summaryrefslogtreecommitdiffstats
path: root/documentation
diff options
context:
space:
mode:
Diffstat (limited to 'documentation')
-rw-r--r--documentation/Makefile36
-rw-r--r--documentation/README39
-rw-r--r--documentation/brief-yoctoprojectqs/index.rst12
-rw-r--r--documentation/bsp-guide/bsp.rst56
-rw-r--r--documentation/conf.py33
-rw-r--r--documentation/contributor-guide/recipe-style-guide.rst8
-rw-r--r--documentation/contributor-guide/submit-changes.rst90
-rw-r--r--documentation/dev-manual/bblock.rst129
-rw-r--r--documentation/dev-manual/bmaptool.rst29
-rw-r--r--documentation/dev-manual/building.rst84
-rw-r--r--documentation/dev-manual/customizing-images.rst17
-rw-r--r--documentation/dev-manual/debugging.rst2
-rw-r--r--documentation/dev-manual/external-scm.rst9
-rw-r--r--documentation/dev-manual/index.rst2
-rw-r--r--documentation/dev-manual/layers.rst90
-rw-r--r--documentation/dev-manual/new-recipe.rst12
-rw-r--r--documentation/dev-manual/packages.rst125
-rw-r--r--documentation/dev-manual/qemu.rst13
-rw-r--r--documentation/dev-manual/sbom.rst15
-rw-r--r--documentation/dev-manual/start.rst2
-rw-r--r--documentation/dev-manual/upgrading-recipes.rst2
-rw-r--r--documentation/dev-manual/vulnerabilities.rst96
-rw-r--r--documentation/dev-manual/wic.rst4
-rw-r--r--documentation/downloads.rst11
-rw-r--r--documentation/index.rst7
-rw-r--r--documentation/kernel-dev/common.rst27
-rw-r--r--documentation/kernel-dev/intro.rst2
-rw-r--r--documentation/migration-guides/migration-1.5.rst4
-rw-r--r--documentation/migration-guides/migration-1.6.rst2
-rw-r--r--documentation/migration-guides/release-4.0.rst8
-rw-r--r--documentation/migration-guides/release-5.0.rst7
-rw-r--r--documentation/migration-guides/release-notes-3.4.1.rst14
-rw-r--r--documentation/migration-guides/release-notes-3.4.2.rst40
-rw-r--r--documentation/migration-guides/release-notes-3.4.3.rst10
-rw-r--r--documentation/migration-guides/release-notes-3.4.4.rst6
-rw-r--r--documentation/migration-guides/release-notes-3.4.rst56
-rw-r--r--documentation/migration-guides/release-notes-4.0.1.rst10
-rw-r--r--documentation/migration-guides/release-notes-4.0.10.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.11.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.0.12.rst48
-rw-r--r--documentation/migration-guides/release-notes-4.0.13.rst68
-rw-r--r--documentation/migration-guides/release-notes-4.0.14.rst56
-rw-r--r--documentation/migration-guides/release-notes-4.0.15.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.0.16.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.0.17.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.18.rst32
-rw-r--r--documentation/migration-guides/release-notes-4.0.19.rst36
-rw-r--r--documentation/migration-guides/release-notes-4.0.2.rst14
-rw-r--r--documentation/migration-guides/release-notes-4.0.20.rst16
-rw-r--r--documentation/migration-guides/release-notes-4.0.21.rst166
-rw-r--r--documentation/migration-guides/release-notes-4.0.22.rst196
-rw-r--r--documentation/migration-guides/release-notes-4.0.23.rst209
-rw-r--r--documentation/migration-guides/release-notes-4.0.24.rst383
-rw-r--r--documentation/migration-guides/release-notes-4.0.25.rst167
-rw-r--r--documentation/migration-guides/release-notes-4.0.26.rst263
-rw-r--r--documentation/migration-guides/release-notes-4.0.27.rst153
-rw-r--r--documentation/migration-guides/release-notes-4.0.3.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.0.4.rst22
-rw-r--r--documentation/migration-guides/release-notes-4.0.5.rst10
-rw-r--r--documentation/migration-guides/release-notes-4.0.6.rst44
-rw-r--r--documentation/migration-guides/release-notes-4.0.7.rst40
-rw-r--r--documentation/migration-guides/release-notes-4.0.8.rst20
-rw-r--r--documentation/migration-guides/release-notes-4.0.9.rst42
-rw-r--r--documentation/migration-guides/release-notes-4.0.rst64
-rw-r--r--documentation/migration-guides/release-notes-4.1.1.rst22
-rw-r--r--documentation/migration-guides/release-notes-4.1.2.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.1.3.rst36
-rw-r--r--documentation/migration-guides/release-notes-4.1.4.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.1.rst60
-rw-r--r--documentation/migration-guides/release-notes-4.2.1.rst14
-rw-r--r--documentation/migration-guides/release-notes-4.2.2.rst30
-rw-r--r--documentation/migration-guides/release-notes-4.2.3.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.2.4.rst72
-rw-r--r--documentation/migration-guides/release-notes-4.2.rst64
-rw-r--r--documentation/migration-guides/release-notes-4.3.1.rst16
-rw-r--r--documentation/migration-guides/release-notes-4.3.2.rst24
-rw-r--r--documentation/migration-guides/release-notes-4.3.3.rst22
-rw-r--r--documentation/migration-guides/release-notes-4.3.4.rst34
-rw-r--r--documentation/migration-guides/release-notes-4.3.rst82
-rw-r--r--documentation/migration-guides/release-notes-5.0.10.rst208
-rw-r--r--documentation/migration-guides/release-notes-5.0.2.rst22
-rw-r--r--documentation/migration-guides/release-notes-5.0.3.rst48
-rw-r--r--documentation/migration-guides/release-notes-5.0.4.rst212
-rw-r--r--documentation/migration-guides/release-notes-5.0.5.rst227
-rw-r--r--documentation/migration-guides/release-notes-5.0.6.rst223
-rw-r--r--documentation/migration-guides/release-notes-5.0.7.rst331
-rw-r--r--documentation/migration-guides/release-notes-5.0.8.rst226
-rw-r--r--documentation/migration-guides/release-notes-5.0.9.rst206
-rw-r--r--documentation/migration-guides/release-notes-5.0.rst68
-rw-r--r--documentation/overview-manual/concepts.rst91
-rw-r--r--documentation/overview-manual/yp-intro.rst2
-rw-r--r--documentation/poky.yaml.in276
-rw-r--r--documentation/ref-manual/classes.rst89
-rw-r--r--documentation/ref-manual/devtool-reference.rst94
-rw-r--r--documentation/ref-manual/faq.rst41
-rw-r--r--documentation/ref-manual/features.rst4
-rw-r--r--documentation/ref-manual/images.rst25
-rw-r--r--documentation/ref-manual/qa-checks.rst10
-rw-r--r--documentation/ref-manual/release-process.rst25
-rw-r--r--documentation/ref-manual/structure.rst44
-rw-r--r--documentation/ref-manual/svg/releases.svg1223
-rw-r--r--documentation/ref-manual/system-requirements.rst72
-rw-r--r--documentation/ref-manual/tasks.rst12
-rw-r--r--documentation/ref-manual/terms.rst4
-rw-r--r--documentation/ref-manual/variables.rst728
-rw-r--r--documentation/sdk-manual/appendix-obtain.rst6
-rw-r--r--documentation/sdk-manual/extensible.rst219
-rw-r--r--documentation/sdk-manual/intro.rst4
-rw-r--r--documentation/sdk-manual/using.rst2
-rwxr-xr-xdocumentation/set_versions.py16
-rw-r--r--documentation/sphinx-static/favicon.icobin0 -> 1291 bytes
-rw-r--r--documentation/sphinx-static/switchers.js.in6
-rw-r--r--documentation/standards.md17
-rw-r--r--documentation/styles/config/vocabularies/Yocto/accept.txt1
-rw-r--r--documentation/test-manual/index.rst2
-rw-r--r--documentation/test-manual/intro.rst18
-rw-r--r--documentation/test-manual/ptest.rst128
-rw-r--r--documentation/test-manual/reproducible-builds.rst30
-rw-r--r--documentation/test-manual/runtime-testing.rst (renamed from documentation/dev-manual/runtime-testing.rst)5
-rw-r--r--documentation/test-manual/test-process.rst2
-rw-r--r--documentation/test-manual/understand-autobuilder.rst2
-rw-r--r--documentation/toaster-manual/reference.rst6
122 files changed, 6918 insertions, 1985 deletions
diff --git a/documentation/Makefile b/documentation/Makefile
index 189bd1dfac..65e29713d4 100644
--- a/documentation/Makefile
+++ b/documentation/Makefile
@@ -3,17 +3,18 @@
3 3
4# You can set these variables from the command line, and also 4# You can set these variables from the command line, and also
5# from the environment for the first two. 5# from the environment for the first two.
6SPHINXOPTS ?= -W --keep-going -j auto 6SPHINXOPTS ?= -W --keep-going -j auto
7SPHINXBUILD ?= sphinx-build 7SPHINXBUILD ?= sphinx-build
8# Release notes are excluded because they contain contributor names and commit messages which can't be modified 8# Release notes are excluded because they contain contributor names and commit messages which can't be modified
9VALEOPTS ?= --no-wrap --glob '!migration-guides/release-notes-*.rst' 9VALEOPTS ?= --no-wrap --glob '!migration-guides/release-notes-*.rst'
10VALEDOCS ?= . 10SOURCEDIR = .
11SOURCEDIR = . 11VALEDOCS ?= $(SOURCEDIR)
12IMAGEDIRS = */svg 12SPHINXLINTDOCS ?= $(SOURCEDIR)
13BUILDDIR = _build 13IMAGEDIRS = */svg
14DESTDIR = final 14BUILDDIR = _build
15SVG2PNG = inkscape 15DESTDIR = final
16SVG2PDF = inkscape 16SVG2PNG = rsvg-convert
17SVG2PDF = rsvg-convert
17 18
18ifeq ($(shell if which $(SPHINXBUILD) >/dev/null 2>&1; then echo 1; else echo 0; fi),0) 19ifeq ($(shell if which $(SPHINXBUILD) >/dev/null 2>&1; then echo 1; else echo 0; fi),0)
19$(error "The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed") 20$(error "The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed")
@@ -25,10 +26,12 @@ help:
25 26
26.PHONY: all help Makefile clean stylecheck publish epub latexpdf 27.PHONY: all help Makefile clean stylecheck publish epub latexpdf
27 28
28publish: Makefile html singlehtml 29publish: Makefile epub latexpdf html singlehtml
29 rm -rf $(BUILDDIR)/$(DESTDIR)/ 30 rm -rf $(BUILDDIR)/$(DESTDIR)/
30 mkdir -p $(BUILDDIR)/$(DESTDIR)/ 31 mkdir -p $(BUILDDIR)/$(DESTDIR)/
31 cp -r $(BUILDDIR)/html/* $(BUILDDIR)/$(DESTDIR)/ 32 cp -r $(BUILDDIR)/html/* $(BUILDDIR)/$(DESTDIR)/
33 mkdir -p $(BUILDDIR)/$(DESTDIR)/_static
34 cp $(BUILDDIR)/epub/TheYoctoProject.epub $(BUILDDIR)/latex/theyoctoproject.pdf $(BUILDDIR)/$(DESTDIR)/_static/
32 cp $(BUILDDIR)/singlehtml/index.html $(BUILDDIR)/$(DESTDIR)/singleindex.html 35 cp $(BUILDDIR)/singlehtml/index.html $(BUILDDIR)/$(DESTDIR)/singleindex.html
33 sed -i -e 's@index.html#@singleindex.html#@g' $(BUILDDIR)/$(DESTDIR)/singleindex.html 36 sed -i -e 's@index.html#@singleindex.html#@g' $(BUILDDIR)/$(DESTDIR)/singleindex.html
34 37
@@ -40,11 +43,11 @@ PNGs := $(foreach dir, $(IMAGEDIRS), $(patsubst %.svg,%.png,$(wildcard $(SOURCED
40 43
41# Pattern rule for converting SVG to PDF 44# Pattern rule for converting SVG to PDF
42%.pdf : %.svg 45%.pdf : %.svg
43 $(SVG2PDF) --export-filename=$@ $< 46 $(SVG2PDF) --format=Pdf --output=$@ $<
44 47
45# Pattern rule for converting SVG to PNG 48# Pattern rule for converting SVG to PNG
46%.png : %.svg 49%.png : %.svg
47 $(SVG2PNG) --export-filename=$@ $< 50 $(SVG2PNG) --format=Png --output=$@ $<
48 51
49clean: 52clean:
50 @rm -rf $(BUILDDIR) $(PNGs) $(PDFs) poky.yaml sphinx-static/switchers.js releases.rst 53 @rm -rf $(BUILDDIR) $(PNGs) $(PDFs) poky.yaml sphinx-static/switchers.js releases.rst
@@ -54,15 +57,18 @@ stylecheck:
54 vale $(VALEOPTS) $(VALEDOCS) 57 vale $(VALEOPTS) $(VALEDOCS)
55 58
56sphinx-lint: 59sphinx-lint:
57 sphinx-lint $(SOURCEDIR) 60 sphinx-lint $(SPHINXLINTDOCS)
58 61
59epub: $(PNGs) 62epub: $(PNGs)
60 $(SOURCEDIR)/set_versions.py 63 $(SOURCEDIR)/set_versions.py
61 @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) 64 @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O)
62 65
66# Note: we need to pass buf_size here (which is also configurable from
67# texmf.cnf), to avoid following error:
68# Unable to read an entire line---bufsize=200000. Please increase buf_size in texmf.cnf.
63latexpdf: $(PDFs) 69latexpdf: $(PDFs)
64 $(SOURCEDIR)/set_versions.py 70 $(SOURCEDIR)/set_versions.py
65 @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) 71 buf_size=10000000 $(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O)
66 72
67all: html epub latexpdf 73all: html epub latexpdf
68 74
diff --git a/documentation/README b/documentation/README
index b60472fcbf..c394ab9288 100644
--- a/documentation/README
+++ b/documentation/README
@@ -165,7 +165,15 @@ To run Vale:
165 165
166 $ make stylecheck 166 $ make stylecheck
167 167
168Link checking the Yocto Project documentation 168Style checking the whole documentation might take some time and generate a
169lot of warnings/errors, thus one can run Vale on a subset of files or
170directories:
171
172 $ make stylecheck VALEDOCS=<file>
173 $ make stylecheck VALEDOCS="<file1> <file2>"
174 $ make stylecheck VALEDOCS=<dir>
175
176Lint checking the Yocto Project documentation
169============================================= 177=============================================
170 178
171To fix errors which are not reported by Sphinx itself, 179To fix errors which are not reported by Sphinx itself,
@@ -179,6 +187,14 @@ To run sphinx-lint:
179 187
180 $ make sphinx-lint 188 $ make sphinx-lint
181 189
190Lint checking the whole documentation might take some time and generate a
191lot of warnings/errors, thus one can run sphinx-lint on a subset of files
192or directories:
193
194 $ make sphinx-lint SPHINXLINTDOCS=<file>
195 $ make sphinx-lint SPHINXLINTDOCS="<file1> <file2>"
196 $ make sphinx-lint SPHINXLINTDOCS=<dir>
197
182Sphinx theme and CSS customization 198Sphinx theme and CSS customization
183================================== 199==================================
184 200
@@ -413,5 +429,22 @@ both the Yocto Project and BitBake manuals:
413Submitting documentation changes 429Submitting documentation changes
414================================ 430================================
415 431
416Please see the top level README file in this repository for details of where 432Please refer to our contributor guide here: https://docs.yoctoproject.org/contributor-guide/
417to send patches. 433for full details on how to submit changes.
434
435As a quick guide, patches should be sent to docs@lists.yoctoproject.org
436The git command to do that would be:
437
438 git send-email -M -1 --to docs@lists.yoctoproject.org
439
440The 'To' header can be set as default for this repository:
441
442 git config sendemail.to docs@lists.yoctoproject.org
443
444Now you can just do 'git send-email origin/master..' to send all local patches.
445
446Read the other sections in this document and documentation/standards.md for
447rules to follow when contributing to the documentation.
448
449Git repository: https://git.yoctoproject.org/yocto-docs
450Mailing list: docs@lists.yoctoproject.org
diff --git a/documentation/brief-yoctoprojectqs/index.rst b/documentation/brief-yoctoprojectqs/index.rst
index c5400e4ac8..b37142ef14 100644
--- a/documentation/brief-yoctoprojectqs/index.rst
+++ b/documentation/brief-yoctoprojectqs/index.rst
@@ -44,7 +44,7 @@ following requirements:
44 much more will help to run multiple builds and increase 44 much more will help to run multiple builds and increase
45 performance by reusing build artifacts. 45 performance by reusing build artifacts.
46 46
47- At least &MIN_RAM; Gbytes of RAM, though a modern modern build host with as 47- At least &MIN_RAM; Gbytes of RAM, though a modern build host with as
48 much RAM and as many CPU cores as possible is strongly recommended to 48 much RAM and as many CPU cores as possible is strongly recommended to
49 maximize build performance. 49 maximize build performance.
50 50
@@ -57,7 +57,7 @@ following requirements:
57 :ref:`dev-manual/start:preparing the build host` 57 :ref:`dev-manual/start:preparing the build host`
58 section in the Yocto Project Development Tasks Manual. 58 section in the Yocto Project Development Tasks Manual.
59 59
60- 60- Ensure that the following utilities have these minimum version numbers:
61 61
62 - Git &MIN_GIT_VERSION; or greater 62 - Git &MIN_GIT_VERSION; or greater
63 - tar &MIN_TAR_VERSION; or greater 63 - tar &MIN_TAR_VERSION; or greater
@@ -65,7 +65,7 @@ following requirements:
65 - gcc &MIN_GCC_VERSION; or greater. 65 - gcc &MIN_GCC_VERSION; or greater.
66 - GNU make &MIN_MAKE_VERSION; or greater 66 - GNU make &MIN_MAKE_VERSION; or greater
67 67
68If your build host does not meet any of these three listed version 68If your build host does not satisfy all of the above version
69requirements, you can take steps to prepare the system so that you 69requirements, you can take steps to prepare the system so that you
70can still use the Yocto Project. See the 70can still use the Yocto Project. See the
71:ref:`ref-manual/system-requirements:required git, tar, python, make and gcc versions` 71:ref:`ref-manual/system-requirements:required git, tar, python, make and gcc versions`
@@ -78,7 +78,7 @@ You must install essential host packages on your build host. The
78following command installs the host packages based on an Ubuntu 78following command installs the host packages based on an Ubuntu
79distribution:: 79distribution::
80 80
81 $ sudo apt install &UBUNTU_HOST_PACKAGES_ESSENTIAL; 81 $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL;
82 82
83.. note:: 83.. note::
84 84
@@ -182,7 +182,7 @@ an entire Linux distribution, including the toolchain, from source.
182 page of the Yocto Project Wiki. 182 page of the Yocto Project Wiki.
183 183
184#. **Initialize the Build Environment:** From within the ``poky`` 184#. **Initialize the Build Environment:** From within the ``poky``
185 directory, run the :ref:`ref-manual/structure:\`\`oe-init-build-env\`\`` 185 directory, run the :ref:`ref-manual/structure:``oe-init-build-env```
186 environment 186 environment
187 setup script to define Yocto Project's build environment on your 187 setup script to define Yocto Project's build environment on your
188 build host. 188 build host.
@@ -252,7 +252,7 @@ an entire Linux distribution, including the toolchain, from source.
252 file in the :term:`Build Directory`:: 252 file in the :term:`Build Directory`::
253 253
254 BB_HASHSERVE_UPSTREAM = "wss://hashserv.yoctoproject.org/ws" 254 BB_HASHSERVE_UPSTREAM = "wss://hashserv.yoctoproject.org/ws"
255 SSTATE_MIRRORS ?= "file://.* http://cdn.jsdelivr.net/yocto/sstate/all/PATH;downloadfilename=PATH" 255 SSTATE_MIRRORS ?= "file://.* http://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH"
256 BB_HASHSERVE = "auto" 256 BB_HASHSERVE = "auto"
257 BB_SIGNATURE_HANDLER = "OEEquivHash" 257 BB_SIGNATURE_HANDLER = "OEEquivHash"
258 258
diff --git a/documentation/bsp-guide/bsp.rst b/documentation/bsp-guide/bsp.rst
index 11ca5d8b76..73e31670d6 100644
--- a/documentation/bsp-guide/bsp.rst
+++ b/documentation/bsp-guide/bsp.rst
@@ -81,7 +81,7 @@ directory of that Layer. This directory is what you add to the
81``conf/bblayers.conf`` file found in your 81``conf/bblayers.conf`` file found in your
82:term:`Build Directory`, which is 82:term:`Build Directory`, which is
83established after you run the OpenEmbedded build environment setup 83established after you run the OpenEmbedded build environment setup
84script (i.e. :ref:`ref-manual/structure:\`\`oe-init-build-env\`\``). 84script (i.e. :ref:`ref-manual/structure:``oe-init-build-env```).
85Adding the root directory allows the :term:`OpenEmbedded Build System` 85Adding the root directory allows the :term:`OpenEmbedded Build System`
86to recognize the BSP 86to recognize the BSP
87layer and from it build an image. Here is an example:: 87layer and from it build an image. Here is an example::
@@ -166,7 +166,7 @@ section.
166 BSPs, which are maintained in their own layers or in layers designed 166 BSPs, which are maintained in their own layers or in layers designed
167 to contain several BSPs. To get an idea of machine support through 167 to contain several BSPs. To get an idea of machine support through
168 BSP layers, you can look at the 168 BSP layers, you can look at the
169 :yocto_dl:`index of machines </releases/yocto/yocto-&DISTRO;/machines>` 169 :yocto_dl:`index of machines </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines>`
170 for the release. 170 for the release.
171 171
172#. *Optionally Clone the meta-intel BSP Layer:* If your hardware is 172#. *Optionally Clone the meta-intel BSP Layer:* If your hardware is
@@ -229,7 +229,7 @@ section.
229 229
230#. *Initialize the Build Environment:* While in the root directory of 230#. *Initialize the Build Environment:* While in the root directory of
231 the Source Directory (i.e. ``poky``), run the 231 the Source Directory (i.e. ``poky``), run the
232 :ref:`ref-manual/structure:\`\`oe-init-build-env\`\`` environment 232 :ref:`ref-manual/structure:``oe-init-build-env``` environment
233 setup script to define the OpenEmbedded build environment on your 233 setup script to define the OpenEmbedded build environment on your
234 build host. :: 234 build host. ::
235 235
@@ -674,21 +674,21 @@ to the kernel recipe by using a similarly named append file, which is
674located in the BSP Layer for your target device (e.g. the 674located in the BSP Layer for your target device (e.g. the
675``meta-bsp_root_name/recipes-kernel/linux`` directory). 675``meta-bsp_root_name/recipes-kernel/linux`` directory).
676 676
677Suppose you are using the ``linux-yocto_4.4.bb`` recipe to build the 677Suppose you are using the ``linux-yocto_6.12.bb`` recipe to build the
678kernel. In other words, you have selected the kernel in your 678kernel. In other words, you have selected the kernel in your
679``"bsp_root_name".conf`` file by adding 679``"bsp_root_name".conf`` file by adding
680:term:`PREFERRED_PROVIDER` and :term:`PREFERRED_VERSION` 680:term:`PREFERRED_PROVIDER` and :term:`PREFERRED_VERSION`
681statements as follows:: 681statements as follows::
682 682
683 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" 683 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto"
684 PREFERRED_VERSION_linux-yocto ?= "4.4%" 684 PREFERRED_VERSION_linux-yocto ?= "6.12%"
685 685
686.. note:: 686.. note::
687 687
688 When the preferred provider is assumed by default, the :term:`PREFERRED_PROVIDER` 688 When the preferred provider is assumed by default, the :term:`PREFERRED_PROVIDER`
689 statement does not appear in the ``"bsp_root_name".conf`` file. 689 statement does not appear in the ``"bsp_root_name".conf`` file.
690 690
691You would use the ``linux-yocto_4.4.bbappend`` file to append specific 691You would use the ``linux-yocto_6.12.bbappend`` file to append specific
692BSP settings to the kernel, thus configuring the kernel for your 692BSP settings to the kernel, thus configuring the kernel for your
693particular BSP. 693particular BSP.
694 694
@@ -698,14 +698,19 @@ in the Yocto Project Linux Kernel Development Manual.
698 698
699An alternate scenario is when you create your own kernel recipe for the 699An alternate scenario is when you create your own kernel recipe for the
700BSP. A good example of this is the Raspberry Pi BSP. If you examine the 700BSP. A good example of this is the Raspberry Pi BSP. If you examine the
701``recipes-kernel/linux`` directory you see the following:: 701``recipes-kernel/linux`` directory in that layer you see the following
702Raspberry Pi-specific recipes and associated files::
702 703
704 files/
705 linux-raspberrypi_6.12.bb
706 linux-raspberrypi_6.1.bb
707 linux-raspberrypi_6.6.bb
703 linux-raspberrypi-dev.bb 708 linux-raspberrypi-dev.bb
704 linux-raspberrypi.inc 709 linux-raspberrypi.inc
705 linux-raspberrypi_4.14.bb 710 linux-raspberrypi-v7_6.12.bb
706 linux-raspberrypi_4.9.bb 711 linux-raspberrypi-v7_6.1.bb
707 712 linux-raspberrypi-v7_6.6.bb
708The directory contains three kernel recipes and a common include file. 713 linux-raspberrypi-v7.inc
709 714
710Developing a Board Support Package (BSP) 715Developing a Board Support Package (BSP)
711======================================== 716========================================
@@ -1177,7 +1182,7 @@ Use these steps to create a BSP layer:
1177 1182
1178- *Create a Kernel Recipe:* Create a kernel recipe in 1183- *Create a Kernel Recipe:* Create a kernel recipe in
1179 ``recipes-kernel/linux`` by either using a kernel append file or a 1184 ``recipes-kernel/linux`` by either using a kernel append file or a
1180 new custom kernel recipe file (e.g. ``linux-yocto_4.12.bb``). The BSP 1185 new custom kernel recipe file (e.g. ``linux-yocto_6.12.bb``). The BSP
1181 layers mentioned in the previous step also contain different kernel 1186 layers mentioned in the previous step also contain different kernel
1182 examples. See the ":ref:`kernel-dev/common:modifying an existing recipe`" 1187 examples. See the ":ref:`kernel-dev/common:modifying an existing recipe`"
1183 section in the Yocto Project Linux Kernel Development Manual for 1188 section in the Yocto Project Linux Kernel Development Manual for
@@ -1242,7 +1247,7 @@ located in :yocto_git:`poky/meta-yocto-bsp/conf/machine/beaglebone-yocto.conf
1242 1247
1243 PREFERRED_PROVIDER_virtual/xserver ?= "xserver-xorg" 1248 PREFERRED_PROVIDER_virtual/xserver ?= "xserver-xorg"
1244 1249
1245 MACHINE_EXTRA_RRECOMMENDS = "kernel-modules kernel-devicetree" 1250 MACHINE_EXTRA_RRECOMMENDS = "kernel-modules"
1246 1251
1247 EXTRA_IMAGEDEPENDS += "virtual/bootloader" 1252 EXTRA_IMAGEDEPENDS += "virtual/bootloader"
1248 1253
@@ -1258,23 +1263,21 @@ located in :yocto_git:`poky/meta-yocto-bsp/conf/machine/beaglebone-yocto.conf
1258 SERIAL_CONSOLES ?= "115200;ttyS0 115200;ttyO0 115200;ttyAMA0" 1263 SERIAL_CONSOLES ?= "115200;ttyS0 115200;ttyO0 115200;ttyAMA0"
1259 1264
1260 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" 1265 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto"
1261 PREFERRED_VERSION_linux-yocto ?= "6.1%" 1266 PREFERRED_VERSION_linux-yocto ?= "6.12%"
1262 1267
1263 KERNEL_IMAGETYPE = "zImage" 1268 KERNEL_IMAGETYPE = "zImage"
1264 KERNEL_DEVICETREE = "am335x-bone.dtb am335x-boneblack.dtb am335x-bonegreen.dtb" 1269 DTB_FILES = "am335x-bone.dtb am335x-boneblack.dtb am335x-bonegreen.dtb"
1265 KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}" 1270 KERNEL_DEVICETREE = '${@' '.join('ti/omap/%s' % d for d in '${DTB_FILES}'.split())}'
1266 1271
1267 PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot" 1272 PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot"
1268 1273
1269 SPL_BINARY = "MLO" 1274 SPL_BINARY = "MLO"
1270 UBOOT_SUFFIX = "img" 1275 UBOOT_SUFFIX = "img"
1271 UBOOT_MACHINE = "am335x_evm_defconfig" 1276 UBOOT_MACHINE = "am335x_evm_defconfig"
1272 UBOOT_ENTRYPOINT = "0x80008000"
1273 UBOOT_LOADADDRESS = "0x80008000"
1274 1277
1275 MACHINE_FEATURES = "usbgadget usbhost vfat alsa" 1278 MACHINE_FEATURES = "usbgadget usbhost vfat alsa"
1276 1279
1277 IMAGE_BOOT_FILES ?= "u-boot.${UBOOT_SUFFIX} ${SPL_BINARY} ${KERNEL_IMAGETYPE} ${KERNEL_DEVICETREE}" 1280 IMAGE_BOOT_FILES ?= "u-boot.${UBOOT_SUFFIX} ${SPL_BINARY} ${KERNEL_IMAGETYPE} ${DTB_FILES}"
1278 1281
1279 # support runqemu 1282 # support runqemu
1280 EXTRA_IMAGEDEPENDS += "qemu-native qemu-helper-native" 1283 EXTRA_IMAGEDEPENDS += "qemu-native qemu-helper-native"
@@ -1328,12 +1331,12 @@ Project Reference Manual.
1328 needed in the root filesystem. In this case, the U-Boot recipe must 1331 needed in the root filesystem. In this case, the U-Boot recipe must
1329 be built for the image. 1332 be built for the image.
1330 1333
1331 At the end of the file, we also use this setings to implement 1334 At the end of the file, we also use this setting to implement
1332 ``runqemu`` support on the host machine. 1335 ``runqemu`` support on the host machine.
1333 1336
1334- :term:`DEFAULTTUNE`: Machines 1337- :term:`DEFAULTTUNE`: Machines
1335 use tunings to optimize machine, CPU, and application performance. 1338 use tunings to optimize machine, CPU, and application performance.
1336 These features, which are collectively known as "tuning features", 1339 These features --- collectively known as "tuning features" ---
1337 are set in the :term:`OpenEmbedded-Core (OE-Core)` layer. In this 1340 are set in the :term:`OpenEmbedded-Core (OE-Core)` layer. In this
1338 example, the default tuning file is :oe_git:`tune-cortexa8 1341 example, the default tuning file is :oe_git:`tune-cortexa8
1339 </openembedded-core/tree/meta/conf/machine/include/arm/armv7a/tune-cortexa8.inc>`. 1342 </openembedded-core/tree/meta/conf/machine/include/arm/armv7a/tune-cortexa8.inc>`.
@@ -1363,8 +1366,7 @@ Project Reference Manual.
1363 to create the sysroot when building a Wic image. 1366 to create the sysroot when building a Wic image.
1364 1367
1365- :term:`SERIAL_CONSOLES`: 1368- :term:`SERIAL_CONSOLES`:
1366 Defines a serial console (TTY) to enable using getty. In this case, 1369 Defines one or more serial consoles (TTYs) to enable using getty.
1367 the baud rate is "115200" and the device name is "ttyO0".
1368 1370
1369- :term:`PREFERRED_PROVIDER_virtual/kernel <PREFERRED_PROVIDER>`: 1371- :term:`PREFERRED_PROVIDER_virtual/kernel <PREFERRED_PROVIDER>`:
1370 Specifies the recipe that provides "virtual/kernel" when more than 1372 Specifies the recipe that provides "virtual/kernel" when more than
@@ -1374,7 +1376,7 @@ Project Reference Manual.
1374 1376
1375- :term:`PREFERRED_VERSION_linux-yocto <PREFERRED_VERSION>`: 1377- :term:`PREFERRED_VERSION_linux-yocto <PREFERRED_VERSION>`:
1376 Defines the version of the recipe used to build the kernel, which is 1378 Defines the version of the recipe used to build the kernel, which is
1377 "6.1" in this case. 1379 "6.12" in this case.
1378 1380
1379- :term:`KERNEL_IMAGETYPE`: 1381- :term:`KERNEL_IMAGETYPE`:
1380 The type of kernel to build for the device. In this case, the 1382 The type of kernel to build for the device. In this case, the
@@ -1416,12 +1418,6 @@ Project Reference Manual.
1416 Specifies the value passed on the make command line when building 1418 Specifies the value passed on the make command line when building
1417 a U-Boot image. 1419 a U-Boot image.
1418 1420
1419 - :term:`UBOOT_ENTRYPOINT`:
1420 Specifies the entry point for the U-Boot image.
1421
1422 - :term:`UBOOT_LOADADDRESS`:
1423 Specifies the load address for the U-Boot image.
1424
1425- :term:`MACHINE_FEATURES`: 1421- :term:`MACHINE_FEATURES`:
1426 Specifies the list of hardware features the BeagleBone device is 1422 Specifies the list of hardware features the BeagleBone device is
1427 capable of supporting. In this case, the device supports "usbgadget 1423 capable of supporting. In this case, the device supports "usbgadget
diff --git a/documentation/conf.py b/documentation/conf.py
index 35c5c14535..1eca8756ab 100644
--- a/documentation/conf.py
+++ b/documentation/conf.py
@@ -13,6 +13,7 @@
13# documentation root, use os.path.abspath to make it absolute, like shown here. 13# documentation root, use os.path.abspath to make it absolute, like shown here.
14# 14#
15import os 15import os
16import re
16import sys 17import sys
17import datetime 18import datetime
18try: 19try:
@@ -90,8 +91,9 @@ rst_prolog = """
90 91
91# external links and substitutions 92# external links and substitutions
92extlinks = { 93extlinks = {
93 'cve': ('https://nvd.nist.gov/vuln/detail/CVE-%s', 'CVE-%s'), 94 'bitbake_git': ('https://git.openembedded.org/bitbake%s', None),
94 'cve_mitre': ('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-%s', 'CVE-%s'), 95 'cve_mitre': ('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-%s', 'CVE-%s'),
96 'cve_nist': ('https://nvd.nist.gov/vuln/detail/CVE-%s', 'CVE-%s'),
95 'yocto_home': ('https://www.yoctoproject.org%s', None), 97 'yocto_home': ('https://www.yoctoproject.org%s', None),
96 'yocto_wiki': ('https://wiki.yoctoproject.org/wiki%s', None), 98 'yocto_wiki': ('https://wiki.yoctoproject.org/wiki%s', None),
97 'yocto_dl': ('https://downloads.yoctoproject.org%s', None), 99 'yocto_dl': ('https://downloads.yoctoproject.org%s', None),
@@ -110,6 +112,9 @@ extlinks = {
110 'wikipedia': ('https://en.wikipedia.org/wiki/%s', None), 112 'wikipedia': ('https://en.wikipedia.org/wiki/%s', None),
111} 113}
112 114
115# To be able to use :manpage:`<something>` in the docs.
116manpages_url = 'https://manpages.debian.org/{path}'
117
113# Intersphinx config to use cross reference with BitBake user manual 118# Intersphinx config to use cross reference with BitBake user manual
114intersphinx_mapping = { 119intersphinx_mapping = {
115 'bitbake': ('https://docs.yoctoproject.org/bitbake/' + bitbake_version, None) 120 'bitbake': ('https://docs.yoctoproject.org/bitbake/' + bitbake_version, None)
@@ -135,6 +140,7 @@ except ImportError:
135 sys.exit(1) 140 sys.exit(1)
136 141
137html_logo = 'sphinx-static/YoctoProject_Logo_RGB.jpg' 142html_logo = 'sphinx-static/YoctoProject_Logo_RGB.jpg'
143html_favicon = 'sphinx-static/favicon.ico'
138 144
139# Add any paths that contain custom static files (such as style sheets) here, 145# Add any paths that contain custom static files (such as style sheets) here,
140# relative to this directory. They are copied after the builtin static files, 146# relative to this directory. They are copied after the builtin static files,
@@ -158,11 +164,34 @@ html_last_updated_fmt = '%b %d, %Y'
158# Remove the trailing 'dot' in section numbers 164# Remove the trailing 'dot' in section numbers
159html_secnumber_suffix = " " 165html_secnumber_suffix = " "
160 166
167# We need XeTeX to process special unicode character, sometimes the contributor
168# list from the release note contains those.
169# See https://docs.readthedocs.io/en/stable/guides/pdf-non-ascii-languages.html.
170latex_engine = 'xelatex'
171latex_use_xindy = False
161latex_elements = { 172latex_elements = {
162 'passoptionstopackages': '\\PassOptionsToPackage{bookmarksdepth=5}{hyperref}', 173 'passoptionstopackages': '\\PassOptionsToPackage{bookmarksdepth=5}{hyperref}',
163 'preamble': '\\setcounter{tocdepth}{2}', 174 'preamble': '\\usepackage[UTF8]{ctex}\n\\setcounter{tocdepth}{2}',
164} 175}
165 176
177
178from sphinx.search import SearchEnglish
179from sphinx.search import languages
180class DashFriendlySearchEnglish(SearchEnglish):
181
182 # Accept words that can include hyphens
183 _word_re = re.compile(r'[\w\-]+')
184
185 js_splitter_code = r"""
186function splitQuery(query) {
187 return query
188 .split(/[^\p{Letter}\p{Number}_\p{Emoji_Presentation}-]+/gu)
189 .filter(term => term.length > 0);
190}
191"""
192
193languages['en'] = DashFriendlySearchEnglish
194
166# Make the EPUB builder prefer PNG to SVG because of issues rendering Inkscape SVG 195# Make the EPUB builder prefer PNG to SVG because of issues rendering Inkscape SVG
167from sphinx.builders.epub3 import Epub3Builder 196from sphinx.builders.epub3 import Epub3Builder
168Epub3Builder.supported_image_types = ['image/png', 'image/gif', 'image/jpeg'] 197Epub3Builder.supported_image_types = ['image/png', 'image/gif', 'image/jpeg']
diff --git a/documentation/contributor-guide/recipe-style-guide.rst b/documentation/contributor-guide/recipe-style-guide.rst
index 08d8fb4259..617e202431 100644
--- a/documentation/contributor-guide/recipe-style-guide.rst
+++ b/documentation/contributor-guide/recipe-style-guide.rst
@@ -47,10 +47,10 @@ Debian policy closely.
47 47
48When a recipe references a git revision that does not correspond to a released 48When a recipe references a git revision that does not correspond to a released
49version of software (e.g. is not a tagged version), the :term:`PV` variable 49version of software (e.g. is not a tagged version), the :term:`PV` variable
50should include the Git revision using the following to make the 50should include the sign ``+``, so :term:`bitbake` automatically includes package
51version clear:: 51version information during the packaging phase::
52 52
53 PV = "<version>+git${SRCPV}" 53 PV = "<version>+git"
54 54
55In this case, ``<version>`` should be the most recently released version of the 55In this case, ``<version>`` should be the most recently released version of the
56software from the current source revision (``git describe`` can be useful for 56software from the current source revision (``git describe`` can be useful for
@@ -395,7 +395,7 @@ one CVE is fixed, separate them using spaces.
395CVE Examples 395CVE Examples
396------------ 396------------
397 397
398This should be the header of patch that fixes :cve:`2015-8370` in GRUB2:: 398This should be the header of patch that fixes :cve_nist:`2015-8370` in GRUB2::
399 399
400 grub2: Fix CVE-2015-8370 400 grub2: Fix CVE-2015-8370
401 401
diff --git a/documentation/contributor-guide/submit-changes.rst b/documentation/contributor-guide/submit-changes.rst
index 47a416b245..6d5d69d7cf 100644
--- a/documentation/contributor-guide/submit-changes.rst
+++ b/documentation/contributor-guide/submit-changes.rst
@@ -65,6 +65,13 @@ use to identify your commits::
65 git config --global user.name "Ada Lovelace" 65 git config --global user.name "Ada Lovelace"
66 git config --global user.email "ada.lovelace@gmail.com" 66 git config --global user.email "ada.lovelace@gmail.com"
67 67
68By default, Git adds a signature line at the end of patches containing the Git
69version. We suggest to remove it as it doesn't add useful information.
70
71Remove it with the following command::
72
73 git config --global format.signature ""
74
68Clone the Git repository for the component to modify 75Clone the Git repository for the component to modify
69---------------------------------------------------- 76----------------------------------------------------
70 77
@@ -483,7 +490,7 @@ typical usage of ``git send-email``::
483 git send-email --to <mailing-list-address> *.patch 490 git send-email --to <mailing-list-address> *.patch
484 491
485Then, review each subject line and list of recipients carefully, and then 492Then, review each subject line and list of recipients carefully, and then
486and then allow the command to send each message. 493allow the command to send each message.
487 494
488You will see that ``git send-email`` will automatically copy the people listed 495You will see that ``git send-email`` will automatically copy the people listed
489in any commit tags such as ``Signed-off-by`` or ``Reported-by``. 496in any commit tags such as ``Signed-off-by`` or ``Reported-by``.
@@ -769,6 +776,38 @@ argument to ``git format-patch`` with a version number::
769 776
770 git format-patch -v2 <ref-branch> 777 git format-patch -v2 <ref-branch>
771 778
779
780After generating updated patches (v2, v3, and so on) via ``git
781format-patch``, ideally developers will add a patch version changelog
782to each patch that describes what has changed between each revision of
783the patch. Add patch version changelogs after the ``---`` marker in the
784patch, indicating that this information is part of this patch, but is not
785suitable for inclusion in the commit message (i.e. the git history) itself.
786Providing a patch version changelog makes it easier for maintainers and
787reviewers to succinctly understand what changed in all versions of the
788patch, without having to consult alternate sources of information, such as
789searching through messages on a mailing list. For example::
790
791 <patch title>
792
793 <commit message>
794
795 <Signed-off-by/other trailers>
796 ---
797 changes in v4:
798 - provide a clearer commit message
799 - fix spelling mistakes
800
801 changes in v3:
802 - replace func() to use other_func() instead
803
804 changes in v2:
805 - this patch was added in v2
806 ---
807 <diffstat output>
808
809 <unified diff>
810
772Lastly please ensure that you also test your revised changes. In particular 811Lastly please ensure that you also test your revised changes. In particular
773please don't just edit the patch file written out by ``git format-patch`` and 812please don't just edit the patch file written out by ``git format-patch`` and
774resend it. 813resend it.
@@ -825,3 +864,52 @@ Other layers may have similar testing branches but there is no formal
825requirement or standard for these so please check the documentation for the 864requirement or standard for these so please check the documentation for the
826layers you are contributing to. 865layers you are contributing to.
827 866
867Acceptance of AI Generated Code
868===============================
869
870The Yocto Project and OpenEmbedded follow the guidance of the Linux Foundation
871in regards to the use of generative AI tools. See:
872https://www.linuxfoundation.org/legal/generative-ai.
873
874All of the existing guidelines in this document are expected to be followed,
875including in the :doc:`recipe-style-guide`, and contributing the changes with
876additional requirements to the items in section
877:ref:`contributor-guide/submit-changes:Implement and commit changes`.
878
879All AI Generated Code must be labeled as such in the commit message,
880prior to your ``Signed-off-by`` line. It is also strongly recommended,
881that any patches or code within the commit also have a comment or other
882indication that this code was AI generated.
883
884For example, here is a properly formatted commit message::
885
886 component: Add the ability to ...
887
888 AI-Generated: Uses GitHub Copilot
889
890 Signed-off-by: Your Name <your.name@domain>
891
892The ``Signed-off-by`` line must be written by you, and not the AI helper.
893As a reminder, when contributing a change, your ``Signed-off-by`` line is
894required and the stipulations in the `Developer's Statement of Origin
8951.1 <https://developercertificate.org/>`__ still apply.
896
897Additionally, you must stipulate AI contributions conform to the Linux
898Foundation policy, specifically:
899
900#. Contributors should ensure that the terms and conditions of the generative AI
901 tool do not place any contractual restrictions on how the tool's output can
902 be used that are inconsistent with the project's open source software
903 license, the project's intellectual property policies, or the Open Source
904 Definition.
905
906#. If any pre-existing copyrighted materials (including pre-existing open
907 source code) authored or owned by third parties are included in the AI tool's
908 output, prior to contributing such output to the project, the Contributor
909 should confirm that they have permission from the third party
910 owners -- such as the form of an open source license or public domain
911 declaration that complies with the project's licensing policies -- to use and
912 modify such pre-existing materials and contribute them to the project.
913 Additionally, the contributor should provide notice and attribution of such
914 third party rights, along with information about the applicable license
915 terms, with their contribution.
diff --git a/documentation/dev-manual/bblock.rst b/documentation/dev-manual/bblock.rst
new file mode 100644
index 0000000000..605bb75655
--- /dev/null
+++ b/documentation/dev-manual/bblock.rst
@@ -0,0 +1,129 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Locking and Unlocking Recipes Using ``bblock``
4**********************************************
5
6By design, the OpenEmbedded build system builds everything from scratch
7unless BitBake determines that specific tasks do not require rebuilding.
8At startup, it computes a signature for all tasks, based on the task's input.
9Then, it compares these signatures with the ones from the sstate cache (if they
10exist). Any changes cause the task to rerun.
11
12During development, changes might trigger BitBake to rebuild certain
13recipes, even when we know they do not require rebuilding at that stage.
14For example, modifying a recipe can lead to rebuilding its native
15counterpart, which might prove unnecessary. Editing the ``python3`` recipe,
16for instance, can prompt BitBake to rebuild ``python3-native`` along with any
17recipes that depend on it.
18
19To prevent this, use ``bblock`` to lock specific tasks or recipes to
20specific signatures, forcing BitBake to use the sstate cache for them.
21
22.. warning::
23
24 Use ``bblock`` only during the development phase.
25
26 Forcing BitBake to use the sstate cache, regardless of input changes, means
27 the recipe metadata no longer directly reflect the output. Use this feature
28 with caution. If you do not understand why signatures change, see the section
29 on :yocto_wiki:`understanding what changed </TipsAndTricks/Understanding_what_changed_(diffsigs_etc)>`.
30
31
32Locking tasks and recipes
33-------------------------
34
35To lock a recipe, use::
36
37 $ bblock recipe
38
39You can also use a space-separated list of recipes to lock multiple recipes::
40
41 $ bblock recipe1 recipe2
42
43Locking a recipe means locking all tasks of the recipe. If you need to
44lock only particular tasks, use the `-t` option with a comma-separated
45list of tasks::
46
47 $ bblock -t task1,task2 recipe
48
49
50Unlocking tasks and recipes
51---------------------------
52
53To unlock a recipe, use the ``-r`` option::
54
55 $ bblock -r recipe
56
57You can also use a space-separated list of recipes to unlock multiple recipes::
58
59 $ bblock -r recipe1 recipe2
60
61Unlocking a recipe means unlocking all tasks of the recipe. If you need to
62unlock only particular tasks use the ``-t`` option with a comma-separated
63list of tasks::
64
65 $ bblock -r -t task1,task2 recipe
66
67To unlock all recipes, do not specify any recipe::
68
69 $ bblock -r
70
71
72Configuration file
73------------------
74
75``bblock`` will dump the signatures in the ``build/conf/bblock.conf`` file,
76included by default in :oe_git:`meta/conf/bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>`.
77
78To dump the file, use the ``-d`` option::
79
80 $ bblock -d
81
82
83Locking mechanism
84-----------------
85
86``bblock`` computes the signature(s) of the task(s) and sets the 3 following
87variables: :term:`SIGGEN_LOCKEDSIGS`, :term:`SIGGEN_LOCKEDSIGS_TYPES`
88and :term:`SIGGEN_LOCKEDSIGS_TASKSIG_CHECK`.
89
90In particular, ``bblock`` sets::
91
92 SIGGEN_LOCKEDSIGS_TASKSIG_CHECK = "info"
93 SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}"
94
95 SIGGEN_LOCKEDSIGS_<package_arch> += "<recipe>:<task>:<signature>"
96
97This produces architecture specific locks and reminds user that some tasks
98have locked signatures.
99
100Example
101-------
102
103When working on the ``python3`` recipe, we can lock ``python3-native`` with
104the following::
105
106 $ bblock python3-native
107 $ bblock -d
108 # Generated by bblock
109 SIGGEN_LOCKEDSIGS_TASKSIG_CHECK = "info"
110 SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}"
111
112 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_patch:865859c27e603ba42025b7bb766c3cd4c0f477e4962cfd39128c0619d695fce7"
113 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_populate_sysroot:f8fa5d3194cef638416000252b959e86d0a19f6b7898e1f56b643c588cdd8605"
114 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_prepare_recipe_sysroot:fe295ac505d9d1143313424b201c6f3f2a0a90da40a13a905b86b874705f226a"
115 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_fetch:1b6e4728fee631bc7a8a7006855c5b8182a8224579e32e3d0a2db77c26459f25"
116 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_unpack:2ad74d6f865ef75c35c0e6bbe3f9a90923a6b2c62c18a3ddef514ea31fbc588f"
117 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_deploy_source_date_epoch:15f89b8483c1ad7507480f337619bb98c26e231227785eb3543db163593e7b42"
118 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_configure:7960c13d23270fdb12b3a7c426ce1da0d2f5c7cf5e5d3f5bdce5fa330eb7d482"
119 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_compile:012e1d4a63f1a78fc2143bd90d704dbcf5865c5257d6272aa7540ec1cd3063d9"
120 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_install:d3401cc2afa4c996beb154beaad3e45fa0272b9c56fb86e9db14ec3544c68f9d"
121 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_build:fa88bb7afb9046c0417c24a3fa98a058653805a8b00eda2c2d7fea68fc42f882"
122 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_collect_spdx_deps:cc9c53ba7c495567e9a38ec4801830c425c0d1f895aa2fc66930a2edd510d9b4"
123 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_spdx:766a1d09368438b7b5a1a8e2a8f823b2b731db44b57e67d8b3196de91966f9c5"
124 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_package_spdx:46f80faeab25575e9977ba3bf14c819489c3d489432ae5145255635108c21020"
125 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_recipe_qa:cb960cdb074e7944e894958db58f3dc2a0436ecf87c247feb3e095e214fec0e4"
126 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_populate_lic:15657441621ee83f15c2e650e7edbb036870b56f55e72e046c6142da3c5783fd"
127 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_create_manifest:24f0abbec221d27bbb2909b6e846288b12cab419f1faf9f5006ed80423d37e28"
128 SIGGEN_LOCKEDSIGS_x86_64 += "python3-native:do_addto_recipe_sysroot:bcb6a1905f113128de3f88d702b706befd6a786267c045ee82532759a7c214d7"
129
diff --git a/documentation/dev-manual/bmaptool.rst b/documentation/dev-manual/bmaptool.rst
index f6f0e6afaf..87162a49c9 100644
--- a/documentation/dev-manual/bmaptool.rst
+++ b/documentation/dev-manual/bmaptool.rst
@@ -1,13 +1,13 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK 1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2 2
3Flashing Images Using ``bmaptool`` 3Flashing Images Using `bmaptool`
4********************************** 4********************************
5 5
6A fast and easy way to flash an image to a bootable device is to use 6A fast and easy way to flash an image to a bootable device is to use
7bmaptool, which is integrated into the OpenEmbedded build system. 7`bmaptool`, which is integrated into the OpenEmbedded build system.
8bmaptool is a generic tool that creates a file's block map (bmap) and 8`bmaptool` is a generic tool that creates a file's block map (bmap) and
9then uses that map to copy the file. As compared to traditional tools 9then uses that map to copy the file. As compared to traditional tools
10such as dd or cp, bmaptool can copy (or flash) large files like raw 10such as `dd` or `cp`, `bmaptool` can copy (or flash) large files like raw
11system image files much faster. 11system image files much faster.
12 12
13.. note:: 13.. note::
@@ -20,13 +20,13 @@ system image files much faster.
20 $ sudo apt install bmap-tools 20 $ sudo apt install bmap-tools
21 21
22 - If you are unable to install the ``bmap-tools`` package, you will 22 - If you are unable to install the ``bmap-tools`` package, you will
23 need to build bmaptool before using it. Use the following command:: 23 need to build `bmaptool` before using it. Use the following command::
24 24
25 $ bitbake bmaptool-native 25 $ bitbake bmaptool-native -caddto_recipe_sysroot
26 26
27Following, is an example that shows how to flash a Wic image. Realize 27Following, is an example that shows how to flash a Wic image. Realize
28that while this example uses a Wic image, you can use bmaptool to flash 28that while this example uses a Wic image, you can use `bmaptool` to flash
29any type of image. Use these steps to flash an image using bmaptool: 29any type of image. Use these steps to flash an image using `bmaptool`:
30 30
31#. *Update your local.conf File:* You need to have the following set 31#. *Update your local.conf File:* You need to have the following set
32 in your ``local.conf`` file before building your image:: 32 in your ``local.conf`` file before building your image::
@@ -39,18 +39,17 @@ any type of image. Use these steps to flash an image using bmaptool:
39 39
40 $ bitbake image 40 $ bitbake image
41 41
42#. *Flash the Device:* Flash the device with the image by using bmaptool 42#. *Flash the Device:* Flash the device with the image by using `bmaptool`
43 depending on your particular setup. The following commands assume the 43 depending on your particular setup. The following commands assume the
44 image resides in the :term:`Build Directory`'s ``deploy/images/`` area: 44 image resides in the :term:`Build Directory`'s ``deploy/images/`` area:
45 45
46 - If you have write access to the media, use this command form:: 46 - If you installed the package for `bmaptool`, you can directly run::
47 47
48 $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX 48 $ sudo bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX
49 49
50 - If you do not have write access to the media, set your permissions 50 - Otherwise, if you built `bmaptool` with BitBake, run::
51 first and then use the same command form::
52 51
53 $ sudo chmod 666 /dev/sdX 52 $ sudo chmod a+w /dev/sdX # get write access to the media, needed only once after booting
54 $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX 53 $ oe-run-native bmaptool-native bmaptool copy build-directory/tmp/deploy/images/machine/image.wic /dev/sdX
55 54
56For help on the ``bmaptool`` command, use the following command:: 55For help on the ``bmaptool`` command, use the following command::
diff --git a/documentation/dev-manual/building.rst b/documentation/dev-manual/building.rst
index fe502690dd..4770a5a184 100644
--- a/documentation/dev-manual/building.rst
+++ b/documentation/dev-manual/building.rst
@@ -280,7 +280,9 @@ Follow these steps to create an :term:`Initramfs` image:
280#. *Create the Initramfs Image Recipe:* You can reference the 280#. *Create the Initramfs Image Recipe:* You can reference the
281 ``core-image-minimal-initramfs.bb`` recipe found in the 281 ``core-image-minimal-initramfs.bb`` recipe found in the
282 ``meta/recipes-core`` directory of the :term:`Source Directory` 282 ``meta/recipes-core`` directory of the :term:`Source Directory`
283 as an example from which to work. 283 as an example from which to work. The ``core-image-minimal-initramfs`` recipe
284 is based on the :ref:`initramfs-framework <dev-manual/building:Customizing an
285 Initramfs using \`\`initramfs-framework\`\`>` recipe described below.
284 286
285#. *Decide if You Need to Bundle the Initramfs Image Into the Kernel 287#. *Decide if You Need to Bundle the Initramfs Image Into the Kernel
286 Image:* If you want the :term:`Initramfs` image that is built to be bundled 288 Image:* If you want the :term:`Initramfs` image that is built to be bundled
@@ -308,6 +310,86 @@ Follow these steps to create an :term:`Initramfs` image:
308 and bundled with the kernel image if you used the 310 and bundled with the kernel image if you used the
309 :term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier. 311 :term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier.
310 312
313Customizing an Initramfs using ``initramfs-framework``
314------------------------------------------------------
315
316The ``core-image-minimal-initramfs.bb`` recipe found in
317:oe_git:`meta/recipes-core/images
318</openembedded-core/tree/meta/recipes-core/images>` uses the
319:oe_git:`initramfs-framework_1.0.bb
320</openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework_1.0.bb>`
321recipe as its base component. The goal of the ``initramfs-framework`` recipe is
322to provide the building blocks to build a customized :term:`Initramfs`.
323
324The ``initramfs-framework`` recipe relies on shell initialization scripts
325defined in :oe_git:`meta/recipes-core/initrdscripts/initramfs-framework
326</openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework>`. Since some of
327these scripts do not apply for all use cases, the ``initramfs-framework`` recipe
328defines different packages:
329
330- ``initramfs-framework-base``: this package installs the basic components of
331 an :term:`Initramfs`, such as the ``init`` script or the ``/dev/console``
332 character special file. As this package is a runtime dependency of all
333 modules listed below, it is automatically pulled in when one of the modules
334 is installed in the image.
335- ``initramfs-module-exec``: support for execution of applications.
336- ``initramfs-module-mdev``: support for `mdev
337 <https://wiki.gentoo.org/wiki/Mdev>`__.
338- ``initramfs-module-udev``: support for :wikipedia:`Udev <Udev>`.
339- ``initramfs-module-e2fs``: support for :wikipedia:`ext4/ext3/ext2
340 <Extended_file_system>` filesystems.
341- ``initramfs-module-nfsrootfs``: support for locating and mounting the root
342 partition via :wikipedia:`NFS <Network_File_System>`.
343- ``initramfs-module-rootfs``: support for locating and mounting the root
344 partition.
345- ``initramfs-module-debug``: dynamic debug support.
346- ``initramfs-module-lvm``: :wikipedia:`LVM <Logical_volume_management>` rootfs support.
347- ``initramfs-module-overlayroot``: support for mounting a read-write overlay
348 on top of a read-only root filesystem.
349
350In addition to the packages defined by the ``initramfs-framework`` recipe
351itself, the following packages are defined by the recipes present in
352:oe_git:`meta/recipes-core/initrdscripts </openembedded-core/tree/meta/recipes-core/initrdscripts>`:
353
354- ``initramfs-module-install``: module to create and install a partition layout
355 on a selected block device.
356- ``initramfs-module-install-efi``: module to create and install an EFI
357 partition layout on a selected block device.
358- ``initramfs-module-setup-live``: module to start a shell in the
359 :term:`Initramfs` if ``root=/dev/ram0`` in passed in the `Kernel command-line
360 <https://www.kernel.org/doc/html/latest/admin-guide/kernel-parameters.html>`__
361 or the ``root=`` parameter was not passed.
362
363To customize the :term:`Initramfs`, you can add or remove packages listed
364earlier from the :term:`PACKAGE_INSTALL` variable with a :ref:`bbappend
365<dev-manual/layers:Appending Other Layers Metadata With Your Layer>` on the
366``core-image-minimal-initramfs`` recipe, or create a custom recipe for the
367:term:`Initramfs` taking ``core-image-minimal-initramfs`` as example.
368
369Custom scripts can be added to the :term:`Initramfs` by writing your own
370recipes. The recipes are conventionally named ``initramfs-module-<module name>``
371where ``<module name>`` is the name of the module. The recipe should set its
372:term:`RDEPENDS` package-specific variables to include
373``initramfs-framework-base`` and the other packages on which the module depends
374at runtime.
375
376The recipe must install shell initialization scripts in :term:`${D} <D>`\
377``/init.d`` and must follow the ``<number>-<script name>`` naming scheme where:
378
379- ``<number>`` is a *two-digit* number that affects the execution order of the
380 script compared to others. For example, the script ``80-setup-live`` would be
381 executed after ``01-udev`` because 80 is greater than 01.
382
383 This number being two-digits is important here as the scripts are executed
384 alphabetically. For example, the script ``10-script`` would be executed
385 before the script ``8-script``, because ``1`` is inferior to ``8``.
386 Therefore, the script should be named ``08-script``.
387
388- ``<script name>`` is the script name which you can choose freely.
389
390 If two script use the same ``<number>``, they are sorted alphabetically based
391 on ``<script name>``.
392
311Bundling an Initramfs Image From a Separate Multiconfig 393Bundling an Initramfs Image From a Separate Multiconfig
312------------------------------------------------------- 394-------------------------------------------------------
313 395
diff --git a/documentation/dev-manual/customizing-images.rst b/documentation/dev-manual/customizing-images.rst
index 5b18958ade..53cad9c79c 100644
--- a/documentation/dev-manual/customizing-images.rst
+++ b/documentation/dev-manual/customizing-images.rst
@@ -80,15 +80,14 @@ recipe that are enabled with :term:`IMAGE_FEATURES`. The value of
80:term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within 80:term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within
81``meta/conf/bitbake.conf``. 81``meta/conf/bitbake.conf``.
82 82
83To illustrate how you can use these variables to modify your image, 83To illustrate how you can use these variables to modify your image, consider an
84consider an example that selects the SSH server. The Yocto Project ships 84example that selects the SSH server. The Yocto Project ships with two SSH
85with two SSH servers you can use with your images: Dropbear and OpenSSH. 85servers you can use with your images: Dropbear and OpenSSH. Dropbear is a
86Dropbear is a minimal SSH server appropriate for resource-constrained 86minimal SSH server appropriate for resource-constrained environments, while
87environments, while OpenSSH is a well-known standard SSH server 87OpenSSH is a well-known standard SSH server implementation. By default, the
88implementation. By default, the ``core-image-sato`` image is configured 88``core-image-sato`` image is configured to use Dropbear. The
89to use Dropbear. The ``core-image-full-cmdline`` and ``core-image-lsb`` 89``core-image-full-cmdline`` image includes OpenSSH. The ``core-image-minimal``
90images both include OpenSSH. The ``core-image-minimal`` image does not 90image does not contain an SSH server.
91contain an SSH server.
92 91
93You can customize your image and change these defaults. Edit the 92You can customize your image and change these defaults. Edit the
94:term:`IMAGE_FEATURES` variable in your recipe or use the 93:term:`IMAGE_FEATURES` variable in your recipe or use the
diff --git a/documentation/dev-manual/debugging.rst b/documentation/dev-manual/debugging.rst
index 92458a0c37..8552b26aea 100644
--- a/documentation/dev-manual/debugging.rst
+++ b/documentation/dev-manual/debugging.rst
@@ -36,7 +36,7 @@ section:
36 use the BitBake ``-e`` option to examine variable values after a 36 use the BitBake ``-e`` option to examine variable values after a
37 recipe has been parsed. 37 recipe has been parsed.
38 38
39- ":ref:`dev-manual/debugging:viewing package information with \`\`oe-pkgdata-util\`\``" 39- ":ref:`dev-manual/debugging:viewing package information with ``oe-pkgdata-util```"
40 describes how to use the ``oe-pkgdata-util`` utility to query 40 describes how to use the ``oe-pkgdata-util`` utility to query
41 :term:`PKGDATA_DIR` and 41 :term:`PKGDATA_DIR` and
42 display package-related information for built packages. 42 display package-related information for built packages.
diff --git a/documentation/dev-manual/external-scm.rst b/documentation/dev-manual/external-scm.rst
index 97a7e63e36..896b1b5ac7 100644
--- a/documentation/dev-manual/external-scm.rst
+++ b/documentation/dev-manual/external-scm.rst
@@ -12,10 +12,13 @@ revision number for changes. Currently, you can do this with Apache
12Subversion (SVN), Git, and Bazaar (BZR) repositories. 12Subversion (SVN), Git, and Bazaar (BZR) repositories.
13 13
14To enable this behavior, the :term:`PV` of 14To enable this behavior, the :term:`PV` of
15the recipe needs to reference 15the recipe needs to include a ``+`` sign in its assignment.
16:term:`SRCPV`. Here is an example:: 16Here is an example::
17 17
18 PV = "1.2.3+git${SRCPV}" 18 PV = "1.2.3+git"
19
20:term:`Bitbake` later includes the source control information in :term:`PKGV`
21during the packaging phase.
19 22
20Then, you can add the following to your 23Then, you can add the following to your
21``local.conf``:: 24``local.conf``::
diff --git a/documentation/dev-manual/index.rst b/documentation/dev-manual/index.rst
index 9ccf60f701..8243c0f4cb 100644
--- a/documentation/dev-manual/index.rst
+++ b/documentation/dev-manual/index.rst
@@ -39,7 +39,6 @@ Yocto Project Development Tasks Manual
39 external-scm 39 external-scm
40 read-only-rootfs 40 read-only-rootfs
41 build-quality 41 build-quality
42 runtime-testing
43 debugging 42 debugging
44 licenses 43 licenses
45 security-subjects 44 security-subjects
@@ -48,5 +47,6 @@ Yocto Project Development Tasks Manual
48 error-reporting-tool 47 error-reporting-tool
49 wayland 48 wayland
50 qemu 49 qemu
50 bblock
51 51
52.. include:: /boilerplate.rst 52.. include:: /boilerplate.rst
diff --git a/documentation/dev-manual/layers.rst b/documentation/dev-manual/layers.rst
index 91889bd0ae..89c8466933 100644
--- a/documentation/dev-manual/layers.rst
+++ b/documentation/dev-manual/layers.rst
@@ -644,6 +644,96 @@ variable and append the layer's root name::
644 order of ``.conf`` or ``.bbclass`` files. Future versions of BitBake 644 order of ``.conf`` or ``.bbclass`` files. Future versions of BitBake
645 might address this. 645 might address this.
646 646
647Providing Global-level Configurations With Your Layer
648-----------------------------------------------------
649
650When creating a layer, you may need to define configurations that should take
651effect globally in your build environment when the layer is part of the build.
652The ``layer.conf`` file is a :term:`configuration file` that affects the build
653system globally, so it is a candidate for this use-case.
654
655.. warning::
656
657 Providing unconditional global level configuration from the ``layer.conf``
658 file is *not* a good practice, and should be avoided. For this reason, the
659 section :ref:`ref-conditional-layer-confs` below shows how the ``layer.conf``
660 file can be used to provide configurations only if a certain condition is
661 met.
662
663For example, if your layer provides a Linux kernel recipe named
664``linux-custom``, you may want to make :term:`PREFERRED_PROVIDER_virtual/kernel
665<PREFERRED_PROVIDER>` point to ``linux-custom``::
666
667 PREFERRED_PROVIDER_virtual/kernel = "linux-custom"
668
669This can be defined in the ``layer.conf`` file. If your layer is at the last
670position in the :term:`BBLAYERS` list, it will take precedence over previous
671``PREFERRED_PROVIDER_virtual/kernel`` assignments (unless one is set from a
672:term:`configuration file` that is parsed later, such as machine or distro
673configuration files).
674
675.. _ref-conditional-layer-confs:
676
677Conditionally Provide Global-level Configurations With Your Layer
678^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
679
680In some cases, your layer may provide global configurations only if some
681features it provides are enabled. Since the ``layer.conf`` file is parsed at an
682earlier stage in the parsing process, the :term:`DISTRO_FEATURES` and
683:term:`MACHINE_FEATURES` variables are not yet available to ``layer.conf``, and
684declaring conditional assignments based on these variables is not possible. The
685following technique shows a way to bypass this limitation by using the
686:term:`USER_CLASSES` variable and a conditional ``require`` command.
687
688In the following steps, let's assume our layer is named ``meta-mylayer`` and
689that this layer defines a custom :ref:`distro feature <ref-features-distro>`
690named ``mylayer-kernel``. We will set the :term:`PREFERRED_PROVIDER` variable
691for the kernel only if our feature ``mylayer-kernel`` is part of the
692:term:`DISTRO_FEATURES`:
693
694#. Create an include file in the directory
695 ``meta-mylayer/conf/distro/include/``, for example a file named
696 ``mylayer-kernel-provider.inc`` that sets the kernel provider to
697 ``linux-custom``::
698
699 PREFERRED_PROVIDER_virtual/kernel = "linux-custom"
700
701#. Provide a path to this include file in your ``layer.conf``::
702
703 META_MYLAYER_KERNEL_PROVIDER_PATH = "${LAYERDIR}/conf/distro/include/mylayer-kernel-provider.inc"
704
705#. Create a new class in ``meta-mylayer/classes-global/``, for example a class
706 ``meta-mylayer-cfg.bbclass``. Make it conditionally require the file
707 ``mylayer-kernel-provider.inc`` defined above, using the variable
708 ``META_MYLAYER_KERNEL_PROVIDER_PATH`` defined in ``layer.conf``::
709
710 require ${@bb.utils.contains('DISTRO_FEATURES', 'mylayer-kernel', '${META_MYLAYER_KERNEL_PROVIDER_PATH}', '', d)}
711
712 For details on the ``bb.utils.contains`` function, see its definition in
713 :bitbake_git:`lib/bb/utils.py </tree/lib/bb/utils.py>`.
714
715 .. note::
716
717 The ``require`` command is designed to not fail if the function
718 ``bb.utils.contains`` returns an empty string.
719
720#. Back to your ``layer.conf`` file, add the class ``meta-mylayer-cfg`` class to
721 the :term:`USER_CLASSES` variable::
722
723 USER_CLASSES:append = " meta-mylayer-cfg"
724
725 This will add the class ``meta-mylayer-cfg`` to the list of classes to
726 globally inherit. Since the ``require`` command is conditional in
727 ``meta-mylayer-cfg.bbclass``, even though inherited the class will have no
728 effect unless the feature ``mylayer-kernel`` is enabled through
729 :term:`DISTRO_FEATURES`.
730
731This technique can also be used for :ref:`Machine features
732<ref-features-machine>` by following the same steps. Though not mandatory, it is
733recommended to put include files for :term:`DISTRO_FEATURES` in your layer's
734``conf/distro/include`` and the ones for :term:`MACHINE_FEATURES` in your
735layer's ``conf/machine/include``.
736
647Managing Layers 737Managing Layers
648=============== 738===============
649 739
diff --git a/documentation/dev-manual/new-recipe.rst b/documentation/dev-manual/new-recipe.rst
index 61fc2eb122..af88db937b 100644
--- a/documentation/dev-manual/new-recipe.rst
+++ b/documentation/dev-manual/new-recipe.rst
@@ -56,7 +56,7 @@ necessary when adding a recipe to build a new piece of software to be
56included in a build. 56included in a build.
57 57
58You can find a complete description of the ``devtool add`` command in 58You can find a complete description of the ``devtool add`` command in
59the ":ref:`sdk-manual/extensible:a closer look at \`\`devtool add\`\``" section 59the ":ref:`sdk-manual/extensible:a closer look at ``devtool add```" section
60in the Yocto Project Application Development and the Extensible Software 60in the Yocto Project Application Development and the Extensible Software
61Development Kit (eSDK) manual. 61Development Kit (eSDK) manual.
62 62
@@ -291,13 +291,13 @@ another example that specifies these types of files, see the
291 291
292Another way of specifying source is from an SCM. For Git repositories, 292Another way of specifying source is from an SCM. For Git repositories,
293you must specify :term:`SRCREV` and you should specify :term:`PV` to include 293you must specify :term:`SRCREV` and you should specify :term:`PV` to include
294the revision with :term:`SRCPV`. Here is an example from the recipe 294a ``+`` sign in its definition. Here is an example from the recipe
295``meta/recipes-core/musl/gcompat_git.bb``:: 295:oe_git:`meta/recipes-sato/l3afpad/l3afpad_git.bb </openembedded-core/tree/meta/recipes-sato/l3afpad/l3afpad_git.bb>`::
296 296
297 SRC_URI = "git://git.adelielinux.org/adelie/gcompat.git;protocol=https;branch=current" 297 SRC_URI = "git://github.com/stevenhoneyman/l3afpad.git;branch=master;protocol=https"
298 298
299 PV = "1.0.0+1.1+git${SRCPV}" 299 PV = "0.8.18.1.11+git"
300 SRCREV = "af5a49e489fdc04b9cf02547650d7aeaccd43793" 300 SRCREV ="3cdccdc9505643e50f8208171d9eee5de11a42ff"
301 301
302If your :term:`SRC_URI` statement includes URLs pointing to individual files 302If your :term:`SRC_URI` statement includes URLs pointing to individual files
303fetched from a remote server other than a version control system, 303fetched from a remote server other than a version control system,
diff --git a/documentation/dev-manual/packages.rst b/documentation/dev-manual/packages.rst
index e5028fffdc..4ba2dcae3a 100644
--- a/documentation/dev-manual/packages.rst
+++ b/documentation/dev-manual/packages.rst
@@ -16,7 +16,7 @@ This section describes a few tasks that involve packages:
16- :ref:`dev-manual/packages:generating and using signed packages` 16- :ref:`dev-manual/packages:generating and using signed packages`
17 17
18- :ref:`Setting up and running package test 18- :ref:`Setting up and running package test
19 (ptest) <dev-manual/packages:testing packages with ptest>` 19 (ptest) <test-manual/ptest:testing packages with ptest>`
20 20
21- :ref:`dev-manual/packages:creating node package manager (npm) packages` 21- :ref:`dev-manual/packages:creating node package manager (npm) packages`
22 22
@@ -84,10 +84,6 @@ the following:
84 84
85- :term:`PR`: The recipe revision. 85- :term:`PR`: The recipe revision.
86 86
87- :term:`SRCPV`: The OpenEmbedded
88 build system uses this string to help define the value of :term:`PV` when
89 the source code revision needs to be included in it.
90
91- :yocto_wiki:`PR Service </PR_Service>`: A 87- :yocto_wiki:`PR Service </PR_Service>`: A
92 network-based service that helps automate keeping package feeds 88 network-based service that helps automate keeping package feeds
93 compatible with existing package manager applications such as RPM, 89 compatible with existing package manager applications such as RPM,
@@ -256,15 +252,14 @@ the software::
256 252
257 SRCREV = "${AUTOREV}" 253 SRCREV = "${AUTOREV}"
258 254
259Furthermore, you need to reference :term:`SRCPV` in :term:`PV` in order to 255Furthermore, you need to include a ``+`` sign in :term:`PV` in order to
260automatically update the version whenever the revision of the source 256automatically update the version whenever the revision of the source
261code changes. Here is an example:: 257code changes. Here is an example::
262 258
263 PV = "1.0+git${SRCPV}" 259 PV = "1.0+git"
264
265The OpenEmbedded build system substitutes :term:`SRCPV` with the following:
266 260
267.. code-block:: none 261The OpenEmbedded build system will automatically add the source control
262information to the end of the variable :term:`PKGV`, in this format::
268 263
269 AUTOINC+source_code_revision 264 AUTOINC+source_code_revision
270 265
@@ -887,114 +882,8 @@ related to signed package feeds are available:
887Testing Packages With ptest 882Testing Packages With ptest
888=========================== 883===========================
889 884
890A Package Test (ptest) runs tests against packages built by the 885See the :ref:`test-manual/ptest:Testing Packages With ptest` section of the
891OpenEmbedded build system on the target machine. A ptest contains at 886Yocto Project Test Environment Manual.
892least two items: the actual test, and a shell script (``run-ptest``)
893that starts the test. The shell script that starts the test must not
894contain the actual test --- the script only starts the test. On the other
895hand, the test can be anything from a simple shell script that runs a
896binary and checks the output to an elaborate system of test binaries and
897data files.
898
899The test generates output in the format used by Automake::
900
901 result: testname
902
903where the result can be ``PASS``, ``FAIL``, or ``SKIP``, and
904the testname can be any identifying string.
905
906For a list of Yocto Project recipes that are already enabled with ptest,
907see the :yocto_wiki:`Ptest </Ptest>` wiki page.
908
909.. note::
910
911 A recipe is "ptest-enabled" if it inherits the :ref:`ref-classes-ptest`
912 class.
913
914Adding ptest to Your Build
915--------------------------
916
917To add package testing to your build, add the :term:`DISTRO_FEATURES` and
918:term:`EXTRA_IMAGE_FEATURES` variables to your ``local.conf`` file, which
919is found in the :term:`Build Directory`::
920
921 DISTRO_FEATURES:append = " ptest"
922 EXTRA_IMAGE_FEATURES += "ptest-pkgs"
923
924Once your build is complete, the ptest files are installed into the
925``/usr/lib/package/ptest`` directory within the image, where ``package``
926is the name of the package.
927
928Running ptest
929-------------
930
931The ``ptest-runner`` package installs a shell script that loops through
932all installed ptest test suites and runs them in sequence. Consequently,
933you might want to add this package to your image.
934
935Getting Your Package Ready
936--------------------------
937
938In order to enable a recipe to run installed ptests on target hardware,
939you need to prepare the recipes that build the packages you want to
940test. Here is what you have to do for each recipe:
941
942- *Be sure the recipe inherits the* :ref:`ref-classes-ptest` *class:*
943 Include the following line in each recipe::
944
945 inherit ptest
946
947- *Create run-ptest:* This script starts your test. Locate the
948 script where you will refer to it using
949 :term:`SRC_URI`. Here is an
950 example that starts a test for ``dbus``::
951
952 #!/bin/sh
953 cd test
954 make -k runtest-TESTS
955
956- *Ensure dependencies are met:* If the test adds build or runtime
957 dependencies that normally do not exist for the package (such as
958 requiring "make" to run the test suite), use the
959 :term:`DEPENDS` and
960 :term:`RDEPENDS` variables in
961 your recipe in order for the package to meet the dependencies. Here
962 is an example where the package has a runtime dependency on "make"::
963
964 RDEPENDS:${PN}-ptest += "make"
965
966- *Add a function to build the test suite:* Not many packages support
967 cross-compilation of their test suites. Consequently, you usually
968 need to add a cross-compilation function to the package.
969
970 Many packages based on Automake compile and run the test suite by
971 using a single command such as ``make check``. However, the host
972 ``make check`` builds and runs on the same computer, while
973 cross-compiling requires that the package is built on the host but
974 executed for the target architecture (though often, as in the case
975 for ptest, the execution occurs on the host). The built version of
976 Automake that ships with the Yocto Project includes a patch that
977 separates building and execution. Consequently, packages that use the
978 unaltered, patched version of ``make check`` automatically
979 cross-compiles.
980
981 Regardless, you still must add a ``do_compile_ptest`` function to
982 build the test suite. Add a function similar to the following to your
983 recipe::
984
985 do_compile_ptest() {
986 oe_runmake buildtest-TESTS
987 }
988
989- *Ensure special configurations are set:* If the package requires
990 special configurations prior to compiling the test code, you must
991 insert a ``do_configure_ptest`` function into the recipe.
992
993- *Install the test suite:* The :ref:`ref-classes-ptest` class
994 automatically copies the file ``run-ptest`` to the target and then runs make
995 ``install-ptest`` to run the tests. If this is not enough, you need
996 to create a ``do_install_ptest`` function and make sure it gets
997 called after the "make install-ptest" completes.
998 887
999Creating Node Package Manager (NPM) Packages 888Creating Node Package Manager (NPM) Packages
1000============================================ 889============================================
diff --git a/documentation/dev-manual/qemu.rst b/documentation/dev-manual/qemu.rst
index 19f3e40d63..253aff9977 100644
--- a/documentation/dev-manual/qemu.rst
+++ b/documentation/dev-manual/qemu.rst
@@ -75,7 +75,7 @@ available. Follow these general steps to run QEMU:
75 your :term:`Build Directory`. 75 your :term:`Build Directory`.
76 76
77 - If you have not built an image, you can go to the 77 - If you have not built an image, you can go to the
78 :yocto_dl:`machines/qemu </releases/yocto/yocto-&DISTRO;/machines/qemu/>` area and download a 78 :yocto_dl:`machines/qemu </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/qemu/>` area and download a
79 pre-built image that matches your architecture and can be run on 79 pre-built image that matches your architecture and can be run on
80 QEMU. 80 QEMU.
81 81
@@ -280,12 +280,11 @@ present, the toolchain is also automatically used.
