ref:`ref-classes-native` recipe, |
1010 | :term:`CXXFLAGS` is set to the value of this variable | 1106 | :term:`CXXFLAGS` is set to the value of this variable |
1011 | by default. | 1107 | by default. |
1012 | 1108 | ||
1013 | :term:`BUILD_FC` | 1109 | :term:`BUILD_FC` |
1014 | Specifies the Fortran compiler command for the build host. By | 1110 | Specifies the Fortran compiler command for the build host, and its default |
1015 | default, :term:`BUILD_FC` points to Gfortran and passes as arguments the | 1111 | definition is derived in part from :term:`BUILD_PREFIX` and |
1016 | value of :term:`BUILD_CC_ARCH`, assuming | 1112 | :term:`BUILD_CC_ARCH`:: |
1017 | :term:`BUILD_CC_ARCH` is set. | 1113 | |
1114 | BUILD_FC = "${BUILD_PREFIX}gfortran ${BUILD_CC_ARCH}" | ||
1115 | |||
1116 | When building a :ref:`ref-classes-native` recipe, :term:`FC` is set to the | ||
1117 | value of this variable by default. | ||
1118 | |||
1119 | The :term:`BUILD_FC` variable should not be set manually, and is rarely | ||
1120 | used in recipes as :term:`FC` contains the appropriate value depending on | ||
1121 | the context (native or target recipes). Exception be made for target | ||
1122 | recipes that need to use the Fortran compiler from the build host at some | ||
1123 | point during the build. | ||
1018 | 1124 | ||
1019 | :term:`BUILD_LD` | 1125 | :term:`BUILD_LD` |
1020 | Specifies the linker command for the build host. By default, | 1126 | Specifies the linker command for the build host, and its default |
1021 | :term:`BUILD_LD` points to the GNU linker (ld) and passes as arguments | 1127 | definition is derived in part from :term:`BUILD_PREFIX` and |
1022 | the value of :term:`BUILD_LD_ARCH`, assuming | 1128 | :term:`BUILD_LD_ARCH`:: |
1023 | :term:`BUILD_LD_ARCH` is set. | 1129 | |
1130 | BUILD_LD = "${BUILD_PREFIX}ld ${BUILD_LD_ARCH}" | ||
1131 | |||
1132 | When building a :ref:`ref-classes-native` recipe, :term:`LD` is set to the | ||
1133 | value of this variable by default. | ||
1134 | |||
1135 | The :term:`BUILD_LD` variable should not be set manually, and is rarely | ||
1136 | used in recipes as :term:`LD` contains the appropriate value depending on | ||
1137 | the context (native or target recipes). Exception be made for target | ||
1138 | recipes that need to use the linker from the build host at some point | ||
1139 | during the build. | ||
1024 | 1140 | ||
1025 | :term:`BUILD_LD_ARCH` | 1141 | :term:`BUILD_LD_ARCH` |
1026 | Specifies architecture-specific linker flags for the build host. By | 1142 | Specifies architecture-specific linker flags for the build host. By |
@@ -1028,10 +1144,58 @@ system and gives an overview of their function and contents. | |||
1028 | 1144 | ||
1029 | :term:`BUILD_LDFLAGS` | 1145 | :term:`BUILD_LDFLAGS` |
1030 | Specifies the flags to pass to the linker when building for the build | 1146 | Specifies the flags to pass to the linker when building for the build |
1031 | host. When building in the ``-native`` context, | 1147 | host. When building a :ref:`ref-classes-native` recipe, |
1032 | :term:`LDFLAGS` is set to the value of this variable | 1148 | :term:`LDFLAGS` is set to the value of this variable |
1033 | by default. | 1149 | by default. |
1034 | 1150 | ||
1151 | :term:`BUILD_NM` | ||
1152 | Specifies the architecture-specific utility to list symbols from object | ||
1153 | files for the build host, and its default definition is derived in part | ||
1154 | from :term:`BUILD_PREFIX`:: | ||
1155 | |||
1156 | BUILD_NM = "${BUILD_PREFIX}nm" | ||
1157 | |||
1158 | When building a :ref:`ref-classes-native` recipe, :term:`NM` is set to the | ||
1159 | value of this variable by default. | ||
1160 | |||
1161 | The :term:`BUILD_NM` variable should not be set manually, and is rarely | ||
1162 | used in recipes as :term:`NM` contains the appropriate value depending on | ||
1163 | the context (native or target recipes). Exception be made for target | ||
1164 | recipes that need to use the utility from the build host at some point | ||
1165 | during the build. | ||
1166 | |||
1167 | :term:`BUILD_OBJCOPY` | ||
1168 | Specifies the architecture-specific utility to copy object files for the | ||
1169 | build host, and its default definition is derived in part from | ||
1170 | :term:`BUILD_PREFIX`:: | ||
1171 | |||
1172 | BUILD_OBJCOPY = "${BUILD_PREFIX}objcopy" | ||
1173 | |||
1174 | When building a :ref:`ref-classes-native` recipe, :term:`OBJCOPY` is set | ||
1175 | to the value of this variable by default. | ||
1176 | |||
1177 | The :term:`BUILD_OBJCOPY` variable should not be set manually, and is | ||
1178 | rarely used in recipes as :term:`OBJCOPY` contains the appropriate value | ||
1179 | depending on the context (native or target recipes). Exception be made for | ||
1180 | target recipes that need to use the utility from the build host at some | ||
1181 | point during the build. | ||
1182 | |||
1183 | :term:`BUILD_OBJDUMP` | ||
1184 | Specifies the architecture-specific utility to display object files | ||
1185 | information for the build host, and its default definition is derived in | ||
1186 | part from :term:`BUILD_PREFIX`:: | ||
1187 | |||
1188 | BUILD_OBJDUMP = "${BUILD_PREFIX}objdump" | ||
1189 | |||
1190 | When building a :ref:`ref-classes-native` recipe, :term:`OBJDUMP` is set | ||
1191 | to the value of this variable by default. | ||
1192 | |||
1193 | The :term:`BUILD_OBJDUMP` variable should not be set manually, and is | ||
1194 | rarely used in recipes as :term:`OBJDUMP` contains the appropriate value | ||
1195 | depending on the context (native or target recipes). Exception be made for | ||
1196 | target recipes that need to use the utility from the build host at some | ||
1197 | point during the build. | ||
1198 | |||
1035 | :term:`BUILD_OPTIMIZATION` | 1199 | :term:`BUILD_OPTIMIZATION` |
1036 | Specifies the optimization flags passed to the C compiler when | 1200 | Specifies the optimization flags passed to the C compiler when |
1037 | building for the build host or the SDK. The flags are passed through | 1201 | building for the build host or the SDK. The flags are passed through |
@@ -1052,11 +1216,53 @@ system and gives an overview of their function and contents. | |||
1052 | build system uses the :term:`BUILD_PREFIX` value to set the | 1216 | build system uses the :term:`BUILD_PREFIX` value to set the |
1053 | :term:`TARGET_PREFIX` when building for :ref:`ref-classes-native` recipes. | 1217 | :term:`TARGET_PREFIX` when building for :ref:`ref-classes-native` recipes. |
1054 | 1218 | ||
1219 | :term:`BUILD_RANLIB` | ||
1220 | Specifies the architecture-specific utility to generate indexes for | ||
1221 | archives for the build host, and its default definition is derived in part | ||
1222 | from :term:`BUILD_PREFIX`:: | ||
1223 | |||
1224 | BUILD_RANLIB = "${BUILD_PREFIX}ranlib -D" | ||
1225 | |||
1226 | When building a :ref:`ref-classes-native` recipe, :term:`RANLIB` is set to | ||
1227 | the value of this variable by default. | ||
1228 | |||
1229 | The :term:`BUILD_RANLIB` variable should not be set manually, and is | ||
1230 | rarely used in recipes as :term:`RANLIB` contains the appropriate value | ||
1231 | depending on the context (native or target recipes). Exception be made for | ||
1232 | target recipes that need to use the utility from the build host at some | ||
1233 | point during the build. | ||
1234 | |||
1235 | :term:`BUILD_READELF` | ||
1236 | Specifies the architecture-specific utility to display information about | ||
1237 | ELF files for the build host, and its default definition is derived in | ||
1238 | part from :term:`BUILD_PREFIX`:: | ||
1239 | |||
1240 | BUILD_READELF = "${BUILD_PREFIX}readelf" | ||
1241 | |||
1242 | When building a :ref:`ref-classes-native` recipe, :term:`READELF` is set | ||
1243 | to the value of this variable by default. | ||
1244 | |||
1245 | The :term:`BUILD_READELF` variable should not be set manually, and is | ||
1246 | rarely used in recipes as :term:`READELF` contains the appropriate value | ||
1247 | depending on the context (native or target recipes). Exception be made for | ||
1248 | target recipes that need to use the utility from the build host at some | ||
1249 | point during the build. | ||
1250 | |||
1055 | :term:`BUILD_STRIP` | 1251 | :term:`BUILD_STRIP` |
1056 | Specifies the command to be used to strip debugging symbols from | 1252 | Specifies the command to be used to strip debugging symbols from binaries |
1057 | binaries produced for the build host. By default, :term:`BUILD_STRIP` | 1253 | produced for the build host, and its default definition is derived in part |
1058 | points to | 1254 | from :term:`BUILD_PREFIX`:: |
1059 | ``${``\ :term:`BUILD_PREFIX`\ ``}strip``. | 1255 | |
1256 | BUILD_STRIP = "${BUILD_PREFIX}strip" | ||
1257 | |||
1258 | When building a :ref:`ref-classes-native` recipe, :term:`STRIP` is set to | ||
1259 | the value of this variable by default. | ||
1260 | |||
1261 | The :term:`BUILD_STRIP` variable should not be set manually, and is | ||
1262 | rarely used in recipes as :term:`STRIP` contains the appropriate value | ||
1263 | depending on the context (native or target recipes). Exception be made for | ||
1264 | target recipes that need to use the utility from the build host at some | ||
1265 | point during the build. | ||
1060 | 1266 | ||
1061 | :term:`BUILD_SYS` | 1267 | :term:`BUILD_SYS` |
1062 | Specifies the system, including the architecture and the operating | 1268 | Specifies the system, including the architecture and the operating |
@@ -1252,6 +1458,10 @@ system and gives an overview of their function and contents. | |||
1252 | :term:`CC` | 1458 | :term:`CC` |
1253 | The minimal command and arguments used to run the C compiler. | 1459 | The minimal command and arguments used to run the C compiler. |
1254 | 1460 | ||
1461 | :term:`CCLD` | ||
1462 | The minimal command and arguments used to run the linker when the C | ||
1463 | compiler is being used as the linker. | ||
1464 | |||
1255 | :term:`CFLAGS` | 1465 | :term:`CFLAGS` |
1256 | Specifies the flags to pass to the C compiler. This variable is | 1466 | Specifies the flags to pass to the C compiler. This variable is |
1257 | exported to an environment variable and thus made visible to the | 1467 | exported to an environment variable and thus made visible to the |
@@ -1495,6 +1705,17 @@ system and gives an overview of their function and contents. | |||
1495 | :term:`CONFIGURE_FLAGS` | 1705 | :term:`CONFIGURE_FLAGS` |
1496 | The minimal arguments for GNU configure. | 1706 | The minimal arguments for GNU configure. |
1497 | 1707 | ||
1708 | :term:`CONFIGURE_SCRIPT` | ||
1709 | When using the :ref:`ref-classes-autotools` class, the | ||
1710 | :term:`CONFIGURE_SCRIPT` variable stores the location of the ``configure`` | ||
1711 | script for the Autotools build system. The default definition for this | ||
1712 | variable is:: | ||
1713 | |||
1714 | CONFIGURE_SCRIPT ?= "${AUTOTOOLS_SCRIPT_PATH}/configure" | ||
1715 | |||
1716 | Where :term:`AUTOTOOLS_SCRIPT_PATH` is the location of the of the | ||
1717 | Autotools build system scripts, which defaults to :term:`S`. | ||
1718 | |||
1498 | :term:`CONFLICT_DISTRO_FEATURES` | 1719 | :term:`CONFLICT_DISTRO_FEATURES` |
1499 | When inheriting the :ref:`ref-classes-features_check` | 1720 | When inheriting the :ref:`ref-classes-features_check` |
1500 | class, this variable identifies distribution features that would be | 1721 | class, this variable identifies distribution features that would be |
@@ -1678,9 +1899,27 @@ system and gives an overview of their function and contents. | |||
1678 | variable only in certain contexts (e.g. when building for kernel | 1899 | variable only in certain contexts (e.g. when building for kernel |
1679 | and kernel module recipes). | 1900 | and kernel module recipes). |
1680 | 1901 | ||
1902 | :term:`CVE_CHECK_CREATE_MANIFEST` | ||
1903 | Specifies whether to create a CVE manifest to place in the deploy | ||
1904 | directory. The default is "1". | ||
1905 | |||
1681 | :term:`CVE_CHECK_IGNORE` | 1906 | :term:`CVE_CHECK_IGNORE` |
1682 | This variable is deprecated and should be replaced by :term:`CVE_STATUS`. | 1907 | This variable is deprecated and should be replaced by :term:`CVE_STATUS`. |
1683 | 1908 | ||
1909 | :term:`CVE_CHECK_MANIFEST_JSON` | ||
1910 | Specifies the path to the CVE manifest in JSON format. See | ||
1911 | :term:`CVE_CHECK_CREATE_MANIFEST`. | ||
1912 | |||
1913 | :term:`CVE_CHECK_MANIFEST_JSON_SUFFIX` | ||
1914 | Allows to modify the JSON manifest suffix. See | ||
1915 | :term:`CVE_CHECK_MANIFEST_JSON`. | ||
1916 | |||
1917 | :term:`CVE_CHECK_REPORT_PATCHED` | ||
1918 | Specifies whether or not the :ref:`ref-classes-cve-check` | ||
1919 | class should report patched or ignored CVEs. The default is "1", but you | ||
1920 | may wish to set it to "0" if you do not need patched or ignored CVEs in | ||
1921 | the logs. | ||
1922 | |||
1684 | :term:`CVE_CHECK_SHOW_WARNINGS` | 1923 | :term:`CVE_CHECK_SHOW_WARNINGS` |
1685 | Specifies whether or not the :ref:`ref-classes-cve-check` | 1924 | Specifies whether or not the :ref:`ref-classes-cve-check` |
1686 | class should generate warning messages on the console when unpatched | 1925 | class should generate warning messages on the console when unpatched |
@@ -1960,7 +2199,7 @@ system and gives an overview of their function and contents. | |||
1960 | resides within the :term:`Build Directory` as ``${TMPDIR}/deploy``. | 2199 | resides within the :term:`Build Directory` as ``${TMPDIR}/deploy``. |
1961 | 2200 | ||
1962 | For more information on the structure of the Build Directory, see | 2201 | For more information on the structure of the Build Directory, see |
1963 | ":ref:`ref-manual/structure:the build directory --- \`\`build/\`\``" section. | 2202 | ":ref:`ref-manual/structure:the build directory --- ``build/```" section. |
1964 | For more detail on the contents of the ``deploy`` directory, see the | 2203 | For more detail on the contents of the ``deploy`` directory, see the |
1965 | ":ref:`overview-manual/concepts:images`", | 2204 | ":ref:`overview-manual/concepts:images`", |
1966 | ":ref:`overview-manual/concepts:package feeds`", and | 2205 | ":ref:`overview-manual/concepts:package feeds`", and |
@@ -2002,7 +2241,7 @@ system and gives an overview of their function and contents. | |||
2002 | contents of :term:`IMGDEPLOYDIR` by the :ref:`ref-classes-image` class. | 2241 | contents of :term:`IMGDEPLOYDIR` by the :ref:`ref-classes-image` class. |
2003 | 2242 | ||
2004 | For more information on the structure of the :term:`Build Directory`, see | 2243 | For more information on the structure of the :term:`Build Directory`, see |
2005 | ":ref:`ref-manual/structure:the build directory --- \`\`build/\`\``" section. | 2244 | ":ref:`ref-manual/structure:the build directory --- ``build/```" section. |