280 networking. 280 networking.
281 281
282 - SSH servers are available in some QEMU images. The ``core-image-sato`` 282 - SSH servers are available in some QEMU images. The ``core-image-sato``
283 QEMU image has a Dropbear secure shell (SSH) server that runs with 283 QEMU image has a Dropbear secure shell (SSH) server that runs with the
284 the root password disabled. The ``core-image-full-cmdline`` and 284 root password disabled. The ``core-image-full-cmdline`` QEMU image has
285 ``core-image-lsb`` QEMU images have OpenSSH instead of Dropbear. 285 OpenSSH instead of Dropbear. Including these SSH servers allow you to use
286 Including these SSH servers allow you to use standard ``ssh`` and 286 standard ``ssh`` and ``scp`` commands. The ``core-image-minimal`` QEMU
287 ``scp`` commands. The ``core-image-minimal`` QEMU image, however, 287 image, however, contains no SSH server.
288 contains no SSH server.
289 288
290 - You can use a provided, user-space NFS server to boot the QEMU 289 - You can use a provided, user-space NFS server to boot the QEMU
291 session using a local copy of the root filesystem on the host. In 290 session using a local copy of the root filesystem on the host. In
diff --git a/documentation/dev-manual/sbom.rst b/documentation/dev-manual/sbom.rst
index b72bad1554..7c4b5804fb 100644
--- a/documentation/dev-manual/sbom.rst
+++ b/documentation/dev-manual/sbom.rst
@@ -30,16 +30,9 @@ To make this happen, you must inherit the
30 30
31 INHERIT += "create-spdx" 31 INHERIT += "create-spdx"
32 32
33Upon building an image, you will then get: 33Upon building an image, you will then get the compressed archive
34 34``IMAGE-MACHINE.spdx.tar.zst`` contains the index and the files for the single
35- :term:`SPDX` output in JSON format as an ``IMAGE-MACHINE.spdx.json`` file in 35recipes.
36 ``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`.
37
38- This toplevel file is accompanied by an ``IMAGE-MACHINE.spdx.index.json``
39 containing an index of JSON :term:`SPDX` files for individual recipes.
40
41- The compressed archive ``IMAGE-MACHINE.spdx.tar.zst`` contains the index
42 and the files for the single recipes.
43 36
44The :ref:`ref-classes-create-spdx` class offers options to include 37The :ref:`ref-classes-create-spdx` class offers options to include
45more information in the output :term:`SPDX` data: 38more information in the output :term:`SPDX` data:
@@ -56,7 +49,7 @@ more information in the output :term:`SPDX` data:
56 49
57Though the toplevel :term:`SPDX` output is available in 50Though the toplevel :term:`SPDX` output is available in
58``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`, ancillary 51``tmp/deploy/images/MACHINE/`` inside the :term:`Build Directory`, ancillary
59generated files are available in ``tmp/deploy/spdx/MACHINE`` too, such as: 52generated files are available in ``tmp/deploy/spdx`` too, such as:
60 53
61- The individual :term:`SPDX` JSON files in the ``IMAGE-MACHINE.spdx.tar.zst`` 54- The individual :term:`SPDX` JSON files in the ``IMAGE-MACHINE.spdx.tar.zst``
62 archive. 55 archive.
diff --git a/documentation/dev-manual/start.rst b/documentation/dev-manual/start.rst
index 386e5f5d29..f4da61b53f 100644
--- a/documentation/dev-manual/start.rst
+++ b/documentation/dev-manual/start.rst
@@ -615,7 +615,7 @@ Accessing Source Archives
615The Yocto Project also provides source archives of its releases, which 615The Yocto Project also provides source archives of its releases, which
616are available on :yocto_dl:`/releases/yocto/`. Then, choose the subdirectory 616are available on :yocto_dl:`/releases/yocto/`. Then, choose the subdirectory
617containing the release you wish to use, for example 617containing the release you wish to use, for example
618:yocto_dl:`yocto-&DISTRO; </releases/yocto/yocto-&DISTRO;/>`. 618:yocto_dl:`&DISTRO_REL_LATEST_TAG; </releases/yocto/&DISTRO_REL_LATEST_TAG;/>`.
619 619
620You will find there source archives of individual components (if you wish 620You will find there source archives of individual components (if you wish
621to use them individually), and of the corresponding Poky release bundling 621to use them individually), and of the corresponding Poky release bundling
diff --git a/documentation/dev-manual/upgrading-recipes.rst b/documentation/dev-manual/upgrading-recipes.rst
index 4fac78bdfb..a38fd7837c 100644
--- a/documentation/dev-manual/upgrading-recipes.rst
+++ b/documentation/dev-manual/upgrading-recipes.rst
@@ -333,7 +333,7 @@ Manually Upgrading a Recipe
333 333
334If for some reason you choose not to upgrade recipes using 334If for some reason you choose not to upgrade recipes using
335:ref:`dev-manual/upgrading-recipes:Using the Auto Upgrade Helper (AUH)` or 335:ref:`dev-manual/upgrading-recipes:Using the Auto Upgrade Helper (AUH)` or
336by :ref:`dev-manual/upgrading-recipes:Using \`\`devtool upgrade\`\``, 336by :ref:`dev-manual/upgrading-recipes:Using ``devtool upgrade```,
337you can manually edit the recipe files to upgrade the versions. 337you can manually edit the recipe files to upgrade the versions.
338 338
339.. note:: 339.. note::
diff --git a/documentation/dev-manual/vulnerabilities.rst b/documentation/dev-manual/vulnerabilities.rst
index 1bc2a85929..f5f9fe3a0c 100644
--- a/documentation/dev-manual/vulnerabilities.rst
+++ b/documentation/dev-manual/vulnerabilities.rst
@@ -62,37 +62,77 @@ found in ``build/tmp/deploy/cve``.
62 62
63For example the CVE check report for the ``flex-native`` recipe looks like:: 63For example the CVE check report for the ``flex-native`` recipe looks like::
64 64
65 $ cat poky/build/tmp/deploy/cve/flex-native 65 $ cat ./tmp/deploy/cve/flex-native_cve.json
66 LAYER: meta 66 {
67 PACKAGE NAME: flex-native 67 "version": "1",
68 PACKAGE VERSION: 2.6.4 68 "package": [
69 CVE: CVE-2016-6354 69 {
70 CVE STATUS: Patched 70 "name": "flex-native",
71 CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. 71 "layer": "meta",
72 CVSS v2 BASE SCORE: 7.5 72 "version": "2.6.4",
73 CVSS v3 BASE SCORE: 9.8 73 "products": [
74 VECTOR: NETWORK 74 {
75 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354 75 "product": "flex",
76 76 "cvesInRecord": "No"
77 LAYER: meta 77 },
78 PACKAGE NAME: flex-native 78 {
79 PACKAGE VERSION: 2.6.4 79 "product": "flex",
80 CVE: CVE-2019-6293 80 "cvesInRecord": "Yes"
81 CVE STATUS: Ignored 81 }
82 CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service. 82 ],
83 CVSS v2 BASE SCORE: 4.3 83 "issue": [
84 CVSS v3 BASE SCORE: 5.5 84 {
85 VECTOR: NETWORK 85 "id": "CVE-2006-0459",
86 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293 86 "status": "Patched",
87 "link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459",
88 "summary": "flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.",
89 "scorev2": "7.5",
90 "scorev3": "0.0",
91 "scorev4": "0.0",
92 "modified": "2024-11-21T00:06Z",
93 "vector": "NETWORK",
94 "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
95 "detail": "version-not-in-range"
96 },
97 {
98 "id": "CVE-2016-6354",
99 "status": "Patched",
100 "link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354",
101 "summary": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.",
102 "scorev2": "7.5",
103 "scorev3": "9.8",
104 "scorev4": "0.0",
105 "modified": "2024-11-21T02:55Z",
106 "vector": "NETWORK",
107 "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
108 "detail": "version-not-in-range"
109 },
110 {
111 "id": "CVE-2019-6293",
112 "status": "Ignored",
113 "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293",
114 "summary": "An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.",
115 "scorev2": "4.3",
116 "scorev3": "5.5",
117 "scorev4": "0.0",
118 "modified": "2024-11-21T04:46Z",
119 "vector": "NETWORK",
120 "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
121 "detail": "upstream-wontfix",
122 "description": "there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address this."
123 }
124 ]
125 }
126 ]
127 }
87 128
88For images, a summary of all recipes included in the image and their CVEs is also 129For images, a summary of all recipes included in the image and their CVEs is also
89generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found 130generated in the JSON format. These ``.json`` reports can be found
90in the ``tmp/deploy/images`` directory for each compiled image. 131in the ``tmp/deploy/images`` directory for each compiled image.
91 132
92At build time CVE check will also throw warnings about ``Unpatched`` CVEs:: 133At build time CVE check will also throw warnings about ``Unpatched`` CVEs::
93 134
94 WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log 135 WARNING: qemu-native-9.2.0-r0 do_cve_check: Found unpatched CVE (CVE-2023-1386)
95 WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log
96 136
97It is also possible to check the CVE status of individual packages as follows:: 137It is also possible to check the CVE status of individual packages as follows::
98 138
@@ -111,10 +151,10 @@ upstream `NIST CVE database <https://nvd.nist.gov/>`__.
111 151
112The variable supports using vendor and product names like this:: 152The variable supports using vendor and product names like this::
113 153
114 CVE_PRODUCT = "flex_project:flex" 154 CVE_PRODUCT = "flex_project:flex westes:flex"
115 155
116In this example the vendor name used in the CVE database is ``flex_project`` and the 156In this example we have two possible vendors names, ``flex_project`` and ``westes``,
117product is ``flex``. With this setting the ``flex`` recipe only maps to this specific 157with the product name ``flex``. With this setting the ``flex`` recipe only maps to this specific
118product and not products from other vendors with same name ``flex``. 158product and not products from other vendors with same name ``flex``.
119 159
120Similarly, when the recipe version :term:`PV` is not compatible with software versions used by 160Similarly, when the recipe version :term:`PV` is not compatible with software versions used by
diff --git a/documentation/dev-manual/wic.rst b/documentation/dev-manual/wic.rst
index a3880f3a1c..fced0e170c 100644
--- a/documentation/dev-manual/wic.rst
+++ b/documentation/dev-manual/wic.rst
@@ -513,7 +513,7 @@ or ::
513 513
514 For more information on how to use the ``bmaptool`` 514 For more information on how to use the ``bmaptool``
515 to flash a device with an image, see the 515 to flash a device with an image, see the
516 ":ref:`dev-manual/bmaptool:flashing images using \`\`bmaptool\`\``" 516 ":ref:`dev-manual/bmaptool:flashing images using \`bmaptool\``"
517 section. 517 section.
518 518
519Using a Modified Kickstart File 519Using a Modified Kickstart File
@@ -721,7 +721,7 @@ the existing kernel, and then inserts a new kernel:
721 721
722 Once the new kernel is added back into the image, you can use the 722 Once the new kernel is added back into the image, you can use the
723 ``dd`` command or :ref:`bmaptool 723 ``dd`` command or :ref:`bmaptool
724 <dev-manual/bmaptool:flashing images using \`\`bmaptool\`\`>` 724 <dev-manual/bmaptool:flashing images using \`bmaptool\`>` commands
725 to flash your wic image onto an SD card or USB stick and test your 725 to flash your wic image onto an SD card or USB stick and test your
726 target. 726 target.
727 727
diff --git a/documentation/downloads.rst b/documentation/downloads.rst
new file mode 100644
index 0000000000..7ec978ef2d
--- /dev/null
+++ b/documentation/downloads.rst
@@ -0,0 +1,11 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3=======================
4Documentation Downloads
5=======================
6
7The documentation can be downloaded in file formats to be read offline or on
8another device. The currently supported formats are linked below:
9
10- `EPub <_static/TheYoctoProject.epub>`_
11- `PDF <_static/theyoctoproject.pdf>`_
diff --git a/documentation/index.rst b/documentation/index.rst
index 3fef1704a4..6c6be38a7e 100644
--- a/documentation/index.rst
+++ b/documentation/index.rst
@@ -51,3 +51,10 @@ Welcome to the Yocto Project Documentation
51 :hidden: 51 :hidden:
52 52
53 genindex 53 genindex
54
55.. toctree::
56 :maxdepth: 1
57 :caption: Documentation Downloads
58 :hidden:
59
60 downloads
diff --git a/documentation/kernel-dev/common.rst b/documentation/kernel-dev/common.rst
index fda41694dc..654c4e0a01 100644
--- a/documentation/kernel-dev/common.rst
+++ b/documentation/kernel-dev/common.rst
@@ -672,7 +672,7 @@ The steps in this procedure show you how you can patch the kernel using
672 672
673 Before attempting this procedure, be sure you have performed the 673 Before attempting this procedure, be sure you have performed the
674 steps to get ready for updating the kernel as described in the 674 steps to get ready for updating the kernel as described in the
675 ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" 675 ":ref:`kernel-dev/common:getting ready to develop using ``devtool```"
676 section. 676 section.
677 677
678Patching the kernel involves changing or adding configurations to an 678Patching the kernel involves changing or adding configurations to an
@@ -685,7 +685,7 @@ output at boot time through ``printk`` statements in the kernel's
685``calibrate.c`` source code file. Applying the patch and booting the 685``calibrate.c`` source code file. Applying the patch and booting the
686modified image causes the added messages to appear on the emulator's 686modified image causes the added messages to appear on the emulator's
687console. The example is a continuation of the setup procedure found in 687console. The example is a continuation of the setup procedure found in
688the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Section. 688the ":ref:`kernel-dev/common:getting ready to develop using ``devtool```" Section.
689 689
690#. *Check Out the Kernel Source Files:* First you must use ``devtool`` 690#. *Check Out the Kernel Source Files:* First you must use ``devtool``
691 to checkout the kernel source code in its workspace. 691 to checkout the kernel source code in its workspace.
@@ -693,7 +693,7 @@ the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Se
693 .. note:: 693 .. note::
694 694
695 See this step in the 695 See this step in the
696 ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" 696 ":ref:`kernel-dev/common:getting ready to develop using ``devtool```"
697 section for more information. 697 section for more information.
698 698
699 Use the following ``devtool`` command to check out the code:: 699 Use the following ``devtool`` command to check out the code::
@@ -804,7 +804,7 @@ the ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" Se
804 .. note:: 804 .. note::
805 805
806 See Step 3 of the 806 See Step 3 of the
807 ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" 807 ":ref:`kernel-dev/common:getting ready to develop using ``devtool```"
808 section for information on setting up this layer. 808 section for information on setting up this layer.
809 809
810 Once the command 810 Once the command
@@ -1190,7 +1190,7 @@ appear in the ``.config`` file, which is in the :term:`Build Directory`.
1190 1190
1191 For more information about where the ``.config`` file is located, see the 1191 For more information about where the ``.config`` file is located, see the
1192 example in the 1192 example in the
1193 ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" 1193 ":ref:`kernel-dev/common:using ``menuconfig```"
1194 section. 1194 section.
1195 1195
1196It is simple to create a configuration fragment. One method is to use 1196It is simple to create a configuration fragment. One method is to use
@@ -1286,7 +1286,7 @@ when you override a policy configuration in a hardware configuration
1286fragment. 1286fragment.
1287 1287
1288In order to run this task, you must have an existing ``.config`` file. 1288In order to run this task, you must have an existing ``.config`` file.
1289See the ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" section for 1289See the ":ref:`kernel-dev/common:using ``menuconfig```" section for
1290information on how to create a configuration file. 1290information on how to create a configuration file.
1291 1291
1292Here is sample output from the :ref:`ref-tasks-kernel_configcheck` task: 1292Here is sample output from the :ref:`ref-tasks-kernel_configcheck` task:
@@ -1359,7 +1359,7 @@ and
1359tasks until they produce no warnings. 1359tasks until they produce no warnings.
1360 1360
1361For more information on how to use the ``menuconfig`` tool, see the 1361For more information on how to use the ``menuconfig`` tool, see the
1362:ref:`kernel-dev/common:using \`\`menuconfig\`\`` section. 1362:ref:`kernel-dev/common:using ``menuconfig``` section.
1363 1363
1364Fine-Tuning the Kernel Configuration File 1364Fine-Tuning the Kernel Configuration File
1365----------------------------------------- 1365-----------------------------------------
@@ -1562,16 +1562,9 @@ Here are some basic steps you can use to work with your own sources:
1562 changed. 1562 changed.
1563 1563
1564 - :term:`PV`: The default :term:`PV` 1564 - :term:`PV`: The default :term:`PV`
1565 assignment is typically adequate. It combines the 1565 assignment is typically adequate. It combines the value of
1566 :term:`LINUX_VERSION` with the Source Control Manager (SCM) revision 1566 :term:`LINUX_VERSION` and the value ``+git`` which adds source control
1567 as derived from the :term:`SRCPV` 1567 information to :term:`PKGV` later during the packaging phase.
1568 variable. The combined results are a string with the following
1569 form::
1570
1571 3.19.11+git1+68a635bf8dfb64b02263c1ac80c948647cc76d5f_1+218bd8d2022b9852c60d32f0d770931e3cf343e2
1572
1573 While lengthy, the extra verbosity in :term:`PV` helps ensure you are
1574 using the exact sources from which you intend to build.
1575 1568
1576 - :term:`COMPATIBLE_MACHINE`: 1569 - :term:`COMPATIBLE_MACHINE`:
1577 A list of the machines supported by your new recipe. This variable 1570 A list of the machines supported by your new recipe. This variable
diff --git a/documentation/kernel-dev/intro.rst b/documentation/kernel-dev/intro.rst
index a663733a1d..7df342f8d5 100644
--- a/documentation/kernel-dev/intro.rst
+++ b/documentation/kernel-dev/intro.rst
@@ -122,7 +122,7 @@ general information and references for further information.
122 Using ``devtool`` requires that you have a clean build 122 Using ``devtool`` requires that you have a clean build
123 of the image. For 123 of the image. For
124 more information, see the 124 more information, see the
125 ":ref:`kernel-dev/common:getting ready to develop using \`\`devtool\`\``" 125 ":ref:`kernel-dev/common:getting ready to develop using ``devtool```"
126 section. 126 section.
127 127
128 Using traditional kernel development requires that you have the 128 Using traditional kernel development requires that you have the
diff --git a/documentation/migration-guides/migration-1.5.rst b/documentation/migration-guides/migration-1.5.rst
index c8f3cbc165..da26cca63d 100644
--- a/documentation/migration-guides/migration-1.5.rst
+++ b/documentation/migration-guides/migration-1.5.rst
@@ -248,8 +248,8 @@ A new automated image testing framework has been added through the
248framework replaces the older ``imagetest-qemu`` framework. 248framework replaces the older ``imagetest-qemu`` framework.
249 249
250You can learn more about performing automated image tests in the 250You can learn more about performing automated image tests in the
251":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 251":ref:`test-manual/runtime-testing:performing automated runtime testing`"
252section in the Yocto Project Development Tasks Manual. 252section in the Yocto Project Test Environment Manual.
253 253
254.. _migration-1.5-build-history: 254.. _migration-1.5-build-history:
255 255
diff --git a/documentation/migration-guides/migration-1.6.rst b/documentation/migration-guides/migration-1.6.rst
index 916169e836..b052a43a31 100644
--- a/documentation/migration-guides/migration-1.6.rst
+++ b/documentation/migration-guides/migration-1.6.rst
@@ -221,7 +221,7 @@ Package Test (ptest)
221 221
222Package Tests (ptest) are built but not installed by default. For 222Package Tests (ptest) are built but not installed by default. For
223information on using Package Tests, see the 223information on using Package Tests, see the
224":ref:`dev-manual/packages:testing packages with ptest`" section in the 224":ref:`test-manual/ptest:testing packages with ptest`" section in the
225Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`" 225Yocto Project Development Tasks Manual. See also the ":ref:`ref-classes-ptest`"
226section. 226section.
227 227
diff --git a/documentation/migration-guides/release-4.0.rst b/documentation/migration-guides/release-4.0.rst
index 4954ea678b..1053ec4c0b 100644
--- a/documentation/migration-guides/release-4.0.rst
+++ b/documentation/migration-guides/release-4.0.rst
@@ -27,4 +27,10 @@ Release 4.0 (kirkstone)
27 release-notes-4.0.18 27 release-notes-4.0.18
28 release-notes-4.0.19 28 release-notes-4.0.19
29 release-notes-4.0.20 29 release-notes-4.0.20
30 30 release-notes-4.0.21
31 release-notes-4.0.22
32 release-notes-4.0.23
33 release-notes-4.0.24
34 release-notes-4.0.25
35 release-notes-4.0.26
36 release-notes-4.0.27
diff --git a/documentation/migration-guides/release-5.0.rst b/documentation/migration-guides/release-5.0.rst
index 1d6ba7692e..b3e7a67912 100644
--- a/documentation/migration-guides/release-5.0.rst
+++ b/documentation/migration-guides/release-5.0.rst
@@ -10,3 +10,10 @@ Release 5.0 (scarthgap)
10 release-notes-5.0.1 10 release-notes-5.0.1
11 release-notes-5.0.2 11 release-notes-5.0.2
12 release-notes-5.0.3 12 release-notes-5.0.3
13 release-notes-5.0.4
14 release-notes-5.0.5
15 release-notes-5.0.6
16 release-notes-5.0.7
17 release-notes-5.0.8
18 release-notes-5.0.9
19 release-notes-5.0.10
diff --git a/documentation/migration-guides/release-notes-3.4.1.rst b/documentation/migration-guides/release-notes-3.4.1.rst
index 097c249a90..c4b99a269b 100644
--- a/documentation/migration-guides/release-notes-3.4.1.rst
+++ b/documentation/migration-guides/release-notes-3.4.1.rst
@@ -11,14 +11,14 @@ Known Issues in 3.4.1
11Security Fixes in 3.4.1 11Security Fixes in 3.4.1
12~~~~~~~~~~~~~~~~~~~~~~~ 12~~~~~~~~~~~~~~~~~~~~~~~
13 13
14- glibc: Backport fix for :cve:`2021-43396` 14- glibc: Backport fix for :cve_nist:`2021-43396`
15- vim: add patch number to :cve:`2021-3778` patch 15- vim: add patch number to :cve_nist:`2021-3778` patch
16- vim: fix :cve:`2021-3796`, :cve:`2021-3872`, and :cve:`2021-3875` 16- vim: fix :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, and :cve_nist:`2021-3875`
17- squashfs-tools: follow-up fix for :cve:`2021-41072` 17- squashfs-tools: follow-up fix for :cve_nist:`2021-41072`
18- avahi: update CVE id fixed by local-ping.patch 18- avahi: update CVE id fixed by local-ping.patch
19- squashfs-tools: fix :cve:`2021-41072` 19- squashfs-tools: fix :cve_nist:`2021-41072`
20- ffmpeg: fix :cve:`2021-38114` 20- ffmpeg: fix :cve_nist:`2021-38114`
21- curl: fix :cve:`2021-22945`, :cve:`2021-22946` and :cve:`2021-22947` 21- curl: fix :cve_nist:`2021-22945`, :cve_nist:`2021-22946` and :cve_nist:`2021-22947`
22 22
23Fixes in 3.4.1 23Fixes in 3.4.1
24~~~~~~~~~~~~~~ 24~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.2.rst b/documentation/migration-guides/release-notes-3.4.2.rst
index 5ff42d3900..94dffcb79e 100644
--- a/documentation/migration-guides/release-notes-3.4.2.rst
+++ b/documentation/migration-guides/release-notes-3.4.2.rst
@@ -6,29 +6,29 @@ Release notes for 3.4.2 (honister)
6Security Fixes in 3.4.2 6Security Fixes in 3.4.2
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- tiff: backport fix for :cve:`2022-22844` 9- tiff: backport fix for :cve_nist:`2022-22844`
10- glibc : Fix :cve:`2021-3999` 10- glibc : Fix :cve_nist:`2021-3999`
11- glibc : Fix :cve:`2021-3998` 11- glibc : Fix :cve_nist:`2021-3998`
12- glibc : Fix :cve:`2022-23219` 12- glibc : Fix :cve_nist:`2022-23219`
13- glibc : Fix :cve:`2022-23218` 13- glibc : Fix :cve_nist:`2022-23218`
14- lighttpd: backport a fix for :cve:`2022-22707` 14- lighttpd: backport a fix for :cve_nist:`2022-22707`
15- speex: fix :cve:`2020-23903` 15- speex: fix :cve_nist:`2020-23903`
16- linux-yocto/5.10: amdgpu: updates for :cve:`2021-42327` 16- linux-yocto/5.10: amdgpu: updates for :cve_nist:`2021-42327`
17- libsndfile1: fix :cve:`2021-4156` 17- libsndfile1: fix :cve_nist:`2021-4156`
18- xserver-xorg: whitelist two CVEs 18- xserver-xorg: whitelist two CVEs
19- grub2: fix :cve:`2021-3981` 19- grub2: fix :cve_nist:`2021-3981`
20- xserver-xorg: update :term:`CVE_PRODUCT` 20- xserver-xorg: update :term:`CVE_PRODUCT`
21- binutils: :cve:`2021-42574` 21- binutils: :cve_nist:`2021-42574`
22- gcc: Fix :cve:`2021-42574` 22- gcc: Fix :cve_nist:`2021-42574`
23- gcc: Fix :cve:`2021-35465` 23- gcc: Fix :cve_nist:`2021-35465`
24- cve-extra-exclusions: add db CVEs to exclusion list 24- cve-extra-exclusions: add db CVEs to exclusion list
25- gcc: Add :cve:`2021-37322` to the list of CVEs to ignore 25- gcc: Add :cve_nist:`2021-37322` to the list of CVEs to ignore
26- bind: fix :cve:`2021-25219` 26- bind: fix :cve_nist:`2021-25219`
27- openssh: fix :cve:`2021-41617` 27- openssh: fix :cve_nist:`2021-41617`
28- ncurses: fix :cve:`2021-39537` 28- ncurses: fix :cve_nist:`2021-39537`
29- vim: fix :cve:`2021-3968` and :cve:`2021-3973` 29- vim: fix :cve_nist:`2021-3968` and :cve_nist:`2021-3973`
30- vim: fix :cve:`2021-3927` and :cve:`2021-3928` 30- vim: fix :cve_nist:`2021-3927` and :cve_nist:`2021-3928`
31- gmp: fix :cve:`2021-43618` 31- gmp: fix :cve_nist:`2021-43618`
32 32
33Fixes in 3.4.2 33Fixes in 3.4.2
34~~~~~~~~~~~~~~ 34~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.3.rst b/documentation/migration-guides/release-notes-3.4.3.rst
index 2af802307d..cd9698d0e8 100644
--- a/documentation/migration-guides/release-notes-3.4.3.rst
+++ b/documentation/migration-guides/release-notes-3.4.3.rst
@@ -6,12 +6,12 @@ Release notes for 3.4.3 (honister)
6Security Fixes in 3.4.3 6Security Fixes in 3.4.3
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- ghostscript: fix :cve:`2021-3781` 9- ghostscript: fix :cve_nist:`2021-3781`
10- ghostscript: fix :cve:`2021-45949` 10- ghostscript: fix :cve_nist:`2021-45949`
11- tiff: Add backports for two CVEs from upstream (:cve:`2022-0561` & :cve:`2022-0562`) 11- tiff: Add backports for two CVEs from upstream (:cve_nist:`2022-0561` & :cve_nist:`2022-0562`)
12- gcc : Fix :cve:`2021-46195` 12- gcc : Fix :cve_nist:`2021-46195`
13- virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__ 13- virglrenderer: fix `CVE-2022-0135 <https://security-tracker.debian.org/tracker/CVE-2022-0135>`__ and `CVE-2022-0175 <https://security-tracker.debian.org/tracker/CVE-2022-0175>`__
14- binutils: Add fix for :cve:`2021-45078` 14- binutils: Add fix for :cve_nist:`2021-45078`
15 15
16 16
17Fixes in 3.4.3 17Fixes in 3.4.3
diff --git a/documentation/migration-guides/release-notes-3.4.4.rst b/documentation/migration-guides/release-notes-3.4.4.rst
index 0bf9a16209..3ab858b0b9 100644
--- a/documentation/migration-guides/release-notes-3.4.4.rst
+++ b/documentation/migration-guides/release-notes-3.4.4.rst
@@ -6,11 +6,11 @@ Release notes for 3.4.4 (honister)
6Security Fixes in 3.4.4 6Security Fixes in 3.4.4
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- tiff: fix :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909` and :cve:`2022-0924` 9- tiff: fix :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909` and :cve_nist:`2022-0924`
10- xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__ 10- xz: fix `CVE-2022-1271 <https://security-tracker.debian.org/tracker/CVE-2022-1271>`__
11- unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__ 11- unzip: fix `CVE-2021-4217 <https://security-tracker.debian.org/tracker/CVE-2021-4217>`__
12- zlib: fix :cve:`2018-25032` 12- zlib: fix :cve_nist:`2018-25032`
13- grub: ignore :cve:`2021-46705` 13- grub: ignore :cve_nist:`2021-46705`
14 14
15Fixes in 3.4.4 15Fixes in 3.4.4
16~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-3.4.rst b/documentation/migration-guides/release-notes-3.4.rst
index d76bb004b1..6eca9956be 100644
--- a/documentation/migration-guides/release-notes-3.4.rst
+++ b/documentation/migration-guides/release-notes-3.4.rst
@@ -220,34 +220,34 @@ Other license-related notes:
220Security Fixes in 3.4 220Security Fixes in 3.4
221~~~~~~~~~~~~~~~~~~~~~ 221~~~~~~~~~~~~~~~~~~~~~
222 222
223- apr: :cve:`2021-35940` 223- apr: :cve_nist:`2021-35940`
224- aspell: :cve:`2019-25051` 224- aspell: :cve_nist:`2019-25051`
225- avahi: :cve:`2021-3468`, :cve:`2021-36217` 225- avahi: :cve_nist:`2021-3468`, :cve_nist:`2021-36217`
226- binutils: :cve:`2021-20197` 226- binutils: :cve_nist:`2021-20197`
227- bluez: :cve:`2021-3658` 227- bluez: :cve_nist:`2021-3658`
228- busybox: :cve:`2021-28831` 228- busybox: :cve_nist:`2021-28831`
229- cairo: :cve:`2020-35492` 229- cairo: :cve_nist:`2020-35492`
230- cpio: :cve:`2021-38185` 230- cpio: :cve_nist:`2021-38185`
231- expat: :cve:`2013-0340` 231- expat: :cve_nist:`2013-0340`
232- ffmpeg: :cve:`2020-20446`, :cve:`2020-22015`, :cve:`2020-22021`, :cve:`2020-22033`, :cve:`2020-22019`, :cve:`2021-33815`, :cve:`2021-38171`, :cve:`2020-20453` 232- ffmpeg: :cve_nist:`2020-20446`, :cve_nist:`2020-22015`, :cve_nist:`2020-22021`, :cve_nist:`2020-22033`, :cve_nist:`2020-22019`, :cve_nist:`2021-33815`, :cve_nist:`2021-38171`, :cve_nist:`2020-20453`
233- glibc: :cve:`2021-33574`, :cve:`2021-38604` 233- glibc: :cve_nist:`2021-33574`, :cve_nist:`2021-38604`
234- inetutils: :cve:`2021-40491` 234- inetutils: :cve_nist:`2021-40491`
235- libgcrypt: :cve:`2021-40528` 235- libgcrypt: :cve_nist:`2021-40528`
236- linux-yocto/5.10, 5.14: :cve:`2021-3653`, :cve:`2021-3656` 236- linux-yocto/5.10, 5.14: :cve_nist:`2021-3653`, :cve_nist:`2021-3656`
237- lz4: :cve:`2021-3520` 237- lz4: :cve_nist:`2021-3520`
238- nettle: :cve:`2021-20305` 238- nettle: :cve_nist:`2021-20305`
239- openssl: :cve:`2021-3711`, :cve:`2021-3712` 239- openssl: :cve_nist:`2021-3711`, :cve_nist:`2021-3712`
240- perl: :cve:`2021-36770` 240- perl: :cve_nist:`2021-36770`
241- python3: :cve:`2021-29921` 241- python3: :cve_nist:`2021-29921`
242- python3-pip: :cve:`2021-3572` 242- python3-pip: :cve_nist:`2021-3572`
243- qemu: :cve:`2020-27821`, :cve:`2020-29443`, :cve:`2020-35517`, :cve:`2021-3392`, :cve:`2021-3409`, :cve:`2021-3416`, :cve:`2021-3527`, :cve:`2021-3544`, :cve:`2021-3545`, :cve:`2021-3546`, :cve:`2021-3682`, :cve:`2021-20181`, :cve:`2021-20221`, :cve:`2021-20257`, :cve:`2021-20263` 243- qemu: :cve_nist:`2020-27821`, :cve_nist:`2020-29443`, :cve_nist:`2020-35517`, :cve_nist:`2021-3392`, :cve_nist:`2021-3409`, :cve_nist:`2021-3416`, :cve_nist:`2021-3527`, :cve_nist:`2021-3544`, :cve_nist:`2021-3545`, :cve_nist:`2021-3546`, :cve_nist:`2021-3682`, :cve_nist:`2021-20181`, :cve_nist:`2021-20221`, :cve_nist:`2021-20257`, :cve_nist:`2021-20263`
244- rpm: :cve:`2021-3421`, :cve:`2021-20271` 244- rpm: :cve_nist:`2021-3421`, :cve_nist:`2021-20271`
245- rsync: :cve:`2020-14387` 245- rsync: :cve_nist:`2020-14387`
246- util-linux: :cve:`2021-37600` 246- util-linux: :cve_nist:`2021-37600`
247- vim: :cve:`2021-3770`, :cve:`2021-3778` 247- vim: :cve_nist:`2021-3770`, :cve_nist:`2021-3778`
248- wpa-supplicant: :cve:`2021-30004` 248- wpa-supplicant: :cve_nist:`2021-30004`
249- xdg-utils: :cve:`2020-27748` 249- xdg-utils: :cve_nist:`2020-27748`
250- xserver-xorg: :cve:`2021-3472` 250- xserver-xorg: :cve_nist:`2021-3472`
251 251
252Recipe Upgrades in 3.4 252Recipe Upgrades in 3.4
253~~~~~~~~~~~~~~~~~~~~~~ 253~~~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.1.rst b/documentation/migration-guides/release-notes-4.0.1.rst
index 5529f71c6f..5b972f899e 100644
--- a/documentation/migration-guides/release-notes-4.0.1.rst
+++ b/documentation/migration-guides/release-notes-4.0.1.rst
@@ -6,11 +6,11 @@ Release notes for 4.0.1 (kirkstone)
6Security Fixes in 4.0.1 6Security Fixes in 4.0.1
7~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- linux-yocto/5.15: fix :cve:`2022-28796` 9- linux-yocto/5.15: fix :cve_nist:`2022-28796`
10- python3: ignore :cve:`2015-20107` 10- python3: ignore :cve_nist:`2015-20107`
11- e2fsprogs: fix :cve:`2022-1304` 11- e2fsprogs: fix :cve_nist:`2022-1304`
12- lua: fix :cve:`2022-28805` 12- lua: fix :cve_nist:`2022-28805`
13- busybox: fix :cve:`2022-28391` 13- busybox: fix :cve_nist:`2022-28391`
14 14
15Fixes in 4.0.1 15Fixes in 4.0.1
16~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.10.rst b/documentation/migration-guides/release-notes-4.0.10.rst
index f37c3471ea..4e88bafe8a 100644
--- a/documentation/migration-guides/release-notes-4.0.10.rst
+++ b/documentation/migration-guides/release-notes-4.0.10.rst
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.10 (Kirkstone)
6Security Fixes in Yocto-4.0.10 6Security Fixes in Yocto-4.0.10
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-1579`, :cve:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588` 9- binutils: Fix :cve_nist:`2023-1579`, :cve_nist:`2023-1972`, :cve_mitre:`2023-25584`, :cve_mitre:`2023-25585` and :cve_mitre:`2023-25588`
10- cargo : Ignore :cve:`2022-46176` 10- cargo : Ignore :cve_nist:`2022-46176`
11- connman: Fix :cve:`2023-28488` 11- connman: Fix :cve_nist:`2023-28488`
12- curl: Fix :cve:`2023-27533`, :cve:`2023-27534`, :cve:`2023-27535`, :cve:`2023-27536` and :cve:`2023-27538` 12- curl: Fix :cve_nist:`2023-27533`, :cve_nist:`2023-27534`, :cve_nist:`2023-27535`, :cve_nist:`2023-27536` and :cve_nist:`2023-27538`
13- ffmpeg: Fix :cve:`2022-48434` 13- ffmpeg: Fix :cve_nist:`2022-48434`
14- freetype: Fix :cve:`2023-2004` 14- freetype: Fix :cve_nist:`2023-2004`
15- ghostscript: Fix :cve_mitre:`2023-29979` 15- ghostscript: Fix :cve_mitre:`2023-29979`
16- git: Fix :cve:`2023-25652` and :cve:`2023-29007` 16- git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007`
17- go: Fix :cve:`2022-41722`, :cve:`2022-41724`, :cve:`2022-41725`, :cve:`2023-24534`, :cve:`2023-24537` and :cve:`2023-24538` 17- go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725`, :cve_nist:`2023-24534`, :cve_nist:`2023-24537` and :cve_nist:`2023-24538`
18- go: Ignore :cve:`2022-41716` 18- go: Ignore :cve_nist:`2022-41716`
19- libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` 19- libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469`
20- libxpm: Fix :cve:`2022-44617`, :cve:`2022-46285` and :cve:`2022-4883` 20- libxpm: Fix :cve_nist:`2022-44617`, :cve_nist:`2022-46285` and :cve_nist:`2022-4883`
21- linux-yocto: Ignore :cve:`2021-3759`, :cve:`2021-4135`, :cve:`2021-4155`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-1016`, :cve:`2022-1184`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1462`, :cve:`2022-1734`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1998`, :cve:`2022-2078`, :cve:`2022-2196`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-2503`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2873`, :cve:`2022-2905`, :cve:`2022-2959`, :cve:`2022-3028`, :cve:`2022-3078`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3115`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3629`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-39188`, :cve:`2022-39190`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-41218`, :cve:`2022-4139`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42703`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-4382`, :cve:`2022-4662`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47929`, :cve:`2023-0179`, :cve:`2023-0394`, :cve:`2023-0461`, :cve:`2023-0590`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1382`, :cve:`2023-1513`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1998`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2162`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-22999`, :cve:`2023-23002`, :cve:`2023-23004`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-25012`, :cve:`2023-26545`, :cve:`2023-28327` and :cve:`2023-28328` 21- linux-yocto: Ignore :cve_nist:`2021-3759`, :cve_nist:`2021-4135`, :cve_nist:`2021-4155`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-1016`, :cve_nist:`2022-1184`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1462`, :cve_nist:`2022-1734`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1998`, :cve_nist:`2022-2078`, :cve_nist:`2022-2196`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-2503`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2873`, :cve_nist:`2022-2905`, :cve_nist:`2022-2959`, :cve_nist:`2022-3028`, :cve_nist:`2022-3078`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3115`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3629`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-39188`, :cve_nist:`2022-39190`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-41218`, :cve_nist:`2022-4139`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42703`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-4382`, :cve_nist:`2022-4662`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47929`, :cve_nist:`2023-0179`, :cve_nist:`2023-0394`, :cve_nist:`2023-0461`, :cve_nist:`2023-0590`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1382`, :cve_nist:`2023-1513`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1998`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2162`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-22999`, :cve_nist:`2023-23002`, :cve_nist:`2023-23004`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-25012`, :cve_nist:`2023-26545`, :cve_nist:`2023-28327` and :cve_nist:`2023-28328`
22- nasm: Fix :cve:`2022-44370` 22- nasm: Fix :cve_nist:`2022-44370`
23- python3-cryptography: Fix :cve:`2023-23931` 23- python3-cryptography: Fix :cve_nist:`2023-23931`
24- qemu: Ignore :cve:`2023-0664` 24- qemu: Ignore :cve_nist:`2023-0664`
25- ruby: Fix :cve:`2023-28755` and :cve:`2023-28756` 25- ruby: Fix :cve_nist:`2023-28755` and :cve_nist:`2023-28756`
26- screen: Fix :cve:`2023-24626` 26- screen: Fix :cve_nist:`2023-24626`
27- shadow: Fix :cve:`2023-29383` 27- shadow: Fix :cve_nist:`2023-29383`
28- tiff: Fix :cve:`2022-4645` 28- tiff: Fix :cve_nist:`2022-4645`
29- webkitgtk: Fix :cve:`2022-32888` and :cve:`2022-32923` 29- webkitgtk: Fix :cve_nist:`2022-32888` and :cve_nist:`2022-32923`
30- xserver-xorg: Fix :cve:`2023-1393` 30- xserver-xorg: Fix :cve_nist:`2023-1393`
31 31
32 32
33Fixes in Yocto-4.0.10 33Fixes in Yocto-4.0.10
diff --git a/documentation/migration-guides/release-notes-4.0.11.rst b/documentation/migration-guides/release-notes-4.0.11.rst
index 8a15884908..baef380586 100644
--- a/documentation/migration-guides/release-notes-4.0.11.rst
+++ b/documentation/migration-guides/release-notes-4.0.11.rst
@@ -6,18 +6,18 @@ Release notes for Yocto-4.0.11 (Kirkstone)
6Security Fixes in Yocto-4.0.11 6Security Fixes in Yocto-4.0.11
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- cups: Fix :cve:`2023-32324` 9- cups: Fix :cve_nist:`2023-32324`
10- curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` 10- curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322`
11- git: Ignore :cve:`2023-25815` 11- git: Ignore :cve_nist:`2023-25815`
12- go: Fix :cve:`2023-24539` and :cve:`2023-24540` 12- go: Fix :cve_nist:`2023-24539` and :cve_nist:`2023-24540`
13- nasm: Fix :cve:`2022-46457` 13- nasm: Fix :cve_nist:`2022-46457`
14- openssh: Fix :cve:`2023-28531` 14- openssh: Fix :cve_nist:`2023-28531`
15- openssl: Fix :cve:`2023-1255` and :cve:`2023-2650` 15- openssl: Fix :cve_nist:`2023-1255` and :cve_nist:`2023-2650`
16- perl: Fix :cve:`2023-31484` 16- perl: Fix :cve_nist:`2023-31484`
17- python3-requests: Fix for :cve:`2023-32681` 17- python3-requests: Fix for :cve_nist:`2023-32681`
18- sysstat: Fix :cve:`2023-33204` 18- sysstat: Fix :cve_nist:`2023-33204`
19- vim: Fix :cve:`2023-2426` 19- vim: Fix :cve_nist:`2023-2426`
20- webkitgtk: fix :cve:`2022-42867`, :cve:`2022-46691`, :cve:`2022-46699` and :cve:`2022-46700` 20- webkitgtk: fix :cve_nist:`2022-42867`, :cve_nist:`2022-46691`, :cve_nist:`2022-46699` and :cve_nist:`2022-46700`
21 21
22 22
23Fixes in Yocto-4.0.11 23Fixes in Yocto-4.0.11
diff --git a/documentation/migration-guides/release-notes-4.0.12.rst b/documentation/migration-guides/release-notes-4.0.12.rst
index 0ea92a453d..ead33e1854 100644
--- a/documentation/migration-guides/release-notes-4.0.12.rst
+++ b/documentation/migration-guides/release-notes-4.0.12.rst
@@ -6,30 +6,30 @@ Release notes for Yocto-4.0.12 (Kirkstone)
6Security Fixes in Yocto-4.0.12 6Security Fixes in Yocto-4.0.12
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2828` and :cve:`2023-2911` 9- bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911`
10- cups: Fix :cve:`2023-34241` 10- cups: Fix :cve_nist:`2023-34241`
11- curl: Added :cve:`2023-28320` Follow-up patch 11- curl: Added :cve_nist:`2023-28320` Follow-up patch
12- dbus: Fix :cve:`2023-34969` 12- dbus: Fix :cve_nist:`2023-34969`
13- dmidecode: fix :cve:`2023-30630` 13- dmidecode: fix :cve_nist:`2023-30630`
14- ghostscript: fix :cve:`2023-36664` 14- ghostscript: fix :cve_nist:`2023-36664`
15- go: fix :cve_mitre:`2023-24531`, :cve:`2023-24536`, :cve:`2023-29400`, :cve:`2023-29402`, :cve:`2023-29404`, :cve:`2023-29405` and :cve:`2023-29406` 15- go: fix :cve_mitre:`2023-24531`, :cve_nist:`2023-24536`, :cve_nist:`2023-29400`, :cve_nist:`2023-29402`, :cve_nist:`2023-29404`, :cve_nist:`2023-29405` and :cve_nist:`2023-29406`
16- libarchive: Ignore :cve:`2023-30571` 16- libarchive: Ignore :cve_nist:`2023-30571`
17- libcap: Fix :cve:`2023-2602` and :cve:`2023-2603` 17- libcap: Fix :cve_nist:`2023-2602` and :cve_nist:`2023-2603`
18- libjpeg-turbo: Fix :cve:`2023-2804` 18- libjpeg-turbo: Fix :cve_nist:`2023-2804`
19- libpcre2: Fix :cve:`2022-41409` 19- libpcre2: Fix :cve_nist:`2022-41409`
20- libtiff: fix :cve:`2023-26965` 20- libtiff: fix :cve_nist:`2023-26965`
21- libwebp: Fix :cve:`2023-1999` 21- libwebp: Fix :cve_nist:`2023-1999`
22- libx11: Fix :cve:`2023-3138` 22- libx11: Fix :cve_nist:`2023-3138`
23- libxpm: Fix :cve:`2022-44617` 23- libxpm: Fix :cve_nist:`2022-44617`
24- ninja: Ignore :cve:`2021-4336` 24- ninja: Ignore :cve_nist:`2021-4336`
25- openssh: Fix :cve:`2023-38408` 25- openssh: Fix :cve_nist:`2023-38408`
26- openssl: Fix :cve:`2023-2975`, :cve:`2023-3446` and :cve:`2023-3817` 26- openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446` and :cve_nist:`2023-3817`
27- perl: Fix :cve:`2023-31486` 27- perl: Fix :cve_nist:`2023-31486`
28- python3: Ignore :cve:`2023-36632` 28- python3: Ignore :cve_nist:`2023-36632`
29- qemu: Fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` 29- qemu: Fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301`
30- sqlite3: Fix :cve:`2023-36191` 30- sqlite3: Fix :cve_nist:`2023-36191`
31- tiff: Fix :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-25433`, :cve:`2023-25434` and :cve:`2023-25435` 31- tiff: Fix :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-25433`, :cve_nist:`2023-25434` and :cve_nist:`2023-25435`
32- vim: :cve:`2023-2609` and :cve:`2023-2610` 32- vim: :cve_nist:`2023-2609` and :cve_nist:`2023-2610`
33 33
34 34
35Fixes in Yocto-4.0.12 35Fixes in Yocto-4.0.12
diff --git a/documentation/migration-guides/release-notes-4.0.13.rst b/documentation/migration-guides/release-notes-4.0.13.rst
index 3c096c356f..641c9d1f05 100644
--- a/documentation/migration-guides/release-notes-4.0.13.rst
+++ b/documentation/migration-guides/release-notes-4.0.13.rst
@@ -6,43 +6,43 @@ Release notes for Yocto-4.0.13 (Kirkstone)
6Security Fixes in Yocto-4.0.13 6Security Fixes in Yocto-4.0.13
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2829` 9- bind: Fix :cve_nist:`2023-2829`
10- binutils: Fix :cve:`2022-48065` 10- binutils: Fix :cve_nist:`2022-48065`
11- busybox: Fix :cve:`2022-48174` 11- busybox: Fix :cve_nist:`2022-48174`
12- cups: Fix :cve:`2023-32360` 12- cups: Fix :cve_nist:`2023-32360`
13- curl: Fix :cve:`2023-32001` 13- curl: Fix :cve_nist:`2023-32001`
14- dmidecode: Fix :cve:`2023-30630` 14- dmidecode: Fix :cve_nist:`2023-30630`
15- dropbear: Fix :cve:`2023-36328` 15- dropbear: Fix :cve_nist:`2023-36328`
16- ffmpeg: Ignored :cve:`2023-39018` 16- ffmpeg: Ignored :cve_nist:`2023-39018`
17- file: Fix :cve:`2022-48554` 17- file: Fix :cve_nist:`2022-48554`
18- flac: Fix :cve:`2020-22219` 18- flac: Fix :cve_nist:`2020-22219`
19- gcc: Fix :cve:`2023-4039` 19- gcc: Fix :cve_nist:`2023-4039`
20- gdb: Fix :cve:`2023-39128` 20- gdb: Fix :cve_nist:`2023-39128`
21- ghostscript: Fix :cve:`2023-38559` 21- ghostscript: Fix :cve_nist:`2023-38559`
22- glib-2.0: Fix :cve:`2023-29499`, :cve:`2023-32611`, :cve:`2023-32636`, :cve:`2023-32643` and :cve:`2023-32665` 22- glib-2.0: Fix :cve_nist:`2023-29499`, :cve_nist:`2023-32611`, :cve_nist:`2023-32636`, :cve_nist:`2023-32643` and :cve_nist:`2023-32665`
23- go: Fix :cve:`2023-29409` and :cve:`2023-39319` 23- go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39319`
24- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329` 24- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-37329`
25- gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328` 25- gstreamer1.0-plugins-base: Fix :cve_mitre:`2023-37328`
26- gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327` 26- gstreamer1.0-plugins-good: Fix :cve_mitre:`2023-37327`
27- inetutils: Fix :cve:`2023-40303` 27- inetutils: Fix :cve_nist:`2023-40303`
28- json-c: Fix :cve:`2021-32292` 28- json-c: Fix :cve_nist:`2021-32292`
29- librsvg: Fix :cve:`2023-38633` 29- librsvg: Fix :cve_nist:`2023-38633`
30- libssh2: Fix :cve:`2020-22218` 30- libssh2: Fix :cve_nist:`2020-22218`
31- libtiff: Fix :cve:`2023-26966` 31- libtiff: Fix :cve_nist:`2023-26966`
32- libxml2: Fix :cve:`2023-39615` 32- libxml2: Fix :cve_nist:`2023-39615`
33- linux-yocto/5.15: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965` and :cve:`2019-1999` 33- linux-yocto/5.15: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965` and :cve_nist:`2019-1999`
34- nasm: Fix :cve:`2020-21528` 34- nasm: Fix :cve_nist:`2020-21528`
35- ncurses: Fix :cve:`2023-29491` 35- ncurses: Fix :cve_nist:`2023-29491`
36- nghttp2: Fix :cve:`2023-35945` 36- nghttp2: Fix :cve_nist:`2023-35945`
37- procps: Fix :cve:`2023-4016` 37- procps: Fix :cve_nist:`2023-4016`
38- python3-certifi: Fix :cve:`2023-37920` 38- python3-certifi: Fix :cve_nist:`2023-37920`
39- python3-git: Fix :cve:`2022-24439` and :cve:`2023-40267` 39- python3-git: Fix :cve_nist:`2022-24439` and :cve_nist:`2023-40267`
40- python3-pygments: Fix :cve:`2022-40896` 40- python3-pygments: Fix :cve_nist:`2022-40896`
41- python3: Fix :cve:`2023-40217` 41- python3: Fix :cve_nist:`2023-40217`
42- qemu: Fix :cve:`2020-14394`, :cve:`2021-3638`, :cve_mitre:`2023-2861`, :cve:`2023-3180` and :cve:`2023-3354` 42- qemu: Fix :cve_nist:`2020-14394`, :cve_nist:`2021-3638`, :cve_mitre:`2023-2861`, :cve_nist:`2023-3180` and :cve_nist:`2023-3354`
43- tiff: fix :cve:`2023-2908`, :cve:`2023-3316` and :cve:`2023-3618` 43- tiff: fix :cve_nist:`2023-2908`, :cve_nist:`2023-3316` and :cve_nist:`2023-3618`
44- vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750` and :cve:`2023-4752` 44- vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750` and :cve_nist:`2023-4752`
45- webkitgtk: fix :cve:`2022-48503` and :cve:`2023-23529` 45- webkitgtk: fix :cve_nist:`2022-48503` and :cve_nist:`2023-23529`
46 46
47 47
48 48
diff --git a/documentation/migration-guides/release-notes-4.0.14.rst b/documentation/migration-guides/release-notes-4.0.14.rst
index 02253f33f7..ad6590a887 100644
--- a/documentation/migration-guides/release-notes-4.0.14.rst
+++ b/documentation/migration-guides/release-notes-4.0.14.rst
@@ -6,37 +6,37 @@ Release notes for Yocto-4.0.14 (Kirkstone)
6Security Fixes in Yocto-4.0.14 6Security Fixes in Yocto-4.0.14
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-3341` and :cve:`2023-4236` 9- bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236`
10- binutils: Fix :cve:`2022-44840`, :cve:`2022-45703`, :cve:`2022-47008`, :cve:`2022-47011`, :cve:`2022-47673`, :cve:`2022-47695`, :cve:`2022-47696` and :cve:`2022-48063` 10- binutils: Fix :cve_nist:`2022-44840`, :cve_nist:`2022-45703`, :cve_nist:`2022-47008`, :cve_nist:`2022-47011`, :cve_nist:`2022-47673`, :cve_nist:`2022-47695`, :cve_nist:`2022-47696` and :cve_nist:`2022-48063`
11- cups: Fix :cve:`2023-4504` 11- cups: Fix :cve_nist:`2023-4504`
12- curl: Fix :cve:`2023-38545` and :cve:`2023-38546` 12- curl: Fix :cve_nist:`2023-38545` and :cve_nist:`2023-38546`
13- gawk: Fix :cve:`2023-4156` 13- gawk: Fix :cve_nist:`2023-4156`
14- ghostscript: Fix :cve:`2023-43115` 14- ghostscript: Fix :cve_nist:`2023-43115`
15- glibc: Fix :cve:`2023-4806`, :cve:`2023-4813`, :cve:`2023-4911` and :cve:`2023-5156` 15- glibc: Fix :cve_nist:`2023-4806`, :cve_nist:`2023-4813`, :cve_nist:`2023-4911` and :cve_nist:`2023-5156`
16- glibc: Ignore :cve:`2023-4527` 16- glibc: Ignore :cve_nist:`2023-4527`
17- go: Fix :cve:`2023-24538` and :cve:`2023-39318` 17- go: Fix :cve_nist:`2023-24538` and :cve_nist:`2023-39318`
18- gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` 18- gstreamer1.0-plugins-bad: fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476`
19- libtiff: Fix :cve:`2022-40090` and :cve:`2023-1916` 19- libtiff: Fix :cve_nist:`2022-40090` and :cve_nist:`2023-1916`
20- libwebp: Fix :cve:`2023-5129` 20- libwebp: Fix :cve_nist:`2023-5129`
21- libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` 21- libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787`
22- libxml2: Fix :cve:`2023-45322` 22- libxml2: Fix :cve_nist:`2023-45322`
23- libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` 23- libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789`
24- linux-firmware: Fix :cve:`2022-40982`, :cve:`2023-20569` and :cve:`2023-20593` 24- linux-firmware: Fix :cve_nist:`2022-40982`, :cve_nist:`2023-20569` and :cve_nist:`2023-20593`
25- linux-yocto: update CVE exclusions 25- linux-yocto: update CVE exclusions
26- linux-yocto/5.10: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve:`2018-8087`, :cve:`2018-8781`, :cve:`2018-8822`, :cve:`2018-8897`, :cve:`2018-9363`, :cve:`2018-9385`, :cve:`2018-9415`, :cve:`2018-9422`, :cve:`2018-9465`, :cve:`2018-9516`, :cve:`2018-9517`, :cve:`2018-9518`, :cve:`2018-9568`, :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27418`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-3910`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45888`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-21264`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23005`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42755`, :cve:`2023-42756`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-44466`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-45862`, :cve:`2023-45871`, :cve:`2023-4611`, :cve:`2023-4623`, :cve:`2023-4732`, :cve:`2023-4921` and :cve:`2023-5345` 26- linux-yocto/5.10: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_nist:`2018-8087`, :cve_nist:`2018-8781`, :cve_nist:`2018-8822`, :cve_nist:`2018-8897`, :cve_nist:`2018-9363`, :cve_nist:`2018-9385`, :cve_nist:`2018-9415`, :cve_nist:`2018-9422`, :cve_nist:`2018-9465`, :cve_nist:`2018-9516`, :cve_nist:`2018-9517`, :cve_nist:`2018-9518`, :cve_nist:`2018-9568`, :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27418`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-3910`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45888`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-21264`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23005`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42755`, :cve_nist:`2023-42756`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-44466`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-45862`, :cve_nist:`2023-45871`, :cve_nist:`2023-4611`, :cve_nist:`2023-4623`, :cve_nist:`2023-4732`, :cve_nist:`2023-4921` and :cve_nist:`2023-5345`
27- linux-yocto/5.15: Ignore :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-48502`, :cve:`2023-0160`, :cve:`2023-1206`, :cve:`2023-20593`, :cve:`2023-21264`, :cve:`2023-2898`, :cve:`2023-31248`, :cve:`2023-33250`, :cve:`2023-34319`, :cve:`2023-35001`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4194`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459` and :cve:`2023-4611` 27- linux-yocto/5.15: Ignore :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-48502`, :cve_nist:`2023-0160`, :cve_nist:`2023-1206`, :cve_nist:`2023-20593`, :cve_nist:`2023-21264`, :cve_nist:`2023-2898`, :cve_nist:`2023-31248`, :cve_nist:`2023-33250`, :cve_nist:`2023-34319`, :cve_nist:`2023-35001`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4194`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459` and :cve_nist:`2023-4611`
28- openssl: Fix :cve:`2023-4807` and :cve:`2023-5363` 28- openssl: Fix :cve_nist:`2023-4807` and :cve_nist:`2023-5363`
29- python3-git: Fix :cve:`2023-40590` and :cve:`2023-41040` 29- python3-git: Fix :cve_nist:`2023-40590` and :cve_nist:`2023-41040`
30- python3-urllib3: Fix :cve:`2023-43804` 30- python3-urllib3: Fix :cve_nist:`2023-43804`
31- qemu: Ignore :cve:`2023-2680` 31- qemu: Ignore :cve_nist:`2023-2680`
32- ruby: Fix :cve:`2023-36617` 32- ruby: Fix :cve_nist:`2023-36617`
33- shadow: Fix :cve_mitre:`2023-4641` 33- shadow: Fix :cve_mitre:`2023-4641`
34- tiff: Fix :cve:`2023-3576` and :cve:`2023-40745` 34- tiff: Fix :cve_nist:`2023-3576` and :cve_nist:`2023-40745`
35- vim: Fix :cve:`2023-5441` and :cve:`2023-5535` 35- vim: Fix :cve_nist:`2023-5441` and :cve_nist:`2023-5535`
36- webkitgtk: Fix :cve:`2023-32439` 36- webkitgtk: Fix :cve_nist:`2023-32439`
37- xdg-utils: Fix :cve:`2022-4055` 37- xdg-utils: Fix :cve_nist:`2022-4055`
38- xserver-xorg: ignore :cve:`2022-3553` (XQuartz-specific) 38- xserver-xorg: ignore :cve_nist:`2022-3553` (XQuartz-specific)
39- zlib: Fix :cve:`2023-45853` 39- zlib: Fix :cve_nist:`2023-45853`
40 40
41 41
42 42
diff --git a/documentation/migration-guides/release-notes-4.0.15.rst b/documentation/migration-guides/release-notes-4.0.15.rst
index b2731530e8..e05cd6f143 100644
--- a/documentation/migration-guides/release-notes-4.0.15.rst
+++ b/documentation/migration-guides/release-notes-4.0.15.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.0.15 (Kirkstone)
6Security Fixes in Yocto-4.0.15 6Security Fixes in Yocto-4.0.15
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` 9- avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473`
10- binutils: Fix :cve:`2022-47007`, :cve:`2022-47010` and :cve:`2022-48064` 10- binutils: Fix :cve_nist:`2022-47007`, :cve_nist:`2022-47010` and :cve_nist:`2022-48064`
11- bluez5: Fix :cve:`2023-45866` 11- bluez5: Fix :cve_nist:`2023-45866`
12- ghostscript: Ignore GhostPCL :cve:`2023-38560` 12- ghostscript: Ignore GhostPCL :cve_nist:`2023-38560`
13- gnutls: Fix :cve:`2023-5981` 13- gnutls: Fix :cve_nist:`2023-5981`
14- go: Ignore :cve:`2023-45283` and :cve:`2023-45284` 14- go: Ignore :cve_nist:`2023-45283` and :cve_nist:`2023-45284`
15- grub: Fix :cve:`2023-4692` and :cve:`2023-4693` 15- grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
16- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429` 16- gstreamer1.0-plugins-bad: Fix :cve_mitre:`2023-44429`
17- libsndfile: Fix :cve:`2022-33065` 17- libsndfile: Fix :cve_nist:`2022-33065`
18- libwebp: Fix :cve:`2023-4863` 18- libwebp: Fix :cve_nist:`2023-4863`
19- openssl: Fix :cve:`2023-5678` 19- openssl: Fix :cve_nist:`2023-5678`
20- python3-cryptography: Fix :cve:`2023-49083` 20- python3-cryptography: Fix :cve_nist:`2023-49083`
21- qemu: Fix :cve:`2023-1544` 21- qemu: Fix :cve_nist:`2023-1544`
22- sudo: :cve:`2023-42456` and :cve_mitre:`2023-42465` 22- sudo: :cve_nist:`2023-42456` and :cve_mitre:`2023-42465`
23- tiff: Fix :cve:`2023-41175` 23- tiff: Fix :cve_nist:`2023-41175`
24- vim: Fix :cve:`2023-46246`, :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236`, :cve:`2023-48237` and :cve:`2023-48706` 24- vim: Fix :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237` and :cve_nist:`2023-48706`
25- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 25- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
26- xwayland: Fix :cve:`2023-5367` 26- xwayland: Fix :cve_nist:`2023-5367`
27 27
28 28
29Fixes in Yocto-4.0.15 29Fixes in Yocto-4.0.15
diff --git a/documentation/migration-guides/release-notes-4.0.16.rst b/documentation/migration-guides/release-notes-4.0.16.rst
index 0eb31832ab..dea5b4c2bf 100644
--- a/documentation/migration-guides/release-notes-4.0.16.rst
+++ b/documentation/migration-guides/release-notes-4.0.16.rst
@@ -8,22 +8,22 @@ Security Fixes in Yocto-4.0.16
8 8
9- cpio: Fix :cve_mitre:`2023-7207` 9- cpio: Fix :cve_mitre:`2023-7207`
10- curl: Revert "curl: Backport fix CVE-2023-32001" 10- curl: Revert "curl: Backport fix CVE-2023-32001"
11- curl: Fix :cve:`2023-46218` 11- curl: Fix :cve_nist:`2023-46218`
12- dropbear:Fix :cve:`2023-48795` 12- dropbear:Fix :cve_nist:`2023-48795`
13- ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965`
14- ghostscript: Fix :cve:`2023-46751` 14- ghostscript: Fix :cve_nist:`2023-46751`
15- gnutls: Fix :cve:`2024-0553` and :cve:`2024-0567` 15- gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567`
16- go: Fix :cve:`2023-39326` 16- go: Fix :cve_nist:`2023-39326`
17- openssh: Fix :cve:`2023-48795`, :cve:`2023-51384` and :cve:`2023-51385` 17- openssh: Fix :cve_nist:`2023-48795`, :cve_nist:`2023-51384` and :cve_nist:`2023-51385`
18- openssl: Fix :cve:`2023-6129` and :cve_mitre:`2023-6237` 18- openssl: Fix :cve_nist:`2023-6129` and :cve_mitre:`2023-6237`
19- pam: Fix :cve_mitre:`2024-22365` 19- pam: Fix :cve_mitre:`2024-22365`
20- perl: Fix :cve:`2023-47038` 20- perl: Fix :cve_nist:`2023-47038`
21- qemu: Fix :cve:`2023-5088` 21- qemu: Fix :cve_nist:`2023-5088`
22- sqlite3: Fix :cve:`2023-7104` 22- sqlite3: Fix :cve_nist:`2023-7104`
23- systemd: Fix :cve:`2023-7008` 23- systemd: Fix :cve_nist:`2023-7008`
24- tiff: Fix :cve:`2023-6228` 24- tiff: Fix :cve_nist:`2023-6228`
25- xserver-xorg: Fix :cve:`2023-6377`, :cve:`2023-6478`, :cve:`2023-6816`, :cve_mitre:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886` 25- xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_mitre:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_mitre:`2024-21885` and :cve_mitre:`2024-21886`
26- zlib: Ignore :cve:`2023-6992` 26- zlib: Ignore :cve_nist:`2023-6992`
27 27
28 28
29Fixes in Yocto-4.0.16 29Fixes in Yocto-4.0.16
diff --git a/documentation/migration-guides/release-notes-4.0.17.rst b/documentation/migration-guides/release-notes-4.0.17.rst
index 07242584b8..e917dc9bf8 100644
--- a/documentation/migration-guides/release-notes-4.0.17.rst
+++ b/documentation/migration-guides/release-notes-4.0.17.rst
@@ -6,27 +6,27 @@ Release notes for Yocto-4.0.17 (Kirkstone)
6Security Fixes in Yocto-4.0.17 6Security Fixes in Yocto-4.0.17
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679`, :cve:`2023-50868` and :cve:`2023-50387` 9- bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50868` and :cve_nist:`2023-50387`
10- binutils: Fix :cve:`2023-39129` and :cve:`2023-39130` 10- binutils: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130`
11- curl: Fix :cve:`2023-46219` 11- curl: Fix :cve_nist:`2023-46219`
12- curl: Ignore :cve:`2023-42915` 12- curl: Ignore :cve_nist:`2023-42915`
13- gcc: Ignore :cve:`2023-4039` 13- gcc: Ignore :cve_nist:`2023-4039`
14- gdb: Fix :cve:`2023-39129` and :cve:`2023-39130` 14- gdb: Fix :cve_nist:`2023-39129` and :cve_nist:`2023-39130`
15- glibc: Ignore :cve:`2023-0687` 15- glibc: Ignore :cve_nist:`2023-0687`
16- go: Fix :cve:`2023-29406`, :cve:`2023-45285`, :cve:`2023-45287`, :cve:`2023-45289`, :cve:`2023-45290`, :cve:`2024-24784` and :cve:`2024-24785` 16- go: Fix :cve_nist:`2023-29406`, :cve_nist:`2023-45285`, :cve_nist:`2023-45287`, :cve_nist:`2023-45289`, :cve_nist:`2023-45290`, :cve_nist:`2024-24784` and :cve_nist:`2024-24785`
17- less: Fix :cve:`2022-48624` 17- less: Fix :cve_nist:`2022-48624`
18- libgit2: Fix :cve:`2024-24575` and :cve:`2024-24577` 18- libgit2: Fix :cve_nist:`2024-24575` and :cve_nist:`2024-24577`
19- libuv: fix :cve:`2024-24806` 19- libuv: fix :cve_nist:`2024-24806`
20- libxml2: Fix for :cve:`2024-25062` 20- libxml2: Fix for :cve_nist:`2024-25062`
21- linux-yocto/5.15: Fix :cve:`2022-36402`, :cve:`2022-40982`, :cve:`2022-47940`, :cve:`2023-1193`, :cve:`2023-1194`, :cve:`2023-3772`, :cve_mitre:`2023-3867`, :cve:`2023-4128`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4244`, :cve:`2023-4273`, :cve:`2023-4563`, :cve:`2023-4569`, :cve:`2023-4623`, :cve:`2023-4881`, :cve:`2023-4921`, :cve:`2023-5158`, :cve:`2023-5717`, :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6176`, :cve:`2023-6546`, :cve:`2023-6606`, :cve:`2023-6622`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-25775`, :cve:`2023-31085`, :cve:`2023-32247`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-34324`, :cve:`2023-35827`, :cve:`2023-38427`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-39198`, :cve:`2023-40283`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-42754`, :cve:`2023-42755`, :cve:`2023-45871`, :cve:`2023-46343`, :cve:`2023-46813`, :cve:`2023-46838`, :cve:`2023-46862`, :cve:`2023-51042`, :cve:`2023-51779`, :cve_mitre:`2023-52340`, :cve:`2023-52429`, :cve:`2023-52435`, :cve:`2023-52436`, :cve:`2023-52438`, :cve:`2023-52439`, :cve:`2023-52441`, :cve:`2023-52442`, :cve:`2023-52443`, :cve:`2023-52444`, :cve:`2023-52445`, :cve:`2023-52448`, :cve:`2023-52449`, :cve:`2023-52451`, :cve:`2023-52454`, :cve:`2023-52456`, :cve:`2023-52457`, :cve:`2023-52458`, :cve:`2023-52463`, :cve:`2023-52464`, :cve:`2024-0340`, :cve:`2024-0584`, :cve:`2024-0607`, :cve:`2024-0641`, :cve:`2024-0646`, :cve:`2024-1085`, :cve:`2024-1086`, :cve:`2024-1151`, :cve:`2024-22705`, :cve:`2024-23849`, :cve:`2024-23850`, :cve:`2024-23851`, :cve:`2024-24860`, :cve:`2024-26586`, :cve:`2024-26589`, :cve:`2024-26591`, :cve:`2024-26592`, :cve:`2024-26593`, :cve:`2024-26594`, :cve:`2024-26597` and :cve:`2024-26598` 21- linux-yocto/5.15: Fix :cve_nist:`2022-36402`, :cve_nist:`2022-40982`, :cve_nist:`2022-47940`, :cve_nist:`2023-1193`, :cve_nist:`2023-1194`, :cve_nist:`2023-3772`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4128`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4244`, :cve_nist:`2023-4273`, :cve_nist:`2023-4563`, :cve_nist:`2023-4569`, :cve_nist:`2023-4623`, :cve_nist:`2023-4881`, :cve_nist:`2023-4921`, :cve_nist:`2023-5158`, :cve_nist:`2023-5717`, :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6176`, :cve_nist:`2023-6546`, :cve_nist:`2023-6606`, :cve_nist:`2023-6622`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-25775`, :cve_nist:`2023-31085`, :cve_nist:`2023-32247`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-34324`, :cve_nist:`2023-35827`, :cve_nist:`2023-38427`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-39198`, :cve_nist:`2023-40283`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-42754`, :cve_nist:`2023-42755`, :cve_nist:`2023-45871`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46838`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51779`, :cve_mitre:`2023-52340`, :cve_nist:`2023-52429`, :cve_nist:`2023-52435`, :cve_nist:`2023-52436`, :cve_nist:`2023-52438`, :cve_nist:`2023-52439`, :cve_nist:`2023-52441`, :cve_nist:`2023-52442`, :cve_nist:`2023-52443`, :cve_nist:`2023-52444`, :cve_nist:`2023-52445`, :cve_nist:`2023-52448`, :cve_nist:`2023-52449`, :cve_nist:`2023-52451`, :cve_nist:`2023-52454`, :cve_nist:`2023-52456`, :cve_nist:`2023-52457`, :cve_nist:`2023-52458`, :cve_nist:`2023-52463`, :cve_nist:`2023-52464`, :cve_nist:`2024-0340`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086`, :cve_nist:`2024-1151`, :cve_nist:`2024-22705`, :cve_nist:`2024-23849`, :cve_nist:`2024-23850`, :cve_nist:`2024-23851`, :cve_nist:`2024-24860`, :cve_nist:`2024-26586`, :cve_nist:`2024-26589`, :cve_nist:`2024-26591`, :cve_nist:`2024-26592`, :cve_nist:`2024-26593`, :cve_nist:`2024-26594`, :cve_nist:`2024-26597` and :cve_nist:`2024-26598`