2006 | For more detail on the contents of the ``deploy`` directory, see the | 2245 | For more detail on the contents of the ``deploy`` directory, see the |
2007 | ":ref:`overview-manual/concepts:images`" and | 2246 | ":ref:`overview-manual/concepts:images`" and |
2008 | ":ref:`overview-manual/concepts:application development sdk`" sections both in | 2247 | ":ref:`overview-manual/concepts:application development sdk`" sections both in |
@@ -2501,6 +2740,13 @@ system and gives an overview of their function and contents. | |||
2501 | external tools. See the :ref:`ref-classes-kernel-yocto` class in | 2740 | external tools. See the :ref:`ref-classes-kernel-yocto` class in |
2502 | ``meta/classes-recipe`` to see how the variable is used. | 2741 | ``meta/classes-recipe`` to see how the variable is used. |
2503 | 2742 | ||
2743 | :term:`EXTERNAL_KERNEL_DEVICETREE` | ||
2744 | When inheriting :ref:`ref-classes-kernel-fitimage` and a | ||
2745 | :term:`PREFERRED_PROVIDER` for ``virtual/dtb`` set to ``devicetree``, the | ||
2746 | variable :term:`EXTERNAL_KERNEL_DEVICETREE` can be used to specify a | ||
2747 | directory containing one or more compiled device tree or device tree | ||
2748 | overlays to use. | ||
2749 | |||
2504 | :term:`KERNEL_LOCALVERSION` | 2750 | :term:`KERNEL_LOCALVERSION` |
2505 | This variable allows to append a string to the version | 2751 | This variable allows to append a string to the version |
2506 | of the kernel image. This corresponds to the ``CONFIG_LOCALVERSION`` | 2752 | of the kernel image. This corresponds to the ``CONFIG_LOCALVERSION`` |
@@ -2744,6 +2990,9 @@ system and gives an overview of their function and contents. | |||
2744 | :term:`FAKEROOTNOENV` | 2990 | :term:`FAKEROOTNOENV` |
2745 | See :term:`bitbake:FAKEROOTNOENV` in the BitBake manual. | 2991 | See :term:`bitbake:FAKEROOTNOENV` in the BitBake manual. |
2746 | 2992 | ||
2993 | :term:`FC` | ||
2994 | The minimal command and arguments used to run the Fortran compiler. | ||
2995 | |||
2747 | :term:`FEATURE_PACKAGES` | 2996 | :term:`FEATURE_PACKAGES` |
2748 | Defines one or more packages to include in an image when a specific | 2997 | Defines one or more packages to include in an image when a specific |
2749 | item is included in :term:`IMAGE_FEATURES`. | 2998 | item is included in :term:`IMAGE_FEATURES`. |
@@ -3323,6 +3572,20 @@ system and gives an overview of their function and contents. | |||
3323 | - mips | 3572 | - mips |
3324 | - mipsel | 3573 | - mipsel |
3325 | 3574 | ||
3575 | :term:`HOST_AS_ARCH` | ||
3576 | Specifies architecture-specific assembler flags. | ||
3577 | |||
3578 | Default initialization for :term:`HOST_AS_ARCH` varies depending on what | ||
3579 | is being built: | ||
3580 | |||
3581 | - :term:`TARGET_AS_ARCH` when building for the | ||
3582 | target | ||
3583 | |||
3584 | - :term:`BUILD_AS_ARCH` when building for the build host (i.e. | ||
3585 | ``-native``) | ||
3586 | |||
3587 | - :term:`SDK_AS_ARCH` when building for an SDK (i.e. ``nativesdk-``) | ||
3588 | |||
3326 | :term:`HOST_CC_ARCH` | 3589 | :term:`HOST_CC_ARCH` |
3327 | Specifies architecture-specific compiler flags that are passed to the | 3590 | Specifies architecture-specific compiler flags that are passed to the |
3328 | C compiler. | 3591 | C compiler. |
@@ -3336,8 +3599,20 @@ system and gives an overview of their function and contents. | |||
3336 | - :term:`BUILD_CC_ARCH` when building for the build host (i.e. | 3599 | - :term:`BUILD_CC_ARCH` when building for the build host (i.e. |
3337 | ``-native``) | 3600 | ``-native``) |
3338 | 3601 | ||
3339 | - ``BUILDSDK_CC_ARCH`` when building for an SDK (i.e. | 3602 | - :term:`SDK_CC_ARCH` when building for an SDK (i.e. ``nativesdk-``) |
3340 | ``nativesdk-``) | 3603 | |
3604 | :term:`HOST_LD_ARCH` | ||
3605 | Specifies architecture-specific linker flags. | ||
3606 | |||
3607 | Default initialization for :term:`HOST_LD_ARCH` varies depending on what | ||
3608 | is being built: | ||
3609 | |||
3610 | - :term:`TARGET_LD_ARCH` when building for the target | ||
3611 | |||
3612 | - :term:`BUILD_LD_ARCH` when building for the build host (i.e. | ||
3613 | ``-native``) | ||
3614 | |||
3615 | - :term:`SDK_LD_ARCH` when building for an SDK (i.e. ``nativesdk-``) | ||
3341 | 3616 | ||
3342 | :term:`HOST_OS` | 3617 | :term:`HOST_OS` |
3343 | Specifies the name of the target operating system, which is normally | 3618 | Specifies the name of the target operating system, which is normally |
@@ -3878,6 +4153,36 @@ system and gives an overview of their function and contents. | |||
3878 | 4153 | ||
3879 | IMAGE_ROOTFS_EXTRA_SPACE = "41943040" | 4154 | IMAGE_ROOTFS_EXTRA_SPACE = "41943040" |
3880 | 4155 | ||
4156 | :term:`IMAGE_ROOTFS_MAXSIZE` | ||
4157 | Defines the maximum allowed size of the generated image in kilobytes. | ||
4158 | The build will fail if the generated image size exceeds this value. | ||
4159 | |||
4160 | The generated image size undergoes several calculation steps before being | ||
4161 | compared to :term:`IMAGE_ROOTFS_MAXSIZE`. | ||
4162 | In the first step, the size of the directory pointed to by :term:`IMAGE_ROOTFS` | ||
4163 | is calculated. | ||
4164 | In the second step, the result from the first step is multiplied | ||
4165 | by :term:`IMAGE_OVERHEAD_FACTOR`. | ||
4166 | In the third step, the result from the second step is compared with | ||
4167 | :term:`IMAGE_ROOTFS_SIZE`. The larger value of these is added to | ||
4168 | :term:`IMAGE_ROOTFS_EXTRA_SPACE`. | ||
4169 | In the fourth step, the result from the third step is checked for | ||
4170 | a decimal part. If it has one, it is rounded up to the next integer. | ||
4171 | If it does not, it is simply converted into an integer. | ||
4172 | In the fifth step, the :term:`IMAGE_ROOTFS_ALIGNMENT` is added to the result | ||
4173 | from the fourth step and "1" is subtracted. | ||
4174 | In the sixth step, the remainder of the division between the result | ||
4175 | from the fifth step and :term:`IMAGE_ROOTFS_ALIGNMENT` is subtracted from the | ||
4176 | result of the fifth step. In this way, the result from the fourth step is | ||
4177 | rounded up to the nearest multiple of :term:`IMAGE_ROOTFS_ALIGNMENT`. | ||
4178 | |||
4179 | Thus, if the :term:`IMAGE_ROOTFS_MAXSIZE` is set, is compared with the result | ||
4180 | of the above calculations and is independent of the final image type. | ||
4181 | No default value is set for :term:`IMAGE_ROOTFS_MAXSIZE`. | ||
4182 | |||
4183 | It's a good idea to set this variable for images that need to fit on a limited | ||
4184 | space (e.g. SD card, a fixed-size partition, ...). | ||
4185 | |||
3881 | :term:`IMAGE_ROOTFS_SIZE` | 4186 | :term:`IMAGE_ROOTFS_SIZE` |
3882 | Defines the size in Kbytes for the generated image. The OpenEmbedded | 4187 | Defines the size in Kbytes for the generated image. The OpenEmbedded |
3883 | build system determines the final size for the generated image using | 4188 | build system determines the final size for the generated image using |
@@ -4059,6 +4364,23 @@ system and gives an overview of their function and contents. | |||
4059 | Set the variable to "1" to prevent the default dependencies from | 4364 | Set the variable to "1" to prevent the default dependencies from |
4060 | being added. | 4365 | being added. |
4061 | 4366 | ||
4367 | :term:`INHIBIT_DEFAULT_RUST_DEPS` | ||
4368 | Prevents the :ref:`ref-classes-rust` class from automatically adding | ||
4369 | its default build-time dependencies. | ||
4370 | |||
4371 | When a recipe inherits the :ref:`ref-classes-rust` class, several | ||
4372 | tools such as ``rust-native`` and ``${RUSTLIB_DEP}`` (only added when cross-compiling) are added | ||
4373 | to :term:`DEPENDS` to support the ``rust`` build process. | ||
4374 | |||
4375 | To prevent the build system from adding these dependencies automatically, | ||
4376 | set the :term:`INHIBIT_DEFAULT_RUST_DEPS` variable as follows:: | ||
4377 | |||
4378 | INHIBIT_DEFAULT_RUST_DEPS = "1" | ||
4379 | |||
4380 | By default, the value of :term:`INHIBIT_DEFAULT_RUST_DEPS` is empty. Setting | ||
4381 | it to "0" does not disable inhibition. Only the empty string will disable | ||
4382 | inhibition. | ||
4383 | |||
4062 | :term:`INHIBIT_PACKAGE_DEBUG_SPLIT` | 4384 | :term:`INHIBIT_PACKAGE_DEBUG_SPLIT` |
4063 | Prevents the OpenEmbedded build system from splitting out debug | 4385 | Prevents the OpenEmbedded build system from splitting out debug |
4064 | information during packaging. By default, the build system splits out | 4386 | information during packaging. By default, the build system splits out |
@@ -4105,6 +4427,25 @@ system and gives an overview of their function and contents. | |||
4105 | even if the toolchain's binaries are strippable, there are other files | 4427 | even if the toolchain's binaries are strippable, there are other files |
4106 | needed for the build that are not strippable. | 4428 | needed for the build that are not strippable. |
4107 | 4429 | ||
4430 | :term:`INHIBIT_UPDATERCD_BBCLASS` | ||
4431 | Prevents the :ref:`ref-classes-update-rc.d` class from automatically | ||
4432 | installing and registering SysV init scripts for packages. | ||
4433 | |||
4434 | When a recipe inherits the :ref:`ref-classes-update-rc.d` class, init | ||
4435 | scripts are typically installed and registered for the packages listed in | ||
4436 | :term:`INITSCRIPT_PACKAGES`. This ensures that the relevant | ||
4437 | services are started and stopped at the appropriate runlevels using the | ||
4438 | traditional SysV init system. | ||
4439 | |||
4440 | To prevent the build system from adding these scripts and configurations | ||
4441 | automatically, set the :term:`INHIBIT_UPDATERCD_BBCLASS` variable as follows:: | ||
4442 | |||
4443 | INHIBIT_UPDATERCD_BBCLASS = "1" | ||
4444 | |||
4445 | By default, the value of :term:`INHIBIT_UPDATERCD_BBCLASS` is empty. Setting | ||
4446 | it to "0" does not disable inhibition. Only the empty string will disable | ||
4447 | inhibition. | ||
4448 | |||
4108 | :term:`INIT_MANAGER` | 4449 | :term:`INIT_MANAGER` |
4109 | Specifies the system init manager to use. Available options are: | 4450 | Specifies the system init manager to use. Available options are: |
4110 | 4451 | ||
@@ -4271,6 +4612,20 @@ system and gives an overview of their function and contents. | |||
4271 | See the :term:`MACHINE` variable for additional | 4612 | See the :term:`MACHINE` variable for additional |
4272 | information. | 4613 | information. |
4273 | 4614 | ||
4615 | :term:`INITRAMFS_MAXSIZE` | ||
4616 | Defines the maximum allowed size of the :term:`Initramfs` image in Kbytes. | ||
4617 | The build will fail if the :term:`Initramfs` image size exceeds this value. | ||
4618 | |||
4619 | The :term:`Initramfs` image size undergoes several calculation steps before | ||
4620 | being compared to :term:`INITRAMFS_MAXSIZE`. | ||
4621 | These steps are the same as those used for :term:`IMAGE_ROOTFS_MAXSIZE` | ||
4622 | and are described in detail in that entry. | ||
4623 | |||
4624 | Thus, :term:`INITRAMFS_MAXSIZE` is compared with the result of the calculations | ||
4625 | and is independent of the final image type (e.g. compressed). | ||
4626 | A default value for :term:`INITRAMFS_MAXSIZE` is set in | ||
4627 | :oe_git:`meta/conf/bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>`. | ||
4628 | |||
4274 | :term:`INITRAMFS_MULTICONFIG` | 4629 | :term:`INITRAMFS_MULTICONFIG` |
4275 | Defines the multiconfig to create a multiconfig dependency to be used by | 4630 | Defines the multiconfig to create a multiconfig dependency to be used by |
4276 | the :ref:`ref-classes-kernel` class. | 4631 | the :ref:`ref-classes-kernel` class. |
@@ -4336,8 +4691,7 @@ system and gives an overview of their function and contents. | |||
4336 | 4691 | ||
4337 | The value in :term:`INITSCRIPT_PARAMS` is passed through to the | 4692 | The value in :term:`INITSCRIPT_PARAMS` is passed through to the |
4338 | ``update-rc.d`` command. For more information on valid parameters, | 4693 | ``update-rc.d`` command. For more information on valid parameters, |
4339 | please see the ``update-rc.d`` manual page at | 4694 | please see the manual page: :manpage:`update-rc.d <update-rc.d(8)>`. |
4340 | https://manpages.debian.org/buster/init-system-helpers/update-rc.d.8.en.html | ||
4341 | 4695 | ||
4342 | :term:`INSANE_SKIP` | 4696 | :term:`INSANE_SKIP` |
4343 | Specifies the QA checks to skip for a specific package within a | 4697 | Specifies the QA checks to skip for a specific package within a |
@@ -4454,15 +4808,8 @@ system and gives an overview of their function and contents. | |||
4454 | options not explicitly specified will be disabled in the kernel | 4808 | options not explicitly specified will be disabled in the kernel |
4455 | config. | 4809 | config. |
4456 | 4810 | ||
4457 | In case :term:`KCONFIG_MODE` is not set the behaviour will depend on where | 4811 | In case :term:`KCONFIG_MODE` is not set the ``defconfig`` file |
4458 | the ``defconfig`` file is coming from. An "in-tree" ``defconfig`` file | 4812 | will be handled in ``allnoconfig`` mode. |
4459 | will be handled in ``alldefconfig`` mode, a ``defconfig`` file placed | ||
4460 | in ``${WORKDIR}`` through a meta-layer will be handled in | ||
4461 | ``allnoconfig`` mode. | ||
4462 | |||
4463 | An "in-tree" ``defconfig`` file can be selected via the | ||
4464 | :term:`KBUILD_DEFCONFIG` variable. :term:`KCONFIG_MODE` does not need to | ||
4465 | be explicitly set. | ||
4466 | 4813 | ||
4467 | A ``defconfig`` file compatible with ``allnoconfig`` mode can be | 4814 | A ``defconfig`` file compatible with ``allnoconfig`` mode can be |
4468 | generated by copying the ``.config`` file from a working Linux kernel | 4815 | generated by copying the ``.config`` file from a working Linux kernel |
@@ -4906,7 +5253,8 @@ system and gives an overview of their function and contents. | |||
4906 | ``LAYERVERSION_mylayer``). | 5253 | ``LAYERVERSION_mylayer``). |
4907 | 5254 | ||
4908 | :term:`LD` | 5255 | :term:`LD` |
4909 | The minimal command and arguments used to run the linker. | 5256 | The minimal command and arguments used to run the :manpage:`linker |
5257 | <ld(1)>`. | ||
4910 | 5258 | ||
4911 | :term:`LDFLAGS` | 5259 | :term:`LDFLAGS` |
4912 | Specifies the flags to pass to the linker. This variable is exported | 5260 | Specifies the flags to pass to the linker. This variable is exported |
@@ -5084,7 +5432,7 @@ system and gives an overview of their function and contents. | |||
5084 | The :term:`LINUX_VERSION` variable is used to define :term:`PV` | 5432 | The :term:`LINUX_VERSION` variable is used to define :term:`PV` |
5085 | for the recipe:: | 5433 | for the recipe:: |
5086 | 5434 | ||
5087 | PV = "${LINUX_VERSION}+git${SRCPV}" | 5435 | PV = "${LINUX_VERSION}+git" |
5088 | 5436 | ||
5089 | :term:`LINUX_VERSION_EXTENSION` | 5437 | :term:`LINUX_VERSION_EXTENSION` |
5090 | A string extension compiled into the version string of the Linux | 5438 | A string extension compiled into the version string of the Linux |
@@ -5512,7 +5860,7 @@ system and gives an overview of their function and contents. | |||
5512 | variable is set. | 5860 | variable is set. |
5513 | 5861 | ||
5514 | :term:`NM` | 5862 | :term:`NM` |
5515 | The minimal command and arguments to run ``nm``. | 5863 | The minimal command and arguments to run :manpage:`nm <nm(1)>`. |
5516 | 5864 | ||
5517 | :term:`NO_GENERIC_LICENSE` | 5865 | :term:`NO_GENERIC_LICENSE` |
5518 | Avoids QA errors when you use a non-common, non-CLOSED license in a | 5866 | Avoids QA errors when you use a non-common, non-CLOSED license in a |
@@ -5586,10 +5934,10 @@ system and gives an overview of their function and contents. | |||
5586 | NON_MULTILIB_RECIPES = "grub grub-efi make-mod-scripts ovmf u-boot" | 5934 | NON_MULTILIB_RECIPES = "grub grub-efi make-mod-scripts ovmf u-boot" |
5587 | 5935 | ||
5588 | :term:`OBJCOPY` | 5936 | :term:`OBJCOPY` |
5589 | The minimal command and arguments to run ``objcopy``. | 5937 | The minimal command and arguments to run :manpage:`objcopy <objcopy(1)>`. |
5590 | 5938 | ||
5591 | :term:`OBJDUMP` | 5939 | :term:`OBJDUMP` |
5592 | The minimal command and arguments to run ``objdump``. | 5940 | The minimal command and arguments to run :manpage:`objdump <objdump(1)>`. |
5593 | 5941 | ||
5594 | :term:`OE_BINCONFIG_EXTRA_MANGLE` | 5942 | :term:`OE_BINCONFIG_EXTRA_MANGLE` |
5595 | When inheriting the :ref:`ref-classes-binconfig` class, | 5943 | When inheriting the :ref:`ref-classes-binconfig` class, |
@@ -5614,14 +5962,6 @@ system and gives an overview of their function and contents. | |||
5614 | 5962 | ||
5615 | OECMAKE_GENERATOR = "Unix Makefiles" | 5963 | OECMAKE_GENERATOR = "Unix Makefiles" |
5616 | 5964 | ||
5617 | :term:`OE_IMPORTS` | ||
5618 | An internal variable used to tell the OpenEmbedded build system what | ||
5619 | Python modules to import for every Python function run by the system. | ||
5620 | |||
5621 | .. note:: | ||
5622 | |||
5623 | Do not set this variable. It is for internal use only. | ||
5624 | |||
5625 | :term:`OE_INIT_ENV_SCRIPT` | 5965 | :term:`OE_INIT_ENV_SCRIPT` |
5626 | The name of the build environment setup script for the purposes of | 5966 | The name of the build environment setup script for the purposes of |
5627 | setting up the environment within the extensible SDK. The default | 5967 | setting up the environment within the extensible SDK. The default |
@@ -5684,6 +6024,13 @@ system and gives an overview of their function and contents. | |||
5684 | :term:`OPKG_MAKE_INDEX_EXTRA_PARAMS` | 6024 | :term:`OPKG_MAKE_INDEX_EXTRA_PARAMS` |
5685 | Specifies extra parameters for the ``opkg-make-index`` command. | 6025 | Specifies extra parameters for the ``opkg-make-index`` command. |
5686 | 6026 | ||
6027 | :term:`OPKGBUILDCMD` | ||
6028 | The variable :term:`OPKGBUILDCMD` specifies the command used to build opkg | ||
6029 | packages when using the :ref:`ref-classes-package_ipk` class. It is | ||
6030 | defined in :ref:`ref-classes-package_ipk` as:: | ||
6031 | |||
6032 | OPKGBUILDCMD ??= 'opkg-build -Z zstd -a "${ZSTD_DEFAULTS}"' | ||
6033 | |||
5687 | :term:`OVERLAYFS_ETC_DEVICE` | 6034 | :term:`OVERLAYFS_ETC_DEVICE` |
5688 | When the :ref:`ref-classes-overlayfs-etc` class is | 6035 | When the :ref:`ref-classes-overlayfs-etc` class is |
5689 | inherited, specifies the device to be mounted for the read/write | 6036 | inherited, specifies the device to be mounted for the read/write |
@@ -6450,7 +6797,7 @@ system and gives an overview of their function and contents. | |||
6450 | For examples of how this data is used, see the | 6797 | For examples of how this data is used, see the |
6451 | ":ref:`overview-manual/concepts:automatically added runtime dependencies`" | 6798 | ":ref:`overview-manual/concepts:automatically added runtime dependencies`" |
6452 | section in the Yocto Project Overview and Concepts Manual and the | 6799 | section in the Yocto Project Overview and Concepts Manual and the |
6453 | ":ref:`dev-manual/debugging:viewing package information with \`\`oe-pkgdata-util\`\``" | 6800 | ":ref:`dev-manual/debugging:viewing package information with ``oe-pkgdata-util```" |
6454 | section in the Yocto Project Development Tasks Manual. For more | 6801 | section in the Yocto Project Development Tasks Manual. For more |
6455 | information on the shared, global-state directory, see | 6802 | information on the shared, global-state directory, see |
6456 | :term:`STAGING_DIR_HOST`. | 6803 | :term:`STAGING_DIR_HOST`. |
@@ -6491,6 +6838,23 @@ system and gives an overview of their function and contents. | |||
6491 | The version of the package(s) built by the recipe. By default, | 6838 | The version of the package(s) built by the recipe. By default, |
6492 | :term:`PKGV` is set to :term:`PV`. | 6839 | :term:`PKGV` is set to :term:`PV`. |
6493 | 6840 | ||
6841 | If :term:`PV` contains the ``+`` sign, source control information will be | ||
6842 | included in :term:`PKGV` later in the packaging phase. For more | ||
6843 | information, see the :doc:`/dev-manual/external-scm` section of the Yocto | ||
6844 | Project Development Tasks Manual. | ||
6845 | |||
6846 | .. warning:: | ||
6847 | |||
6848 | Since source control information is included in a late stage by the | ||
6849 | :ref:`ref-classes-package` class, it cannot be seen from the BitBake | ||
6850 | environment with ``bitbake -e`` or ``bitbake-getvar``. Instead, after | ||
6851 | the package is built, the version information can be retrieved with | ||
6852 | ``oe-pkgdata-util package-info <package name>``. See the | ||
6853 | :ref:`dev-manual/debugging:Viewing Package Information with | ||
6854 | ``oe-pkgdata-util``` section of the Yocto Project Development Tasks | ||
6855 | Manual for more information on ``oe-pkgdata-util``. | ||
6856 | |||
6857 | |||
6494 | :term:`PN` | 6858 | :term:`PN` |
6495 | This variable can have two separate functions depending on the | 6859 | This variable can have two separate functions depending on the |
6496 | context: a recipe name or a resulting package name. | 6860 | context: a recipe name or a resulting package name. |
@@ -6625,22 +6989,14 @@ system and gives an overview of their function and contents. | |||
6625 | string. You cannot use the wildcard character in any other | 6989 | string. You cannot use the wildcard character in any other |
6626 | location of the string. | 6990 | location of the string. |
6627 | 6991 | ||
6628 | The specified version is matched against :term:`PV`, which | 6992 | The specified version is matched against :term:`PV`, which does not |
6629 | does not necessarily match the version part of the recipe's filename. | 6993 | necessarily match the version part of the recipe's filename. |
6630 | For example, consider two recipes ``foo_1.2.bb`` and ``foo_git.bb`` | ||
6631 | where ``foo_git.bb`` contains the following assignment:: | ||
6632 | |||
6633 | PV = "1.1+git${SRCPV}" | ||
6634 | |||
6635 | In this case, the correct way to select | ||
6636 | ``foo_git.bb`` is by using an assignment such as the following:: | ||
6637 | |||
6638 | PREFERRED_VERSION_foo = "1.1+git%" | ||
6639 | 6994 | ||
6640 | Compare that previous example | 6995 | If you want to select a recipe named ``foo_git.bb`` which has :term:`PV` |
6641 | against the following incorrect example, which does not work:: | 6996 | set to ``1.2.3+git``, you can do so by setting ```PREFERRED_VERSION_foo`` |
6642 | 6997 | to ``1.2.3%`` (i.e. simply setting ``PREFERRED_VERSION_foo`` to ``git`` | |
6643 | PREFERRED_VERSION_foo = "git" | 6998 | will not work as the name of the recipe isn't used, but rather its |
6999 | :term:`PV` definition). | ||
6644 | 7000 | ||
6645 | Sometimes the :term:`PREFERRED_VERSION` variable can be set by | 7001 | Sometimes the :term:`PREFERRED_VERSION` variable can be set by |
6646 | configuration files in a way that is hard to change. You can use | 7002 | configuration files in a way that is hard to change. You can use |
@@ -6805,7 +7161,7 @@ system and gives an overview of their function and contents. | |||
6805 | 7161 | ||
6806 | :term:`PTEST_ENABLED` | 7162 | :term:`PTEST_ENABLED` |
6807 | Specifies whether or not :ref:`Package | 7163 | Specifies whether or not :ref:`Package |
6808 | Test <dev-manual/packages:testing packages with ptest>` (ptest) | 7164 | Test <test-manual/ptest:testing packages with ptest>` (ptest) |
6809 | functionality is enabled when building a recipe. You should not set | 7165 | functionality is enabled when building a recipe. You should not set |
6810 | this variable directly. Enabling and disabling building Package Tests | 7166 | this variable directly. Enabling and disabling building Package Tests |
6811 | at build time should be done by adding "ptest" to (or removing it | 7167 | at build time should be done by adding "ptest" to (or removing it |
@@ -6862,7 +7218,7 @@ system and gives an overview of their function and contents. | |||
6862 | QA_EMPTY_DIRS_RECOMMENDATION:/dev = "but all devices must be created at runtime" | 7218 | QA_EMPTY_DIRS_RECOMMENDATION:/dev = "but all devices must be created at runtime" |
6863 | 7219 | ||
6864 | :term:`RANLIB` | 7220 | :term:`RANLIB` |
6865 | The minimal command and arguments to run ``ranlib``. | 7221 | The minimal command and arguments to run :manpage:`ranlib <ranlib(1)>`. |
6866 | 7222 | ||
6867 | :term:`RCONFLICTS` | 7223 | :term:`RCONFLICTS` |
6868 | The list of packages that conflict with packages. Note that packages | 7224 | The list of packages that conflict with packages. Note that packages |
@@ -6999,6 +7355,9 @@ system and gives an overview of their function and contents. | |||
6999 | ":ref:`bitbake-user-manual/bitbake-user-manual-execution:dependencies`" sections in the | 7355 | ":ref:`bitbake-user-manual/bitbake-user-manual-execution:dependencies`" sections in the |
7000 | BitBake User Manual for additional information on tasks and dependencies. | 7356 | BitBake User Manual for additional information on tasks and dependencies. |
7001 | 7357 | ||
7358 | :term:`READELF` | ||
7359 | The minimal command and arguments to run :manpage:`readelf <readelf(1)>`. | ||
7360 | |||
7002 | :term:`RECIPE_MAINTAINER` | 7361 | :term:`RECIPE_MAINTAINER` |
7003 | This variable defines the name and e-mail address of the maintainer of a | 7362 | This variable defines the name and e-mail address of the maintainer of a |
7004 | recipe. Such information can be used by human users submitted changes, | 7363 | recipe. Such information can be used by human users submitted changes, |
@@ -7093,17 +7452,12 @@ system and gives an overview of their function and contents. | |||
7093 | prefer to have a read-only root filesystem and prefer to keep | 7452 | prefer to have a read-only root filesystem and prefer to keep |
7094 | writeable data in one place. | 7453 | writeable data in one place. |
7095 | 7454 | ||
7096 | You can override the default by setting the variable in any layer or | 7455 | When setting ``INIT_MANAGER = systemd``, the default will be set to:: |
7097 | in the ``local.conf`` file. Because the default is set using a "weak" | ||
7098 | assignment (i.e. "??="), you can use either of the following forms to | ||
7099 | define your override:: | ||
7100 | 7456 | ||
7101 | ROOT_HOME = "/root" | ||
7102 | ROOT_HOME ?= "/root" | 7457 | ROOT_HOME ?= "/root" |
7103 | 7458 | ||
7104 | These | 7459 | You can also override the default by setting the variable in your distro |
7105 | override examples use ``/root``, which is probably the most commonly | 7460 | configuration or in the ``local.conf`` file. |
7106 | used override. | ||
7107 | 7461 | ||
7108 | :term:`ROOTFS` | 7462 | :term:`ROOTFS` |
7109 | Indicates a filesystem image to include as the root filesystem. | 7463 | Indicates a filesystem image to include as the root filesystem. |
@@ -7348,11 +7702,21 @@ system and gives an overview of their function and contents. | |||
7348 | 7702 | ||
7349 | Only one archive type can be specified. | 7703 | Only one archive type can be specified. |
7350 | 7704 | ||
7705 | :term:`SDK_AS_ARCH` | ||
7706 | Specifies architecture-specific assembler flags when building | ||
7707 | :ref:`ref-classes-nativesdk` recipes. By default, the value of | ||
7708 | :term:`SDK_AS_ARCH` equals the one of :term:`BUILD_AS_ARCH`. | ||
7709 | |||
7351 | :term:`SDK_BUILDINFO_FILE` | 7710 | :term:`SDK_BUILDINFO_FILE` |
7352 | When using the :ref:`ref-classes-image-buildinfo` class, | 7711 | When using the :ref:`ref-classes-image-buildinfo` class, |
7353 | specifies the file in the SDK to write the build information into. The | 7712 | specifies the file in the SDK to write the build information into. The |
7354 | default value is "``/buildinfo``". | 7713 | default value is "``/buildinfo``". |
7355 | 7714 | ||
7715 | :term:`SDK_CC_ARCH` | ||
7716 | Specifies the architecture-specific C compiler flags when building | ||
7717 | :ref:`ref-classes-nativesdk` recipes. By default, the value of | ||
7718 | :term:`SDK_CC_ARCH` equals the one of :term:`BUILD_CC_ARCH`. | ||
7719 | |||
7356 | :term:`SDK_CUSTOM_TEMPLATECONF` | 7720 | :term:`SDK_CUSTOM_TEMPLATECONF` |
7357 | When building the extensible SDK, if :term:`SDK_CUSTOM_TEMPLATECONF` is set to | 7721 | When building the extensible SDK, if :term:`SDK_CUSTOM_TEMPLATECONF` is set to |
7358 | "1" and a ``conf/templateconf.cfg`` file exists in the :term:`Build Directory` | 7722 | "1" and a ``conf/templateconf.cfg`` file exists in the :term:`Build Directory` |
@@ -7434,6 +7798,11 @@ system and gives an overview of their function and contents. | |||
7434 | :term:`SDK_EXT_TYPE` is set to "minimal", and defaults to "1" if | 7798 | :term:`SDK_EXT_TYPE` is set to "minimal", and defaults to "1" if |
7435 | :term:`SDK_EXT_TYPE` is set to "full". | 7799 | :term:`SDK_EXT_TYPE` is set to "full". |
7436 | 7800 | ||
7801 | :term:`SDK_LD_ARCH` | ||
7802 | Specifies architecture-specific linker flags when building | ||
7803 | :ref:`ref-classes-nativesdk` recipes. By default, the value of | ||
7804 | :term:`SDK_LD_ARCH` equals the one of :term:`BUILD_LD_ARCH`. | ||
7805 | |||
7437 | :term:`SDK_NAME` | 7806 | :term:`SDK_NAME` |
7438 | The base name for SDK output files. The default value (as set in | 7807 | The base name for SDK output files. The default value (as set in |
7439 | ``meta-poky/conf/distro/poky.conf``) is derived from the | 7808 | ``meta-poky/conf/distro/poky.conf``) is derived from the |
@@ -7725,6 +8094,53 @@ system and gives an overview of their function and contents. | |||
7725 | might break at runtime if the interface of the recipe was changed | 8094 | might break at runtime if the interface of the recipe was changed |