22- linux-yocto/5.15: Ignore :cve:`2020-27418`, :cve:`2020-36766`, :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-4610`, :cve:`2023-4732`, :cve:`2023-5090`, :cve:`2023-5178`, :cve:`2023-5197`, :cve:`2023-5345`, :cve:`2023-5633`, :cve:`2023-5972`, :cve:`2023-6111`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2023-40791`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45898`, :cve:`2023-51043`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve:`2023-52433`, :cve:`2023-52440`, :cve:`2023-52446`, :cve:`2023-52450`, :cve:`2023-52453`, :cve:`2023-52455`, :cve:`2023-52459`, :cve:`2023-52460`, :cve:`2023-52461`, :cve:`2023-52462`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0775`, :cve:`2024-26581`, :cve:`2024-26582`, :cve:`2024-26590`, :cve:`2024-26596` and :cve:`2024-26599` 22- linux-yocto/5.15: Ignore :cve_nist:`2020-27418`, :cve_nist:`2020-36766`, :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-4732`, :cve_nist:`2023-5090`, :cve_nist:`2023-5178`, :cve_nist:`2023-5197`, :cve_nist:`2023-5345`, :cve_nist:`2023-5633`, :cve_nist:`2023-5972`, :cve_nist:`2023-6111`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-40791`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45898`, :cve_nist:`2023-51043`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_nist:`2023-52433`, :cve_nist:`2023-52440`, :cve_nist:`2023-52446`, :cve_nist:`2023-52450`, :cve_nist:`2023-52453`, :cve_nist:`2023-52455`, :cve_nist:`2023-52459`, :cve_nist:`2023-52460`, :cve_nist:`2023-52461`, :cve_nist:`2023-52462`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0775`, :cve_nist:`2024-26581`, :cve_nist:`2024-26582`, :cve_nist:`2024-26590`, :cve_nist:`2024-26596` and :cve_nist:`2024-26599`
23- linux-yocto/5.10: Fix :cve:`2023-6040`, :cve:`2023-6121`, :cve:`2023-6606`, :cve:`2023-6817`, :cve:`2023-6915`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-39198`, :cve:`2023-46838`, :cve:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782`, :cve_mitre:`2023-52340`, :cve:`2024-0584` and :cve:`2024-0646` 23- linux-yocto/5.10: Fix :cve_nist:`2023-6040`, :cve_nist:`2023-6121`, :cve_nist:`2023-6606`, :cve_nist:`2023-6817`, :cve_nist:`2023-6915`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-39198`, :cve_nist:`2023-46838`, :cve_nist:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0584` and :cve_nist:`2024-0646`
24- linux-yocto/5.10: Ignore :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-1508`, :cve:`2022-36402`, :cve:`2022-48619`, :cve:`2023-2430`, :cve:`2023-4610`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6200`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-7192`, :cve:`2023-46343`, :cve:`2023-51042`, :cve:`2023-51043`, :cve:`2024-0193`, :cve:`2024-0443`, :cve:`2024-0562`, :cve:`2024-0582`, :cve:`2024-0639`, :cve:`2024-0641`, :cve:`2024-0775`, :cve:`2024-1085` and :cve:`2024-22705` 24- linux-yocto/5.10: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-1508`, :cve_nist:`2022-36402`, :cve_nist:`2022-48619`, :cve_nist:`2023-2430`, :cve_nist:`2023-4610`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6200`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-7192`, :cve_nist:`2023-46343`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_nist:`2024-0193`, :cve_nist:`2024-0443`, :cve_nist:`2024-0562`, :cve_nist:`2024-0582`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0775`, :cve_nist:`2024-1085` and :cve_nist:`2024-22705`
25- openssl: Fix :cve:`2024-0727` 25- openssl: Fix :cve_nist:`2024-0727`
26- python3-pycryptodome: Fix :cve:`2023-52323` 26- python3-pycryptodome: Fix :cve_nist:`2023-52323`
27- qemu: Fix :cve:`2023-6693`, :cve:`2023-42467` and :cve:`2024-24474` 27- qemu: Fix :cve_nist:`2023-6693`, :cve_nist:`2023-42467` and :cve_nist:`2024-24474`
28- vim: Fix :cve:`2024-22667` 28- vim: Fix :cve_nist:`2024-22667`
29- xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` 29- xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478`
30 30
31 31
32Fixes in Yocto-4.0.17 32Fixes in Yocto-4.0.17
diff --git a/documentation/migration-guides/release-notes-4.0.18.rst b/documentation/migration-guides/release-notes-4.0.18.rst
index fc8cd83c02..890148b5d6 100644
--- a/documentation/migration-guides/release-notes-4.0.18.rst
+++ b/documentation/migration-guides/release-notes-4.0.18.rst
@@ -6,22 +6,22 @@ Release notes for Yocto-4.0.18 (Kirkstone)
6Security Fixes in Yocto-4.0.18 6Security Fixes in Yocto-4.0.18
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- curl: Fix :cve:`2024-2398` 9- curl: Fix :cve_nist:`2024-2398`
10- expat: fix :cve:`2023-52426` and :cve:`2024-28757` 10- expat: fix :cve_nist:`2023-52426` and :cve_nist:`2024-28757`
11- libssh2: fix :cve:`2023-48795` 11- libssh2: fix :cve_nist:`2023-48795`
12- ncurses: Fix :cve:`2023-50495` 12- ncurses: Fix :cve_nist:`2023-50495`
13- nghttp2: Fix :cve:`2024-28182` and :cve:`2023-44487` 13- nghttp2: Fix :cve_nist:`2024-28182` and :cve_nist:`2023-44487`
14- openssh: Ignore :cve:`2023-51767` 14- openssh: Ignore :cve_nist:`2023-51767`
15- openssl: Fix :cve:`2024-2511` 15- openssl: Fix :cve_nist:`2024-2511`
16- perl: Ignore :cve:`2023-47100` 16- perl: Ignore :cve_nist:`2023-47100`
17- python3-cryptography: Fix :cve:`2024-26130` 17- python3-cryptography: Fix :cve_nist:`2024-26130`
18- python3-urllib3: Fix :cve:`2023-45803` 18- python3-urllib3: Fix :cve_nist:`2023-45803`
19- qemu: Fix :cve:`2023-6683` 19- qemu: Fix :cve_nist:`2023-6683`
20- ruby: fix :cve_mitre:`2024-27281` 20- ruby: fix :cve_mitre:`2024-27281`
21- rust: Ignore :cve:`2024-24576` 21- rust: Ignore :cve_nist:`2024-24576`
22- tiff: Fix :cve:`2023-52356` and :cve:`2023-6277` 22- tiff: Fix :cve_nist:`2023-52356` and :cve_nist:`2023-6277`
23- xserver-xorg: Fix :cve:`2024-31080` and :cve:`2024-31081` 23- xserver-xorg: Fix :cve_nist:`2024-31080` and :cve_nist:`2024-31081`
24- xwayland: Fix :cve:`2023-6816`, :cve:`2024-0408` and :cve:`2024-0409` 24- xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409`
25 25
26 26
27Fixes in Yocto-4.0.18 27Fixes in Yocto-4.0.18
@@ -31,7 +31,7 @@ Fixes in Yocto-4.0.18
31- common-licenses: Backport missing license 31- common-licenses: Backport missing license
32- contributor-guide: add notes for tests 32- contributor-guide: add notes for tests
33- contributor-guide: be more specific about meta-* trees 33- contributor-guide: be more specific about meta-* trees
34- cups: fix typo in :cve:`2023-32360` backport patch 34- cups: fix typo in :cve_nist:`2023-32360` backport patch
35- cve-update-nvd2-native: Add an age threshold for incremental update 35- cve-update-nvd2-native: Add an age threshold for incremental update
36- cve-update-nvd2-native: Fix CVE configuration update 36- cve-update-nvd2-native: Fix CVE configuration update
37- cve-update-nvd2-native: Fix typo in comment 37- cve-update-nvd2-native: Fix typo in comment
diff --git a/documentation/migration-guides/release-notes-4.0.19.rst b/documentation/migration-guides/release-notes-4.0.19.rst
index 5dcc977252..e363f05d7d 100644
--- a/documentation/migration-guides/release-notes-4.0.19.rst
+++ b/documentation/migration-guides/release-notes-4.0.19.rst
@@ -6,30 +6,30 @@ Release notes for Yocto-4.0.19 (Kirkstone)
6Security Fixes in Yocto-4.0.19 6Security Fixes in Yocto-4.0.19
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bluez5: Fix :cve:`2023-27349`, :cve:`2023-50229` and :cve:`2023-50230` 9- bluez5: Fix :cve_nist:`2023-27349`, :cve_nist:`2023-50229` and :cve_nist:`2023-50230`
10- ghostscript: Fix :cve:`2023-52722`, :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` 10- ghostscript: Fix :cve_nist:`2023-52722`, :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871`
11- git: Fix :cve:`2024-32002`, :cve:`2024-32004`, :cve:`2024-32020`, :cve:`2024-32021` and :cve:`2024-32465` 11- git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465`
12- glibc: Fix :cve:`2024-2961`, :cve:`2024-33599`, :cve:`2024-33600`, :cve:`2024-33601` and :cve:`2024-33602` 12- glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602`
13- gnutls: Fix :cve:`2024-28834` and :cve:`2024-28835` 13- gnutls: Fix :cve_nist:`2024-28834` and :cve_nist:`2024-28835`
14- go: Fix :cve:`2023-45288` 14- go: Fix :cve_nist:`2023-45288`
15- gstreamer1.0-plugins-bad: Fix :cve:`2023-44446`, :cve:`2023-50186` and :cve_mitre:`2024-0444` 15- gstreamer1.0-plugins-bad: Fix :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_mitre:`2024-0444`
16- less: Fix :cve:`2024-32487` 16- less: Fix :cve_nist:`2024-32487`
17- libarchive: Fix :cve:`2024-26256` 17- libarchive: Fix :cve_nist:`2024-26256`
18- libarchive: Fix multiple null deference and heap overflow in pax writer (no CVE assigned) 18- libarchive: Fix multiple null deference and heap overflow in pax writer (no CVE assigned)
19- linux-yocto/5.15: Fix :cve:`2023-6270`, :cve:`2023-7042`, :cve:`2023-52447`, :cve:`2023-52620`, :cve:`2024-22099`, :cve:`2024-26622`, :cve:`2024-26651`, :cve:`2024-26659`, :cve:`2024-26688`, :cve:`2024-26782`, :cve:`2024-26787`, :cve:`2024-26788`, :cve:`2024-26790`, :cve:`2024-26791`, :cve:`2024-26793`, :cve:`2024-26795`, :cve:`2024-26798`, :cve:`2024-26801`, :cve:`2024-26802`, :cve:`2024-26803`, :cve:`2024-26804`, :cve:`2024-26805` and :cve:`2024-26809` 19- linux-yocto/5.15: Fix :cve_nist:`2023-6270`, :cve_nist:`2023-7042`, :cve_nist:`2023-52447`, :cve_nist:`2023-52620`, :cve_nist:`2024-22099`, :cve_nist:`2024-26622`, :cve_nist:`2024-26651`, :cve_nist:`2024-26659`, :cve_nist:`2024-26688`, :cve_nist:`2024-26782`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26793`, :cve_nist:`2024-26795`, :cve_nist:`2024-26798`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805` and :cve_nist:`2024-26809`
20- linux-yocto/5.15: Ignore :cve:`2019-25160`, :cve:`2019-25162`, :cve:`2020-36775`, :cve:`2020-36776`, :cve:`2020-36777`, :cve:`2020-36778`, :cve:`2020-36779`, :cve:`2020-36780`, :cve:`2020-36781`, :cve:`2020-36782`, :cve:`2020-36783`, :cve:`2020-36784`, :cve:`2020-36785`, :cve:`2020-36786`, :cve:`2020-36787`, :cve:`2021-46904`, :cve:`2021-46905`, :cve:`2021-46906`, :cve:`2021-46908`, :cve:`2021-46909`, :cve:`2021-46910`, :cve:`2021-46911`, :cve:`2021-46912`, :cve:`2021-46913`, :cve:`2021-46914`, :cve:`2021-46915`, :cve:`2021-46916`, :cve:`2021-46917`, :cve:`2021-46918`, :cve:`2021-46919`, :cve:`2021-46920`, :cve:`2021-46921`, :cve:`2021-46922`, :cve:`2021-46923`, :cve:`2021-46924`, :cve:`2021-46925`, :cve:`2021-46926`, :cve:`2021-46927`, :cve:`2021-46928`, :cve:`2021-46929`, :cve:`2021-46930`, :cve:`2021-46931`, :cve:`2021-46932`, :cve:`2021-46933`, :cve:`2021-46934`, :cve:`2021-46935`, :cve:`2021-46936`, :cve:`2021-46937`, :cve:`2021-46938`, :cve:`2021-46939`, :cve:`2021-46940`, :cve:`2021-46941`, :cve:`2021-46942`, :cve:`2021-46943`, :cve:`2021-46944`, :cve:`2021-46945`, :cve:`2021-46947`, :cve:`2021-46948`, :cve:`2021-46949`, :cve:`2021-46950`, :cve:`2021-46951`, :cve:`2021-46952`, :cve:`2021-46953`, :cve:`2021-46954`, :cve:`2021-46955`, :cve:`2021-46956`, :cve:`2021-46957`, :cve:`2021-46958`, :cve:`2021-46959`, :cve:`2021-46960`, :cve:`2021-46961`, :cve:`2021-46962`, :cve:`2021-46963`, :cve:`2021-46964`, :cve:`2021-46965`, :cve:`2021-46966`, :cve:`2021-46967`, :cve:`2021-46968`, :cve:`2021-46969`, :cve:`2021-46970`, :cve:`2021-46971`, :cve:`2021-46972`, :cve:`2021-46973`, :cve:`2021-46974`, :cve:`2021-46976`, :cve:`2021-46977`, :cve:`2021-46978`, :cve:`2021-46979`, :cve:`2021-46980`, :cve:`2021-46981`, :cve:`2021-46982`, :cve:`2021-46983`, :cve:`2021-46984`, :cve:`2021-46985`, :cve:`2021-46986`, :cve:`2021-46987`, :cve:`2021-46988`, :cve:`2021-46989`, :cve:`2021-46990`, :cve:`2021-46991`, :cve:`2021-46992`, :cve:`2021-46993`, :cve:`2021-46994`, :cve:`2021-46995`, :cve:`2021-46996`, :cve:`2021-46997`, :cve:`2021-46998`, :cve:`2021-46999`, :cve:`2021-47000`, :cve:`2021-47001`, :cve:`2021-47002`, :cve:`2021-47003`, :cve:`2021-47004`, :cve:`2021-47005`, :cve:`2021-47006`, :cve:`2021-47007`, :cve:`2021-47008`, :cve:`2021-47009`, :cve:`2021-47010`, :cve:`2021-47011`, :cve:`2021-47012`, :cve:`2021-47013`, :cve:`2021-47014`, :cve:`2021-47015`, :cve:`2021-47016`, :cve:`2021-47017`, :cve:`2021-47018`, :cve:`2021-47019`, :cve:`2021-47020`, :cve:`2021-47021`, :cve:`2021-47022`, :cve:`2021-47023`, :cve:`2021-47024`, :cve:`2021-47025`, :cve:`2021-47026`, :cve:`2021-47027`, :cve:`2021-47028`, :cve:`2021-47029`, :cve:`2021-47030`, :cve:`2021-47031`, :cve:`2021-47032`, :cve:`2021-47033`, :cve:`2021-47034`, :cve:`2021-47035`, :cve:`2021-47036`, :cve:`2021-47037`, :cve:`2021-47038`, :cve:`2021-47039`, :cve:`2021-47040`, :cve:`2021-47041`, :cve:`2021-47042`, :cve:`2021-47043`, :cve:`2021-47044`, :cve:`2021-47045`, :cve:`2021-47046`, :cve:`2021-47047`, :cve:`2021-47048`, :cve:`2021-47049`, :cve:`2021-47050`, :cve:`2021-47051`, :cve:`2021-47052`, :cve:`2021-47053`, :cve:`2021-47054`, :cve:`2021-47055`, :cve:`2021-47056`, :cve:`2021-47057`, :cve:`2021-47058`, :cve:`2021-47059`, :cve:`2021-47060`, :cve:`2021-47061`, :cve:`2021-47062`, :cve:`2021-47063`, :cve:`2021-47064`, :cve:`2021-47065`, :cve:`2021-47066`, :cve:`2021-47067`, :cve:`2021-47068`, :cve:`2021-47069`, :cve:`2021-47070`, :cve:`2021-47071`, :cve:`2021-47072`, :cve:`2021-47073`, :cve:`2021-47074`, :cve:`2021-47075`, :cve:`2021-47076`, :cve:`2021-47077`, :cve:`2021-47078`, :cve:`2021-47079`, :cve:`2021-47080`, :cve:`2021-47081`, :cve:`2021-47082`, :cve:`2021-47083`, :cve:`2021-47086`, :cve:`2021-47087`, :cve:`2021-47088`, :cve:`2021-47089`, :cve:`2021-47090`, :cve:`2021-47091`, :cve:`2021-47092`, :cve:`2021-47093`, :cve:`2021-47094`, :cve:`2021-47095`, :cve:`2021-47096`, :cve:`2021-47097`, :cve:`2021-47098`, :cve:`2021-47099`, :cve:`2021-47100`, :cve:`2021-47101`, :cve:`2021-47102`, :cve:`2021-47103`, :cve:`2021-47104`, :cve:`2021-47105`, :cve:`2021-47106`, :cve:`2021-47107`, :cve:`2021-47108`, :cve:`2021-47109`, :cve:`2021-47110`, :cve:`2021-47111`, :cve:`2021-47112`, :cve:`2021-47113`, :cve:`2021-47114`, :cve:`2021-47116`, :cve:`2021-47117`, :cve:`2021-47118`, :cve:`2021-47119`, :cve:`2021-47120`, :cve:`2021-47121`, :cve:`2021-47122`, :cve:`2021-47123`, :cve:`2021-47124`, :cve:`2021-47125`, :cve:`2021-47126`, :cve:`2021-47127`, :cve:`2021-47128`, :cve:`2021-47129`, :cve:`2021-47130`, :cve:`2021-47131`, :cve:`2021-47132`, :cve:`2021-47133`, :cve:`2021-47134`, :cve:`2021-47135`, :cve:`2021-47136`, :cve:`2021-47137`, :cve:`2021-47138`, :cve:`2021-47139`, :cve:`2021-47140`, :cve:`2021-47141`, :cve:`2021-47142`, :cve:`2021-47143`, :cve:`2021-47144`, :cve:`2021-47145`, :cve:`2021-47146`, :cve:`2021-47147`, :cve:`2021-47148`, :cve:`2021-47149`, :cve:`2021-47150`, :cve:`2021-47151`, :cve:`2021-47152`, :cve:`2021-47153`, :cve:`2021-47158`, :cve:`2021-47159`, :cve:`2021-47160`, :cve:`2021-47161`, :cve:`2021-47162`, :cve:`2021-47163`, :cve:`2021-47164`, :cve:`2021-47165`, :cve:`2021-47166`, :cve:`2021-47167`, :cve:`2021-47168`, :cve:`2021-47169`, :cve:`2021-47170`, :cve:`2021-47171`, :cve:`2021-47172`, :cve:`2021-47173`, :cve:`2021-47174`, :cve:`2021-47175`, :cve:`2021-47176`, :cve:`2021-47177`, :cve:`2021-47178`, :cve:`2021-47179` and :cve:`2021-47180` 20- linux-yocto/5.15: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179` and :cve_nist:`2021-47180`
21- linux-yocto/5.15 (cont.): Ignore :cve:`2022-48626`, :cve:`2022-48627`, :cve:`2022-48629`, :cve:`2022-48630`, :cve:`2023-6356`, :cve:`2023-6536`, :cve:`2023-52434`, :cve:`2023-52465`, :cve:`2023-52467`, :cve:`2023-52468`, :cve:`2023-52469`, :cve:`2023-52470`, :cve:`2023-52471`, :cve:`2023-52472`, :cve:`2023-52473`, :cve:`2023-52474`, :cve:`2023-52475`, :cve:`2023-52476`, :cve:`2023-52477`, :cve:`2023-52478`, :cve:`2023-52479`, :cve:`2023-52480`, :cve:`2023-52482`, :cve:`2023-52483`, :cve:`2023-52484`, :cve:`2023-52486`, :cve:`2023-52487`, :cve:`2023-52489`, :cve:`2023-52490`, :cve:`2023-52491`, :cve:`2023-52492`, :cve:`2023-52493`, :cve:`2023-52494`, :cve:`2023-52495`, :cve:`2023-52497`, :cve:`2023-52498`, :cve:`2023-52499`, :cve:`2023-52500`, :cve:`2023-52501`, :cve:`2023-52502`, :cve:`2023-52503`, :cve:`2023-52504`, :cve:`2023-52505`, :cve:`2023-52507`, :cve:`2023-52509`, :cve:`2023-52510`, :cve:`2023-52511`, :cve:`2023-52512`, :cve:`2023-52513`, :cve:`2023-52515`, :cve:`2023-52516`, :cve:`2023-52517`, :cve:`2023-52518`, :cve:`2023-52519`, :cve:`2023-52520`, :cve:`2023-52522`, :cve:`2023-52523`, :cve:`2023-52524`, :cve:`2023-52525`, :cve:`2023-52526`, :cve:`2023-52527`, :cve:`2023-52528`, :cve:`2023-52529`, :cve:`2023-52531`, :cve:`2023-52559`, :cve:`2023-52560`, :cve:`2023-52562`, :cve:`2023-52563`, :cve:`2023-52564`, :cve:`2023-52566`, :cve:`2023-52567`, :cve:`2023-52570`, :cve:`2023-52573`, :cve:`2023-52574`, :cve:`2023-52575`, :cve:`2023-52577`, :cve:`2023-52578`, :cve:`2023-52580`, :cve:`2023-52581`, :cve:`2023-52583`, :cve:`2023-52587`, :cve:`2023-52588`, :cve:`2023-52594`, :cve:`2023-52595`, :cve:`2023-52597`, :cve:`2023-52598`, :cve:`2023-52599`, :cve:`2023-52600`, :cve:`2023-52601`, :cve:`2023-52602`, :cve:`2023-52603`, :cve:`2023-52604`, :cve:`2023-52606`, :cve:`2023-52607`, :cve:`2023-52608`, :cve:`2023-52609`, :cve:`2023-52610`, :cve:`2023-52611`, :cve:`2023-52612`, :cve:`2023-52613`, :cve:`2023-52614`, :cve:`2023-52615`, :cve:`2023-52616`, :cve:`2023-52617`, :cve:`2023-52618`, :cve:`2023-52619`, :cve:`2023-52622`, :cve:`2023-52623`, :cve:`2023-52626`, :cve:`2023-52627`, :cve:`2023-52628`, :cve:`2023-52630`, :cve:`2023-52631`, :cve:`2023-52633`, :cve:`2023-52635`, :cve:`2023-52636`, :cve:`2023-52637`, :cve:`2023-52638`, :cve:`2023-52640`, :cve:`2023-52641`, :cve:`2024-0565`, :cve:`2024-0841`, :cve:`2024-23196`, :cve:`2024-26587`, :cve:`2024-26588`, :cve:`2024-26600`, :cve:`2024-26601`, :cve:`2024-26602`, :cve:`2024-26603`, :cve:`2024-26604`, :cve:`2024-26605`, :cve:`2024-26606`, :cve:`2024-26608`, :cve:`2024-26610`, :cve:`2024-26611`, :cve:`2024-26612`, :cve:`2024-26614`, :cve:`2024-26615`, :cve:`2024-26616`, :cve:`2024-26617`, :cve:`2024-26618`, :cve:`2024-26619`, :cve:`2024-26620`, :cve:`2024-26621`, :cve:`2024-26625`, :cve:`2024-26626`, :cve:`2024-26627`, :cve:`2024-26629`, :cve:`2024-26630`, :cve:`2024-26631`, :cve:`2024-26632`, :cve:`2024-26633`, :cve:`2024-26634`, :cve:`2024-26635`, :cve:`2024-26636`, :cve:`2024-26637`, :cve:`2024-26638`, :cve:`2024-26639`, :cve:`2024-26640`, :cve:`2024-26641`, :cve:`2024-26643`, :cve:`2024-26644`, :cve:`2024-26645`, :cve:`2024-26649`, :cve:`2024-26652`, :cve:`2024-26653`, :cve:`2024-26657`, :cve:`2024-26660`, :cve:`2024-26663`, :cve:`2024-26664`, :cve:`2024-26665`, :cve:`2024-26666`, :cve:`2024-26667`, :cve:`2024-26668`, :cve:`2024-26670`, :cve:`2024-26671`, :cve:`2024-26673`, :cve:`2024-26674`, :cve:`2024-26675`, :cve:`2024-26676`, :cve:`2024-26678`, :cve:`2024-26679`, :cve:`2024-26681`, :cve:`2024-26682`, :cve:`2024-26683`, :cve:`2024-26684`, :cve:`2024-26685`, :cve:`2024-26689`, :cve:`2024-26690`, :cve:`2024-26692`, :cve:`2024-26693`, :cve:`2024-26694`, :cve:`2024-26695`, :cve:`2024-26696`, :cve:`2024-26697`, :cve:`2024-26698`, :cve:`2024-26702`, :cve:`2024-26703`, :cve:`2024-26704`, :cve:`2024-26705`, :cve:`2024-26707`, :cve:`2024-26708`, :cve:`2024-26709`, :cve:`2024-26710`, :cve:`2024-26711`, :cve:`2024-26712`, :cve:`2024-26715`, :cve:`2024-26716`, :cve:`2024-26717`, :cve:`2024-26720`, :cve:`2024-26721`, :cve:`2024-26722`, :cve:`2024-26723`, :cve:`2024-26724`, :cve:`2024-26725`, :cve:`2024-26727`, :cve:`2024-26728`, :cve:`2024-26729`, :cve:`2024-26730`, :cve:`2024-26731`, :cve:`2024-26732`, :cve:`2024-26733`, :cve:`2024-26734`, :cve:`2024-26735`, :cve:`2024-26736`, :cve:`2024-26737`, :cve:`2024-26741`, :cve:`2024-26742`, :cve:`2024-26743`, :cve:`2024-26744`, :cve:`2024-26746`, :cve:`2024-26747`, :cve:`2024-26748`, :cve:`2024-26749`, :cve:`2024-26750`, :cve:`2024-26751`, :cve:`2024-26752`, :cve:`2024-26753`, :cve:`2024-26754`, :cve:`2024-26755`, :cve:`2024-26760`, :cve:`2024-26761`, :cve:`2024-26762`, :cve:`2024-26763`, :cve:`2024-26764`, :cve:`2024-26766`, :cve:`2024-26769`, :cve:`2024-26771`, :cve:`2024-26772`, :cve:`2024-26773`, :cve:`2024-26774`, :cve:`2024-26776`, :cve:`2024-26777`, :cve:`2024-26778`, :cve:`2024-26779`, :cve:`2024-26780`, :cve:`2024-26781`, :cve:`2024-26783`, :cve:`2024-26785`, :cve:`2024-26786`, :cve:`2024-26792`, :cve:`2024-26794`, :cve:`2024-26796`, :cve:`2024-26799`, :cve:`2024-26800`, :cve:`2024-26807` and :cve:`2024-26808` 21- linux-yocto/5.15 (cont.): Ignore :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48629`, :cve_nist:`2022-48630`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-52434`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52507`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52531`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52570`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52583`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0565`, :cve_nist:`2024-0841`, :cve_nist:`2024-23196`, :cve_nist:`2024-26587`, :cve_nist:`2024-26588`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26643`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26649`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26660`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26766`, :cve_nist:`2024-26769`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26783`, :cve_nist:`2024-26785`, :cve_nist:`2024-26786`, :cve_nist:`2024-26792`, :cve_nist:`2024-26794`, :cve_nist:`2024-26796`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26807` and :cve_nist:`2024-26808`
22- ncurses: Fix :cve:`2023-45918` 22- ncurses: Fix :cve_nist:`2023-45918`
23- ofono: Fix :cve:`2023-4233` and :cve:`2023-4234` 23- ofono: Fix :cve_nist:`2023-4233` and :cve_nist:`2023-4234`
24- openssl: Fix :cve:`2024-4603` 24- openssl: Fix :cve_nist:`2024-4603`
25- util-linux: Fix :cve:`2024-28085` 25- util-linux: Fix :cve_nist:`2024-28085`
26- xserver-xorg: Fix :cve:`2024-31082` and :cve:`2024-31083` 26- xserver-xorg: Fix :cve_nist:`2024-31082` and :cve_nist:`2024-31083`
27 27
28 28
29Fixes in Yocto-4.0.19 29Fixes in Yocto-4.0.19
30~~~~~~~~~~~~~~~~~~~~~ 30~~~~~~~~~~~~~~~~~~~~~
31 31
32- binutils: Rename CVE-2022-38126 patch to :cve:`2022-35205` 32- binutils: Rename CVE-2022-38126 patch to :cve_nist:`2022-35205`
33- bitbake: parse: Improve/fix cache invalidation via mtime 33- bitbake: parse: Improve/fix cache invalidation via mtime
34- build-appliance-image: Update to kirkstone head revision 34- build-appliance-image: Update to kirkstone head revision
35- go-mod.bbclass: do not pack go mod cache 35- go-mod.bbclass: do not pack go mod cache
diff --git a/documentation/migration-guides/release-notes-4.0.2.rst b/documentation/migration-guides/release-notes-4.0.2.rst
index 2f724e33c4..57881fa359 100644
--- a/documentation/migration-guides/release-notes-4.0.2.rst
+++ b/documentation/migration-guides/release-notes-4.0.2.rst
@@ -6,13 +6,13 @@ Release notes for Yocto-4.0.2 (Kirkstone)
6Security Fixes in Yocto-4.0.2 6Security Fixes in Yocto-4.0.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- libxslt: Mark :cve:`2022-29824` as not applying 9- libxslt: Mark :cve_nist:`2022-29824` as not applying
10- tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve:`2022-1210` 10- tiff: Add jbig :term:`PACKAGECONFIG` and clarify IGNORE :cve_nist:`2022-1210`
11- tiff: mark :cve:`2022-1622` and :cve:`2022-1623` as invalid 11- tiff: mark :cve_nist:`2022-1622` and :cve_nist:`2022-1623` as invalid
12- pcre2:fix :cve:`2022-1586` Out-of-bounds read 12- pcre2:fix :cve_nist:`2022-1586` Out-of-bounds read
13- curl: fix :cve:`2022-22576`, :cve:`2022-27775`, :cve:`2022-27776`, :cve:`2022-27774`, :cve:`2022-30115`, :cve:`2022-27780`, :cve:`2022-27781`, :cve:`2022-27779` and :cve:`2022-27782` 13- curl: fix :cve_nist:`2022-22576`, :cve_nist:`2022-27775`, :cve_nist:`2022-27776`, :cve_nist:`2022-27774`, :cve_nist:`2022-30115`, :cve_nist:`2022-27780`, :cve_nist:`2022-27781`, :cve_nist:`2022-27779` and :cve_nist:`2022-27782`
14- qemu: fix :cve:`2021-4206` and :cve:`2021-4207` 14- qemu: fix :cve_nist:`2021-4206` and :cve_nist:`2021-4207`
15- freetype: fix :cve:`2022-27404`, :cve:`2022-27405` and :cve:`2022-27406` 15- freetype: fix :cve_nist:`2022-27404`, :cve_nist:`2022-27405` and :cve_nist:`2022-27406`
16 16
17Fixes in Yocto-4.0.2 17Fixes in Yocto-4.0.2
18~~~~~~~~~~~~~~~~~~~~ 18~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.20.rst b/documentation/migration-guides/release-notes-4.0.20.rst
index 97e0a3e91d..d0f95fff50 100644
--- a/documentation/migration-guides/release-notes-4.0.20.rst
+++ b/documentation/migration-guides/release-notes-4.0.20.rst
@@ -6,14 +6,14 @@ Release notes for Yocto-4.0.20 (Kirkstone)
6Security Fixes in Yocto-4.0.20 6Security Fixes in Yocto-4.0.20
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- acpica: Fix :cve:`2024-24856` 9- acpica: Fix :cve_nist:`2024-24856`
10- glib-2.0: Fix :cve:`2024-34397` 10- glib-2.0: Fix :cve_nist:`2024-34397`
11- gstreamer1.0-plugins-base: Fix :cve:`2024-4453` 11- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453`
12- libxml2: Fix :cve:`2024-34459` 12- libxml2: Fix :cve_nist:`2024-34459`
13- openssh: fix :cve:`2024-6387` 13- openssh: fix :cve_nist:`2024-6387`
14- openssl: Fix :cve_mitre:`2024-4741` and :cve:`2024-5535` 14- openssl: Fix :cve_mitre:`2024-4741` and :cve_nist:`2024-5535`
15- ruby: fix :cve:`2024-27280` 15- ruby: fix :cve_nist:`2024-27280`
16- wget: Fix for :cve:`2024-38428` 16- wget: Fix for :cve_nist:`2024-38428`
17 17
18 18
19Fixes in Yocto-4.0.20 19Fixes in Yocto-4.0.20
diff --git a/documentation/migration-guides/release-notes-4.0.21.rst b/documentation/migration-guides/release-notes-4.0.21.rst
new file mode 100644
index 0000000000..abf2199ee5
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.21.rst
@@ -0,0 +1,166 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.21 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.21
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- bind: Fix :cve_nist:`2024-4076`, :cve_nist:`2024-1737`, :cve_nist:`2024-0760` and :cve_nist:`2024-1975`
10- apr: Fix :cve_nist:`2023-49582`
11- busybox: Fix :cve_nist:`2023-42363`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2023-42366` and :cve_nist:`2021-42380`
12- curl: Ignore :cve_nist:`2024-32928`
13- curl: Fix :cve_nist:`2024-7264`
14- ghostscript: Fix :cve_nist:`2024-29506`, :cve_nist:`2024-29509` and :cve_nist:`2024-29511`
15- go: Fix :cve_nist:`2024-24789` and :cve_nist:`2024-24791`
16- gtk+3: Fix :cve_nist:`2024-6655`
17- libarchive: Ignore :cve_nist:`2024-37407`
18- libyaml: Ignore :cve_nist:`2024-35325`, :cve_nist:`2024-35326` and :cve_nist:`2024-35328`
19- linux-yocto/5.15: Fix :cve_nist:`2022-48772`, :cve_nist:`2024-35972`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36897`, :cve_nist:`2024-36938`, :cve_nist:`2024-36965`, :cve_nist:`2024-36967`, :cve_nist:`2024-36969`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38571`, :cve_nist:`2024-38583`, :cve_nist:`2024-38591`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38600`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39277`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39466`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39493`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40911`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40954`, :cve_nist:`2024-40956`, :cve_nist:`2024-40957`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40967`, :cve_nist:`2024-40970`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40994`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41002`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41055`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41073`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41093`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42068`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42080`, :cve_nist:`2024-42082`, :cve_nist:`2024-42085`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42109`, :cve_nist:`2024-42140`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42225`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247`
20- llvm: Fix :cve_nist:`2023-46049` and :cve_nist:`2024-31852`
21- ofono: fix :cve_nist:`2023-2794`
22- orc: Fix :cve_nist:`2024-40897`
23- python3-certifi: Fix :cve_nist:`2024-39689`
24- python3-jinja2: Fix :cve_nist:`2024-34064`
25- python3: Fix :cve_nist:`2024-8088`
26- qemu: Fix :cve_nist:`2024-7409`
27- ruby: Fix for :cve_nist:`2024-27282`
28- tiff: Fix :cve_nist:`2024-7006`
29- vim: Fix :cve_nist:`2024-22667`, :cve_nist:`2024-41957`, :cve_nist:`2024-41965` and :cve_nist:`2024-43374`
30- wpa-supplicant: Fix :cve_nist:`2023-52160`
31
32
33Fixes in Yocto-4.0.21
34~~~~~~~~~~~~~~~~~~~~~
35
36- apr: upgrade to 1.7.5
37- bind: Upgrade to 9.18.28
38- bitbake: data_smart: Improve performance for VariableHistory
39- build-appliance-image: Update to kirkstone head revision
40- cryptodev-module: Fix build for linux 5.10.220
41- gcc-runtime: remove bashism
42- grub: fs/fat: Don't error when mtime is 0
43- image_types.bbclass: Use --force also with lz4,lzop
44- libsoup: fix compile error on centos7
45- linux-yocto/5.15: upgrade to v5.15.164
46- lttng-modules: Upgrade to 2.13.14
47- migration-guide: add release notes for 4.0.20
48- orc: upgrade to 0.4.39
49- poky.conf: bump version for 4.0.21
50- python3-jinja2: upgrade to 3.1.4
51- python3-pycryptodome(x): use python_setuptools_build_meta build class
52- python3: add PACKAGECONFIG[editline]
53- ref-manual: fix typo and move :term:`SYSROOT_DIRS` example
54- sqlite3: CVE_ID correction for :cve_nist:`2023-7104` as patched
55- sqlite3: Rename patch for :cve_nist:`2022-35737`
56- uboot-sign: Fix index error in concat_dtb_helper() with multiple configs
57- vim: upgrade to 9.1.0682
58- wireless-regdb: upgrade to 2024.07.04
59
60
61Known Issues in Yocto-4.0.21
62~~~~~~~~~~~~~~~~~~~~~~~~~~~~
63
64- N/A
65
66
67Contributors to Yocto-4.0.21
68~~~~~~~~~~~~~~~~~~~~~~~~~~~~
69
70- Archana Polampalli
71- Ashish Sharma
72- Bruce Ashfield
73- Deepthi Hemraj
74- Divya Chellam
75- Florian Amstutz
76- Guocai He
77- Hitendra Prajapati
78- Hugo SIMELIERE
79- Lee Chee Yang
80- Leon Anavi
81- Matthias Pritschet
82- Ming Liu
83- Niko Mauno
84- Peter Marko
85- Robert Yang
86- Rohini Sangam
87- Ross Burton
88- Siddharth Doshi
89- Soumya Sambu
90- Steve Sakoman
91- Vijay Anusuri
92- Vrushti Dabhi
93- Wang Mingyu
94- Yogita Urade
95
96
97Repositories / Downloads for Yocto-4.0.21
98~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99
100poky
101
102- Repository Location: :yocto_git:`/poky`
103- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
104- Tag: :yocto_git:`yocto-4.0.21 </poky/log/?h=yocto-4.0.21>`
105- Git Revision: :yocto_git:`4cdc553814640851cce85f84ee9c0b58646cd33b </poky/commit/?id=4cdc553814640851cce85f84ee9c0b58646cd33b>`
106- Release Artefact: poky-4cdc553814640851cce85f84ee9c0b58646cd33b
107- sha: 460e3a4ede491a9b66c5d262cd9498d5bcca1f2d880885342b08dc32b967f33d
108- Download Locations:
109 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2
110 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/poky-4cdc553814640851cce85f84ee9c0b58646cd33b.tar.bz2
111
112openembedded-core
113
114- Repository Location: :oe_git:`/openembedded-core`
115- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
116- Tag: :oe_git:`yocto-4.0.21 </openembedded-core/log/?h=yocto-4.0.21>`
117- Git Revision: :oe_git:`c40a3fec49942ac6d25ba33e57e801a550e252c9 </openembedded-core/commit/?id=c40a3fec49942ac6d25ba33e57e801a550e252c9>`
118- Release Artefact: oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9
119- sha: afc2aaf312f9fb2590ae006615557ec605c98eff42bc380a1b2d6e39cfdf8930
120- Download Locations:
121 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2
122 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/oecore-c40a3fec49942ac6d25ba33e57e801a550e252c9.tar.bz2
123
124meta-mingw
125
126- Repository Location: :yocto_git:`/meta-mingw`
127- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
128- Tag: :yocto_git:`yocto-4.0.21 </meta-mingw/log/?h=yocto-4.0.21>`
129- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
130- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
131- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
132- Download Locations:
133 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
134 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
135
136meta-gplv2
137
138- Repository Location: :yocto_git:`/meta-gplv2`
139- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
140- Tag: :yocto_git:`yocto-4.0.21 </meta-gplv2/log/?h=yocto-4.0.21>`
141- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
142- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
143- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
144- Download Locations:
145 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
146 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
147
148bitbake
149
150- Repository Location: :oe_git:`/bitbake`
151- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
152- Tag: :oe_git:`yocto-4.0.21 </bitbake/log/?h=yocto-4.0.21>`
153- Git Revision: :oe_git:`ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1 </bitbake/commit/?id=ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1>`
154- Release Artefact: bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1
155- sha: 1cb102f4c8dbd067f0262072e4e629ec7cb423103111ccdde75a09fcb8f55e5f
156- Download Locations:
157 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2
158 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.21/bitbake-ec2a99a077da9aa0e99e8b05e0c65dcbd45864b1.tar.bz2
159
160yocto-docs
161
162- Repository Location: :yocto_git:`/yocto-docs`
163- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
164- Tag: :yocto_git:`yocto-4.0.21 </yocto-docs/log/?h=yocto-4.0.21>`
165- Git Revision: :yocto_git:`512025edd9b3b6b8d0938b35bb6188c9f3b7f17d </yocto-docs/commit/?id=512025edd9b3b6b8d0938b35bb6188c9f3b7f17d>`
166
diff --git a/documentation/migration-guides/release-notes-4.0.22.rst b/documentation/migration-guides/release-notes-4.0.22.rst
new file mode 100644
index 0000000000..b2b98bd907
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.22.rst
@@ -0,0 +1,196 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.22 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.22
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- cups: Fix :cve_nist:`2024-35235` and :cve_nist:`2024-47175`
10- curl: Fix :cve_nist:`2024-8096`
11- expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492`
12- gnupg: Ignore :cve_nist:`2022-3219`
13- libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006`
14- linux-yocto/5.10: Fix :cve_nist:`2022-48772`, :cve_nist:`2023-52434`, :cve_nist:`2023-52447`, :cve_nist:`2023-52458`, :cve_nist:`2024-0841`, :cve_nist:`2024-26601`, :cve_nist:`2024-26882`, :cve_nist:`2024-26883`, :cve_nist:`2024-26884`, :cve_nist:`2024-26885`, :cve_nist:`2024-26898`, :cve_nist:`2024-26901`, :cve_nist:`2024-26903`, :cve_nist:`2024-26907`, :cve_nist:`2024-26934`, :cve_nist:`2024-26978`, :cve_nist:`2024-27013`, :cve_nist:`2024-27020`, :cve_nist:`2024-35972`, :cve_nist:`2024-35978`, :cve_nist:`2024-35982`, :cve_nist:`2024-35984`, :cve_nist:`2024-35990`, :cve_nist:`2024-35997`, :cve_nist:`2024-36008`, :cve_nist:`2024-36270`, :cve_nist:`2024-36489`, :cve_nist:`2024-36902`, :cve_nist:`2024-36971`, :cve_nist:`2024-36978`, :cve_nist:`2024-38546`, :cve_nist:`2024-38547`, :cve_nist:`2024-38549`, :cve_nist:`2024-38552`, :cve_nist:`2024-38555`, :cve_nist:`2024-38583`, :cve_nist:`2024-38590`, :cve_nist:`2024-38597`, :cve_nist:`2024-38598`, :cve_nist:`2024-38627`, :cve_nist:`2024-38633`, :cve_nist:`2024-38661`, :cve_nist:`2024-38662`, :cve_nist:`2024-38780`, :cve_nist:`2024-39292`, :cve_nist:`2024-39301`, :cve_nist:`2024-39468`, :cve_nist:`2024-39471`, :cve_nist:`2024-39475`, :cve_nist:`2024-39476`, :cve_nist:`2024-39480`, :cve_nist:`2024-39482`, :cve_nist:`2024-39484`, :cve_nist:`2024-39487`, :cve_nist:`2024-39489`, :cve_nist:`2024-39495`, :cve_nist:`2024-39506`, :cve_nist:`2024-40902`, :cve_nist:`2024-40904`, :cve_nist:`2024-40905`, :cve_nist:`2024-40912`, :cve_nist:`2024-40932`, :cve_nist:`2024-40934`, :cve_nist:`2024-40958`, :cve_nist:`2024-40959`, :cve_nist:`2024-40960`, :cve_nist:`2024-40961`, :cve_nist:`2024-40980`, :cve_nist:`2024-40981`, :cve_nist:`2024-40995`, :cve_nist:`2024-41000`, :cve_nist:`2024-41006`, :cve_nist:`2024-41007`, :cve_nist:`2024-41012`, :cve_nist:`2024-41040`, :cve_nist:`2024-41046`, :cve_nist:`2024-41049`, :cve_nist:`2024-41059`, :cve_nist:`2024-41063`, :cve_nist:`2024-41064`, :cve_nist:`2024-41070`, :cve_nist:`2024-41087`, :cve_nist:`2024-41089`, :cve_nist:`2024-41092`, :cve_nist:`2024-41095`, :cve_nist:`2024-41097`, :cve_nist:`2024-42070`, :cve_nist:`2024-42076`, :cve_nist:`2024-42077`, :cve_nist:`2024-42082`, :cve_nist:`2024-42090`, :cve_nist:`2024-42093`, :cve_nist:`2024-42094`, :cve_nist:`2024-42101`, :cve_nist:`2024-42102`, :cve_nist:`2024-42104`, :cve_nist:`2024-42131`, :cve_nist:`2024-42137`, :cve_nist:`2024-42148`, :cve_nist:`2024-42152`, :cve_nist:`2024-42153`, :cve_nist:`2024-42154`, :cve_nist:`2024-42157`, :cve_nist:`2024-42161`, :cve_nist:`2024-42223`, :cve_nist:`2024-42224`, :cve_nist:`2024-42229`, :cve_nist:`2024-42232`, :cve_nist:`2024-42236`, :cve_nist:`2024-42244` and :cve_nist:`2024-42247`
15- linux-yocto/5.15: Fix :cve_nist:`2023-52889`, :cve_nist:`2024-41011`, :cve_nist:`2024-42114`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`, :cve_nist:`2024-42277`, :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`, :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`, :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`, :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43817`, :cve_nist:`2024-43828`, :cve_nist:`2024-43854`, :cve_nist:`2024-43856`, :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43863`, :cve_nist:`2024-43871`, :cve_nist:`2024-43873`, :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`, :cve_nist:`2024-43894`, :cve_nist:`2024-43902`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43909`, :cve_nist:`2024-43914`, :cve_nist:`2024-44934`, :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44952`, :cve_nist:`2024-44954`, :cve_nist:`2024-44958`, :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44966`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`, :cve_nist:`2024-44982`, :cve_nist:`2024-44983`, :cve_nist:`2024-44985`, :cve_nist:`2024-44986`, :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`, :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`, :cve_nist:`2024-45006`, :cve_nist:`2024-45011`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`, :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`, :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`, :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702` and :cve_nist:`2024-46707`
16- openssl: Fix :cve_nist:`2024-6119`
17- procps: Fix :cve_nist:`2023-4016`
18- python3: Fix :cve_nist:`2023-27043`, :cve_nist:`2024-4030`, :cve_nist:`2024-4032`, :cve_nist:`2024-6923`, :cve_nist:`2024-6232`, :cve_nist:`2024-7592` and :cve_nist:`2024-8088`
19- qemu: Fix :cve_nist:`2024-4467`
20- rust: Ignore :cve_nist:`2024-43402`
21- webkitgtk: Fix :cve_nist:`2024-40779`
22- wpa-supplicant: Ignore :cve_nist:`2024-5290`
23- wpa-supplicant: Fix :cve_nist:`2024-3596`
24
25
26Fixes in Yocto-4.0.22
27~~~~~~~~~~~~~~~~~~~~~
28
29- bintuils: stable 2.38 branch update
30- bitbake: fetch2/wget: Canonicalize :term:`DL_DIR` paths for wget2 compatibility
31- bitbake: fetch/wget: Move files into place atomically
32- bitbake: hashserv: tests: Omit client in slow server start test
33- bitbake: tests/fetch: Tweak to work on Fedora40
34- bitbake: wget: Make wget --passive-ftp option conditional on ftp/ftps
35- build-appliance-image: Update to kirkstone head revision
36- buildhistory: Fix intermittent package file list creation
37- buildhistory: Restoring files from preserve list
38- buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage
39- busybox: Fix cut with "-s" flag
40- cdrtools-native: fix build with gcc-14
41- curl: free old conn better on reuse
42- cve-exclusion: Drop the version comparision/warning
43- dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only)
44- doc/features: remove duplicate word in distribution feature ext2
45- gcc: upgrade to v11.5
46- gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only)
47- glibc: stable 2.35 branch updates
48- install-buildtools: fix "test installation" step
49- install-buildtools: remove md5 checksum validation
50- install-buildtools: support buildtools-make-tarball and update to 4.1
51- iw: Fix :term:`LICENSE` (change to ISC)
52- kmscube: Add patch to fix -int-conversion build error
53- lib/oeqa: rename assertRaisesRegexp to assertRaisesRegex
54- libedit: Make docs generation deterministic
55- linux-yocto/5.10: fix NFSV3 config warning
56- linux-yocto/5.10: remove obsolete options
57- linux-yocto/5.10: update to v5.10.223
58- linux-yocto/5.15: update to v5.15.166
59- meta-world-pkgdata: Inherit nopackages
60- migration-guide: add release notes for 4.0.21
61- openssl: Upgrade to 3.0.15
62- poky.conf: bump version for 4.0.22
63- populate_sdk_base: inherit nopackages
64- python3: Upgrade to 3.10.15
65- ruby: Make docs generation deterministic
66- runqemu: keep generating tap devices
67- scripts/install-buildtools: Update to 4.0.21
68- selftest/runtime_test/virgl: Disable for all fedora
69- testexport: fallback for empty :term:`IMAGE_LINK_NAME`
70- testimage: fallback for empty :term:`IMAGE_LINK_NAME`
71- tiff: Fix :term:`LICENSE` (change to libtiff)
72- udev-extraconf: Add collect flag to mount
73- unzip: Fix :term:`LICENSE` (change to Info-ZIP)
74- valgrind: disable avx_estimate_insn.vgtest
75- wpa-supplicant: Patch security advisory 2024-2
76- yocto-uninative: Update to 4.5 for gcc 14
77- yocto-uninative: Update to 4.6 for glibc 2.40
78- zip: Fix :term:`LICENSE` (change to Info-ZIP)
79- zstd: fix :term:`LICENSE` statement (change to "BSD-3-Clause | GPL-2.0-only")
80
81
82Known Issues in Yocto-4.0.22
83~~~~~~~~~~~~~~~~~~~~~~~~~~~~
84
85- ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the ``parselogs``
86 runtime test due to unexpected kernel error messages in the log (see
87 :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla).
88
89
90Contributors to Yocto-4.0.22
91~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92
93- Aleksandar Nikolic
94- Alexandre Belloni
95- Archana Polampalli
96- Bruce Ashfield
97- Colin McAllister
98- Deepthi Hemraj
99- Divya Chellam
100- Hitendra Prajapati
101- Hugo SIMELIERE
102- Jinfeng Wang
103- Joshua Watt
104- Jörg Sommer
105- Konrad Weihmann
106- Lee Chee Yang
107- Martin Jansa
108- Massimiliano Minella
109- Michael Halstead
110- Mingli Yu
111- Niko Mauno
112- Paul Eggleton
113- Pedro Ferreira
114- Peter Marko
115- Purushottam Choudhary
116- Richard Purdie
117- Rob Woolley
118- Rohini Sangam
119- Ross Burton
120- Rudolf J Streif
121- Siddharth Doshi
122- Steve Sakoman
123- Vijay Anusuri
124- Vivek Kumbhar
125
126
127Repositories / Downloads for Yocto-4.0.22
128~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
129
130poky
131
132- Repository Location: :yocto_git:`/poky`
133- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
134- Tag: :yocto_git:`yocto-4.0.22 </poky/log/?h=yocto-4.0.22>`
135- Git Revision: :yocto_git:`7e87dc422d972e0dc98372318fcdc63a76347d16 </poky/commit/?id=7e87dc422d972e0dc98372318fcdc63a76347d16>`
136- Release Artefact: poky-7e87dc422d972e0dc98372318fcdc63a76347d16
137- sha: 5058e7b2474f8cb73c19e776ef58d9784321ef42109d5982747c8c432531239f
138- Download Locations:
139 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2
140 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/poky-7e87dc422d972e0dc98372318fcdc63a76347d16.tar.bz2
141
142openembedded-core
143
144- Repository Location: :oe_git:`/openembedded-core`
145- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
146- Tag: :oe_git:`yocto-4.0.22 </openembedded-core/log/?h=yocto-4.0.22>`
147- Git Revision: :oe_git:`f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf </openembedded-core/commit/?id=f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf>`
148- Release Artefact: oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf
149- sha: 378bcc840ba9fbf06a15fea1b5dacdd446f3ad4d85115d708e7bbb20629cdeb4
150- Download Locations:
151 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2
152 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/oecore-f09fca692f96c9c428e89c5ef53fbcb92ac0c9bf.tar.bz2
153
154meta-mingw
155
156- Repository Location: :yocto_git:`/meta-mingw`
157- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
158- Tag: :yocto_git:`yocto-4.0.22 </meta-mingw/log/?h=yocto-4.0.22>`
159- Git Revision: :yocto_git:`f6b38ce3c90e1600d41c2ebb41e152936a0357d7 </meta-mingw/commit/?id=f6b38ce3c90e1600d41c2ebb41e152936a0357d7>`
160- Release Artefact: meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7
161- sha: 7d57167c19077f4ab95623d55a24c2267a3a3fb5ed83688659b4c03586373b25
162- Download Locations:
163 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
164 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-mingw-f6b38ce3c90e1600d41c2ebb41e152936a0357d7.tar.bz2
165
166meta-gplv2
167
168- Repository Location: :yocto_git:`/meta-gplv2`
169- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
170- Tag: :yocto_git:`yocto-4.0.22 </meta-gplv2/log/?h=yocto-4.0.22>`
171- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
172- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
173- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
174- Download Locations:
175 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
176 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
177
178bitbake
179
180- Repository Location: :oe_git:`/bitbake`
181- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
182- Tag: :oe_git:`yocto-4.0.22 </bitbake/log/?h=yocto-4.0.22>`
183- Git Revision: :oe_git:`eb5c1ce6b1b8f33535ff7b9263ec7648044163ea </bitbake/commit/?id=eb5c1ce6b1b8f33535ff7b9263ec7648044163ea>`
184- Release Artefact: bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea
185- sha: 473d3e9539160633f3de9d88cce69123f6c623e4c8ab35beb7875868564593cf
186- Download Locations:
187 http://downloads.yoctoproject.org/releases/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2
188 http://mirrors.kernel.org/yocto/yocto/yocto-4.0.22/bitbake-eb5c1ce6b1b8f33535ff7b9263ec7648044163ea.tar.bz2
189
190yocto-docs
191
192- Repository Location: :yocto_git:`/yocto-docs`
193- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
194- Tag: :yocto_git:`yocto-4.0.22 </yocto-docs/log/?h=yocto-4.0.22>`
195- Git Revision: :yocto_git:`2169a52a24ebd1906039c42632bae6c4285a3aca </yocto-docs/commit/?id=2169a52a24ebd1906039c42632bae6c4285a3aca>`
196
diff --git a/documentation/migration-guides/release-notes-4.0.23.rst b/documentation/migration-guides/release-notes-4.0.23.rst
new file mode 100644
index 0000000000..abf7c69759
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.23.rst
@@ -0,0 +1,209 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-4.0.23 (Kirkstone)
4------------------------------------------
5
6Security Fixes in Yocto-4.0.23
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- ``curl``: Fix :cve_nist:`2024-9681`
10- ``expat``: Fix :cve_nist:`2024-50602`
11- ``gcc``: Ignore :cve_nist:`2023-4039`
12- ``ghostscript``: Fix :cve_nist:`2023-46361` and :cve_nist:`2024-29508`
13- ``gstreamer1.0``: Ignore :cve_nist:`2024-0444`
14- ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958`
15- ``openssl``: Fix :cve_nist:`2024-9143`
16- ``orc``: Fix :cve_nist:`2024-40897`
17- ``python3``: Ignore :cve_nist:`2023-27043`, :cve_nist:`2024-6232` and :cve_nist:`2024-7592`
18- ``qemu``: Fix :cve_nist:`2023-3019`
19- ``vim``: Fix :cve_nist:`2024-43790`, :cve_nist:`2024-43802`, :cve_nist:`2024-45306` and :cve_nist:`2024-47814`
20- ``zstd``: Fix :cve_nist:`2022-4899`
21
22
23Fixes in Yocto-4.0.23
24~~~~~~~~~~~~~~~~~~~~~
25
26- at-spi2-core: backport a patch to fix build with gcc-14 on host
27- bitbake: bitbake: doc/user-manual: Update the BB_HASHSERVE_UPSTREAM
28- bitbake: codeparser: Fix handling of string AST nodes with older Python versions
29- bitbake: fetch2/git: Use quote from shlex, not pipes
30- bitbake: gitsm: Add call_process_submodules() to remove duplicated code
31- bitbake: gitsm: Remove downloads/tmpdir when failed
32- bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab
33- bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab
34- bmap-tools: update :term:`HOMEPAGE` and :term:`SRC_URI`
35- build-appliance-image: Update to kirkstone head revision
36- cmake: Fix sporadic issues when determining compiler internals
37- cracklib: Modify patch to compile with GCC 14
38- cve-check: add CVSS vector string to CVE database and reports
39- cve-check: add support for cvss v4.0
40- cve_check: Use a local copy of the database during builds
41- dev-manual: document how to provide confs from layer.conf
42- documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint
43- documentation: Makefile: fix epub and latexpdf targets
44- documentation: README: add instruction to run Vale on a subset
45- documentation: brief-yoctoprojectqs: update BB_HASHSERVE_UPSTREAM for new infrastructure
46- documentation: conf.py: add a bitbake_git extlink
47- documentation: rename :cve: role to :cve_nist:
48- documentation: styles: vocabularies: Yocto: add sstate
49- documnetation: contributor-guide: Remove duplicated words
50- gcc: restore a patch for Neoverse N2 core
51- glib-2.0: patch regression of :cve_nist:`2023-32665`
52- kmscube: create_framebuffer: backport modifier fix
53- libffi: backport a fix to build libffi-native with gcc-14
54- linux-firmware: Upgrade to 20240909
55- local.conf.sample: update BB_HASHSERVE_UPSTREAM for new infrastructure
56- migration-guide: add release notes for 4.0.22
57- migration-guide: release-notes-4.0: update BB_HASHSERVE_UPSTREAM for new infrastructure
58- nativesdk-intercept: Fix bad intercept chgrp/chown logic
59- orc: Upgrade to 0.4.40
60- overlayfs-etc: add option to skip creation of mount dirs
61- overview-manual: concepts: add details on package splitting
62- package: Switch debug source handling to use prefix map
63- patch.py: Use shlex instead of deprecated pipe
64- poky.conf: bump version for 4.0.23
65- pseudo: Disable LFS on 32bit arches
66- pseudo: Fix envp bug and add posix_spawn wrapper
67- pseudo: Fix to work with glibc 2.40
68- pseudo: Switch back to the master branch
69- pseudo: Update to include logic fix
70- pseudo: Update to include open symlink handling bugfix
71- pseudo: Update to pull in fchmodat fix
72- pseudo: Update to pull in fd leak fix
73- pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept
74- pseudo: Update to pull in linux-libc-headers race fix
75- pseudo: Update to pull in python 3.12+ fix
76- pseudo: Update to pull in syncfs probe fix
77- ref-manual: add description for the "sysroot" term
78- ref-manual: add missing CVE_CHECK manifest variables
79- ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable
80- ref-manual: add missing :term:`OPKGBUILDCMD` variable
81- ref-manual: devtool-reference: document missing commands
82- ref-manual: devtool-reference: refresh example outputs
83- ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable
84- ref-manual: release-process: add a reference to the doc's release
85- ref-manual: release-process: refresh the current LTS releases
86- ref-manual: release-process: update releases.svg
87- ref-manual: release-process: update releases.svg with month after "Current"
88- ref-manual: structure.rst: document missing tmp/ dirs
89- ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables
90- syslinux: Disable error on implicit-function-declaration
91- util-linux: Define pidfd_* function signatures
92- vala: add -Wno-error=incompatible-pointer-types work around
93- vim: Upgrade to 9.1.0764
94- xmlto: backport a patch to fix build with gcc-14 on host
95- zip: Fix build with gcc-14
96- zip: Make configure checks to be more robust
97
98
99Known Issues in Yocto-4.0.23
100~~~~~~~~~~~~~~~~~~~~~~~~~~~~
101
102-N/A
103
104
105Contributors to Yocto-4.0.23
106~~~~~~~~~~~~~~~~~~~~~~~~~~~~
107
108- Aleksandar Nikolic
109- Alexandre Belloni
110- Antoine Lubineau
111- Antonin Godard
112- Archana Polampalli
113- Ashish Sharma
114- Baruch Siach
115- Eilís 'pidge' Ní Fhlannagáin
116- Jose Quaresma
117- Julien Stephan
118- Khem Raj
119- Lee Chee Yang
120- Macpaul Lin
121- Martin Jansa
122- Michael Opdenacker
123- Ola x Nilsson
124- Peter Marko
125- Philip Lorenz
126- Randolph Sapp
127- Richard Purdie
128- Robert Yang
129- Rohini Sangam
130- Ruiqiang Hao
131- Siddharth Doshi
132- Steve Sakoman
133- Talel BELHAJSALEM
134- Wang Mingyu
135- Yogita Urade
136- Zoltan Boszormenyi
137
138
139Repositories / Downloads for Yocto-4.0.23
140~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
141
142poky
143
144- Repository Location: :yocto_git:`/poky`
145- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
146- Tag: :yocto_git:`yocto-4.0.23 </poky/log/?h=yocto-4.0.23>`
147- Git Revision: :yocto_git:`8e092852b63e998d990b8f8e1aa91297dec4430f </poky/commit/?id=8e092852b63e998d990b8f8e1aa91297dec4430f>`
148- Release Artefact: poky-8e092852b63e998d990b8f8e1aa91297dec4430f
149- sha: 339d34d8432070dac948449e732ebf06a888eeb27ff548958b2395c9446b029d
150- Download Locations:
151 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2
152 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/poky-8e092852b63e998d990b8f8e1aa91297dec4430f.tar.bz2
153
154openembedded-core
155
156- Repository Location: :oe_git:`/openembedded-core`
157- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
158- Tag: :oe_git:`yocto-4.0.23 </openembedded-core/log/?h=yocto-4.0.23>`
159- Git Revision: :oe_git:`fb45c5cf8c2b663af293acb069d446610f77ff1a </openembedded-core/commit/?id=fb45c5cf8c2b663af293acb069d446610f77ff1a>`
160- Release Artefact: oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a
161- sha: 1d394370ea7d43fb885ab8a952d6d1e43f1a850745a5152d5ead5565a283a0f5
162- Download Locations:
163 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2
164 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/oecore-fb45c5cf8c2b663af293acb069d446610f77ff1a.tar.bz2
165
166meta-mingw
167
168- Repository Location: :yocto_git:`/meta-mingw`
169- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
170- Tag: :yocto_git:`yocto-4.0.23 </meta-mingw/log/?h=yocto-4.0.23>`
171- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
172- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
173- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
174- Download Locations:
175 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
176 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
177
178meta-gplv2
179
180- Repository Location: :yocto_git:`/meta-gplv2`
181- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
182- Tag: :yocto_git:`yocto-4.0.23 </meta-gplv2/log/?h=yocto-4.0.23>`
183- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
184- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
185- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
186- Download Locations:
187 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
188 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
189
190bitbake
191
192- Repository Location: :oe_git:`/bitbake`
193- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
194- Tag: :oe_git:`yocto-4.0.23 </bitbake/log/?h=yocto-4.0.23>`
195- Git Revision: :oe_git:`fb73c495c45d1d4107cfd60b67a5b4f11a99647b </bitbake/commit/?id=fb73c495c45d1d4107cfd60b67a5b4f11a99647b>`
196- Release Artefact: bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b
197- sha: 5cd271299951f25912a2e8d4de6d8769a4c0bb3bbcfc90815be41f23fd299a0b
198- Download Locations:
199 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2
200 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.23/bitbake-fb73c495c45d1d4107cfd60b67a5b4f11a99647b.tar.bz2
201
202yocto-docs
203
204- Repository Location: :yocto_git:`/yocto-docs`
205- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
206- Tag: :yocto_git:`yocto-4.0.23 </yocto-docs/log/?h=yocto-4.0.23>`
207- Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>`
208
209
diff --git a/documentation/migration-guides/release-notes-4.0.24.rst b/documentation/migration-guides/release-notes-4.0.24.rst
new file mode 100644
index 0000000000..33372dc89e
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.24.rst
@@ -0,0 +1,383 @@
1Release notes for Yocto-4.0.24 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.24
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- coreutils: Fix :cve_nist:`2024-0684`
8- cpio: Ignore :cve_nist:`2023-7216`
9- diffoscope: Fix :cve_nist:`2024-25711`
10- ffmpeg: fix :cve_mitre:`2023-47342`, :cve_nist:`2023-50007`, :cve_nist:`2023-50008`,
11 :cve_nist:`2023-51793`, :cve_nist:`2023-51794`, :cve_nist:`2023-51796`, :cve_nist:`2023-51798`,
12 :cve_nist:`2024-7055`, :cve_nist:`2024-31578`, :cve_nist:`2024-31582`, :cve_nist:`2024-32230`,
13 :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368`
14- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
15 :cve_nist:`2024-46955` and :cve_nist:`2024-46956`
16- ghostscript: Ignore :cve_nist:`2024-46954`
17- glib-2.0: Fix :cve_nist:`2024-52533`
18- gnupg: Ignore :cve_nist:`2022-3515`
19- grub: Ignore :cve_nist:`2024-1048` and :cve_nist:`2023-4001`
20- gstreame1.0: Ignore :cve_nist:`2023-40474`, :cve_nist:`2023-40475`, :cve_nist:`2023-40476`,
21 :cve_nist:`2023-44429`, :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_nist:`2024-0444`
22- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
23 :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
24 and :cve_nist:`2024-47835`
25- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
26 :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
27 :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
28 :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
29 :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
30 :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
31- gstreamer1.0: Fix :cve_nist:`2024-47606`
32- libarchive: Fix :cve_nist:`2024-20696`
33- libpam: Fix :cve_nist:`2024-10041`
34- libsdl2: Ignore :cve_nist:`2020-14409` and :cve_nist:`2020-14410`
35- libsndfile1: Fix :cve_nist:`2022-33065` and :cve_nist:`2024-50612`
36- libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
37- libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
38- linux-yocto/5.10: Fix :cve_nist:`2023-52889`, :cve_nist:`2023-52917`, :cve_nist:`2023-52918`,
39 :cve_nist:`2024-41011`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`,
40 :cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`,
41 :cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`,
42 :cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`,
43 :cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43828`, :cve_nist:`2024-43856`,
44 :cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43871`,
45 :cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`,
46 :cve_nist:`2024-43894`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43914`,
47 :cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44954`,
48 :cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`,
49 :cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`,
50 :cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`,
51 :cve_nist:`2024-45006`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`,
52 :cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`,
53 :cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`,
54 :cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702`,
55 :cve_nist:`2024-46707`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
56 :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
57 :cve_nist:`2024-46731`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`,
58 :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46747`,
59 :cve_nist:`2024-46750`, :cve_nist:`2024-46755`, :cve_nist:`2024-46759`, :cve_nist:`2024-46761`,
60 :cve_nist:`2024-46763`, :cve_nist:`2024-46771`, :cve_nist:`2024-46777`, :cve_nist:`2024-46780`,
61 :cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46791`,
62 :cve_nist:`2024-46798`, :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46814`,
63 :cve_nist:`2024-46815`, :cve_nist:`2024-46817`, :cve_nist:`2024-46818`, :cve_nist:`2024-46819`,
64 :cve_nist:`2024-46822`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46832`,
65 :cve_nist:`2024-46840`, :cve_nist:`2024-46844`, :cve_nist:`2024-47659`, :cve_nist:`2024-47660`,
66 :cve_nist:`2024-47663`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`,
67 :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47692`,
68 :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
69 :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
70 :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47723`, :cve_nist:`2024-47735`,
71 :cve_nist:`2024-47737`, :cve_nist:`2024-47739`, :cve_nist:`2024-47742`, :cve_nist:`2024-47747`,
72 :cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47757`, :cve_nist:`2024-49851`,
73 :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`, :cve_nist:`2024-49867`,
74 :cve_nist:`2024-49868`, :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`,
75 :cve_nist:`2024-49879`, :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`,
76 :cve_nist:`2024-49884`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
77 :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
78 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
79 :cve_nist:`2024-49924`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`, :cve_nist:`2024-49936`,
80 :cve_nist:`2024-49938`, :cve_nist:`2024-49944`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`,
81 :cve_nist:`2024-49952`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
82 :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
83 :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
84 :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
85 :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50001`,
86 :cve_nist:`2024-50006`, :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`,
87 :cve_nist:`2024-50015`, :cve_nist:`2024-50024`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
88 :cve_nist:`2024-50039`, :cve_nist:`2024-50040`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`,
89 :cve_nist:`2024-50046`, :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50095`,
90 :cve_nist:`2024-50096`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`,
91 :cve_nist:`2024-50184` and :cve_nist:`2024-50188`
92- linux-yocto/5.15: Fix :cve_nist:`2022-48695`, :cve_nist:`2023-52530`, :cve_nist:`2023-52917`,
93 :cve_nist:`2024-45009`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
94 :cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
95 :cve_nist:`2024-46731`, :cve_nist:`2024-46732`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`,
96 :cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`,
97 :cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46750`, :cve_nist:`2024-46755`,
98 :cve_nist:`2024-46759`, :cve_nist:`2024-46761`, :cve_nist:`2024-46763`, :cve_nist:`2024-46771`,
99 :cve_nist:`2024-46777`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`,
100 :cve_nist:`2024-46783`, :cve_nist:`2024-46791`, :cve_nist:`2024-46795`, :cve_nist:`2024-46798`,
101 :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46805`, :cve_nist:`2024-46807`,
102 :cve_nist:`2024-46810`, :cve_nist:`2024-46814`, :cve_nist:`2024-46815`, :cve_nist:`2024-46817`,
103 :cve_nist:`2024-46818`, :cve_nist:`2024-46819`, :cve_nist:`2024-46822`, :cve_nist:`2024-46828`,
104 :cve_nist:`2024-46829`, :cve_nist:`2024-46832`, :cve_nist:`2024-46840`, :cve_nist:`2024-46844`,
105 :cve_nist:`2024-47659`, :cve_nist:`2024-47660`, :cve_nist:`2024-47663`, :cve_nist:`2024-47665`,
106 :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47674`,
107 :cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47690`,
108 :cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`,
109 :cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
110 :cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
111 :cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47720`, :cve_nist:`2024-47723`,
112 :cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47737`, :cve_nist:`2024-47739`,
113 :cve_nist:`2024-47742`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`,
114 :cve_nist:`2024-47757`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49854`,
115 :cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`,
116 :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, :cve_nist:`2024-49871`,
117 :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`,
118 :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`,
119 :cve_nist:`2024-49886`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
120 :cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
121 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
122 :cve_nist:`2024-49924`, :cve_nist:`2024-49927`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`,
123 :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49938`, :cve_nist:`2024-49944`,
124 :cve_nist:`2024-49946`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49952`,
125 :cve_nist:`2024-49954`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
126 :cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
127 :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
128 :cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
129 :cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`,
130 :cve_nist:`2024-50001`, :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50006`,
131 :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`, :cve_nist:`2024-50015`,
132 :cve_nist:`2024-50019`, :cve_nist:`2024-50024`, :cve_nist:`2024-50031`, :cve_nist:`2024-50033`,
133 :cve_nist:`2024-50035`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
134 :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
135 :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50062`, :cve_nist:`2024-50074`,
136 :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50093`, :cve_nist:`2024-50095`,
137 :cve_nist:`2024-50096`, :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`,
138 :cve_nist:`2024-50110`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`, :cve_nist:`2024-50117`,
139 :cve_nist:`2024-50127`, :cve_nist:`2024-50128`, :cve_nist:`2024-50131`, :cve_nist:`2024-50134`,
140 :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, :cve_nist:`2024-50148`,
141 :cve_nist:`2024-50150`, :cve_nist:`2024-50151`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`,
142 :cve_nist:`2024-50156`, :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`,
143 :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`, :cve_nist:`2024-50179`,
144 :cve_nist:`2024-50180`, :cve_nist:`2024-50181`, :cve_nist:`2024-50182`, :cve_nist:`2024-50184`,
145 :cve_nist:`2024-50185`, :cve_nist:`2024-50186`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`,
146 :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
147 :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`,
148 :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`,
149 :cve_nist:`2024-50229`, :cve_nist:`2024-50230`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`,
150 :cve_nist:`2024-50234`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50244`,
151 :cve_nist:`2024-50245`, :cve_nist:`2024-50247`, :cve_nist:`2024-50251`, :cve_nist:`2024-50257`,
152 :cve_nist:`2024-50259`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, :cve_nist:`2024-50265`,
153 :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, :cve_nist:`2024-50273`,
154 :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, :cve_nist:`2024-50287`,
155 :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`, :cve_nist:`2024-50301`,
156 :cve_nist:`2024-50302`, :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`,
157 :cve_nist:`2024-53058`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`,
158 :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53088`, :cve_nist:`2024-53096`,
159 :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53145`, :cve_nist:`2024-53146`,
160 :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`,
161 :cve_nist:`2024-53157`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`, :cve_nist:`2024-53173`,
162 :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`, :cve_nist:`2024-56567`,
163 :cve_nist:`2024-56572`, :cve_nist:`2024-56574`, :cve_nist:`2024-56578`, :cve_nist:`2024-56581`,
164 :cve_nist:`2024-56593`, :cve_nist:`2024-56600`, :cve_nist:`2024-56601`, :cve_nist:`2024-56602`,
165 :cve_nist:`2024-56603`, :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56614`,
166 :cve_nist:`2024-56622`, :cve_nist:`2024-56623`, :cve_nist:`2024-56629`, :cve_nist:`2024-56634`,
167 :cve_nist:`2024-56640`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`,
168 :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`, :cve_nist:`2024-56670`,
169 :cve_nist:`2024-56688`, :cve_nist:`2024-56694`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`,
170 :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, :cve_nist:`2024-56726`,
171 :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56745`,
172 :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`, :cve_nist:`2024-56754`,
173 :cve_nist:`2024-56756`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`, :cve_nist:`2024-56776`,
174 :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`, :cve_nist:`2024-56780`,
175 :cve_nist:`2024-56781`, :cve_nist:`2024-56785` and :cve_nist:`2024-56787`
176- ovmf: Fix :cve_nist:`2022-36763`, :cve_nist:`2022-36764`, :cve_nist:`2022-36765`,
177 :cve_nist:`2023-45229`, :cve_nist:`2023-45230`, :cve_nist:`2023-45231`, :cve_nist:`2023-45232`,
178 :cve_nist:`2023-45233`, :cve_nist:`2023-45234`, :cve_nist:`2023-45235`, :cve_nist:`2023-45236`,
179 :cve_nist:`2023-45237`, :cve_nist:`2024-1298` and :cve_nist:`2024-38796`
180- pixman: Ignore :cve_nist:`2023-37769`
181- python3: Fix :cve_nist:`2024-9287`, :cve_nist:`2024-11168` and :cve_nist:`2024-50602`
182- python3-pip: Fix :cve_nist:`2023-5752`
183- python3-requests: Fix :cve_nist:`2024-35195`
184- python3-zipp: Fix :cve_nist:`2024-5569`
185- qemu: Fix :cve_nist:`2024-3446`, :cve_nist:`2024-3447` and :cve_nist:`2024-6505`
186- qemu: Ignore :cve_nist:`2022-36648`
187- subversion: Fix :cve_nist:`2024-46901`
188- tiff: Fix :cve_nist:`2023-3164`
189- tiff: Ignore :cve_nist:`2023-2731`
190- webkitgtk: Fix :cve_nist:`2024-40776` and :cve_nist:`2024-40780`
191- xserver-xorg: Fix :cve_nist:`2024-9632`
192- xwayland: Fix :cve_nist:`2023-5380` and :cve_nist:`2024-0229`
193
194
195Fixes in Yocto-4.0.24
196~~~~~~~~~~~~~~~~~~~~~
197
198- base-passwd: Add the sgx group
199- base-passwd: Regenerate the patches
200- base-passwd: Update the status for two patches
201- base-passwd: Update to 3.5.52
202- base-passwd: add the wheel group
203- base-passwd: fix patchreview warning
204- bitbake: fetch2: use persist_data context managers
205- bitbake: fetch/wget: Increase timeout to 100s from 30s
206- bitbake: persist_data: close connection in SQLTable __exit__
207- build-appliance-image: Update to kirkstone head revision
208- builder: set :term:`CVE_PRODUCT`
209- contributor-guide: submit-changes.rst: suggest to remove the git signature
210- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
211- dbus: disable assertions and enable only modular tests
212- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
213- docs: Gather dependencies in poky.yaml.in
214- docs: standards.md: add a section on admonitions
215- gstreamer1.0: improve test reliability
216- linux-yocto/5.10: update to v5.10.227
217- linux-yocto/5.15: update to v5.15.175
218- llvm: reduce size of -dbg package
219- lttng-modules: fix build error after kernel update to 5.15.171
220- migration-guides: add release notes for 4.0.23
221- ninja: fix build with python 3.13
222- oeqa/utils/gitarchive: Return tag name and improve exclude handling
223- ovmf-native: remove .pyc files from install
224- package.bbclass: Use shlex instead of deprecated pipes
225- package_rpm: restrict rpm to 4 threads
226- package_rpm: use zstd's default compression level
227- poky.conf: add new tested distros
228- poky.conf: bump version for 4.0.24
229- poky.yaml.in: add missing locales dependency
230- python3: upgrade to 3.10.16
231- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
232- ref-manual: classes: fix bin_package description
233- ref-manual: devtool-reference: add warning note on deploy-target and shared objects
234- ref-manual: move runtime-testing section to the test-manual
235- ref-manual: packages: move ptest section to the test-manual
236- ref-manual: system-requirements: update list of supported distros
237- ref-manual: use standardized method accross both ubuntu and debian for locale install
238- resulttool: Add --logfile-archive option to store mode
239- resulttool: Allow store to filter to specific revisions
240- resulttool: Clean up repoducible build logs
241- resulttool: Fix passthrough of --all files in store mode
242- resulttool: Handle ltp rawlogs as well as ptest
243- resulttool: Improve repo layout for oeselftest results
244- resulttool: Trim the precision of duration information
245- resulttool: Use single space indentation in json output
246- rootfs-postcommands.bbclass: make opkg status reproducible
247- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
248- sanity: check for working user namespaces
249- scripts/install-buildtools: Update to 4.0.22
250- selftest/reproducible: Clean up pathnames
251- selftest/reproducible: Drop rawlogs
252- test-manual: reproducible-builds.rst: document :term:`OEQA_REPRODUCIBLE_TEST_TARGET` and
253 :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS`
254- test-manual: reproducible-builds.rst: show how to build a single package
255- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
256- tzdata & tzcode-native: upgrade 2024b
257- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
258- unzip: Fix configure tests to use modern C
259- webkitgtk: Fix build on 32bit arm
260- webkitgtk: fix perl-native dependency
261- webkitgtk: reduce size of -dbg package
262- wireless-regdb: upgrade to 2024.10.07
263
264
265Known Issues in Yocto-4.0.24
266~~~~~~~~~~~~~~~~~~~~~~~~~~~~
267
268- N/A
269
270Contributors to Yocto-4.0.24
271~~~~~~~~~~~~~~~~~~~~~~~~~~~~
272
273Thanks to the following people who contributed to this release:
274
275- Aleksandar Nikolic
276- Alex Kiernan
277- Alexander Kanavin
278- Alexandre Belloni
279- Antonin Godard
280- Archana Polampalli
281- Bruce Ashfield
282- Changqing Li
283- Chen Qi
284- Chris Laplante
285- Divya Chellam
286- Ernst Persson
287- Guénaël Muller
288- Hitendra Prajapati
289- Hongxu Jia
290- Jiaying Song
291- Jinfeng Wang
292- Khem Raj
293- Lee Chee Yang
294- Liyin Zhang
295- Louis Rannou
296- Markus Volk
297- Mikko Rapeli
298- Ovidiu Panait
299- Peter Kjellerstedt
300- Peter Marko
301- Regis Dargent
302- Richard Purdie
303- Rohini Sangam
304- Ross Burton
305- Soumya Sambu
306- Steve Sakoman
307- Trevor Gamblin
308- Vijay Anusuri
309- Wang Mingyu
310- Yogita Urade
311- Zahir Hussain
312
313
314Repositories / Downloads for Yocto-4.0.24
315~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
316
317poky
318
319- Repository Location: :yocto_git:`/poky`
320- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
321- Tag: :yocto_git:`yocto-4.0.24 </poky/log/?h=yocto-4.0.24>`
322- Git Revision: :yocto_git:`f50532593651dff82bc952288d786c55038c2c86 </poky/commit/?id=f50532593651dff82bc952288d786c55038c2c86>`
323- Release Artefact: poky-f50532593651dff82bc952288d786c55038c2c86
324- sha: 0aa062d19510394748db9a2d6ded2d764f435383296d9c94fb6b25755280556e
325- Download Locations:
326 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
327 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
328
329openembedded-core
330
331- Repository Location: :oe_git:`/openembedded-core`
332- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
333- Tag: :oe_git:`yocto-4.0.24 </openembedded-core/log/?h=yocto-4.0.24>`
334- Git Revision: :oe_git:`a270d4c957259761bcc7382fcc54642a02f9fc7d </openembedded-core/commit/?id=a270d4c957259761bcc7382fcc54642a02f9fc7d>`
335- Release Artefact: oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d
336- sha: b08b9b16c8ffa587d521ad28e24e38c79d757a6f0839d18165ebac3081a34b68
337- Download Locations:
338 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
339 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
340
341meta-mingw
342
343- Repository Location: :yocto_git:`/meta-mingw`
344- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
345- Tag: :yocto_git:`yocto-4.0.24 </meta-mingw/log/?h=yocto-4.0.24>`
346- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
347- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
348- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
349- Download Locations:
350 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
351 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
352
353meta-gplv2
354
355- Repository Location: :yocto_git:`/meta-gplv2`
356- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
357- Tag: :yocto_git:`yocto-4.0.24 </meta-gplv2/log/?h=yocto-4.0.24>`
358- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
359- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
360- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
361- Download Locations:
362 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
363 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
364
365bitbake
366
367- Repository Location: :oe_git:`/bitbake`
368- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
369- Tag: :oe_git:`yocto-4.0.24 </bitbake/log/?h=yocto-4.0.24>`
370- Git Revision: :oe_git:`3f88b005244a0afb5d5c7260e54a94a453ec9b3e </bitbake/commit/?id=3f88b005244a0afb5d5c7260e54a94a453ec9b3e>`
371- Release Artefact: bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e
372- sha: 31f442b72ec7d81ca75509b1a7179c3fe3942528b1e31c823b21a413244bd15b
373- Download Locations:
374 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
375 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
376
377yocto-docs
378
379- Repository Location: :yocto_git:`/yocto-docs`
380- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
381- Tag: :yocto_git:`yocto-4.0.24 </yocto-docs/log/?h=yocto-4.0.24>`
382- Git Revision: :yocto_git:`3128bf149f40928e6c2a3e264590a0c6c9778c6a </yocto-docs/commit/?id=3128bf149f40928e6c2a3e264590a0c6c9778c6a>`
383
diff --git a/documentation/migration-guides/release-notes-4.0.25.rst b/documentation/migration-guides/release-notes-4.0.25.rst
new file mode 100644
index 0000000000..e52f57913f
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.25.rst
@@ -0,0 +1,167 @@
1Release notes for Yocto-4.0.25 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.25
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- avahi: Fix :cve_nist:`2024-52616`
8- binutils: Fix :cve_nist:`2024-53589`
9- gdb: Fix :cve_nist:`2024-53589`
10- go: Fix :cve_nist:`2024-34155`, :cve_nist:`2024-34156`, :cve_nist:`2024-34158` and
11 :cve_nist:`2024-45336`
12- gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`,
13 :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`,
14 :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`,
15 :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`,
16 :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`,
17 :cve_nist:`2024-47777`, :cve_nist:`2024-47778`, :cve_nist:`2024-47834`, :cve_nist:`2024-47602`,
18 :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`
19 and :cve_nist:`2024-47776`
20- linux-yocto/5.15: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-55916`, :cve_nist:`2024-56369`,
21 :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56715`, :cve_nist:`2024-56716`,
22 :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57841`, :cve_nist:`2024-57890`,
23 :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`,
24 :cve_nist:`2024-57938`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21665`,
25 :cve_nist:`2025-21666`, :cve_nist:`2025-21669`, :cve_nist:`2025-21680`, :cve_nist:`2025-21683`,
26 :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
27- ofono: Fix :cve_nist:`2024-7539`, :cve_nist:`2024-7540`, :cve_nist:`2024-7541`,
28 :cve_nist:`2024-7542`, :cve_nist:`2024-7543`, :cve_nist:`2024-7544`, :cve_nist:`2024-7545`,
29 :cve_nist:`2024-7546` and :cve_nist:`2024-7547`
30- openssl: Fix :cve_nist:`2024-13176`
31- rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`,
32 :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747`
33- ruby: Fix :cve_nist:`2024-49761`
34- socat: Fix :cve_nist:`2024-54661`
35- vte: Fix :cve_nist:`2024-37535`
36- wget: Fix :cve_nist:`2024-10524`
37
38
39Fixes in Yocto-4.0.25
40~~~~~~~~~~~~~~~~~~~~~
41
42- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
43- build-appliance-image: Update to kirkstone head revision
44- classes-global/insane: Look up all runtime providers for file-rdeps
45- classes/nativesdk: also override :term:`TUNE_PKGARCH`
46- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
47- cmake: apply parallel build settings to ptest tasks
48- dev-manual/building: document the initramfs-framework recipe
49- docs: Update autobuilder URLs to valkyrie
50- documentation: Fix typo in standards.md
51- glibc: Suppress GCC -Os warning on user2netname for sunrpc
52- glibc: stable 2.35 branch updates
53- lib/packagedata.py: Add API to iterate over rprovides
54- linux-yocto/5.15: upgrade to v5.15.178
55- migration-guides: add release notes for 4.0.24
56- openssl: upgrade to 3.0.16
57- poky.conf: bump version for 4.0.25
58- python3: Treat UID/GID overflow as failure
59- rsync: Delete pedantic errors re-ordering patch
60- rsync: upgrade to 3.2.7
61- rust-common.bbclass: soft assignment for RUSTLIB path
62- scripts/install-buildtools: Update to 4.0.23
63- test-manual/reproducible-builds: fix reproducible links
64
65
66Known Issues in Yocto-4.0.25
67~~~~~~~~~~~~~~~~~~~~~~~~~~~~
68
69- N/A
70
71
72Contributors to Yocto-4.0.25
73~~~~~~~~~~~~~~~~~~~~~~~~~~~~
74
75- Aleksandar Nikolic
76- Alexander Kanavin
77- Antonin Godard
78- Archana Polampalli
79- Bruce Ashfield
80- Deepesh Varatharajan
81- Divya Chellam
82- Joshua Watt
83- Khem Raj
84- Lee Chee Yang
85- Nikhil R
86- Pedro Ferreira
87- Peter Marko
88- Praveen Kumar
89- Richard Purdie
90- Ross Burton
91- Simon A. Eugster
92- Steve Sakoman
93- Yash Shinde
94- Yogita Urade
95- Zhang Peng
96
97
98Repositories / Downloads for Yocto-4.0.25
99~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
100
101poky
102
103- Repository Location: :yocto_git:`/poky`
104- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
105- Tag: :yocto_git:`yocto-4.0.25 </poky/log/?h=yocto-4.0.25>`
106- Git Revision: :yocto_git:`b5aa03f336c121269551f9e7baed4c677c76bb39 </poky/commit/?id=b5aa03f336c121269551f9e7baed4c677c76bb39>`
107- Release Artefact: poky-b5aa03f336c121269551f9e7baed4c677c76bb39
108- sha: 7afbcb25f0dd89a4fb6dd4c5945061705ef9ce79a6863806278603273c2b3b4a
109- Download Locations:
110 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
111 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
112
113openembedded-core
114
115- Repository Location: :oe_git:`/openembedded-core`
116- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
117- Tag: :oe_git:`yocto-4.0.25 </openembedded-core/log/?h=yocto-4.0.25>`
118- Git Revision: :oe_git:`5a794fd244f7fdeb426bd5e3def6b4effc0e8c62 </openembedded-core/commit/?id=5a794fd244f7fdeb426bd5e3def6b4effc0e8c62>`
119- Release Artefact: oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62
120- sha: 8fc93109693e5f4702b3fe0633b6be833605291b3d595dc8bdeb6379f40cd2de
121- Download Locations:
122 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
123 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
124
125meta-mingw
126
127- Repository Location: :yocto_git:`/meta-mingw`
128- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
129- Tag: :yocto_git:`yocto-4.0.25 </meta-mingw/log/?h=yocto-4.0.25>`
130- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
131- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
132- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
133- Download Locations:
134 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
135 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
136
137meta-gplv2
138
139- Repository Location: :yocto_git:`/meta-gplv2`
140- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
141- Tag: :yocto_git:`yocto-4.0.25 </meta-gplv2/log/?h=yocto-4.0.25>`
142- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
143- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
144- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
145- Download Locations:
146 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
147 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
148
149bitbake
150
151- Repository Location: :oe_git:`/bitbake`
152- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
153- Tag: :oe_git:`yocto-4.0.25 </bitbake/log/?h=yocto-4.0.25>`
154- Git Revision: :oe_git:`e71f1ce53cf3b8320caa481ae62d1ce2900c4670 </bitbake/commit/?id=e71f1ce53cf3b8320caa481ae62d1ce2900c4670>`
155- Release Artefact: bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670
156- sha: 007eef35174586c85b233f4ec91578956fe21e0236f7ca2c3f90f9d034f94b5b
157- Download Locations:
158 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
159 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
160
161yocto-docs
162
163- Repository Location: :yocto_git:`/yocto-docs`
164- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
165- Tag: :yocto_git:`yocto-4.0.25 </yocto-docs/log/?h=yocto-4.0.25>`
166- Git Revision: :yocto_git:`c6dce0c77481dee7b0a0fcdc803f755ceccef234 </yocto-docs/commit/?id=c6dce0c77481dee7b0a0fcdc803f755ceccef234>`
167
diff --git a/documentation/migration-guides/release-notes-4.0.26.rst b/documentation/migration-guides/release-notes-4.0.26.rst
new file mode 100644
index 0000000000..42ff28c6a2
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.26.rst
@@ -0,0 +1,263 @@
1Release notes for Yocto-4.0.26 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.26
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7
8- bind: Fix :cve_nist:`2024-11187` and :cve_nist:`2024-12705`
9- binutils: Fix :cve_nist:`2025-0840`
10- elfutils: Fix :cve_nist:`2025-1352` and :cve_nist:`2025-1372`
11- ffmpeg: Fix CVE-2024-28661, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`, :cve_nist:`2024-36616`,
12 :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2025-0518` and :cve_nist:`2025-25473`
13- ffmpeg: Ignore :cve_nist:`2023-46407`, :cve_nist:`2023-47470`, :cve_nist:`2024-7272`,
14 :cve_nist:`2024-22860`, :cve_nist:`2024-22861` and :cve_nist:`2024-22862`
15- freetype: Fix :cve_nist:`2025-27363`
16- gnutls: Fix :cve_nist:`2024-12243`
17- grub: Fix :cve_nist:`2024-45774`, :cve_nist:`2024-45775`, :cve_nist:`2024-45776`,
18 :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`, :cve_nist:`2024-45780`,
19 :cve_nist:`2024-45781`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`,
20 :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0684`,
21 :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`, :cve_nist:`2025-0678`,
22 :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125`
23- gstreamer1.0-rtsp-server: fix :cve_nist:`2024-44331`
24- libarchive: Fix :cve_nist:`2025-25724`
25- libarchive: Ignore :cve_nist:`2025-1632`
26- libcap: Fix :cve_nist:`2025-1390`
27- linux-yocto/5.10: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-43098`, :cve_nist:`2024-47143`,
28 :cve_nist:`2024-48881`, :cve_nist:`2024-50051`, :cve_nist:`2024-50074`, :cve_nist:`2024-50082`,
29 :cve_nist:`2024-50083`, :cve_nist:`2024-50099`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`,
30 :cve_nist:`2024-50117`, :cve_nist:`2024-50142`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`,
31 :cve_nist:`2024-50151`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`,
32 :cve_nist:`2024-50185`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
33 :cve_nist:`2024-50195`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`, :cve_nist:`2024-50202`,
34 :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`, :cve_nist:`2024-50229`,
35 :cve_nist:`2024-50230`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`, :cve_nist:`2024-50236`,
36 :cve_nist:`2024-50237`, :cve_nist:`2024-50251`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`,
37 :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`,
38 :cve_nist:`2024-50273`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`,
39 :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`,
40 :cve_nist:`2024-50301`, :cve_nist:`2024-50302`, :cve_nist:`2024-53042`, :cve_nist:`2024-53052`,
41 :cve_nist:`2024-53057`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`,
42 :cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53096`, :cve_nist:`2024-53097`,
43 :cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53104`, :cve_nist:`2024-53145`,
44 :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`,
45 :cve_nist:`2024-53157`, :cve_nist:`2024-53161`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`,
46 :cve_nist:`2024-53173`, :cve_nist:`2024-53174`, :cve_nist:`2024-53194`, :cve_nist:`2024-53197`,
47 :cve_nist:`2024-53217`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`,
48 :cve_nist:`2024-53239`, :cve_nist:`2024-55916`, :cve_nist:`2024-56548`, :cve_nist:`2024-56558`,
49 :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`,
50 :cve_nist:`2024-56574`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`,
51 :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`,
52 :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56605`,
53 :cve_nist:`2024-56606`, :cve_nist:`2024-56615`, :cve_nist:`2024-56619`, :cve_nist:`2024-56623`,
54 :cve_nist:`2024-56629`, :cve_nist:`2024-56634`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`,
55 :cve_nist:`2024-56648`, :cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`,
56 :cve_nist:`2024-56670`, :cve_nist:`2024-56688`, :cve_nist:`2024-56698`, :cve_nist:`2024-56704`,
57 :cve_nist:`2024-56716`, :cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`,
58 :cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`,
59 :cve_nist:`2024-56748`, :cve_nist:`2024-56754`, :cve_nist:`2024-56756`, :cve_nist:`2024-56770`,
60 :cve_nist:`2024-56779`, :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56785`,
61 :cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57850`, :cve_nist:`2024-57874`,
62 :cve_nist:`2024-57890`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`,
63 :cve_nist:`2024-57902`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57913`,
64 :cve_nist:`2024-57922`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57946`,
65 :cve_nist:`2024-57951`, :cve_nist:`2025-21638`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`,
66 :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
67- linux-yocto/5.15: Fix :cve_nist:`2024-57979`, :cve_nist:`2024-58034`, :cve_nist:`2024-58052`,
68 :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`, :cve_nist:`2024-58069`,
69 :cve_nist:`2024-58071`, :cve_nist:`2024-58076`, :cve_nist:`2024-58083`, :cve_nist:`2025-21700`,
70 :cve_nist:`2025-21703`, :cve_nist:`2025-21715`, :cve_nist:`2025-21722`, :cve_nist:`2025-21727`,
71 :cve_nist:`2025-21731`, :cve_nist:`2025-21753`, :cve_nist:`2025-21756`, :cve_nist:`2025-21760`,
72 :cve_nist:`2025-21761`, :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`,
73 :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21887`, :cve_nist:`2025-21898`,
74 :cve_nist:`2025-21904`, :cve_nist:`2025-21905`, :cve_nist:`2025-21912`, :cve_nist:`2025-21917`,
75 :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`, :cve_nist:`2025-21934`,
76 :cve_nist:`2025-21943`, :cve_nist:`2025-21948` and :cve_nist:`2025-21951`
77- libpcre2: Ignore :cve_nist:`2022-1586`
78- libtasn1: Fix :cve_nist:`2024-12133`
79- libxml2: Fix :cve_nist:`2022-49043`, :cve_nist:`2024-56171`, :cve_nist:`2025-24928` and
80 :cve_nist:`2025-27113`
81- libxslt: Fix :cve_nist:`2024-55549` and :cve_nist:`2025-24855`
82- llvm: Fix :cve_nist:`2024-0151`
83- mpg123: Fix :cve_nist:`2024-10573`
84- openssh: Fix :cve_nist:`2025-26465`
85- ovmf: Revert Fix for CVE-2023-45236 :cve_nist:`2023-45237`
86- perl: Ignore :cve_nist:`2023-47038`
87- puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837`
88- python3: Fix :cve_nist:`2025-0938`
89- ruby: Fix :cve_nist:`2024-41946`, :cve_nist:`2025-27219` and :cve_nist:`2025-27220`
90- subversion: Ignore :cve_nist:`2024-45720`
91- systemd: Fix :cve_nist:`2022-3821`, :cve_nist:`2022-4415`, :cve_nist:`2022-45873` and
92 :cve_nist:`2023-7008`
93- tiff: mark :cve_nist:`2023-30774` as patched with existing patch
94- u-boot: Fix :cve_nist:`2022-2347`, :cve_nist:`2022-30767`, :cve_nist:`2022-30790`,
95 :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`, :cve_nist:`2024-57257`,
96 :cve_nist:`2024-57258` and :cve_nist:`2024-57259`
97- vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-22134`, :cve_nist:`2025-24014`,
98 :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and :cve_nist:`2025-29768`
99- xserver-xorg: Fix :cve_nist:`2022-49737`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`,
100 :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`,
101 :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
102- xwayland: Fix :cve_nist:`2022-49737`, :cve_nist:`2024-9632`, :cve_nist:`2024-21885`,
103 :cve_nist:`2024-21886`, :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31083`,
104 :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`, :cve_nist:`2025-26597`,
105 :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
106- zlib: Fix :cve_nist:`2014-9485`
107
108
109
110Fixes in Yocto-4.0.26
111~~~~~~~~~~~~~~~~~~~~~
112
113- bind: Upgrade to 9.18.33
114- bitbake: cache: bump cache version
115- bitbake: siggen.py: Improve taskhash reproducibility
116- boost: fix do_fetch error
117- build-appliance-image: Update to kirkstone head revision
118- contributor-guide/submit-changes: add policy on AI generated code
119- cve-update-nvd2-native: handle missing vulnStatus
120- docs: Add favicon for the documentation html
121- docs: Remove all mention of core-image-lsb
122- libtasn1: upgrade to 4.20.0
123- libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt
124- libxml2: fix compilation of explicit child axis in pattern
125- linux-yocto/5.10: update to v5.10.234
126- linux-yocto/5.15: update to v5.15.179
127- mesa: Fix missing GLES3 headers in SDK sysroot
128- mesa: Update :term:`SRC_URI`
129- meta: Enable '-o pipefail' for the SDK installer
130- migration-guides: add release notes for 4.0.25
131- poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS`
132- poky.conf: bump version for 4.0.26
133- procps: replaced one use of fputs(3) with a write(2) call
134- ref-manual: don't refer to poky-lsb
135- scripts/install-buildtools: Update to 4.0.24
136- scritps/runqemu: Ensure we only have two serial ports
137- systemd: upgrade to 250.14
138- tzcode-native: Fix compiler setting from 2023d version
139- tzcode: Update :term:`SRC_URI`
140- tzdata/tzcode-native: upgrade 2025a
141- vim: Upgrade to 9.1.1198
142- virglrenderer: fix do_fetch error
143- vulnerabilities/classes: remove references to cve-check text format
144- xz: Update :term:`SRC_URI`
145- yocto-uninative: Update to 4.7 for glibc 2.41
146
147
148Known Issues in Yocto-4.0.26
149~~~~~~~~~~~~~~~~~~~~~~~~~~~~
150
151- N/A
152
153
154Contributors to Yocto-4.0.26
155~~~~~~~~~~~~~~~~~~~~~~~~~~~~
156
157Thanks to the following people who contributed to this release:
158
159- Aleksandar Nikolic
160- Alessio Cascone
161- Antonin Godard
162- Archana Polampalli
163- Ashish Sharma
164- Bruce Ashfield
165- Carlos Dominguez
166- Deepesh Varatharajan
167- Divya Chellam
168- Guocai He
169- Hitendra Prajapati
170- Hongxu Jia
171- Jiaying Song
172- Johannes Kauffmann
173- Kai Kang
174- Lee Chee Yang
175- Libo Chen
176- Marta Rybczynska
177- Michael Halstead
178- Mingli Yu
179- Moritz Haase
180- Narpat Mali
181- Paulo Neves
182- Peter Marko
183- Priyal Doshi
184- Richard Purdie
185- Robert Yang
186- Ross Burton
187- Sakib Sajal
188- Steve Sakoman
189- Vijay Anusuri
190- Yogita Urade
191- Zhang Peng
192
193
194Repositories / Downloads for Yocto-4.0.26
195~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
196
197poky
198
199- Repository Location: :yocto_git:`/poky`
200- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
201- Tag: :yocto_git:`yocto-4.0.26 </poky/log/?h=yocto-4.0.26>`
202- Git Revision: :yocto_git:`d70d287a77d5026b698ac237ab865b2dafd36bb8 </poky/commit/?id=d70d287a77d5026b698ac237ab865b2dafd36bb8>`
203- Release Artefact: poky-d70d287a77d5026b698ac237ab865b2dafd36bb8
204- sha: 3ebfadb8bff4c1ca12b3cf3e4ef6e3ac2ce52b73570266daa98436c9959249f2
205- Download Locations:
206 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2
207 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/poky-d70d287a77d5026b698ac237ab865b2dafd36bb8.tar.bz2
208
209openembedded-core
210
211- Repository Location: :oe_git:`/openembedded-core`
212- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
213- Tag: :oe_git:`yocto-4.0.26 </openembedded-core/log/?h=yocto-4.0.26>`
214- Git Revision: :oe_git:`1efbe1004bc82e7c14c1e8bd4ce644f5015c3346 </openembedded-core/commit/?id=1efbe1004bc82e7c14c1e8bd4ce644f5015c3346>`
215- Release Artefact: oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346
216- sha: d3805e034dabd0865dbf55488b2c16d4ea0351d37aa826f0054a6bfdde5a8be9
217- Download Locations:
218 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2
219 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/oecore-1efbe1004bc82e7c14c1e8bd4ce644f5015c3346.tar.bz2
220
221meta-mingw
222
223- Repository Location: :yocto_git:`/meta-mingw`
224- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
225- Tag: :yocto_git:`yocto-4.0.26 </meta-mingw/log/?h=yocto-4.0.26>`
226- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
227- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
228- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
229- Download Locations:
230 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
231 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
232
233meta-gplv2
234
235- Repository Location: :yocto_git:`/meta-gplv2`
236- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
237- Tag: :yocto_git:`yocto-4.0.26 </meta-gplv2/log/?h=yocto-4.0.26>`
238- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
239- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
240- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
241- Download Locations:
242 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
243 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
244
245bitbake
246
247- Repository Location: :oe_git:`/bitbake`
248- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
249- Tag: :oe_git:`yocto-4.0.26 </bitbake/log/?h=yocto-4.0.26>`
250- Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>`
251- Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e
252- sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a
253- Download Locations:
254 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
255 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.26/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
256
257yocto-docs
258
259- Repository Location: :yocto_git:`/yocto-docs`
260- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
261- Tag: :yocto_git:`yocto-4.0.26 </yocto-docs/log/?h=yocto-4.0.26>`
262- Git Revision: :yocto_git:`9b4c36f7b02dd4bedfec90206744a1e90e37733c </yocto-docs/commit/?id=9b4c36f7b02dd4bedfec90206744a1e90e37733c>`
263
diff --git a/documentation/migration-guides/release-notes-4.0.27.rst b/documentation/migration-guides/release-notes-4.0.27.rst
new file mode 100644
index 0000000000..e37e2f78b6
--- /dev/null
+++ b/documentation/migration-guides/release-notes-4.0.27.rst
@@ -0,0 +1,153 @@
1Release notes for Yocto-4.0.27 (Kirkstone)
2------------------------------------------
3
4Security Fixes in Yocto-4.0.27
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- binutils: Fix :cve_nist:`2025-1178`
8- busybox: fix :cve_nist:`2023-39810`
9- connman :fix :cve_nist:`2025-32743`
10- curl: Ignore :cve_nist:`2025-0725`
11- ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`,
12 :cve_nist:`2025-27834`, :cve_nist:`2025-27835` and :cve_nist:`2025-27836`
13- ghostscript: Ignore :cve_nist:`2024-29507`, :cve_nist:`2025-27833` and :cve_nist:`2025-27837`
14- glib-2.0: Fix :cve_nist:`2025-3360`
15- go: Fix :cve_nist:`2025-22871`
16- libarchive: Ignore :cve_nist:`2024-48615`
17- libpam: Fix :cve_nist:`2024-10041`
18- libsoup-2.4: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906` and :cve_nist:`2025-32909`
19- libsoup: Fix :cve_nist:`2024-52532`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`,
20 :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913`
21 and :cve_nist:`2025-32914`
22- libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415`
23- ofono: Fix :cve_nist:`2024-7537`
24- perl: Fix :cve_nist:`2024-56406`
25- ppp: Fix :cve_nist:`2024-58250`
26- python3-setuptools: Fix :cve_nist:`2024-6345`
27- qemu: Ignore :cve_nist:`2023-1386`
28- ruby: Fix :cve_nist:`2024-43398`
29- sqlite3: Fix :cve_nist:`2025-29088`
30- systemd: Ignore :cve_nist:`2022-3821`, :cve_nist:`2022-4415` and :cve_nist:`2022-45873`
31
32
33Fixes in Yocto-4.0.27
34~~~~~~~~~~~~~~~~~~~~~
35
36- Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR"
37- build-appliance-image: Update to kirkstone head revision
38- cve-update-nvd2-native: add workaround for json5 style list
39- docs: Fix dead links that use the :term:`DISTRO` macro
40- docs: manuals: remove repeated word
41- docs: poky.yaml: introduce DISTRO_LATEST_TAG
42- glibc: Add single-threaded fast path to rand()
43- glibc: stable 2.35 branch updates
44- module.bbclass: add KBUILD_EXTRA_SYMBOLS to install
45- perl: enable _GNU_SOURCE define via d_gnulibc
46- poky.conf: bump version for 4.0.27
47- ref-manual/variables.rst: document autotools class related variables
48- scripts/install-buildtools: Update to 4.0.26
49- systemd: backport patch to fix journal issue
50- systemd: systemd-journald fails to setup LogNamespace
51- tzdata/tzcode-native: upgrade to 2025b
52
53
54Known Issues in Yocto-4.0.27
55~~~~~~~~~~~~~~~~~~~~~~~~~~~~
56
57- N/A
58
59
60Contributors to Yocto-4.0.27
61~~~~~~~~~~~~~~~~~~~~~~~~~~~~
62
63- Aleksandar Nikolic
64- Alexander Kanavin
65- Alon Bar-Lev
66- Andrew Kreimer
67- Antonin Godard
68- Chen Qi
69- Deepesh Varatharajan
70- Divya Chellam
71- Haitao Liu
72- Haixiao Yan
73- Hitendra Prajapati
74- Peter Marko
75- Praveen Kumar
76- Priyal Doshi
77- Shubham Kulkarni
78- Soumya Sambu
79- Steve Sakoman
80- Vijay Anusuri
81- Yogita Urade
82
83
84Repositories / Downloads for Yocto-4.0.27
85~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
86
87poky
88
89- Repository Location: :yocto_git:`/poky`
90- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
91- Tag: :yocto_git:`yocto-4.0.27 </poky/log/?h=yocto-4.0.27>`
92- Git Revision: :yocto_git:`ab9a994a8cd8e06b519a693db444030999d273b7 </poky/commit/?id=ab9a994a8cd8e06b519a693db444030999d273b7>`
93- Release Artefact: poky-ab9a994a8cd8e06b519a693db444030999d273b7
94- sha: 77a366c17cf29eef15c6ff3f44e73f81c07288c723fd4a6dbd8c7ee9b79933f3
95- Download Locations:
96 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2
97 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/poky-ab9a994a8cd8e06b519a693db444030999d273b7.tar.bz2
98
99openembedded-core
100
101- Repository Location: :oe_git:`/openembedded-core`
102- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
103- Tag: :oe_git:`yocto-4.0.27 </openembedded-core/log/?h=yocto-4.0.27>`
104- Git Revision: :oe_git:`e8be08a624b2d024715a5c8b0c37f2345a02336b </openembedded-core/commit/?id=e8be08a624b2d024715a5c8b0c37f2345a02336b>`
105- Release Artefact: oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b
106- sha: cc5b0fadab021c6dc61f37fc4ff01a1cf657e7c219488ce264bede42f7f6212f
107- Download Locations:
108 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2
109 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/oecore-e8be08a624b2d024715a5c8b0c37f2345a02336b.tar.bz2
110
111meta-mingw
112
113- Repository Location: :yocto_git:`/meta-mingw`
114- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
115- Tag: :yocto_git:`yocto-4.0.27 </meta-mingw/log/?h=yocto-4.0.27>`
116- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
117- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
118- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
119- Download Locations:
120 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
121 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
122
123meta-gplv2
124
125- Repository Location: :yocto_git:`/meta-gplv2`
126- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
127- Tag: :yocto_git:`yocto-4.0.27 </meta-gplv2/log/?h=yocto-4.0.27>`
128- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
129- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
130- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
131- Download Locations:
132 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
133 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
134
135bitbake
136
137- Repository Location: :oe_git:`/bitbake`
138- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
139- Tag: :oe_git:`yocto-4.0.27 </bitbake/log/?h=yocto-4.0.27>`
140- Git Revision: :oe_git:`046871d9fd76efdca7b72718b328d8f545523f7e </bitbake/commit/?id=046871d9fd76efdca7b72718b328d8f545523f7e>`
141- Release Artefact: bitbake-046871d9fd76efdca7b72718b328d8f545523f7e
142- sha: e9df0a9f5921b583b539188d66b23f120e1751000e7822e76c3391d5c76ee21a
143- Download Locations:
144 https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
145 https://mirrors.kernel.org/yocto/yocto/yocto-4.0.27/bitbake-046871d9fd76efdca7b72718b328d8f545523f7e.tar.bz2
146
147yocto-docs
148
149- Repository Location: :yocto_git:`/yocto-docs`
150- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
151- Tag: :yocto_git:`yocto-4.0.27 </yocto-docs/log/?h=yocto-4.0.27>`
152- Git Revision: :yocto_git:`0d51e553d5f83eea6634e03ddc9c7740bf72fcea </yocto-docs/commit/?id=0d51e553d5f83eea6634e03ddc9c7740bf72fcea>`
153
diff --git a/documentation/migration-guides/release-notes-4.0.3.rst b/documentation/migration-guides/release-notes-4.0.3.rst
index 46fe858cb7..1b9559a962 100644
--- a/documentation/migration-guides/release-notes-4.0.3.rst
+++ b/documentation/migration-guides/release-notes-4.0.3.rst
@@ -6,21 +6,21 @@ Release notes for Yocto-4.0.3 (Kirkstone)
6Security Fixes in Yocto-4.0.3 6Security Fixes in Yocto-4.0.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: fix :cve:`2019-1010204` 9- binutils: fix :cve_nist:`2019-1010204`
10- busybox: fix :cve:`2022-30065` 10- busybox: fix :cve_nist:`2022-30065`
11- cups: ignore :cve:`2022-26691` 11- cups: ignore :cve_nist:`2022-26691`
12- curl: Fix :cve:`2022-32205`, :cve:`2022-32206`, :cve:`2022-32207` and :cve:`2022-32208` 12- curl: Fix :cve_nist:`2022-32205`, :cve_nist:`2022-32206`, :cve_nist:`2022-32207` and :cve_nist:`2022-32208`
13- dpkg: fix :cve:`2022-1664` 13- dpkg: fix :cve_nist:`2022-1664`
14- ghostscript: fix :cve:`2022-2085` 14- ghostscript: fix :cve_nist:`2022-2085`
15- harfbuzz: fix :cve:`2022-33068` 15- harfbuzz: fix :cve_nist:`2022-33068`
16- libtirpc: fix :cve:`2021-46828` 16- libtirpc: fix :cve_nist:`2021-46828`
17- lua: fix :cve:`2022-33099` 17- lua: fix :cve_nist:`2022-33099`
18- nasm: ignore :cve:`2020-18974` 18- nasm: ignore :cve_nist:`2020-18974`
19- qemu: fix :cve:`2022-35414` 19- qemu: fix :cve_nist:`2022-35414`
20- qemu: ignore :cve:`2021-20255` and :cve:`2019-12067` 20- qemu: ignore :cve_nist:`2021-20255` and :cve_nist:`2019-12067`
21- tiff: fix :cve:`2022-1354`, :cve:`2022-1355`, :cve:`2022-2056`, :cve:`2022-2057` and :cve:`2022-2058` 21- tiff: fix :cve_nist:`2022-1354`, :cve_nist:`2022-1355`, :cve_nist:`2022-2056`, :cve_nist:`2022-2057` and :cve_nist:`2022-2058`
22- u-boot: fix :cve:`2022-34835` 22- u-boot: fix :cve_nist:`2022-34835`
23- unzip: fix :cve:`2022-0529` and :cve:`2022-0530` 23- unzip: fix :cve_nist:`2022-0529` and :cve_nist:`2022-0530`
24 24
25 25
26Fixes in Yocto-4.0.3 26Fixes in Yocto-4.0.3
diff --git a/documentation/migration-guides/release-notes-4.0.4.rst b/documentation/migration-guides/release-notes-4.0.4.rst
index 1d6e525bbc..41ef095c45 100644
--- a/documentation/migration-guides/release-notes-4.0.4.rst
+++ b/documentation/migration-guides/release-notes-4.0.4.rst
@@ -6,17 +6,17 @@ Release notes for Yocto-4.0.4 (Kirkstone)
6Security Fixes in Yocto-4.0.4 6Security Fixes in Yocto-4.0.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils : fix :cve:`2022-38533` 9- binutils : fix :cve_nist:`2022-38533`
10- curl: fix :cve:`2022-35252` 10- curl: fix :cve_nist:`2022-35252`
11- sqlite: fix :cve:`2022-35737` 11- sqlite: fix :cve_nist:`2022-35737`
12- grub2: fix :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734` and :cve:`2022-28735` 12- grub2: fix :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734` and :cve_nist:`2022-28735`
13- u-boot: fix :cve:`2022-30552` and :cve:`2022-33967` 13- u-boot: fix :cve_nist:`2022-30552` and :cve_nist:`2022-33967`
14- libxml2: Ignore :cve:`2016-3709` 14- libxml2: Ignore :cve_nist:`2016-3709`
15- libtiff: fix :cve:`2022-34526` 15- libtiff: fix :cve_nist:`2022-34526`
16- zlib: fix :cve:`2022-37434` 16- zlib: fix :cve_nist:`2022-37434`
17- gnutls: fix :cve:`2022-2509` 17- gnutls: fix :cve_nist:`2022-2509`
18- u-boot: fix :cve:`2022-33103` 18- u-boot: fix :cve_nist:`2022-33103`
19- qemu: fix :cve:`2021-3507`, :cve:`2021-3929`, :cve:`2021-4158`, :cve:`2022-0216` and :cve:`2022-0358` 19- qemu: fix :cve_nist:`2021-3507`, :cve_nist:`2021-3929`, :cve_nist:`2021-4158`, :cve_nist:`2022-0216` and :cve_nist:`2022-0358`
20 20
21 21
22Fixes in Yocto-4.0.4 22Fixes in Yocto-4.0.4
diff --git a/documentation/migration-guides/release-notes-4.0.5.rst b/documentation/migration-guides/release-notes-4.0.5.rst
index cdfe85b750..ae061ed633 100644
--- a/documentation/migration-guides/release-notes-4.0.5.rst
+++ b/documentation/migration-guides/release-notes-4.0.5.rst
@@ -6,11 +6,11 @@ Release notes for Yocto-4.0.5 (Kirkstone)
6Security Fixes in Yocto-4.0.5 6Security Fixes in Yocto-4.0.5
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- qemu: fix :cve:`2021-3750`, :cve:`2021-3611` and :cve:`2022-2962` 9- qemu: fix :cve_nist:`2021-3750`, :cve_nist:`2021-3611` and :cve_nist:`2022-2962`
10- binutils : fix :cve:`2022-38126`, :cve:`2022-38127` and :cve:`2022-38128` 10- binutils : fix :cve_nist:`2022-38126`, :cve_nist:`2022-38127` and :cve_nist:`2022-38128`
11- tff: fix :cve:`2022-2867`, :cve:`2022-2868` and :cve:`2022-2869` 11- tff: fix :cve_nist:`2022-2867`, :cve_nist:`2022-2868` and :cve_nist:`2022-2869`
12- inetutils: fix :cve:`2022-39028` 12- inetutils: fix :cve_nist:`2022-39028`
13- go: fix :cve:`2022-27664` 13- go: fix :cve_nist:`2022-27664`
14 14
15Fixes in Yocto-4.0.5 15Fixes in Yocto-4.0.5
16~~~~~~~~~~~~~~~~~~~~ 16~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.0.6.rst b/documentation/migration-guides/release-notes-4.0.6.rst
index 76d23fcf0c..e0c0cc09b9 100644
--- a/documentation/migration-guides/release-notes-4.0.6.rst
+++ b/documentation/migration-guides/release-notes-4.0.6.rst
@@ -6,28 +6,28 @@ Release notes for Yocto-4.0.6 (Kirkstone)
6Security Fixes in Yocto-4.0.6 6Security Fixes in Yocto-4.0.6
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bash: Fix :cve:`2022-3715` 9- bash: Fix :cve_nist:`2022-3715`
10- curl: Fix :cve:`2022-32221`, :cve:`2022-42915` and :cve:`2022-42916` 10- curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916`
11- dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` 11- dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012`
12- dropbear: Fix :cve:`2021-36369` 12- dropbear: Fix :cve_nist:`2021-36369`
13- ffmpeg: Fix :cve:`2022-3964`, :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964`, :cve_nist:`2022-3965`
14- go: Fix :cve:`2022-2880` 14- go: Fix :cve_nist:`2022-2880`
15- grub2: Fix :cve:`2022-2601`, :cve:`2022-3775` and :cve:`2022-28736` 15- grub2: Fix :cve_nist:`2022-2601`, :cve_nist:`2022-3775` and :cve_nist:`2022-28736`
16- libarchive: Fix :cve:`2022-36227` 16- libarchive: Fix :cve_nist:`2022-36227`
17- libpam: Fix :cve:`2022-28321` 17- libpam: Fix :cve_nist:`2022-28321`
18- libsndfile1: Fix :cve:`2021-4156` 18- libsndfile1: Fix :cve_nist:`2021-4156`
19- lighttpd: Fix :cve:`2022-41556` 19- lighttpd: Fix :cve_nist:`2022-41556`
20- openssl: Fix :cve:`2022-3358` 20- openssl: Fix :cve_nist:`2022-3358`
21- pixman: Fix :cve:`2022-44638` 21- pixman: Fix :cve_nist:`2022-44638`
22- python3-mako: Fix :cve:`2022-40023` 22- python3-mako: Fix :cve_nist:`2022-40023`
23- python3: Fix :cve:`2022-42919` 23- python3: Fix :cve_nist:`2022-42919`
24- qemu: Fix :cve:`2022-3165` 24- qemu: Fix :cve_nist:`2022-3165`
25- sysstat: Fix :cve:`2022-39377` 25- sysstat: Fix :cve_nist:`2022-39377`
26- systemd: Fix :cve:`2022-3821` 26- systemd: Fix :cve_nist:`2022-3821`
27- tiff: Fix :cve:`2022-2953`, :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598` and :cve:`2022-3970` 27- tiff: Fix :cve_nist:`2022-2953`, :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598` and :cve_nist:`2022-3970`
28- vim: Fix :cve:`2022-3352`, :cve:`2022-3705` and :cve:`2022-4141` 28- vim: Fix :cve_nist:`2022-3352`, :cve_nist:`2022-3705` and :cve_nist:`2022-4141`
29- wayland: Fix :cve:`2021-3782` 29- wayland: Fix :cve_nist:`2021-3782`
30- xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` 30- xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551`
31 31
32 32
33Fixes in Yocto-4.0.6 33Fixes in Yocto-4.0.6
diff --git a/documentation/migration-guides/release-notes-4.0.7.rst b/documentation/migration-guides/release-notes-4.0.7.rst
index c3885d9e0e..a11a29889d 100644
--- a/documentation/migration-guides/release-notes-4.0.7.rst
+++ b/documentation/migration-guides/release-notes-4.0.7.rst
@@ -6,25 +6,25 @@ Release notes for Yocto-4.0.7 (Kirkstone)
6Security Fixes in Yocto-4.0.7 6Security Fixes in Yocto-4.0.7
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2022-4285` 9- binutils: Fix :cve_nist:`2022-4285`
10- curl: Fix :cve:`2022-43551` and :cve_mitre:`2022-43552` 10- curl: Fix :cve_nist:`2022-43551` and :cve_mitre:`2022-43552`
11- ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341` 11- ffmpeg: Fix :cve_nist:`2022-3109` and :cve_nist:`2022-3341`
12- go: Fix :cve:`2022-41715` and :cve:`2022-41717` 12- go: Fix :cve_nist:`2022-41715` and :cve_nist:`2022-41717`
13- libX11: Fix :cve:`2022-3554` and :cve:`2022-3555` 13- libX11: Fix :cve_nist:`2022-3554` and :cve_nist:`2022-3555`
14- libarchive: Fix :cve:`2022-36227` 14- libarchive: Fix :cve_nist:`2022-36227`
15- libksba: Fix :cve:`2022-47629` 15- libksba: Fix :cve_nist:`2022-47629`
16- libpng: Fix :cve:`2019-6129` 16- libpng: Fix :cve_nist:`2019-6129`
17- libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` 17- libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304`
18- openssl: Fix :cve:`2022-3996` 18- openssl: Fix :cve_nist:`2022-3996`
19- python3: Fix :cve:`2022-45061` 19- python3: Fix :cve_nist:`2022-45061`
20- python3-git: Fix :cve:`2022-24439` 20- python3-git: Fix :cve_nist:`2022-24439`
21- python3-setuptools: Fix :cve:`2022-40897` 21- python3-setuptools: Fix :cve_nist:`2022-40897`
22- python3-wheel: Fix :cve:`2022-40898` 22- python3-wheel: Fix :cve_nist:`2022-40898`
23- qemu: Fix :cve:`2022-4144` 23- qemu: Fix :cve_nist:`2022-4144`
24- sqlite: Fix :cve:`2022-46908` 24- sqlite: Fix :cve_nist:`2022-46908`
25- systemd: Fix :cve:`2022-45873` 25- systemd: Fix :cve_nist:`2022-45873`
26- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054` and :cve:`2023-0088` 26- vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054` and :cve_nist:`2023-0088`
27- webkitgtk: Fix :cve:`2022-32886`, :cve_mitre:`2022-32891` and :cve:`2022-32912` 27- webkitgtk: Fix :cve_nist:`2022-32886`, :cve_mitre:`2022-32891` and :cve_nist:`2022-32912`
28 28
29 29
30Fixes in Yocto-4.0.7 30Fixes in Yocto-4.0.7
@@ -39,7 +39,7 @@ Fixes in Yocto-4.0.7
39- busybox: always start do_compile with orig config files 39- busybox: always start do_compile with orig config files
40- busybox: rm temporary files if do_compile was interrupted 40- busybox: rm temporary files if do_compile was interrupted
41- cairo: fix CVE patches assigned wrong CVE number 41- cairo: fix CVE patches assigned wrong CVE number
42- cairo: update patch for :cve:`2019-6461` with upstream solution 42- cairo: update patch for :cve_nist:`2019-6461` with upstream solution
43- classes/create-spdx: Add SPDX_PRETTY option 43- classes/create-spdx: Add SPDX_PRETTY option
44- classes: image: Set empty weak default IMAGE_LINGUAS 44- classes: image: Set empty weak default IMAGE_LINGUAS
45- combo-layer: add sync-revs command 45- combo-layer: add sync-revs command
diff --git a/documentation/migration-guides/release-notes-4.0.8.rst b/documentation/migration-guides/release-notes-4.0.8.rst
index 223b74fbaf..af58d0462c 100644
--- a/documentation/migration-guides/release-notes-4.0.8.rst
+++ b/documentation/migration-guides/release-notes-4.0.8.rst
@@ -6,16 +6,16 @@ Release notes for Yocto-4.0.8 (Kirkstone)
6Security Fixes in Yocto-4.0.8 6Security Fixes in Yocto-4.0.8
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- apr-util: Fix :cve:`2022-25147` 9- apr-util: Fix :cve_nist:`2022-25147`
10- apr: Fix :cve:`2022-24963`, :cve:`2022-28331` and :cve:`2021-35940` 10- apr: Fix :cve_nist:`2022-24963`, :cve_nist:`2022-28331` and :cve_nist:`2021-35940`
11- bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` 11- bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924`
12- git: Ignore :cve:`2022-41953` 12- git: Ignore :cve_nist:`2022-41953`
13- git: Fix :cve:`2022-23521` and :cve:`2022-41903` 13- git: Fix :cve_nist:`2022-23521` and :cve_nist:`2022-41903`
14- libgit2: Fix :cve:`2023-22742` 14- libgit2: Fix :cve_nist:`2023-22742`
15- ppp: Fix :cve:`2022-4603` 15- ppp: Fix :cve_nist:`2022-4603`
16- python3-certifi: Fix :cve:`2022-23491` 16- python3-certifi: Fix :cve_nist:`2022-23491`
17- sudo: Fix :cve:`2023-22809` 17- sudo: Fix :cve_nist:`2023-22809`
18- tar: Fix :cve:`2022-48303` 18- tar: Fix :cve_nist:`2022-48303`
19 19
20 20
21Fixes in Yocto-4.0.8 21Fixes in Yocto-4.0.8
diff --git a/documentation/migration-guides/release-notes-4.0.9.rst b/documentation/migration-guides/release-notes-4.0.9.rst
index 236477443a..a571e95724 100644
--- a/documentation/migration-guides/release-notes-4.0.9.rst
+++ b/documentation/migration-guides/release-notes-4.0.9.rst
@@ -6,26 +6,26 @@ Release notes for Yocto-4.0.9 (Kirkstone)
6Security Fixes in Yocto-4.0.9 6Security Fixes in Yocto-4.0.9
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-22608` 9- binutils: Fix :cve_nist:`2023-22608`
10- curl: Fix :cve:`2023-23914`, :cve:`2023-23915` and :cve:`2023-23916` 10- curl: Fix :cve_nist:`2023-23914`, :cve_nist:`2023-23915` and :cve_nist:`2023-23916`
11- epiphany: Fix :cve:`2023-26081` 11- epiphany: Fix :cve_nist:`2023-26081`
12- git: Ignore :cve:`2023-22743` 12- git: Ignore :cve_nist:`2023-22743`
13- glibc: Fix :cve:`2023-0687` 13- glibc: Fix :cve_nist:`2023-0687`
14- gnutls: Fix :cve:`2023-0361` 14- gnutls: Fix :cve_nist:`2023-0361`
15- go: Fix :cve:`2022-2879`, :cve:`2022-41720` and :cve:`2022-41723` 15- go: Fix :cve_nist:`2022-2879`, :cve_nist:`2022-41720` and :cve_nist:`2022-41723`
16- harfbuzz: Fix :cve:`2023-25193` 16- harfbuzz: Fix :cve_nist:`2023-25193`
17- less: Fix :cve:`2022-46663` 17- less: Fix :cve_nist:`2022-46663`
18- libmicrohttpd: Fix :cve:`2023-27371` 18- libmicrohttpd: Fix :cve_nist:`2023-27371`
19- libsdl2: Fix :cve:`2022-4743` 19- libsdl2: Fix :cve_nist:`2022-4743`
20- openssl: Fix :cve:`2022-3996`, :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` 20- openssl: Fix :cve_nist:`2022-3996`, :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466`
21- pkgconf: Fix :cve:`2023-24056` 21- pkgconf: Fix :cve_nist:`2023-24056`
22- python3: Fix :cve:`2023-24329` 22- python3: Fix :cve_nist:`2023-24329`
23- shadow: Ignore :cve:`2016-15024` 23- shadow: Ignore :cve_nist:`2016-15024`
24- systemd: Fix :cve:`2022-4415` 24- systemd: Fix :cve_nist:`2022-4415`
25- tiff: Fix :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` 25- tiff: Fix :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804`
26- vim: Fix :cve:`2023-0433`, :cve:`2023-0512`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` 26- vim: Fix :cve_nist:`2023-0433`, :cve_nist:`2023-0512`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355`
27- xserver-xorg: Fix :cve:`2023-0494` 27- xserver-xorg: Fix :cve_nist:`2023-0494`
28- xwayland: Fix :cve:`2023-0494` 28- xwayland: Fix :cve_nist:`2023-0494`
29 29
30 30
31Fixes in Yocto-4.0.9 31Fixes in Yocto-4.0.9
@@ -90,7 +90,7 @@ Fixes in Yocto-4.0.9
90- pybootchartui: Fix python syntax issue 90- pybootchartui: Fix python syntax issue
91- python3-git: fix indent error 91- python3-git: fix indent error
92- python3-setuptools-rust-native: Add direct dependency of native python3 modules 92- python3-setuptools-rust-native: Add direct dependency of native python3 modules
93- qemu: Revert "fix :cve:`2021-3507`" as not applicable for qemu 6.2 93- qemu: Revert "fix :cve_nist:`2021-3507`" as not applicable for qemu 6.2
94- rsync: Add missing prototypes to function declarations 94- rsync: Add missing prototypes to function declarations
95- rsync: Turn on -pedantic-errors at the end of 'configure' 95- rsync: Turn on -pedantic-errors at the end of 'configure'
96- runqemu: kill qemu if it hangs 96- runqemu: kill qemu if it hangs
diff --git a/documentation/migration-guides/release-notes-4.0.rst b/documentation/migration-guides/release-notes-4.0.rst
index a5d66c0410..e9e6949527 100644
--- a/documentation/migration-guides/release-notes-4.0.rst
+++ b/documentation/migration-guides/release-notes-4.0.rst
@@ -25,7 +25,7 @@ New Features / Enhancements in 4.0
25 25
26 BB_SIGNATURE_HANDLER = "OEEquivHash" 26 BB_SIGNATURE_HANDLER = "OEEquivHash"
27 BB_HASHSERVE = "auto" 27 BB_HASHSERVE = "auto"
28 BB_HASHSERVE_UPSTREAM = "hashserv.yocto.io:8687" 28 BB_HASHSERVE_UPSTREAM = "hashserv.yoctoproject.org:8686"
29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH" 29 SSTATE_MIRRORS ?= "file://.* https://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH"
30 30
31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__ 31- The Python package build process is now based on `wheels <https://pythonwheels.com/>`__
@@ -337,37 +337,37 @@ Other license-related notes:
337Security Fixes in 4.0 337Security Fixes in 4.0
338~~~~~~~~~~~~~~~~~~~~~ 338~~~~~~~~~~~~~~~~~~~~~
339 339
340- binutils: :cve:`2021-42574`, :cve:`2021-45078` 340- binutils: :cve_nist:`2021-42574`, :cve_nist:`2021-45078`
341- curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947` 341- curl: :cve_nist:`2021-22945`, :cve_nist:`2021-22946`, :cve_nist:`2021-22947`
342- epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088` 342- epiphany: :cve_nist:`2021-45085`, :cve_nist:`2021-45086`, :cve_nist:`2021-45087`, :cve_nist:`2021-45088`
343- expat: :cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve:`2022-22825`, :cve:`2022-22826`, :cve:`2022-22827`, :cve:`2022-23852`, :cve:`2022-23990`, :cve:`2022-25235`, :cve:`2022-25236`, :cve:`2022-25313`, :cve:`2022-25314`, :cve:`2022-25315` 343- expat: :cve_nist:`2021-45960`, :cve_nist:`2021-46143`, :cve_nist:`2022-22822`, :cve_nist:`2022-22823`, :cve_nist:`2022-22824`, :cve_nist:`2022-22825`, :cve_nist:`2022-22826`, :cve_nist:`2022-22827`, :cve_nist:`2022-23852`, :cve_nist:`2022-23990`, :cve_nist:`2022-25235`, :cve_nist:`2022-25236`, :cve_nist:`2022-25313`, :cve_nist:`2022-25314`, :cve_nist:`2022-25315`
344- ffmpeg: :cve:`2021-38114` 344- ffmpeg: :cve_nist:`2021-38114`
345- gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765` 345- gcc: :cve_nist:`2021-35465`, :cve_nist:`2021-42574`, :cve_nist:`2021-46195`, :cve_nist:`2022-24765`
346- glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219` 346- glibc: :cve_nist:`2021-3998`, :cve_nist:`2021-3999`, :cve_nist:`2021-43396`, :cve_nist:`2022-23218`, :cve_nist:`2022-23219`
347- gmp: :cve:`2021-43618` 347- gmp: :cve_nist:`2021-43618`
348- go: :cve:`2021-41771` and :cve:`2021-41772` 348- go: :cve_nist:`2021-41771` and :cve_nist:`2021-41772`
349- grub2: :cve:`2021-3981` 349- grub2: :cve_nist:`2021-3981`
350- gzip: :cve:`2022-1271` 350- gzip: :cve_nist:`2022-1271`
351- libarchive : :cve:`2021-31566`, :cve:`2021-36976` 351- libarchive : :cve_nist:`2021-31566`, :cve_nist:`2021-36976`
352- libxml2: :cve:`2022-23308` 352- libxml2: :cve_nist:`2022-23308`
353- libxslt: :cve:`2021-30560` 353- libxslt: :cve_nist:`2021-30560`
354- lighttpd: :cve:`2022-22707` 354- lighttpd: :cve_nist:`2022-22707`
355- linux-yocto/5.10: amdgpu: :cve:`2021-42327` 355- linux-yocto/5.10: amdgpu: :cve_nist:`2021-42327`
356- lua: :cve:`2021-43396` 356- lua: :cve_nist:`2021-43396`
357- openssl: :cve:`2021-4044`, :cve:`2022-0778` 357- openssl: :cve_nist:`2021-4044`, :cve_nist:`2022-0778`
358- qemu: :cve:`2022-1050`, :cve:`2022-26353`, :cve:`2022-26354` 358- qemu: :cve_nist:`2022-1050`, :cve_nist:`2022-26353`, :cve_nist:`2022-26354`
359- rpm: :cve:`2021-3521` 359- rpm: :cve_nist:`2021-3521`
360- seatd: :cve:`2022-25643` 360- seatd: :cve_nist:`2022-25643`
361- speex: :cve:`2020-23903` 361- speex: :cve_nist:`2020-23903`
362- squashfs-tools: :cve:`2021-41072` 362- squashfs-tools: :cve_nist:`2021-41072`
363- systemd: :cve:`2021-4034` 363- systemd: :cve_nist:`2021-4034`
364- tiff: :cve:`2022-0561`, :cve:`2022-0562`, :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-0909`, :cve:`2022-0924`, :cve:`2022-1056`, :cve:`2022-22844` 364- tiff: :cve_nist:`2022-0561`, :cve_nist:`2022-0562`, :cve_nist:`2022-0865`, :cve_nist:`2022-0891`, :cve_nist:`2022-0907`, :cve_nist:`2022-0908`, :cve_nist:`2022-0909`, :cve_nist:`2022-0924`, :cve_nist:`2022-1056`, :cve_nist:`2022-22844`
365- unzip: :cve:`2021-4217` 365- unzip: :cve_nist:`2021-4217`
366- vim: :cve:`2021-3796`, :cve:`2021-3872`, :cve:`2021-3875`, :cve:`2021-3927`, :cve:`2021-3928`, :cve:`2021-3968`, :cve:`2021-3973`, :cve:`2021-4187`, :cve:`2022-0128`, :cve:`2022-0156`, :cve:`2022-0158`, :cve:`2022-0261`, :cve:`2022-0318`, :cve:`2022-0319`, :cve:`2022-0554`, :cve:`2022-0696`, :cve:`2022-0714`, :cve:`2022-0729`, :cve:`2022-0943` 366- vim: :cve_nist:`2021-3796`, :cve_nist:`2021-3872`, :cve_nist:`2021-3875`, :cve_nist:`2021-3927`, :cve_nist:`2021-3928`, :cve_nist:`2021-3968`, :cve_nist:`2021-3973`, :cve_nist:`2021-4187`, :cve_nist:`2022-0128`, :cve_nist:`2022-0156`, :cve_nist:`2022-0158`, :cve_nist:`2022-0261`, :cve_nist:`2022-0318`, :cve_nist:`2022-0319`, :cve_nist:`2022-0554`, :cve_nist:`2022-0696`, :cve_nist:`2022-0714`, :cve_nist:`2022-0729`, :cve_nist:`2022-0943`
367- virglrenderer: :cve:`2022-0135`, :cve:`2022-0175` 367- virglrenderer: :cve_nist:`2022-0135`, :cve_nist:`2022-0175`
368- webkitgtk: :cve:`2022-22589`, :cve:`2022-22590`, :cve:`2022-22592` 368- webkitgtk: :cve_nist:`2022-22589`, :cve_nist:`2022-22590`, :cve_nist:`2022-22592`
369- xz: :cve:`2022-1271` 369- xz: :cve_nist:`2022-1271`
370- zlib: :cve:`2018-25032` 370- zlib: :cve_nist:`2018-25032`
371 371
372 372
373 373
diff --git a/documentation/migration-guides/release-notes-4.1.1.rst b/documentation/migration-guides/release-notes-4.1.1.rst
index 4f31fbf1c7..8393bc5320 100644
--- a/documentation/migration-guides/release-notes-4.1.1.rst
+++ b/documentation/migration-guides/release-notes-4.1.1.rst
@@ -6,16 +6,16 @@ Release notes for Yocto-4.1.1 (Langdale)
6Security Fixes in Yocto-4.1.1 6Security Fixes in Yocto-4.1.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- curl: Fix :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915` and :cve:`2022-42916` 9- curl: Fix :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915` and :cve_nist:`2022-42916`
10- libx11: Fix :cve:`2022-3554` 10- libx11: Fix :cve_nist:`2022-3554`
11- lighttpd: Fix :cve:`2022-41556` 11- lighttpd: Fix :cve_nist:`2022-41556`
12- openssl: Fix :cve:`2022-3358`, :cve:`2022-3602` and :cve:`2022-3786` 12- openssl: Fix :cve_nist:`2022-3358`, :cve_nist:`2022-3602` and :cve_nist:`2022-3786`
13- pixman: Fix :cve:`2022-44638` 13- pixman: Fix :cve_nist:`2022-44638`
14- qemu: Fix :cve:`2022-3165` 14- qemu: Fix :cve_nist:`2022-3165`
15- sudo: Fix :cve:`2022-43995` 15- sudo: Fix :cve_nist:`2022-43995`
16- tiff: Fix :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570` and :cve:`2022-3598` 16- tiff: Fix :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570` and :cve_nist:`2022-3598`
17- xserver-xorg: Fix :cve:`2022-3550` and :cve:`2022-3551` 17- xserver-xorg: Fix :cve_nist:`2022-3550` and :cve_nist:`2022-3551`