7726 | after the other had been built. | 8095 | after the other had been built. |
7727 | 8096 | ||
8097 | :term:`SIGGEN_LOCKEDSIGS` | ||
8098 | The list of locked tasks, with the form:: | ||
8099 | |||
8100 | SIGGEN_LOCKEDSIGS += "<package>:<task>:<signature>" | ||
8101 | |||
8102 | If ``<signature>`` exists for the specified ``<task>`` and ``<package>`` | ||
8103 | in the sstate cache, BitBake will use the cached output instead of | ||
8104 | rebuilding the ``<task>``. If it does not exist, BitBake will build the | ||
8105 | ``<task>`` and the sstate cache will be used next time. | ||
8106 | |||
8107 | Example:: | ||
8108 | |||
8109 | SIGGEN_LOCKEDSIGS += "bc:do_compile:09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0" | ||
8110 | |||
8111 | You can obtain the signature of all the tasks for the recipe ``bc`` using:: | ||
8112 | |||
8113 | bitbake -S none bc | ||
8114 | |||
8115 | Then you can look at files in ``build/tmp/stamps/<arch>/bc`` and look for | ||
8116 | files like: ``<PV>.do_compile.sigdata.09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0``. | ||
8117 | |||
8118 | Alternatively, you can also use :doc:`bblock </dev-manual/bblock>` to | ||
8119 | generate this line for you. | ||
8120 | |||
8121 | :term:`SIGGEN_LOCKEDSIGS_TASKSIG_CHECK` | ||
8122 | Specifies the debug level of task signature check. 3 levels are supported: | ||
8123 | |||
8124 | * ``info``: displays a "Note" message to remind the user that a task is locked | ||
8125 | and the current signature matches the locked one. | ||
8126 | * ``warn``: displays a "Warning" message if a task is locked and the current | ||
8127 | signature does not match the locked one. | ||
8128 | * ``error``: same as warn but displays an "Error" message and aborts. | ||
8129 | |||
8130 | :term:`SIGGEN_LOCKEDSIGS_TYPES` | ||
8131 | Allowed overrides for :term:`SIGGEN_LOCKEDSIGS`. This is mainly used | ||
8132 | for architecture specific locks. A common value for | ||
8133 | :term:`SIGGEN_LOCKEDSIGS_TYPES` is ``${PACKAGE_ARCHS}``:: | ||
8134 | |||
8135 | SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}" | ||
8136 | |||
8137 | SIGGEN_LOCKEDSIGS_core2-64 += "bc:do_compile:09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0" | ||
8138 | SIGGEN_LOCKEDSIGS_cortexa57 += "bc:do_compile:12178eb6d55ef602a8fe638e49862fd247e07b228f0f08967697b655bfe4bb61" | ||
8139 | |||
8140 | Here, the ``do_compile`` task from ``bc`` will be locked only for | ||
8141 | ``core2-64`` and ``cortexa57`` but not for other architectures such as | ||
8142 | ``mips32r2``. | ||
8143 | |||
7728 | :term:`SITEINFO_BITS` | 8144 | :term:`SITEINFO_BITS` |
7729 | Specifies the number of bits for the target system CPU. The value | 8145 | Specifies the number of bits for the target system CPU. The value |
7730 | should be either "32" or "64". | 8146 | should be either "32" or "64". |
@@ -7835,6 +8251,31 @@ system and gives an overview of their function and contents. | |||
7835 | 8251 | ||
7836 | You can specify only a single URL in :term:`SOURCE_MIRROR_URL`. | 8252 | You can specify only a single URL in :term:`SOURCE_MIRROR_URL`. |
7837 | 8253 | ||
8254 | .. note:: | ||
8255 | |||
8256 | If the mirror is protected behind a username and password, the | ||
8257 | :term:`build host` needs to be configured so the :term:`build system | ||
8258 | <OpenEmbedded Build System>` is able to fetch from the mirror. | ||
8259 | |||
8260 | The recommended way to do that is by setting the following parameters | ||
8261 | in ``$HOME/.netrc`` (``$HOME`` being the :term:`build host` home | ||
8262 | directory):: | ||
8263 | |||
8264 | machine example.com | ||
8265 | login <user> | ||
8266 | password <password> | ||
8267 | |||
8268 | This file requires permissions set to ``400`` or ``600`` to prevent | ||
8269 | other users from reading the file:: | ||
8270 | |||
8271 | chmod 600 "$HOME/.netrc" | ||
8272 | |||
8273 | Another method to configure the username and password is from the URL | ||
8274 | in :term:`SOURCE_MIRROR_URL` directly, with the ``user`` and ``pswd`` | ||
8275 | parameters:: | ||
8276 | |||
8277 | SOURCE_MIRROR_URL = "http://example.com/my_source_mirror;user=<user>;pswd=<password>" | ||
8278 | |||
7838 | :term:`SPDX_ARCHIVE_PACKAGED` | 8279 | :term:`SPDX_ARCHIVE_PACKAGED` |
7839 | This option allows to add to :term:`SPDX` output compressed archives | 8280 | This option allows to add to :term:`SPDX` output compressed archives |
7840 | of the files in the generated target packages. | 8281 | of the files in the generated target packages. |
@@ -8009,7 +8450,7 @@ system and gives an overview of their function and contents. | |||
8009 | class. | 8450 | class. |
8010 | 8451 | ||
8011 | :term:`SPL_SIGN_KEYNAME` | 8452 | :term:`SPL_SIGN_KEYNAME` |
8012 | The name of keys used by the :ref:`ref-classes-kernel-fitimage` class | 8453 | The name of keys used by the :ref:`ref-classes-uboot-sign` class |
8013 | for signing U-Boot FIT image stored in the :term:`SPL_SIGN_KEYDIR` | 8454 | for signing U-Boot FIT image stored in the :term:`SPL_SIGN_KEYDIR` |
8014 | directory. If we have for example a ``dev.key`` key and a ``dev.crt`` | 8455 | directory. If we have for example a ``dev.key`` key and a ``dev.crt`` |
8015 | certificate stored in the :term:`SPL_SIGN_KEYDIR` directory, you will | 8456 | certificate stored in the :term:`SPL_SIGN_KEYDIR` directory, you will |
@@ -8115,21 +8556,23 @@ system and gives an overview of their function and contents. | |||
8115 | (SCM). | 8556 | (SCM). |
8116 | 8557 | ||
8117 | :term:`SRCPV` | 8558 | :term:`SRCPV` |
8118 | Returns the version string of the current package. This string is | 8559 | The variable :term:`SRCPV` is deprecated. It was previously used to |
8119 | used to help define the value of :term:`PV`. | 8560 | include source control information in :term:`PV` for :term:`bitbake` to |
8561 | work correctly but this is no longer a requirement. Source control | ||
8562 | information will be automatically included by :term:`bitbake` in the | ||
8563 | variable :term:`PKGV` during packaging if the ``+`` sign is present in | ||
8564 | :term:`PV`. | ||
8120 | 8565 | ||
8121 | The :term:`SRCPV` variable is defined in the ``meta/conf/bitbake.conf`` | 8566 | .. note:: |
8122 | configuration file in the :term:`Source Directory` as | ||
8123 | follows:: | ||
8124 | 8567 | ||
8125 | SRCPV = "${@bb.fetch2.get_srcrev(d)}" | 8568 | The :term:`SRCPV` variable used to be defined in the |
8569 | ``meta/conf/bitbake.conf`` configuration file in the :term:`Source | ||
8570 | Directory` as follows:: | ||
8126 | 8571 | ||
8127 | Recipes that need to define :term:`PV` do so with the help of the | 8572 | SRCPV = "${@bb.fetch2.get_srcrev(d)}" |
8128 | :term:`SRCPV`. For example, the ``ofono`` recipe (``ofono_git.bb``) | ||
8129 | located in ``meta/recipes-connectivity`` in the Source Directory | ||
8130 | defines :term:`PV` as follows:: | ||
8131 | 8573 | ||
8132 | PV = "0.12-git${SRCPV}" | 8574 | The ``get_srcrev`` function can still be used to include source control |
8575 | information in variables manually. | ||
8133 | 8576 | ||
8134 | :term:`SRCREV` | 8577 | :term:`SRCREV` |
8135 | The revision of the source code used to build the package. This | 8578 | The revision of the source code used to build the package. This |
@@ -8240,10 +8683,38 @@ system and gives an overview of their function and contents. | |||
8240 | file://.* https://someserver.tld/share/sstate/PATH;downloadfilename=PATH \ | 8683 | file://.* https://someserver.tld/share/sstate/PATH;downloadfilename=PATH \ |
8241 | file://.* file:///some-local-dir/sstate/PATH" | 8684 | file://.* file:///some-local-dir/sstate/PATH" |
8242 | 8685 | ||
8686 | .. note:: | ||
8687 | |||
8688 | If the mirror is protected behind a username and password, the | ||
8689 | :term:`build host` needs to be configured so the :term:`build system | ||
8690 | <OpenEmbedded Build System>` is able to download the sstate cache using | ||
8691 | authentication. | ||
8692 | |||
8693 | The recommended way to do that is by setting the following parameters | ||
8694 | in ``$HOME/.netrc`` (``$HOME`` being the :term:`build host` home | ||
8695 | directory):: | ||
8696 | |||
8697 | machine someserver.tld | ||
8698 | login <user> | ||
8699 | password <password> | ||
8700 | |||
8701 | This file requires permissions set to ``400`` or ``600`` to prevent | ||
8702 | other users from reading the file:: | ||
8703 | |||
8704 | chmod 600 "$HOME/.netrc" | ||
8705 | |||
8706 | Another method to configure the username and password is from the | ||
8707 | URL in :term:`SSTATE_MIRRORS` directly, with the ``user`` and ``pswd`` | ||
8708 | parameters:: | ||
8709 | |||
8710 | SSTATE_MIRRORS ?= "\ | ||
8711 | file://.* https://someserver.tld/share/sstate/PATH;user=<user>;pswd=<password>;downloadfilename=PATH \ | ||
8712 | " | ||
8713 | |||
8243 | The Yocto Project actually shares the cache data objects built by its | 8714 | The Yocto Project actually shares the cache data objects built by its |
8244 | autobuilder:: | 8715 | autobuilder:: |
8245 | 8716 | ||
8246 | SSTATE_MIRRORS ?= "file://.* http://cdn.jsdelivr.net/yocto/sstate/all/PATH;downloadfilename=PATH" | 8717 | SSTATE_MIRRORS ?= "file://.* http://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" |
8247 | 8718 | ||
8248 | As such binary artifacts are built for the generic QEMU machines | 8719 | As such binary artifacts are built for the generic QEMU machines |
8249 | supported by the various Poky releases, they are less likely to be | 8720 | supported by the various Poky releases, they are less likely to be |
@@ -8267,6 +8738,26 @@ system and gives an overview of their function and contents. | |||
8267 | 8738 | ||
8268 | For details on the process, see the :ref:`ref-classes-staging` class. | 8739 | For details on the process, see the :ref:`ref-classes-staging` class. |
8269 | 8740 | ||
8741 | :term:`SSTATE_SKIP_CREATION` | ||
8742 | The :term:`SSTATE_SKIP_CREATION` variable can be used to skip the | ||
8743 | creation of :ref:`shared state <overview-manual/concepts:shared state cache>` | ||
8744 | tarball files. It makes sense e.g. for image creation tasks as tarring images | ||
8745 | and keeping them in sstate would consume a lot of disk space. | ||
8746 | |||
8747 | In general it is not recommended to use this variable as missing sstate | ||
8748 | artefacts adversely impact the build, particularly for entries in the | ||
8749 | middle of dependency chains. The case it can make sense is where the | ||
8750 | size and time costs of the artefact are similar to just running the | ||
8751 | tasks. This generally only applies to end artefact output like images. | ||
8752 | |||
8753 | The syntax to disable it for one task is:: | ||
8754 | |||
8755 | SSTATE_SKIP_CREATION:task-image-complete = "1" | ||
8756 | |||
8757 | The syntax to disable it for the whole recipe is:: | ||
8758 | |||
8759 | SSTATE_SKIP_CREATION = "1" | ||
8760 | |||
8270 | :term:`STAGING_BASE_LIBDIR_NATIVE` | 8761 | :term:`STAGING_BASE_LIBDIR_NATIVE` |
8271 | Specifies the path to the ``/lib`` subdirectory of the sysroot | 8762 | Specifies the path to the ``/lib`` subdirectory of the sysroot |
8272 | directory for the build host. | 8763 | directory for the build host. |
@@ -8457,8 +8948,8 @@ system and gives an overview of their function and contents. | |||
8457 | places stamps. The default directory is ``${TMPDIR}/stamps``. | 8948 | places stamps. The default directory is ``${TMPDIR}/stamps``. |
8458 | 8949 | ||
8459 | :term:`STRIP` | 8950 | :term:`STRIP` |
8460 | The minimal command and arguments to run ``strip``, which is used to | 8951 | The minimal command and arguments to run :manpage:`strip <strip(1)>`, |
8461 | strip symbols. | 8952 | which is used to strip symbols. |
8462 | 8953 | ||
8463 | :term:`SUMMARY` | 8954 | :term:`SUMMARY` |
8464 | The short (72 characters or less) summary of the binary package for | 8955 | The short (72 characters or less) summary of the binary package for |
@@ -9018,8 +9509,8 @@ system and gives an overview of their function and contents. | |||
9018 | file. | 9509 | file. |
9019 | 9510 | ||
9020 | For more information on testing images, see the | 9511 | For more information on testing images, see the |
9021 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 9512 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
9022 | section in the Yocto Project Development Tasks Manual. | 9513 | section in the Yocto Project Test Environment Manual. |
9023 | 9514 | ||
9024 | :term:`TEST_SERIALCONTROL_CMD` | 9515 | :term:`TEST_SERIALCONTROL_CMD` |
9025 | For automated hardware testing, specifies the command to use to | 9516 | For automated hardware testing, specifies the command to use to |
@@ -9090,8 +9581,8 @@ system and gives an overview of their function and contents. | |||
9090 | TEST_SUITES = "test_A test_B" | 9581 | TEST_SUITES = "test_A test_B" |
9091 | 9582 | ||
9092 | For more information on testing images, see the | 9583 | For more information on testing images, see the |
9093 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 9584 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
9094 | section in the Yocto Project Development Tasks Manual. | 9585 | section in the Yocto Project Test Environment Manual. |
9095 | 9586 | ||
9096 | :term:`TEST_TARGET` | 9587 | :term:`TEST_TARGET` |
9097 | Specifies the target controller to use when running tests against a | 9588 | Specifies the target controller to use when running tests against a |
@@ -9109,8 +9600,8 @@ system and gives an overview of their function and contents. | |||
9109 | You can provide the following arguments with :term:`TEST_TARGET`: | 9600 | You can provide the following arguments with :term:`TEST_TARGET`: |
9110 | 9601 | ||
9111 | - *"qemu":* Boots a QEMU image and runs the tests. See the | 9602 | - *"qemu":* Boots a QEMU image and runs the tests. See the |
9112 | ":ref:`dev-manual/runtime-testing:enabling runtime tests on qemu`" section | 9603 | ":ref:`test-manual/runtime-testing:enabling runtime tests on qemu`" section |
9113 | in the Yocto Project Development Tasks Manual for more | 9604 | in the Yocto Project Test Environment Manual for more |
9114 | information. | 9605 | information. |
9115 | 9606 | ||
9116 | - *"simpleremote":* Runs the tests on target hardware that is | 9607 | - *"simpleremote":* Runs the tests on target hardware that is |
@@ -9125,8 +9616,8 @@ system and gives an overview of their function and contents. | |||
9125 | ``meta/lib/oeqa/controllers/simpleremote.py``. | 9616 | ``meta/lib/oeqa/controllers/simpleremote.py``. |
9126 | 9617 | ||
9127 | For information on running tests on hardware, see the | 9618 | For information on running tests on hardware, see the |
9128 | ":ref:`dev-manual/runtime-testing:enabling runtime tests on hardware`" | 9619 | ":ref:`test-manual/runtime-testing:enabling runtime tests on hardware`" |
9129 | section in the Yocto Project Development Tasks Manual. | 9620 | section in the Yocto Project Test Environment Manual. |
9130 | 9621 | ||
9131 | :term:`TEST_TARGET_IP` | 9622 | :term:`TEST_TARGET_IP` |
9132 | The IP address of your hardware under test. The :term:`TEST_TARGET_IP` | 9623 | The IP address of your hardware under test. The :term:`TEST_TARGET_IP` |
@@ -9162,10 +9653,15 @@ system and gives an overview of their function and contents. | |||
9162 | 9653 | ||
9163 | For more information | 9654 | For more information |
9164 | on enabling, running, and writing these tests, see the | 9655 | on enabling, running, and writing these tests, see the |
9165 | ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" | 9656 | ":ref:`test-manual/runtime-testing:performing automated runtime testing`" |
9166 | section in the Yocto Project Development Tasks Manual and the | 9657 | section in the Yocto Project Test Environment Manual and the |
9167 | ":ref:`ref-classes-testimage`" section. | 9658 | ":ref:`ref-classes-testimage`" section. |
9168 | 9659 | ||
9660 | :term:`TESTIMAGE_FAILED_QA_ARTIFACTS` | ||
9661 | When using the :ref:`ref-classes-testimage` class, the variable | ||
9662 | :term:`TESTIMAGE_FAILED_QA_ARTIFACTS` lists space-separated paths on the | ||
9663 | target to retrieve onto the host. | ||
9664 | |||
9169 | :term:`THISDIR` | 9665 | :term:`THISDIR` |
9170 | The directory in which the file BitBake is currently parsing is | 9666 | The directory in which the file BitBake is currently parsing is |
9171 | located. Do not manually set this variable. | 9667 | located. Do not manually set this variable. |
@@ -9957,8 +10453,22 @@ system and gives an overview of their function and contents. | |||
9957 | ":ref:`ref-classes-insane`" section. | 10453 | ":ref:`ref-classes-insane`" section. |
9958 | 10454 | ||
9959 | :term:`WATCHDOG_TIMEOUT` | 10455 | :term:`WATCHDOG_TIMEOUT` |
9960 | Specifies the timeout in seconds used by the ``watchdog`` recipe and | 10456 | Specifies the timeout in seconds used by the ``watchdog-config`` recipe |
9961 | also by ``systemd`` during reboot. The default is 60 seconds. | 10457 | and also by ``systemd`` during reboot. The default is 60 seconds. |
10458 | |||
10459 | :term:`WIC_CREATE_EXTRA_ARGS` | ||
10460 | If the :term:`IMAGE_FSTYPES` variable contains "wic", the build | ||
10461 | will generate a | ||
10462 | :ref:`Wic image <dev-manual/wic:creating partitioned images using wic>` | ||
10463 | automatically when BitBake builds an image recipe. As part of | ||
10464 | this process BitBake will invoke the "`wic create`" command. The | ||
10465 | :term:`WIC_CREATE_EXTRA_ARGS` variable is placed at the end of this | ||
10466 | command which allows the user to supply additional arguments. | ||
10467 | |||
10468 | One such useful purpose for this mechanism is to add the ``-D`` (or | ||
10469 | ``--debug``) argument to the "`wic create`" command. This increases the | ||
10470 | amount of debugging information written out to the Wic log during the | ||
10471 | Wic creation process. | ||
9962 | 10472 | ||
9963 | :term:`WIRELESS_DAEMON` | 10473 | :term:`WIRELESS_DAEMON` |
9964 | For ``connman`` and ``packagegroup-base``, specifies the wireless | 10474 | For ``connman`` and ``packagegroup-base``, specifies the wireless |
diff --git a/documentation/sdk-manual/appendix-obtain.rst b/documentation/sdk-manual/appendix-obtain.rst index d06d6ec6b5..a42cbc31bb 100644 --- a/documentation/sdk-manual/appendix-obtain.rst +++ b/documentation/sdk-manual/appendix-obtain.rst | |||
@@ -29,7 +29,7 @@ and then run the script to hand-install the toolchain. | |||
29 | Follow these steps to locate and hand-install the toolchain: | 29 | Follow these steps to locate and hand-install the toolchain: |
30 | 30 | ||
31 | #. *Go to the Installers Directory:* Go to | 31 | #. *Go to the Installers Directory:* Go to |
32 | :yocto_dl:`/releases/yocto/yocto-&DISTRO;/toolchain/` | 32 | :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/` |
33 | 33 | ||
34 | #. *Open the Folder for Your Build Host:* Open the folder that matches | 34 | #. *Open the Folder for Your Build Host:* Open the folder that matches |
35 | your :term:`Build Host` (i.e. | 35 | your :term:`Build Host` (i.e. |
@@ -201,7 +201,7 @@ Follow these steps to extract the root filesystem: | |||
201 | Image File:* You need to find and download the root filesystem image | 201 | Image File:* You need to find and download the root filesystem image |
202 | file that is appropriate for your target system. These files are kept | 202 | file that is appropriate for your target system. These files are kept |
203 | in machine-specific folders in the | 203 | in machine-specific folders in the |
204 | :yocto_dl:`Index of Releases </releases/yocto/yocto-&DISTRO;/machines/>` | 204 | :yocto_dl:`Index of Releases </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>` |
205 | in the "machines" directory. | 205 | in the "machines" directory. |
206 | 206 | ||
207 | The machine-specific folders of the "machines" directory contain | 207 | The machine-specific folders of the "machines" directory contain |
@@ -245,7 +245,7 @@ Follow these steps to extract the root filesystem: | |||
245 | 245 | ||
246 | Here is an example command that extracts the root filesystem | 246 | Here is an example command that extracts the root filesystem |
247 | from a previously built root filesystem image that was downloaded | 247 | from a previously built root filesystem image that was downloaded |
248 | from the :yocto_dl:`Index of Releases </releases/yocto/yocto-&DISTRO;/machines/>`. | 248 | from the :yocto_dl:`Index of Releases </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>`. |
249 | This command extracts the root filesystem into the ``core2-64-sato`` | 249 | This command extracts the root filesystem into the ``core2-64-sato`` |
250 | directory:: | 250 | directory:: |
251 | 251 | ||
diff --git a/documentation/sdk-manual/extensible.rst b/documentation/sdk-manual/extensible.rst index 3f6a754d88..ab4956f466 100644 --- a/documentation/sdk-manual/extensible.rst +++ b/documentation/sdk-manual/extensible.rst | |||
@@ -87,7 +87,7 @@ Host` by running the ``*.sh`` installation script. | |||
87 | You can download a tarball installer, which includes the pre-built | 87 | You can download a tarball installer, which includes the pre-built |
88 | toolchain, the ``runqemu`` script, the internal build system, | 88 | toolchain, the ``runqemu`` script, the internal build system, |
89 | ``devtool``, and support files from the appropriate | 89 | ``devtool``, and support files from the appropriate |
90 | :yocto_dl:`toolchain </releases/yocto/yocto-&DISTRO;/toolchain/>` directory within the Index of | 90 | :yocto_dl:`toolchain </releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/>` directory within the Index of |
91 | Releases. Toolchains are available for several 32-bit and 64-bit | 91 | Releases. Toolchains are available for several 32-bit and 64-bit |
92 | architectures with the ``x86_64`` directories, respectively. The | 92 | architectures with the ``x86_64`` directories, respectively. The |
93 | toolchains the Yocto Project provides are based off the | 93 | toolchains the Yocto Project provides are based off the |
@@ -178,7 +178,7 @@ Running the Extensible SDK Environment Setup Script | |||
178 | Once you have the SDK installed, you must run the SDK environment setup | 178 | Once you have the SDK installed, you must run the SDK environment setup |
179 | script before you can actually use the SDK. | 179 | script before you can actually use the SDK. |
180 | 180 | ||
181 | When using a SDK directly in a Yocto build, you will find the script in | 181 | When using an SDK directly in a Yocto build, you will find the script in |
182 | ``tmp/deploy/images/qemux86-64/`` in your :term:`Build Directory`. | 182 | ``tmp/deploy/images/qemux86-64/`` in your :term:`Build Directory`. |
183 | 183 | ||
184 | When using a standalone SDK installer, this setup script resides in | 184 | When using a standalone SDK installer, this setup script resides in |
@@ -622,28 +622,91 @@ command: | |||
622 | decide you do not want to proceed with your work. If you do use this | 622 | decide you do not want to proceed with your work. If you do use this |
623 | command, realize that the source tree is preserved. | 623 | command, realize that the source tree is preserved. |
624 | 624 | ||
625 | ``devtool ide-sdk`` configures IDEs for the extensible SDK | 625 | ``devtool ide-sdk`` configures IDEs and bootstraps SDKs |
626 | ---------------------------------------------------------- | 626 | ------------------------------------------------------- |
627 | 627 | ||
628 | ``devtool ide-sdk`` automatically configures IDEs to use the extensible SDK. | 628 | The ``devtool ide-sdk`` command can provide an IDE configuration for IDEs when |
629 | To make sure that all parts of the extensible SDK required by the generated | 629 | working on the source code of one or more recipes. |
630 | IDE configuration are available, ``devtool ide-sdk`` uses BitBake in the | 630 | Depending on the programming language, and the build system used by the recipe, |
631 | background to bootstrap the extensible SDK. | 631 | the tools required for cross-development and remote debugging are different. |
632 | For example: | ||
632 | 633 | ||
633 | The extensible SDK supports two different development modes. | 634 | - A C/C++ project usually uses CMake or Meson. |
634 | ``devtool ide-sdk`` supports both of them: | ||
635 | 635 | ||
636 | #. *Modified mode*: | 636 | - A Python project uses setuptools or one of its successors. |
637 | |||
638 | - A Rust project uses Cargo. | ||
639 | |||
640 | Also, the IDE plugins needed for the integration of a build system with the | ||
641 | IDE and the corresponding settings are usually specific to these build-systems. | ||
642 | To hide all these details from the user, ``devtool ide-sdk`` does two things: | ||
643 | |||
644 | - It generates any kind of SDK needed for cross-development and remote | ||
645 | debugging of the specified recipes. | ||
646 | |||
647 | - It generates the configuration for the IDE (and the IDE plugins) for using | ||
648 | the cross-toolchain and remote debugging tools provided by the SDK directly | ||
649 | from the IDE. | ||
650 | |||
651 | For supported build systems the configurations generated by ``devtool ide-sdk`` | ||
652 | combine the advantages of the ``devtool modify`` based workflow | ||
653 | (see :ref:`using_devtool`) with the advantages of the simple Environment Setup | ||
654 | script based workflow (see :ref:`running_the_ext_sdk_env`) provided by Yocto's | ||
655 | SDK or eSDK: | ||
656 | |||
657 | - The source code of the recipe is in the workspace created by | ||
658 | ``devtool modify`` or ``devtool add``. | ||
659 | Using ``devtool build``, ``devtool build-image``, | ||
660 | ``devtool deploy-target`` or ``bitbake`` is possible. | ||
661 | Also ``devtool ide-sdk`` can be used to update the SDK and the IDE | ||
662 | configuration at any time. | ||
637 | 663 | ||
638 | By default ``devtool ide-sdk`` generates IDE configurations for recipes in | 664 | - ``devtool ide-sdk`` aims to support multiple programming languages and |
639 | workspaces created by ``devtool modify`` or ``devtool add`` as described in | 665 | multiple IDEs natively. "Natively" means that the IDE is configured to call |
640 | :ref:`using_devtool`. This mode creates IDE configurations with support for | 666 | the build tool (e.g. ``cmake`` or ``meson``) directly. This has several |
641 | advanced features, such as deploying the binaries to the remote target | 667 | advantages. |
642 | device and performing remote debugging sessions. The generated IDE | 668 | First of all, it is usually much faster to call for example ``cmake`` than |
643 | configurations use the per recipe sysroots as Bitbake does internally. | 669 | ``devtool build``. |
670 | It also allows to benefit from the very good integration that IDEs like | ||
671 | VSCode offer for tools like CMake or GDB. | ||
672 | |||
673 | However, supporting many programming languages and multiple | ||
674 | IDEs is quite an elaborate and constantly evolving thing. Support for IDEs | ||
675 | is therefore implemented as plugins. Plugins can also be provided by | ||
676 | optional layers. | ||
644 | 677 | ||
645 | In order to use the tool, a few settings are needed. As a starting example, | 678 | So much about the introduction to the default mode of ``devtool sdk-ide`` which |
646 | the following lines of code can be added to the ``local.conf`` file:: | 679 | is called the "modified" mode because it uses the workspace created by |
680 | ``devtool modify`` and the per recipe :term:`Sysroots <Sysroot>` of BitBake. | ||
681 | |||
682 | For some recipes and use cases, this default behavior of ``devtool ide-sdk`` | ||
683 | with full ``devtool`` and ``bitbake`` integration might not be suitable. | ||
684 | To offer full feature parity with the SDK and the eSDK, ``devtool ide-sdk`` has | ||
685 | a second mode called "shared" mode. | ||
686 | If ``devtool ide-sdk`` is called with the ``--mode=shared`` option, it | ||
687 | bootstraps an SDK directly from the BitBake environment, which offers the same | ||
688 | Environment Setup script as described in :ref:`running_the_ext_sdk_env`. | ||
689 | In addition to the (e)SDK installer-based setup, the IDE gets configured | ||
690 | to use the shared :term:`Sysroots <Sysroot>` and the tools from the SDK. | ||
691 | ``devtool ide-sdk --mode=shared`` is basically a wrapper for the setup of the | ||
692 | extensible SDK as described in :ref:`setting_up_ext_sdk_in_build`. | ||
693 | |||
694 | The use of ``devtool ide-sdk`` is an alternative to using one of the SDK | ||
695 | installers. | ||
696 | ``devtool ide-sdk`` allows the creation of SDKs that offer all the | ||
697 | functionality of the SDK and the eSDK installers. Compared to the installers, | ||
698 | however, the SDK created with ``devtool ide-sdk`` is much more flexible. | ||
699 | For example, it is very easy to change the :term:`MACHINE` in the | ||
700 | ``local.conf`` file, update the layer meta data and then regenerate the SDK. | ||
701 | |||
702 | Let's take a look at an example of how to use ``devtool ide-sdk`` in each of | ||
703 | the two modes: | ||
704 | |||
705 | #. *Modified mode*: | ||
706 | |||
707 | In order to use the ``devtool ide-sdk``, a few settings are needed. As a | ||
708 | starting example, the following lines of code can be added to the | ||
709 | ``local.conf`` file:: | ||
647 | 710 | ||
648 | # Build the companion debug file system | 711 | # Build the companion debug file system |
649 | IMAGE_GEN_DEBUGFS = "1" | 712 | IMAGE_GEN_DEBUGFS = "1" |