18- xserver-xorg: Ignore :cve:`2022-3553` 18- xserver-xorg: Ignore :cve_nist:`2022-3553`
19 19
20 20
21Fixes in Yocto-4.1.1 21Fixes in Yocto-4.1.1
@@ -179,7 +179,7 @@ Fixes in Yocto-4.1.1
179- shadow: update 4.12.1 -> 4.12.3 179- shadow: update 4.12.1 -> 4.12.3
180- systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils 180- systemd: add systemd-creds and systemd-cryptenroll to systemd-extra-utils
181- test-manual: fix typo in machine name 181- test-manual: fix typo in machine name
182- tiff: fix a typo for :cve:`2022-2953`.patch 182- tiff: fix a typo for :cve_nist:`2022-2953`.patch
183- u-boot: Add savedefconfig task 183- u-boot: Add savedefconfig task
184- u-boot: Remove duplicate inherit of cml1 184- u-boot: Remove duplicate inherit of cml1
185- uboot-sign: Fix using wrong KEY_REQ_ARGS 185- uboot-sign: Fix using wrong KEY_REQ_ARGS
diff --git a/documentation/migration-guides/release-notes-4.1.2.rst b/documentation/migration-guides/release-notes-4.1.2.rst
index ee5d4ccc51..ea20ced1be 100644
--- a/documentation/migration-guides/release-notes-4.1.2.rst
+++ b/documentation/migration-guides/release-notes-4.1.2.rst
@@ -6,18 +6,18 @@ Release notes for Yocto-4.1.2 (Langdale)
6Security Fixes in Yocto-4.1.2 6Security Fixes in Yocto-4.1.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- sudo: Fix :cve:`2022-43995` 9- sudo: Fix :cve_nist:`2022-43995`
10- binutils: Fix :cve:`2022-4285` 10- binutils: Fix :cve_nist:`2022-4285`
11- cairo: update patch for :cve:`2019-6461` with upstream solution 11- cairo: update patch for :cve_nist:`2019-6461` with upstream solution
12- expat: Fix :cve:`2022-43680` 12- expat: Fix :cve_nist:`2022-43680`
13- ffmpeg: Fix :cve:`2022-3964` and :cve:`2022-3965` 13- ffmpeg: Fix :cve_nist:`2022-3964` and :cve_nist:`2022-3965`
14- grub: Fix :cve:`2022-28736` 14- grub: Fix :cve_nist:`2022-28736`
15- libarchive: Fix :cve:`2022-36227` 15- libarchive: Fix :cve_nist:`2022-36227`
16- libpam: Fix :cve:`2022-28321` 16- libpam: Fix :cve_nist:`2022-28321`
17- libpng: Fix :cve:`2019-6129` 17- libpng: Fix :cve_nist:`2019-6129`
18- ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` 18- ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739`
19- tiff: Fix :cve:`2022-3970` 19- tiff: Fix :cve_nist:`2022-3970`
20- vim: Fix :cve:`2022-4141` 20- vim: Fix :cve_nist:`2022-4141`
21 21
22 22
23Fixes in Yocto-4.1.2 23Fixes in Yocto-4.1.2
diff --git a/documentation/migration-guides/release-notes-4.1.3.rst b/documentation/migration-guides/release-notes-4.1.3.rst
index d8474cda68..b07cfa4689 100644
--- a/documentation/migration-guides/release-notes-4.1.3.rst
+++ b/documentation/migration-guides/release-notes-4.1.3.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.1.3 (Langdale)
6Security Fixes in Yocto-4.1.3 6Security Fixes in Yocto-4.1.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- apr-util: Fix :cve:`2022-25147` 9- apr-util: Fix :cve_nist:`2022-25147`
10- apr: Fix :cve:`2022-24963` and :cve:`2022-28331` 10- apr: Fix :cve_nist:`2022-24963` and :cve_nist:`2022-28331`
11- bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` 11- bind: Fix :cve_nist:`2022-3094`, :cve_nist:`2022-3736` and :cve_nist:`2022-3924`
12- curl: Fix :cve:`2022-43551` and :cve:`2022-43552` 12- curl: Fix :cve_nist:`2022-43551` and :cve_nist:`2022-43552`
13- dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` 13- dbus: Fix :cve_nist:`2022-42010`, :cve_nist:`2022-42011` and :cve_nist:`2022-42012`
14- git: Fix :cve:`2022-23521`, :cve:`2022-39253`, :cve:`2022-39260` and :cve:`2022-41903` 14- git: Fix :cve_nist:`2022-23521`, :cve_nist:`2022-39253`, :cve_nist:`2022-39260` and :cve_nist:`2022-41903`
15- git: Ignore :cve:`2022-41953` 15- git: Ignore :cve_nist:`2022-41953`
16- go: Fix :cve:`2022-41717` and :cve:`2022-41720` 16- go: Fix :cve_nist:`2022-41717` and :cve_nist:`2022-41720`
17- grub2: Fix :cve:`2022-2601` and :cve:`2022-3775` 17- grub2: Fix :cve_nist:`2022-2601` and :cve_nist:`2022-3775`
18- less: Fix :cve:`2022-46663` 18- less: Fix :cve_nist:`2022-46663`
19- libarchive: Fix :cve:`2022-36227` 19- libarchive: Fix :cve_nist:`2022-36227`
20- libksba: Fix :cve:`2022-47629` 20- libksba: Fix :cve_nist:`2022-47629`
21- openssl: Fix :cve:`2022-3996` 21- openssl: Fix :cve_nist:`2022-3996`
22- pkgconf: Fix :cve:`2023-24056` 22- pkgconf: Fix :cve_nist:`2023-24056`
23- ppp: Fix :cve:`2022-4603` 23- ppp: Fix :cve_nist:`2022-4603`
24- sudo: Fix :cve:`2023-22809` 24- sudo: Fix :cve_nist:`2023-22809`
25- tar: Fix :cve:`2022-48303` 25- tar: Fix :cve_nist:`2022-48303`
26- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-0433` and :cve:`2023-0512` 26- vim: Fix :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-0433` and :cve_nist:`2023-0512`
27- xserver-xorg: Fix :cve_mitre:`2023-0494` 27- xserver-xorg: Fix :cve_mitre:`2023-0494`
28- xwayland: Fix :cve_mitre:`2023-0494` 28- xwayland: Fix :cve_mitre:`2023-0494`
29 29
diff --git a/documentation/migration-guides/release-notes-4.1.4.rst b/documentation/migration-guides/release-notes-4.1.4.rst
index de469f4bee..147dd371b1 100644
--- a/documentation/migration-guides/release-notes-4.1.4.rst
+++ b/documentation/migration-guides/release-notes-4.1.4.rst
@@ -6,23 +6,23 @@ Release notes for Yocto-4.1.4 (Langdale)
6Security Fixes in Yocto-4.1.4 6Security Fixes in Yocto-4.1.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- cve-extra-exclusions/linux-yocto: Ignore :cve:`2020-27784`, :cve:`2021-3669`, :cve:`2021-3759`, :cve:`2021-4218`, :cve:`2022-0480`, :cve:`2022-1184`, :cve:`2022-1462`, :cve:`2022-2308`, :cve:`2022-2327`, :cve:`2022-26365`, :cve:`2022-2663`, :cve:`2022-2785`, :cve:`2022-3176`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-3526`, :cve:`2022-3563`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3637`, :cve:`2022-3646` and :cve:`2022-3649` 9- cve-extra-exclusions/linux-yocto: Ignore :cve_nist:`2020-27784`, :cve_nist:`2021-3669`, :cve_nist:`2021-3759`, :cve_nist:`2021-4218`, :cve_nist:`2022-0480`, :cve_nist:`2022-1184`, :cve_nist:`2022-1462`, :cve_nist:`2022-2308`, :cve_nist:`2022-2327`, :cve_nist:`2022-26365`, :cve_nist:`2022-2663`, :cve_nist:`2022-2785`, :cve_nist:`2022-3176`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-3526`, :cve_nist:`2022-3563`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3637`, :cve_nist:`2022-3646` and :cve_nist:`2022-3649`
10- cve-extra-exclusions/linux-yocto 5.15: Ignore :cve:`2022-3435`, :cve:`2022-3534`, :cve:`2022-3564`, :cve:`2022-3564`, :cve:`2022-3619`, :cve:`2022-3640`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-4382`, :cve:`2023-0266` and :cve:`2023-0394` 10- cve-extra-exclusions/linux-yocto 5.15: Ignore :cve_nist:`2022-3435`, :cve_nist:`2022-3534`, :cve_nist:`2022-3564`, :cve_nist:`2022-3564`, :cve_nist:`2022-3619`, :cve_nist:`2022-3640`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-4382`, :cve_nist:`2023-0266` and :cve_nist:`2023-0394`
11- epiphany: Fix :cve:`2023-26081` 11- epiphany: Fix :cve_nist:`2023-26081`
12- git: Ignore :cve:`2023-22743` 12- git: Ignore :cve_nist:`2023-22743`
13- go: Fix :cve:`2022-41722`, :cve:`2022-41723`, :cve:`2022-41724`, :cve:`2022-41725` and :cve:`2023-24532` 13- go: Fix :cve_nist:`2022-41722`, :cve_nist:`2022-41723`, :cve_nist:`2022-41724`, :cve_nist:`2022-41725` and :cve_nist:`2023-24532`
14- harfbuzz: Fix :cve:`2023-25193` 14- harfbuzz: Fix :cve_nist:`2023-25193`
15- libmicrohttpd: Fix :cve:`2023-27371` 15- libmicrohttpd: Fix :cve_nist:`2023-27371`
16- libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` 16- libxml2: Fix :cve_nist:`2022-40303` and :cve_nist:`2022-40304`
17- openssl: Fix :cve:`2023-0464`, :cve:`2023-0465` and :cve:`2023-0466` 17- openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465` and :cve_nist:`2023-0466`
18- python3-setuptools: Fix :cve:`2022-40897` 18- python3-setuptools: Fix :cve_nist:`2022-40897`
19- qemu: Fix :cve:`2022-4144` 19- qemu: Fix :cve_nist:`2022-4144`
20- screen: Fix :cve:`2023-24626` 20- screen: Fix :cve_nist:`2023-24626`
21- shadow: Ignore :cve:`2016-15024` 21- shadow: Ignore :cve_nist:`2016-15024`
22- tiff: Fix :cve:`2022-48281`, :cve:`2023-0795`, :cve:`2023-0796`, :cve:`2023-0797`, :cve:`2023-0798`, :cve:`2023-0799`, :cve:`2023-0800`, :cve:`2023-0801`, :cve:`2023-0802`, :cve:`2023-0803` and :cve:`2023-0804` 22- tiff: Fix :cve_nist:`2022-48281`, :cve_nist:`2023-0795`, :cve_nist:`2023-0796`, :cve_nist:`2023-0797`, :cve_nist:`2023-0798`, :cve_nist:`2023-0799`, :cve_nist:`2023-0800`, :cve_nist:`2023-0801`, :cve_nist:`2023-0802`, :cve_nist:`2023-0803` and :cve_nist:`2023-0804`
23- vim: Fix :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264` and :cve:`2023-1355` 23- vim: Fix :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264` and :cve_nist:`2023-1355`
24- xdg-utils: Fix :cve:`2022-4055` 24- xdg-utils: Fix :cve_nist:`2022-4055`
25- xserver-xorg: Fix for :cve:`2023-1393` 25- xserver-xorg: Fix for :cve_nist:`2023-1393`
26 26
27 27
28Fixes in Yocto-4.1.4 28Fixes in Yocto-4.1.4
diff --git a/documentation/migration-guides/release-notes-4.1.rst b/documentation/migration-guides/release-notes-4.1.rst
index a0d5196128..3ad3611b80 100644
--- a/documentation/migration-guides/release-notes-4.1.rst
+++ b/documentation/migration-guides/release-notes-4.1.rst
@@ -225,36 +225,36 @@ The following corrections have been made to the :term:`LICENSE` values set by re
225Security Fixes in 4.1 225Security Fixes in 4.1
226~~~~~~~~~~~~~~~~~~~~~ 226~~~~~~~~~~~~~~~~~~~~~
227 227
228- bind: :cve:`2022-1183`, :cve:`2022-2795`, :cve:`2022-2881`, :cve:`2022-2906`, :cve:`2022-3080`, :cve:`2022-38178` 228- bind: :cve_nist:`2022-1183`, :cve_nist:`2022-2795`, :cve_nist:`2022-2881`, :cve_nist:`2022-2906`, :cve_nist:`2022-3080`, :cve_nist:`2022-38178`
229- binutils: :cve:`2019-1010204`, :cve:`2022-38126`, :cve:`2022-38127`, :cve:`2022-38128`, :cve:`2022-38533` 229- binutils: :cve_nist:`2019-1010204`, :cve_nist:`2022-38126`, :cve_nist:`2022-38127`, :cve_nist:`2022-38128`, :cve_nist:`2022-38533`
230- busybox: :cve:`2022-30065` 230- busybox: :cve_nist:`2022-30065`
231- connman: :cve:`2022-32292`, :cve:`2022-32293` 231- connman: :cve_nist:`2022-32292`, :cve_nist:`2022-32293`
232- cups: :cve:`2022-26691` 232- cups: :cve_nist:`2022-26691`
233- e2fsprogs: :cve:`2022-1304` 233- e2fsprogs: :cve_nist:`2022-1304`
234- expat: :cve:`2022-40674` 234- expat: :cve_nist:`2022-40674`
235- freetype: :cve:`2022-27404` 235- freetype: :cve_nist:`2022-27404`
236- glibc: :cve:`2022-39046` 236- glibc: :cve_nist:`2022-39046`
237- gnupg: :cve:`2022-34903` 237- gnupg: :cve_nist:`2022-34903`
238- grub2: :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734`, :cve:`2022-28735` 238- grub2: :cve_nist:`2021-3695`, :cve_nist:`2021-3696`, :cve_nist:`2021-3697`, :cve_nist:`2022-28733`, :cve_nist:`2022-28734`, :cve_nist:`2022-28735`
239- inetutils: :cve:`2022-39028` 239- inetutils: :cve_nist:`2022-39028`
240- libtirpc: :cve:`2021-46828` 240- libtirpc: :cve_nist:`2021-46828`
241- libxml2: :cve:`2016-3709` (ignored) 241- libxml2: :cve_nist:`2016-3709` (ignored)
242- libxslt: :cve:`2022-29824` (not applicable) 242- libxslt: :cve_nist:`2022-29824` (not applicable)
243- linux-yocto/5.15: :cve:`2022-28796` 243- linux-yocto/5.15: :cve_nist:`2022-28796`
244- logrotate: :cve:`2022-1348` 244- logrotate: :cve_nist:`2022-1348`
245- lua: :cve:`2022-33099` 245- lua: :cve_nist:`2022-33099`
246- nasm: :cve:`2020-18974` (ignored) 246- nasm: :cve_nist:`2020-18974` (ignored)
247- ncurses: :cve:`2022-29458` 247- ncurses: :cve_nist:`2022-29458`
248- openssl: :cve:`2022-1292`, :cve:`2022-1343`, :cve:`2022-1434`, :cve:`2022-1473`, :cve:`2022-2068`, :cve:`2022-2274`, :cve:`2022-2097` 248- openssl: :cve_nist:`2022-1292`, :cve_nist:`2022-1343`, :cve_nist:`2022-1434`, :cve_nist:`2022-1473`, :cve_nist:`2022-2068`, :cve_nist:`2022-2274`, :cve_nist:`2022-2097`
249- python3: :cve:`2015-20107` (ignored) 249- python3: :cve_nist:`2015-20107` (ignored)
250- qemu: :cve:`2021-20255` (ignored), :cve:`2019-12067` (ignored), :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414` 250- qemu: :cve_nist:`2021-20255` (ignored), :cve_nist:`2019-12067` (ignored), :cve_nist:`2021-3507`, :cve_nist:`2022-0216`, :cve_nist:`2022-2962`, :cve_nist:`2022-35414`
251- rpm: :cve:`2021-35937`, :cve:`2021-35938`, :cve:`2021-35939` 251- rpm: :cve_nist:`2021-35937`, :cve_nist:`2021-35938`, :cve_nist:`2021-35939`
252- rsync: :cve:`2022-29154` 252- rsync: :cve_nist:`2022-29154`
253- subversion: :cve:`2021-28544`, :cve:`2022-24070` 253- subversion: :cve_nist:`2021-28544`, :cve_nist:`2022-24070`
254- tiff: :cve:`2022-1210` (not applicable), :cve:`2022-1622`, :cve:`2022-1623` (invalid), :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526` 254- tiff: :cve_nist:`2022-1210` (not applicable), :cve_nist:`2022-1622`, :cve_nist:`2022-1623` (invalid), :cve_nist:`2022-2056`, :cve_nist:`2022-2057`, :cve_nist:`2022-2058`, :cve_nist:`2022-2953`, :cve_nist:`2022-34526`
255- unzip: :cve:`2022-0529`, :cve:`2022-0530` 255- unzip: :cve_nist:`2022-0529`, :cve_nist:`2022-0530`
256- vim: :cve:`2022-1381`, :cve:`2022-1420`, :cve:`2022-1621`, :cve:`2022-1629`, :cve:`2022-1674`, :cve:`2022-1733`, :cve:`2022-1735`, :cve:`2022-1769`, :cve:`2022-1771`, :cve:`2022-1785`, :cve:`2022-1796`, :cve:`2022-1927`, :cve:`2022-1942`, :cve:`2022-2257`, :cve:`2022-2264`, :cve:`2022-2284`, :cve:`2022-2285`, :cve:`2022-2286`, :cve:`2022-2287`, :cve:`2022-2816`, :cve:`2022-2817`, :cve:`2022-2819`, :cve:`2022-2845`, :cve:`2022-2849`, :cve:`2022-2862`, :cve:`2022-2874`, :cve:`2022-2889`, :cve:`2022-2980`, :cve:`2022-2946`, :cve:`2022-2982`, :cve:`2022-3099`, :cve:`2022-3134`, :cve:`2022-3234`, :cve:`2022-3278` 256- vim: :cve_nist:`2022-1381`, :cve_nist:`2022-1420`, :cve_nist:`2022-1621`, :cve_nist:`2022-1629`, :cve_nist:`2022-1674`, :cve_nist:`2022-1733`, :cve_nist:`2022-1735`, :cve_nist:`2022-1769`, :cve_nist:`2022-1771`, :cve_nist:`2022-1785`, :cve_nist:`2022-1796`, :cve_nist:`2022-1927`, :cve_nist:`2022-1942`, :cve_nist:`2022-2257`, :cve_nist:`2022-2264`, :cve_nist:`2022-2284`, :cve_nist:`2022-2285`, :cve_nist:`2022-2286`, :cve_nist:`2022-2287`, :cve_nist:`2022-2816`, :cve_nist:`2022-2817`, :cve_nist:`2022-2819`, :cve_nist:`2022-2845`, :cve_nist:`2022-2849`, :cve_nist:`2022-2862`, :cve_nist:`2022-2874`, :cve_nist:`2022-2889`, :cve_nist:`2022-2980`, :cve_nist:`2022-2946`, :cve_nist:`2022-2982`, :cve_nist:`2022-3099`, :cve_nist:`2022-3134`, :cve_nist:`2022-3234`, :cve_nist:`2022-3278`
257- zlib: :cve:`2022-37434` 257- zlib: :cve_nist:`2022-37434`
258 258
259 259
260 260
diff --git a/documentation/migration-guides/release-notes-4.2.1.rst b/documentation/migration-guides/release-notes-4.2.1.rst
index 948c35fd67..0b2ef060fc 100644
--- a/documentation/migration-guides/release-notes-4.2.1.rst
+++ b/documentation/migration-guides/release-notes-4.2.1.rst
@@ -6,13 +6,13 @@ Release notes for Yocto-4.2.1 (Mickledore)
6Security Fixes in Yocto-4.2.1 6Security Fixes in Yocto-4.2.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- connman: Fix :cve:`2023-28488` 9- connman: Fix :cve_nist:`2023-28488`
10- linux-yocto: Ignore :cve:`2023-1652` and :cve:`2023-1829` 10- linux-yocto: Ignore :cve_nist:`2023-1652` and :cve_nist:`2023-1829`
11- ghostscript: Fix :cve:`2023-28879` 11- ghostscript: Fix :cve_nist:`2023-28879`
12- qemu: Ignore :cve:`2023-0664` 12- qemu: Ignore :cve_nist:`2023-0664`
13- ruby: Fix :cve:`2022-28738` and :cve:`2022-28739` 13- ruby: Fix :cve_nist:`2022-28738` and :cve_nist:`2022-28739`
14- tiff: Fix :cve:`2022-4645` 14- tiff: Fix :cve_nist:`2022-4645`
15- xwayland: Fix :cve:`2023-1393` 15- xwayland: Fix :cve_nist:`2023-1393`
16 16
17 17
18Fixes in Yocto-4.2.1 18Fixes in Yocto-4.2.1
diff --git a/documentation/migration-guides/release-notes-4.2.2.rst b/documentation/migration-guides/release-notes-4.2.2.rst
index 74f2d0e82a..0795c8e938 100644
--- a/documentation/migration-guides/release-notes-4.2.2.rst
+++ b/documentation/migration-guides/release-notes-4.2.2.rst
@@ -6,21 +6,21 @@ Release notes for Yocto-4.2.2 (Mickledore)
6Security Fixes in Yocto-4.2.2 6Security Fixes in Yocto-4.2.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- binutils: Fix :cve:`2023-1972` 9- binutils: Fix :cve_nist:`2023-1972`
10- cups: Fix :cve:`2023-32324` 10- cups: Fix :cve_nist:`2023-32324`
11- curl: Fix :cve:`2023-28319`, :cve:`2023-28320`, :cve:`2023-28321` and :cve:`2023-28322` 11- curl: Fix :cve_nist:`2023-28319`, :cve_nist:`2023-28320`, :cve_nist:`2023-28321` and :cve_nist:`2023-28322`
12- dbus: Fix :cve:`2023-34969` 12- dbus: Fix :cve_nist:`2023-34969`
13- git: Fix :cve:`2023-25652` and :cve:`2023-29007` 13- git: Fix :cve_nist:`2023-25652` and :cve_nist:`2023-29007`
14- git: Ignore :cve:`2023-25815` 14- git: Ignore :cve_nist:`2023-25815`
15- libwebp: Fix :cve:`2023-1999` 15- libwebp: Fix :cve_nist:`2023-1999`
16- libxml2: Fix :cve:`2023-28484` and :cve:`2023-29469` 16- libxml2: Fix :cve_nist:`2023-28484` and :cve_nist:`2023-29469`
17- libxpm: Fix :cve:`2022-44617` 17- libxpm: Fix :cve_nist:`2022-44617`
18- ninja: Ignore :cve:`2021-4336` 18- ninja: Ignore :cve_nist:`2021-4336`
19- openssl: Fix :cve:`2023-0464`, :cve:`2023-0465`, :cve:`2023-0466`, :cve:`2023-1255` and :cve:`2023-2650` 19- openssl: Fix :cve_nist:`2023-0464`, :cve_nist:`2023-0465`, :cve_nist:`2023-0466`, :cve_nist:`2023-1255` and :cve_nist:`2023-2650`
20- perl: Fix :cve:`2023-31484` and :cve:`2023-31486` 20- perl: Fix :cve_nist:`2023-31484` and :cve_nist:`2023-31486`
21- sysstat: Fix :cve:`2023-33204` 21- sysstat: Fix :cve_nist:`2023-33204`
22- tiff: Fix :cve_mitre:`2023-25434`, :cve:`2023-26965` and :cve:`2023-2731` 22- tiff: Fix :cve_mitre:`2023-25434`, :cve_nist:`2023-26965` and :cve_nist:`2023-2731`
23- vim: Fix :cve:`2023-2426` 23- vim: Fix :cve_nist:`2023-2426`
24 24
25 25
26Fixes in Yocto-4.2.2 26Fixes in Yocto-4.2.2
diff --git a/documentation/migration-guides/release-notes-4.2.3.rst b/documentation/migration-guides/release-notes-4.2.3.rst
index 3b568a1c29..86ce5b7025 100644
--- a/documentation/migration-guides/release-notes-4.2.3.rst
+++ b/documentation/migration-guides/release-notes-4.2.3.rst
@@ -6,24 +6,24 @@ Release notes for Yocto-4.2.3 (Mickledore)
6Security Fixes in Yocto-4.2.3 6Security Fixes in Yocto-4.2.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-2828` and :cve:`2023-2911` 9- bind: Fix :cve_nist:`2023-2828` and :cve_nist:`2023-2911`
10- cups: Fix :cve:`2023-34241` 10- cups: Fix :cve_nist:`2023-34241`
11- dmidecode: Fix :cve:`2023-30630` 11- dmidecode: Fix :cve_nist:`2023-30630`
12- erofs-utils: Fix :cve:`2023-33551` and :cve:`2023-33552` 12- erofs-utils: Fix :cve_nist:`2023-33551` and :cve_nist:`2023-33552`
13- ghostscript: Fix :cve:`2023-36664` 13- ghostscript: Fix :cve_nist:`2023-36664`
14- go: Fix :cve_mitre:`2023-24531` 14- go: Fix :cve_mitre:`2023-24531`
15- libarchive: ignore :cve:`2023-30571` 15- libarchive: ignore :cve_nist:`2023-30571`
16- libjpeg-turbo: Fix :cve:`2023-2804` 16- libjpeg-turbo: Fix :cve_nist:`2023-2804`
17- libx11: Fix :cve:`2023-3138` 17- libx11: Fix :cve_nist:`2023-3138`
18- ncurses: Fix :cve:`2023-29491` 18- ncurses: Fix :cve_nist:`2023-29491`
19- openssh: Fix :cve:`2023-38408` 19- openssh: Fix :cve_nist:`2023-38408`
20- python3-certifi: Fix :cve:`2023-37920` 20- python3-certifi: Fix :cve_nist:`2023-37920`
21- python3-requests: Fix :cve:`2023-32681` 21- python3-requests: Fix :cve_nist:`2023-32681`
22- python3: Ignore :cve:`2023-36632` 22- python3: Ignore :cve_nist:`2023-36632`
23- qemu: fix :cve:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301` 23- qemu: fix :cve_nist:`2023-0330`, :cve_mitre:`2023-2861`, :cve_mitre:`2023-3255` and :cve_mitre:`2023-3301`
24- ruby: Fix :cve:`2023-36617` 24- ruby: Fix :cve_nist:`2023-36617`
25- vim: Fix :cve:`2023-2609` and :cve:`2023-2610` 25- vim: Fix :cve_nist:`2023-2609` and :cve_nist:`2023-2610`
26- webkitgtk: Fix :cve:`2023-27932` and :cve:`2023-27954` 26- webkitgtk: Fix :cve_nist:`2023-27932` and :cve_nist:`2023-27954`
27 27
28 28
29Fixes in Yocto-4.2.3 29Fixes in Yocto-4.2.3
diff --git a/documentation/migration-guides/release-notes-4.2.4.rst b/documentation/migration-guides/release-notes-4.2.4.rst
index 3c20140e29..60f878c3b0 100644
--- a/documentation/migration-guides/release-notes-4.2.4.rst
+++ b/documentation/migration-guides/release-notes-4.2.4.rst
@@ -6,44 +6,44 @@ Release notes for Yocto-4.2.4 (Mickledore)
6Security Fixes in Yocto-4.2.4 6Security Fixes in Yocto-4.2.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-3341` and :cve:`2023-4236` 9- bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236`
10- binutils: Fix :cve:`2023-39128` 10- binutils: Fix :cve_nist:`2023-39128`
11- cups: fix :cve:`2023-4504` 11- cups: fix :cve_nist:`2023-4504`
12- curl: Fix :cve:`2023-28320`, :cve:`2023-32001`, :cve:`2023-38039`, :cve:`2023-38545` and :cve:`2023-38546` 12- curl: Fix :cve_nist:`2023-28320`, :cve_nist:`2023-32001`, :cve_nist:`2023-38039`, :cve_nist:`2023-38545` and :cve_nist:`2023-38546`
13- dmidecode: fix for :cve:`2023-30630` 13- dmidecode: fix for :cve_nist:`2023-30630`
14- dropbear: fix :cve:`2023-36328` 14- dropbear: fix :cve_nist:`2023-36328`
15- ffmpeg: Ignore :cve:`2023-39018` 15- ffmpeg: Ignore :cve_nist:`2023-39018`
16- gcc: Fix :cve:`2023-4039` 16- gcc: Fix :cve_nist:`2023-4039`
17- gdb: Fix :cve:`2023-39128` 17- gdb: Fix :cve_nist:`2023-39128`
18- ghostscript: Fix :cve:`2023-38559` and :cve:`2023-43115` 18- ghostscript: Fix :cve_nist:`2023-38559` and :cve_nist:`2023-43115`
19- glibc: Fix :cve:`2023-4527` and :cve:`2023-4806` 19- glibc: Fix :cve_nist:`2023-4527` and :cve_nist:`2023-4806`
20- go: Fix :cve:`2023-29409` and :cve:`2023-39533` 20- go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39533`
21- grub: Fix :cve:`2023-4692` and :cve:`2023-4693` 21- grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
22- gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476` 22- gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476`
23- inetutils: fix :cve:`2023-40303` 23- inetutils: fix :cve_nist:`2023-40303`
24- librsvg: Fix :cve:`2023-38633` 24- librsvg: Fix :cve_nist:`2023-38633`
25- libssh2: Fix :cve:`2020-22218` 25- libssh2: Fix :cve_nist:`2020-22218`
26- libwebp: Fix :cve:`2023-4863` and :cve:`2023-5129` 26- libwebp: Fix :cve_nist:`2023-4863` and :cve_nist:`2023-5129`
27- libx11: Fix :cve:`2023-43785`, :cve:`2023-43786` and :cve:`2023-43787` 27- libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787`
28- libxpm: Fix :cve:`2023-43788` and :cve:`2023-43789` 28- libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789`
29- linux-yocto/6.1: Ignore :cve:`2003-1604`, :cve:`2004-0230`, :cve:`2006-3635`, :cve:`2006-5331`, :cve:`2006-6128`, :cve:`2007-4774`, :cve:`2007-6761`, :cve:`2007-6762`, :cve:`2008-7316`, :cve:`2009-2692`, :cve:`2010-0008`, :cve:`2010-3432`, :cve:`2010-4648`, :cve:`2010-5313`, :cve:`2010-5328`, :cve:`2010-5329`, :cve:`2010-5331`, :cve:`2010-5332`, :cve:`2011-4098`, :cve:`2011-4131`, :cve:`2011-4915`, :cve:`2011-5321`, :cve:`2011-5327`, :cve:`2012-0957`, :cve:`2012-2119`, :cve:`2012-2136`, :cve:`2012-2137`, :cve:`2012-2313`, :cve:`2012-2319`, :cve:`2012-2372`, :cve:`2012-2375`, :cve:`2012-2390`, :cve:`2012-2669`, :cve:`2012-2744`, :cve:`2012-2745`, :cve:`2012-3364`, :cve:`2012-3375`, :cve:`2012-3400`, :cve:`2012-3412`, :cve:`2012-3430`, :cve:`2012-3510`, :cve:`2012-3511`, :cve:`2012-3520`, :cve:`2012-3552`, :cve:`2012-4398`, :cve:`2012-4444`, :cve:`2012-4461`, :cve:`2012-4467`, :cve:`2012-4508`, :cve:`2012-4530`, :cve:`2012-4565`, :cve:`2012-5374`, :cve:`2012-5375`, :cve:`2012-5517`, :cve:`2012-6536`, :cve:`2012-6537`, :cve:`2012-6538`, :cve:`2012-6539`, :cve:`2012-6540`, :cve:`2012-6541`, :cve:`2012-6542`, :cve:`2012-6543`, :cve:`2012-6544`, :cve:`2012-6545`, :cve:`2012-6546`, :cve:`2012-6547`, :cve:`2012-6548`, :cve:`2012-6549`, :cve:`2012-6638`, :cve:`2012-6647`, :cve:`2012-6657`, :cve:`2012-6689`, :cve:`2012-6701`, :cve:`2012-6703`, :cve:`2012-6704`, :cve:`2012-6712`, :cve:`2013-0160`, :cve:`2013-0190`, :cve:`2013-0216`, :cve:`2013-0217`, :cve:`2013-0228`, :cve:`2013-0231`, :cve:`2013-0268`, :cve:`2013-0290`, :cve:`2013-0309`, :cve:`2013-0310`, :cve:`2013-0311`, :cve:`2013-0313`, :cve:`2013-0343`, :cve:`2013-0349`, :cve:`2013-0871`, :cve:`2013-0913`, :cve:`2013-0914`, :cve:`2013-1059`, :cve:`2013-1763`, :cve:`2013-1767`, :cve:`2013-1772`, :cve:`2013-1773`, :cve:`2013-1774`, :cve:`2013-1792`, :cve:`2013-1796`, :cve:`2013-1797`, :cve:`2013-1798`, :cve:`2013-1819`, :cve:`2013-1826`, :cve:`2013-1827`, :cve:`2013-1828`, :cve:`2013-1848`, :cve:`2013-1858`, :cve:`2013-1860`, :cve:`2013-1928`, :cve:`2013-1929`, :cve:`2013-1943`, :cve:`2013-1956`, :cve:`2013-1957`, :cve:`2013-1958`, :cve:`2013-1959`, :cve:`2013-1979`, :cve:`2013-2015`, :cve:`2013-2017`, :cve:`2013-2058`, :cve:`2013-2094`, :cve:`2013-2128`, :cve:`2013-2140`, :cve:`2013-2141`, :cve:`2013-2146`, :cve:`2013-2147`, :cve:`2013-2148`, :cve:`2013-2164`, :cve:`2013-2206`, :cve:`2013-2232`, :cve:`2013-2234`, :cve:`2013-2237`, :cve:`2013-2546`, :cve:`2013-2547`, :cve:`2013-2548`, :cve:`2013-2596`, :cve:`2013-2634`, :cve:`2013-2635`, :cve:`2013-2636`, :cve:`2013-2850`, :cve:`2013-2851`, :cve:`2013-2852`, :cve:`2013-2888`, :cve:`2013-2889`, :cve:`2013-2890`, :cve:`2013-2891`, :cve:`2013-2892`, :cve:`2013-2893`, :cve:`2013-2894`, :cve:`2013-2895`, :cve:`2013-2896`, :cve:`2013-2897`, :cve:`2013-2898`, :cve:`2013-2899`, :cve:`2013-2929`, :cve:`2013-2930`, :cve:`2013-3076`, :cve:`2013-3222`, :cve:`2013-3223`, :cve:`2013-3224`, :cve:`2013-3225`, :cve:`2013-3226`, :cve:`2013-3227`, :cve:`2013-3228`, :cve:`2013-3229`, :cve:`2013-3230`, :cve:`2013-3231`, :cve:`2013-3232`, :cve:`2013-3233`, :cve:`2013-3234`, :cve:`2013-3235`, :cve:`2013-3236`, :cve:`2013-3237`, :cve:`2013-3301`, :cve:`2013-3302`, :cve:`2013-4125`, :cve:`2013-4127`, :cve:`2013-4129`, :cve:`2013-4162`, :cve:`2013-4163`, :cve:`2013-4205`, :cve:`2013-4220`, :cve:`2013-4247`, :cve:`2013-4254`, :cve:`2013-4270`, :cve:`2013-4299`, :cve:`2013-4300`, :cve:`2013-4312`, :cve:`2013-4343`, :cve:`2013-4345`, :cve:`2013-4348`, :cve:`2013-4350`, :cve:`2013-4387`, :cve:`2013-4470`, :cve:`2013-4483`, :cve:`2013-4511`, :cve:`2013-4512`, :cve:`2013-4513`, :cve:`2013-4514`, :cve:`2013-4515`, :cve:`2013-4516`, :cve:`2013-4563`, :cve:`2013-4579`, :cve:`2013-4587`, :cve:`2013-4588`, :cve:`2013-4591`, :cve:`2013-4592`, :cve:`2013-5634`, :cve:`2013-6282`, :cve:`2013-6367`, :cve:`2013-6368`, :cve:`2013-6376`, :cve:`2013-6378`, :cve:`2013-6380`, :cve:`2013-6381`, :cve:`2013-6382`, :cve:`2013-6383`, :cve:`2013-6431`, :cve:`2013-6432`, :cve:`2013-6885`, :cve:`2013-7026`, :cve:`2013-7027`, :cve:`2013-7263`, :cve:`2013-7264`, :cve:`2013-7265`, :cve:`2013-7266`, :cve:`2013-7267`, :cve:`2013-7268`, :cve:`2013-7269`, :cve:`2013-7270`, :cve:`2013-7271`, :cve:`2013-7281`, :cve:`2013-7339`, :cve:`2013-7348`, :cve:`2013-7421`, :cve:`2013-7446`, :cve:`2013-7470`, :cve:`2014-0038`, :cve:`2014-0049`, :cve:`2014-0055`, :cve:`2014-0069`, :cve:`2014-0077`, :cve:`2014-0100`, :cve:`2014-0101`, :cve:`2014-0102`, :cve:`2014-0131`, :cve:`2014-0155`, :cve:`2014-0181`, :cve:`2014-0196`, :cve:`2014-0203`, :cve:`2014-0205`, :cve:`2014-0206`, :cve:`2014-1438`, :cve:`2014-1444`, :cve:`2014-1445`, :cve:`2014-1446`, :cve:`2014-1690`, :cve:`2014-1737`, :cve:`2014-1738`, :cve:`2014-1739`, :cve:`2014-1874`, :cve:`2014-2038`, :cve:`2014-2039`, :cve:`2014-2309`, :cve:`2014-2523`, :cve:`2014-2568`, :cve:`2014-2580`, :cve:`2014-2672`, :cve:`2014-2673`, :cve:`2014-2678`, :cve:`2014-2706`, :cve:`2014-2739`, :cve:`2014-2851`, :cve:`2014-2889`, :cve:`2014-3122`, :cve:`2014-3144`, :cve:`2014-3145`, :cve:`2014-3153`, :cve:`2014-3180`, :cve:`2014-3181`, :cve:`2014-3182`, :cve:`2014-3183`, :cve:`2014-3184`, :cve:`2014-3185`, :cve:`2014-3186`, :cve:`2014-3534`, :cve:`2014-3535`, :cve:`2014-3601`, :cve:`2014-3610`, :cve:`2014-3611`, :cve:`2014-3631`, :cve:`2014-3645`, :cve:`2014-3646`, :cve:`2014-3647`, :cve:`2014-3673`, :cve:`2014-3687`, :cve:`2014-3688`, :cve:`2014-3690`, :cve:`2014-3917`, :cve:`2014-3940`, :cve:`2014-4014`, :cve:`2014-4027`, :cve:`2014-4157`, :cve:`2014-4171`, :cve:`2014-4508`, :cve:`2014-4608`, :cve:`2014-4611`, :cve:`2014-4652`, :cve:`2014-4653`, :cve:`2014-4654`, :cve:`2014-4655`, :cve:`2014-4656`, :cve:`2014-4667`, :cve:`2014-4699`, :cve:`2014-4943`, :cve:`2014-5045`, :cve:`2014-5077`, :cve:`2014-5206`, :cve:`2014-5207`, :cve:`2014-5471`, :cve:`2014-5472`, :cve:`2014-6410`, :cve:`2014-6416`, :cve:`2014-6417`, :cve:`2014-6418`, :cve:`2014-7145`, :cve:`2014-7283`, :cve:`2014-7284`, :cve:`2014-7822`, :cve:`2014-7825`, :cve:`2014-7826`, :cve:`2014-7841`, :cve:`2014-7842`, :cve:`2014-7843`, :cve:`2014-7970`, :cve:`2014-7975`, :cve:`2014-8086`, :cve:`2014-8133`, :cve:`2014-8134`, :cve:`2014-8159`, :cve:`2014-8160`, :cve:`2014-8171`, :cve:`2014-8172`, :cve:`2014-8173`, :cve:`2014-8369`, :cve:`2014-8480`, :cve:`2014-8481`, :cve:`2014-8559`, :cve:`2014-8709`, :cve:`2014-8884`, :cve:`2014-8989`, :cve:`2014-9090`, :cve:`2014-9322`, :cve:`2014-9419`, :cve:`2014-9420`, :cve:`2014-9428`, :cve:`2014-9529`, :cve:`2014-9584`, :cve:`2014-9585`, :cve:`2014-9644`, :cve:`2014-9683`, :cve:`2014-9710`, :cve:`2014-9715`, :cve:`2014-9717`, :cve:`2014-9728`, :cve:`2014-9729`, :cve:`2014-9730`, :cve:`2014-9731`, :cve:`2014-9803`, :cve:`2014-9870`, :cve:`2014-9888`, :cve:`2014-9895`, :cve:`2014-9903`, :cve:`2014-9904`, :cve:`2014-9914`, :cve:`2014-9922`, :cve:`2014-9940`, :cve:`2015-0239`, :cve:`2015-0274`, :cve:`2015-0275`, :cve:`2015-1333`, :cve:`2015-1339`, :cve:`2015-1350`, :cve:`2015-1420`, :cve:`2015-1421`, :cve:`2015-1465`, :cve:`2015-1573`, :cve:`2015-1593`, :cve:`2015-1805`, :cve:`2015-2041`, :cve:`2015-2042`, :cve:`2015-2150`, :cve:`2015-2666`, :cve:`2015-2672`, :cve:`2015-2686`, :cve:`2015-2830`, :cve:`2015-2922`, :cve:`2015-2925`, :cve:`2015-3212`, :cve:`2015-3214`, :cve:`2015-3288`, :cve:`2015-3290`, :cve:`2015-3291`, :cve:`2015-3331`, :cve:`2015-3339`, :cve:`2015-3636`, :cve:`2015-4001`, :cve:`2015-4002`, :cve:`2015-4003`, :cve:`2015-4004`, :cve:`2015-4036`, :cve:`2015-4167`, :cve:`2015-4170`, :cve:`2015-4176`, :cve:`2015-4177`, :cve:`2015-4178`, :cve:`2015-4692`, :cve:`2015-4700`, :cve:`2015-5156`, :cve:`2015-5157`, :cve:`2015-5257`, :cve:`2015-5283`, :cve:`2015-5307`, :cve:`2015-5327`, :cve:`2015-5364`, :cve:`2015-5366`, :cve:`2015-5697`, :cve:`2015-5706`, :cve:`2015-5707`, :cve:`2015-6252`, :cve:`2015-6526`, :cve:`2015-6937`, :cve:`2015-7509`, :cve:`2015-7513`, :cve:`2015-7515`, :cve:`2015-7550`, :cve:`2015-7566`, :cve:`2015-7613`, :cve:`2015-7799`, :cve:`2015-7833`, :cve:`2015-7872`, :cve:`2015-7884`, :cve:`2015-7885`, :cve:`2015-7990`, :cve:`2015-8104`, :cve:`2015-8215`, :cve:`2015-8324`, :cve:`2015-8374`, :cve:`2015-8539`, :cve:`2015-8543`, :cve:`2015-8550`, :cve:`2015-8551`, :cve:`2015-8552`, :cve:`2015-8553`, :cve:`2015-8569`, :cve:`2015-8575`, :cve:`2015-8660`, :cve:`2015-8709`, :cve:`2015-8746`, :cve:`2015-8767`, :cve:`2015-8785`, :cve:`2015-8787`, :cve:`2015-8812`, :cve:`2015-8816`, :cve:`2015-8830`, :cve:`2015-8839`, :cve:`2015-8844`, :cve:`2015-8845`, :cve:`2015-8950`, :cve:`2015-8952`, :cve:`2015-8953`, :cve:`2015-8955`, :cve:`2015-8956`, :cve:`2015-8961`, :cve:`2015-8962`, :cve:`2015-8963`, :cve:`2015-8964`, :cve:`2015-8966`, :cve:`2015-8967`, :cve:`2015-8970`, :cve:`2015-9004`, :cve:`2015-9016`, :cve:`2015-9289`, :cve:`2016-0617`, :cve:`2016-0723`, :cve:`2016-0728`, :cve:`2016-0758`, :cve:`2016-0821`, :cve:`2016-0823`, :cve:`2016-10044`, :cve:`2016-10088`, :cve:`2016-10147`, :cve:`2016-10150`, :cve:`2016-10153`, :cve:`2016-10154`, :cve:`2016-10200`, :cve:`2016-10208`, :cve:`2016-10229`, :cve:`2016-10318`, :cve:`2016-10723`, :cve:`2016-10741`, :cve:`2016-10764`, :cve:`2016-10905`, :cve:`2016-10906`, :cve:`2016-10907`, :cve:`2016-1237`, :cve:`2016-1575`, :cve:`2016-1576`, :cve:`2016-1583`, :cve:`2016-2053`, :cve:`2016-2069`, :cve:`2016-2070`, :cve:`2016-2085`, :cve:`2016-2117`, :cve:`2016-2143`, :cve:`2016-2184`, :cve:`2016-2185`, :cve:`2016-2186`, :cve:`2016-2187`, :cve:`2016-2188`, :cve:`2016-2383`, :cve:`2016-2384`, :cve:`2016-2543`, :cve:`2016-2544`, :cve:`2016-2545`, :cve:`2016-2546`, :cve:`2016-2547`, :cve:`2016-2548`, :cve:`2016-2549`, :cve:`2016-2550`, :cve:`2016-2782`, :cve:`2016-2847`, :cve:`2016-3044`, :cve:`2016-3070`, :cve:`2016-3134`, :cve:`2016-3135`, :cve:`2016-3136`, :cve:`2016-3137`, :cve:`2016-3138`, :cve:`2016-3139`, :cve:`2016-3140`, :cve:`2016-3156`, :cve:`2016-3157`, :cve:`2016-3672`, :cve:`2016-3689`, :cve:`2016-3713`, :cve:`2016-3841`, :cve:`2016-3857`, :cve:`2016-3951`, :cve:`2016-3955`, :cve:`2016-3961`, :cve:`2016-4440`, :cve:`2016-4470`, :cve:`2016-4482`, :cve:`2016-4485`, :cve:`2016-4486`, :cve:`2016-4557`, :cve:`2016-4558`, :cve:`2016-4565`, :cve:`2016-4568`, :cve:`2016-4569`, :cve:`2016-4578`, :cve:`2016-4580`, :cve:`2016-4581`, :cve:`2016-4794`, :cve:`2016-4805`, :cve:`2016-4913`, :cve:`2016-4951`, :cve:`2016-4997`, :cve:`2016-4998`, :cve:`2016-5195`, :cve:`2016-5243`, :cve:`2016-5244`, :cve:`2016-5400`, :cve:`2016-5412`, :cve:`2016-5696`, :cve:`2016-5728`, :cve:`2016-5828`, :cve:`2016-5829`, :cve:`2016-6130`, :cve:`2016-6136`, :cve:`2016-6156`, :cve:`2016-6162`, :cve:`2016-6187`, :cve:`2016-6197`, :cve:`2016-6198`, :cve:`2016-6213`, :cve:`2016-6327`, :cve:`2016-6480`, :cve:`2016-6516`, :cve:`2016-6786`, :cve:`2016-6787`, :cve:`2016-6828`, :cve:`2016-7039`, :cve:`2016-7042`, :cve:`2016-7097`, :cve:`2016-7117`, :cve:`2016-7425`, :cve:`2016-7910`, :cve:`2016-7911`, :cve:`2016-7912`, :cve:`2016-7913`, :cve:`2016-7914`, :cve:`2016-7915`, :cve:`2016-7916`, :cve:`2016-7917`, :cve:`2016-8399`, :cve:`2016-8405`, :cve:`2016-8630`, :cve:`2016-8632`, :cve:`2016-8633`, :cve:`2016-8636`, :cve:`2016-8645`, :cve:`2016-8646`, :cve:`2016-8650`, :cve:`2016-8655`, :cve:`2016-8658`, :cve:`2016-8666`, :cve:`2016-9083`, :cve:`2016-9084`, :cve:`2016-9120`, :cve:`2016-9178`, :cve:`2016-9191`, :cve:`2016-9313`, :cve:`2016-9555`, :cve:`2016-9576`, :cve:`2016-9588`, :cve:`2016-9604`, :cve:`2016-9685`, :cve:`2016-9754`, :cve:`2016-9755`, :cve:`2016-9756`, :cve:`2016-9777`, :cve:`2016-9793`, :cve:`2016-9794`, :cve:`2016-9806`, :cve:`2016-9919`, :cve:`2017-0605`, :cve:`2017-0627`, :cve:`2017-0750`, :cve:`2017-0786`, :cve:`2017-0861`, :cve:`2017-1000`, :cve:`2017-1000111`, :cve:`2017-1000112`, :cve:`2017-1000251`, :cve:`2017-1000252`, :cve:`2017-1000253`, :cve:`2017-1000255`, :cve:`2017-1000363`, :cve:`2017-1000364`, :cve:`2017-1000365`, :cve:`2017-1000370`, :cve:`2017-1000371`, :cve:`2017-1000379`, :cve:`2017-1000380`, :cve:`2017-1000405`, :cve:`2017-1000407`, :cve:`2017-1000410`, :cve:`2017-10661`, :cve:`2017-10662`, :cve:`2017-10663`, :cve:`2017-10810`, :cve:`2017-10911`, :cve:`2017-11089`, :cve:`2017-11176`, :cve:`2017-11472`, :cve:`2017-11473`, :cve:`2017-11600`, :cve:`2017-12134`, :cve:`2017-12146`, :cve:`2017-12153`, :cve:`2017-12154`, :cve:`2017-12168`, :cve:`2017-12188`, :cve:`2017-12190`, :cve:`2017-12192`, :cve:`2017-12193`, :cve:`2017-12762`, :cve:`2017-13080`, :cve:`2017-13166`, :cve:`2017-13167`, :cve:`2017-13168`, :cve:`2017-13215`, :cve:`2017-13216`, :cve:`2017-13220`, :cve:`2017-13305`, :cve:`2017-13686`, :cve:`2017-13695`, :cve:`2017-13715`, :cve:`2017-14051`, :cve:`2017-14106`, :cve:`2017-14140`, :cve:`2017-14156`, :cve:`2017-14340`, :cve:`2017-14489`, :cve:`2017-14497`, :cve:`2017-14954`, :cve:`2017-14991`, :cve:`2017-15102`, :cve:`2017-15115`, :cve:`2017-15116`, :cve:`2017-15121`, :cve:`2017-15126`, :cve:`2017-15127`, :cve:`2017-15128`, :cve:`2017-15129`, :cve:`2017-15265`, :cve:`2017-15274`, :cve:`2017-15299`, :cve:`2017-15306`, :cve:`2017-15537`, :cve:`2017-15649`, :cve:`2017-15868`, :cve:`2017-15951`, :cve:`2017-16525`, :cve:`2017-16526`, :cve:`2017-16527`, :cve:`2017-16528`, :cve:`2017-16529`, :cve:`2017-16530`, :cve:`2017-16531`, :cve:`2017-16532`, :cve:`2017-16533`, :cve:`2017-16534`, :cve:`2017-16535`, :cve:`2017-16536`, :cve:`2017-16537`, :cve:`2017-16538`, :cve:`2017-16643`, :cve:`2017-16644`, :cve:`2017-16645`, :cve:`2017-16646`, :cve:`2017-16647`, :cve:`2017-16648`, :cve:`2017-16649`, :cve:`2017-16650`, :cve:`2017-16911`, :cve:`2017-16912`, :cve:`2017-16913`, :cve:`2017-16914`, :cve:`2017-16939`, :cve:`2017-16994`, :cve:`2017-16995`, :cve:`2017-16996`, :cve:`2017-17052`, :cve:`2017-17053`, :cve:`2017-17448`, :cve:`2017-17449`, :cve:`2017-17450`, :cve:`2017-17558`, :cve:`2017-17712`, :cve:`2017-17741`, :cve:`2017-17805`, :cve:`2017-17806`, :cve:`2017-17807`, :cve:`2017-17852`, :cve:`2017-17853`, :cve:`2017-17854`, :cve:`2017-17855`, :cve:`2017-17856`, :cve:`2017-17857`, :cve:`2017-17862`, :cve:`2017-17863`, :cve:`2017-17864`, :cve:`2017-17975`, :cve:`2017-18017`, :cve:`2017-18075`, :cve:`2017-18079`, :cve:`2017-18174`, :cve:`2017-18193`, :cve:`2017-18200`, :cve:`2017-18202`, :cve:`2017-18203`, :cve:`2017-18204`, :cve:`2017-18208`, :cve:`2017-18216`, :cve:`2017-18218`, :cve:`2017-18221`, :cve:`2017-18222`, :cve:`2017-18224`, :cve:`2017-18232`, :cve:`2017-18241`, :cve:`2017-18249`, :cve:`2017-18255`, :cve:`2017-18257`, :cve:`2017-18261`, :cve:`2017-18270`, :cve:`2017-18344`, :cve:`2017-18360`, :cve:`2017-18379`, :cve:`2017-18509`, :cve:`2017-18549`, :cve:`2017-18550`, :cve:`2017-18551`, :cve:`2017-18552`, :cve:`2017-18595`, :cve:`2017-2583`, :cve:`2017-2584`, :cve:`2017-2596`, :cve:`2017-2618`, :cve:`2017-2634`, :cve:`2017-2636`, :cve:`2017-2647`, :cve:`2017-2671`, :cve:`2017-5123`, :cve:`2017-5546`, :cve:`2017-5547`, :cve:`2017-5548`, :cve:`2017-5549`, :cve:`2017-5550`, :cve:`2017-5551`, :cve:`2017-5576`, :cve:`2017-5577`, :cve:`2017-5669`, :cve:`2017-5715`, :cve:`2017-5753`, :cve:`2017-5754`, :cve:`2017-5897`, :cve:`2017-5967`, :cve:`2017-5970`, :cve:`2017-5972`, :cve:`2017-5986`, :cve:`2017-6001`, :cve:`2017-6074`, :cve:`2017-6214`, :cve:`2017-6345`, :cve:`2017-6346`, :cve:`2017-6347`, :cve:`2017-6348`, :cve:`2017-6353`, :cve:`2017-6874`, :cve:`2017-6951`, :cve:`2017-7184`, :cve:`2017-7187`, :cve:`2017-7261`, :cve:`2017-7273`, :cve:`2017-7277`, :cve:`2017-7294`, :cve:`2017-7308`, :cve:`2017-7346`, :cve:`2017-7374`, :cve:`2017-7472`, :cve:`2017-7477`, :cve:`2017-7482`, :cve:`2017-7487`, :cve:`2017-7495`, :cve:`2017-7518`, :cve:`2017-7533`, :cve:`2017-7541`, :cve:`2017-7542`, :cve:`2017-7558`, :cve:`2017-7616`, :cve:`2017-7618`, :cve:`2017-7645`, :cve:`2017-7889`, :cve:`2017-7895`, :cve:`2017-7979`, :cve:`2017-8061`, :cve:`2017-8062`, :cve:`2017-8063`, :cve:`2017-8064`, :cve:`2017-8065`, :cve:`2017-8066`, :cve:`2017-8067`, :cve:`2017-8068`, :cve:`2017-8069`, :cve:`2017-8070`, :cve:`2017-8071`, :cve:`2017-8072`, :cve:`2017-8106`, :cve:`2017-8240`, :cve:`2017-8797`, :cve:`2017-8824`, :cve:`2017-8831`, :cve:`2017-8890`, :cve:`2017-8924`, :cve:`2017-8925`, :cve:`2017-9059`, :cve:`2017-9074`, :cve:`2017-9075`, :cve:`2017-9076`, :cve:`2017-9077`, :cve:`2017-9150`, :cve:`2017-9211`, :cve:`2017-9242`, :cve:`2017-9605`, :cve:`2017-9725`, :cve:`2017-9984`, :cve:`2017-9985`, :cve:`2017-9986`, :cve:`2018-1000004`, :cve:`2018-1000026`, :cve:`2018-1000028`, :cve:`2018-1000199`, :cve:`2018-1000200`, :cve:`2018-1000204`, :cve:`2018-10021`, :cve:`2018-10074`, :cve:`2018-10087`, :cve:`2018-10124`, :cve:`2018-10322`, :cve:`2018-10323`, :cve:`2018-1065`, :cve:`2018-1066`, :cve:`2018-10675`, :cve:`2018-1068`, :cve:`2018-10840`, :cve:`2018-10853`, :cve:`2018-1087`, :cve:`2018-10876`, :cve:`2018-10877`, :cve:`2018-10878`, :cve:`2018-10879`, :cve:`2018-10880`, :cve:`2018-10881`, :cve:`2018-10882`, :cve:`2018-10883`, :cve:`2018-10901`, :cve:`2018-10902`, :cve:`2018-1091`, :cve:`2018-1092`, :cve:`2018-1093`, :cve:`2018-10938`, :cve:`2018-1094`, :cve:`2018-10940`, :cve:`2018-1095`, :cve:`2018-1108`, :cve:`2018-1118`, :cve:`2018-1120`, :cve:`2018-11232`, :cve:`2018-1128`, :cve:`2018-1129`, :cve:`2018-1130`, :cve:`2018-11412`, :cve:`2018-11506`, :cve:`2018-11508`, :cve:`2018-12126`, :cve:`2018-12127`, :cve:`2018-12130`, :cve:`2018-12207`, :cve:`2018-12232`, :cve:`2018-12233`, :cve:`2018-12633`, :cve:`2018-12714`, :cve:`2018-12896`, :cve:`2018-12904`, :cve:`2018-13053`, :cve:`2018-13093`, :cve:`2018-13094`, :cve:`2018-13095`, :cve:`2018-13096`, :cve:`2018-13097`, :cve:`2018-13098`, :cve:`2018-13099`, :cve:`2018-13100`, :cve:`2018-13405`, :cve:`2018-13406`, :cve:`2018-14609`, :cve:`2018-14610`, :cve:`2018-14611`, :cve:`2018-14612`, :cve:`2018-14613`, :cve:`2018-14614`, :cve:`2018-14615`, :cve:`2018-14616`, :cve:`2018-14617`, :cve:`2018-14619`, :cve:`2018-14625`, :cve:`2018-14633`, :cve:`2018-14634`, :cve:`2018-14641`, :cve:`2018-14646`, :cve:`2018-14656`, :cve:`2018-14678`, :cve:`2018-14734`, :cve:`2018-15471`, :cve:`2018-15572`, :cve:`2018-15594`, :cve:`2018-16276`, :cve:`2018-16597`, :cve:`2018-16658`, :cve:`2018-16862`, :cve:`2018-16871`, :cve:`2018-16880`, :cve:`2018-16882`, :cve:`2018-16884`, :cve:`2018-17182`, :cve:`2018-17972`, :cve:`2018-18021`, :cve:`2018-18281`, :cve:`2018-18386`, :cve:`2018-18397`, :cve:`2018-18445`, :cve:`2018-18559`, :cve:`2018-18690`, :cve:`2018-18710`, :cve:`2018-18955`, :cve:`2018-19406`, :cve:`2018-19407`, :cve:`2018-19824`, :cve:`2018-19854`, :cve:`2018-19985`, :cve:`2018-20169`, :cve:`2018-20449`, :cve:`2018-20509`, :cve:`2018-20510`, :cve:`2018-20511`, :cve:`2018-20669`, :cve:`2018-20784`, :cve:`2018-20836`, :cve:`2018-20854`, :cve:`2018-20855`, :cve:`2018-20856`, :cve:`2018-20961`, :cve:`2018-20976`, :cve:`2018-21008`, :cve:`2018-25015`, :cve:`2018-25020`, :cve:`2018-3620`, :cve:`2018-3639`, :cve:`2018-3646`, :cve:`2018-3665`, :cve:`2018-3693`, :cve:`2018-5332`, :cve:`2018-5333`, :cve:`2018-5344`, :cve:`2018-5390`, :cve:`2018-5391`, :cve:`2018-5703`, :cve:`2018-5750`, :cve:`2018-5803`, :cve:`2018-5814`, :cve:`2018-5848`, :cve:`2018-5873`, :cve:`2018-5953`, :cve:`2018-5995`, :cve:`2018-6412`, :cve:`2018-6554`, :cve:`2018-6555`, :cve:`2018-6927`, :cve:`2018-7191`, :cve:`2018-7273`, :cve:`2018-7480`, :cve:`2018-7492`, :cve:`2018-7566`, :cve:`2018-7740`, :cve:`2018-7754`, :cve:`2018-7755`, :cve:`2018-7757`, :cve:`2018-7995`, :cve:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568` 29- linux-yocto/6.1: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125`, :cve_nist:`2013-4127`, :cve_nist:`2013-4129`, :cve_nist:`2013-4162`, :cve_nist:`2013-4163`, :cve_nist:`2013-4205`, :cve_nist:`2013-4220`, :cve_nist:`2013-4247`, :cve_nist:`2013-4254`, :cve_nist:`2013-4270`, :cve_nist:`2013-4299`, :cve_nist:`2013-4300`, :cve_nist:`2013-4312`, :cve_nist:`2013-4343`, :cve_nist:`2013-4345`, :cve_nist:`2013-4348`, :cve_nist:`2013-4350`, :cve_nist:`2013-4387`, :cve_nist:`2013-4470`, :cve_nist:`2013-4483`, :cve_nist:`2013-4511`, :cve_nist:`2013-4512`, :cve_nist:`2013-4513`, :cve_nist:`2013-4514`, :cve_nist:`2013-4515`, :cve_nist:`2013-4516`, :cve_nist:`2013-4563`, :cve_nist:`2013-4579`, :cve_nist:`2013-4587`, :cve_nist:`2013-4588`, :cve_nist:`2013-4591`, :cve_nist:`2013-4592`, :cve_nist:`2013-5634`, :cve_nist:`2013-6282`, :cve_nist:`2013-6367`, :cve_nist:`2013-6368`, :cve_nist:`2013-6376`, :cve_nist:`2013-6378`, :cve_nist:`2013-6380`, :cve_nist:`2013-6381`, :cve_nist:`2013-6382`, :cve_nist:`2013-6383`, :cve_nist:`2013-6431`, :cve_nist:`2013-6432`, :cve_nist:`2013-6885`, :cve_nist:`2013-7026`, :cve_nist:`2013-7027`, :cve_nist:`2013-7263`, :cve_nist:`2013-7264`, :cve_nist:`2013-7265`, :cve_nist:`2013-7266`, :cve_nist:`2013-7267`, :cve_nist:`2013-7268`, :cve_nist:`2013-7269`, :cve_nist:`2013-7270`, :cve_nist:`2013-7271`, :cve_nist:`2013-7281`, :cve_nist:`2013-7339`, :cve_nist:`2013-7348`, :cve_nist:`2013-7421`, :cve_nist:`2013-7446`, :cve_nist:`2013-7470`, :cve_nist:`2014-0038`, :cve_nist:`2014-0049`, :cve_nist:`2014-0055`, :cve_nist:`2014-0069`, :cve_nist:`2014-0077`, :cve_nist:`2014-0100`, :cve_nist:`2014-0101`, :cve_nist:`2014-0102`, :cve_nist:`2014-0131`, :cve_nist:`2014-0155`, :cve_nist:`2014-0181`, :cve_nist:`2014-0196`, :cve_nist:`2014-0203`, :cve_nist:`2014-0205`, :cve_nist:`2014-0206`, :cve_nist:`2014-1438`, :cve_nist:`2014-1444`, :cve_nist:`2014-1445`, :cve_nist:`2014-1446`, :cve_nist:`2014-1690`, :cve_nist:`2014-1737`, :cve_nist:`2014-1738`, :cve_nist:`2014-1739`, :cve_nist:`2014-1874`, :cve_nist:`2014-2038`, :cve_nist:`2014-2039`, :cve_nist:`2014-2309`, :cve_nist:`2014-2523`, :cve_nist:`2014-2568`, :cve_nist:`2014-2580`, :cve_nist:`2014-2672`, :cve_nist:`2014-2673`, :cve_nist:`2014-2678`, :cve_nist:`2014-2706`, :cve_nist:`2014-2739`, :cve_nist:`2014-2851`, :cve_nist:`2014-2889`, :cve_nist:`2014-3122`, :cve_nist:`2014-3144`, :cve_nist:`2014-3145`, :cve_nist:`2014-3153`, :cve_nist:`2014-3180`, :cve_nist:`2014-3181`, :cve_nist:`2014-3182`, :cve_nist:`2014-3183`, :cve_nist:`2014-3184`, :cve_nist:`2014-3185`, :cve_nist:`2014-3186`, :cve_nist:`2014-3534`, :cve_nist:`2014-3535`, :cve_nist:`2014-3601`, :cve_nist:`2014-3610`, :cve_nist:`2014-3611`, :cve_nist:`2014-3631`, :cve_nist:`2014-3645`, :cve_nist:`2014-3646`, :cve_nist:`2014-3647`, :cve_nist:`2014-3673`, :cve_nist:`2014-3687`, :cve_nist:`2014-3688`, :cve_nist:`2014-3690`, :cve_nist:`2014-3917`, :cve_nist:`2014-3940`, :cve_nist:`2014-4014`, :cve_nist:`2014-4027`, :cve_nist:`2014-4157`, :cve_nist:`2014-4171`, :cve_nist:`2014-4508`, :cve_nist:`2014-4608`, :cve_nist:`2014-4611`, :cve_nist:`2014-4652`, :cve_nist:`2014-4653`, :cve_nist:`2014-4654`, :cve_nist:`2014-4655`, :cve_nist:`2014-4656`, :cve_nist:`2014-4667`, :cve_nist:`2014-4699`, :cve_nist:`2014-4943`, :cve_nist:`2014-5045`, :cve_nist:`2014-5077`, :cve_nist:`2014-5206`, :cve_nist:`2014-5207`, :cve_nist:`2014-5471`, :cve_nist:`2014-5472`, :cve_nist:`2014-6410`, :cve_nist:`2014-6416`, :cve_nist:`2014-6417`, :cve_nist:`2014-6418`, :cve_nist:`2014-7145`, :cve_nist:`2014-7283`, :cve_nist:`2014-7284`, :cve_nist:`2014-7822`, :cve_nist:`2014-7825`, :cve_nist:`2014-7826`, :cve_nist:`2014-7841`, :cve_nist:`2014-7842`, :cve_nist:`2014-7843`, :cve_nist:`2014-7970`, :cve_nist:`2014-7975`, :cve_nist:`2014-8086`, :cve_nist:`2014-8133`, :cve_nist:`2014-8134`, :cve_nist:`2014-8159`, :cve_nist:`2014-8160`, :cve_nist:`2014-8171`, :cve_nist:`2014-8172`, :cve_nist:`2014-8173`, :cve_nist:`2014-8369`, :cve_nist:`2014-8480`, :cve_nist:`2014-8481`, :cve_nist:`2014-8559`, :cve_nist:`2014-8709`, :cve_nist:`2014-8884`, :cve_nist:`2014-8989`, :cve_nist:`2014-9090`, :cve_nist:`2014-9322`, :cve_nist:`2014-9419`, :cve_nist:`2014-9420`, :cve_nist:`2014-9428`, :cve_nist:`2014-9529`, :cve_nist:`2014-9584`, :cve_nist:`2014-9585`, :cve_nist:`2014-9644`, :cve_nist:`2014-9683`, :cve_nist:`2014-9710`, :cve_nist:`2014-9715`, :cve_nist:`2014-9717`, :cve_nist:`2014-9728`, :cve_nist:`2014-9729`, :cve_nist:`2014-9730`, :cve_nist:`2014-9731`, :cve_nist:`2014-9803`, :cve_nist:`2014-9870`, :cve_nist:`2014-9888`, :cve_nist:`2014-9895`, :cve_nist:`2014-9903`, :cve_nist:`2014-9904`, :cve_nist:`2014-9914`, :cve_nist:`2014-9922`, :cve_nist:`2014-9940`, :cve_nist:`2015-0239`, :cve_nist:`2015-0274`, :cve_nist:`2015-0275`, :cve_nist:`2015-1333`, :cve_nist:`2015-1339`, :cve_nist:`2015-1350`, :cve_nist:`2015-1420`, :cve_nist:`2015-1421`, :cve_nist:`2015-1465`, :cve_nist:`2015-1573`, :cve_nist:`2015-1593`, :cve_nist:`2015-1805`, :cve_nist:`2015-2041`, :cve_nist:`2015-2042`, :cve_nist:`2015-2150`, :cve_nist:`2015-2666`, :cve_nist:`2015-2672`, :cve_nist:`2015-2686`, :cve_nist:`2015-2830`, :cve_nist:`2015-2922`, :cve_nist:`2015-2925`, :cve_nist:`2015-3212`, :cve_nist:`2015-3214`, :cve_nist:`2015-3288`, :cve_nist:`2015-3290`, :cve_nist:`2015-3291`, :cve_nist:`2015-3331`, :cve_nist:`2015-3339`, :cve_nist:`2015-3636`, :cve_nist:`2015-4001`, :cve_nist:`2015-4002`, :cve_nist:`2015-4003`, :cve_nist:`2015-4004`, :cve_nist:`2015-4036`, :cve_nist:`2015-4167`, :cve_nist:`2015-4170`, :cve_nist:`2015-4176`, :cve_nist:`2015-4177`, :cve_nist:`2015-4178`, :cve_nist:`2015-4692`, :cve_nist:`2015-4700`, :cve_nist:`2015-5156`, :cve_nist:`2015-5157`, :cve_nist:`2015-5257`, :cve_nist:`2015-5283`, :cve_nist:`2015-5307`, :cve_nist:`2015-5327`, :cve_nist:`2015-5364`, :cve_nist:`2015-5366`, :cve_nist:`2015-5697`, :cve_nist:`2015-5706`, :cve_nist:`2015-5707`, :cve_nist:`2015-6252`, :cve_nist:`2015-6526`, :cve_nist:`2015-6937`, :cve_nist:`2015-7509`, :cve_nist:`2015-7513`, :cve_nist:`2015-7515`, :cve_nist:`2015-7550`, :cve_nist:`2015-7566`, :cve_nist:`2015-7613`, :cve_nist:`2015-7799`, :cve_nist:`2015-7833`, :cve_nist:`2015-7872`, :cve_nist:`2015-7884`, :cve_nist:`2015-7885`, :cve_nist:`2015-7990`, :cve_nist:`2015-8104`, :cve_nist:`2015-8215`, :cve_nist:`2015-8324`, :cve_nist:`2015-8374`, :cve_nist:`2015-8539`, :cve_nist:`2015-8543`, :cve_nist:`2015-8550`, :cve_nist:`2015-8551`, :cve_nist:`2015-8552`, :cve_nist:`2015-8553`, :cve_nist:`2015-8569`, :cve_nist:`2015-8575`, :cve_nist:`2015-8660`, :cve_nist:`2015-8709`, :cve_nist:`2015-8746`, :cve_nist:`2015-8767`, :cve_nist:`2015-8785`, :cve_nist:`2015-8787`, :cve_nist:`2015-8812`, :cve_nist:`2015-8816`, :cve_nist:`2015-8830`, :cve_nist:`2015-8839`, :cve_nist:`2015-8844`, :cve_nist:`2015-8845`, :cve_nist:`2015-8950`, :cve_nist:`2015-8952`, :cve_nist:`2015-8953`, :cve_nist:`2015-8955`, :cve_nist:`2015-8956`, :cve_nist:`2015-8961`, :cve_nist:`2015-8962`, :cve_nist:`2015-8963`, :cve_nist:`2015-8964`, :cve_nist:`2015-8966`, :cve_nist:`2015-8967`, :cve_nist:`2015-8970`, :cve_nist:`2015-9004`, :cve_nist:`2015-9016`, :cve_nist:`2015-9289`, :cve_nist:`2016-0617`, :cve_nist:`2016-0723`, :cve_nist:`2016-0728`, :cve_nist:`2016-0758`, :cve_nist:`2016-0821`, :cve_nist:`2016-0823`, :cve_nist:`2016-10044`, :cve_nist:`2016-10088`, :cve_nist:`2016-10147`, :cve_nist:`2016-10150`, :cve_nist:`2016-10153`, :cve_nist:`2016-10154`, :cve_nist:`2016-10200`, :cve_nist:`2016-10208`, :cve_nist:`2016-10229`, :cve_nist:`2016-10318`, :cve_nist:`2016-10723`, :cve_nist:`2016-10741`, :cve_nist:`2016-10764`, :cve_nist:`2016-10905`, :cve_nist:`2016-10906`, :cve_nist:`2016-10907`, :cve_nist:`2016-1237`, :cve_nist:`2016-1575`, :cve_nist:`2016-1576`, :cve_nist:`2016-1583`, :cve_nist:`2016-2053`, :cve_nist:`2016-2069`, :cve_nist:`2016-2070`, :cve_nist:`2016-2085`, :cve_nist:`2016-2117`, :cve_nist:`2016-2143`, :cve_nist:`2016-2184`, :cve_nist:`2016-2185`, :cve_nist:`2016-2186`, :cve_nist:`2016-2187`, :cve_nist:`2016-2188`, :cve_nist:`2016-2383`, :cve_nist:`2016-2384`, :cve_nist:`2016-2543`, :cve_nist:`2016-2544`, :cve_nist:`2016-2545`, :cve_nist:`2016-2546`, :cve_nist:`2016-2547`, :cve_nist:`2016-2548`, :cve_nist:`2016-2549`, :cve_nist:`2016-2550`, :cve_nist:`2016-2782`, :cve_nist:`2016-2847`, :cve_nist:`2016-3044`, :cve_nist:`2016-3070`, :cve_nist:`2016-3134`, :cve_nist:`2016-3135`, :cve_nist:`2016-3136`, :cve_nist:`2016-3137`, :cve_nist:`2016-3138`, :cve_nist:`2016-3139`, :cve_nist:`2016-3140`, :cve_nist:`2016-3156`, :cve_nist:`2016-3157`, :cve_nist:`2016-3672`, :cve_nist:`2016-3689`, :cve_nist:`2016-3713`, :cve_nist:`2016-3841`, :cve_nist:`2016-3857`, :cve_nist:`2016-3951`, :cve_nist:`2016-3955`, :cve_nist:`2016-3961`, :cve_nist:`2016-4440`, :cve_nist:`2016-4470`, :cve_nist:`2016-4482`, :cve_nist:`2016-4485`, :cve_nist:`2016-4486`, :cve_nist:`2016-4557`, :cve_nist:`2016-4558`, :cve_nist:`2016-4565`, :cve_nist:`2016-4568`, :cve_nist:`2016-4569`, :cve_nist:`2016-4578`, :cve_nist:`2016-4580`, :cve_nist:`2016-4581`, :cve_nist:`2016-4794`, :cve_nist:`2016-4805`, :cve_nist:`2016-4913`, :cve_nist:`2016-4951`, :cve_nist:`2016-4997`, :cve_nist:`2016-4998`, :cve_nist:`2016-5195`, :cve_nist:`2016-5243`, :cve_nist:`2016-5244`, :cve_nist:`2016-5400`, :cve_nist:`2016-5412`, :cve_nist:`2016-5696`, :cve_nist:`2016-5728`, :cve_nist:`2016-5828`, :cve_nist:`2016-5829`, :cve_nist:`2016-6130`, :cve_nist:`2016-6136`, :cve_nist:`2016-6156`, :cve_nist:`2016-6162`, :cve_nist:`2016-6187`, :cve_nist:`2016-6197`, :cve_nist:`2016-6198`, :cve_nist:`2016-6213`, :cve_nist:`2016-6327`, :cve_nist:`2016-6480`, :cve_nist:`2016-6516`, :cve_nist:`2016-6786`, :cve_nist:`2016-6787`, :cve_nist:`2016-6828`, :cve_nist:`2016-7039`, :cve_nist:`2016-7042`, :cve_nist:`2016-7097`, :cve_nist:`2016-7117`, :cve_nist:`2016-7425`, :cve_nist:`2016-7910`, :cve_nist:`2016-7911`, :cve_nist:`2016-7912`, :cve_nist:`2016-7913`, :cve_nist:`2016-7914`, :cve_nist:`2016-7915`, :cve_nist:`2016-7916`, :cve_nist:`2016-7917`, :cve_nist:`2016-8399`, :cve_nist:`2016-8405`, :cve_nist:`2016-8630`, :cve_nist:`2016-8632`, :cve_nist:`2016-8633`, :cve_nist:`2016-8636`, :cve_nist:`2016-8645`, :cve_nist:`2016-8646`, :cve_nist:`2016-8650`, :cve_nist:`2016-8655`, :cve_nist:`2016-8658`, :cve_nist:`2016-8666`, :cve_nist:`2016-9083`, :cve_nist:`2016-9084`, :cve_nist:`2016-9120`, :cve_nist:`2016-9178`, :cve_nist:`2016-9191`, :cve_nist:`2016-9313`, :cve_nist:`2016-9555`, :cve_nist:`2016-9576`, :cve_nist:`2016-9588`, :cve_nist:`2016-9604`, :cve_nist:`2016-9685`, :cve_nist:`2016-9754`, :cve_nist:`2016-9755`, :cve_nist:`2016-9756`, :cve_nist:`2016-9777`, :cve_nist:`2016-9793`, :cve_nist:`2016-9794`, :cve_nist:`2016-9806`, :cve_nist:`2016-9919`, :cve_nist:`2017-0605`, :cve_nist:`2017-0627`, :cve_nist:`2017-0750`, :cve_nist:`2017-0786`, :cve_nist:`2017-0861`, :cve_nist:`2017-1000`, :cve_nist:`2017-1000111`, :cve_nist:`2017-1000112`, :cve_nist:`2017-1000251`, :cve_nist:`2017-1000252`, :cve_nist:`2017-1000253`, :cve_nist:`2017-1000255`, :cve_nist:`2017-1000363`, :cve_nist:`2017-1000364`, :cve_nist:`2017-1000365`, :cve_nist:`2017-1000370`, :cve_nist:`2017-1000371`, :cve_nist:`2017-1000379`, :cve_nist:`2017-1000380`, :cve_nist:`2017-1000405`, :cve_nist:`2017-1000407`, :cve_nist:`2017-1000410`, :cve_nist:`2017-10661`, :cve_nist:`2017-10662`, :cve_nist:`2017-10663`, :cve_nist:`2017-10810`, :cve_nist:`2017-10911`, :cve_nist:`2017-11089`, :cve_nist:`2017-11176`, :cve_nist:`2017-11472`, :cve_nist:`2017-11473`, :cve_nist:`2017-11600`, :cve_nist:`2017-12134`, :cve_nist:`2017-12146`, :cve_nist:`2017-12153`, :cve_nist:`2017-12154`, :cve_nist:`2017-12168`, :cve_nist:`2017-12188`, :cve_nist:`2017-12190`, :cve_nist:`2017-12192`, :cve_nist:`2017-12193`, :cve_nist:`2017-12762`, :cve_nist:`2017-13080`, :cve_nist:`2017-13166`, :cve_nist:`2017-13167`, :cve_nist:`2017-13168`, :cve_nist:`2017-13215`, :cve_nist:`2017-13216`, :cve_nist:`2017-13220`, :cve_nist:`2017-13305`, :cve_nist:`2017-13686`, :cve_nist:`2017-13695`, :cve_nist:`2017-13715`, :cve_nist:`2017-14051`, :cve_nist:`2017-14106`, :cve_nist:`2017-14140`, :cve_nist:`2017-14156`, :cve_nist:`2017-14340`, :cve_nist:`2017-14489`, :cve_nist:`2017-14497`, :cve_nist:`2017-14954`, :cve_nist:`2017-14991`, :cve_nist:`2017-15102`, :cve_nist:`2017-15115`, :cve_nist:`2017-15116`, :cve_nist:`2017-15121`, :cve_nist:`2017-15126`, :cve_nist:`2017-15127`, :cve_nist:`2017-15128`, :cve_nist:`2017-15129`, :cve_nist:`2017-15265`, :cve_nist:`2017-15274`, :cve_nist:`2017-15299`, :cve_nist:`2017-15306`, :cve_nist:`2017-15537`, :cve_nist:`2017-15649`, :cve_nist:`2017-15868`, :cve_nist:`2017-15951`, :cve_nist:`2017-16525`, :cve_nist:`2017-16526`, :cve_nist:`2017-16527`, :cve_nist:`2017-16528`, :cve_nist:`2017-16529`, :cve_nist:`2017-16530`, :cve_nist:`2017-16531`, :cve_nist:`2017-16532`, :cve_nist:`2017-16533`, :cve_nist:`2017-16534`, :cve_nist:`2017-16535`, :cve_nist:`2017-16536`, :cve_nist:`2017-16537`, :cve_nist:`2017-16538`, :cve_nist:`2017-16643`, :cve_nist:`2017-16644`, :cve_nist:`2017-16645`, :cve_nist:`2017-16646`, :cve_nist:`2017-16647`, :cve_nist:`2017-16648`, :cve_nist:`2017-16649`, :cve_nist:`2017-16650`, :cve_nist:`2017-16911`, :cve_nist:`2017-16912`, :cve_nist:`2017-16913`, :cve_nist:`2017-16914`, :cve_nist:`2017-16939`, :cve_nist:`2017-16994`, :cve_nist:`2017-16995`, :cve_nist:`2017-16996`, :cve_nist:`2017-17052`, :cve_nist:`2017-17053`, :cve_nist:`2017-17448`, :cve_nist:`2017-17449`, :cve_nist:`2017-17450`, :cve_nist:`2017-17558`, :cve_nist:`2017-17712`, :cve_nist:`2017-17741`, :cve_nist:`2017-17805`, :cve_nist:`2017-17806`, :cve_nist:`2017-17807`, :cve_nist:`2017-17852`, :cve_nist:`2017-17853`, :cve_nist:`2017-17854`, :cve_nist:`2017-17855`, :cve_nist:`2017-17856`, :cve_nist:`2017-17857`, :cve_nist:`2017-17862`, :cve_nist:`2017-17863`, :cve_nist:`2017-17864`, :cve_nist:`2017-17975`, :cve_nist:`2017-18017`, :cve_nist:`2017-18075`, :cve_nist:`2017-18079`, :cve_nist:`2017-18174`, :cve_nist:`2017-18193`, :cve_nist:`2017-18200`, :cve_nist:`2017-18202`, :cve_nist:`2017-18203`, :cve_nist:`2017-18204`, :cve_nist:`2017-18208`, :cve_nist:`2017-18216`, :cve_nist:`2017-18218`, :cve_nist:`2017-18221`, :cve_nist:`2017-18222`, :cve_nist:`2017-18224`, :cve_nist:`2017-18232`, :cve_nist:`2017-18241`, :cve_nist:`2017-18249`, :cve_nist:`2017-18255`, :cve_nist:`2017-18257`, :cve_nist:`2017-18261`, :cve_nist:`2017-18270`, :cve_nist:`2017-18344`, :cve_nist:`2017-18360`, :cve_nist:`2017-18379`, :cve_nist:`2017-18509`, :cve_nist:`2017-18549`, :cve_nist:`2017-18550`, :cve_nist:`2017-18551`, :cve_nist:`2017-18552`, :cve_nist:`2017-18595`, :cve_nist:`2017-2583`, :cve_nist:`2017-2584`, :cve_nist:`2017-2596`, :cve_nist:`2017-2618`, :cve_nist:`2017-2634`, :cve_nist:`2017-2636`, :cve_nist:`2017-2647`, :cve_nist:`2017-2671`, :cve_nist:`2017-5123`, :cve_nist:`2017-5546`, :cve_nist:`2017-5547`, :cve_nist:`2017-5548`, :cve_nist:`2017-5549`, :cve_nist:`2017-5550`, :cve_nist:`2017-5551`, :cve_nist:`2017-5576`, :cve_nist:`2017-5577`, :cve_nist:`2017-5669`, :cve_nist:`2017-5715`, :cve_nist:`2017-5753`, :cve_nist:`2017-5754`, :cve_nist:`2017-5897`, :cve_nist:`2017-5967`, :cve_nist:`2017-5970`, :cve_nist:`2017-5972`, :cve_nist:`2017-5986`, :cve_nist:`2017-6001`, :cve_nist:`2017-6074`, :cve_nist:`2017-6214`, :cve_nist:`2017-6345`, :cve_nist:`2017-6346`, :cve_nist:`2017-6347`, :cve_nist:`2017-6348`, :cve_nist:`2017-6353`, :cve_nist:`2017-6874`, :cve_nist:`2017-6951`, :cve_nist:`2017-7184`, :cve_nist:`2017-7187`, :cve_nist:`2017-7261`, :cve_nist:`2017-7273`, :cve_nist:`2017-7277`, :cve_nist:`2017-7294`, :cve_nist:`2017-7308`, :cve_nist:`2017-7346`, :cve_nist:`2017-7374`, :cve_nist:`2017-7472`, :cve_nist:`2017-7477`, :cve_nist:`2017-7482`, :cve_nist:`2017-7487`, :cve_nist:`2017-7495`, :cve_nist:`2017-7518`, :cve_nist:`2017-7533`, :cve_nist:`2017-7541`, :cve_nist:`2017-7542`, :cve_nist:`2017-7558`, :cve_nist:`2017-7616`, :cve_nist:`2017-7618`, :cve_nist:`2017-7645`, :cve_nist:`2017-7889`, :cve_nist:`2017-7895`, :cve_nist:`2017-7979`, :cve_nist:`2017-8061`, :cve_nist:`2017-8062`, :cve_nist:`2017-8063`, :cve_nist:`2017-8064`, :cve_nist:`2017-8065`, :cve_nist:`2017-8066`, :cve_nist:`2017-8067`, :cve_nist:`2017-8068`, :cve_nist:`2017-8069`, :cve_nist:`2017-8070`, :cve_nist:`2017-8071`, :cve_nist:`2017-8072`, :cve_nist:`2017-8106`, :cve_nist:`2017-8240`, :cve_nist:`2017-8797`, :cve_nist:`2017-8824`, :cve_nist:`2017-8831`, :cve_nist:`2017-8890`, :cve_nist:`2017-8924`, :cve_nist:`2017-8925`, :cve_nist:`2017-9059`, :cve_nist:`2017-9074`, :cve_nist:`2017-9075`, :cve_nist:`2017-9076`, :cve_nist:`2017-9077`, :cve_nist:`2017-9150`, :cve_nist:`2017-9211`, :cve_nist:`2017-9242`, :cve_nist:`2017-9605`, :cve_nist:`2017-9725`, :cve_nist:`2017-9984`, :cve_nist:`2017-9985`, :cve_nist:`2017-9986`, :cve_nist:`2018-1000004`, :cve_nist:`2018-1000026`, :cve_nist:`2018-1000028`, :cve_nist:`2018-1000199`, :cve_nist:`2018-1000200`, :cve_nist:`2018-1000204`, :cve_nist:`2018-10021`, :cve_nist:`2018-10074`, :cve_nist:`2018-10087`, :cve_nist:`2018-10124`, :cve_nist:`2018-10322`, :cve_nist:`2018-10323`, :cve_nist:`2018-1065`, :cve_nist:`2018-1066`, :cve_nist:`2018-10675`, :cve_nist:`2018-1068`, :cve_nist:`2018-10840`, :cve_nist:`2018-10853`, :cve_nist:`2018-1087`, :cve_nist:`2018-10876`, :cve_nist:`2018-10877`, :cve_nist:`2018-10878`, :cve_nist:`2018-10879`, :cve_nist:`2018-10880`, :cve_nist:`2018-10881`, :cve_nist:`2018-10882`, :cve_nist:`2018-10883`, :cve_nist:`2018-10901`, :cve_nist:`2018-10902`, :cve_nist:`2018-1091`, :cve_nist:`2018-1092`, :cve_nist:`2018-1093`, :cve_nist:`2018-10938`, :cve_nist:`2018-1094`, :cve_nist:`2018-10940`, :cve_nist:`2018-1095`, :cve_nist:`2018-1108`, :cve_nist:`2018-1118`, :cve_nist:`2018-1120`, :cve_nist:`2018-11232`, :cve_nist:`2018-1128`, :cve_nist:`2018-1129`, :cve_nist:`2018-1130`, :cve_nist:`2018-11412`, :cve_nist:`2018-11506`, :cve_nist:`2018-11508`, :cve_nist:`2018-12126`, :cve_nist:`2018-12127`, :cve_nist:`2018-12130`, :cve_nist:`2018-12207`, :cve_nist:`2018-12232`, :cve_nist:`2018-12233`, :cve_nist:`2018-12633`, :cve_nist:`2018-12714`, :cve_nist:`2018-12896`, :cve_nist:`2018-12904`, :cve_nist:`2018-13053`, :cve_nist:`2018-13093`, :cve_nist:`2018-13094`, :cve_nist:`2018-13095`, :cve_nist:`2018-13096`, :cve_nist:`2018-13097`, :cve_nist:`2018-13098`, :cve_nist:`2018-13099`, :cve_nist:`2018-13100`, :cve_nist:`2018-13405`, :cve_nist:`2018-13406`, :cve_nist:`2018-14609`, :cve_nist:`2018-14610`, :cve_nist:`2018-14611`, :cve_nist:`2018-14612`, :cve_nist:`2018-14613`, :cve_nist:`2018-14614`, :cve_nist:`2018-14615`, :cve_nist:`2018-14616`, :cve_nist:`2018-14617`, :cve_nist:`2018-14619`, :cve_nist:`2018-14625`, :cve_nist:`2018-14633`, :cve_nist:`2018-14634`, :cve_nist:`2018-14641`, :cve_nist:`2018-14646`, :cve_nist:`2018-14656`, :cve_nist:`2018-14678`, :cve_nist:`2018-14734`, :cve_nist:`2018-15471`, :cve_nist:`2018-15572`, :cve_nist:`2018-15594`, :cve_nist:`2018-16276`, :cve_nist:`2018-16597`, :cve_nist:`2018-16658`, :cve_nist:`2018-16862`, :cve_nist:`2018-16871`, :cve_nist:`2018-16880`, :cve_nist:`2018-16882`, :cve_nist:`2018-16884`, :cve_nist:`2018-17182`, :cve_nist:`2018-17972`, :cve_nist:`2018-18021`, :cve_nist:`2018-18281`, :cve_nist:`2018-18386`, :cve_nist:`2018-18397`, :cve_nist:`2018-18445`, :cve_nist:`2018-18559`, :cve_nist:`2018-18690`, :cve_nist:`2018-18710`, :cve_nist:`2018-18955`, :cve_nist:`2018-19406`, :cve_nist:`2018-19407`, :cve_nist:`2018-19824`, :cve_nist:`2018-19854`, :cve_nist:`2018-19985`, :cve_nist:`2018-20169`, :cve_nist:`2018-20449`, :cve_nist:`2018-20509`, :cve_nist:`2018-20510`, :cve_nist:`2018-20511`, :cve_nist:`2018-20669`, :cve_nist:`2018-20784`, :cve_nist:`2018-20836`, :cve_nist:`2018-20854`, :cve_nist:`2018-20855`, :cve_nist:`2018-20856`, :cve_nist:`2018-20961`, :cve_nist:`2018-20976`, :cve_nist:`2018-21008`, :cve_nist:`2018-25015`, :cve_nist:`2018-25020`, :cve_nist:`2018-3620`, :cve_nist:`2018-3639`, :cve_nist:`2018-3646`, :cve_nist:`2018-3665`, :cve_nist:`2018-3693`, :cve_nist:`2018-5332`, :cve_nist:`2018-5333`, :cve_nist:`2018-5344`, :cve_nist:`2018-5390`, :cve_nist:`2018-5391`, :cve_nist:`2018-5703`, :cve_nist:`2018-5750`, :cve_nist:`2018-5803`, :cve_nist:`2018-5814`, :cve_nist:`2018-5848`, :cve_nist:`2018-5873`, :cve_nist:`2018-5953`, :cve_nist:`2018-5995`, :cve_nist:`2018-6412`, :cve_nist:`2018-6554`, :cve_nist:`2018-6555`, :cve_nist:`2018-6927`, :cve_nist:`2018-7191`, :cve_nist:`2018-7273`, :cve_nist:`2018-7480`, :cve_nist:`2018-7492`, :cve_nist:`2018-7566`, :cve_nist:`2018-7740`, :cve_nist:`2018-7754`, :cve_nist:`2018-7755`, :cve_nist:`2018-7757`, :cve_nist:`2018-7995`, :cve_nist:`2018-8043`, :cve_mitre:`2018-8087`, :cve_mitre:`2018-8781`, :cve_mitre:`2018-8822`, :cve_mitre:`2018-8897`, :cve_mitre:`2018-9363`, :cve_mitre:`2018-9385`, :cve_mitre:`2018-9415`, :cve_mitre:`2018-9422`, :cve_mitre:`2018-9465`, :cve_mitre:`2018-9516`, :cve_mitre:`2018-9517`, :cve_mitre:`2018-9518` and :cve_mitre:`2018-9568`