@@ -666,15 +729,20 @@ The extensible SDK supports two different development modes. | |||
666 | IMAGE_INSTALL:append = " my-recipe" | 729 | IMAGE_INSTALL:append = " my-recipe" |
667 | 730 | ||
668 | Assuming the BitBake environment is set up correctly and a workspace has | 731 | Assuming the BitBake environment is set up correctly and a workspace has |
669 | been created for the recipe using ``devtool modify my-recipe``, the | 732 | been created for the recipe using ``devtool modify my-recipe`` or probably |
733 | even better by using ``devtool modify my-recipe --debug-build``, the | ||
670 | following command can create the SDK and the configuration for VSCode in | 734 | following command can create the SDK and the configuration for VSCode in |
671 | the recipe workspace:: | 735 | the recipe workspace:: |
672 | 736 | ||
673 | $ devtool ide-sdk my-recipe core-image-minimal --target root@192.168.7.2 | 737 | $ devtool ide-sdk my-recipe core-image-minimal --target root@192.168.7.2 |
674 | 738 | ||
675 | The command requires an image recipe (``core-image-minimal`` for this example) | 739 | The command requires an image recipe (``core-image-minimal`` for this |
676 | that is used to create the SDK. This firmware image should also be installed | 740 | example) that is used to create the SDK. |
677 | on the target device. It is possible to pass multiple package recipes. | 741 | This firmware image should also be installed on the target device. |
742 | It is possible to pass multiple package recipes:: | ||
743 | |||
744 | $ devtool ide-sdk my-recipe-1 my-recipe-2 core-image-minimal --target root@192.168.7.2 | ||
745 | |||
678 | ``devtool ide-sdk`` tries to create an IDE configuration for all package | 746 | ``devtool ide-sdk`` tries to create an IDE configuration for all package |
679 | recipes. | 747 | recipes. |
680 | 748 | ||
@@ -684,9 +752,9 @@ The extensible SDK supports two different development modes. | |||
684 | 752 | ||
685 | For example, a CMake preset is created for a recipe that inherits | 753 | For example, a CMake preset is created for a recipe that inherits |
686 | :ref:`ref-classes-cmake`. In the case of VSCode, CMake presets are supported | 754 | :ref:`ref-classes-cmake`. In the case of VSCode, CMake presets are supported |
687 | by the CMake Tools plugin. This is an example of how the build | 755 | by the CMake Tools plugin. This is an example of how the build configuration |
688 | configuration used by ``bitbake`` is exported to an IDE configuration that | 756 | used by ``bitbake`` is exported to an IDE configuration that gives exactly |
689 | gives exactly the same build results. | 757 | the same build results. |
690 | 758 | ||
691 | Support for remote debugging with seamless integration into the IDE is | 759 | Support for remote debugging with seamless integration into the IDE is |
692 | important for a cross-SDK. ``devtool ide-sdk`` automatically generates the | 760 | important for a cross-SDK. ``devtool ide-sdk`` automatically generates the |
@@ -699,23 +767,54 @@ The extensible SDK supports two different development modes. | |||
699 | running on the target device, it is essential that the image built by | 767 | running on the target device, it is essential that the image built by |
700 | ``devtool ide-sdk`` is running on the target device. | 768 | ``devtool ide-sdk`` is running on the target device. |
701 | 769 | ||
702 | ``devtool ide-sdk`` aims to support multiple programming languages and | ||
703 | multiple IDEs natively. "Natively" means that the IDE is configured to call | ||
704 | the build tool (e.g. CMake or Meson) directly. This has several advantages. | ||
705 | First of all, it is much faster than ``devtool build``, but it also allows | ||
706 | to use the very good integration of tools like CMake or GDB in VSCode and | ||
707 | other IDEs. However, supporting many programming languages and multiple | ||
708 | IDEs is quite an elaborate and constantly evolving thing. Support for IDEs | ||
709 | is therefore implemented as plugins. Plugins can also be provided by | ||
710 | optional layers. | ||
711 | |||
712 | The default IDE is VSCode. Some hints about using VSCode: | 770 | The default IDE is VSCode. Some hints about using VSCode: |
713 | 771 | ||
714 | - To work on the source code of a recipe an instance of VSCode is started in | 772 | - VSCode can be used to work on the BitBake recipes or the application |
715 | the recipe's workspace. Example:: | 773 | source code. |
774 | Usually there is one instance of VSCode running in the folder where the | ||
775 | BitBake recipes are. This instance has the | ||
776 | `Yocto Project BitBake plugin <https://marketplace.visualstudio.com/items?itemName=yocto-project.yocto-bitbake>`_ | ||
777 | running. | ||
778 | |||
779 | .. warning:: | ||
780 | |||
781 | Some VSCode plugins (Python, BitBake and others) need a reasonable | ||
782 | configuration to work as expected. Otherwise, some plugins try to | ||
783 | index the build directory of BitBake, which keeps your system quite | ||
784 | busy until an out of memory exception stops this nonsense. | ||
785 | Other plugins, such as the BitBake plugin, do not behave as expected. | ||
786 | |||
787 | To work around such issues, the ``oe-init-build-env`` script creates | ||
788 | an initial ``.vscode/settings.json`` file if ``code`` can be found | ||
789 | and the ``.vscode`` folder does not yet exist. | ||
790 | It is best to run ``oe-init-build-env`` once before starting VSCode. | ||
791 | An alternative approach is to use a build folder outside the layers, | ||
792 | e.g. ``oe-init-build-env ../build``. | ||
793 | |||
794 | The BitBake plugin also offers to create devtool workspaces and run | ||
795 | ``devtool ide-sdk`` with a few mouse clicks. | ||
796 | Of course, issuing commands in the terminal works as well. | ||
797 | |||
798 | - To work on the source code of a recipe another instance of VSCode is | ||
799 | started in the recipe's workspace. Example:: | ||
716 | 800 | ||
717 | code build/workspace/sources/my-recipe | 801 | code build/workspace/sources/my-recipe |
718 | 802 | ||
803 | This instance of VSCode uses plugins that are useful for the development | ||
804 | of the application. ``devtool ide-sdk`` generates the necessary | ||
805 | ``extensions.json``, ``settings.json``, ``tasks.json`` and ``launch.json`` | ||
806 | configuration files for all the involved plugins. | ||
807 | |||
808 | When the source code folder present in the workspace folder is opened in | ||
809 | VSCode for the first time, a pop-up message recommends installing the | ||
810 | required plugins. | ||
811 | After accepting the installation of the plugins, working with the source | ||
812 | code or some debugging tasks should work as usual with VSCode. | ||
813 | |||
814 | Starting the VSCode instances in the recipe workspace folders can also be | ||
815 | done by a mouse click on the recipe workspaces in the first VSCode | ||
816 | instance. | ||
817 | |||
719 | - To work with CMake press ``Ctrl + Shift + p``, type ``cmake``. This will | 818 | - To work with CMake press ``Ctrl + Shift + p``, type ``cmake``. This will |
720 | show some possible commands like selecting a CMake preset, compiling or | 819 | show some possible commands like selecting a CMake preset, compiling or |
721 | running CTest. | 820 | running CTest. |
@@ -728,10 +827,9 @@ The extensible SDK supports two different development modes. | |||
728 | show some possible commands like compiling or executing the unit tests. | 827 | show some possible commands like compiling or executing the unit tests. |
729 | 828 | ||
730 | A note on running cross-compiled unit tests on the host: Meson enables | 829 | A note on running cross-compiled unit tests on the host: Meson enables |
731 | support for QEMU user-mode by default. It is expected that the execution | 830 | support for QEMU user mode by default. It is expected that the execution |
732 | of the unit tests from the IDE will work easily without any additional | 831 | of the unit tests from the IDE will work without any additional steps, |
733 | steps, provided that the code is suitable for execution on the host | 832 | given that the code is suitable for the execution on the host machine. |
734 | machine. | ||
735 | 833 | ||
736 | - For the deployment to the target device, just press ``Ctrl + Shift + p``, | 834 | - For the deployment to the target device, just press ``Ctrl + Shift + p``, |
737 | type ``task``. Select ``install && deploy-target``. | 835 | type ``task``. Select ``install && deploy-target``. |
@@ -742,23 +840,23 @@ The extensible SDK supports two different development modes. | |||
742 | selected. After selecting one of the generated configurations, press the | 840 | selected. After selecting one of the generated configurations, press the |
743 | "play" button. | 841 | "play" button. |
744 | 842 | ||
745 | Starting a remote debugging session automatically initiates the deployment | 843 | Starting a remote debugging session automatically initiates the |
746 | to the target device. If this is not desired, the | 844 | deployment to the target device. If this is not desired, the |
747 | ``"dependsOn": ["install && deploy-target...]`` parameter of the tasks | 845 | ``"dependsOn": ["install && deploy-target...]`` parameter of the tasks |
748 | with ``"label": "gdbserver start...`` can be removed from the | 846 | with ``"label": "gdbserver start...`` can be removed from the |
749 | ``tasks.json`` file. | 847 | ``tasks.json`` file. |
750 | 848 | ||
751 | VSCode supports GDB with many different setups and configurations for many | 849 | VSCode supports GDB with many different setups and configurations for |
752 | different use cases. However, most of these setups have some limitations | 850 | many different use cases. However, most of these setups have some |
753 | when it comes to cross-development, support only a few target | 851 | limitations when it comes to cross-development, support only a few target |
754 | architectures or require a high performance target device. Therefore | 852 | architectures or require a high performance target device. Therefore |
755 | ``devtool ide-sdk`` supports the classic, generic setup with GDB on the | 853 | ``devtool ide-sdk`` supports the classic, generic setup with GDB on the |
756 | development host and gdbserver on the target device. | 854 | development host and gdbserver on the target device. |
757 | 855 | ||
758 | Roughly summarized, this means: | 856 | Roughly summarized, this means: |
759 | 857 | ||
760 | - The binaries are copied via SSH to the remote target device by a script | 858 | - The binaries are copied via SSH to the remote target device by a |
761 | referred by ``tasks.json``. | 859 | script referred by ``tasks.json``. |
762 | 860 | ||
763 | - gdbserver is started on the remote target device via SSH by a script | 861 | - gdbserver is started on the remote target device via SSH by a script |
764 | referred by ``tasks.json``. | 862 | referred by ``tasks.json``. |
@@ -783,8 +881,8 @@ The extensible SDK supports two different development modes. | |||
783 | .. code-block:: sh | 881 | .. code-block:: sh |
784 | 882 | ||
785 | # Create the SDK | 883 | # Create the SDK |
786 | devtool modify cmake-example | 884 | devtool modify cmake-example --debug-build |
787 | devtool ide-sdk cmake-example core-image-minimal -c --debug-build-config --ide=none | 885 | devtool ide-sdk cmake-example core-image-minimal -c --ide=none |
788 | 886 | ||
789 | # Install the firmware on a target device or start QEMU | 887 | # Install the firmware on a target device or start QEMU |
790 | runqemu | 888 | runqemu |
@@ -860,16 +958,9 @@ The extensible SDK supports two different development modes. | |||
860 | 958 | ||
861 | #. *Shared sysroots mode* | 959 | #. *Shared sysroots mode* |
862 | 960 | ||
863 | For some recipes and use cases a per-recipe sysroot based SDK is not | 961 | Creating an SDK with shared :term:`Sysroots <Sysroot>` that contains all the |
864 | suitable. Optionally ``devtool ide-sdk`` configures the IDE to use the | 962 | dependencies needed to work with ``my-recipe`` is possible with the following |
865 | toolchain provided by the extensible SDK as described in | 963 | example command:: |
866 | :ref:`running_the_ext_sdk_env`. ``devtool ide-sdk --mode=shared`` is | ||
867 | basically a wrapper for the setup of the extensible SDK as described in | ||
868 | :ref:`setting_up_ext_sdk_in_build`. The IDE gets a configuration to use the | ||
869 | shared sysroots. | ||
870 | |||
871 | Creating a SDK with shared sysroots that contains all the dependencies needed | ||
872 | to work with ``my-recipe`` is possible with the following example command:: | ||
873 | 964 | ||
874 | $ devtool ide-sdk --mode=shared my-recipe | 965 | $ devtool ide-sdk --mode=shared my-recipe |
875 | 966 | ||
@@ -883,12 +974,14 @@ The extensible SDK supports two different development modes. | |||
883 | echo "project(foo VERSION 1.0)" > kit-test/CMakeLists.txt | 974 | echo "project(foo VERSION 1.0)" > kit-test/CMakeLists.txt |
884 | code kit-test | 975 | code kit-test |
885 | 976 | ||
886 | If there is a CMake project in the workspace, cross-compilation is supported: | 977 | If there is a CMake project in the workspace, cross-compilation is |
978 | supported: | ||
887 | 979 | ||
888 | - Press ``Ctrl + Shift + P``, type ``CMake: Scan for Kits`` | 980 | - Press ``Ctrl + Shift + P``, type ``CMake: Scan for Kits`` |
889 | - Press ``Ctrl + Shift + P``, type ``CMake: Select a Kit`` | 981 | - Press ``Ctrl + Shift + P``, type ``CMake: Select a Kit`` |
890 | 982 | ||
891 | Finally most of the features provided by CMake and the IDE should be available. | 983 | Finally most of the features provided by CMake and the IDE should be |
984 | available. | ||
892 | 985 | ||
893 | Other IDEs than VSCode are supported as well. However, | 986 | Other IDEs than VSCode are supported as well. However, |
894 | ``devtool ide-sdk --mode=shared --ide=none my-recipe`` is currently | 987 | ``devtool ide-sdk --mode=shared --ide=none my-recipe`` is currently |
diff --git a/documentation/sdk-manual/intro.rst b/documentation/sdk-manual/intro.rst index e8fd191dbc..fbfc8c2ac7 100644 --- a/documentation/sdk-manual/intro.rst +++ b/documentation/sdk-manual/intro.rst | |||
@@ -173,7 +173,7 @@ You just need to follow these general steps: | |||
173 | root filesystem images. | 173 | root filesystem images. |
174 | 174 | ||
175 | If you are going to develop your application on hardware, go to the | 175 | If you are going to develop your application on hardware, go to the |
176 | :yocto_dl:`machines </releases/yocto/yocto-&DISTRO;/machines/>` download area and choose a | 176 | :yocto_dl:`machines </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>` download area and choose a |