30- linux-yocto/6.1 (Continued): Ignore :cve:`2019-0136`, :cve:`2019-0145`, :cve:`2019-0146`, :cve:`2019-0147`, :cve:`2019-0148`, :cve:`2019-0149`, :cve:`2019-0154`, :cve:`2019-0155`, :cve:`2019-10124`, :cve:`2019-10125`, :cve:`2019-10126`, :cve:`2019-10142`, :cve:`2019-10207`, :cve:`2019-10220`, :cve:`2019-10638`, :cve:`2019-10639`, :cve:`2019-11085`, :cve:`2019-11091`, :cve:`2019-11135`, :cve:`2019-11190`, :cve:`2019-11191`, :cve:`2019-1125`, :cve:`2019-11477`, :cve:`2019-11478`, :cve:`2019-11479`, :cve:`2019-11486`, :cve:`2019-11487`, :cve:`2019-11599`, :cve:`2019-11683`, :cve:`2019-11810`, :cve:`2019-11811`, :cve:`2019-11815`, :cve:`2019-11833`, :cve:`2019-11884`, :cve:`2019-12378`, :cve:`2019-12379`, :cve:`2019-12380`, :cve:`2019-12381`, :cve:`2019-12382`, :cve:`2019-12454`, :cve:`2019-12455`, :cve:`2019-12614`, :cve:`2019-12615`, :cve:`2019-12817`, :cve:`2019-12818`, :cve:`2019-12819`, :cve:`2019-12881`, :cve:`2019-12984`, :cve:`2019-13233`, :cve:`2019-13272`, :cve:`2019-13631`, :cve:`2019-13648`, :cve:`2019-14283`, :cve:`2019-14284`, :cve:`2019-14615`, :cve:`2019-14763`, :cve:`2019-14814`, :cve:`2019-14815`, :cve:`2019-14816`, :cve:`2019-14821`, :cve:`2019-14835`, :cve:`2019-14895`, :cve:`2019-14896`, :cve:`2019-14897`, :cve:`2019-14901`, :cve:`2019-15030`, :cve:`2019-15031`, :cve:`2019-15090`, :cve:`2019-15098`, :cve:`2019-15099`, :cve:`2019-15117`, :cve:`2019-15118`, :cve:`2019-15211`, :cve:`2019-15212`, :cve:`2019-15213`, :cve:`2019-15214`, :cve:`2019-15215`, :cve:`2019-15216`, :cve:`2019-15217`, :cve:`2019-15218`, :cve:`2019-15219`, :cve:`2019-15220`, :cve:`2019-15221`, :cve:`2019-15222`, :cve:`2019-15223`, :cve:`2019-15291`, :cve:`2019-15292`, :cve:`2019-15504`, :cve:`2019-15505`, :cve:`2019-15538`, :cve:`2019-15666`, :cve:`2019-15794`, :cve:`2019-15807`, :cve:`2019-15916`, :cve:`2019-15917`, :cve:`2019-15918`, :cve:`2019-15919`, :cve:`2019-15920`, :cve:`2019-15921`, :cve:`2019-15922`, :cve:`2019-15923`, :cve:`2019-15924`, :cve:`2019-15925`, :cve:`2019-15926`, :cve:`2019-15927`, :cve:`2019-16229`, :cve:`2019-16230`, :cve:`2019-16231`, :cve:`2019-16232`, :cve:`2019-16233`, :cve:`2019-16234`, :cve:`2019-16413`, :cve:`2019-16714`, :cve:`2019-16746`, :cve:`2019-16921`, :cve:`2019-16994`, :cve:`2019-16995`, :cve:`2019-17052`, :cve:`2019-17053`, :cve:`2019-17054`, :cve:`2019-17055`, :cve:`2019-17056`, :cve:`2019-17075`, :cve:`2019-17133`, :cve:`2019-17351`, :cve:`2019-17666`, :cve:`2019-18198`, :cve:`2019-18282`, :cve:`2019-18660`, :cve:`2019-18675`, :cve:`2019-18683`, :cve:`2019-18786`, :cve:`2019-18805`, :cve:`2019-18806`, :cve:`2019-18807`, :cve:`2019-18808`, :cve:`2019-18809`, :cve:`2019-18810`, :cve:`2019-18811`, :cve:`2019-18812`, :cve:`2019-18813`, :cve:`2019-18814`, :cve:`2019-18885`, :cve:`2019-19036`, :cve:`2019-19037`, :cve:`2019-19039`, :cve:`2019-19043`, :cve:`2019-19044`, :cve:`2019-19045`, :cve:`2019-19046`, :cve:`2019-19047`, :cve:`2019-19048`, :cve:`2019-19049`, :cve:`2019-19050`, :cve:`2019-19051`, :cve:`2019-19052`, :cve:`2019-19053`, :cve:`2019-19054`, :cve:`2019-19055`, :cve:`2019-19056`, :cve:`2019-19057`, :cve:`2019-19058`, :cve:`2019-19059`, :cve:`2019-19060`, :cve:`2019-19061`, :cve:`2019-19062`, :cve:`2019-19063`, :cve:`2019-19064`, :cve:`2019-19065`, :cve:`2019-19066`, :cve:`2019-19067`, :cve:`2019-19068`, :cve:`2019-19069`, :cve:`2019-19070`, :cve:`2019-19071`, :cve:`2019-19072`, :cve:`2019-19073`, :cve:`2019-19074`, :cve:`2019-19075`, :cve:`2019-19076`, :cve:`2019-19077`, :cve:`2019-19078`, :cve:`2019-19079`, :cve:`2019-19080`, :cve:`2019-19081`, :cve:`2019-19082`, :cve:`2019-19083`, :cve:`2019-19227`, :cve:`2019-19241`, :cve:`2019-19252`, :cve:`2019-19318`, :cve:`2019-19319`, :cve:`2019-19332`, :cve:`2019-19338`, :cve:`2019-19377`, :cve:`2019-19447`, :cve:`2019-19448`, :cve:`2019-19449`, :cve:`2019-19462`, :cve:`2019-19523`, :cve:`2019-19524`, :cve:`2019-19525`, :cve:`2019-19526`, :cve:`2019-19527`, :cve:`2019-19528`, :cve:`2019-19529`, :cve:`2019-19530`, :cve:`2019-19531`, :cve:`2019-19532`, :cve:`2019-19533`, :cve:`2019-19534`, :cve:`2019-19535`, :cve:`2019-19536`, :cve:`2019-19537`, :cve:`2019-19543`, :cve:`2019-19602`, :cve:`2019-19767`, :cve:`2019-19768`, :cve:`2019-19769`, :cve:`2019-19770`, :cve:`2019-19807`, :cve:`2019-19813`, :cve:`2019-19815`, :cve:`2019-19816`, :cve:`2019-19922`, :cve:`2019-19927`, :cve:`2019-19947`, :cve:`2019-19965`, :cve:`2019-19966`, :cve:`2019-1999`, :cve:`2019-20054`, :cve:`2019-20095`, :cve:`2019-20096`, :cve:`2019-2024`, :cve:`2019-2025`, :cve:`2019-20422`, :cve:`2019-2054`, :cve:`2019-20636`, :cve:`2019-20806`, :cve:`2019-20810`, :cve:`2019-20811`, :cve:`2019-20812`, :cve:`2019-20908`, :cve:`2019-20934`, :cve:`2019-2101`, :cve:`2019-2181`, :cve:`2019-2182`, :cve:`2019-2213`, :cve:`2019-2214`, :cve:`2019-2215`, :cve:`2019-25044`, :cve:`2019-25045`, :cve:`2019-3016`, :cve:`2019-3459`, :cve:`2019-3460`, :cve:`2019-3701`, :cve:`2019-3819`, :cve:`2019-3837`, :cve:`2019-3846`, :cve:`2019-3874`, :cve:`2019-3882`, :cve:`2019-3887`, :cve:`2019-3892`, :cve:`2019-3896`, :cve:`2019-3900`, :cve:`2019-3901`, :cve:`2019-5108`, :cve:`2019-6133`, :cve:`2019-6974`, :cve:`2019-7221`, :cve:`2019-7222`, :cve:`2019-7308`, :cve:`2019-8912`, :cve:`2019-8956`, :cve:`2019-8980`, :cve:`2019-9003`, :cve:`2019-9162`, :cve:`2019-9213`, :cve:`2019-9245`, :cve:`2019-9444`, :cve:`2019-9445`, :cve:`2019-9453`, :cve:`2019-9454`, :cve:`2019-9455`, :cve:`2019-9456`, :cve:`2019-9457`, :cve:`2019-9458`, :cve:`2019-9466`, :cve:`2019-9500`, :cve:`2019-9503`, :cve:`2019-9506`, :cve:`2019-9857`, :cve:`2020-0009`, :cve:`2020-0030`, :cve:`2020-0041`, :cve:`2020-0066`, :cve:`2020-0067`, :cve:`2020-0110`, :cve:`2020-0255`, :cve:`2020-0305`, :cve:`2020-0404`, :cve:`2020-0423`, :cve:`2020-0427`, :cve:`2020-0429`, :cve:`2020-0430`, :cve:`2020-0431`, :cve:`2020-0432`, :cve:`2020-0433`, :cve:`2020-0435`, :cve:`2020-0444`, :cve:`2020-0465`, :cve:`2020-0466`, :cve:`2020-0543`, :cve:`2020-10135`, :cve:`2020-10690`, :cve:`2020-10711`, :cve:`2020-10720`, :cve:`2020-10732`, :cve:`2020-10742`, :cve:`2020-10751`, :cve:`2020-10757`, :cve:`2020-10766`, :cve:`2020-10767`, :cve:`2020-10768`, :cve:`2020-10769`, :cve:`2020-10773`, :cve:`2020-10781`, :cve:`2020-10942`, :cve:`2020-11494`, :cve:`2020-11565`, :cve:`2020-11608`, :cve:`2020-11609`, :cve:`2020-11668`, :cve:`2020-11669`, :cve:`2020-11884`, :cve:`2020-12114`, :cve:`2020-12351`, :cve:`2020-12352`, :cve:`2020-12362`, :cve:`2020-12363`, :cve:`2020-12364`, :cve:`2020-12464`, :cve:`2020-12465`, :cve:`2020-12652`, :cve:`2020-12653`, :cve:`2020-12654`, :cve:`2020-12655`, :cve:`2020-12656`, :cve:`2020-12657`, :cve:`2020-12659`, :cve:`2020-12768`, :cve:`2020-12769`, :cve:`2020-12770`, :cve:`2020-12771`, :cve:`2020-12826`, :cve:`2020-12888`, :cve:`2020-12912`, :cve:`2020-13143`, :cve:`2020-13974`, :cve:`2020-14305`, :cve:`2020-14314`, :cve:`2020-14331`, :cve:`2020-14351`, :cve:`2020-14353`, :cve:`2020-14356`, :cve:`2020-14381`, :cve:`2020-14385`, :cve:`2020-14386`, :cve:`2020-14390`, :cve:`2020-14416`, :cve:`2020-15393`, :cve:`2020-15436`, :cve:`2020-15437`, :cve:`2020-15780`, :cve:`2020-15852`, :cve:`2020-16119`, :cve:`2020-16120`, :cve:`2020-16166`, :cve:`2020-1749`, :cve:`2020-24394`, :cve:`2020-24490`, :cve:`2020-24504`, :cve:`2020-24586`, :cve:`2020-24587`, :cve:`2020-24588`, :cve:`2020-25211`, :cve:`2020-25212`, :cve:`2020-25221`, :cve:`2020-25284`, :cve:`2020-25285`, :cve:`2020-25639`, :cve:`2020-25641`, :cve:`2020-25643`, :cve:`2020-25645`, :cve:`2020-25656`, :cve:`2020-25668`, :cve:`2020-25669`, :cve:`2020-25670`, :cve:`2020-25671`, :cve:`2020-25672`, :cve:`2020-25673`, :cve:`2020-25704`, :cve:`2020-25705`, :cve:`2020-26088`, :cve:`2020-26139`, :cve:`2020-26141`, :cve:`2020-26145`, :cve:`2020-26147`, :cve:`2020-26541`, :cve:`2020-26555`, :cve:`2020-26558`, :cve:`2020-27066`, :cve:`2020-27067`, :cve:`2020-27068`, :cve:`2020-27152`, :cve:`2020-27170`, :cve:`2020-27171`, :cve:`2020-27194`, :cve:`2020-2732`, :cve:`2020-27673`, :cve:`2020-27675`, :cve:`2020-27777`, :cve:`2020-27784`, :cve:`2020-27786`, :cve:`2020-27815`, :cve:`2020-27820`, :cve:`2020-27825`, :cve:`2020-27830`, :cve:`2020-27835`, :cve:`2020-28097`, :cve:`2020-28374`, :cve:`2020-28588`, :cve:`2020-28915`, :cve:`2020-28941`, :cve:`2020-28974`, :cve:`2020-29368`, :cve:`2020-29369`, :cve:`2020-29370`, :cve:`2020-29371`, :cve:`2020-29372`, :cve:`2020-29373`, :cve:`2020-29374`, :cve:`2020-29534`, :cve:`2020-29568`, :cve:`2020-29569`, :cve:`2020-29660`, :cve:`2020-29661`, :cve:`2020-35499`, :cve:`2020-35508`, :cve:`2020-35513`, :cve:`2020-35519`, :cve:`2020-36158`, :cve:`2020-36310`, :cve:`2020-36311`, :cve:`2020-36312`, :cve:`2020-36313`, :cve:`2020-36322`, :cve:`2020-36385`, :cve:`2020-36386`, :cve:`2020-36387`, :cve:`2020-36516`, :cve:`2020-36557`, :cve:`2020-36558`, :cve:`2020-36691`, :cve:`2020-36694`, :cve:`2020-36766`, :cve:`2020-3702`, :cve:`2020-4788`, :cve:`2020-7053`, :cve:`2020-8428`, :cve:`2020-8647`, :cve:`2020-8648`, :cve:`2020-8649`, :cve:`2020-8694`, :cve:`2020-8834`, :cve:`2020-8835`, :cve:`2020-8992`, :cve:`2020-9383`, :cve:`2020-9391`, :cve:`2021-0129`, :cve:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve:`2021-0512`, :cve:`2021-0605`, :cve:`2021-0707`, :cve:`2021-0920`, :cve:`2021-0929`, :cve:`2021-0935`, :cve_mitre:`2021-0937`, :cve:`2021-0938`, :cve:`2021-0941`, :cve:`2021-1048`, :cve:`2021-20177`, :cve:`2021-20194`, :cve:`2021-20226`, :cve:`2021-20239`, :cve:`2021-20261`, :cve:`2021-20265`, :cve:`2021-20268`, :cve:`2021-20292`, :cve:`2021-20317`, :cve:`2021-20320`, :cve:`2021-20321`, :cve:`2021-20322`, :cve:`2021-21781`, :cve:`2021-22543`, :cve:`2021-22555`, :cve:`2021-22600`, :cve:`2021-23133`, :cve:`2021-23134`, :cve:`2021-26401`, :cve:`2021-26708`, :cve:`2021-26930`, :cve:`2021-26931`, :cve:`2021-26932`, :cve:`2021-27363`, :cve:`2021-27364`, :cve:`2021-27365`, :cve:`2021-28038`, :cve:`2021-28039`, :cve:`2021-28375`, :cve:`2021-28660`, :cve:`2021-28688`, :cve:`2021-28691`, :cve:`2021-28711`, :cve:`2021-28712`, :cve:`2021-28713`, :cve:`2021-28714`, :cve:`2021-28715`, :cve:`2021-28950`, :cve:`2021-28951`, :cve:`2021-28952`, :cve:`2021-28964`, :cve:`2021-28971`, :cve:`2021-28972`, :cve:`2021-29154`, :cve:`2021-29155`, :cve:`2021-29264`, :cve:`2021-29265`, :cve:`2021-29266`, :cve:`2021-29646`, :cve:`2021-29647`, :cve:`2021-29648`, :cve:`2021-29649`, :cve:`2021-29650`, :cve:`2021-29657`, :cve:`2021-30002`, :cve:`2021-30178`, :cve:`2021-31440`, :cve:`2021-3178`, :cve:`2021-31829`, :cve:`2021-31916`, :cve:`2021-32078`, :cve:`2021-32399`, :cve:`2021-32606`, :cve:`2021-33033`, :cve:`2021-33034`, :cve:`2021-33061`, :cve:`2021-33098`, :cve:`2021-33135`, :cve:`2021-33200`, :cve:`2021-3347`, :cve:`2021-3348`, :cve:`2021-33624`, :cve:`2021-33655`, :cve:`2021-33656`, :cve:`2021-33909`, :cve:`2021-3411`, :cve:`2021-3428`, :cve:`2021-3444`, :cve:`2021-34556`, :cve:`2021-34693`, :cve:`2021-3483`, :cve:`2021-34866`, :cve:`2021-3489`, :cve:`2021-3490`, :cve:`2021-3491`, :cve:`2021-3493`, :cve_mitre:`2021-34981`, :cve:`2021-3501`, :cve:`2021-35039`, :cve:`2021-3506`, :cve:`2021-3543`, :cve:`2021-35477`, :cve:`2021-3564`, :cve:`2021-3573`, :cve:`2021-3587`, :cve_mitre:`2021-3600`, :cve:`2021-3609`, :cve:`2021-3612`, :cve:`2021-3635`, :cve:`2021-3640`, :cve:`2021-3653`, :cve:`2021-3655`, :cve:`2021-3656`, :cve:`2021-3659`, :cve:`2021-3669`, :cve:`2021-3679`, :cve:`2021-3715`, :cve:`2021-37159`, :cve:`2021-3732`, :cve:`2021-3736`, :cve:`2021-3739`, :cve:`2021-3743`, :cve:`2021-3744`, :cve:`2021-3752`, :cve:`2021-3753`, :cve:`2021-37576`, :cve:`2021-3759`, :cve:`2021-3760`, :cve:`2021-3764`, :cve:`2021-3772`, :cve:`2021-38160`, :cve:`2021-38166`, :cve:`2021-38198`, :cve:`2021-38199`, :cve:`2021-38200`, :cve:`2021-38201`, :cve:`2021-38202`, :cve:`2021-38203`, :cve:`2021-38204`, :cve:`2021-38205`, :cve:`2021-38206`, :cve:`2021-38207`, :cve:`2021-38208`, :cve:`2021-38209`, :cve:`2021-38300`, :cve:`2021-3894`, :cve:`2021-3896`, :cve:`2021-3923`, :cve:`2021-39633`, :cve:`2021-39634`, :cve:`2021-39636`, :cve:`2021-39648`, :cve:`2021-39656`, :cve:`2021-39657`, :cve:`2021-39685`, :cve:`2021-39686`, :cve:`2021-39698`, :cve:`2021-39711`, :cve:`2021-39713`, :cve:`2021-39714`, :cve:`2021-4001`, :cve:`2021-4002`, :cve:`2021-4023`, :cve:`2021-4028`, :cve:`2021-4032`, :cve:`2021-4037`, :cve:`2021-40490`, :cve:`2021-4083`, :cve:`2021-4090`, :cve:`2021-4093`, :cve:`2021-4095`, :cve:`2021-41073`, :cve:`2021-4135`, :cve:`2021-4148`, :cve:`2021-4149`, :cve:`2021-4150`, :cve:`2021-4154`, :cve:`2021-4155`, :cve:`2021-4157`, :cve:`2021-4159`, :cve:`2021-41864`, :cve:`2021-4197`, :cve:`2021-42008`, :cve:`2021-4202`, :cve:`2021-4203`, :cve:`2021-4204`, :cve:`2021-4218`, :cve:`2021-42252`, :cve:`2021-42327`, :cve:`2021-42739`, :cve:`2021-43056`, :cve:`2021-43057`, :cve:`2021-43267`, :cve:`2021-43389`, :cve:`2021-43975`, :cve:`2021-43976`, :cve:`2021-44733`, :cve:`2021-44879`, :cve:`2021-45095`, :cve:`2021-45100`, :cve:`2021-45402`, :cve:`2021-45469`, :cve:`2021-45480`, :cve:`2021-45485`, :cve:`2021-45486`, :cve:`2021-45868`, :cve:`2021-46283`, :cve:`2022-0001`, :cve:`2022-0002`, :cve:`2022-0168`, :cve:`2022-0171`, :cve:`2022-0185`, :cve:`2022-0264`, :cve:`2022-0286`, :cve:`2022-0322`, :cve:`2022-0330`, :cve:`2022-0382`, :cve:`2022-0433`, :cve:`2022-0435`, :cve:`2022-0480`, :cve:`2022-0487`, :cve:`2022-0492`, :cve:`2022-0494`, :cve:`2022-0500`, :cve:`2022-0516`, :cve:`2022-0617`, :cve:`2022-0644`, :cve:`2022-0646`, :cve:`2022-0742`, :cve:`2022-0812`, :cve:`2022-0847`, :cve:`2022-0850`, :cve:`2022-0854`, :cve:`2022-0995`, :cve:`2022-0998`, :cve:`2022-1011`, :cve:`2022-1012`, :cve:`2022-1015`, :cve:`2022-1016`, :cve:`2022-1043`, :cve:`2022-1048`, :cve:`2022-1055`, :cve:`2022-1158`, :cve:`2022-1184`, :cve:`2022-1195`, :cve:`2022-1198`, :cve:`2022-1199`, :cve:`2022-1204`, :cve:`2022-1205`, :cve:`2022-1263`, :cve:`2022-1280`, :cve:`2022-1353`, :cve:`2022-1419`, :cve:`2022-1462`, :cve:`2022-1508`, :cve:`2022-1516`, :cve:`2022-1651`, :cve:`2022-1652`, :cve:`2022-1671`, :cve:`2022-1678`, :cve:`2022-1679`, :cve:`2022-1729`, :cve:`2022-1734`, :cve:`2022-1786`, :cve:`2022-1789`, :cve:`2022-1836`, :cve:`2022-1852`, :cve:`2022-1882`, :cve:`2022-1943`, :cve:`2022-1966`, :cve:`2022-1972`, :cve:`2022-1973`, :cve:`2022-1974`, :cve:`2022-1975`, :cve:`2022-1976`, :cve:`2022-1998`, :cve:`2022-20008`, :cve:`2022-20132`, :cve:`2022-20141`, :cve:`2022-20148`, :cve:`2022-20153`, :cve:`2022-20154`, :cve:`2022-20158`, :cve:`2022-20166`, :cve:`2022-20368`, :cve:`2022-20369`, :cve:`2022-20409`, :cve:`2022-20421`, :cve:`2022-20422`, :cve:`2022-20423`, :cve:`2022-20424`, :cve_mitre:`2022-20565`, :cve:`2022-20566`, :cve:`2022-20567`, :cve:`2022-20568`, :cve:`2022-20572`, :cve:`2022-2078`, :cve:`2022-21123`, :cve:`2022-21125`, :cve:`2022-21166`, :cve:`2022-21385`, :cve:`2022-21499`, :cve_mitre:`2022-21505`, :cve:`2022-2153`, :cve:`2022-2196`, :cve_mitre:`2022-22942`, :cve:`2022-23036`, :cve:`2022-23037`, :cve:`2022-23038`, :cve:`2022-23039`, :cve:`2022-23040`, :cve:`2022-23041`, :cve:`2022-23042`, :cve:`2022-2308`, :cve:`2022-2318`, :cve:`2022-23222`, :cve:`2022-2327`, :cve:`2022-2380`, :cve:`2022-23816`, :cve:`2022-23960`, :cve:`2022-24122`, :cve:`2022-24448`, :cve:`2022-24958`, :cve:`2022-24959`, :cve:`2022-2503`, :cve:`2022-25258`, :cve:`2022-25375`, :cve:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve:`2022-2590`, :cve_mitre:`2022-2602`, :cve:`2022-26365`, :cve:`2022-26373`, :cve:`2022-2639`, :cve:`2022-26490`, :cve:`2022-2663`, :cve:`2022-26966`, :cve:`2022-27223`, :cve:`2022-27666`, :cve:`2022-27672`, :cve:`2022-2785`, :cve:`2022-27950`, :cve:`2022-28356`, :cve:`2022-28388`, :cve:`2022-28389`, :cve:`2022-28390`, :cve:`2022-2873`, :cve:`2022-28796`, :cve:`2022-28893`, :cve:`2022-2905`, :cve:`2022-29156`, :cve:`2022-2938`, :cve:`2022-29581`, :cve:`2022-29582`, :cve:`2022-2959`, :cve:`2022-2964`, :cve:`2022-2977`, :cve:`2022-2978`, :cve:`2022-29900`, :cve:`2022-29901`, :cve:`2022-2991`, :cve:`2022-29968`, :cve:`2022-3028`, :cve:`2022-30594`, :cve:`2022-3061`, :cve:`2022-3077`, :cve:`2022-3078`, :cve:`2022-3103`, :cve:`2022-3104`, :cve:`2022-3105`, :cve:`2022-3106`, :cve:`2022-3107`, :cve:`2022-3108`, :cve:`2022-3110`, :cve:`2022-3111`, :cve:`2022-3112`, :cve:`2022-3113`, :cve:`2022-3114`, :cve:`2022-3115`, :cve:`2022-3169`, :cve:`2022-3170`, :cve:`2022-3176`, :cve:`2022-3202`, :cve:`2022-32250`, :cve:`2022-32296`, :cve:`2022-3239`, :cve:`2022-32981`, :cve:`2022-3303`, :cve:`2022-3344`, :cve:`2022-33740`, :cve:`2022-33741`, :cve:`2022-33742`, :cve:`2022-33743`, :cve:`2022-33744`, :cve:`2022-33981`, :cve:`2022-3424`, :cve:`2022-3435`, :cve:`2022-34494`, :cve:`2022-34495`, :cve:`2022-34918`, :cve:`2022-3521`, :cve:`2022-3522`, :cve:`2022-3524`, :cve:`2022-3526`, :cve:`2022-3531`, :cve:`2022-3532`, :cve:`2022-3534`, :cve:`2022-3535`, :cve:`2022-3541`, :cve:`2022-3542`, :cve:`2022-3543`, :cve:`2022-3545`, :cve:`2022-3564`, :cve:`2022-3565`, :cve:`2022-3577`, :cve:`2022-3586`, :cve:`2022-3594`, :cve:`2022-3595`, :cve:`2022-36123`, :cve:`2022-3619`, :cve:`2022-3621`, :cve:`2022-3623`, :cve:`2022-3624`, :cve:`2022-3625`, :cve:`2022-3628`, :cve:`2022-36280`, :cve:`2022-3629`, :cve:`2022-3630`, :cve:`2022-3633`, :cve:`2022-3635`, :cve:`2022-3636`, :cve:`2022-3640`, :cve:`2022-3643`, :cve:`2022-3646`, :cve:`2022-3649`, :cve:`2022-36879`, :cve:`2022-36946`, :cve:`2022-3707`, :cve:`2022-38457`, :cve:`2022-3903`, :cve:`2022-3910`, :cve:`2022-39188`, :cve:`2022-39189`, :cve:`2022-39190`, :cve:`2022-3977`, :cve:`2022-39842`, :cve:`2022-40133`, :cve:`2022-40307`, :cve:`2022-40476`, :cve:`2022-40768`, :cve:`2022-4095`, :cve:`2022-40982`, :cve:`2022-41218`, :cve:`2022-41222`, :cve:`2022-4127`, :cve:`2022-4128`, :cve:`2022-4129`, :cve:`2022-4139`, :cve:`2022-41674`, :cve:`2022-41849`, :cve:`2022-41850`, :cve:`2022-41858`, :cve:`2022-42328`, :cve:`2022-42329`, :cve:`2022-42432`, :cve:`2022-4269`, :cve:`2022-42703`, :cve:`2022-42719`, :cve:`2022-42720`, :cve:`2022-42721`, :cve:`2022-42722`, :cve:`2022-42895`, :cve:`2022-42896`, :cve:`2022-43750`, :cve:`2022-4378`, :cve:`2022-4379`, :cve:`2022-4382`, :cve:`2022-43945`, :cve:`2022-45869`, :cve:`2022-45886`, :cve:`2022-45887`, :cve:`2022-45919`, :cve:`2022-45934`, :cve:`2022-4662`, :cve:`2022-4696`, :cve:`2022-4744`, :cve:`2022-47518`, :cve:`2022-47519`, :cve:`2022-47520`, :cve:`2022-47521`, :cve:`2022-47929`, :cve:`2022-47938`, :cve:`2022-47939`, :cve:`2022-47940`, :cve:`2022-47941`, :cve:`2022-47942`, :cve:`2022-47943`, :cve:`2022-47946`, :cve:`2022-4842`, :cve:`2022-48423`, :cve:`2022-48424`, :cve:`2022-48425`, :cve:`2022-48502`, :cve:`2023-0030`, :cve:`2023-0045`, :cve:`2023-0047`, :cve:`2023-0122`, :cve:`2023-0160`, :cve:`2023-0179`, :cve:`2023-0210`, :cve:`2023-0240`, :cve:`2023-0266`, :cve:`2023-0386`, :cve:`2023-0394`, :cve:`2023-0458`, :cve:`2023-0459`, :cve:`2023-0461`, :cve:`2023-0468`, :cve:`2023-0469`, :cve:`2023-0590`, :cve:`2023-0615`, :cve_mitre:`2023-1032`, :cve:`2023-1073`, :cve:`2023-1074`, :cve:`2023-1076`, :cve:`2023-1077`, :cve:`2023-1078`, :cve:`2023-1079`, :cve:`2023-1095`, :cve:`2023-1118`, :cve:`2023-1192`, :cve:`2023-1194`, :cve:`2023-1195`, :cve:`2023-1206`, :cve:`2023-1249`, :cve:`2023-1252`, :cve:`2023-1281`, :cve:`2023-1295`, :cve:`2023-1380`, :cve:`2023-1382`, :cve:`2023-1390`, :cve:`2023-1513`, :cve:`2023-1582`, :cve:`2023-1583`, :cve:`2023-1611`, :cve:`2023-1637`, :cve:`2023-1652`, :cve:`2023-1670`, :cve:`2023-1829`, :cve:`2023-1838`, :cve:`2023-1855`, :cve:`2023-1859`, :cve:`2023-1872`, :cve:`2023-1989`, :cve:`2023-1990`, :cve:`2023-1998`, :cve:`2023-2002`, :cve:`2023-2006`, :cve:`2023-2007`, :cve:`2023-2008`, :cve:`2023-2019`, :cve:`2023-20569`, :cve:`2023-20588`, :cve:`2023-20593`, :cve:`2023-20928`, :cve:`2023-20938`, :cve:`2023-21102`, :cve:`2023-21106`, :cve:`2023-2124`, :cve:`2023-21255`, :cve:`2023-2156`, :cve:`2023-2162`, :cve:`2023-2163`, :cve:`2023-2166`, :cve:`2023-2177`, :cve:`2023-2194`, :cve:`2023-2235`, :cve:`2023-2236`, :cve:`2023-2248`, :cve:`2023-2269`, :cve:`2023-22995`, :cve:`2023-22996`, :cve:`2023-22997`, :cve:`2023-22998`, :cve:`2023-22999`, :cve:`2023-23000`, :cve:`2023-23001`, :cve:`2023-23002`, :cve:`2023-23003`, :cve:`2023-23004`, :cve:`2023-23006`, :cve:`2023-23454`, :cve:`2023-23455`, :cve:`2023-23559`, :cve:`2023-23586`, :cve:`2023-2430`, :cve:`2023-2483`, :cve:`2023-25012`, :cve:`2023-2513`, :cve:`2023-25775`, :cve:`2023-2598`, :cve:`2023-26544`, :cve:`2023-26545`, :cve:`2023-26605`, :cve:`2023-26606`, :cve:`2023-26607`, :cve:`2023-28327`, :cve:`2023-28328`, :cve:`2023-28410`, :cve:`2023-28464`, :cve:`2023-28466`, :cve:`2023-2860`, :cve:`2023-28772`, :cve:`2023-28866`, :cve:`2023-2898`, :cve:`2023-2985`, :cve:`2023-3006`, :cve:`2023-30456`, :cve:`2023-30772`, :cve:`2023-3090`, :cve:`2023-3106`, :cve:`2023-3111`, :cve:`2023-3117`, :cve:`2023-31248`, :cve:`2023-3141`, :cve:`2023-31436`, :cve:`2023-3159`, :cve:`2023-3161`, :cve:`2023-3212`, :cve:`2023-3220`, :cve:`2023-32233`, :cve:`2023-32247`, :cve:`2023-32248`, :cve:`2023-32250`, :cve:`2023-32252`, :cve:`2023-32254`, :cve:`2023-32257`, :cve:`2023-32258`, :cve:`2023-32269`, :cve:`2023-3268`, :cve:`2023-3269`, :cve:`2023-3312`, :cve:`2023-3317`, :cve:`2023-33203`, :cve:`2023-33250`, :cve:`2023-33288`, :cve:`2023-3338`, :cve:`2023-3355`, :cve:`2023-3357`, :cve:`2023-3358`, :cve:`2023-3359`, :cve:`2023-3389`, :cve:`2023-3390`, :cve:`2023-33951`, :cve:`2023-33952`, :cve:`2023-34255`, :cve:`2023-34256`, :cve:`2023-34319`, :cve:`2023-3439`, :cve:`2023-35001`, :cve:`2023-3567`, :cve:`2023-35788`, :cve:`2023-35823`, :cve:`2023-35824`, :cve:`2023-35826`, :cve:`2023-35828`, :cve:`2023-35829`, :cve:`2023-3609`, :cve:`2023-3610`, :cve:`2023-3611`, :cve:`2023-37453`, :cve:`2023-3772`, :cve:`2023-3773`, :cve:`2023-3776`, :cve:`2023-3777`, :cve:`2023-3812`, :cve:`2023-38409`, :cve:`2023-38426`, :cve:`2023-38427`, :cve:`2023-38428`, :cve:`2023-38429`, :cve:`2023-38430`, :cve:`2023-38431`, :cve:`2023-38432`, :cve:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve:`2023-4004`, :cve:`2023-4015`, :cve:`2023-40283`, :cve:`2023-4128`, :cve:`2023-4132`, :cve:`2023-4147`, :cve:`2023-4155`, :cve:`2023-4194`, :cve:`2023-4206`, :cve:`2023-4207`, :cve:`2023-4208`, :cve:`2023-4273`, :cve:`2023-42752`, :cve:`2023-42753`, :cve:`2023-4385`, :cve:`2023-4387`, :cve:`2023-4389`, :cve:`2023-4394`, :cve:`2023-4459`, :cve:`2023-4569`, :cve:`2023-4611` and :cve:`2023-4623` 30- linux-yocto/6.1 (Continued): Ignore :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist:`2019-19066`, :cve_nist:`2019-19067`, :cve_nist:`2019-19068`, :cve_nist:`2019-19069`, :cve_nist:`2019-19070`, :cve_nist:`2019-19071`, :cve_nist:`2019-19072`, :cve_nist:`2019-19073`, :cve_nist:`2019-19074`, :cve_nist:`2019-19075`, :cve_nist:`2019-19076`, :cve_nist:`2019-19077`, :cve_nist:`2019-19078`, :cve_nist:`2019-19079`, :cve_nist:`2019-19080`, :cve_nist:`2019-19081`, :cve_nist:`2019-19082`, :cve_nist:`2019-19083`, :cve_nist:`2019-19227`, :cve_nist:`2019-19241`, :cve_nist:`2019-19252`, :cve_nist:`2019-19318`, :cve_nist:`2019-19319`, :cve_nist:`2019-19332`, :cve_nist:`2019-19338`, :cve_nist:`2019-19377`, :cve_nist:`2019-19447`, :cve_nist:`2019-19448`, :cve_nist:`2019-19449`, :cve_nist:`2019-19462`, :cve_nist:`2019-19523`, :cve_nist:`2019-19524`, :cve_nist:`2019-19525`, :cve_nist:`2019-19526`, :cve_nist:`2019-19527`, :cve_nist:`2019-19528`, :cve_nist:`2019-19529`, :cve_nist:`2019-19530`, :cve_nist:`2019-19531`, :cve_nist:`2019-19532`, :cve_nist:`2019-19533`, :cve_nist:`2019-19534`, :cve_nist:`2019-19535`, :cve_nist:`2019-19536`, :cve_nist:`2019-19537`, :cve_nist:`2019-19543`, :cve_nist:`2019-19602`, :cve_nist:`2019-19767`, :cve_nist:`2019-19768`, :cve_nist:`2019-19769`, :cve_nist:`2019-19770`, :cve_nist:`2019-19807`, :cve_nist:`2019-19813`, :cve_nist:`2019-19815`, :cve_nist:`2019-19816`, :cve_nist:`2019-19922`, :cve_nist:`2019-19927`, :cve_nist:`2019-19947`, :cve_nist:`2019-19965`, :cve_nist:`2019-19966`, :cve_nist:`2019-1999`, :cve_nist:`2019-20054`, :cve_nist:`2019-20095`, :cve_nist:`2019-20096`, :cve_nist:`2019-2024`, :cve_nist:`2019-2025`, :cve_nist:`2019-20422`, :cve_nist:`2019-2054`, :cve_nist:`2019-20636`, :cve_nist:`2019-20806`, :cve_nist:`2019-20810`, :cve_nist:`2019-20811`, :cve_nist:`2019-20812`, :cve_nist:`2019-20908`, :cve_nist:`2019-20934`, :cve_nist:`2019-2101`, :cve_nist:`2019-2181`, :cve_nist:`2019-2182`, :cve_nist:`2019-2213`, :cve_nist:`2019-2214`, :cve_nist:`2019-2215`, :cve_nist:`2019-25044`, :cve_nist:`2019-25045`, :cve_nist:`2019-3016`, :cve_nist:`2019-3459`, :cve_nist:`2019-3460`, :cve_nist:`2019-3701`, :cve_nist:`2019-3819`, :cve_nist:`2019-3837`, :cve_nist:`2019-3846`, :cve_nist:`2019-3874`, :cve_nist:`2019-3882`, :cve_nist:`2019-3887`, :cve_nist:`2019-3892`, :cve_nist:`2019-3896`, :cve_nist:`2019-3900`, :cve_nist:`2019-3901`, :cve_nist:`2019-5108`, :cve_nist:`2019-6133`, :cve_nist:`2019-6974`, :cve_nist:`2019-7221`, :cve_nist:`2019-7222`, :cve_nist:`2019-7308`, :cve_nist:`2019-8912`, :cve_nist:`2019-8956`, :cve_nist:`2019-8980`, :cve_nist:`2019-9003`, :cve_nist:`2019-9162`, :cve_nist:`2019-9213`, :cve_nist:`2019-9245`, :cve_nist:`2019-9444`, :cve_nist:`2019-9445`, :cve_nist:`2019-9453`, :cve_nist:`2019-9454`, :cve_nist:`2019-9455`, :cve_nist:`2019-9456`, :cve_nist:`2019-9457`, :cve_nist:`2019-9458`, :cve_nist:`2019-9466`, :cve_nist:`2019-9500`, :cve_nist:`2019-9503`, :cve_nist:`2019-9506`, :cve_nist:`2019-9857`, :cve_nist:`2020-0009`, :cve_nist:`2020-0030`, :cve_nist:`2020-0041`, :cve_nist:`2020-0066`, :cve_nist:`2020-0067`, :cve_nist:`2020-0110`, :cve_nist:`2020-0255`, :cve_nist:`2020-0305`, :cve_nist:`2020-0404`, :cve_nist:`2020-0423`, :cve_nist:`2020-0427`, :cve_nist:`2020-0429`, :cve_nist:`2020-0430`, :cve_nist:`2020-0431`, :cve_nist:`2020-0432`, :cve_nist:`2020-0433`, :cve_nist:`2020-0435`, :cve_nist:`2020-0444`, :cve_nist:`2020-0465`, :cve_nist:`2020-0466`, :cve_nist:`2020-0543`, :cve_nist:`2020-10135`, :cve_nist:`2020-10690`, :cve_nist:`2020-10711`, :cve_nist:`2020-10720`, :cve_nist:`2020-10732`, :cve_nist:`2020-10742`, :cve_nist:`2020-10751`, :cve_nist:`2020-10757`, :cve_nist:`2020-10766`, :cve_nist:`2020-10767`, :cve_nist:`2020-10768`, :cve_nist:`2020-10769`, :cve_nist:`2020-10773`, :cve_nist:`2020-10781`, :cve_nist:`2020-10942`, :cve_nist:`2020-11494`, :cve_nist:`2020-11565`, :cve_nist:`2020-11608`, :cve_nist:`2020-11609`, :cve_nist:`2020-11668`, :cve_nist:`2020-11669`, :cve_nist:`2020-11884`, :cve_nist:`2020-12114`, :cve_nist:`2020-12351`, :cve_nist:`2020-12352`, :cve_nist:`2020-12362`, :cve_nist:`2020-12363`, :cve_nist:`2020-12364`, :cve_nist:`2020-12464`, :cve_nist:`2020-12465`, :cve_nist:`2020-12652`, :cve_nist:`2020-12653`, :cve_nist:`2020-12654`, :cve_nist:`2020-12655`, :cve_nist:`2020-12656`, :cve_nist:`2020-12657`, :cve_nist:`2020-12659`, :cve_nist:`2020-12768`, :cve_nist:`2020-12769`, :cve_nist:`2020-12770`, :cve_nist:`2020-12771`, :cve_nist:`2020-12826`, :cve_nist:`2020-12888`, :cve_nist:`2020-12912`, :cve_nist:`2020-13143`, :cve_nist:`2020-13974`, :cve_nist:`2020-14305`, :cve_nist:`2020-14314`, :cve_nist:`2020-14331`, :cve_nist:`2020-14351`, :cve_nist:`2020-14353`, :cve_nist:`2020-14356`, :cve_nist:`2020-14381`, :cve_nist:`2020-14385`, :cve_nist:`2020-14386`, :cve_nist:`2020-14390`, :cve_nist:`2020-14416`, :cve_nist:`2020-15393`, :cve_nist:`2020-15436`, :cve_nist:`2020-15437`, :cve_nist:`2020-15780`, :cve_nist:`2020-15852`, :cve_nist:`2020-16119`, :cve_nist:`2020-16120`, :cve_nist:`2020-16166`, :cve_nist:`2020-1749`, :cve_nist:`2020-24394`, :cve_nist:`2020-24490`, :cve_nist:`2020-24504`, :cve_nist:`2020-24586`, :cve_nist:`2020-24587`, :cve_nist:`2020-24588`, :cve_nist:`2020-25211`, :cve_nist:`2020-25212`, :cve_nist:`2020-25221`, :cve_nist:`2020-25284`, :cve_nist:`2020-25285`, :cve_nist:`2020-25639`, :cve_nist:`2020-25641`, :cve_nist:`2020-25643`, :cve_nist:`2020-25645`, :cve_nist:`2020-25656`, :cve_nist:`2020-25668`, :cve_nist:`2020-25669`, :cve_nist:`2020-25670`, :cve_nist:`2020-25671`, :cve_nist:`2020-25672`, :cve_nist:`2020-25673`, :cve_nist:`2020-25704`, :cve_nist:`2020-25705`, :cve_nist:`2020-26088`, :cve_nist:`2020-26139`, :cve_nist:`2020-26141`, :cve_nist:`2020-26145`, :cve_nist:`2020-26147`, :cve_nist:`2020-26541`, :cve_nist:`2020-26555`, :cve_nist:`2020-26558`, :cve_nist:`2020-27066`, :cve_nist:`2020-27067`, :cve_nist:`2020-27068`, :cve_nist:`2020-27152`, :cve_nist:`2020-27170`, :cve_nist:`2020-27171`, :cve_nist:`2020-27194`, :cve_nist:`2020-2732`, :cve_nist:`2020-27673`, :cve_nist:`2020-27675`, :cve_nist:`2020-27777`, :cve_nist:`2020-27784`, :cve_nist:`2020-27786`, :cve_nist:`2020-27815`, :cve_nist:`2020-27820`, :cve_nist:`2020-27825`, :cve_nist:`2020-27830`, :cve_nist:`2020-27835`, :cve_nist:`2020-28097`, :cve_nist:`2020-28374`, :cve_nist:`2020-28588`, :cve_nist:`2020-28915`, :cve_nist:`2020-28941`, :cve_nist:`2020-28974`, :cve_nist:`2020-29368`, :cve_nist:`2020-29369`, :cve_nist:`2020-29370`, :cve_nist:`2020-29371`, :cve_nist:`2020-29372`, :cve_nist:`2020-29373`, :cve_nist:`2020-29374`, :cve_nist:`2020-29534`, :cve_nist:`2020-29568`, :cve_nist:`2020-29569`, :cve_nist:`2020-29660`, :cve_nist:`2020-29661`, :cve_nist:`2020-35499`, :cve_nist:`2020-35508`, :cve_nist:`2020-35513`, :cve_nist:`2020-35519`, :cve_nist:`2020-36158`, :cve_nist:`2020-36310`, :cve_nist:`2020-36311`, :cve_nist:`2020-36312`, :cve_nist:`2020-36313`, :cve_nist:`2020-36322`, :cve_nist:`2020-36385`, :cve_nist:`2020-36386`, :cve_nist:`2020-36387`, :cve_nist:`2020-36516`, :cve_nist:`2020-36557`, :cve_nist:`2020-36558`, :cve_nist:`2020-36691`, :cve_nist:`2020-36694`, :cve_nist:`2020-36766`, :cve_nist:`2020-3702`, :cve_nist:`2020-4788`, :cve_nist:`2020-7053`, :cve_nist:`2020-8428`, :cve_nist:`2020-8647`, :cve_nist:`2020-8648`, :cve_nist:`2020-8649`, :cve_nist:`2020-8694`, :cve_nist:`2020-8834`, :cve_nist:`2020-8835`, :cve_nist:`2020-8992`, :cve_nist:`2020-9383`, :cve_nist:`2020-9391`, :cve_nist:`2021-0129`, :cve_nist:`2021-0342`, :cve_mitre:`2021-0447`, :cve_mitre:`2021-0448`, :cve_nist:`2021-0512`, :cve_nist:`2021-0605`, :cve_nist:`2021-0707`, :cve_nist:`2021-0920`, :cve_nist:`2021-0929`, :cve_nist:`2021-0935`, :cve_mitre:`2021-0937`, :cve_nist:`2021-0938`, :cve_nist:`2021-0941`, :cve_nist:`2021-1048`, :cve_nist:`2021-20177`, :cve_nist:`2021-20194`, :cve_nist:`2021-20226`, :cve_nist:`2021-20239`, :cve_nist:`2021-20261`, :cve_nist:`2021-20265`, :cve_nist:`2021-20268`, :cve_nist:`2021-20292`, :cve_nist:`2021-20317`, :cve_nist:`2021-20320`, :cve_nist:`2021-20321`, :cve_nist:`2021-20322`, :cve_nist:`2021-21781`, :cve_nist:`2021-22543`, :cve_nist:`2021-22555`, :cve_nist:`2021-22600`, :cve_nist:`2021-23133`, :cve_nist:`2021-23134`, :cve_nist:`2021-26401`, :cve_nist:`2021-26708`, :cve_nist:`2021-26930`, :cve_nist:`2021-26931`, :cve_nist:`2021-26932`, :cve_nist:`2021-27363`, :cve_nist:`2021-27364`, :cve_nist:`2021-27365`, :cve_nist:`2021-28038`, :cve_nist:`2021-28039`, :cve_nist:`2021-28375`, :cve_nist:`2021-28660`, :cve_nist:`2021-28688`, :cve_nist:`2021-28691`, :cve_nist:`2021-28711`, :cve_nist:`2021-28712`, :cve_nist:`2021-28713`, :cve_nist:`2021-28714`, :cve_nist:`2021-28715`, :cve_nist:`2021-28950`, :cve_nist:`2021-28951`, :cve_nist:`2021-28952`, :cve_nist:`2021-28964`, :cve_nist:`2021-28971`, :cve_nist:`2021-28972`, :cve_nist:`2021-29154`, :cve_nist:`2021-29155`, :cve_nist:`2021-29264`, :cve_nist:`2021-29265`, :cve_nist:`2021-29266`, :cve_nist:`2021-29646`, :cve_nist:`2021-29647`, :cve_nist:`2021-29648`, :cve_nist:`2021-29649`, :cve_nist:`2021-29650`, :cve_nist:`2021-29657`, :cve_nist:`2021-30002`, :cve_nist:`2021-30178`, :cve_nist:`2021-31440`, :cve_nist:`2021-3178`, :cve_nist:`2021-31829`, :cve_nist:`2021-31916`, :cve_nist:`2021-32078`, :cve_nist:`2021-32399`, :cve_nist:`2021-32606`, :cve_nist:`2021-33033`, :cve_nist:`2021-33034`, :cve_nist:`2021-33061`, :cve_nist:`2021-33098`, :cve_nist:`2021-33135`, :cve_nist:`2021-33200`, :cve_nist:`2021-3347`, :cve_nist:`2021-3348`, :cve_nist:`2021-33624`, :cve_nist:`2021-33655`, :cve_nist:`2021-33656`, :cve_nist:`2021-33909`, :cve_nist:`2021-3411`, :cve_nist:`2021-3428`, :cve_nist:`2021-3444`, :cve_nist:`2021-34556`, :cve_nist:`2021-34693`, :cve_nist:`2021-3483`, :cve_nist:`2021-34866`, :cve_nist:`2021-3489`, :cve_nist:`2021-3490`, :cve_nist:`2021-3491`, :cve_nist:`2021-3493`, :cve_mitre:`2021-34981`, :cve_nist:`2021-3501`, :cve_nist:`2021-35039`, :cve_nist:`2021-3506`, :cve_nist:`2021-3543`, :cve_nist:`2021-35477`, :cve_nist:`2021-3564`, :cve_nist:`2021-3573`, :cve_nist:`2021-3587`, :cve_mitre:`2021-3600`, :cve_nist:`2021-3609`, :cve_nist:`2021-3612`, :cve_nist:`2021-3635`, :cve_nist:`2021-3640`, :cve_nist:`2021-3653`, :cve_nist:`2021-3655`, :cve_nist:`2021-3656`, :cve_nist:`2021-3659`, :cve_nist:`2021-3669`, :cve_nist:`2021-3679`, :cve_nist:`2021-3715`, :cve_nist:`2021-37159`, :cve_nist:`2021-3732`, :cve_nist:`2021-3736`, :cve_nist:`2021-3739`, :cve_nist:`2021-3743`, :cve_nist:`2021-3744`, :cve_nist:`2021-3752`, :cve_nist:`2021-3753`, :cve_nist:`2021-37576`, :cve_nist:`2021-3759`, :cve_nist:`2021-3760`, :cve_nist:`2021-3764`, :cve_nist:`2021-3772`, :cve_nist:`2021-38160`, :cve_nist:`2021-38166`, :cve_nist:`2021-38198`, :cve_nist:`2021-38199`, :cve_nist:`2021-38200`, :cve_nist:`2021-38201`, :cve_nist:`2021-38202`, :cve_nist:`2021-38203`, :cve_nist:`2021-38204`, :cve_nist:`2021-38205`, :cve_nist:`2021-38206`, :cve_nist:`2021-38207`, :cve_nist:`2021-38208`, :cve_nist:`2021-38209`, :cve_nist:`2021-38300`, :cve_nist:`2021-3894`, :cve_nist:`2021-3896`, :cve_nist:`2021-3923`, :cve_nist:`2021-39633`, :cve_nist:`2021-39634`, :cve_nist:`2021-39636`, :cve_nist:`2021-39648`, :cve_nist:`2021-39656`, :cve_nist:`2021-39657`, :cve_nist:`2021-39685`, :cve_nist:`2021-39686`, :cve_nist:`2021-39698`, :cve_nist:`2021-39711`, :cve_nist:`2021-39713`, :cve_nist:`2021-39714`, :cve_nist:`2021-4001`, :cve_nist:`2021-4002`, :cve_nist:`2021-4023`, :cve_nist:`2021-4028`, :cve_nist:`2021-4032`, :cve_nist:`2021-4037`, :cve_nist:`2021-40490`, :cve_nist:`2021-4083`, :cve_nist:`2021-4090`, :cve_nist:`2021-4093`, :cve_nist:`2021-4095`, :cve_nist:`2021-41073`, :cve_nist:`2021-4135`, :cve_nist:`2021-4148`, :cve_nist:`2021-4149`, :cve_nist:`2021-4150`, :cve_nist:`2021-4154`, :cve_nist:`2021-4155`, :cve_nist:`2021-4157`, :cve_nist:`2021-4159`, :cve_nist:`2021-41864`, :cve_nist:`2021-4197`, :cve_nist:`2021-42008`, :cve_nist:`2021-4202`, :cve_nist:`2021-4203`, :cve_nist:`2021-4204`, :cve_nist:`2021-4218`, :cve_nist:`2021-42252`, :cve_nist:`2021-42327`, :cve_nist:`2021-42739`, :cve_nist:`2021-43056`, :cve_nist:`2021-43057`, :cve_nist:`2021-43267`, :cve_nist:`2021-43389`, :cve_nist:`2021-43975`, :cve_nist:`2021-43976`, :cve_nist:`2021-44733`, :cve_nist:`2021-44879`, :cve_nist:`2021-45095`, :cve_nist:`2021-45100`, :cve_nist:`2021-45402`, :cve_nist:`2021-45469`, :cve_nist:`2021-45480`, :cve_nist:`2021-45485`, :cve_nist:`2021-45486`, :cve_nist:`2021-45868`, :cve_nist:`2021-46283`, :cve_nist:`2022-0001`, :cve_nist:`2022-0002`, :cve_nist:`2022-0168`, :cve_nist:`2022-0171`, :cve_nist:`2022-0185`, :cve_nist:`2022-0264`, :cve_nist:`2022-0286`, :cve_nist:`2022-0322`, :cve_nist:`2022-0330`, :cve_nist:`2022-0382`, :cve_nist:`2022-0433`, :cve_nist:`2022-0435`, :cve_nist:`2022-0480`, :cve_nist:`2022-0487`, :cve_nist:`2022-0492`, :cve_nist:`2022-0494`, :cve_nist:`2022-0500`, :cve_nist:`2022-0516`, :cve_nist:`2022-0617`, :cve_nist:`2022-0644`, :cve_nist:`2022-0646`, :cve_nist:`2022-0742`, :cve_nist:`2022-0812`, :cve_nist:`2022-0847`, :cve_nist:`2022-0850`, :cve_nist:`2022-0854`, :cve_nist:`2022-0995`, :cve_nist:`2022-0998`, :cve_nist:`2022-1011`, :cve_nist:`2022-1012`, :cve_nist:`2022-1015`, :cve_nist:`2022-1016`, :cve_nist:`2022-1043`, :cve_nist:`2022-1048`, :cve_nist:`2022-1055`, :cve_nist:`2022-1158`, :cve_nist:`2022-1184`, :cve_nist:`2022-1195`, :cve_nist:`2022-1198`, :cve_nist:`2022-1199`, :cve_nist:`2022-1204`, :cve_nist:`2022-1205`, :cve_nist:`2022-1263`, :cve_nist:`2022-1280`, :cve_nist:`2022-1353`, :cve_nist:`2022-1419`, :cve_nist:`2022-1462`, :cve_nist:`2022-1508`, :cve_nist:`2022-1516`, :cve_nist:`2022-1651`, :cve_nist:`2022-1652`, :cve_nist:`2022-1671`, :cve_nist:`2022-1678`, :cve_nist:`2022-1679`, :cve_nist:`2022-1729`, :cve_nist:`2022-1734`, :cve_nist:`2022-1786`, :cve_nist:`2022-1789`, :cve_nist:`2022-1836`, :cve_nist:`2022-1852`, :cve_nist:`2022-1882`, :cve_nist:`2022-1943`, :cve_nist:`2022-1966`, :cve_nist:`2022-1972`, :cve_nist:`2022-1973`, :cve_nist:`2022-1974`, :cve_nist:`2022-1975`, :cve_nist:`2022-1976`, :cve_nist:`2022-1998`, :cve_nist:`2022-20008`, :cve_nist:`2022-20132`, :cve_nist:`2022-20141`, :cve_nist:`2022-20148`, :cve_nist:`2022-20153`, :cve_nist:`2022-20154`, :cve_nist:`2022-20158`, :cve_nist:`2022-20166`, :cve_nist:`2022-20368`, :cve_nist:`2022-20369`, :cve_nist:`2022-20409`, :cve_nist:`2022-20421`, :cve_nist:`2022-20422`, :cve_nist:`2022-20423`, :cve_nist:`2022-20424`, :cve_mitre:`2022-20565`, :cve_nist:`2022-20566`, :cve_nist:`2022-20567`, :cve_nist:`2022-20568`, :cve_nist:`2022-20572`, :cve_nist:`2022-2078`, :cve_nist:`2022-21123`, :cve_nist:`2022-21125`, :cve_nist:`2022-21166`, :cve_nist:`2022-21385`, :cve_nist:`2022-21499`, :cve_mitre:`2022-21505`, :cve_nist:`2022-2153`, :cve_nist:`2022-2196`, :cve_mitre:`2022-22942`, :cve_nist:`2022-23036`, :cve_nist:`2022-23037`, :cve_nist:`2022-23038`, :cve_nist:`2022-23039`, :cve_nist:`2022-23040`, :cve_nist:`2022-23041`, :cve_nist:`2022-23042`, :cve_nist:`2022-2308`, :cve_nist:`2022-2318`, :cve_nist:`2022-23222`, :cve_nist:`2022-2327`, :cve_nist:`2022-2380`, :cve_nist:`2022-23816`, :cve_nist:`2022-23960`, :cve_nist:`2022-24122`, :cve_nist:`2022-24448`, :cve_nist:`2022-24958`, :cve_nist:`2022-24959`, :cve_nist:`2022-2503`, :cve_nist:`2022-25258`, :cve_nist:`2022-25375`, :cve_nist:`2022-25636`, :cve_mitre:`2022-2585`, :cve_mitre:`2022-2586`, :cve_mitre:`2022-2588`, :cve_nist:`2022-2590`, :cve_mitre:`2022-2602`, :cve_nist:`2022-26365`, :cve_nist:`2022-26373`, :cve_nist:`2022-2639`, :cve_nist:`2022-26490`, :cve_nist:`2022-2663`, :cve_nist:`2022-26966`, :cve_nist:`2022-27223`, :cve_nist:`2022-27666`, :cve_nist:`2022-27672`, :cve_nist:`2022-2785`, :cve_nist:`2022-27950`, :cve_nist:`2022-28356`, :cve_nist:`2022-28388`, :cve_nist:`2022-28389`, :cve_nist:`2022-28390`, :cve_nist:`2022-2873`, :cve_nist:`2022-28796`, :cve_nist:`2022-28893`, :cve_nist:`2022-2905`, :cve_nist:`2022-29156`, :cve_nist:`2022-2938`, :cve_nist:`2022-29581`, :cve_nist:`2022-29582`, :cve_nist:`2022-2959`, :cve_nist:`2022-2964`, :cve_nist:`2022-2977`, :cve_nist:`2022-2978`, :cve_nist:`2022-29900`, :cve_nist:`2022-29901`, :cve_nist:`2022-2991`, :cve_nist:`2022-29968`, :cve_nist:`2022-3028`, :cve_nist:`2022-30594`, :cve_nist:`2022-3061`, :cve_nist:`2022-3077`, :cve_nist:`2022-3078`, :cve_nist:`2022-3103`, :cve_nist:`2022-3104`, :cve_nist:`2022-3105`, :cve_nist:`2022-3106`, :cve_nist:`2022-3107`, :cve_nist:`2022-3108`, :cve_nist:`2022-3110`, :cve_nist:`2022-3111`, :cve_nist:`2022-3112`, :cve_nist:`2022-3113`, :cve_nist:`2022-3114`, :cve_nist:`2022-3115`, :cve_nist:`2022-3169`, :cve_nist:`2022-3170`, :cve_nist:`2022-3176`, :cve_nist:`2022-3202`, :cve_nist:`2022-32250`, :cve_nist:`2022-32296`, :cve_nist:`2022-3239`, :cve_nist:`2022-32981`, :cve_nist:`2022-3303`, :cve_nist:`2022-3344`, :cve_nist:`2022-33740`, :cve_nist:`2022-33741`, :cve_nist:`2022-33742`, :cve_nist:`2022-33743`, :cve_nist:`2022-33744`, :cve_nist:`2022-33981`, :cve_nist:`2022-3424`, :cve_nist:`2022-3435`, :cve_nist:`2022-34494`, :cve_nist:`2022-34495`, :cve_nist:`2022-34918`, :cve_nist:`2022-3521`, :cve_nist:`2022-3522`, :cve_nist:`2022-3524`, :cve_nist:`2022-3526`, :cve_nist:`2022-3531`, :cve_nist:`2022-3532`, :cve_nist:`2022-3534`, :cve_nist:`2022-3535`, :cve_nist:`2022-3541`, :cve_nist:`2022-3542`, :cve_nist:`2022-3543`, :cve_nist:`2022-3545`, :cve_nist:`2022-3564`, :cve_nist:`2022-3565`, :cve_nist:`2022-3577`, :cve_nist:`2022-3586`, :cve_nist:`2022-3594`, :cve_nist:`2022-3595`, :cve_nist:`2022-36123`, :cve_nist:`2022-3619`, :cve_nist:`2022-3621`, :cve_nist:`2022-3623`, :cve_nist:`2022-3624`, :cve_nist:`2022-3625`, :cve_nist:`2022-3628`, :cve_nist:`2022-36280`, :cve_nist:`2022-3629`, :cve_nist:`2022-3630`, :cve_nist:`2022-3633`, :cve_nist:`2022-3635`, :cve_nist:`2022-3636`, :cve_nist:`2022-3640`, :cve_nist:`2022-3643`, :cve_nist:`2022-3646`, :cve_nist:`2022-3649`, :cve_nist:`2022-36879`, :cve_nist:`2022-36946`, :cve_nist:`2022-3707`, :cve_nist:`2022-38457`, :cve_nist:`2022-3903`, :cve_nist:`2022-3910`, :cve_nist:`2022-39188`, :cve_nist:`2022-39189`, :cve_nist:`2022-39190`, :cve_nist:`2022-3977`, :cve_nist:`2022-39842`, :cve_nist:`2022-40133`, :cve_nist:`2022-40307`, :cve_nist:`2022-40476`, :cve_nist:`2022-40768`, :cve_nist:`2022-4095`, :cve_nist:`2022-40982`, :cve_nist:`2022-41218`, :cve_nist:`2022-41222`, :cve_nist:`2022-4127`, :cve_nist:`2022-4128`, :cve_nist:`2022-4129`, :cve_nist:`2022-4139`, :cve_nist:`2022-41674`, :cve_nist:`2022-41849`, :cve_nist:`2022-41850`, :cve_nist:`2022-41858`, :cve_nist:`2022-42328`, :cve_nist:`2022-42329`, :cve_nist:`2022-42432`, :cve_nist:`2022-4269`, :cve_nist:`2022-42703`, :cve_nist:`2022-42719`, :cve_nist:`2022-42720`, :cve_nist:`2022-42721`, :cve_nist:`2022-42722`, :cve_nist:`2022-42895`, :cve_nist:`2022-42896`, :cve_nist:`2022-43750`, :cve_nist:`2022-4378`, :cve_nist:`2022-4379`, :cve_nist:`2022-4382`, :cve_nist:`2022-43945`, :cve_nist:`2022-45869`, :cve_nist:`2022-45886`, :cve_nist:`2022-45887`, :cve_nist:`2022-45919`, :cve_nist:`2022-45934`, :cve_nist:`2022-4662`, :cve_nist:`2022-4696`, :cve_nist:`2022-4744`, :cve_nist:`2022-47518`, :cve_nist:`2022-47519`, :cve_nist:`2022-47520`, :cve_nist:`2022-47521`, :cve_nist:`2022-47929`, :cve_nist:`2022-47938`, :cve_nist:`2022-47939`, :cve_nist:`2022-47940`, :cve_nist:`2022-47941`, :cve_nist:`2022-47942`, :cve_nist:`2022-47943`, :cve_nist:`2022-47946`, :cve_nist:`2022-4842`, :cve_nist:`2022-48423`, :cve_nist:`2022-48424`, :cve_nist:`2022-48425`, :cve_nist:`2022-48502`, :cve_nist:`2023-0030`, :cve_nist:`2023-0045`, :cve_nist:`2023-0047`, :cve_nist:`2023-0122`, :cve_nist:`2023-0160`, :cve_nist:`2023-0179`, :cve_nist:`2023-0210`, :cve_nist:`2023-0240`, :cve_nist:`2023-0266`, :cve_nist:`2023-0386`, :cve_nist:`2023-0394`, :cve_nist:`2023-0458`, :cve_nist:`2023-0459`, :cve_nist:`2023-0461`, :cve_nist:`2023-0468`, :cve_nist:`2023-0469`, :cve_nist:`2023-0590`, :cve_nist:`2023-0615`, :cve_mitre:`2023-1032`, :cve_nist:`2023-1073`, :cve_nist:`2023-1074`, :cve_nist:`2023-1076`, :cve_nist:`2023-1077`, :cve_nist:`2023-1078`, :cve_nist:`2023-1079`, :cve_nist:`2023-1095`, :cve_nist:`2023-1118`, :cve_nist:`2023-1192`, :cve_nist:`2023-1194`, :cve_nist:`2023-1195`, :cve_nist:`2023-1206`, :cve_nist:`2023-1249`, :cve_nist:`2023-1252`, :cve_nist:`2023-1281`, :cve_nist:`2023-1295`, :cve_nist:`2023-1380`, :cve_nist:`2023-1382`, :cve_nist:`2023-1390`, :cve_nist:`2023-1513`, :cve_nist:`2023-1582`, :cve_nist:`2023-1583`, :cve_nist:`2023-1611`, :cve_nist:`2023-1637`, :cve_nist:`2023-1652`, :cve_nist:`2023-1670`, :cve_nist:`2023-1829`, :cve_nist:`2023-1838`, :cve_nist:`2023-1855`, :cve_nist:`2023-1859`, :cve_nist:`2023-1872`, :cve_nist:`2023-1989`, :cve_nist:`2023-1990`, :cve_nist:`2023-1998`, :cve_nist:`2023-2002`, :cve_nist:`2023-2006`, :cve_nist:`2023-2007`, :cve_nist:`2023-2008`, :cve_nist:`2023-2019`, :cve_nist:`2023-20569`, :cve_nist:`2023-20588`, :cve_nist:`2023-20593`, :cve_nist:`2023-20928`, :cve_nist:`2023-20938`, :cve_nist:`2023-21102`, :cve_nist:`2023-21106`, :cve_nist:`2023-2124`, :cve_nist:`2023-21255`, :cve_nist:`2023-2156`, :cve_nist:`2023-2162`, :cve_nist:`2023-2163`, :cve_nist:`2023-2166`, :cve_nist:`2023-2177`, :cve_nist:`2023-2194`, :cve_nist:`2023-2235`, :cve_nist:`2023-2236`, :cve_nist:`2023-2248`, :cve_nist:`2023-2269`, :cve_nist:`2023-22995`, :cve_nist:`2023-22996`, :cve_nist:`2023-22997`, :cve_nist:`2023-22998`, :cve_nist:`2023-22999`, :cve_nist:`2023-23000`, :cve_nist:`2023-23001`, :cve_nist:`2023-23002`, :cve_nist:`2023-23003`, :cve_nist:`2023-23004`, :cve_nist:`2023-23006`, :cve_nist:`2023-23454`, :cve_nist:`2023-23455`, :cve_nist:`2023-23559`, :cve_nist:`2023-23586`, :cve_nist:`2023-2430`, :cve_nist:`2023-2483`, :cve_nist:`2023-25012`, :cve_nist:`2023-2513`, :cve_nist:`2023-25775`, :cve_nist:`2023-2598`, :cve_nist:`2023-26544`, :cve_nist:`2023-26545`, :cve_nist:`2023-26605`, :cve_nist:`2023-26606`, :cve_nist:`2023-26607`, :cve_nist:`2023-28327`, :cve_nist:`2023-28328`, :cve_nist:`2023-28410`, :cve_nist:`2023-28464`, :cve_nist:`2023-28466`, :cve_nist:`2023-2860`, :cve_nist:`2023-28772`, :cve_nist:`2023-28866`, :cve_nist:`2023-2898`, :cve_nist:`2023-2985`, :cve_nist:`2023-3006`, :cve_nist:`2023-30456`, :cve_nist:`2023-30772`, :cve_nist:`2023-3090`, :cve_nist:`2023-3106`, :cve_nist:`2023-3111`, :cve_nist:`2023-3117`, :cve_nist:`2023-31248`, :cve_nist:`2023-3141`, :cve_nist:`2023-31436`, :cve_nist:`2023-3159`, :cve_nist:`2023-3161`, :cve_nist:`2023-3212`, :cve_nist:`2023-3220`, :cve_nist:`2023-32233`, :cve_nist:`2023-32247`, :cve_nist:`2023-32248`, :cve_nist:`2023-32250`, :cve_nist:`2023-32252`, :cve_nist:`2023-32254`, :cve_nist:`2023-32257`, :cve_nist:`2023-32258`, :cve_nist:`2023-32269`, :cve_nist:`2023-3268`, :cve_nist:`2023-3269`, :cve_nist:`2023-3312`, :cve_nist:`2023-3317`, :cve_nist:`2023-33203`, :cve_nist:`2023-33250`, :cve_nist:`2023-33288`, :cve_nist:`2023-3338`, :cve_nist:`2023-3355`, :cve_nist:`2023-3357`, :cve_nist:`2023-3358`, :cve_nist:`2023-3359`, :cve_nist:`2023-3389`, :cve_nist:`2023-3390`, :cve_nist:`2023-33951`, :cve_nist:`2023-33952`, :cve_nist:`2023-34255`, :cve_nist:`2023-34256`, :cve_nist:`2023-34319`, :cve_nist:`2023-3439`, :cve_nist:`2023-35001`, :cve_nist:`2023-3567`, :cve_nist:`2023-35788`, :cve_nist:`2023-35823`, :cve_nist:`2023-35824`, :cve_nist:`2023-35826`, :cve_nist:`2023-35828`, :cve_nist:`2023-35829`, :cve_nist:`2023-3609`, :cve_nist:`2023-3610`, :cve_nist:`2023-3611`, :cve_nist:`2023-37453`, :cve_nist:`2023-3772`, :cve_nist:`2023-3773`, :cve_nist:`2023-3776`, :cve_nist:`2023-3777`, :cve_nist:`2023-3812`, :cve_nist:`2023-38409`, :cve_nist:`2023-38426`, :cve_nist:`2023-38427`, :cve_nist:`2023-38428`, :cve_nist:`2023-38429`, :cve_nist:`2023-38430`, :cve_nist:`2023-38431`, :cve_nist:`2023-38432`, :cve_nist:`2023-3863`, :cve_mitre:`2023-3865`, :cve_mitre:`2023-3866`, :cve_mitre:`2023-3867`, :cve_nist:`2023-4004`, :cve_nist:`2023-4015`, :cve_nist:`2023-40283`, :cve_nist:`2023-4128`, :cve_nist:`2023-4132`, :cve_nist:`2023-4147`, :cve_nist:`2023-4155`, :cve_nist:`2023-4194`, :cve_nist:`2023-4206`, :cve_nist:`2023-4207`, :cve_nist:`2023-4208`, :cve_nist:`2023-4273`, :cve_nist:`2023-42752`, :cve_nist:`2023-42753`, :cve_nist:`2023-4385`, :cve_nist:`2023-4387`, :cve_nist:`2023-4389`, :cve_nist:`2023-4394`, :cve_nist:`2023-4459`, :cve_nist:`2023-4569`, :cve_nist:`2023-4611` and :cve_nist:`2023-4623`
31- nghttp2: Fix :cve:`2023-35945` 31- nghttp2: Fix :cve_nist:`2023-35945`
32- openssl: Fix :cve:`2023-2975`, :cve:`2023-3446`, :cve:`2023-3817`, :cve:`2023-4807` and :cve:`2023-5363` 32- openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446`, :cve_nist:`2023-3817`, :cve_nist:`2023-4807` and :cve_nist:`2023-5363`
33- pixman: Ignore :cve:`2023-37769` 33- pixman: Ignore :cve_nist:`2023-37769`
34- procps: Fix :cve:`2023-4016` 34- procps: Fix :cve_nist:`2023-4016`
35- python3-git: Fix :cve:`2023-40267`, :cve:`2023-40590` and :cve:`2023-41040` 35- python3-git: Fix :cve_nist:`2023-40267`, :cve_nist:`2023-40590` and :cve_nist:`2023-41040`
36- python3-pygments: Fix :cve:`2022-40896` 36- python3-pygments: Fix :cve_nist:`2022-40896`
37- python3-urllib3: Fix :cve:`2023-43804` and :cve:`2023-45803` 37- python3-urllib3: Fix :cve_nist:`2023-43804` and :cve_nist:`2023-45803`
38- python3: Fix :cve:`2023-24329` and :cve:`2023-40217` 38- python3: Fix :cve_nist:`2023-24329` and :cve_nist:`2023-40217`
39- qemu: Fix :cve:`2023-3180`, :cve:`2023-3354` and :cve:`2023-42467` 39- qemu: Fix :cve_nist:`2023-3180`, :cve_nist:`2023-3354` and :cve_nist:`2023-42467`
40- qemu: Ignore :cve:`2023-2680` 40- qemu: Ignore :cve_nist:`2023-2680`
41- screen: Fix :cve:`2023-24626` 41- screen: Fix :cve_nist:`2023-24626`
42- shadow: Fix :cve_mitre:`2023-4641` 42- shadow: Fix :cve_mitre:`2023-4641`
43- tiff: Fix :cve:`2023-40745` and :cve:`2023-41175` 43- tiff: Fix :cve_nist:`2023-40745` and :cve_nist:`2023-41175`
44- vim: Fix :cve:`2023-3896`, :cve:`2023-4733`, :cve:`2023-4734`, :cve:`2023-4735`, :cve:`2023-4736`, :cve:`2023-4738`, :cve:`2023-4750`, :cve:`2023-4752`, :cve:`2023-4781`, :cve:`2023-5441` and :cve:`2023-5535` 44- vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750`, :cve_nist:`2023-4752`, :cve_nist:`2023-4781`, :cve_nist:`2023-5441` and :cve_nist:`2023-5535`
45- webkitgtk: Fix :cve:`2023-32435` and :cve:`2023-32439` 45- webkitgtk: Fix :cve_nist:`2023-32435` and :cve_nist:`2023-32439`
46- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 46- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
47 47
48 48
49Fixes in Yocto-4.2.4 49Fixes in Yocto-4.2.4
diff --git a/documentation/migration-guides/release-notes-4.2.rst b/documentation/migration-guides/release-notes-4.2.rst
index 30049b89f6..81a052b413 100644
--- a/documentation/migration-guides/release-notes-4.2.rst
+++ b/documentation/migration-guides/release-notes-4.2.rst
@@ -348,39 +348,39 @@ The following corrections have been made to the :term:`LICENSE` values set by re
348Security Fixes in 4.2 348Security Fixes in 4.2
349~~~~~~~~~~~~~~~~~~~~~ 349~~~~~~~~~~~~~~~~~~~~~
350 350
351- binutils: :cve:`2022-4285`, :cve_mitre:`2023-25586` 351- binutils: :cve_nist:`2022-4285`, :cve_mitre:`2023-25586`
352- curl: :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915`, :cve:`2022-42916` 352- curl: :cve_nist:`2022-32221`, :cve_nist:`2022-35260`, :cve_nist:`2022-42915`, :cve_nist:`2022-42916`
353- epiphany: :cve:`2023-26081` 353- epiphany: :cve_nist:`2023-26081`
354- expat: :cve:`2022-43680` 354- expat: :cve_nist:`2022-43680`
355- ffmpeg: :cve:`2022-3964`, :cve:`2022-3965` 355- ffmpeg: :cve_nist:`2022-3964`, :cve_nist:`2022-3965`
356- git: :cve:`2022-39260`, :cve:`2022-41903`, :cve:`2022-23521`, :cve:`2022-41953` (ignored) 356- git: :cve_nist:`2022-39260`, :cve_nist:`2022-41903`, :cve_nist:`2022-23521`, :cve_nist:`2022-41953` (ignored)
357- glibc: :cve:`2023-25139` (ignored) 357- glibc: :cve_nist:`2023-25139` (ignored)
358- go: :cve:`2023-24532`, :cve:`2023-24537` 358- go: :cve_nist:`2023-24532`, :cve_nist:`2023-24537`
359- grub2: :cve:`2022-2601`, :cve:`2022-3775`, :cve_mitre:`2022-28736` 359- grub2: :cve_nist:`2022-2601`, :cve_nist:`2022-3775`, :cve_mitre:`2022-28736`
360- inetutils: :cve:`2019-0053` 360- inetutils: :cve_nist:`2019-0053`
361- less: :cve:`2022-46663` 361- less: :cve_nist:`2022-46663`
362- libarchive: :cve:`2022-36227` 362- libarchive: :cve_nist:`2022-36227`
363- libinput: :cve:`2022-1215` 363- libinput: :cve_nist:`2022-1215`
364- libpam: :cve:`2022-28321` 364- libpam: :cve_nist:`2022-28321`
365- libpng: :cve:`2019-6129` 365- libpng: :cve_nist:`2019-6129`
366- libx11: :cve:`2022-3554` 366- libx11: :cve_nist:`2022-3554`
367- openssh: :cve:`2023-28531` 367- openssh: :cve_nist:`2023-28531`
368- openssl: :cve:`2022-3358`, :cve:`2022-3786`, :cve:`2022-3602`, :cve:`2022-3996`, :cve:`2023-0286`, :cve:`2022-4304`, :cve:`2022-4203`, :cve:`2023-0215`, :cve:`2022-4450`, :cve:`2023-0216`, :cve:`2023-0217`, :cve:`2023-0401`, :cve:`2023-0464` 368- openssl: :cve_nist:`2022-3358`, :cve_nist:`2022-3786`, :cve_nist:`2022-3602`, :cve_nist:`2022-3996`, :cve_nist:`2023-0286`, :cve_nist:`2022-4304`, :cve_nist:`2022-4203`, :cve_nist:`2023-0215`, :cve_nist:`2022-4450`, :cve_nist:`2023-0216`, :cve_nist:`2023-0217`, :cve_nist:`2023-0401`, :cve_nist:`2023-0464`
369- ppp: :cve:`2022-4603` 369- ppp: :cve_nist:`2022-4603`
370- python3-cryptography{-vectors}: :cve:`2022-3602`, :cve:`2022-3786`, :cve:`2023-23931` 370- python3-cryptography{-vectors}: :cve_nist:`2022-3602`, :cve_nist:`2022-3786`, :cve_nist:`2023-23931`
371- python3: :cve_mitre:`2022-37460` 371- python3: :cve_mitre:`2022-37460`
372- qemu: :cve:`2022-3165` 372- qemu: :cve_nist:`2022-3165`
373- rust: :cve:`2022-46176` 373- rust: :cve_nist:`2022-46176`
374- rxvt-unicode: :cve:`2022-4170` 374- rxvt-unicode: :cve_nist:`2022-4170`
375- screen: :cve:`2023-24626` 375- screen: :cve_nist:`2023-24626`
376- shadow: :cve:`2023-29383`, :cve:`2016-15024` (ignored) 376- shadow: :cve_nist:`2023-29383`, :cve_nist:`2016-15024` (ignored)
377- sudo: :cve:`2022-43995` 377- sudo: :cve_nist:`2022-43995`
378- systemd: :cve:`2022-4415` (ignored) 378- systemd: :cve_nist:`2022-4415` (ignored)
379- tar: :cve:`2022-48303` 379- tar: :cve_nist:`2022-48303`
380- tiff: :cve:`2022-3599`, :cve:`2022-3597`, :cve:`2022-3626`, :cve:`2022-3627`, :cve:`2022-3570`, :cve:`2022-3598`, :cve:`2022-3970`, :cve:`2022-48281` 380- tiff: :cve_nist:`2022-3599`, :cve_nist:`2022-3597`, :cve_nist:`2022-3626`, :cve_nist:`2022-3627`, :cve_nist:`2022-3570`, :cve_nist:`2022-3598`, :cve_nist:`2022-3970`, :cve_nist:`2022-48281`
381- vim: :cve:`2022-3352`, :cve:`2022-4141`, :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1127`, :cve:`2023-1170`, :cve:`2023-1175`, :cve:`2023-1264`, :cve:`2023-1355`, :cve:`2023-0433`, :cve:`2022-47024`, :cve:`2022-3705` 381- vim: :cve_nist:`2022-3352`, :cve_nist:`2022-4141`, :cve_nist:`2023-0049`, :cve_nist:`2023-0051`, :cve_nist:`2023-0054`, :cve_nist:`2023-0288`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1127`, :cve_nist:`2023-1170`, :cve_nist:`2023-1175`, :cve_nist:`2023-1264`, :cve_nist:`2023-1355`, :cve_nist:`2023-0433`, :cve_nist:`2022-47024`, :cve_nist:`2022-3705`
382- xdg-utils: :cve:`2022-4055` 382- xdg-utils: :cve_nist:`2022-4055`
383- xserver-xorg: :cve:`2022-3550`, :cve:`2022-3551`, :cve:`2023-1393`, :cve:`2023-0494`, :cve:`2022-3553` (ignored) 383- xserver-xorg: :cve_nist:`2022-3550`, :cve_nist:`2022-3551`, :cve_nist:`2023-1393`, :cve_nist:`2023-0494`, :cve_nist:`2022-3553` (ignored)
384 384
385Recipe Upgrades in 4.2 385Recipe Upgrades in 4.2
386~~~~~~~~~~~~~~~~~~~~~~ 386~~~~~~~~~~~~~~~~~~~~~~
diff --git a/documentation/migration-guides/release-notes-4.3.1.rst b/documentation/migration-guides/release-notes-4.3.1.rst
index cea9c538a2..afde1e7942 100644
--- a/documentation/migration-guides/release-notes-4.3.1.rst
+++ b/documentation/migration-guides/release-notes-4.3.1.rst
@@ -6,14 +6,14 @@ Release notes for Yocto-4.3.1 (Nanbield)
6Security Fixes in Yocto-4.3.1 6Security Fixes in Yocto-4.3.1
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- libsndfile1: Fix :cve:`2022-33065` 9- libsndfile1: Fix :cve_nist:`2022-33065`
10- libxml2: Ignore :cve:`2023-45322` 10- libxml2: Ignore :cve_nist:`2023-45322`
11- linux-yocto/6.1: Ignore :cve:`2020-27418`, :cve:`2023-31085`, :cve_mitre:`2023-34324`, :cve:`2023-39189`, :cve:`2023-39192`, :cve:`2023-39193`, :cve:`2023-39194`, :cve:`2023-4244`, :cve:`2023-42754`, :cve:`2023-42756`, :cve:`2023-44466`, :cve:`2023-4563`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-45871`, :cve:`2023-45898`, :cve:`2023-4732`, :cve:`2023-5158`, :cve:`2023-5197` and :cve:`2023-5345` 11- linux-yocto/6.1: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-31085`, :cve_mitre:`2023-34324`, :cve_nist:`2023-39189`, :cve_nist:`2023-39192`, :cve_nist:`2023-39193`, :cve_nist:`2023-39194`, :cve_nist:`2023-4244`, :cve_nist:`2023-42754`, :cve_nist:`2023-42756`, :cve_nist:`2023-44466`, :cve_nist:`2023-4563`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-45871`, :cve_nist:`2023-45898`, :cve_nist:`2023-4732`, :cve_nist:`2023-5158`, :cve_nist:`2023-5197` and :cve_nist:`2023-5345`
12- linux-yocto/6.5: Ignore :cve:`2020-27418`, :cve:`2023-1193`, :cve:`2023-39191`, :cve:`2023-39194`, :cve:`2023-40791`, :cve:`2023-44466`, :cve:`2023-45862`, :cve:`2023-45863`, :cve:`2023-4610` and :cve:`2023-4732` 12- linux-yocto/6.5: Ignore :cve_nist:`2020-27418`, :cve_nist:`2023-1193`, :cve_nist:`2023-39191`, :cve_nist:`2023-39194`, :cve_nist:`2023-40791`, :cve_nist:`2023-44466`, :cve_nist:`2023-45862`, :cve_nist:`2023-45863`, :cve_nist:`2023-4610` and :cve_nist:`2023-4732`
13- openssl: Fix :cve:`2023-5363` 13- openssl: Fix :cve_nist:`2023-5363`
14- pixman: Ignore :cve:`2023-37769` 14- pixman: Ignore :cve_nist:`2023-37769`
15- vim: Fix :cve:`2023-46246` 15- vim: Fix :cve_nist:`2023-46246`
16- zlib: Ignore :cve:`2023-45853` 16- zlib: Ignore :cve_nist:`2023-45853`
17 17
18 18
19Fixes in Yocto-4.3.1 19Fixes in Yocto-4.3.1
diff --git a/documentation/migration-guides/release-notes-4.3.2.rst b/documentation/migration-guides/release-notes-4.3.2.rst
index 3a40d83bc2..c32cd83b2a 100644
--- a/documentation/migration-guides/release-notes-4.3.2.rst
+++ b/documentation/migration-guides/release-notes-4.3.2.rst
@@ -6,19 +6,19 @@ Release notes for Yocto-4.3.2 (Nanbield)
6Security Fixes in Yocto-4.3.2 6Security Fixes in Yocto-4.3.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- avahi: Fix :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472` and :cve:`2023-38473` 9- avahi: Fix :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472` and :cve_nist:`2023-38473`
10- curl: Fix :cve:`2023-46218` 10- curl: Fix :cve_nist:`2023-46218`
11- ghostscript: Fix :cve:`2023-46751` 11- ghostscript: Fix :cve_nist:`2023-46751`
12- grub: fix :cve:`2023-4692` and :cve:`2023-4693` 12- grub: fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
13- gstreamer1.0: Fix :cve_mitre:`2023-44446` 13- gstreamer1.0: Fix :cve_mitre:`2023-44446`
14- linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5090`, :cve:`2023-5633`, :cve:`2023-6111`, :cve:`2023-6121` and :cve:`2023-6176` 14- linux-yocto/6.1: Ignore :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5090`, :cve_nist:`2023-5633`, :cve_nist:`2023-6111`, :cve_nist:`2023-6121` and :cve_nist:`2023-6176`
15- linux-yocto/6.5: Ignore :cve:`2022-44034`, :cve_mitre:`2023-39197`, :cve:`2023-39198`, :cve:`2023-5972`, :cve:`2023-6039`, :cve:`2023-6111` and :cve:`2023-6176` 15- linux-yocto/6.5: Ignore :cve_nist:`2022-44034`, :cve_mitre:`2023-39197`, :cve_nist:`2023-39198`, :cve_nist:`2023-5972`, :cve_nist:`2023-6039`, :cve_nist:`2023-6111` and :cve_nist:`2023-6176`
16- perl: fix :cve:`2023-47100` 16- perl: fix :cve_nist:`2023-47100`
17- python3-urllib3: Fix :cve:`2023-45803` 17- python3-urllib3: Fix :cve_nist:`2023-45803`
18- rust: Fix :cve:`2023-40030` 18- rust: Fix :cve_nist:`2023-40030`
19- vim: Fix :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236` and :cve:`2023-48237` 19- vim: Fix :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236` and :cve_nist:`2023-48237`
20- xserver-xorg: Fix :cve:`2023-5367` and :cve:`2023-5380` 20- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
21- xwayland: Fix :cve:`2023-5367` 21- xwayland: Fix :cve_nist:`2023-5367`
22 22
23 23
24Fixes in Yocto-4.3.2 24Fixes in Yocto-4.3.2
diff --git a/documentation/migration-guides/release-notes-4.3.3.rst b/documentation/migration-guides/release-notes-4.3.3.rst
index 2a0658a9c9..d30f4f5c2d 100644
--- a/documentation/migration-guides/release-notes-4.3.3.rst
+++ b/documentation/migration-guides/release-notes-4.3.3.rst
@@ -6,17 +6,17 @@ Release notes for Yocto-4.3.3 (Nanbield)
6Security Fixes in Yocto-4.3.3 6Security Fixes in Yocto-4.3.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- curl: Fix :cve:`2023-46219` 9- curl: Fix :cve_nist:`2023-46219`
10- glibc: Ignore fixed :cve:`2023-0687` and :cve:`2023-5156` 10- glibc: Ignore fixed :cve_nist:`2023-0687` and :cve_nist:`2023-5156`
11- linux-yocto/6.1: Ignore :cve:`2022-48619`, :cve:`2023-4610`, :cve:`2023-5178`, :cve:`2023-5972`, :cve:`2023-6040`, :cve:`2023-6531`, :cve:`2023-6546`, :cve:`2023-6622`, :cve:`2023-6679`, :cve:`2023-6817`, :cve:`2023-6931`, :cve:`2023-6932`, :cve:`2023-7192`, :cve:`2024-0193` and :cve:`2024-0443` 11- linux-yocto/6.1: Ignore :cve_nist:`2022-48619`, :cve_nist:`2023-4610`, :cve_nist:`2023-5178`, :cve_nist:`2023-5972`, :cve_nist:`2023-6040`, :cve_nist:`2023-6531`, :cve_nist:`2023-6546`, :cve_nist:`2023-6622`, :cve_nist:`2023-6679`, :cve_nist:`2023-6817`, :cve_nist:`2023-6931`, :cve_nist:`2023-6932`, :cve_nist:`2023-7192`, :cve_nist:`2024-0193` and :cve_nist:`2024-0443`
12- linux-yocto/6.1: Fix :cve:`2023-1193`, :cve_mitre:`2023-51779`, :cve:`2023-51780`, :cve:`2023-51781`, :cve:`2023-51782` and :cve:`2023-6606` 12- linux-yocto/6.1: Fix :cve_nist:`2023-1193`, :cve_mitre:`2023-51779`, :cve_nist:`2023-51780`, :cve_nist:`2023-51781`, :cve_nist:`2023-51782` and :cve_nist:`2023-6606`
13- qemu: Fix :cve:`2023-3019` 13- qemu: Fix :cve_nist:`2023-3019`
14- shadow: Fix :cve:`2023-4641` 14- shadow: Fix :cve_nist:`2023-4641`
15- sqlite3: Fix :cve:`2024-0232` 15- sqlite3: Fix :cve_nist:`2024-0232`
16- sqlite3: drop obsolete CVE ignore :cve:`2023-36191` 16- sqlite3: drop obsolete CVE ignore :cve_nist:`2023-36191`
17- sudo: Fix :cve:`2023-42456` and :cve:`2023-42465` 17- sudo: Fix :cve_nist:`2023-42456` and :cve_nist:`2023-42465`
18- tiff: Fix :cve:`2023-6277` 18- tiff: Fix :cve_nist:`2023-6277`
19- xwayland: Fix :cve:`2023-6377` and :cve:`2023-6478` 19- xwayland: Fix :cve_nist:`2023-6377` and :cve_nist:`2023-6478`
20 20
21 21
22Fixes in Yocto-4.3.3 22Fixes in Yocto-4.3.3
diff --git a/documentation/migration-guides/release-notes-4.3.4.rst b/documentation/migration-guides/release-notes-4.3.4.rst
index 4c9e67f2cb..b725ace369 100644
--- a/documentation/migration-guides/release-notes-4.3.4.rst
+++ b/documentation/migration-guides/release-notes-4.3.4.rst
@@ -6,23 +6,23 @@ Release notes for Yocto-4.3.4 (Nanbield)
6Security Fixes in Yocto-4.3.4 6Security Fixes in Yocto-4.3.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679` and :cve:`2023-50387` 9- bind: Fix :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679` and :cve_nist:`2023-50387`
10- gcc: Update :term:`CVE_STATUS` for :cve:`2023-4039` as fixed 10- gcc: Update :term:`CVE_STATUS` for :cve_nist:`2023-4039` as fixed
11- glibc: Fix :cve:`2023-6246`, :cve:`2023-6779` and :cve:`2023-6780` 11- glibc: Fix :cve_nist:`2023-6246`, :cve_nist:`2023-6779` and :cve_nist:`2023-6780`
12- gnutls: Fix :cve:`2024-0553` and :cve:`2024-0567` 12- gnutls: Fix :cve_nist:`2024-0553` and :cve_nist:`2024-0567`
13- gstreamer: Fix :cve_mitre:`2024-0444` 13- gstreamer: Fix :cve_mitre:`2024-0444`
14- libssh2: fix :cve:`2023-48795` 14- libssh2: fix :cve_nist:`2023-48795`
15- libxml2: Fix :cve:`2024-25062` 15- libxml2: Fix :cve_nist:`2024-25062`
16- linux-yocto/6.1: Fix :cve:`2023-6610`, :cve:`2023-6915`, :cve:`2023-46838`, :cve:`2023-50431`, :cve:`2024-1085`, :cve:`2024-1086` and :cve:`2024-23849` 16- linux-yocto/6.1: Fix :cve_nist:`2023-6610`, :cve_nist:`2023-6915`, :cve_nist:`2023-46838`, :cve_nist:`2023-50431`, :cve_nist:`2024-1085`, :cve_nist:`2024-1086` and :cve_nist:`2024-23849`
17- linux-yocto/6.1: Ignore :cve:`2021-33630`, :cve:`2021-33631`, :cve:`2022-36402`, :cve:`2023-5717`, :cve:`2023-6200`, :cve:`2023-35827`, :cve:`2023-40791`, :cve:`2023-46343`, :cve:`2023-46813`, :cve:`2023-46862`, :cve:`2023-51042`, :cve:`2023-51043`, :cve_mitre:`2023-52340`, :cve:`2024-0562`, :cve:`2024-0565`, :cve:`2024-0582`, :cve:`2024-0584`, :cve:`2024-0607`, :cve:`2024-0639`, :cve:`2024-0641`, :cve:`2024-0646`, :cve:`2024-0775` and :cve:`2024-22705` 17- linux-yocto/6.1: Ignore :cve_nist:`2021-33630`, :cve_nist:`2021-33631`, :cve_nist:`2022-36402`, :cve_nist:`2023-5717`, :cve_nist:`2023-6200`, :cve_nist:`2023-35827`, :cve_nist:`2023-40791`, :cve_nist:`2023-46343`, :cve_nist:`2023-46813`, :cve_nist:`2023-46862`, :cve_nist:`2023-51042`, :cve_nist:`2023-51043`, :cve_mitre:`2023-52340`, :cve_nist:`2024-0562`, :cve_nist:`2024-0565`, :cve_nist:`2024-0582`, :cve_nist:`2024-0584`, :cve_nist:`2024-0607`, :cve_nist:`2024-0639`, :cve_nist:`2024-0641`, :cve_nist:`2024-0646`, :cve_nist:`2024-0775` and :cve_nist:`2024-22705`
18- openssl: fix :cve:`2024-0727` 18- openssl: fix :cve_nist:`2024-0727`
19- python3-jinja2: Fix :cve:`2024-22195` 19- python3-jinja2: Fix :cve_nist:`2024-22195`
20- tiff: Fix :cve:`2023-6228`, :cve:`2023-52355` and :cve:`2023-52356` 20- tiff: Fix :cve_nist:`2023-6228`, :cve_nist:`2023-52355` and :cve_nist:`2023-52356`
21- vim: Fix :cve:`2024-22667` 21- vim: Fix :cve_nist:`2024-22667`
22- wpa-supplicant: Fix :cve:`2023-52160` 22- wpa-supplicant: Fix :cve_nist:`2023-52160`
23- xserver-xorg: Fix :cve:`2023-6377`, :cve:`2023-6478`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2024-21885` and :cve:`2024-21886` 23- xserver-xorg: Fix :cve_nist:`2023-6377`, :cve_nist:`2023-6478`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885` and :cve_nist:`2024-21886`
24- xwayland: Fix :cve:`2023-6816`, :cve:`2024-0408` and :cve:`2024-0409` 24- xwayland: Fix :cve_nist:`2023-6816`, :cve_nist:`2024-0408` and :cve_nist:`2024-0409`
25- zlib: Ignore :cve:`2023-6992` 25- zlib: Ignore :cve_nist:`2023-6992`
26 26
27 27
28Fixes in Yocto-4.3.4 28Fixes in Yocto-4.3.4
@@ -59,7 +59,7 @@ Fixes in Yocto-4.3.4
59- docs: use "manual page(s)" 59- docs: use "manual page(s)"
60- docs: Makefile: remove releases.rst in "make clean" 60- docs: Makefile: remove releases.rst in "make clean"
61- externalsrc: fix task dependency for do_populate_lic 61- externalsrc: fix task dependency for do_populate_lic
62- glibc: Remove duplicate :term:`CVE_STATUS` for :cve:`2023-4527` 62- glibc: Remove duplicate :term:`CVE_STATUS` for :cve_nist:`2023-4527`
63- glibc: stable 2.38 branch updates (2.38+gitd37c2b20a4) 63- glibc: stable 2.38 branch updates (2.38+gitd37c2b20a4)
64- gnutls: Upgrade to 3.8.3 64- gnutls: Upgrade to 3.8.3
65- gstreamer1.0: skip a test that is known to be flaky 65- gstreamer1.0: skip a test that is known to be flaky
diff --git a/documentation/migration-guides/release-notes-4.3.rst b/documentation/migration-guides/release-notes-4.3.rst
index 0e175067da..0103ac985e 100644
--- a/documentation/migration-guides/release-notes-4.3.rst
+++ b/documentation/migration-guides/release-notes-4.3.rst
@@ -295,7 +295,7 @@ New Features / Enhancements in 4.3
295 - Generation of :term:`SPDX` manifests is now enabled by default. 295 - Generation of :term:`SPDX` manifests is now enabled by default.
296 296
297 - Git based recipes in OE-Core which used the ``git`` protocol have been 297 - Git based recipes in OE-Core which used the ``git`` protocol have been
298 changed to use `https`` where possible, as it is typically faster and 298 changed to use ``https`` where possible, as it is typically faster and
299 more reliable. 299 more reliable.
300 300
301 - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the 301 - The ``os-release`` recipe added a ``CPE_NAME`` to the fields provided, with the
@@ -337,47 +337,47 @@ The following corrections have been made to the :term:`LICENSE` values set by re
337Security Fixes in 4.3 337Security Fixes in 4.3
338~~~~~~~~~~~~~~~~~~~~~ 338~~~~~~~~~~~~~~~~~~~~~
339 339
340- bind: :cve:`2023-2911`, :cve:`2023-2828`, :cve:`2023-3341`, :cve:`2023-4236` 340- bind: :cve_nist:`2023-2911`, :cve_nist:`2023-2828`, :cve_nist:`2023-3341`, :cve_nist:`2023-4236`
341- binutils: :cve:`2023-1972` 341- binutils: :cve_nist:`2023-1972`
342- connman: :cve:`2023-28488` 342- connman: :cve_nist:`2023-28488`
343- cups: :cve:`2023-32324`, :cve:`2023-34241`, :cve:`2023-4504` 343- cups: :cve_nist:`2023-32324`, :cve_nist:`2023-34241`, :cve_nist:`2023-4504`
344- dbus: :cve:`2023-34969` 344- dbus: :cve_nist:`2023-34969`
345- dmidecode: :cve:`2023-30630` 345- dmidecode: :cve_nist:`2023-30630`
346- dropbear: :cve:`2023-36328` 346- dropbear: :cve_nist:`2023-36328`
347- erofs-utils: :cve:`2023-33551`, :cve:`2023-33552` 347- erofs-utils: :cve_nist:`2023-33551`, :cve_nist:`2023-33552`
348- gcc: :cve:`2023-4039` 348- gcc: :cve_nist:`2023-4039`
349- ghostscript: :cve:`2023-28879`, :cve:`2023-36664`, :cve:`2023-38559;` ignore :cve:`2023-38560` 349- ghostscript: :cve_nist:`2023-28879`, :cve_nist:`2023-36664`, :cve_nist:`2023-38559;` ignore :cve_nist:`2023-38560`
350- git: :cve:`2023-25652`, :cve:`2023-29007` 350- git: :cve_nist:`2023-25652`, :cve_nist:`2023-29007`
351- glibc: :cve:`2023-4527`, :cve:`2023-4806` 351- glibc: :cve_nist:`2023-4527`, :cve_nist:`2023-4806`
352- go: :cve:`2023-24537`, :cve:`2023-39325` 352- go: :cve_nist:`2023-24537`, :cve_nist:`2023-39325`
353- gstreamer: :cve:`2023-40475`, :cve:`2023-40476` 353- gstreamer: :cve_nist:`2023-40475`, :cve_nist:`2023-40476`
354- inetutils: :cve:`2023-40303` 354- inetutils: :cve_nist:`2023-40303`
355- libarchive: ignore :cve:`2023-30571` 355- libarchive: ignore :cve_nist:`2023-30571`
356- librsvg: :cve:`2023-38633` 356- librsvg: :cve_nist:`2023-38633`
357- libwebp: :cve:`2023-1999`, :cve:`2023-4863` 357- libwebp: :cve_nist:`2023-1999`, :cve_nist:`2023-4863`
358- libx11: :cve:`2023-3138`, :cve:`2023-43785`, :cve:`2023-43786`, :cve:`2023-43787` 358- libx11: :cve_nist:`2023-3138`, :cve_nist:`2023-43785`, :cve_nist:`2023-43786`, :cve_nist:`2023-43787`
359- libxml2: :cve:`2023-28484`, :cve:`2023-29469;` ignore disputed :cve:`2023-45322` 359- libxml2: :cve_nist:`2023-28484`, :cve_nist:`2023-29469;` ignore disputed :cve_nist:`2023-45322`
360- libxpm: :cve:`2023-43788`, :cve:`2023-43789`, :cve:`2022-44617` 360- libxpm: :cve_nist:`2023-43788`, :cve_nist:`2023-43789`, :cve_nist:`2022-44617`
361- linux: update CVE exclusions 361- linux: update CVE exclusions
362- ncurses: :cve:`2023-29491` 362- ncurses: :cve_nist:`2023-29491`
363- nghttp2: :cve:`2023-44487` 363- nghttp2: :cve_nist:`2023-44487`
364- ninja: ignore :cve:`2021-4336`, wrong ninja 364- ninja: ignore :cve_nist:`2021-4336`, wrong ninja
365- openssh: :cve:`2023-38408` 365- openssh: :cve_nist:`2023-38408`
366- openssl: :cve:`2023-2650`, :cve:`2023-1255`, :cve:`2023-0466`, :cve:`2023-0465`, :cve:`2023-0464`, :cve:`2023-3817`, :cve:`2023-3446`, :cve:`2023-2975`, :cve:`2023-4807` 366- openssl: :cve_nist:`2023-2650`, :cve_nist:`2023-1255`, :cve_nist:`2023-0466`, :cve_nist:`2023-0465`, :cve_nist:`2023-0464`, :cve_nist:`2023-3817`, :cve_nist:`2023-3446`, :cve_nist:`2023-2975`, :cve_nist:`2023-4807`
367- perl: :cve:`2023-31484`, :cve:`2023-31486` 367- perl: :cve_nist:`2023-31484`, :cve_nist:`2023-31486`
368- pixman: ignore :cve:`2023-37769` 368- pixman: ignore :cve_nist:`2023-37769`
369- procps: :cve:`2023-4016` 369- procps: :cve_nist:`2023-4016`
370- python3-git: :cve:`2023-41040` 370- python3-git: :cve_nist:`2023-41040`
371- python3: ignore :cve:`2023-36632` 371- python3: ignore :cve_nist:`2023-36632`
372- python3-urllib3: :cve:`2023-43804` 372- python3-urllib3: :cve_nist:`2023-43804`
373- qemu: :cve:`2023-40360`, :cve:`2023-42467;` ignore :cve:`2023-0664` (Windows-specific), ignore :cve:`2023-2680` (RHEL specific) 373- qemu: :cve_nist:`2023-40360`, :cve_nist:`2023-42467;` ignore :cve_nist:`2023-0664` (Windows-specific), ignore :cve_nist:`2023-2680` (RHEL specific)
374- screen: :cve:`2023-24626` 374- screen: :cve_nist:`2023-24626`
375- shadow: :cve:`2023-29383` 375- shadow: :cve_nist:`2023-29383`
376- sqlite3: ignore :cve:`2023-36191` 376- sqlite3: ignore :cve_nist:`2023-36191`
377- sysstat: :cve:`2023-33204` 377- sysstat: :cve_nist:`2023-33204`
378- tiff: :cve:`2022-4645`, :cve:`2023-2731`, :cve:`2023-26965`, :cve:`2023-40745`, :cve:`2023-41175` 378- tiff: :cve_nist:`2022-4645`, :cve_nist:`2023-2731`, :cve_nist:`2023-26965`, :cve_nist:`2023-40745`, :cve_nist:`2023-41175`
379- vim: :cve:`2023-2426`, :cve:`2023-2609`, :cve:`2023-2610`, :cve:`2023-3896`, :cve:`2023-5441`, :cve:`2023-5535` 379- vim: :cve_nist:`2023-2426`, :cve_nist:`2023-2609`, :cve_nist:`2023-2610`, :cve_nist:`2023-3896`, :cve_nist:`2023-5441`, :cve_nist:`2023-5535`
380- zlib: ignore :cve:`2023-45853` 380- zlib: ignore :cve_nist:`2023-45853`
381 381
382 382
383Recipe Upgrades in 4.3 383Recipe Upgrades in 4.3
diff --git a/documentation/migration-guides/release-notes-5.0.10.rst b/documentation/migration-guides/release-notes-5.0.10.rst
new file mode 100644
index 0000000000..e9845aa315
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.10.rst
@@ -0,0 +1,208 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.10 (Scarthgap)
4------------------------------------------
5
6Security Fixes in Yocto-5.0.10
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2025-1153`, :cve_nist:`2025-1179`, :cve_nist:`2025-1180` and
10 :cve_nist:`2025-1182`
11- connman: Fix :cve_nist:`2025-32366` and :cve_nist:`2025-32743`
12- curl: Fix :cve_nist:`2024-11053` and :cve_nist:`2025-0167`
13- elfutils: Fix :cve_nist:`2025-1371`
14- ffmpeg: Fix :cve_nist:`2024-7055`, :cve_nist:`2024-32230`, :cve_nist:`2024-35366`,
15 :cve_nist:`2024-36613`, :cve_nist:`2024-36616`, :cve_nist:`2024-36617` and :cve_nist:`2024-36619`
16- git: Fix :cve_nist:`2024-50349` and :cve_nist:`2024-52006`
17- glib-2.0: fix :cve_nist:`2025-3360` and :cve_nist:`2025-4373`
18- iputils: Fix :cve_nist:`2025-47268`
19- libpam: Fix :cve_nist:`2024-10041`
20- libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531`, :cve_nist:`2024-52532`,
21 :cve_nist:`2025-32906`, :cve_nist:`2025-32909`, :cve_nist:`2025-32910`, :cve_nist:`2025-32911`,
22 :cve_nist:`2025-32912`, :cve_nist:`2025-32913`, :cve_nist:`2025-32914` and :cve_nist:`2025-46420`
23- libsoup: Fix :cve_nist:`2025-4476`, :cve_nist:`2025-32906`, :cve_nist:`2025-32909`,
24 :cve_nist:`2025-32910`, :cve_nist:`2025-32911`, :cve_nist:`2025-32912`, :cve_nist:`2025-32913`,
25 :cve_nist:`2025-32914` and :cve_nist:`2025-46420`
26- libxml2: Fix :cve_nist:`2025-32414` and :cve_nist:`2025-32415`
27- openssh: Fix :cve_nist:`2025-32728`
28- perl: Fix :cve_nist:`2024-56406`
29- ppp: Fix :cve_nist:`2024-58250`
30- python3-jinja2: Fix :cve_nist:`2024-56201`, :cve_nist:`2024-56326` and :cve_nist:`2025-27516`
31- ruby: Fix :cve_nist:`2025-27221`
32- sqlite3: Fix :cve_nist:`2025-3277`, :cve_nist:`2025-29087` and :cve_nist:`2025-29088`
33
34
35Fixes in Yocto-5.0.10
36~~~~~~~~~~~~~~~~~~~~~
37
38- binutils: stable 2.42 branch updates
39- bluez5: add missing tools to noinst-tools package
40- bluez5: backport a patch to fix btmgmt -i
41- bluez5: make media control a :term:`PACKAGECONFIG` option
42- build-appliance-image: Update to scarthgap head revision
43- buildtools-tarball: Make buildtools respects host CA certificates
44- buildtools-tarball: add envvars into :term:`BB_ENV_PASSTHROUGH_ADDITIONS`
45- buildtools-tarball: move setting of envvars to respective envfile
46- contributor-guide/submit-changes: encourage patch version changelogs
47- cve-check.bbclass: Fix symlink handling also for text files
48- cve-update-nvd2-native: Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR"
49- dev-manual/sbom.rst: fix wrong build outputs
50- docs: Fix dead links that use the :term:`DISTRO` macro
51- docs: conf.py: tweak SearchEnglish to be hyphen-friendly
52- docs:conf.py: define a manpage url
53- ffmpeg: upgrade to 6.1.2
54- git: upgrade to 2.44.3
55- glibc-y2038-tests: remove glibc-y2038-tests_2.39.bb recipe
56- glibc: Add single-threaded fast path to rand()
57- glibc: stable 2.39 branch updates
58- initscripts: add function log_success_msg/log_failure_msg/log_warning_msg
59- libatomic-ops: Update :term:`GITHUB_BASE_URI`
60- manuals: remove repeated word
61- migration-guides: add release notes for 4.0.26, 5.0.8, 5.0.9
62- module.bbclass: add KBUILD_EXTRA_SYMBOLS to install
63- perl: upgrade to 5.38.4
64- perlcross: upgrade to 1.6.2
65- poky.conf: bump version for 5.0.10
66- poky.yaml: introduce DISTRO_LATEST_TAG
67- python3-jinja2: upgrade to 3.1.6
68- ref-manual/release-process: update releases.svg
69- ref-manual/variables.rst: HOST_CC_ARCH: fix wrong SDK reference
70- ref-manual/variables.rst: WATCHDOG_TIMEOUT: fix recipe name
71- ref-manual/variables.rst: add manpage links for toolchain variables
72- ref-manual/variables.rst: add missing documentation for BUILD_* variables
73- ref-manual/variables.rst: document HOST_*_ARCH variables
74- ref-manual/variables.rst: document :term:`INHIBIT_DEFAULT_RUST_DEPS`
75- ref-manual/variables.rst: document :term:`INHIBIT_UPDATERCD_BBCLASS`
76- ref-manual/variables.rst: document :term:`SSTATE_SKIP_CREATION`
77- ref-manual/variables.rst: document :term:`WIC_CREATE_EXTRA_ARGS`
78- ref-manual/variables.rst: document autotools class related variables
79- ref-manual/variables.rst: document missing SDK_*_ARCH variables
80- ref-manual/variables.rst: document the :term:`IMAGE_ROOTFS_MAXSIZE` variable
81- ref-manual/variables.rst: document the :term:`INITRAMFS_MAXSIZE` variable
82- ref-manual/variables.rst: improve the :term:`PKGV` documentation
83- ref-manual/variables.rst: update :term:`ROOT_HOME` documentation
84- ref-manual: kernel-fitimage.bbclass does not use :term:`SPL_SIGN_KEYNAME`
85- scripts/install-buildtools: Update to 5.0.9
86- sphinx-lint: missing space after literal
87- sphinx-lint: trailing whitespace
88- sphinx-lint: unbalanced inline literal markup
89- systemd: Password agents shouldn't be optional
90- systemd: upgrade to 255.18
91- test-manual/intro: remove Buildbot version used
92- tzdata/tzcode-native: upgrade 2025a -> 2025b
93- u-boot: ensure keys are generated before assembling U-Boot FIT image
94- util-linux: Add fix to isolate test fstab entries using CUSTOM_FSTAB
95- wic: bootimg-efi: Support + symbol in filenames
96
97
98Known Issues in Yocto-5.0.10
99~~~~~~~~~~~~~~~~~~~~~~~~~~~~
100
101- There is an issue where the target libsoup-2.4 build may fail if apachectl is present on the build
102 host. The issue only affects test binaries which aren't actually used. The issue can be fixed by
103 disabling the tests or updating to more recent changes on the scarthgap branch which fix this.
104
105
106Contributors to Yocto-5.0.10
107~~~~~~~~~~~~~~~~~~~~~~~~~~~~
108
109Thanks to the following people who contributed to this release:
110
111- Adrian Freihofer
112- Aleksandar Nikolic
113- Alexander Kanavin
114- Alon Bar-Lev
115- Alper Ak
116- Andrew Kreimer
117- Antonin Godard
118- Archana Polampalli
119- Ashish Sharma
120- Changqing Li
121- Christos Gavros
122- Deepesh Varatharajan
123- Divya Chellam
124- Divyanshu Rathore
125- Enrico Jörns
126- Etienne Cordonnier
127- Guðni Már Gilbert
128- Haixiao Yan
129- Harish Sadineni
130- Igor Opaniuk
131- Jeroen Hofstee
132- Lee Chee Yang
133- Nguyen Dat Tho
134- Niko Mauno
135- Peter Marko
136- Praveen Kumar
137- Priyal Doshi
138- Rogerio Guerra Borin
139- Shubham Kulkarni
140- Soumya Sambu
141- Steve Sakoman
142- Sunil Dora
143- Trevor Woerner
144- Vijay Anusuri
145- Virendra Thakur
146- Vyacheslav Yurkov
147- Yi Zhao
148- Yogita Urade
149- rajmohan r
150
151Repositories / Downloads for Yocto-5.0.10
152~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
153
154poky
155
156- Repository Location: :yocto_git:`/poky`
157- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
158- Tag: :yocto_git:`yocto-5.0.10 </poky/log/?h=yocto-5.0.10>`
159- Git Revision: :yocto_git:`ac257900c33754957b2696529682029d997a8f28 </poky/commit/?id=ac257900c33754957b2696529682029d997a8f28>`
160- Release Artefact: poky-ac257900c33754957b2696529682029d997a8f28
161- sha: ddca7e54b331e78214bea65b346320d4fbcddf4b51103bfbbd9fc3960f32cdc7
162- Download Locations:
163 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2
164 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/poky-ac257900c33754957b2696529682029d997a8f28.tar.bz2
165
166openembedded-core
167
168- Repository Location: :oe_git:`/openembedded-core`
169- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
170- Tag: :oe_git:`yocto-5.0.10 </openembedded-core/log/?h=yocto-5.0.10>`
171- Git Revision: :oe_git:`d5342ffc570d47a723b18297d75bd2f63c2088db </openembedded-core/commit/?id=d5342ffc570d47a723b18297d75bd2f63c2088db>`
172- Release Artefact: oecore-d5342ffc570d47a723b18297d75bd2f63c2088db
173- sha: daa62094f2327f4b3fbcc485e8964d1b86a4722f58fb37e0d8e8e9885094a262
174- Download Locations:
175 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2
176 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/oecore-d5342ffc570d47a723b18297d75bd2f63c2088db.tar.bz2
177
178meta-mingw
179
180- Repository Location: :yocto_git:`/meta-mingw`
181- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
182- Tag: :yocto_git:`yocto-5.0.10 </meta-mingw/log/?h=yocto-5.0.10>`
183- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
184- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
185- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
186- Download Locations:
187 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
188 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
189
190bitbake
191
192- Repository Location: :oe_git:`/bitbake`
193- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
194- Tag: :oe_git:`yocto-5.0.10 </bitbake/log/?h=yocto-5.0.10>`
195- Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>`
196- Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e
197- sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f
198- Download Locations:
199 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
200 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.10/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
201
202yocto-docs
203
204- Repository Location: :yocto_git:`/yocto-docs`
205- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
206- Tag: :yocto_git:`yocto-5.0.10 </yocto-docs/log/?h=yocto-5.0.10>`
207- Git Revision: :yocto_git:`3996388e337377bedc113d072a51fe9d68dd40c6 </yocto-docs/commit/?id=3996388e337377bedc113d072a51fe9d68dd40c6>`
208
diff --git a/documentation/migration-guides/release-notes-5.0.2.rst b/documentation/migration-guides/release-notes-5.0.2.rst
index 820e33189e..b60fd73190 100644
--- a/documentation/migration-guides/release-notes-5.0.2.rst
+++ b/documentation/migration-guides/release-notes-5.0.2.rst
@@ -6,17 +6,17 @@ Release notes for Yocto-5.0.2 (Scarthgap)
6Security Fixes in Yocto-5.0.2 6Security Fixes in Yocto-5.0.2
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- cups: Fix :cve:`2024-35235` 9- cups: Fix :cve_nist:`2024-35235`
10- gcc: Fix :cve:`2024-0151` 10- gcc: Fix :cve_nist:`2024-0151`
11- gdk-pixbuf: Fix :cve:`2022-48622` 11- gdk-pixbuf: Fix :cve_nist:`2022-48622`
12- ghostscript: fix :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871` 12- ghostscript: fix :cve_mitre:`2024-29510`, :cve_mitre:`2024-33869`, :cve_mitre:`2024-33870` and :cve_mitre:`2024-33871`
13- git: Fix :cve:`2024-32002`, :cve:`2024-32004`, :cve:`2024-32020`, :cve:`2024-32021` and :cve:`2024-32465` 13- git: Fix :cve_nist:`2024-32002`, :cve_nist:`2024-32004`, :cve_nist:`2024-32020`, :cve_nist:`2024-32021` and :cve_nist:`2024-32465`
14- glib-2.0: Fix :cve:`2024-34397` 14- glib-2.0: Fix :cve_nist:`2024-34397`
15- glibc: Fix :cve:`2024-2961`, :cve:`2024-33599`, :cve:`2024-33600`, :cve:`2024-33601` and :cve:`2024-33602` 15- glibc: Fix :cve_nist:`2024-2961`, :cve_nist:`2024-33599`, :cve_nist:`2024-33600`, :cve_nist:`2024-33601` and :cve_nist:`2024-33602`
16- ncurses: Fix :cve:`2023-45918` and :cve:`2023-50495` 16- ncurses: Fix :cve_nist:`2023-45918` and :cve_nist:`2023-50495`
17- openssl: Fix :cve:`2024-4603` and :cve_mitre:`2024-4741` 17- openssl: Fix :cve_nist:`2024-4603` and :cve_mitre:`2024-4741`
18- util-linux: Fix :cve:`2024-28085` 18- util-linux: Fix :cve_nist:`2024-28085`
19- xserver-xorg: Fix :cve:`2024-31080`, :cve:`2024-31081`, :cve:`2024-31082` and :cve:`2024-31083` 19- xserver-xorg: Fix :cve_nist:`2024-31080`, :cve_nist:`2024-31081`, :cve_nist:`2024-31082` and :cve_nist:`2024-31083`
20 20
21 21
22Fixes in Yocto-5.0.2 22Fixes in Yocto-5.0.2
@@ -44,7 +44,7 @@ Fixes in Yocto-5.0.2
44- bitbake: tests/fetch: Tweak test to match upstream repo url change 44- bitbake: tests/fetch: Tweak test to match upstream repo url change
45- bitbake: tests/fetch: Tweak to work on Fedora40 45- bitbake: tests/fetch: Tweak to work on Fedora40
46- build-appliance-image: Update to scarthgap head revision 46- build-appliance-image: Update to scarthgap head revision
47- busybox: update :cve:`2022-28391` patches upstream status 47- busybox: update :cve_nist:`2022-28391` patches upstream status
48- cdrtools-native: Fix build with GCC 14 48- cdrtools-native: Fix build with GCC 14
49- classes: image_types: apply EXTRA_IMAGECMD:squashfs* in oe_mksquashfs() 49- classes: image_types: apply EXTRA_IMAGECMD:squashfs* in oe_mksquashfs()
50- classes: image_types: quote variable assignment needed by dash 50- classes: image_types: quote variable assignment needed by dash
diff --git a/documentation/migration-guides/release-notes-5.0.3.rst b/documentation/migration-guides/release-notes-5.0.3.rst
index 5ed660c9ec..caf33c7c3f 100644
--- a/documentation/migration-guides/release-notes-5.0.3.rst
+++ b/documentation/migration-guides/release-notes-5.0.3.rst
@@ -6,30 +6,30 @@ Release notes for Yocto-5.0.3 (Scarthgap)
6Security Fixes in Yocto-5.0.3 6Security Fixes in Yocto-5.0.3
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 8
9- bind: Fix :cve:`2024-0760`, :cve:`2024-1737`, :cve:`2024-1975` and :cve:`2024-4076` 9- bind: Fix :cve_nist:`2024-0760`, :cve_nist:`2024-1737`, :cve_nist:`2024-1975` and :cve_nist:`2024-4076`
10- busybox: Fix :cve:`2023-42366`, :cve:`2023-42364`, :cve:`2023-42365`, :cve:`2021-42380` and :cve:`2023-42363` 10- busybox: Fix :cve_nist:`2023-42366`, :cve_nist:`2023-42364`, :cve_nist:`2023-42365`, :cve_nist:`2021-42380` and :cve_nist:`2023-42363`
11- cpio: Ignore :cve:`2023-7216` 11- cpio: Ignore :cve_nist:`2023-7216`
12- curl: Fix :cve:`2024-6197` 12- curl: Fix :cve_nist:`2024-6197`
13- ffmpeg: Fix :cve:`2023-49502`, :cve:`2024-31578` and :cve:`2024-31582` 13- ffmpeg: Fix :cve_nist:`2023-49502`, :cve_nist:`2024-31578` and :cve_nist:`2024-31582`
14- ghostscript: Fix :cve:`2023-52722` 14- ghostscript: Fix :cve_nist:`2023-52722`
15- go: Fix :cve:`2024-24790` 15- go: Fix :cve_nist:`2024-24790`
16- gstreamer1.0-plugins-base: Fix :cve:`2024-4453` 16- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-4453`
17- less: Fix :cve:`2024-32487` 17- less: Fix :cve_nist:`2024-32487`
18- libxml2: Fix :cve:`2024-34459` 18- libxml2: Fix :cve_nist:`2024-34459`
19- libyaml: Ignore :cve:`2024-35328` 19- libyaml: Ignore :cve_nist:`2024-35328`
20- linux-yocto/6.6: Fix :cve:`2024-23307`, :cve:`2024-24861`, :cve:`2024-26642`, :cve:`2024-26643`, :cve:`2024-26654`, :cve:`2024-26656` and :cve:`2023-47233` 20- linux-yocto/6.6: Fix :cve_nist:`2024-23307`, :cve_nist:`2024-24861`, :cve_nist:`2024-26642`, :cve_nist:`2024-26643`, :cve_nist:`2024-26654`, :cve_nist:`2024-26656` and :cve_nist:`2023-47233`
21- linux-yocto/6.6: Ignore :cve:`2019-25160`, :cve:`2019-25162`, :cve:`2020-36775`, :cve:`2020-36776`, :cve:`2020-36777`, :cve:`2020-36778`, :cve:`2020-36779`, :cve:`2020-36780`, :cve:`2020-36781`, :cve:`2020-36782`, :cve:`2020-36783`, :cve:`2020-36784`, :cve:`2020-36785`, :cve:`2020-36786`, :cve:`2020-36787`, :cve:`2021-46904`, :cve:`2021-46905`, :cve:`2021-46906`, :cve:`2021-46908`, :cve:`2021-46909`, :cve:`2021-46910`, :cve:`2021-46911`, :cve:`2021-46912`, :cve:`2021-46913`, :cve:`2021-46914`, :cve:`2021-46915`, :cve:`2021-46916`, :cve:`2021-46917`, :cve:`2021-46918`, :cve:`2021-46919`, :cve:`2021-46920`, :cve:`2021-46921`, :cve:`2021-46922`, :cve:`2021-46923`, :cve:`2021-46924`, :cve:`2021-46925`, :cve:`2021-46926`, :cve:`2021-46927`, :cve:`2021-46928`, :cve:`2021-46929`, :cve:`2021-46930`, :cve:`2021-46931`, :cve:`2021-46932`, :cve:`2021-46933`, :cve:`2021-46934`, :cve:`2021-46935`, :cve:`2021-46936`, :cve:`2021-46937`, :cve:`2021-46938`, :cve:`2021-46939`, :cve:`2021-46940`, :cve:`2021-46941`, :cve:`2021-46942`, :cve:`2021-46943`, :cve:`2021-46944`, :cve:`2021-46945`, :cve:`2021-46947`, :cve:`2021-46948`, :cve:`2021-46949`, :cve:`2021-46950`, :cve:`2021-46951`, :cve:`2021-46952`, :cve:`2021-46953`, :cve:`2021-46954`, :cve:`2021-46955`, :cve:`2021-46956`, :cve:`2021-46957`, :cve:`2021-46958`, :cve:`2021-46959`, :cve:`2021-46960`, :cve:`2021-46961`, :cve:`2021-46962`, :cve:`2021-46963`, :cve:`2021-46964`, :cve:`2021-46965`, :cve:`2021-46966`, :cve:`2021-46967`, :cve:`2021-46968`, :cve:`2021-46969`, :cve:`2021-46970`, :cve:`2021-46971`, :cve:`2021-46972`, :cve:`2021-46973`, :cve:`2021-46974`, :cve:`2021-46976`, :cve:`2021-46977`, :cve:`2021-46978`, :cve:`2021-46979`, :cve:`2021-46980`, :cve:`2021-46981`, :cve:`2021-46982`, :cve:`2021-46983`, :cve:`2021-46984`, :cve:`2021-46985`, :cve:`2021-46986`, :cve:`2021-46987`, :cve:`2021-46988`, :cve:`2021-46989`, :cve:`2021-46990`, :cve:`2021-46991`, :cve:`2021-46992`, :cve:`2021-46993`, :cve:`2021-46994`, :cve:`2021-46995`, :cve:`2021-46996`, :cve:`2021-46997`, :cve:`2021-46998`, :cve:`2021-46999`, :cve:`2021-47000`, :cve:`2021-47001`, :cve:`2021-47002`, :cve:`2021-47003`, :cve:`2021-47004`, :cve:`2021-47005`, :cve:`2021-47006`, :cve:`2021-47007`, :cve:`2021-47008`, :cve:`2021-47009`, :cve:`2021-47010`, :cve:`2021-47011`, :cve:`2021-47012`, :cve:`2021-47013`, :cve:`2021-47014`, :cve:`2021-47015`, :cve:`2021-47016`, :cve:`2021-47017`, :cve:`2021-47018`, :cve:`2021-47019`, :cve:`2021-47020`, :cve:`2021-47021`, :cve:`2021-47022`, :cve:`2021-47023`, :cve:`2021-47024`, :cve:`2021-47025`, :cve:`2021-47026`, :cve:`2021-47027`, :cve:`2021-47028`, :cve:`2021-47029`, :cve:`2021-47030`, :cve:`2021-47031`, :cve:`2021-47032`, :cve:`2021-47033`, :cve:`2021-47034`, :cve:`2021-47035`, :cve:`2021-47036`, :cve:`2021-47037`, :cve:`2021-47038`, :cve:`2021-47039`, :cve:`2021-47040`, :cve:`2021-47041`, :cve:`2021-47042`, :cve:`2021-47043`, :cve:`2021-47044`, :cve:`2021-47045`, :cve:`2021-47046`, :cve:`2021-47047`, :cve:`2021-47048`, :cve:`2021-47049`, :cve:`2021-47050`, :cve:`2021-47051`, :cve:`2021-47052`, :cve:`2021-47053`, :cve:`2021-47054`, :cve:`2021-47055`, :cve:`2021-47056`, :cve:`2021-47057`, :cve:`2021-47058`, :cve:`2021-47059`, :cve:`2021-47060`, :cve:`2021-47061`, :cve:`2021-47062`, :cve:`2021-47063`, :cve:`2021-47064`, :cve:`2021-47065`, :cve:`2021-47066`, :cve:`2021-47067`, :cve:`2021-47068`, :cve:`2021-47069`, :cve:`2021-47070`, :cve:`2021-47071`, :cve:`2021-47072`, :cve:`2021-47073`, :cve:`2021-47074`, :cve:`2021-47075`, :cve:`2021-47076`, :cve:`2021-47077`, :cve:`2021-47078`, :cve:`2021-47079`, :cve:`2021-47080`, :cve:`2021-47081`, :cve:`2021-47082`, :cve:`2021-47083`, :cve:`2021-47086`, :cve:`2021-47087`, :cve:`2021-47088`, :cve:`2021-47089`, :cve:`2021-47090`, :cve:`2021-47091`, :cve:`2021-47092`, :cve:`2021-47093`, :cve:`2021-47094`, :cve:`2021-47095`, :cve:`2021-47096`, :cve:`2021-47097`, :cve:`2021-47098`, :cve:`2021-47099`, :cve:`2021-47100`, :cve:`2021-47101`, :cve:`2021-47102`, :cve:`2021-47103`, :cve:`2021-47104`, :cve:`2021-47105`, :cve:`2021-47106`, :cve:`2021-47107`, :cve:`2021-47108`, :cve:`2021-47109`, :cve:`2021-47110`, :cve:`2021-47111`, :cve:`2021-47112`, :cve:`2021-47113`, :cve:`2021-47114`, :cve:`2021-47116`, :cve:`2021-47117`, :cve:`2021-47118`, :cve:`2021-47119`, :cve:`2021-47120`, :cve:`2021-47121`, :cve:`2021-47122`, :cve:`2021-47123`, :cve:`2021-47124`, :cve:`2021-47125`, :cve:`2021-47126`, :cve:`2021-47127`, :cve:`2021-47128`, :cve:`2021-47129`, :cve:`2021-47130`, :cve:`2021-47131`, :cve:`2021-47132`, :cve:`2021-47133`, :cve:`2021-47134`, :cve:`2021-47135`, :cve:`2021-47136`, :cve:`2021-47137`, :cve:`2021-47138`, :cve:`2021-47139`, :cve:`2021-47140`, :cve:`2021-47141`, :cve:`2021-47142`, :cve:`2021-47143`, :cve:`2021-47144`, :cve:`2021-47145`, :cve:`2021-47146`, :cve:`2021-47147`, :cve:`2021-47148`, :cve:`2021-47149`, :cve:`2021-47150`, :cve:`2021-47151`, :cve:`2021-47152`, :cve:`2021-47153`, :cve:`2021-47158`, :cve:`2021-47159`, :cve:`2021-47160`, :cve:`2021-47161`, :cve:`2021-47162`, :cve:`2021-47163`, :cve:`2021-47164`, :cve:`2021-47165`, :cve:`2021-47166`, :cve:`2021-47167`, :cve:`2021-47168`, :cve:`2021-47169`, :cve:`2021-47170`, :cve:`2021-47171`, :cve:`2021-47172`, :cve:`2021-47173`, :cve:`2021-47174`, :cve:`2021-47175`, :cve:`2021-47176`, :cve:`2021-47177`, :cve:`2021-47178`, :cve:`2021-47179`, :cve:`2021-47180`, :cve:`2022-48626`, :cve:`2022-48627`, :cve:`2022-48628`, :cve:`2022-48629` and :cve:`2022-48630` 21- linux-yocto/6.6: Ignore :cve_nist:`2019-25160`, :cve_nist:`2019-25162`, :cve_nist:`2020-36775`, :cve_nist:`2020-36776`, :cve_nist:`2020-36777`, :cve_nist:`2020-36778`, :cve_nist:`2020-36779`, :cve_nist:`2020-36780`, :cve_nist:`2020-36781`, :cve_nist:`2020-36782`, :cve_nist:`2020-36783`, :cve_nist:`2020-36784`, :cve_nist:`2020-36785`, :cve_nist:`2020-36786`, :cve_nist:`2020-36787`, :cve_nist:`2021-46904`, :cve_nist:`2021-46905`, :cve_nist:`2021-46906`, :cve_nist:`2021-46908`, :cve_nist:`2021-46909`, :cve_nist:`2021-46910`, :cve_nist:`2021-46911`, :cve_nist:`2021-46912`, :cve_nist:`2021-46913`, :cve_nist:`2021-46914`, :cve_nist:`2021-46915`, :cve_nist:`2021-46916`, :cve_nist:`2021-46917`, :cve_nist:`2021-46918`, :cve_nist:`2021-46919`, :cve_nist:`2021-46920`, :cve_nist:`2021-46921`, :cve_nist:`2021-46922`, :cve_nist:`2021-46923`, :cve_nist:`2021-46924`, :cve_nist:`2021-46925`, :cve_nist:`2021-46926`, :cve_nist:`2021-46927`, :cve_nist:`2021-46928`, :cve_nist:`2021-46929`, :cve_nist:`2021-46930`, :cve_nist:`2021-46931`, :cve_nist:`2021-46932`, :cve_nist:`2021-46933`, :cve_nist:`2021-46934`, :cve_nist:`2021-46935`, :cve_nist:`2021-46936`, :cve_nist:`2021-46937`, :cve_nist:`2021-46938`, :cve_nist:`2021-46939`, :cve_nist:`2021-46940`, :cve_nist:`2021-46941`, :cve_nist:`2021-46942`, :cve_nist:`2021-46943`, :cve_nist:`2021-46944`, :cve_nist:`2021-46945`, :cve_nist:`2021-46947`, :cve_nist:`2021-46948`, :cve_nist:`2021-46949`, :cve_nist:`2021-46950`, :cve_nist:`2021-46951`, :cve_nist:`2021-46952`, :cve_nist:`2021-46953`, :cve_nist:`2021-46954`, :cve_nist:`2021-46955`, :cve_nist:`2021-46956`, :cve_nist:`2021-46957`, :cve_nist:`2021-46958`, :cve_nist:`2021-46959`, :cve_nist:`2021-46960`, :cve_nist:`2021-46961`, :cve_nist:`2021-46962`, :cve_nist:`2021-46963`, :cve_nist:`2021-46964`, :cve_nist:`2021-46965`, :cve_nist:`2021-46966`, :cve_nist:`2021-46967`, :cve_nist:`2021-46968`, :cve_nist:`2021-46969`, :cve_nist:`2021-46970`, :cve_nist:`2021-46971`, :cve_nist:`2021-46972`, :cve_nist:`2021-46973`, :cve_nist:`2021-46974`, :cve_nist:`2021-46976`, :cve_nist:`2021-46977`, :cve_nist:`2021-46978`, :cve_nist:`2021-46979`, :cve_nist:`2021-46980`, :cve_nist:`2021-46981`, :cve_nist:`2021-46982`, :cve_nist:`2021-46983`, :cve_nist:`2021-46984`, :cve_nist:`2021-46985`, :cve_nist:`2021-46986`, :cve_nist:`2021-46987`, :cve_nist:`2021-46988`, :cve_nist:`2021-46989`, :cve_nist:`2021-46990`, :cve_nist:`2021-46991`, :cve_nist:`2021-46992`, :cve_nist:`2021-46993`, :cve_nist:`2021-46994`, :cve_nist:`2021-46995`, :cve_nist:`2021-46996`, :cve_nist:`2021-46997`, :cve_nist:`2021-46998`, :cve_nist:`2021-46999`, :cve_nist:`2021-47000`, :cve_nist:`2021-47001`, :cve_nist:`2021-47002`, :cve_nist:`2021-47003`, :cve_nist:`2021-47004`, :cve_nist:`2021-47005`, :cve_nist:`2021-47006`, :cve_nist:`2021-47007`, :cve_nist:`2021-47008`, :cve_nist:`2021-47009`, :cve_nist:`2021-47010`, :cve_nist:`2021-47011`, :cve_nist:`2021-47012`, :cve_nist:`2021-47013`, :cve_nist:`2021-47014`, :cve_nist:`2021-47015`, :cve_nist:`2021-47016`, :cve_nist:`2021-47017`, :cve_nist:`2021-47018`, :cve_nist:`2021-47019`, :cve_nist:`2021-47020`, :cve_nist:`2021-47021`, :cve_nist:`2021-47022`, :cve_nist:`2021-47023`, :cve_nist:`2021-47024`, :cve_nist:`2021-47025`, :cve_nist:`2021-47026`, :cve_nist:`2021-47027`, :cve_nist:`2021-47028`, :cve_nist:`2021-47029`, :cve_nist:`2021-47030`, :cve_nist:`2021-47031`, :cve_nist:`2021-47032`, :cve_nist:`2021-47033`, :cve_nist:`2021-47034`, :cve_nist:`2021-47035`, :cve_nist:`2021-47036`, :cve_nist:`2021-47037`, :cve_nist:`2021-47038`, :cve_nist:`2021-47039`, :cve_nist:`2021-47040`, :cve_nist:`2021-47041`, :cve_nist:`2021-47042`, :cve_nist:`2021-47043`, :cve_nist:`2021-47044`, :cve_nist:`2021-47045`, :cve_nist:`2021-47046`, :cve_nist:`2021-47047`, :cve_nist:`2021-47048`, :cve_nist:`2021-47049`, :cve_nist:`2021-47050`, :cve_nist:`2021-47051`, :cve_nist:`2021-47052`, :cve_nist:`2021-47053`, :cve_nist:`2021-47054`, :cve_nist:`2021-47055`, :cve_nist:`2021-47056`, :cve_nist:`2021-47057`, :cve_nist:`2021-47058`, :cve_nist:`2021-47059`, :cve_nist:`2021-47060`, :cve_nist:`2021-47061`, :cve_nist:`2021-47062`, :cve_nist:`2021-47063`, :cve_nist:`2021-47064`, :cve_nist:`2021-47065`, :cve_nist:`2021-47066`, :cve_nist:`2021-47067`, :cve_nist:`2021-47068`, :cve_nist:`2021-47069`, :cve_nist:`2021-47070`, :cve_nist:`2021-47071`, :cve_nist:`2021-47072`, :cve_nist:`2021-47073`, :cve_nist:`2021-47074`, :cve_nist:`2021-47075`, :cve_nist:`2021-47076`, :cve_nist:`2021-47077`, :cve_nist:`2021-47078`, :cve_nist:`2021-47079`, :cve_nist:`2021-47080`, :cve_nist:`2021-47081`, :cve_nist:`2021-47082`, :cve_nist:`2021-47083`, :cve_nist:`2021-47086`, :cve_nist:`2021-47087`, :cve_nist:`2021-47088`, :cve_nist:`2021-47089`, :cve_nist:`2021-47090`, :cve_nist:`2021-47091`, :cve_nist:`2021-47092`, :cve_nist:`2021-47093`, :cve_nist:`2021-47094`, :cve_nist:`2021-47095`, :cve_nist:`2021-47096`, :cve_nist:`2021-47097`, :cve_nist:`2021-47098`, :cve_nist:`2021-47099`, :cve_nist:`2021-47100`, :cve_nist:`2021-47101`, :cve_nist:`2021-47102`, :cve_nist:`2021-47103`, :cve_nist:`2021-47104`, :cve_nist:`2021-47105`, :cve_nist:`2021-47106`, :cve_nist:`2021-47107`, :cve_nist:`2021-47108`, :cve_nist:`2021-47109`, :cve_nist:`2021-47110`, :cve_nist:`2021-47111`, :cve_nist:`2021-47112`, :cve_nist:`2021-47113`, :cve_nist:`2021-47114`, :cve_nist:`2021-47116`, :cve_nist:`2021-47117`, :cve_nist:`2021-47118`, :cve_nist:`2021-47119`, :cve_nist:`2021-47120`, :cve_nist:`2021-47121`, :cve_nist:`2021-47122`, :cve_nist:`2021-47123`, :cve_nist:`2021-47124`, :cve_nist:`2021-47125`, :cve_nist:`2021-47126`, :cve_nist:`2021-47127`, :cve_nist:`2021-47128`, :cve_nist:`2021-47129`, :cve_nist:`2021-47130`, :cve_nist:`2021-47131`, :cve_nist:`2021-47132`, :cve_nist:`2021-47133`, :cve_nist:`2021-47134`, :cve_nist:`2021-47135`, :cve_nist:`2021-47136`, :cve_nist:`2021-47137`, :cve_nist:`2021-47138`, :cve_nist:`2021-47139`, :cve_nist:`2021-47140`, :cve_nist:`2021-47141`, :cve_nist:`2021-47142`, :cve_nist:`2021-47143`, :cve_nist:`2021-47144`, :cve_nist:`2021-47145`, :cve_nist:`2021-47146`, :cve_nist:`2021-47147`, :cve_nist:`2021-47148`, :cve_nist:`2021-47149`, :cve_nist:`2021-47150`, :cve_nist:`2021-47151`, :cve_nist:`2021-47152`, :cve_nist:`2021-47153`, :cve_nist:`2021-47158`, :cve_nist:`2021-47159`, :cve_nist:`2021-47160`, :cve_nist:`2021-47161`, :cve_nist:`2021-47162`, :cve_nist:`2021-47163`, :cve_nist:`2021-47164`, :cve_nist:`2021-47165`, :cve_nist:`2021-47166`, :cve_nist:`2021-47167`, :cve_nist:`2021-47168`, :cve_nist:`2021-47169`, :cve_nist:`2021-47170`, :cve_nist:`2021-47171`, :cve_nist:`2021-47172`, :cve_nist:`2021-47173`, :cve_nist:`2021-47174`, :cve_nist:`2021-47175`, :cve_nist:`2021-47176`, :cve_nist:`2021-47177`, :cve_nist:`2021-47178`, :cve_nist:`2021-47179`, :cve_nist:`2021-47180`, :cve_nist:`2022-48626`, :cve_nist:`2022-48627`, :cve_nist:`2022-48628`, :cve_nist:`2022-48629` and :cve_nist:`2022-48630`
22- linux-yocto/6.6 (cont.): Ignore :cve:`2023-6270`, :cve:`2023-6356`, :cve:`2023-6536`, :cve:`2023-7042`, :cve:`2023-28746`, :cve:`2023-52465`, :cve:`2023-52467`, :cve:`2023-52468`, :cve:`2023-52469`, :cve:`2023-52470`, :cve:`2023-52471`, :cve:`2023-52472`, :cve:`2023-52473`, :cve:`2023-52474`, :cve:`2023-52475`, :cve:`2023-52476`, :cve:`2023-52477`, :cve:`2023-52478`, :cve:`2023-52479`, :cve:`2023-52480`, :cve:`2023-52481`, :cve:`2023-52482`, :cve:`2023-52483`, :cve:`2023-52484`, :cve:`2023-52486`, :cve:`2023-52487`, :cve:`2023-52488`, :cve:`2023-52489`, :cve:`2023-52490`, :cve:`2023-52491`, :cve:`2023-52492`, :cve:`2023-52493`, :cve:`2023-52494`, :cve:`2023-52495`, :cve:`2023-52497`, :cve:`2023-52498`, :cve:`2023-52499`, :cve:`2023-52500`, :cve:`2023-52501`, :cve:`2023-52502`, :cve:`2023-52503`, :cve:`2023-52504`, :cve:`2023-52505`, :cve:`2023-52506`, :cve:`2023-52507`, :cve:`2023-52508`, :cve:`2023-52509`, :cve:`2023-52510`, :cve:`2023-52511`, :cve:`2023-52512`, :cve:`2023-52513`, :cve:`2023-52515`, :cve:`2023-52516`, :cve:`2023-52517`, :cve:`2023-52518`, :cve:`2023-52519`, :cve:`2023-52520`, :cve:`2023-52522`, :cve:`2023-52523`, :cve:`2023-52524`, :cve:`2023-52525`, :cve:`2023-52526`, :cve:`2023-52527`, :cve:`2023-52528`, :cve:`2023-52529`, :cve:`2023-52530`, :cve:`2023-52531`, :cve:`2023-52532`, :cve:`2023-52559`, :cve:`2023-52560`, :cve:`2023-52561`, :cve:`2023-52562`, :cve:`2023-52563`, :cve:`2023-52564`, :cve:`2023-52565`, :cve:`2023-52566`, :cve:`2023-52567`, :cve:`2023-52568`, :cve:`2023-52569`, :cve:`2023-52570`, :cve:`2023-52571`, :cve:`2023-52572`, :cve:`2023-52573`, :cve:`2023-52574`, :cve:`2023-52575`, :cve:`2023-52576`, :cve:`2023-52577`, :cve:`2023-52578`, :cve:`2023-52580`, :cve:`2023-52581`, :cve:`2023-52582`, :cve:`2023-52583`, :cve:`2023-52584`, :cve:`2023-52587`, :cve:`2023-52588`, :cve:`2023-52589`, :cve:`2023-52591`, :cve:`2023-52593`, :cve:`2023-52594`, :cve:`2023-52595`, :cve:`2023-52596`, :cve:`2023-52597`, :cve:`2023-52598`, :cve:`2023-52599`, :cve:`2023-52600`, :cve:`2023-52601`, :cve:`2023-52602`, :cve:`2023-52603`, :cve:`2023-52604`, :cve:`2023-52606`, :cve:`2023-52607`, :cve:`2023-52608`, :cve:`2023-52609`, :cve:`2023-52610`, :cve:`2023-52611`, :cve:`2023-52612`, :cve:`2023-52613`, :cve:`2023-52614`, :cve:`2023-52615`, :cve:`2023-52616`, :cve:`2023-52617`, :cve:`2023-52618`, :cve:`2023-52619`, :cve:`2023-52620`, :cve:`2023-52621`, :cve:`2023-52622`, :cve:`2023-52623`, :cve:`2023-52626`, :cve:`2023-52627`, :cve:`2023-52628`, :cve:`2023-52629`, :cve:`2023-52630`, :cve:`2023-52631`, :cve:`2023-52632`, :cve:`2023-52633`, :cve:`2023-52635`, :cve:`2023-52636`, :cve:`2023-52637`, :cve:`2023-52638`, :cve:`2023-52639`, :cve:`2023-52640`, :cve:`2023-52641`, :cve:`2024-0841`, :cve:`2024-22099`, :cve:`2024-23196`, :cve:`2024-26600`, :cve:`2024-26601`, :cve:`2024-26602`, :cve:`2024-26603`, :cve:`2024-26604`, :cve:`2024-26605`, :cve:`2024-26606`, :cve:`2024-26607`, :cve:`2024-26608`, :cve:`2024-26610`, :cve:`2024-26611`, :cve:`2024-26612`, :cve:`2024-26614`, :cve:`2024-26615`, :cve:`2024-26616`, :cve:`2024-26617`, :cve:`2024-26618`, :cve:`2024-26619`, :cve:`2024-26620`, :cve:`2024-26621`, :cve:`2024-26622`, :cve:`2024-26623`, :cve:`2024-26625`, :cve:`2024-26626`, :cve:`2024-26627`, :cve:`2024-26629`, :cve:`2024-26630`, :cve:`2024-26631`, :cve:`2024-26632`, :cve:`2024-26633`, :cve:`2024-26634`, :cve:`2024-26635`, :cve:`2024-26636`, :cve:`2024-26637`, :cve:`2024-26638`, :cve:`2024-26639`, :cve:`2024-26640`, :cve:`2024-26641`, :cve:`2024-26644`, :cve:`2024-26645`, :cve:`2024-26646`, :cve:`2024-26647`, :cve:`2024-26648`, :cve:`2024-26649`, :cve:`2024-26650`, :cve:`2024-26651`, :cve:`2024-26652`, :cve:`2024-26653`, :cve:`2024-26657`, :cve:`2024-26659`, :cve:`2024-26660`, :cve:`2024-26661`, :cve:`2024-26662`, :cve:`2024-26663`, :cve:`2024-26664`, :cve:`2024-26665`, :cve:`2024-26666`, :cve:`2024-26667`, :cve:`2024-26668`, :cve:`2024-26669`, :cve:`2024-26670`, :cve:`2024-26671`, :cve:`2024-26673`, :cve:`2024-26674`, :cve:`2024-26675`, :cve:`2024-26676`, :cve:`2024-26677`, :cve:`2024-26678`, :cve:`2024-26679`, :cve:`2024-26680`, :cve:`2024-26681`, :cve:`2024-26682`, :cve:`2024-26683`, :cve:`2024-26684`, :cve:`2024-26685`, :cve:`2024-26687`, :cve:`2024-26688`, :cve:`2024-26689`, :cve:`2024-26690`, :cve:`2024-26691`, :cve:`2024-26692`, :cve:`2024-26693`, :cve:`2024-26694`, :cve:`2024-26695`, :cve:`2024-26696`, :cve:`2024-26697`, :cve:`2024-26698`, :cve:`2024-26700`, :cve:`2024-26702`, :cve:`2024-26703`, :cve:`2024-26704`, :cve:`2024-26705`, :cve:`2024-26706`, :cve:`2024-26707`, :cve:`2024-26708`, :cve:`2024-26709`, :cve:`2024-26710`, :cve:`2024-26711`, :cve:`2024-26712`, :cve:`2024-26713`, :cve:`2024-26714`, :cve:`2024-26715`, :cve:`2024-26716`, :cve:`2024-26717`, :cve:`2024-26718`, :cve:`2024-26719`, :cve:`2024-26720`, :cve:`2024-26721`, :cve:`2024-26722`, :cve:`2024-26723`, :cve:`2024-26724`, :cve:`2024-26725`, :cve:`2024-26726`, :cve:`2024-26727`, :cve:`2024-26728`, :cve:`2024-26729`, :cve:`2024-26730`, :cve:`2024-26731`, :cve:`2024-26732`, :cve:`2024-26733`, :cve:`2024-26734`, :cve:`2024-26735`, :cve:`2024-26736`, :cve:`2024-26737`, :cve:`2024-26738`, :cve:`2024-26739`, :cve:`2024-26740`, :cve:`2024-26741`, :cve:`2024-26742`, :cve:`2024-26743`, :cve:`2024-26744`, :cve:`2024-26745`, :cve:`2024-26746`, :cve:`2024-26747`, :cve:`2024-26748`, :cve:`2024-26749`, :cve:`2024-26750`, :cve:`2024-26751`, :cve:`2024-26752`, :cve:`2024-26753`, :cve:`2024-26754`, :cve:`2024-26755`, :cve:`2024-26759`, :cve:`2024-26760`, :cve:`2024-26761`, :cve:`2024-26762`, :cve:`2024-26763`, :cve:`2024-26764`, :cve:`2024-26765`, :cve:`2024-26766`, :cve:`2024-26767`, :cve:`2024-26768`, :cve:`2024-26769`, :cve:`2024-26770`, :cve:`2024-26771`, :cve:`2024-26772`, :cve:`2024-26773`, :cve:`2024-26774`, :cve:`2024-26775`, :cve:`2024-26776`, :cve:`2024-26777`, :cve:`2024-26778`, :cve:`2024-26779`, :cve:`2024-26780`, :cve:`2024-26781`, :cve:`2024-26782`, :cve:`2024-26783`, :cve:`2024-26786`, :cve:`2024-26787`, :cve:`2024-26788`, :cve:`2024-26789`, :cve:`2024-26790`, :cve:`2024-26791`, :cve:`2024-26792`, :cve:`2024-26793`, :cve:`2024-26794`, :cve:`2024-26795`, :cve:`2024-26796`, :cve:`2024-26798`, :cve:`2024-26799`, :cve:`2024-26800`, :cve:`2024-26801`, :cve:`2024-26802`, :cve:`2024-26803`, :cve:`2024-26804`, :cve:`2024-26805`, :cve:`2024-26807`, :cve:`2024-26808` and :cve:`2024-26809` 22- linux-yocto/6.6 (cont.): Ignore :cve_nist:`2023-6270`, :cve_nist:`2023-6356`, :cve_nist:`2023-6536`, :cve_nist:`2023-7042`, :cve_nist:`2023-28746`, :cve_nist:`2023-52465`, :cve_nist:`2023-52467`, :cve_nist:`2023-52468`, :cve_nist:`2023-52469`, :cve_nist:`2023-52470`, :cve_nist:`2023-52471`, :cve_nist:`2023-52472`, :cve_nist:`2023-52473`, :cve_nist:`2023-52474`, :cve_nist:`2023-52475`, :cve_nist:`2023-52476`, :cve_nist:`2023-52477`, :cve_nist:`2023-52478`, :cve_nist:`2023-52479`, :cve_nist:`2023-52480`, :cve_nist:`2023-52481`, :cve_nist:`2023-52482`, :cve_nist:`2023-52483`, :cve_nist:`2023-52484`, :cve_nist:`2023-52486`, :cve_nist:`2023-52487`, :cve_nist:`2023-52488`, :cve_nist:`2023-52489`, :cve_nist:`2023-52490`, :cve_nist:`2023-52491`, :cve_nist:`2023-52492`, :cve_nist:`2023-52493`, :cve_nist:`2023-52494`, :cve_nist:`2023-52495`, :cve_nist:`2023-52497`, :cve_nist:`2023-52498`, :cve_nist:`2023-52499`, :cve_nist:`2023-52500`, :cve_nist:`2023-52501`, :cve_nist:`2023-52502`, :cve_nist:`2023-52503`, :cve_nist:`2023-52504`, :cve_nist:`2023-52505`, :cve_nist:`2023-52506`, :cve_nist:`2023-52507`, :cve_nist:`2023-52508`, :cve_nist:`2023-52509`, :cve_nist:`2023-52510`, :cve_nist:`2023-52511`, :cve_nist:`2023-52512`, :cve_nist:`2023-52513`, :cve_nist:`2023-52515`, :cve_nist:`2023-52516`, :cve_nist:`2023-52517`, :cve_nist:`2023-52518`, :cve_nist:`2023-52519`, :cve_nist:`2023-52520`, :cve_nist:`2023-52522`, :cve_nist:`2023-52523`, :cve_nist:`2023-52524`, :cve_nist:`2023-52525`, :cve_nist:`2023-52526`, :cve_nist:`2023-52527`, :cve_nist:`2023-52528`, :cve_nist:`2023-52529`, :cve_nist:`2023-52530`, :cve_nist:`2023-52531`, :cve_nist:`2023-52532`, :cve_nist:`2023-52559`, :cve_nist:`2023-52560`, :cve_nist:`2023-52561`, :cve_nist:`2023-52562`, :cve_nist:`2023-52563`, :cve_nist:`2023-52564`, :cve_nist:`2023-52565`, :cve_nist:`2023-52566`, :cve_nist:`2023-52567`, :cve_nist:`2023-52568`, :cve_nist:`2023-52569`, :cve_nist:`2023-52570`, :cve_nist:`2023-52571`, :cve_nist:`2023-52572`, :cve_nist:`2023-52573`, :cve_nist:`2023-52574`, :cve_nist:`2023-52575`, :cve_nist:`2023-52576`, :cve_nist:`2023-52577`, :cve_nist:`2023-52578`, :cve_nist:`2023-52580`, :cve_nist:`2023-52581`, :cve_nist:`2023-52582`, :cve_nist:`2023-52583`, :cve_nist:`2023-52584`, :cve_nist:`2023-52587`, :cve_nist:`2023-52588`, :cve_nist:`2023-52589`, :cve_nist:`2023-52591`, :cve_nist:`2023-52593`, :cve_nist:`2023-52594`, :cve_nist:`2023-52595`, :cve_nist:`2023-52596`, :cve_nist:`2023-52597`, :cve_nist:`2023-52598`, :cve_nist:`2023-52599`, :cve_nist:`2023-52600`, :cve_nist:`2023-52601`, :cve_nist:`2023-52602`, :cve_nist:`2023-52603`, :cve_nist:`2023-52604`, :cve_nist:`2023-52606`, :cve_nist:`2023-52607`, :cve_nist:`2023-52608`, :cve_nist:`2023-52609`, :cve_nist:`2023-52610`, :cve_nist:`2023-52611`, :cve_nist:`2023-52612`, :cve_nist:`2023-52613`, :cve_nist:`2023-52614`, :cve_nist:`2023-52615`, :cve_nist:`2023-52616`, :cve_nist:`2023-52617`, :cve_nist:`2023-52618`, :cve_nist:`2023-52619`, :cve_nist:`2023-52620`, :cve_nist:`2023-52621`, :cve_nist:`2023-52622`, :cve_nist:`2023-52623`, :cve_nist:`2023-52626`, :cve_nist:`2023-52627`, :cve_nist:`2023-52628`, :cve_nist:`2023-52629`, :cve_nist:`2023-52630`, :cve_nist:`2023-52631`, :cve_nist:`2023-52632`, :cve_nist:`2023-52633`, :cve_nist:`2023-52635`, :cve_nist:`2023-52636`, :cve_nist:`2023-52637`, :cve_nist:`2023-52638`, :cve_nist:`2023-52639`, :cve_nist:`2023-52640`, :cve_nist:`2023-52641`, :cve_nist:`2024-0841`, :cve_nist:`2024-22099`, :cve_nist:`2024-23196`, :cve_nist:`2024-26600`, :cve_nist:`2024-26601`, :cve_nist:`2024-26602`, :cve_nist:`2024-26603`, :cve_nist:`2024-26604`, :cve_nist:`2024-26605`, :cve_nist:`2024-26606`, :cve_nist:`2024-26607`, :cve_nist:`2024-26608`, :cve_nist:`2024-26610`, :cve_nist:`2024-26611`, :cve_nist:`2024-26612`, :cve_nist:`2024-26614`, :cve_nist:`2024-26615`, :cve_nist:`2024-26616`, :cve_nist:`2024-26617`, :cve_nist:`2024-26618`, :cve_nist:`2024-26619`, :cve_nist:`2024-26620`, :cve_nist:`2024-26621`, :cve_nist:`2024-26622`, :cve_nist:`2024-26623`, :cve_nist:`2024-26625`, :cve_nist:`2024-26626`, :cve_nist:`2024-26627`, :cve_nist:`2024-26629`, :cve_nist:`2024-26630`, :cve_nist:`2024-26631`, :cve_nist:`2024-26632`, :cve_nist:`2024-26633`, :cve_nist:`2024-26634`, :cve_nist:`2024-26635`, :cve_nist:`2024-26636`, :cve_nist:`2024-26637`, :cve_nist:`2024-26638`, :cve_nist:`2024-26639`, :cve_nist:`2024-26640`, :cve_nist:`2024-26641`, :cve_nist:`2024-26644`, :cve_nist:`2024-26645`, :cve_nist:`2024-26646`, :cve_nist:`2024-26647`, :cve_nist:`2024-26648`, :cve_nist:`2024-26649`, :cve_nist:`2024-26650`, :cve_nist:`2024-26651`, :cve_nist:`2024-26652`, :cve_nist:`2024-26653`, :cve_nist:`2024-26657`, :cve_nist:`2024-26659`, :cve_nist:`2024-26660`, :cve_nist:`2024-26661`, :cve_nist:`2024-26662`, :cve_nist:`2024-26663`, :cve_nist:`2024-26664`, :cve_nist:`2024-26665`, :cve_nist:`2024-26666`, :cve_nist:`2024-26667`, :cve_nist:`2024-26668`, :cve_nist:`2024-26669`, :cve_nist:`2024-26670`, :cve_nist:`2024-26671`, :cve_nist:`2024-26673`, :cve_nist:`2024-26674`, :cve_nist:`2024-26675`, :cve_nist:`2024-26676`, :cve_nist:`2024-26677`, :cve_nist:`2024-26678`, :cve_nist:`2024-26679`, :cve_nist:`2024-26680`, :cve_nist:`2024-26681`, :cve_nist:`2024-26682`, :cve_nist:`2024-26683`, :cve_nist:`2024-26684`, :cve_nist:`2024-26685`, :cve_nist:`2024-26687`, :cve_nist:`2024-26688`, :cve_nist:`2024-26689`, :cve_nist:`2024-26690`, :cve_nist:`2024-26691`, :cve_nist:`2024-26692`, :cve_nist:`2024-26693`, :cve_nist:`2024-26694`, :cve_nist:`2024-26695`, :cve_nist:`2024-26696`, :cve_nist:`2024-26697`, :cve_nist:`2024-26698`, :cve_nist:`2024-26700`, :cve_nist:`2024-26702`, :cve_nist:`2024-26703`, :cve_nist:`2024-26704`, :cve_nist:`2024-26705`, :cve_nist:`2024-26706`, :cve_nist:`2024-26707`, :cve_nist:`2024-26708`, :cve_nist:`2024-26709`, :cve_nist:`2024-26710`, :cve_nist:`2024-26711`, :cve_nist:`2024-26712`, :cve_nist:`2024-26713`, :cve_nist:`2024-26714`, :cve_nist:`2024-26715`, :cve_nist:`2024-26716`, :cve_nist:`2024-26717`, :cve_nist:`2024-26718`, :cve_nist:`2024-26719`, :cve_nist:`2024-26720`, :cve_nist:`2024-26721`, :cve_nist:`2024-26722`, :cve_nist:`2024-26723`, :cve_nist:`2024-26724`, :cve_nist:`2024-26725`, :cve_nist:`2024-26726`, :cve_nist:`2024-26727`, :cve_nist:`2024-26728`, :cve_nist:`2024-26729`, :cve_nist:`2024-26730`, :cve_nist:`2024-26731`, :cve_nist:`2024-26732`, :cve_nist:`2024-26733`, :cve_nist:`2024-26734`, :cve_nist:`2024-26735`, :cve_nist:`2024-26736`, :cve_nist:`2024-26737`, :cve_nist:`2024-26738`, :cve_nist:`2024-26739`, :cve_nist:`2024-26740`, :cve_nist:`2024-26741`, :cve_nist:`2024-26742`, :cve_nist:`2024-26743`, :cve_nist:`2024-26744`, :cve_nist:`2024-26745`, :cve_nist:`2024-26746`, :cve_nist:`2024-26747`, :cve_nist:`2024-26748`, :cve_nist:`2024-26749`, :cve_nist:`2024-26750`, :cve_nist:`2024-26751`, :cve_nist:`2024-26752`, :cve_nist:`2024-26753`, :cve_nist:`2024-26754`, :cve_nist:`2024-26755`, :cve_nist:`2024-26759`, :cve_nist:`2024-26760`, :cve_nist:`2024-26761`, :cve_nist:`2024-26762`, :cve_nist:`2024-26763`, :cve_nist:`2024-26764`, :cve_nist:`2024-26765`, :cve_nist:`2024-26766`, :cve_nist:`2024-26767`, :cve_nist:`2024-26768`, :cve_nist:`2024-26769`, :cve_nist:`2024-26770`, :cve_nist:`2024-26771`, :cve_nist:`2024-26772`, :cve_nist:`2024-26773`, :cve_nist:`2024-26774`, :cve_nist:`2024-26775`, :cve_nist:`2024-26776`, :cve_nist:`2024-26777`, :cve_nist:`2024-26778`, :cve_nist:`2024-26779`, :cve_nist:`2024-26780`, :cve_nist:`2024-26781`, :cve_nist:`2024-26782`, :cve_nist:`2024-26783`, :cve_nist:`2024-26786`, :cve_nist:`2024-26787`, :cve_nist:`2024-26788`, :cve_nist:`2024-26789`, :cve_nist:`2024-26790`, :cve_nist:`2024-26791`, :cve_nist:`2024-26792`, :cve_nist:`2024-26793`, :cve_nist:`2024-26794`, :cve_nist:`2024-26795`, :cve_nist:`2024-26796`, :cve_nist:`2024-26798`, :cve_nist:`2024-26799`, :cve_nist:`2024-26800`, :cve_nist:`2024-26801`, :cve_nist:`2024-26802`, :cve_nist:`2024-26803`, :cve_nist:`2024-26804`, :cve_nist:`2024-26805`, :cve_nist:`2024-26807`, :cve_nist:`2024-26808` and :cve_nist:`2024-26809`
23- llvm: Fix :cve:`2024-0151` 23- llvm: Fix :cve_nist:`2024-0151`
24- ofono: Fix :cve:`2023-2794` 24- ofono: Fix :cve_nist:`2023-2794`
25- openssh: Fix :cve:`2024-6387` and :cve:`2024-39894` 25- openssh: Fix :cve_nist:`2024-6387` and :cve_nist:`2024-39894`
26- openssl: Fix :cve:`2024-5535` 26- openssl: Fix :cve_nist:`2024-5535`
27- pam: Fix :cve:`2024-22365` 27- pam: Fix :cve_nist:`2024-22365`
28- python3-idna: Fix :cve:`2024-3651` 28- python3-idna: Fix :cve_nist:`2024-3651`
29- qemu: Fix :cve:`2023-6683`, :cve:`2024-3446`, :cve_mitre:`2024-3447`, :cve:`2024-3567`, :cve:`2024-26327` and :cve:`2024-26328` 29- qemu: Fix :cve_nist:`2023-6683`, :cve_nist:`2024-3446`, :cve_mitre:`2024-3447`, :cve_nist:`2024-3567`, :cve_nist:`2024-26327` and :cve_nist:`2024-26328`
30- ruby: Fix :cve:`2023-36617` and :cve:`2024-27281` 30- ruby: Fix :cve_nist:`2023-36617` and :cve_nist:`2024-27281`
31- vte: Fix :cve:`2024-37535` 31- vte: Fix :cve_nist:`2024-37535`
32- wget: Fix for :cve:`2024-38428` 32- wget: Fix for :cve_nist:`2024-38428`
33 33
34 34
35Fixes in Yocto-5.0.3 35Fixes in Yocto-5.0.3
diff --git a/documentation/migration-guides/release-notes-5.0.4.rst b/documentation/migration-guides/release-notes-5.0.4.rst
new file mode 100644
index 0000000000..14fbe3f6f8
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.4.rst
@@ -0,0 +1,212 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.4 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.4
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- apr: Fix :cve_nist:`2023-49582`
10- curl: Ignore :cve_nist:`2024-32928`
11- curl: Fix :cve_nist:`2024-7264`
12- expat: Fix :cve_nist:`2024-45490`, :cve_nist:`2024-45491` and :cve_nist:`2024-45492`
13- ffmpeg: Fix :cve_nist:`2023-50008` and :cve_nist:`2024-32230`
14- libpcap: Fix :cve_nist:`2023-7256` and :cve_nist:`2024-8006`
15- libyaml: Ignore :cve_nist:`2024-35325` and :cve_nist:`2024-35326`
16- openssl: Fix :cve_nist:`2024-5535` and :cve_nist:`2024-6119`
17- python3-certifi: Fix :cve_nist:`2024-39689`
18- python3-setuptools: Fix :cve_nist:`2024-6345`
19- python3: Fix :cve_nist:`2024-6232`, :cve_nist:`2024-7592`, :cve_nist:`2024-8088` and :cve_nist:`2024-27034`
20- qemu: Fix :cve_nist:`2024-4467` and :cve_nist:`2024-7409`
21- ruby: Fix :cve_nist:`2024-27282`
22- tiff: Fix :cve_nist:`2024-7006`
23- vim: Fix :cve_nist:`2024-41957`, :cve_nist:`2024-41965`, :cve_nist:`2024-43374`, :cve_nist:`2024-43790` and :cve_nist:`2024-43802`
24
25
26Fixes in Yocto-5.0.4
27~~~~~~~~~~~~~~~~~~~~
28
29- apr: drop 0007-explicitly-link-libapr-against-phtread-to-make-gold-.patch
30- apr: upgrade to 1.7.5
31- bind: Fix build with the `httpstats` package config enabled
32- bitbake: data_smart: Improve performance for VariableHistory
33- bluez5: remove redundant patch for MAX_INPUT
34- build-appliance-image: Update to scarthgap head revision
35- buildhistory: Fix intermittent package file list creation
36- buildhistory: Restoring files from preserve list
37- buildhistory: Simplify intercept call sites and drop SSTATEPOSTINSTFUNC usage
38- busybox: Fix cut with "-s" flag
39- create-sdpx-2.2.bbclass: Switch from exists to isfile checking debugsrc
40- cups: upgrade to 2.4.10
41- dejagnu: Fix :term:`LICENSE` (change to GPL-3.0-only)
42- doc: features: describe distribution feature pni-name
43- doc: features: remove duplicate word in distribution feature ext2
44- expat: upgrade to 2.6.3
45- expect-native: fix do_compile failure with gcc-14
46- gcc: Fix spurious '/' in GLIBC_DYNAMIC_LINKER on microblaze
47- gcr: Fix :term:`LICENSE` (change to LGPL-2.0-only)
48- glibc: fix fortran header file conflict for arm
49- go: upgrade to 1.22.6
50- gstreamer1.0: disable flaky baseparser tests
51- image_types.bbclass: Use --force also with lz4,lzop
52- initramfs-framework: fix typos
53- iw: Fix :term:`LICENSE` (change to ISC)
54- libadwaita: upgrade to 1.5.2
55- libcap-ng: update :term:`SRC_URI`
56- libdnf: upgrade to 0.73.2
57- libedit: Make docs generation deterministic
58- libgfortran.inc: fix nativesdk-libgfortran dependencies
59- librsvg: don't try to run target code at build time
60- linux-firmware: add a package for ath12k firmware
61- llvm: Enable libllvm for native build
62- maintainers.inc: add maintainer for python(-setuptools, -smmap, -subunit, -testtools)
63- mc: fix source URL
64- migration-guide: add release notes for 4.0.20 and 5.0.3
65- oeqa/postactions: fix exception handling
66- oeqa/runtime/ssh: In case of failure, show exit code and handle -15 (SIGTERM)
67- oeqa/runtime/ssh: add retry logic and sleeps to allow for slower systems
68- oeqa/runtime/ssh: check for all errors at the end
69- oeqa/runtime/ssh: increase the number of attempts
70- oeqa/selftest/reproducibile: Explicitly list virtual targets
71- oeqa/utils/postactions: transfer whole archive over ssh instead of doing individual copies
72- openssh: add backported header file include
73- openssl: upgrade to 3.2.3
74- os-release: Fix VERSION_CODENAME in case it is empty
75- poky.conf: bump version for 5.0.4
76- populate_sdk_ext.bclass: make sure OECORE_NATIVE_SYSROOT is exported.