177 | target machine area from which to download the kernel image and root | 177 | target machine area from which to download the kernel image and root |
178 | filesystem. This download area could have several files in it that | 178 | filesystem. This download area could have several files in it that |
179 | support development using actual hardware. For example, the area | 179 | support development using actual hardware. For example, the area |
@@ -183,7 +183,7 @@ You just need to follow these general steps: | |||
183 | 183 | ||
184 | If you are going to develop your application and then run and test it | 184 | If you are going to develop your application and then run and test it |
185 | using the QEMU emulator, go to the | 185 | using the QEMU emulator, go to the |
186 | :yocto_dl:`machines/qemu </releases/yocto/yocto-&DISTRO;/machines/qemu>` download area. From this | 186 | :yocto_dl:`machines/qemu </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/qemu>` download area. From this |
187 | area, go down into the directory for your target architecture (e.g. | 187 | area, go down into the directory for your target architecture (e.g. |
188 | ``qemux86_64`` for an Intel-based 64-bit architecture). Download the | 188 | ``qemux86_64`` for an Intel-based 64-bit architecture). Download the |
189 | kernel, root filesystem, and any other files you need for your | 189 | kernel, root filesystem, and any other files you need for your |
diff --git a/documentation/sdk-manual/using.rst b/documentation/sdk-manual/using.rst index f1ff0c76ca..bfb306abf5 100644 --- a/documentation/sdk-manual/using.rst +++ b/documentation/sdk-manual/using.rst | |||
@@ -43,7 +43,7 @@ Host` by running the ``*.sh`` installation script. | |||
43 | 43 | ||
44 | You can download a tarball installer, which includes the pre-built | 44 | You can download a tarball installer, which includes the pre-built |
45 | toolchain, the ``runqemu`` script, and support files from the | 45 | toolchain, the ``runqemu`` script, and support files from the |
46 | appropriate :yocto_dl:`toolchain </releases/yocto/yocto-&DISTRO;/toolchain/>` directory within | 46 | appropriate :yocto_dl:`toolchain </releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/>` directory within |
47 | the Index of Releases. Toolchains are available for several 32-bit and | 47 | the Index of Releases. Toolchains are available for several 32-bit and |
48 | 64-bit architectures with the ``x86_64`` directories, respectively. The | 48 | 64-bit architectures with the ``x86_64`` directories, respectively. The |
49 | toolchains the Yocto Project provides are based off the | 49 | toolchains the Yocto Project provides are based off the |
diff --git a/documentation/set_versions.py b/documentation/set_versions.py index dec0780834..820bd64036 100755 --- a/documentation/set_versions.py +++ b/documentation/set_versions.py | |||
@@ -168,17 +168,29 @@ series = [k for k in release_series] | |||
168 | previousseries = series[series.index(ourseries)+1:] or [""] | 168 | previousseries = series[series.index(ourseries)+1:] or [""] |
169 | lastlts = [k for k in previousseries if k in ltsseries] or "dunfell" | 169 | lastlts = [k for k in previousseries if k in ltsseries] or "dunfell" |
170 | 170 | ||
171 | latestreltag = subprocess.run(["git", "describe", "--abbrev=0", "--tags", "--match", "yocto-*"], capture_output=True, text=True).stdout | ||
172 | latestreltag = latestreltag.strip() | ||
173 | if latestreltag: | ||
174 | if latestreltag.startswith("yocto-"): | ||
175 | latesttag = latestreltag[6:] | ||
176 | else: | ||
177 | # fallback on the calculated version | ||
178 | print("Did not find a tag with 'git describe', falling back to %s" % ourversion) | ||
179 | latestreltag = "yocto-" + ourversion | ||
180 | latesttag = ourversion | ||
181 | |||
171 | print("Version calculated to be %s" % ourversion) | 182 | print("Version calculated to be %s" % ourversion) |
183 | print("Latest release tag found is %s" % latestreltag) | ||
172 | print("Release series calculated to be %s" % ourseries) | 184 | print("Release series calculated to be %s" % ourseries) |
173 | 185 | ||
174 | replacements = { | 186 | replacements = { |
175 | "DISTRO" : ourversion, | 187 | "DISTRO" : ourversion, |
188 | "DISTRO_LATEST_TAG": latesttag, | ||
176 | "DISTRO_NAME_NO_CAP" : ourseries, | 189 | "DISTRO_NAME_NO_CAP" : ourseries, |
177 | "DISTRO_NAME" : ourseries.capitalize(), | 190 | "DISTRO_NAME" : ourseries.capitalize(), |
178 | "DISTRO_NAME_NO_CAP_MINUS_ONE" : previousseries[0], | 191 | "DISTRO_NAME_NO_CAP_MINUS_ONE" : previousseries[0], |
179 | "DISTRO_NAME_NO_CAP_LTS" : lastlts[0], | 192 | "DISTRO_NAME_NO_CAP_LTS" : lastlts[0], |
180 | "YOCTO_DOC_VERSION" : ourversion, | 193 | "YOCTO_DOC_VERSION" : ourversion, |
181 | "DISTRO_REL_TAG" : "yocto-" + ourversion, | ||
182 | "DOCCONF_VERSION" : docconfver, | 194 | "DOCCONF_VERSION" : docconfver, |
183 | "BITBAKE_SERIES" : bitbakeversion, | 195 | "BITBAKE_SERIES" : bitbakeversion, |
184 | } | 196 | } |
@@ -316,3 +328,5 @@ with open('releases.rst', 'w') as f: | |||
316 | if tag == release_series[series] or tag.startswith('%s.' % release_series[series]): | 328 | if tag == release_series[series] or tag.startswith('%s.' % release_series[series]): |
317 | f.write('- :yocto_docs:`%s Documentation </%s>`\n' % (tag, tag)) | 329 | f.write('- :yocto_docs:`%s Documentation </%s>`\n' % (tag, tag)) |
318 | f.write('\n') | 330 | f.write('\n') |
331 | |||
332 | |||
diff --git a/documentation/sphinx-static/favicon.ico b/documentation/sphinx-static/favicon.ico new file mode 100644 index 0000000000..85a921e3ef --- /dev/null +++ b/documentation/sphinx-static/favicon.ico | |||
Binary files differ | |||
diff --git a/documentation/sphinx-static/switchers.js.in b/documentation/sphinx-static/switchers.js.in index 8c016859bc..b1c0812b53 100644 --- a/documentation/sphinx-static/switchers.js.in +++ b/documentation/sphinx-static/switchers.js.in | |||
@@ -133,7 +133,13 @@ by https://git.yoctoproject.org/yocto-autobuilder-helper/tree/scripts/run-docs-b | |||
133 | 133 | ||
134 | function get_docroot_url() { | 134 | function get_docroot_url() { |
135 | var url = window.location.href; | 135 | var url = window.location.href; |
136 | // Try to get the variable from documentation_options.js | ||
136 | var root = DOCUMENTATION_OPTIONS.URL_ROOT; | 137 | var root = DOCUMENTATION_OPTIONS.URL_ROOT; |
138 | if (root == null) { | ||
139 | // In recent versions of Sphinx, URL_ROOT was removed from | ||
140 | // documentation_options.js, so get it like searchtools.js does. | ||
141 | root = document.documentElement.dataset.content_root; | ||
142 | } | ||
137 | 143 | ||
138 | var urlarray = url.split('/'); | 144 | var urlarray = url.split('/'); |
139 | // Trim off anything after '/' | 145 | // Trim off anything after '/' |
diff --git a/documentation/standards.md b/documentation/standards.md index bc403e393e..8300d813dc 100644 --- a/documentation/standards.md +++ b/documentation/standards.md | |||
@@ -1,6 +1,6 @@ | |||
1 | # Standards for contributing to Yocto Project documentation | 1 | # Standards for contributing to Yocto Project documentation |
2 | 2 | ||
3 | This document attemps to standardize the way the Yocto Project | 3 | This document attempts to standardize the way the Yocto Project |
4 | documentation is created. | 4 | documentation is created. |
5 | 5 | ||
6 | It is currently a work in progress. | 6 | It is currently a work in progress. |
@@ -109,6 +109,21 @@ or in the BitBake User Manual | |||
109 | If it is not described yet, the variable should be added to the | 109 | If it is not described yet, the variable should be added to the |
110 | glossary before or in the same patch it is used, so that `:term:` can be used. | 110 | glossary before or in the same patch it is used, so that `:term:` can be used. |
111 | 111 | ||
112 | ### Admonitions | ||
113 | |||
114 | Sphinx has predefined admonitions that can be used to highlight a bit of text or | ||
115 | add a side-note to the documentation. For example: | ||
116 | |||
117 | ```rst | ||
118 | .. note:: | ||
119 | |||
120 | This is a note admonition. | ||
121 | ``` | ||
122 | |||
123 | We try to limit our usage of these admonitions to `note` and `warning`, as the | ||
124 | Sphinx documentation [warns](https://www.sphinx-doc.org/en/master/usage/restructuredtext/basics.html#directives) | ||
125 | that most themes only style these two admonitions. | ||
126 | |||
112 | ## ReStructured Text Syntax standards | 127 | ## ReStructured Text Syntax standards |
113 | 128 | ||
114 | This section has not been filled yet | 129 | This section has not been filled yet |
diff --git a/documentation/styles/config/vocabularies/Yocto/accept.txt b/documentation/styles/config/vocabularies/Yocto/accept.txt index ca622ba412..7fedda8ae2 100644 --- a/documentation/styles/config/vocabularies/Yocto/accept.txt +++ b/documentation/styles/config/vocabularies/Yocto/accept.txt | |||
@@ -2,4 +2,5 @@ BitBake | |||
2 | BSP | 2 | BSP |
3 | crosstap | 3 | crosstap |
4 | OpenEmbedded | 4 | OpenEmbedded |
5 | sstate | ||
5 | Yocto | 6 | Yocto |
diff --git a/documentation/test-manual/index.rst b/documentation/test-manual/index.rst index 86a2f436ea..d365d337ea 100644 --- a/documentation/test-manual/index.rst +++ b/documentation/test-manual/index.rst | |||
@@ -12,6 +12,8 @@ Yocto Project Test Environment Manual | |||
12 | 12 | ||
13 | intro | 13 | intro |
14 | test-process | 14 | test-process |
15 | ptest | ||
16 | runtime-testing | ||
15 | understand-autobuilder | 17 | understand-autobuilder |
16 | reproducible-builds | 18 | reproducible-builds |
17 | yocto-project-compatible | 19 | yocto-project-compatible |
diff --git a/documentation/test-manual/intro.rst b/documentation/test-manual/intro.rst index c31fd11c7a..caa0a8a792 100644 --- a/documentation/test-manual/intro.rst +++ b/documentation/test-manual/intro.rst | |||
@@ -51,13 +51,11 @@ fashion. Basically, during the development of a Yocto Project release, | |||
51 | the Autobuilder tests if things work. The Autobuilder builds all test | 51 | the Autobuilder tests if things work. The Autobuilder builds all test |
52 | targets and runs all the tests. | 52 | targets and runs all the tests. |
53 | 53 | ||
54 | The Yocto Project uses now uses standard upstream | 54 | The Yocto Project uses standard upstream Buildbot to drive its integration and |
55 | Buildbot (`version 3.8 <https://docs.buildbot.net/3.8.0/>`__) to | 55 | testing. Buildbot has a plug-in interface that the Yocto Project customizes |
56 | drive its integration and testing. Buildbot has a plug-in interface | 56 | using code from the :yocto_git:`yocto-autobuilder2 </yocto-autobuilder2>` |
57 | that the Yocto Project customizes using code from the | 57 | repository, adding its own console UI plugin. The resulting UI plug-in allows |
58 | ``yocto-autobuilder2`` repository, adding its own console UI plugin. The | 58 | you to visualize builds in a way suited to the project's needs. |
59 | resulting UI plug-in allows you to visualize builds in a way suited to | ||
60 | the project's needs. | ||
61 | 59 | ||
62 | A ``helper`` layer provides configuration and job management through | 60 | A ``helper`` layer provides configuration and job management through |
63 | scripts found in the ``yocto-autobuilder-helper`` repository. The | 61 | scripts found in the ``yocto-autobuilder-helper`` repository. The |
@@ -130,7 +128,9 @@ the following types of tests: | |||
130 | $ bitbake image -c testimage | 128 | $ bitbake image -c testimage |
131 | 129 | ||
132 | The tests use the :ref:`ref-classes-testimage` | 130 | The tests use the :ref:`ref-classes-testimage` |
133 | class and the :ref:`ref-tasks-testimage` task. | 131 | class and the :ref:`ref-tasks-testimage` task. See the |
132 | :ref:`test-manual/runtime-testing:Performing Automated Runtime Testing` | ||
133 | section of the Yocto Project Test Environment Manual for more information. | ||
134 | 134 | ||
135 | - *Layer Testing:* The Autobuilder has the possibility to test whether | 135 | - *Layer Testing:* The Autobuilder has the possibility to test whether |
136 | specific layers work with the test of the system. The layers tested | 136 | specific layers work with the test of the system. The layers tested |
@@ -140,7 +140,7 @@ the following types of tests: | |||
140 | - *Package Testing:* A Package Test (ptest) runs tests against packages | 140 | - *Package Testing:* A Package Test (ptest) runs tests against packages |
141 | built by the OpenEmbedded build system on the target machine. See the | 141 | built by the OpenEmbedded build system on the target machine. See the |
142 | :ref:`Testing Packages With | 142 | :ref:`Testing Packages With |
143 | ptest <dev-manual/packages:Testing Packages With ptest>` section | 143 | ptest <test-manual/ptest:Testing Packages With ptest>` section |
144 | in the Yocto Project Development Tasks Manual and the | 144 | in the Yocto Project Development Tasks Manual and the |
145 | ":yocto_wiki:`Ptest </Ptest>`" Wiki page for more | 145 | ":yocto_wiki:`Ptest </Ptest>`" Wiki page for more |
146 | information on Ptest. | 146 | information on Ptest. |
diff --git a/documentation/test-manual/ptest.rst b/documentation/test-manual/ptest.rst new file mode 100644 index 0000000000..2c021af515 --- /dev/null +++ b/documentation/test-manual/ptest.rst | |||
@@ -0,0 +1,128 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | ||
2 | |||
3 | *************************** | ||
4 | Testing Packages With ptest | ||
5 | *************************** | ||
6 | |||
7 | A Package Test (ptest) runs tests against packages built by the | ||
8 | OpenEmbedded build system on the target machine. A ptest contains at | ||
9 | least two items: the actual test, and a shell script (``run-ptest``) | ||
10 | that starts the test. The shell script that starts the test must not | ||
11 | contain the actual test --- the script only starts the test. On the other | ||
12 | hand, the test can be anything from a simple shell script that runs a | ||
13 | binary and checks the output to an elaborate system of test binaries and | ||
14 | data files. | ||
15 | |||
16 | The test generates output in the format used by Automake:: | ||
17 | |||
18 | result: testname | ||
19 | |||
20 | where the result can be ``PASS``, ``FAIL``, or ``SKIP``, and | ||
21 | the testname can be any identifying string. | ||
22 | |||
23 | For a list of Yocto Project recipes that are already enabled with ptest, | ||
24 | see the :yocto_wiki:`Ptest </Ptest>` wiki page. | ||
25 | |||
26 | .. note:: | ||
27 | |||
28 | A recipe is "ptest-enabled" if it inherits the :ref:`ref-classes-ptest` | ||
29 | class. | ||
30 | |||
31 | Adding ptest to Your Build | ||
32 | ========================== | ||
33 | |||
34 | To add package testing to your build, add the :term:`DISTRO_FEATURES` and | ||
35 | :term:`EXTRA_IMAGE_FEATURES` variables to your ``local.conf`` file, which | ||
36 | is found in the :term:`Build Directory`:: | ||
37 | |||
38 | DISTRO_FEATURES:append = " ptest" | ||
39 | EXTRA_IMAGE_FEATURES += "ptest-pkgs" | ||
40 | |||
41 | Once your build is complete, the ptest files are installed into the | ||
42 | ``/usr/lib/package/ptest`` directory within the image, where ``package`` | ||
43 | is the name of the package. | ||
44 | |||
45 | Running ptest | ||
46 | ============= | ||
47 | |||
48 | The ``ptest-runner`` package installs a shell script that loops through | ||
49 | all installed ptest test suites and runs them in sequence. Consequently, | ||
50 | you might want to add this package to your image. | ||
51 | |||
52 | Getting Your Package Ready | ||
53 | ========================== | ||
54 | |||
55 | In order to enable a recipe to run installed ptests on target hardware, | ||
56 | you need to prepare the recipes that build the packages you want to | ||
57 | test. Here is what you have to do for each recipe: | ||
58 | |||
59 | - *Be sure the recipe inherits the* :ref:`ref-classes-ptest` *class:* | ||
60 | Include the following line in each recipe:: | ||
61 | |||
62 | inherit ptest | ||
63 | |||
64 | .. note:: | ||
65 | |||
66 | Classes for common frameworks already exist in :term:`OpenEmbedded-Core | ||
67 | (OE-Core)`, such as: | ||
68 | |||
69 | - :oe_git:`go-ptest </openembedded-core/tree/meta/classes-recipe/go-ptest.bbclass>` | ||
70 | - :ref:`ref-classes-ptest-cargo` | ||
71 | - :ref:`ref-classes-ptest-gnome` | ||
72 | - :oe_git:`ptest-perl </openembedded-core/tree/meta/classes-recipe/ptest-perl.bbclass>` | ||
73 | - :oe_git:`ptest-python-pytest </openembedded-core/tree/meta/classes-recipe/ptest-python-pytest.bbclass>` | ||
74 | |||
75 | Inheriting these classes with the ``inherit`` keyword in your recipe will | ||
76 | make the next steps automatic. | ||
77 | |||
78 | - *Create run-ptest:* This script starts your test. Locate the | ||
79 | script where you will refer to it using | ||
80 | :term:`SRC_URI`. Here is an | ||
81 | example that starts a test for ``dbus``:: | ||
82 | |||
83 | #!/bin/sh | ||
84 | cd test | ||
85 | make -k runtest-TESTS | ||
86 | |||
87 | - *Ensure dependencies are met:* If the test adds build or runtime | ||
88 | dependencies that normally do not exist for the package (such as | ||
89 | requiring "make" to run the test suite), use the | ||
90 | :term:`DEPENDS` and | ||
91 | :term:`RDEPENDS` variables in | ||
92 | your recipe in order for the package to meet the dependencies. Here | ||
93 | is an example where the package has a runtime dependency on "make":: | ||
94 | |||
95 | RDEPENDS:${PN}-ptest += "make" | ||
96 | |||
97 | - *Add a function to build the test suite:* Not many packages support | ||
98 | cross-compilation of their test suites. Consequently, you usually | ||
99 | need to add a cross-compilation function to the package. | ||
100 | |||
101 | Many packages based on Automake compile and run the test suite by | ||
102 | using a single command such as ``make check``. However, the host | ||
103 | ``make check`` builds and runs on the same computer, while | ||
104 | cross-compiling requires that the package is built on the host but | ||
105 | executed for the target architecture (though often, as in the case | ||
106 | for ptest, the execution occurs on the host). The built version of | ||
107 | Automake that ships with the Yocto Project includes a patch that | ||
108 | separates building and execution. Consequently, packages that use the | ||
109 | unaltered, patched version of ``make check`` automatically | ||
110 | cross-compiles. | ||
111 | |||
112 | Regardless, you still must add a ``do_compile_ptest`` function to | ||
113 | build the test suite. Add a function similar to the following to your | ||
114 | recipe:: | ||
115 | |||
116 | do_compile_ptest() { | ||
117 | oe_runmake buildtest-TESTS | ||
118 | } | ||
119 | |||
120 | - *Ensure special configurations are set:* If the package requires | ||
121 | special configurations prior to compiling the test code, you must | ||
122 | insert a ``do_configure_ptest`` function into the recipe. | ||
123 | |||
124 | - *Install the test suite:* The :ref:`ref-classes-ptest` class | ||
125 | automatically copies the file ``run-ptest`` to the target and then runs make | ||
126 | ``install-ptest`` to run the tests. If this is not enough, you need | ||
127 | to create a ``do_install_ptest`` function and make sure it gets | ||
128 | called after the "make install-ptest" completes. | ||
diff --git a/documentation/test-manual/reproducible-builds.rst b/documentation/test-manual/reproducible-builds.rst index 91f94a5c74..aaf2e4541e 100644 --- a/documentation/test-manual/reproducible-builds.rst +++ b/documentation/test-manual/reproducible-builds.rst | |||
@@ -91,13 +91,21 @@ run:: | |||
91 | 91 | ||
92 | oe-selftest -r reproducible.ReproducibleTests.test_reproducible_builds | 92 | oe-selftest -r reproducible.ReproducibleTests.test_reproducible_builds |
93 | 93 | ||
94 | This defaults to including a ``world`` build so, if other layers are added, it would | 94 | This defaults to including a ``world`` build so, if other layers are added, it |
95 | also run the tests for recipes in the additional layers. Different build targets | 95 | would also run the tests for recipes in the additional layers. Different build |
96 | can be defined using the :term:`OEQA_REPRODUCIBLE_TEST_TARGET` variable in ``local.conf``. | 96 | targets can be defined using the :term:`OEQA_REPRODUCIBLE_TEST_TARGET` variable |
97 | The first build will be run using :ref:`Shared State <overview-manual/concepts:Shared State>` if | 97 | in ``local.conf``. For example, running reproducibility tests for only the |
98 | available, the second build explicitly disables | 98 | ``python3-numpy`` recipe can be done by setting:: |
99 | :ref:`Shared State <overview-manual/concepts:Shared State>` except for recipes defined in | 99 | |
100 | the :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS` variable, and builds on the | 100 | OEQA_REPRODUCIBLE_TEST_TARGET = "python3-numpy" |
101 | |||
102 | in local.conf before running the ``oe-selftest`` command shown above. | ||
103 | |||
104 | Reproducibility builds the target list twice. The first build will be run using | ||
105 | :ref:`Shared State <overview-manual/concepts:Shared State>` if available, the | ||
106 | second build explicitly disables :ref:`Shared State | ||
107 | <overview-manual/concepts:Shared State>` except for recipes defined in the | ||
108 | :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS` variable, and builds on the | ||
101 | specific host the build is running on. This means we can test reproducibility | 109 | specific host the build is running on. This means we can test reproducibility |
102 | builds between different host distributions over time on the Autobuilder. | 110 | builds between different host distributions over time on the Autobuilder. |
103 | 111 | ||
@@ -111,12 +119,8 @@ https://autobuilder.yocto.io/pub/repro-fail/ in the form ``oe-reproducible + | |||
111 | The project's current reproducibility status can be seen at | 119 | The project's current reproducibility status can be seen at |
112 | :yocto_home:`/reproducible-build-results/` | 120 | :yocto_home:`/reproducible-build-results/` |
113 | 121 | ||
114 | You can also check the reproducibility status on supported host distributions: | 122 | You can also check the reproducibility status on the Autobuilder: |
115 | 123 | :yocto_ab:`/valkyrie/#/builders/reproducible`. | |
116 | - CentOS: :yocto_ab:`/typhoon/#/builders/reproducible-centos` | ||
117 | - Debian: :yocto_ab:`/typhoon/#/builders/reproducible-debian` | ||
118 | - Fedora: :yocto_ab:`/typhoon/#/builders/reproducible-fedora` | ||
119 | - Ubuntu: :yocto_ab:`/typhoon/#/builders/reproducible-ubuntu` | ||
120 | 124 | ||
121 | =============================== | 125 | =============================== |
122 | Can I test my layer or recipes? | 126 | Can I test my layer or recipes? |
diff --git a/documentation/dev-manual/runtime-testing.rst b/documentation/test-manual/runtime-testing.rst index 7a2b42f25a..557e0530b0 100644 --- a/documentation/dev-manual/runtime-testing.rst +++ b/documentation/test-manual/runtime-testing.rst | |||
@@ -1,5 +1,6 @@ | |||
1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK | 1 | .. SPDX-License-Identifier: CC-BY-SA-2.0-UK |
2 | 2 | ||
3 | ************************************ | ||
3 | Performing Automated Runtime Testing | 4 | Performing Automated Runtime Testing |
4 | ************************************ | 5 | ************************************ |
5 | 6 | ||
@@ -153,7 +154,7 @@ options are available: | |||
153 | 154 | ||
154 | If you choose "SystemdbootTarget", there are additional requirements | 155 | If you choose "SystemdbootTarget", there are additional requirements |
155 | and considerations. See the | 156 | and considerations. See the |
156 | ":ref:`dev-manual/runtime-testing:selecting systemdboottarget`" section, which | 157 | ":ref:`test-manual/runtime-testing:selecting systemdboottarget`" section, which |
157 | follows, for more information. | 158 | follows, for more information. |
158 | 159 | ||
159 | - *"BeagleBoneTarget":* Choose "BeagleBoneTarget" if you are deploying | 160 | - *"BeagleBoneTarget":* Choose "BeagleBoneTarget" if you are deploying |
@@ -179,7 +180,7 @@ Selecting SystemdbootTarget | |||
179 | 180 | ||
180 | If you did not set :term:`TEST_TARGET` to "SystemdbootTarget", then you do | 181 | If you did not set :term:`TEST_TARGET` to "SystemdbootTarget", then you do |
181 | not need any information in this section. You can skip down to the | 182 | not need any information in this section. You can skip down to the |
182 | ":ref:`dev-manual/runtime-testing:running tests`" section. | 183 | ":ref:`test-manual/runtime-testing:running tests`" section. |
183 | 184 | ||
184 | If you did set :term:`TEST_TARGET` to "SystemdbootTarget", you also need to | 185 | If you did set :term:`TEST_TARGET` to "SystemdbootTarget", you also need to |
185 | perform a one-time setup of your controller image by doing the following: | 186 | perform a one-time setup of your controller image by doing the following: |
diff --git a/documentation/test-manual/test-process.rst b/documentation/test-manual/test-process.rst index 7bec5ba828..945b56830f 100644 --- a/documentation/test-manual/test-process.rst +++ b/documentation/test-manual/test-process.rst | |||
@@ -20,7 +20,7 @@ helps review and test patches and this is his testing tree). | |||
20 | We have two broad categories of test builds, including "full" and | 20 | We have two broad categories of test builds, including "full" and |
21 | "quick". On the Autobuilder, these can be seen as "a-quick" and | 21 | "quick". On the Autobuilder, these can be seen as "a-quick" and |
22 | "a-full", simply for ease of sorting in the UI. Use our Autobuilder | 22 | "a-full", simply for ease of sorting in the UI. Use our Autobuilder |
23 | :yocto_ab:`console view </typhoon/#/console>` to see where we manage most | 23 | :yocto_ab:`console view </valkyrie/#/console>` to see where we manage most |
24 | test-related items. | 24 | test-related items. |
25 | 25 | ||
26 | Builds are triggered manually when the test branches are ready. The | 26 | Builds are triggered manually when the test branches are ready. The |
diff --git a/documentation/test-manual/understand-autobuilder.rst b/documentation/test-manual/understand-autobuilder.rst index 6b4fab4f0b..7f4d1be3cd 100644 --- a/documentation/test-manual/understand-autobuilder.rst +++ b/documentation/test-manual/understand-autobuilder.rst | |||
@@ -10,7 +10,7 @@ Execution Flow within the Autobuilder | |||
10 | The "a-full" and "a-quick" targets are the usual entry points into the | 10 | The "a-full" and "a-quick" targets are the usual entry points into the |
11 | Autobuilder and it makes sense to follow the process through the system | 11 | Autobuilder and it makes sense to follow the process through the system |
12 | starting there. This is best visualized from the :yocto_ab:`Autobuilder | 12 | starting there. This is best visualized from the :yocto_ab:`Autobuilder |
13 | Console view </typhoon/#/console>`. | 13 | Console view </valkyrie/#/console>`. |
14 | 14 | ||
15 | Each item along the top of that view represents some "target build" and | 15 | Each item along the top of that view represents some "target build" and |
16 | these targets are all run in parallel. The 'full' build will trigger the | 16 | these targets are all run in parallel. The 'full' build will trigger the |
diff --git a/documentation/toaster-manual/reference.rst b/documentation/toaster-manual/reference.rst index 755b895cee..3050b5d0f5 100644 --- a/documentation/toaster-manual/reference.rst +++ b/documentation/toaster-manual/reference.rst | |||
@@ -546,7 +546,7 @@ database. | |||
546 | 546 | ||
547 | You need to run the ``buildslist`` command first to identify existing | 547 | You need to run the ``buildslist`` command first to identify existing |
548 | builds in the database before using the | 548 | builds in the database before using the |
549 | :ref:`toaster-manual/reference:\`\`builddelete\`\`` command. Here is an | 549 | :ref:`toaster-manual/reference:``builddelete``` command. Here is an |
550 | example that assumes default repository and :term:`Build Directory` names: | 550 | example that assumes default repository and :term:`Build Directory` names: |
551 | 551 | ||
552 | .. code-block:: shell | 552 | .. code-block:: shell |
@@ -555,7 +555,7 @@ example that assumes default repository and :term:`Build Directory` names: | |||
555 | $ python ../bitbake/lib/toaster/manage.py buildslist | 555 | $ python ../bitbake/lib/toaster/manage.py buildslist |
556 | 556 | ||
557 | If your Toaster database had only one build, the above | 557 | If your Toaster database had only one build, the above |
558 | :ref:`toaster-manual/reference:\`\`buildslist\`\`` | 558 | :ref:`toaster-manual/reference:``buildslist``` |
559 | command would return something like the following:: | 559 | command would return something like the following:: |
560 | 560 | ||
561 | 1: qemux86 poky core-image-minimal | 561 | 1: qemux86 poky core-image-minimal |
@@ -576,7 +576,7 @@ the database. | |||
576 | 576 | ||
577 | Prior to running the ``builddelete`` command, you need to get the ID | 577 | Prior to running the ``builddelete`` command, you need to get the ID |
578 | associated with builds by using the | 578 | associated with builds by using the |
579 | :ref:`toaster-manual/reference:\`\`buildslist\`\`` command. | 579 | :ref:`toaster-manual/reference:``buildslist``` command. |
580 | 580 | ||
581 | ``perf`` | 581 | ``perf`` |
582 | -------- | 582 | -------- |