77- python3-maturin: Fix cross compilation issue for armv7l, mips64, ppc
78- python3-pycryptodome(x): use python_setuptools_build_meta build class
79- python3: upgrade to 3.12.6
80- python3: skip readline limited history tests
81- qemu: backport patches to fix riscv64 build failure
82- qemuboot: Trigger write_qemuboot_conf task on changes of kernel image realpath
83- ref-manual: fix typo and move :term:`SYSROOT_DIRS` example
84- ruby: Make docs generation deterministic
85- systemd: Mitigate /var/log type mismatch issue
86- systemd: Mitigate /var/tmp type mismatch issue
87- tiff: Fix :term:`LICENSE` (change to libtiff)
88- u-boot.inc: Refactor do_* steps into functions that can be overridden
89- udev-extraconf: Add collect flag to mount
90- unzip: Fix :term:`LICENSE` (change to Info-ZIP)
91- util-linux: Add :term:`PACKAGECONFIG` option (libmount-mountfd-support) to mitigate rootfs remount error
92- vim: upgrade to 9.1.0698
93- weston-init: fix weston not starting when xwayland is enabled
94- wireless-regdb: upgrade to 2024.07.04
95- wpa-supplicant: upgrade to 2.11
96- xserver-xorg: mark :cve_nist:`2023-5574` as unpatched when xvfb enabled
97- yocto-uninative: Update to 4.6 for glibc 2.40
98- zip: Fix :term:`LICENSE` (change to Info-ZIP)
99
100
101Known Issues in Yocto-5.0.4
102~~~~~~~~~~~~~~~~~~~~~~~~~~~
103
104- N/A
105
106
107Contributors to Yocto-5.0.4
108~~~~~~~~~~~~~~~~~~~~~~~~~~~
109
110- Alban Bedel
111- Alexander Kanavin
112- Alexis Lothoré
113- Archana Polampalli
114- Ashish Sharma
115- Bartosz Golaszewski
116- Benjamin Szőke
117- Changqing Li
118- Chen Qi
119- Colin McAllister
120- Daniel Semkowicz
121- Dmitry Baryshkov
122- Gauthier HADERER
123- Guðni Már Gilbert
124- Jon Mason
125- Jose Quaresma
126- Jörg Sommer
127- Kai Kang
128- Khem Raj
129- Lee Chee Yang
130- Mark Hatle
131- Martin Jansa
132- Matthias Pritschet
133- Michael Halstead
134- Mingli Yu
135- Niko Mauno
136- Pedro Ferreira
137- Peter Marko
138- Quentin Schulz
139- Richard Purdie
140- Robert Yang
141- Ross Burton
142- Ryan Eatmon
143- Siddharth Doshi
144- Simone Weiß
145- Soumya Sambu
146- Steve Sakoman
147- Trevor Gamblin
148- Ulrich Ölmann
149- Vijay Anusuri
150- Wang Mingyu
151- Weisser, Pascal.ext
152- Yogita Urade
153
154
155Repositories / Downloads for Yocto-5.0.4
156~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
157
158poky
159
160- Repository Location: :yocto_git:`/poky`
161- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
162- Tag: :yocto_git:`yocto-5.0.4 </poky/log/?h=yocto-5.0.4>`
163- Git Revision: :yocto_git:`2034fc38eb4e63984d9bd6b260aa1bf95ce562e4 </poky/commit/?id=2034fc38eb4e63984d9bd6b260aa1bf95ce562e4>`
164- Release Artefact: poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4
165- sha: 697ed099793d6c86d5ffe590e96f99689bd28dcb2d4451dc4585496fa4a20400
166- Download Locations:
167 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2
168 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/poky-2034fc38eb4e63984d9bd6b260aa1bf95ce562e4.tar.bz2
169
170openembedded-core
171
172- Repository Location: :oe_git:`/openembedded-core`
173- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
174- Tag: :oe_git:`yocto-5.0.4 </openembedded-core/log/?h=yocto-5.0.4>`
175- Git Revision: :oe_git:`f888dd911529a828820799a7a1b75dfd3a44847c </openembedded-core/commit/?id=f888dd911529a828820799a7a1b75dfd3a44847c>`
176- Release Artefact: oecore-f888dd911529a828820799a7a1b75dfd3a44847c
177- sha: 93cb4c3c8e0f77edab20814d155847dc3452c6b083e3dd9c7a801e80a7e4d228
178- Download Locations:
179 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2
180 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/oecore-f888dd911529a828820799a7a1b75dfd3a44847c.tar.bz2
181
182meta-mingw
183
184- Repository Location: :yocto_git:`/meta-mingw`
185- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
186- Tag: :yocto_git:`yocto-5.0.4 </meta-mingw/log/?h=yocto-5.0.4>`
187- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
188- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
189- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
190- Download Locations:
191 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
192 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
193
194bitbake
195
196- Repository Location: :oe_git:`/bitbake`
197- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
198- Tag: :oe_git:`yocto-5.0.4 </bitbake/log/?h=yocto-5.0.4>`
199- Git Revision: :oe_git:`d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3 </bitbake/commit/?id=d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3>`
200- Release Artefact: bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3
201- sha: d873f4d3a471d26680dc39200d8f3851a6863f15daa9bed978ba31b930f9a1c1
202- Download Locations:
203 http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2
204 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.4/bitbake-d251668d9a7a8dd25bd8767efb30d6d9ff8b1ad3.tar.bz2
205
206yocto-docs
207
208- Repository Location: :yocto_git:`/yocto-docs`
209- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
210- Tag: :yocto_git:`yocto-5.0.4 </yocto-docs/log/?h=yocto-5.0.4>`
211- Git Revision: :yocto_git:`d71081dd14a9d75ace4d1c62472374f37b4a888d </yocto-docs/commit/?id=d71081dd14a9d75ace4d1c62472374f37b4a888d>`
212
diff --git a/documentation/migration-guides/release-notes-5.0.5.rst b/documentation/migration-guides/release-notes-5.0.5.rst
new file mode 100644
index 0000000000..c8cf9a85d1
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.5.rst
@@ -0,0 +1,227 @@
1Release notes for Yocto-5.0.5 (Scarthgap)
2-----------------------------------------
3
4Security Fixes in Yocto-5.0.5
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- ``cups``: Fix :cve_nist:`2024-47175`
8- ``curl``: Fix :cve_nist:`2024-8096`
9- ``gnupg``: Ignore :cve_nist:`2022-3219` (wont-fix)
10- ``libarchive``: Fix :cve_nist:`2024-48957` and :cve_nist:`2024-48958`
11- ``openssh``: Ignore :cve_nist:`2023-51767` (wont-fix)
12- ``openssl``: Fix :cve_nist:`2024-9143`
13- ``ruby``: Fix :cve_nist:`2024-41123` and :cve_mitre:`2024-41496`
14- ``rust-llvm``: Fix :cve_nist:`2024-0151`
15- ``rust``, ``libstd-rs``: Ignore :cve_nist:`2024-43402`
16- ``wpa-supplicant``: Patch SAE H2E and incomplete downgrade protection for group negotiation
17- ``wpa-supplicant``: Fix :cve_nist:`2024-3596`
18- ``wpa-supplicant``: Ignore :cve_nist:`2024-5290`
19
20
21Fixes in Yocto-5.0.5
22~~~~~~~~~~~~~~~~~~~~
23
24- binutils: stable 2.42 branch updates
25- bitbake.conf: Add truncate to :term:`HOSTTOOLS`
26- bitbake: asyncrpc: Use client timeout for websocket open timeout
27- bitbake: bitbake: doc/user-manual: Update the :term:`BB_HASHSERVE_UPSTREAM`
28- bitbake: gitsm: Add call_process_submodules() to remove duplicated code
29- bitbake: gitsm: Remove downloads/tmpdir when failed
30- bitbake: tests/fetch: Use our own mirror of mobile-broadband-provider to decouple from gnome gitlab
31- bitbake: tests/fetch: Use our own mirror of sysprof to decouple from gnome gitlab
32- build-appliance-image: Update to scarthgap head revision
33- cryptodev: upgrade to 1.14
34- cve-check: add support for cvss v4.0
35- cve_check: Use a local copy of the database during builds
36- dev-manual: add bblock documentation
37- documentation: conf.py: rename :cve: role to :cve_nist:
38- documentation: README: add instruction to run Vale on a subset
39- documentation: Makefile: add SPHINXLINTDOCS to specify subset to sphinx-lint
40- e2fsprogs: removed 'sed -u' option
41- ffmpeg: Add "libswresample libavcodec" to :term:`CVE_PRODUCT`
42- glibc: stable 2.39 branch updates.
43- go: upgrade to 1.22.8
44- icu: update patch Upstream-Status
45- image.bbclass: Drop support for ImageQAFailed exceptions in image_qa
46- image_qa: fix error handling
47- install-buildtools: fix "test installation" step
48- install-buildtools: remove md5 checksum validation
49- install-buildtools: update base-url, release and installer version
50- kernel-devsrc: remove 64 bit vdso cmd files
51- kernel-fitimage: fix external dtb check
52- kernel-fitimage: fix intentation
53- lib/oe/package-manager: skip processing installed-pkgs with empty globs
54- liba52: fix do_fetch error
55- libpcre2: Update base uri PhilipHazel -> PCRE2Project
56- libsdl2: Fix non-deterministic configure option for libsamplerate
57- license: Fix directory layout issues
58- linux-firmware: upgrade to 20240909
59- linux-yocto/6.6: fix genericarm64 config warning
60- linux-yocto/6.6: upgrade to v6.6.54
61- lsb-release: fix Distro Codename shell escaping
62- makedevs: Fix issue when rootdir of / is given
63- makedevs: Fix matching uid/gid
64- meta-ide-support: Mark recipe as MACHINE-specific
65- meta-world-pkgdata: Inherit nopackages
66- migration-guide: add release notes for 4.0.21, 4.0.22 and 5.0.4
67- migration-guide: release-notes-4.0: update :term:`BB_HASHSERVE_UPSTREAM` for new infrastructure
68- migration-guide: release-notes-5.0.rst: update NO_OUTPUT -> NO_COLOR
69- orc: upgrade to 0.4.40
70- overview-manual: concepts: add details on package splitting
71- poky.conf: bump version for 5.0.5
72- populate_sdk_base: inherit nopackages
73- ptest-runner: upgrade to 2.4.5
74- pulseaudio: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI`
75- desktop-file-utils: correct freedesktop.org -> www.freedesktop.org :term:`SRC_URI`
76- python3-lxml: upgrade to v5.0.2
77- python3-setuptools: Add "python:setuptools" to :term:`CVE_PRODUCT`
78- recipes-bsp: usbutils: Fix usb-devices command using busybox
79- ref-manual: add missing CVE_CHECK manifest variables
80- ref-manual: add missing :term:`EXTERNAL_KERNEL_DEVICETREE` variable
81- ref-manual: add missing :term:`OPKGBUILDCMD` variable
82- ref-manual: add missing :term:`TESTIMAGE_FAILED_QA_ARTIFACTS`
83- ref-manual: devtool-reference: document missing commands
84- ref-manual: devtool-reference: refresh example outputs
85- ref-manual: faq: add q&a on class appends
86- ref-manual: introduce :term:`CVE_CHECK_REPORT_PATCHED` variable
87- ref-manual: merge patch-status-* to patch-status
88- ref-manual: release-process: add a reference to the doc's release
89- ref-manual: release-process: refresh the current LTS releases
90- ref-manual: release-process: update releases.svg
91- ref-manual: release-process: update releases.svg with month after "Current"
92- ref-manual: structure.rst: document missing tmp/ dirs
93- ref-manual: variables: add SIGGEN_LOCKEDSIGS* variables
94- rootfs-postcommands.bbclass: make opkg status reproducible
95- rpm: fix expansion of %_libdir in macros
96- ruby: upgrade to 3.3.5
97- runqemu: Fix detection of -serial parameter
98- runqemu: keep generating tap devices
99- scripts/install-buildtools: Update to 5.0.3
100- sqlite3: upgrade to 3.45.3
101- styles: vocabularies: Yocto: add sstate
102- systemtap: fix systemtap-native build error on Fedora 40
103- sysvinit: take release tarballs from github
104- testexport: fallback for empty :term:`IMAGE_LINK_NAME`
105- testimage: fallback for empty :term:`IMAGE_LINK_NAME`
106- uboot-sign: fix counters in do_uboot_assemble_fitimage
107- vim: upgrade to 9.1.0764
108- virglrenderer: Add patch to fix -int-conversion build issue
109- webkitgtk: upgrade to 2.44.3
110- weston: backport patch to allow neatvnc < v0.9.0
111- wpa-supplicant: Patch security advisory 2024-2
112- xserver-xorg: upgrade to 21.1.14
113
114
115Known Issues in Yocto-5.0.5
116~~~~~~~~~~~~~~~~~~~~~~~~~~~
117
118- ``oeqa/runtime``: the ``beaglebone-yocto`` target fails the parselogs runtime test due to unexpected kernel error messages in the log (see :yocto_bugs:`bug 15624 </show_bug.cgi?id=15624>` on Bugzilla).
119
120
121Contributors to Yocto-5.0.5
122~~~~~~~~~~~~~~~~~~~~~~~~~~~
123
124- Aditya Tayade
125- Adrian Freihofer
126- Aleksandar Nikolic
127- Alexander Kanavin
128- Antonin Godard
129- Anuj Mittal
130- Bruce Ashfield
131- Claus Stovgaard
132- Deepesh Varatharajan
133- Deepthi Hemraj
134- Hiago De Franco
135- Hitendra Prajapati
136- Jaeyoon Jung
137- Jiaying Song
138- Jonas Gorski
139- Jose Quaresma
140- Joshua Watt
141- Julien Stephan
142- Jörg Sommer
143- Khem Raj
144- Konrad Weihmann
145- Lee Chee Yang
146- Louis Rannou
147- Macpaul Lin
148- Martin Jansa
149- Paul Barker
150- Paul Gerber
151- Peter Kjellerstedt
152- Peter Marko
153- Purushottam Choudhary
154- Richard Purdie
155- Robert Yang
156- Rohini Sangam
157- Ross Burton
158- Sergei Zhmylev
159- Shunsuke Tokumoto
160- Steve Sakoman
161- Teresa Remmet
162- Victor Kamensky
163- Vijay Anusuri
164- Wang Mingyu
165- Yi Zhao
166- Yogita Urade
167- Zahir Hussain
168
169
170Repositories / Downloads for Yocto-5.0.5
171~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
172
173poky
174
175- Repository Location: :yocto_git:`/poky`
176- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
177- Tag: :yocto_git:`yocto-5.0.5 </poky/log/?h=yocto-5.0.5>`
178- Git Revision: :yocto_git:`dce4163d42f7036ea216b52b9135968d51bec4c1 </poky/commit/?id=dce4163d42f7036ea216b52b9135968d51bec4c1>`
179- Release Artefact: poky-dce4163d42f7036ea216b52b9135968d51bec4c1
180- sha: ad35a965a284490a962f6854ace536b8795f96514e14bf5c79f91f6d76ac25d3
181- Download Locations:
182 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2
183 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/poky-dce4163d42f7036ea216b52b9135968d51bec4c1.tar.bz2
184
185openembedded-core
186
187- Repository Location: :oe_git:`/openembedded-core`
188- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
189- Tag: :oe_git:`yocto-5.0.5 </openembedded-core/log/?h=yocto-5.0.5>`
190- Git Revision: :oe_git:`a051a066da2874b95680d0353dfa18c1d56b2670 </openembedded-core/commit/?id=a051a066da2874b95680d0353dfa18c1d56b2670>`
191- Release Artefact: oecore-a051a066da2874b95680d0353dfa18c1d56b2670
192- sha: 16d252aade00161ade2692f41b2da3effeb1f41816a66db843bb1c5495125e93
193- Download Locations:
194 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2
195 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/oecore-a051a066da2874b95680d0353dfa18c1d56b2670.tar.bz2
196
197meta-mingw
198
199- Repository Location: :yocto_git:`/meta-mingw`
200- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
201- Tag: :yocto_git:`yocto-5.0.5 </meta-mingw/log/?h=yocto-5.0.5>`
202- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
203- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
204- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
205- Download Locations:
206 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
207 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
208
209bitbake
210
211- Repository Location: :bitbake_git:`/`
212- Branch: :bitbake_git:`2.8 </log/?h=2.8>`
213- Tag: :bitbake_git:`yocto-5.0.5 </log/?h=yocto-5.0.5>`
214- Git Revision: :bitbake_git:`377eba2361850adfb8ce7e761ef9c76be287f88c </commit/?id=377eba2361850adfb8ce7e761ef9c76be287f88c>`
215- Release Artefact: bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c
216- sha: 4a5a35098eec719bbb879706d50e552a2b709295db4055c8050ae7dda1eb2994
217- Download Locations:
218 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2
219 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.5/bitbake-377eba2361850adfb8ce7e761ef9c76be287f88c.tar.bz2
220
221yocto-docs
222
223- Repository Location: :yocto_git:`/yocto-docs`
224- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
225- Tag: :yocto_git:`yocto-5.0.5 </yocto-docs/log/?h=yocto-5.0.5>`
226- Git Revision: :yocto_git:`e882cb3e5816d081eb05cb83488f286cca70e0c6 </yocto-docs/commit/?id=e882cb3e5816d081eb05cb83488f286cca70e0c6>`
227
diff --git a/documentation/migration-guides/release-notes-5.0.6.rst b/documentation/migration-guides/release-notes-5.0.6.rst
new file mode 100644
index 0000000000..b6f42198a1
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.6.rst
@@ -0,0 +1,223 @@
1Release notes for Yocto-5.0.6 (Scarthgap)
2-----------------------------------------
3
4Security Fixes in Yocto-5.0.6
5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6
7- acpica: Fix :cve_nist:`2024-24856`
8- curl: Fix :cve_nist:`2024-9681`
9- dropbear: Fix :cve_nist:`2023-48795`
10- expat: Fix :cve_nist:`2024-50602`
11- ffmpeg: Fix :cve_nist:`2023-49501`, :cve_nist:`2023-49528`, :cve_nist:`2023-50007`,
12 :cve_nist:`2024-7055` and :cve_mitre:`2024-28661`
13- glib-2.0: Fix :cve_nist:`2024-52533`
14- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
15 :cve_nist:`2024-46954`, :cve_nist:`2024-46955` and :cve_nist:`2024-46956`
16- gstreamer1.0: Ignore :cve_nist:`2024-0444`
17- libpam: Fix :cve_nist:`2024-10041`
18- libsndfile: Fix :cve_nist:`2024-50612`
19- libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
20- ovmf: Fix :cve_nist:`2024-1298` and :cve_nist:`2024-38796`
21- python3-zipp: Fix :cve_nist:`2024-5569`
22- qemu: Fix :cve_nist:`2024-4693`, :cve_nist:`2024-6505` and :cve_nist:`2024-7730`
23- qemu: Ignore :cve_nist:`2024-6505`
24
25
26Fixes in Yocto-5.0.6
27~~~~~~~~~~~~~~~~~~~~
28
29- binutils: Add missing perl modules to :term:`RDEPENDS` for nativesdk variant
30- binutils: stable 2.42 branch update
31- bitbake: Remove custom exception backtrace formatting
32- bitbake: fetch2/git: Use quote from shlex, not pipes
33- bitbake: fetch2: use persist_data context managers
34- bitbake: fetch/wget: Increase timeout to 100s from 30s
35- bitbake: persist_data: close connection in SQLTable __exit__
36- bitbake: runqueue: Fix performance of multiconfigs with large overlap
37- bitbake: runqueue: Fix scenetask processing performance issue
38- bitbake: runqueue: Optimise setscene loop processing
39- build-appliance-image: Update to scarthgap head revision
40- builder: set :term:`CVE_PRODUCT`
41- cmake: Fix sporadic issues when determining compiler internals
42- cml1: do_diffconfig: Don't override .config with .config.orig
43- contributor-guide: Remove duplicated words
44- dev-manual: bblock: use warning block instead of attention
45- dev-manual: document how to provide confs from layer.conf
46- dnf: drop python3-iniparse from :term:`DEPENDS` and :term:`RDEPENDS`
47- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
48- doc: Makefile: add support for xelatex
49- doc: Makefile: publish pdf and epub versions too
50- doc: Makefile: remove inkscape, replace by rsvg-convert
51- doc: add a download page for epub and pdf
52- doc: conf.py: add a bitbake_git extlink
53- doc: standards.md: add a section on admonitions
54- doc: sphinx-static: switchers.js.in: do not refer to URL_ROOT anymore
55- dropbear: backport fix for concurrent channel open/close
56- enchant2: fix do_fetch error
57- expat: upgrade to 2.6.4
58- gcc: backport patch to fix an issue with tzdata 2024b
59- ghostscript: upgrade to 10.04.0
60- glibc: stable 2.39 branch updates
61- groff: fix rare build race in hdtbl
62- libgcrypt: Fix building error with '-O2' in sysroot path
63- libpam: drop cracklib from :term:`DEPENDS`
64- libxml-parser-perl: fix do_fetch error
65- llvm: reduce size of -dbg package
66- lttng-ust: backport patch to fix cmake-multiple-shared-libraries build error
67- migration-guides: add release notes for 4.0.23 and 5.0.5
68- ninja: fix build with python 3.13
69- oeqa/runtime/ssh: Fix incorrect timeout fix
70- oeqa/runtime/ssh: Rework ssh timeout
71- oeqa/utils/gitarchive: Return tag name and improve exclude handling
72- package_rpm: Check if file exists before open()
73- package_rpm: restrict rpm to 4 threads
74- package_rpm: use zstd's default compression level
75- poky.conf: bump version for 5.0.6
76- pseudo: Fix envp bug and add posix_spawn wrapper
77- python3-poetry-core: drop python3-six from :term:`RDEPENDS`
78- python3-requests: upgrade to 2.32.2
79- python3-urllib3: upgrade to 2.2.2
80- qemu: upgrade to 8.2.7
81- qemurunner: Clean up serial_lock handling
82- ref-manual: classes: fix bin_package description
83- resulttool: Add --logfile-archive option to store mode
84- resulttool: Allow store to filter to specific revisions
85- resulttool: Clean up repoducible build logs
86- resulttool: Fix passthrough of --all files in store mode
87- resulttool: Handle ltp rawlogs as well as ptest
88- resulttool: Improve repo layout for oeselftest results
89- resulttool: Trim the precision of duration information
90- resulttool: Use single space indentation in json output
91- rootfs: Ensure run-postinsts is not uninstalled for read-only-rootfs-delayed-postinsts
92- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
93- sanity: check for working user namespaces
94- scripts/install-buildtools: Update to 5.0.5
95- selftest/reproducible: Clean up pathnames
96- selftest/reproducible: Drop rawlogs
97- shared-mime-info: drop itstool-native from :term:`DEPENDS`
98- strace: download release tarballs from GitHub
99- systemd-boot: drop intltool-native from :term:`DEPENDS`
100- systemd: drop intltool-native from :term:`DEPENDS`
101- systemd: upgrade to 255.13
102- sysvinit: backport patch for fixing one issue of pidof
103- tcl: skip io-13.6 test case
104- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
105- tune-cortexa32: set tune feature as armv8a
106- tzcode-native: upgrade to 2024b
107- tzdata: upgrade to 2024b
108- uboot-sign: fix concat_dtb arguments
109- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
110- webkitgtk: fix erroneous use of unsuported DEBUG_LEVELFLAG variable
111- wireless-regdb: upgrade to 2024.10.07
112
113
114Known Issues in Yocto-5.0.6
115~~~~~~~~~~~~~~~~~~~~~~~~~~~
116
117- N/A
118
119
120Contributors to Yocto-5.0.6
121~~~~~~~~~~~~~~~~~~~~~~~~~~~
122
123Thanks to the following people who contributed to this release:
124
125- Aleksandar Nikolic
126- Alexander Kanavin
127- Antonin Godard
128- Archana Polampalli
129- Bin Lan
130- Changqing Li
131- Chen Qi
132- Chris Laplante
133- Clayton Casciato
134- Deepthi Hemraj
135- Divya Chellam
136- Florian Kreutzer
137- Gassner, Tobias.ext
138- Guðni Már Gilbert
139- Harish Sadineni
140- Hitendra Prajapati
141- Hongxu Jia
142- Jagadeesh Krishnanjanappa
143- Jiaying Song
144- Jinfeng Wang
145- Joshua Watt
146- Lee Chee Yang
147- Markus Volk
148- Michael Opdenacker
149- Pavel Zhukov
150- Peter Marko
151- Philip Lorenz
152- Randy MacLeod
153- Regis Dargent
154- Richard Purdie
155- Robert Yang
156- Ross Burton
157- Soumya Sambu
158- Steve Sakoman
159- Talel BELHAJSALEM
160- Trevor Gamblin
161- Vijay Anusuri
162- Wang Mingyu
163- Yogita Urade
164
165
166Repositories / Downloads for Yocto-5.0.6
167~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
168
169poky
170
171- Repository Location: :yocto_git:`/poky`
172- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
173- Tag: :yocto_git:`yocto-5.0.6 </poky/log/?h=yocto-5.0.6>`
174- Git Revision: :yocto_git:`2541a8171f91812a4b16e7dc4da0d77d2318a256 </poky/commit/?id=2541a8171f91812a4b16e7dc4da0d77d2318a256>`
175- Release Artefact: poky-2541a8171f91812a4b16e7dc4da0d77d2318a256
176- sha: b77157596ae75d163387a08a317397a57ab8fa6cf4725f28e344fae3f69cca4d
177- Download Locations:
178 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2
179 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/poky-2541a8171f91812a4b16e7dc4da0d77d2318a256.tar.bz2
180
181openembedded-core
182
183- Repository Location: :oe_git:`/openembedded-core`
184- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
185- Tag: :oe_git:`yocto-5.0.6 </openembedded-core/log/?h=yocto-5.0.6>`
186- Git Revision: :oe_git:`336eec6808710f260a5336ca8ca98139a80ccb14 </openembedded-core/commit/?id=336eec6808710f260a5336ca8ca98139a80ccb14>`
187- Release Artefact: oecore-336eec6808710f260a5336ca8ca98139a80ccb14
188- sha: 38c4fa7e7e88c28361c012dd5baabe373e2ec3c8aba6194146768b146192cceb
189- Download Locations:
190 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2
191 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/oecore-336eec6808710f260a5336ca8ca98139a80ccb14.tar.bz2
192
193meta-mingw
194
195- Repository Location: :yocto_git:`/meta-mingw`
196- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
197- Tag: :yocto_git:`yocto-5.0.6 </meta-mingw/log/?h=yocto-5.0.6>`
198- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
199- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
200- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
201- Download Locations:
202 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
203 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
204
205bitbake
206
207- Repository Location: :oe_git:`/bitbake`
208- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
209- Tag: :oe_git:`yocto-5.0.6 </bitbake/log/?h=yocto-5.0.6>`
210- Git Revision: :oe_git:`f40a3a477d5241b697bf2fb030dd804c1ff5839f </bitbake/commit/?id=f40a3a477d5241b697bf2fb030dd804c1ff5839f>`
211- Release Artefact: bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f
212- sha: dbfc056c7408a5547f624799621ab1261a05685112e0922a88007723b1edbc87
213- Download Locations:
214 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2
215 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.6/bitbake-f40a3a477d5241b697bf2fb030dd804c1ff5839f.tar.bz2
216
217yocto-docs
218
219- Repository Location: :yocto_git:`/yocto-docs`
220- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
221- Tag: :yocto_git:`yocto-5.0.6 </yocto-docs/log/?h=yocto-5.0.6>`
222- Git Revision: :yocto_git:`TBD </yocto-docs/commit/?id=TBD>`
223
diff --git a/documentation/migration-guides/release-notes-5.0.7.rst b/documentation/migration-guides/release-notes-5.0.7.rst
new file mode 100644
index 0000000000..1c8a4809a9
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.7.rst
@@ -0,0 +1,331 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.7 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.7
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- avahi: Fix :cve_nist:`2024-52616`
10- binutils: Fix :cve_nist:`2024-53589`
11- ffmpeg: Fix :cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368`
12- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
13 :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
14 and :cve_nist:`2024-47835`
15- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
16 :cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
17 :cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
18 :cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
19 :cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
20 :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
21- gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`,
22 :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`,
23 :cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`,
24 :cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`,
25 :cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`,
26 :cve_nist:`2024-47602`, :cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`,
27 :cve_nist:`2024-47775`, :cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778`
28 and :cve_nist:`2024-47834`
29- libarchive: Fix :cve_nist:`2024-20696`
30- libxml2: Fix :cve_nist:`2024-40896`
31- linux-yocto/6.6: Fix :cve_nist:`2024-27059`, :cve_nist:`2024-43098`, :cve_nist:`2024-45828`,
32 :cve_nist:`2024-47141`, :cve_nist:`2024-47143`, :cve_nist:`2024-47704`, :cve_nist:`2024-47809`,
33 :cve_nist:`2024-48873`, :cve_nist:`2024-48875`, :cve_nist:`2024-48881`, :cve_nist:`2024-49863`,
34 :cve_nist:`2024-49864`, :cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`,
35 :cve_nist:`2024-49870`, :cve_nist:`2024-49871`, :cve_nist:`2024-49874`, :cve_nist:`2024-49875`,
36 :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`, :cve_nist:`2024-49881`,
37 :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`, :cve_nist:`2024-49886`,
38 :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`, :cve_nist:`2024-49894`,
39 :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`, :cve_nist:`2024-49901`,
40 :cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49905`, :cve_nist:`2024-49907`,
41 :cve_nist:`2024-49912`, :cve_nist:`2024-49913`, :cve_nist:`2024-49924`, :cve_nist:`2024-49925`,
42 :cve_nist:`2024-49927`, :cve_nist:`2024-49929`, :cve_nist:`2024-49930`, :cve_nist:`2024-49931`,
43 :cve_nist:`2024-49933`, :cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49937`,
44 :cve_nist:`2024-49938`, :cve_nist:`2024-49939`, :cve_nist:`2024-49944`, :cve_nist:`2024-49946`,
45 :cve_nist:`2024-49947`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49950`,
46 :cve_nist:`2024-49951`, :cve_nist:`2024-49952`, :cve_nist:`2024-49953`, :cve_nist:`2024-49954`,
47 :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`, :cve_nist:`2024-49959`,
48 :cve_nist:`2024-49960`, :cve_nist:`2024-49961`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`,
49 :cve_nist:`2024-49965`, :cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`,
50 :cve_nist:`2024-49975`, :cve_nist:`2024-49976`, :cve_nist:`2024-49977`, :cve_nist:`2024-49978`,
51 :cve_nist:`2024-49980`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
52 :cve_nist:`2024-49985`, :cve_nist:`2024-49986`, :cve_nist:`2024-49987`, :cve_nist:`2024-49988`,
53 :cve_nist:`2024-49989`, :cve_nist:`2024-49991`, :cve_nist:`2024-49992`, :cve_nist:`2024-49995`,
54 :cve_nist:`2024-49996`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`, :cve_nist:`2024-50001`,
55 :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50005`, :cve_nist:`2024-50006`,
56 :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50012`, :cve_nist:`2024-50013`,
57 :cve_nist:`2024-50015`, :cve_nist:`2024-50016`, :cve_nist:`2024-50019`, :cve_nist:`2024-50022`,
58 :cve_nist:`2024-50023`, :cve_nist:`2024-50024`, :cve_nist:`2024-50026`, :cve_nist:`2024-50029`,
59 :cve_nist:`2024-50031`, :cve_nist:`2024-50032`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
60 :cve_nist:`2024-50036`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
61 :cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
62 :cve_nist:`2024-50047`, :cve_nist:`2024-50048`, :cve_nist:`2024-50049`, :cve_nist:`2024-50051`,
63 :cve_nist:`2024-50055`, :cve_nist:`2024-50057`, :cve_nist:`2024-50058`, :cve_nist:`2024-50059`,
64 :cve_nist:`2024-50060`, :cve_nist:`2024-50061`, :cve_nist:`2024-50062`, :cve_nist:`2024-50063`,
65 :cve_nist:`2024-50064`, :cve_nist:`2024-50065`, :cve_nist:`2024-50066`, :cve_nist:`2024-50069`,
66 :cve_nist:`2024-50070`, :cve_nist:`2024-50072`, :cve_nist:`2024-50073`, :cve_nist:`2024-50074`,
67 :cve_nist:`2024-50075`, :cve_nist:`2024-50076`, :cve_nist:`2024-50077`, :cve_nist:`2024-50078`,
68 :cve_nist:`2024-50080`, :cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50084`,
69 :cve_nist:`2024-50085`, :cve_nist:`2024-50086`, :cve_nist:`2024-50087`, :cve_nist:`2024-50088`,
70 :cve_nist:`2024-50093`, :cve_nist:`2024-50095`, :cve_nist:`2024-50096`, :cve_nist:`2024-50098`,
71 :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`, :cve_nist:`2024-50108`,
72 :cve_nist:`2024-50110`, :cve_nist:`2024-50111`, :cve_nist:`2024-50112`, :cve_nist:`2024-50115`,
73 :cve_nist:`2024-50116`, :cve_nist:`2024-50117`, :cve_nist:`2024-50120`, :cve_nist:`2024-50121`,
74 :cve_nist:`2024-50124`, :cve_nist:`2024-50125`, :cve_nist:`2024-50126`, :cve_nist:`2024-50127`,
75 :cve_nist:`2024-50128`, :cve_nist:`2024-50130`, :cve_nist:`2024-50131`, :cve_nist:`2024-50133`,
76 :cve_nist:`2024-50134`, :cve_nist:`2024-50135`, :cve_nist:`2024-50136`, :cve_nist:`2024-50139`,
77 :cve_nist:`2024-50140`, :cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`,
78 :cve_nist:`2024-50145`, :cve_nist:`2024-50147`, :cve_nist:`2024-50148`, :cve_nist:`2024-50150`,
79 :cve_nist:`2024-50151`, :cve_nist:`2024-50152`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`,
80 :cve_nist:`2024-50155`, :cve_nist:`2024-50156`, :cve_nist:`2024-50158`, :cve_nist:`2024-50159`,
81 :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`, :cve_nist:`2024-50164`,
82 :cve_nist:`2024-50166`, :cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50169`,
83 :cve_nist:`2024-50170`, :cve_nist:`2024-50171`, :cve_nist:`2024-50172`, :cve_nist:`2024-50175`,
84 :cve_nist:`2024-50176`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`,
85 :cve_nist:`2024-50182`, :cve_nist:`2024-50183`, :cve_nist:`2024-50184`, :cve_nist:`2024-50185`,
86 :cve_nist:`2024-50186`, :cve_nist:`2024-50187`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`,
87 :cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
88 :cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`,
89 :cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`,
90 :cve_nist:`2024-50211`, :cve_nist:`2024-50215`, :cve_nist:`2024-50222`, :cve_nist:`2024-50223`,
91 :cve_nist:`2024-50224`, :cve_nist:`2024-50226`, :cve_nist:`2024-50229`, :cve_nist:`2024-50230`,
92 :cve_nist:`2024-50231`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`, :cve_nist:`2024-50234`,
93 :cve_nist:`2024-50235`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50239`,
94 :cve_nist:`2024-50240`, :cve_nist:`2024-50242`, :cve_nist:`2024-50243`, :cve_nist:`2024-50244`,
95 :cve_nist:`2024-50245`, :cve_nist:`2024-50246`, :cve_nist:`2024-50247`, :cve_nist:`2024-50248`,
96 :cve_nist:`2024-50249`, :cve_nist:`2024-50250`, :cve_nist:`2024-50251`, :cve_nist:`2024-50252`,
97 :cve_nist:`2024-50255`, :cve_nist:`2024-50256`, :cve_nist:`2024-50257`, :cve_nist:`2024-50258`,
98 :cve_nist:`2024-50259`, :cve_nist:`2024-50261`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`,
99 :cve_nist:`2024-50265`, :cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`,
100 :cve_nist:`2024-50271`, :cve_nist:`2024-50272`, :cve_nist:`2024-50273`, :cve_nist:`2024-50275`,
101 :cve_nist:`2024-50276`, :cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`,
102 :cve_nist:`2024-50283`, :cve_nist:`2024-50284`, :cve_nist:`2024-50285`, :cve_nist:`2024-50286`,
103 :cve_nist:`2024-50287`, :cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50298`,
104 :cve_nist:`2024-50299`, :cve_nist:`2024-50300`, :cve_nist:`2024-50301`, :cve_nist:`2024-50302`,
105 :cve_nist:`2024-53042`, :cve_nist:`2024-53043`, :cve_nist:`2024-53046`, :cve_nist:`2024-53047`,
106 :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`, :cve_nist:`2024-53058`,
107 :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`, :cve_nist:`2024-53063`,
108 :cve_nist:`2024-53066`, :cve_nist:`2024-53068`, :cve_nist:`2024-53072`, :cve_nist:`2024-53076`,
109 :cve_nist:`2024-53079`, :cve_nist:`2024-53081`, :cve_nist:`2024-53082`, :cve_nist:`2024-53083`,
110 :cve_nist:`2024-53088`, :cve_nist:`2024-53091`, :cve_nist:`2024-53093`, :cve_nist:`2024-53094`,
111 :cve_nist:`2024-53096`, :cve_nist:`2024-53099`, :cve_nist:`2024-53100`, :cve_nist:`2024-53101`,
112 :cve_nist:`2024-53103`, :cve_nist:`2024-53108`, :cve_nist:`2024-53109`, :cve_nist:`2024-53110`,
113 :cve_nist:`2024-53112`, :cve_nist:`2024-53113`, :cve_nist:`2024-53119`, :cve_nist:`2024-53120`,
114 :cve_nist:`2024-53121`, :cve_nist:`2024-53122`, :cve_nist:`2024-53123`, :cve_nist:`2024-53126`,
115 :cve_nist:`2024-53127`, :cve_nist:`2024-53129`, :cve_nist:`2024-53130`, :cve_nist:`2024-53131`,
116 :cve_nist:`2024-53134`, :cve_nist:`2024-53135`, :cve_nist:`2024-53138`, :cve_nist:`2024-53139`,
117 :cve_nist:`2024-53140`, :cve_nist:`2024-53141`, :cve_nist:`2024-53142`, :cve_nist:`2024-53145`,
118 :cve_nist:`2024-53146`, :cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53154`,
119 :cve_nist:`2024-53155`, :cve_nist:`2024-53156`, :cve_nist:`2024-53157`, :cve_nist:`2024-53161`,
120 :cve_nist:`2024-53165`, :cve_nist:`2024-53166`, :cve_nist:`2024-53168`, :cve_nist:`2024-53171`,
121 :cve_nist:`2024-53173`, :cve_nist:`2024-53175`, :cve_nist:`2024-53180`, :cve_nist:`2024-53188`,
122 :cve_nist:`2024-53191`, :cve_nist:`2024-53200`, :cve_nist:`2024-53202`, :cve_nist:`2024-53208`,
123 :cve_nist:`2024-53210`, :cve_nist:`2024-53213`, :cve_nist:`2024-53215`, :cve_nist:`2024-53217`,
124 :cve_nist:`2024-53224`, :cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53230`,
125 :cve_nist:`2024-53231`, :cve_nist:`2024-53237`, :cve_nist:`2024-53239`, :cve_nist:`2024-54683`,
126 :cve_nist:`2024-55916`, :cve_nist:`2024-56369`, :cve_nist:`2024-56538`, :cve_nist:`2024-56551`,
127 :cve_nist:`2024-56567`, :cve_nist:`2024-56568`, :cve_nist:`2024-56569`, :cve_nist:`2024-56572`,
128 :cve_nist:`2024-56574`, :cve_nist:`2024-56575`, :cve_nist:`2024-56577`, :cve_nist:`2024-56578`,
129 :cve_nist:`2024-56579`, :cve_nist:`2024-56581`, :cve_nist:`2024-56587`, :cve_nist:`2024-56593`,
130 :cve_nist:`2024-56595`, :cve_nist:`2024-56596`, :cve_nist:`2024-56598`, :cve_nist:`2024-56600`,
131 :cve_nist:`2024-56601`, :cve_nist:`2024-56602`, :cve_nist:`2024-56603`, :cve_nist:`2024-56604`,
132 :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56611`, :cve_nist:`2024-56613`,
133 :cve_nist:`2024-56614`, :cve_nist:`2024-56615`, :cve_nist:`2024-56617`, :cve_nist:`2024-56622`,
134 :cve_nist:`2024-56623`, :cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56629`,
135 :cve_nist:`2024-56631`, :cve_nist:`2024-56634`, :cve_nist:`2024-56635`, :cve_nist:`2024-56640`,
136 :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`, :cve_nist:`2024-56649`,
137 :cve_nist:`2024-56650`, :cve_nist:`2024-56651`, :cve_nist:`2024-56653`, :cve_nist:`2024-56654`,
138 :cve_nist:`2024-56657`, :cve_nist:`2024-56658`, :cve_nist:`2024-56659`, :cve_nist:`2024-56660`,
139 :cve_nist:`2024-56662`, :cve_nist:`2024-56663`, :cve_nist:`2024-56664`, :cve_nist:`2024-56667`,
140 :cve_nist:`2024-56670`, :cve_nist:`2024-56672`, :cve_nist:`2024-56675`, :cve_nist:`2024-56687`,
141 :cve_nist:`2024-56688`, :cve_nist:`2024-56689`, :cve_nist:`2024-56692`, :cve_nist:`2024-56694`,
142 :cve_nist:`2024-56698`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`, :cve_nist:`2024-56710`,
143 :cve_nist:`2024-56715`, :cve_nist:`2024-56716`, :cve_nist:`2024-56717`, :cve_nist:`2024-56718`,
144 :cve_nist:`2024-56720`, :cve_nist:`2024-56722`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`,
145 :cve_nist:`2024-56725`, :cve_nist:`2024-56726`, :cve_nist:`2024-56727`, :cve_nist:`2024-56728`,
146 :cve_nist:`2024-56729`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56744`,
147 :cve_nist:`2024-56745`, :cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`,
148 :cve_nist:`2024-56751`, :cve_nist:`2024-56752`, :cve_nist:`2024-56754`, :cve_nist:`2024-56755`,
149 :cve_nist:`2024-56756`, :cve_nist:`2024-56760`, :cve_nist:`2024-56763`, :cve_nist:`2024-56765`,
150 :cve_nist:`2024-56767`, :cve_nist:`2024-56769`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`,
151 :cve_nist:`2024-56776`, :cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`,
152 :cve_nist:`2024-56780`, :cve_nist:`2024-56781`, :cve_nist:`2024-56783`, :cve_nist:`2024-56785`,
153 :cve_nist:`2024-56786`, :cve_nist:`2024-56787`, :cve_nist:`2024-57798`, :cve_nist:`2024-57807`
154 and :cve_nist:`2024-57874`
155- ofono: Fix :cve_nist:`2023-4232`, :cve_nist:`2023-4235`, :cve_nist:`2024-7539`,
156 :cve_nist:`2024-7540`, :cve_nist:`2024-7541`, :cve_nist:`2024-7542`, :cve_nist:`2024-7543`,
157 :cve_nist:`2024-7544`, :cve_nist:`2024-7545`, :cve_nist:`2024-7546` and :cve_nist:`2024-7547`
158- rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`,
159 :cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747`
160- socat: Fix :cve_nist:`2024-54661`
161- subversion: Fix :cve_nist:`2024-46901`
162- wget: Fix :cve_nist:`2024-10524`
163
164
165Fixes in Yocto-5.0.7
166~~~~~~~~~~~~~~~~~~~~
167
168- bitbake: cooker: Make cooker 'skiplist' per-multiconfig/mc
169- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
170- bitbake: ui/knotty: print log paths for failed tasks in summary
171- bitbake: ui/knotty: respect NO_COLOR & check for tty; rename print_hyperlink => format_hyperlink
172- bluez5: Revert "bluez5: remove configuration files from install task"
173- bluez5: backport patch to fix address type when loading keys
174- boost: fix do_fetch error
175- build-appliance-image: Update to scarthgap head revision
176- classes/nativesdk: also override :term:`TUNE_PKGARCH`
177- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
178- contributor-guide/submit-changes.rst: suggest to remove the git signature
179- cve-update-nvd2-native: Handle :term:`BB_NO_NETWORK` and missing db
180- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
181- dev-manual/bmaptool.rst: correct command for bmaptool-native
182- dev-manual/bmaptool.rst: simplify and fix instructions
183- dev-manual: fix styling of references to bmaptool
184- docs: Gather dependencies in poky.yaml.in
185- docs: Update autobuilder URLs to valkyrie
186- docs: Update the documentation for :term:`SRCPV`
187- gcc: Fix c++: tweak for Wrange-loop-construct
188- groff: Fix race issues for parallel build
189- libgfortran: fix buildpath QA issue
190- libxml2: Upgrade to 2.12.9
191- linux-yocto/6.6: bsp/genericarm64: disable ARM64_SME
192- linux-yocto/6.6: genericarm64.cfg: enable CONFIG_DMA_CMA
193- linux-yocto/6.6: update to v6.6.69
194- lttng-modules: fix sched_stat_runtime changed in Linux 6.6.66
195- migration-guides: add release notes for 5.0.6
196- oeqa/ssh: allow to retrieve raw, unformatted ouput
197- ovmf-native: remove .pyc files from install
198- poky.conf: add new tested distros
199- poky.conf: bump version for 5.0.7
200- poky.yaml.in: add missing locales dependency
201- poky.yaml.in: replace inkscape dependency by librsvg2-bin
202- populate_sdk_ext: write_local_conf add shutil import
203- pulseaudio: fix webrtc audio depdency
204- python3-requests: upgrade to 2.32.3
205- python3: Drop empty patch
206- python3: add dependency on -compression to -core
207- python3: upgrade to 3.12.7
208- ref-manual: move runtime-testing section to the test-manual
209- ref-manual: use standardized method accross both ubuntu and debian for locale install
210- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
211- reproducible-builds.rst: show how to build a single package
212- rust-target-config: Fix TARGET_C_INT_WIDTH with correct size
213- rust: Revert "rust: Add new varaible RUST_ENABLE_EXTRA_TOOLS"
214- rust: add reproducibility patch to eliminate host leakage
215- rust: build the default set of tools
216- rust: correctly link rust-snapshot into build/stage0
217- rust: use rust-snapshot binaries only in rust-native
218- sanity.bbclass: skip check_userns for non-local uid
219- scripts/install-buildtools: Update to 5.0.6
220- system-requirements.rst: add dependencies for pdf builds
221- system-requirements: add fedora 39 to supported distros
222- system-requirements: update list of supported distros
223- systemd: enable create-log-dirs
224- test-manual/reproducible-builds: fix reproducible links
225
226
227Known Issues in Yocto-5.0.7
228~~~~~~~~~~~~~~~~~~~~~~~~~~~
229
230- N/A
231
232Contributors to Yocto-5.0.7
233~~~~~~~~~~~~~~~~~~~~~~~~~~~
234
235Thanks to the following people who contributed to this release:
236
237- Aleksandar Nikolic
238- Alexander Kanavin
239- Alexis Lothoré
240- Antonin Godard
241- Archana Polampalli
242- Bruce Ashfield
243- Catalin Popescu
244- Changqing Li
245- Chen Qi
246- Chris Laplante
247- Divya Chellam
248- Esben Haabendal
249- Guénaël Muller
250- Guðni Már Gilbert
251- Harish Sadineni
252- Hiago De Franco
253- Hitendra Prajapati
254- Jiaying Song
255- Khem Raj
256- Lee Chee Yang
257- Mark Hatle
258- Michael Opdenacker
259- Mikko Rapeli
260- Peter Marko
261- Richard Purdie
262- Robert Yang
263- Ross Burton
264- Soumya Sambu
265- Steve Sakoman
266- Sunil Dora
267- Trevor Gamblin
268- Xiangyu Chen
269- Yash Shinde
270- Zhang Peng
271- Zahir Hussain
272
273
274Repositories / Downloads for Yocto-5.0.7
275~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
276
277poky
278
279- Repository Location: :yocto_git:`/poky`
280- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
281- Tag: :yocto_git:`yocto-5.0.7 </poky/log/?h=yocto-5.0.7>`
282- Git Revision: :yocto_git:`7dad83c7e5e9637c0ff5d5712409611fd4a14946 </poky/commit/?id=7dad83c7e5e9637c0ff5d5712409611fd4a14946>`
283- Release Artefact: poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946
284- sha: ae688031b19b88582bb4a76d0525e3704b981ad1d21eb38a0873cd01dd9a4652
285- Download Locations:
286 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2
287 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/poky-7dad83c7e5e9637c0ff5d5712409611fd4a14946.tar.bz2
288
289openembedded-core
290
291- Repository Location: :oe_git:`/openembedded-core`
292- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
293- Tag: :oe_git:`yocto-5.0.7 </openembedded-core/log/?h=yocto-5.0.7>`
294- Git Revision: :oe_git:`62cb12967391db709315820d48853ffa4c6b4740 </openembedded-core/commit/?id=62cb12967391db709315820d48853ffa4c6b4740>`
295- Release Artefact: oecore-62cb12967391db709315820d48853ffa4c6b4740
296- sha: bc45429df1805445b678f1b0ed6ce017edfac38c7226dce92ce393b3ef311f95
297- Download Locations:
298 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2
299 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/oecore-62cb12967391db709315820d48853ffa4c6b4740.tar.bz2
300
301meta-mingw
302
303- Repository Location: :yocto_git:`/meta-mingw`
304- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
305- Tag: :yocto_git:`yocto-5.0.7 </meta-mingw/log/?h=yocto-5.0.7>`
306- Git Revision: :yocto_git:`acbba477893ef87388effc4679b7f40ee49fc852 </meta-mingw/commit/?id=acbba477893ef87388effc4679b7f40ee49fc852>`
307- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852
308- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c
309- Download Locations:
310 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
311 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2
312
313bitbake
314
315- Repository Location: :oe_git:`/bitbake`
316- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
317- Tag: :oe_git:`yocto-5.0.7 </bitbake/log/?h=yocto-5.0.7>`
318- Git Revision: :oe_git:`aa0e540fc31a1c26839efd2c7785a751ce24ebfb </bitbake/commit/?id=aa0e540fc31a1c26839efd2c7785a751ce24ebfb>`
319- Release Artefact: bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb
320- sha: 169b68ed7d5e55015b1c35a82d35efaa25c87cba4722c85e66514a15d31e1d28
321- Download Locations:
322 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2
323 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.7/bitbake-aa0e540fc31a1c26839efd2c7785a751ce24ebfb.tar.bz2
324
325yocto-docs
326
327- Repository Location: :yocto_git:`/yocto-docs`
328- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
329- Tag: :yocto_git:`yocto-5.0.7 </yocto-docs/log/?h=yocto-5.0.7>`
330- Git Revision: :yocto_git:`bb9e018adcc10c642f87d0b95432783b5eb8057b </yocto-docs/commit/?id=bb9e018adcc10c642f87d0b95432783b5eb8057b>`
331
diff --git a/documentation/migration-guides/release-notes-5.0.8.rst b/documentation/migration-guides/release-notes-5.0.8.rst
new file mode 100644
index 0000000000..5cb8b30246
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.8.rst
@@ -0,0 +1,226 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.8 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.8
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2025-0840`
10- curl: Ignore :cve_nist:`2025-0725`
11- elfutils: Fix :cve_nist:`2025-1352`, :cve_nist:`2025-1365` and :cve_nist:`2025-1372`
12- ffmpeg: Fix :cve_nist:`2024-35365`, :cve_nist:`2024-35369`, :cve_nist:`2024-36613`,
13 :cve_nist:`2024-36616`, :cve_nist:`2024-36617`, :cve_nist:`2024-36618`, :cve_nist:`2024-36619`,
14 :cve_nist:`2025-0518`, :cve_nist:`2025-22919`, :cve_nist:`2025-22921` and :cve_nist:`2025-25473`
15- glibc: Fix :cve_nist:`2025-0395`
16- gnutls: Fix :cve_nist:`2024-12243`
17- go: Fix :cve_nist:`2024-45336`, :cve_nist:`2024-45341` and :cve_nist:`2025-22866`
18- gstreamer1.0-rtsp-server: Fix :cve_nist:`2024-44331`
19- libcap: Fix :cve_nist:`2025-1390`
20- libtasn1: Fix :cve_nist:`2024-12133`
21- libxml2: Fix :cve_nist:`2024-56171` and :cve_nist:`2025-24928`
22- linux-yocto/6.6: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-53179`, :cve_nist:`2024-56582`,
23 :cve_nist:`2024-56703`, :cve_nist:`2024-57801`, :cve_nist:`2024-57802`, :cve_nist:`2024-57841`,
24 :cve_nist:`2024-57882`, :cve_nist:`2024-57887`, :cve_nist:`2024-57890`, :cve_nist:`2024-57892`,
25 :cve_nist:`2024-57895`, :cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57901`,
26 :cve_nist:`2024-57902`, :cve_nist:`2024-57906`, :cve_nist:`2024-57907`, :cve_nist:`2024-57908`,
27 :cve_nist:`2024-57910`, :cve_nist:`2024-57911`, :cve_nist:`2024-57912`, :cve_nist:`2024-57913`,
28 :cve_nist:`2024-57916`, :cve_nist:`2024-57922`, :cve_nist:`2024-57925`, :cve_nist:`2024-57926`,
29 :cve_nist:`2024-57933`, :cve_nist:`2024-57938`, :cve_nist:`2024-57939`, :cve_nist:`2024-57940`,
30 :cve_nist:`2024-57949`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21636`,
31 :cve_nist:`2025-21637`, :cve_nist:`2025-21638`, :cve_nist:`2025-21639`, :cve_nist:`2025-21640`,
32 :cve_nist:`2025-21642`, :cve_nist:`2025-21652`, :cve_nist:`2025-21658`, :cve_nist:`2025-21665`,
33 :cve_nist:`2025-21666`, :cve_nist:`2025-21667`, :cve_nist:`2025-21669`, :cve_nist:`2025-21670`,
34 :cve_nist:`2025-21671`, :cve_nist:`2025-21673`, :cve_nist:`2025-21674`, :cve_nist:`2025-21675`,
35 :cve_nist:`2025-21676`, :cve_nist:`2025-21680`, :cve_nist:`2025-21681`, :cve_nist:`2025-21683`,
36 :cve_nist:`2025-21684`, :cve_nist:`2025-21687`, :cve_nist:`2025-21689`, :cve_nist:`2025-21690`,
37 :cve_nist:`2025-21692`, :cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
38- openssh: Fix :cve_nist:`2025-26466`
39- openssl: Fix :cve_nist:`2024-9143`, :cve_nist:`2024-12797` and :cve_nist:`2024-13176`
40- pyhton3: Fix :cve_nist:`2024-12254` and :cve_nist:`2025-0938`
41- subversion: Ignore :cve_nist:`2024-45720`
42- u-boot: Fix :cve_nist:`2024-57254`, :cve_nist:`2024-57255`, :cve_nist:`2024-57256`,
43 :cve_nist:`2024-57257`, :cve_nist:`2024-57258` and :cve_nist:`2024-57259`
44- vim: Fix :cve_nist:`2025-22134` and :cve_nist:`2025-24014`
45- xwayland: Fix :cve_nist:`2024-9632`, :cve_nist:`2025-26594`, :cve_nist:`2025-26595`,
46 :cve_nist:`2025-26596`, :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`,
47 :cve_nist:`2025-26600` and :cve_nist:`2025-26601`
48
49
50Fixes in Yocto-5.0.8
51~~~~~~~~~~~~~~~~~~~~
52
53- base-files: Drop /bin/sh dependency
54- bind: upgrade to 9.18.33
55- binutils: File name too long causing failure to open temporary head file in dlltool
56- binutils: stable 2.42 branch update
57- bitbake: bblayers/query: Fix using "removeprefix" string method
58- bitbake: bitbake-diffsigs: fix handling when finding only a single sigfile
59- bitbake: data_smart.py: clear expand_cache in _setvar_update_overridevars
60- bitbake: data_smart.py: remove unnecessary ? from __expand_var_regexp__
61- bitbake: data_smart.py: simple clean up
62- build-appliance-image: Update to scarthgap head revision
63- ccache.conf: Add include_file_ctime to sloppiness
64- cmake: apply parallel build settings to ptest tasks
65- contributor-guide/submit-changes: add policy on AI generated code
66- dev-manual/building: document the initramfs-framework recipe
67- devtool: ide-sdk recommend :term:`DEBUG_BUILD`
68- devtool: ide-sdk remove the plugin from eSDK installer
69- devtool: ide-sdk sort cmake preset
70- devtool: modify support debug-builds
71- docs: Add favicon for the documentation html
72- docs: Fix typo in standards.md
73- docs: Remove all mention of core-image-lsb
74- docs: vulnerabilities/classes: remove references to cve-check text format
75- files: Amend overlayfs unit descriptions with path information
76- files: overlayfs-create-dirs: Improve mount unit dependency
77- glibc: stable 2.39 branch updates
78- gnupg: upgrade to 2.4.5
79- go: upgrade 1.22.12
80- icu: remove host references in nativesdk to fix reproducibility
81- libtasn1: upgrade to 4.20.0
82- libxml2: upgrade to 2.12.10
83- linux-yocto/6.6: upgrade to v6.6.75
84- meta: Enable '-o pipefail' for the SDK installer
85- migration-guides: add release notes for 4.0.24, 4.0.25 and 5.0.7
86- oe-selftest: devtool ide-sdk use modify debug-build
87- oeqa/sdk/context: fix for gtk3 test failure during do_testsdk
88- oeqa/selftest/rust: skip on all MIPS platforms
89- openssl: upgrade to 3.2.4
90- pkg-config-native: pick additional search paths from $EXTRA_NATIVE_PKGCONFIG_PATH
91- poky.conf: add ubuntu2404 to :term:`SANITY_TESTED_DISTROS`
92- poky.conf: bump version for 5.0.8
93- ppp: Revert lock path to /var/lock
94- python3-setuptools-scm: respect GIT_CEILING_DIRECTORIES
95- python3: upgrade to 3.12.9
96- qemu: Do not define sched_attr with glibc >= 2.41
97- ref-manual/faq: add q&a on systemd as default
98- ref-manual: Add missing variable :term:`IMAGE_ROOTFS_MAXSIZE`
99- ref-manual: don't refer to poky-lsb
100- ref-manual: remove OE_IMPORTS
101- rust-common.bbclass: soft assignment for RUSTLIB path
102- rust: fix for rust multilib sdk configuration
103- rust: remove redundant cargo config file
104- scripts/install-buildtools: Update to 5.0.7
105- sdk-manual: extensible.rst: devtool ide-sdk improve
106- sdk-manual: extensible.rst: update devtool ide-sdk
107- selftest/rust: correctly form the PATH environment variable
108- systemd: add libpcre2 as :term:`RRECOMMENDS` if pcre2 is enabled
109- systemd: upgrade to 255.17
110- test-manual/ptest: link to common framework ptest classes
111- tzcode-native: Fix compiler setting from 2023d version
112- tzdata/tzcode-native: upgrade to 2025a
113- u-boot: kernel-fitimage: Fix dependency loop if :term:`UBOOT_SIGN_ENABLE` and UBOOT_ENV enabled
114- u-boot: kernel-fitimage: Restore FIT_SIGN_INDIVIDUAL="1" behavior
115- uboot-config: fix devtool modify with kernel-fitimage
116- vim: upgrade to 9.1.1043
117
118
119Known Issues in Yocto-5.0.8
120~~~~~~~~~~~~~~~~~~~~~~~~~~~
121
122- N/A
123
124Contributors to Yocto-5.0.8
125~~~~~~~~~~~~~~~~~~~~~~~~~~~
126
127Thanks to the following people who contributed to this release:
128
129- Adrian Freihofer
130- Aleksandar Nikolic
131- Alessio Cascone
132- Alexander Kanavin
133- Alexis Cellier
134- Antonin Godard
135- Archana Polampalli
136- Bruce Ashfield
137- Chen Qi
138- Deepesh Varatharajan
139- Divya Chellam
140- Enrico Jörns
141- Esben Haabendal
142- Etienne Cordonnier
143- Fabio Berton
144- Guðni Már Gilbert
145- Harish Sadineni
146- Hitendra Prajapati
147- Hongxu Jia
148- Jiaying Song
149- Joerg Schmidt
150- Johannes Schneider
151- Khem Raj
152- Lee Chee Yang
153- Marek Vasut
154- Marta Rybczynska
155- Moritz Haase
156- Oleksandr Hnatiuk
157- Pedro Ferreira
158- Peter Marko
159- Poonam Jadhav
160- Priyal Doshi
161- Ross Burton
162- Simon A. Eugster
163- Steve Sakoman
164- Vijay Anusuri
165- Wang Mingyu
166- Weisser, Pascal
167
168
169Repositories / Downloads for Yocto-5.0.8
170~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
171
172poky
173
174- Repository Location: :yocto_git:`/poky`
175- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
176- Tag: :yocto_git:`yocto-5.0.8 </poky/log/?h=yocto-5.0.8>`
177- Git Revision: :yocto_git:`dc4827b3660bc1a03a2bc3b0672615b50e9137ff </poky/commit/?id=dc4827b3660bc1a03a2bc3b0672615b50e9137ff>`
178- Release Artefact: poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff
179- sha: ace7264e16e18ed02ef0ad2935fa10b5fad2c4de38b2356f4192b38ef2184504
180- Download Locations:
181 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2
182 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/poky-dc4827b3660bc1a03a2bc3b0672615b50e9137ff.tar.bz2
183
184openembedded-core
185
186- Repository Location: :oe_git:`/openembedded-core`
187- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
188- Tag: :oe_git:`yocto-5.0.8 </openembedded-core/log/?h=yocto-5.0.8>`
189- Git Revision: :oe_git:`cd2b6080a4c0f2ed2c9939ec0b87763aef595048 </openembedded-core/commit/?id=cd2b6080a4c0f2ed2c9939ec0b87763aef595048>`
190- Release Artefact: oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048
191- sha: 14c7cd5c62a96ceb9c2141164ea0f087fdbaed99ca3e9a722977a3f12d6381f6
192- Download Locations:
193 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2
194 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/oecore-cd2b6080a4c0f2ed2c9939ec0b87763aef595048.tar.bz2
195
196meta-mingw
197
198- Repository Location: :yocto_git:`/meta-mingw`
199- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
200- Tag: :yocto_git:`yocto-5.0.8 </meta-mingw/log/?h=yocto-5.0.8>`
201- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
202- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
203- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
204- Download Locations:
205 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
206 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
207
208bitbake
209
210- Repository Location: :oe_git:`/bitbake`
211- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
212- Tag: :oe_git:`yocto-5.0.8 </bitbake/log/?h=yocto-5.0.8>`
213- Git Revision: :oe_git:`7375d32e8c1af20c51abec4eb3b072b4ca58b239 </bitbake/commit/?id=7375d32e8c1af20c51abec4eb3b072b4ca58b239>`
214- Release Artefact: bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239
215- sha: 13dffbc162c5b6e2c95fa72936a430b9a542d52d81d502a5d0afc592fbf4a16b
216- Download Locations:
217 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2
218 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.8/bitbake-7375d32e8c1af20c51abec4eb3b072b4ca58b239.tar.bz2
219
220yocto-docs
221
222- Repository Location: :yocto_git:`/yocto-docs`
223- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
224- Tag: :yocto_git:`yocto-5.0.8 </yocto-docs/log/?h=yocto-5.0.8>`
225- Git Revision: :yocto_git:`7d3cce5b962ca9f73b29affceb7ebc6710627739 </yocto-docs/commit/?id=7d3cce5b962ca9f73b29affceb7ebc6710627739>`
226
diff --git a/documentation/migration-guides/release-notes-5.0.9.rst b/documentation/migration-guides/release-notes-5.0.9.rst
new file mode 100644
index 0000000000..81b853cf31
--- /dev/null
+++ b/documentation/migration-guides/release-notes-5.0.9.rst
@@ -0,0 +1,206 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3Release notes for Yocto-5.0.9 (Scarthgap)
4-----------------------------------------
5
6Security Fixes in Yocto-5.0.9
7~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8
9- binutils: Fix :cve_nist:`2024-57360`, :cve_nist:`2025-1176`, :cve_nist:`2025-1178` and
10 :cve_nist:`2025-1181`
11- expat: Fix :cve_nist:`2024-8176`
12- freetype: Fix :cve_nist:`2025-27363`
13- ghostscript: Fix :cve_nist:`2025-27830`, :cve_nist:`2025-27831`, :cve_nist:`2025-27832`,
14 :cve_nist:`2025-27833`, :cve_nist:`2025-27833`, :cve_nist:`2025-27834`, :cve_nist:`2025-27835`
15 and :cve_nist:`2025-27836`
16- go: fix :cve_nist:`2025-22870` and :cve_nist:`2025-22871`
17- grub: Fix :cve_nist:`2024-45781`, :cve_nist:`2024-45774`, :cve_nist:`2024-45775`,
18 :cve_nist:`2024-45776`, :cve_nist:`2024-45777`, :cve_nist:`2024-45778`, :cve_nist:`2024-45779`,
19 :cve_nist:`2024-45780`, :cve_nist:`2024-45782`, :cve_nist:`2024-45783`, :cve_nist:`2024-56737`,
20 :cve_nist:`2025-0622`, :cve_nist:`2025-0624`, :cve_nist:`2025-0677`, :cve_nist:`2025-0678`,
21 :cve_nist:`2025-0684`, :cve_nist:`2025-0685`, :cve_nist:`2025-0686`, :cve_nist:`2025-0689`,
22 :cve_nist:`2025-0690`, :cve_nist:`2025-1118` and :cve_nist:`2025-1125`
23- libarchive: Fix :cve_nist:`2024-20696`, :cve_nist:`2024-48957`, :cve_nist:`2024-48958`,
24 :cve_nist:`2025-1632` and :cve_nist:`2025-25724`
25- libxslt: Fix :cve_nist:`2024-24855` and :cve_nist:`2024-55549`
26- linux-yocto/6.6: Fix :cve_nist:`2024-54458`, :cve_nist:`2024-57834`, :cve_nist:`2024-57973`,
27 :cve_nist:`2024-57978`, :cve_nist:`2024-57979`, :cve_nist:`2024-57980`, :cve_nist:`2024-57981`,
28 :cve_nist:`2024-57984`, :cve_nist:`2024-57996`, :cve_nist:`2024-57997`, :cve_nist:`2024-58002`,
29 :cve_nist:`2024-58005`, :cve_nist:`2024-58007`, :cve_nist:`2024-58010`, :cve_nist:`2024-58011`,
30 :cve_nist:`2024-58013`, :cve_nist:`2024-58017`, :cve_nist:`2024-58020`, :cve_nist:`2024-58034`,
31 :cve_nist:`2024-58052`, :cve_nist:`2024-58055`, :cve_nist:`2024-58058`, :cve_nist:`2024-58063`,
32 :cve_nist:`2024-58068`, :cve_nist:`2024-58069`, :cve_nist:`2024-58070`, :cve_nist:`2024-58071`,
33 :cve_nist:`2024-58076`, :cve_nist:`2024-58080`, :cve_nist:`2024-58083`, :cve_nist:`2024-58088`,
34 :cve_nist:`2025-21700`, :cve_nist:`2025-21703`, :cve_nist:`2025-21707`, :cve_nist:`2025-21711`,
35 :cve_nist:`2025-21715`, :cve_nist:`2025-21716`, :cve_nist:`2025-21718`, :cve_nist:`2025-21726`,
36 :cve_nist:`2025-21727`, :cve_nist:`2025-21731`, :cve_nist:`2025-21735`, :cve_nist:`2025-21736`,
37 :cve_nist:`2025-21741`, :cve_nist:`2025-21742`, :cve_nist:`2025-21743`, :cve_nist:`2025-21744`,
38 :cve_nist:`2025-21745`, :cve_nist:`2025-21748`, :cve_nist:`2025-21749`, :cve_nist:`2025-21753`,
39 :cve_nist:`2025-21756`, :cve_nist:`2025-21759`, :cve_nist:`2025-21760`, :cve_nist:`2025-21761`,
40 :cve_nist:`2025-21762`, :cve_nist:`2025-21763`, :cve_nist:`2025-21764`, :cve_nist:`2025-21773`,
41 :cve_nist:`2025-21775`, :cve_nist:`2025-21776`, :cve_nist:`2025-21779`, :cve_nist:`2025-21780`,
42 :cve_nist:`2025-21782`, :cve_nist:`2025-21783`, :cve_nist:`2025-21785`, :cve_nist:`2025-21787`,
43 :cve_nist:`2025-21789`, :cve_nist:`2025-21790`, :cve_nist:`2025-21791`, :cve_nist:`2025-21792`,
44 :cve_nist:`2025-21793`, :cve_nist:`2025-21796`, :cve_nist:`2025-21811`, :cve_nist:`2025-21812`,
45 :cve_nist:`2025-21814`, :cve_nist:`2025-21820`, :cve_nist:`2025-21844`, :cve_nist:`2025-21846`,
46 :cve_nist:`2025-21847`, :cve_nist:`2025-21848`, :cve_nist:`2025-21853`, :cve_nist:`2025-21854`,
47 :cve_nist:`2025-21855`, :cve_nist:`2025-21856`, :cve_nist:`2025-21857`, :cve_nist:`2025-21858`,
48 :cve_nist:`2025-21859`, :cve_nist:`2025-21862`, :cve_nist:`2025-21863`, :cve_nist:`2025-21864`,
49 :cve_nist:`2025-21865`, :cve_nist:`2025-21866`, :cve_nist:`2025-21867`, :cve_nist:`2025-21887`,
50 :cve_nist:`2025-21891`, :cve_nist:`2025-21898`, :cve_nist:`2025-21904`, :cve_nist:`2025-21905`,
51 :cve_nist:`2025-21908`, :cve_nist:`2025-21912`, :cve_nist:`2025-21915`, :cve_nist:`2025-21917`,
52 :cve_nist:`2025-21918`, :cve_nist:`2025-21919`, :cve_nist:`2025-21920`, :cve_nist:`2025-21922`,
53 :cve_nist:`2025-21928`, :cve_nist:`2025-21934`, :cve_nist:`2025-21936`, :cve_nist:`2025-21937`,
54 :cve_nist:`2025-21941`, :cve_nist:`2025-21943`, :cve_nist:`2025-21945`, :cve_nist:`2025-21947`,
55 :cve_nist:`2025-21948`, :cve_nist:`2025-21951`, :cve_nist:`2025-21957`, :cve_nist:`2025-21959`,
56 :cve_nist:`2025-21962`, :cve_nist:`2025-21963`, :cve_nist:`2025-21964`, :cve_nist:`2025-21966`,
57 :cve_nist:`2025-21967`, :cve_nist:`2025-21968`, :cve_nist:`2025-21969`, :cve_nist:`2025-21979`,
58 :cve_nist:`2025-21980`, :cve_nist:`2025-21981`, :cve_nist:`2025-21991` and :cve_nist:`2025-21993`
59- mpg123: Fix :cve_nist:`2024-10573`
60- ofono: Fix :cve_nist:`2024-7537`
61- openssh: Fix :cve_nist:`2025-26465`
62- puzzles: Ignore :cve_nist:`2024-13769`, :cve_nist:`2024-13770` and :cve_nist:`2025-0837`
63- qemu: Ignore :cve_nist:`2023-1386`
64- ruby: Fix :cve_nist:`2025-27219` and :cve_nist:`2025-27220`
65- rust-cross-canadian: Ignore :cve_nist:`2024-43402`
66- vim: Fix :cve_nist:`2025-1215`, :cve_nist:`2025-26603`, :cve_nist:`2025-27423` and
67 :cve_nist:`2025-29768`
68- xserver-xorg: Fix :cve_nist:`2025-26594`, :cve_nist:`2025-26595`, :cve_nist:`2025-26596`,
69 :cve_nist:`2025-26597`, :cve_nist:`2025-26598`, :cve_nist:`2025-26599`, :cve_nist:`2025-26600`
70 and :cve_nist:`2025-26601`
71- xz: Fix :cve_nist:`2025-31115`
72
73
74Fixes in Yocto-5.0.9
75~~~~~~~~~~~~~~~~~~~~
76
77- babeltrace2: extend to nativesdk
78- babeltrace: extend to nativesdk
79- bitbake: event/utils: Avoid deadlock from lock_timeout() and recursive events
80- bitbake: utils: Add signal blocking for lock_timeout
81- bitbake: utils: Print information about lock issue before exiting
82- bitbake: utils: Tweak lock_timeout logic
83- build-appliance-image: Update to scarthgap head revision
84- cve-check.bbclass: Mitigate symlink related error
85- cve-update-nvd2-native: add workaround for json5 style list
86- cve-update-nvd2-native: handle missing vulnStatus
87- gcc: remove paths to sysroot from configargs.h and checksum-options for gcc-cross-canadian
88- gcc: unify cleanup of include-fixed, apply to cross-canadian
89- ghostscript: upgrade to 10.05.0
90- grub: backport strlcpy function
91- grub: drop obsolete CVE statuses
92- icu: Adjust ICU_DATA_DIR path on big endian targets
93- kernel-arch: add macro-prefix-map in KERNEL_CC
94- libarchive: upgrade to 3.7.9
95- libxslt: upgrade to 1.1.43
96- linux-yocto/6.6: update to v6.6.84
97- mc: set ac_cv_path_ZIP to avoid buildpaths QA issues
98- mpg123: upgrade to 1.32.10
99- nativesdk-libtool: sanitize the script, remove buildpaths
100- openssl: rewrite ptest installation
101- overview-manual/concepts: remove :term:`PR` from the build dir list
102- patch.py: set commituser and commitemail for addNote
103- poky.conf: bump version for 5.0.9
104- vim: Upgrade to 9.1.1198
105- xserver-xf86-config: add a configuration fragment to disable screen blanking
106- xserver-xf86-config: remove obsolete configuration files
107- xserver-xorg: upgrade to 21.1.16
108- xz: upgrade to 5.4.7
109- yocto-uninative: Update to 4.7 for glibc 2.41
110
111
112Known Issues in Yocto-5.0.9
113~~~~~~~~~~~~~~~~~~~~~~~~~~~
114
115- N/A
116
117Contributors to Yocto-5.0.9
118~~~~~~~~~~~~~~~~~~~~~~~~~~~
119
120Thanks to the following people who contributed to this release:
121
122- Antonin Godard
123- Archana Polampalli
124- Ashish Sharma
125- Bruce Ashfield
126- Changqing Li
127- Denys Dmytriyenko
128- Divya Chellam
129- Hitendra Prajapati
130- Madhu Marri
131- Makarios Christakis
132- Martin Jansa
133- Michael Halstead
134- Niko Mauno
135- Oleksandr Hnatiuk
136- Peter Marko
137- Richard Purdie
138- Ross Burton
139- Sana Kazi
140- Stefan Mueller-Klieser
141- Steve Sakoman
142- Vijay Anusuri
143- Virendra Thakur
144- Vishwas Udupa
145- Wang Mingyu
146- Zhang Peng
147
148
149Repositories / Downloads for Yocto-5.0.9
150~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
151
152poky
153
154- Repository Location: :yocto_git:`/poky`
155- Branch: :yocto_git:`scarthgap </poky/log/?h=scarthgap>`
156- Tag: :yocto_git:`yocto-5.0.9 </poky/log/?h=yocto-5.0.9>`
157- Git Revision: :yocto_git:`bab0f9f62af9af580744948dd3240f648a99879a </poky/commit/?id=bab0f9f62af9af580744948dd3240f648a99879a>`
158- Release Artefact: poky-bab0f9f62af9af580744948dd3240f648a99879a
159- sha: ee6811d9fb6c4913e19d6e3569f1edc8ccd793779b237520596506446a6b4531
160- Download Locations:
161 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2
162 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/poky-bab0f9f62af9af580744948dd3240f648a99879a.tar.bz2
163
164openembedded-core
165
166- Repository Location: :oe_git:`/openembedded-core`
167- Branch: :oe_git:`scarthgap </openembedded-core/log/?h=scarthgap>`
168- Tag: :oe_git:`yocto-5.0.9 </openembedded-core/log/?h=yocto-5.0.9>`
169- Git Revision: :oe_git:`04038ecd1edd6592b826665a2b787387bb7074fa </openembedded-core/commit/?id=04038ecd1edd6592b826665a2b787387bb7074fa>`
170- Release Artefact: oecore-04038ecd1edd6592b826665a2b787387bb7074fa
171- sha: 6e201a4b486dfbdfcb7e96d83b962a205ec4764db6ad0e34bd623db18910eddb
172- Download Locations:
173 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2
174 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/oecore-04038ecd1edd6592b826665a2b787387bb7074fa.tar.bz2
175
176meta-mingw
177
178- Repository Location: :yocto_git:`/meta-mingw`
179- Branch: :yocto_git:`scarthgap </meta-mingw/log/?h=scarthgap>`
180- Tag: :yocto_git:`yocto-5.0.9 </meta-mingw/log/?h=yocto-5.0.9>`
181- Git Revision: :yocto_git:`bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f </meta-mingw/commit/?id=bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f>`
182- Release Artefact: meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f
183- sha: ab073def6487f237ac125d239b3739bf02415270959546b6b287778664f0ae65
184- Download Locations:
185 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
186 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/meta-mingw-bd9fef71ec005be3c3a6d7f8b99d8116daf70c4f.tar.bz2
187
188bitbake
189
190- Repository Location: :oe_git:`/bitbake`
191- Branch: :oe_git:`2.8 </bitbake/log/?h=2.8>`
192- Tag: :oe_git:`yocto-5.0.9 </bitbake/log/?h=yocto-5.0.9>`
193- Git Revision: :oe_git:`696c2c1ef095f8b11c7d2eff36fae50f58c62e5e </bitbake/commit/?id=696c2c1ef095f8b11c7d2eff36fae50f58c62e5e>`
194- Release Artefact: bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e
195- sha: fc83f879cd6dd14b9b7eba0161fec23ecc191fed0fb00556ba729dceef6c145f
196- Download Locations:
197 https://downloads.yoctoproject.org/releases/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
198 https://mirrors.kernel.org/yocto/yocto/yocto-5.0.9/bitbake-696c2c1ef095f8b11c7d2eff36fae50f58c62e5e.tar.bz2
199
200yocto-docs
201
202- Repository Location: :yocto_git:`/yocto-docs`
203- Branch: :yocto_git:`scarthgap </yocto-docs/log/?h=scarthgap>`
204- Tag: :yocto_git:`yocto-5.0.9 </yocto-docs/log/?h=yocto-5.0.9>`
205- Git Revision: :yocto_git:`56db4fd81f6235428bef9e46a61c11ca0ba89733 </yocto-docs/commit/?id=56db4fd81f6235428bef9e46a61c11ca0ba89733>`
206
diff --git a/documentation/migration-guides/release-notes-5.0.rst b/documentation/migration-guides/release-notes-5.0.rst
index 800ba20a27..de11bd174a 100644
--- a/documentation/migration-guides/release-notes-5.0.rst
+++ b/documentation/migration-guides/release-notes-5.0.rst
@@ -217,7 +217,7 @@ New Features / Enhancements in 5.0
217 state directory (i.e., ``/run``). 217 state directory (i.e., ``/run``).
218 218
219 - Allow to disable colored text output through the 219 - Allow to disable colored text output through the
220 `NO_OUTPUT <https://no-color.org/>`__ environment variable. 220 `NO_COLOR <https://no-color.org/>`__ environment variable.
221 221
222 - ``git-make-shallow`` script: add support for Git's ``safe.bareRepository=explicit`` 222 - ``git-make-shallow`` script: add support for Git's ``safe.bareRepository=explicit``
223 configuration setting. 223 configuration setting.
@@ -362,39 +362,39 @@ The following corrections have been made to the :term:`LICENSE` values set by re
362Security Fixes in 5.0 362Security Fixes in 5.0
363~~~~~~~~~~~~~~~~~~~~~ 363~~~~~~~~~~~~~~~~~~~~~
364 364
365- avahi: :cve:`2023-1981`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38469`, :cve:`2023-38470`, :cve:`2023-38471`, :cve:`2023-38472`, :cve:`2023-38473` 365- avahi: :cve_nist:`2023-1981`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38469`, :cve_nist:`2023-38470`, :cve_nist:`2023-38471`, :cve_nist:`2023-38472`, :cve_nist:`2023-38473`
366- bind: :cve:`2023-4408`, :cve:`2023-5517`, :cve:`2023-5679`, :cve:`2023-50387` 366- bind: :cve_nist:`2023-4408`, :cve_nist:`2023-5517`, :cve_nist:`2023-5679`, :cve_nist:`2023-50387`
367- bluez5: :cve:`2023-45866` 367- bluez5: :cve_nist:`2023-45866`
368- coreutils: :cve:`2024-0684` 368- coreutils: :cve_nist:`2024-0684`
369- cups: :cve:`2023-4504` 369- cups: :cve_nist:`2023-4504`
370- curl: :cve:`2023-46218` 370- curl: :cve_nist:`2023-46218`
371- expat: :cve:`2024-28757` 371- expat: :cve_nist:`2024-28757`
372- gcc: :cve:`2023-4039` 372- gcc: :cve_nist:`2023-4039`
373- glibc: :cve:`2023-5156`, :cve:`2023-0687` 373- glibc: :cve_nist:`2023-5156`, :cve_nist:`2023-0687`
374- gnutls: :cve:`2024-0553`, :cve:`2024-0567`, :cve:`2024-28834`, :cve:`2024-28835` 374- gnutls: :cve_nist:`2024-0553`, :cve_nist:`2024-0567`, :cve_nist:`2024-28834`, :cve_nist:`2024-28835`
375- go: :cve:`2023-45288` 375- go: :cve_nist:`2023-45288`
376- grub: :cve:`2023-4692`, :cve:`2023-4693` 376- grub: :cve_nist:`2023-4692`, :cve_nist:`2023-4693`
377- grub2: :cve:`2023-4001` (ignored), :cve:`2024-1048` (ignored) 377- grub2: :cve_nist:`2023-4001` (ignored), :cve_nist:`2024-1048` (ignored)
378- libgit2: :cve:`2024-24575`, :cve:`2024-24577` 378- libgit2: :cve_nist:`2024-24575`, :cve_nist:`2024-24577`
379- libsndfile1: :cve:`2022-33065` 379- libsndfile1: :cve_nist:`2022-33065`
380- libssh2: :cve:`2023-48795` 380- libssh2: :cve_nist:`2023-48795`
381- libuv: :cve:`2024-24806` 381- libuv: :cve_nist:`2024-24806`
382- libxml2: :cve:`2023-45322` (ignored) 382- libxml2: :cve_nist:`2023-45322` (ignored)
383- linux-yocto/6.6: :cve:`2020-16119` 383- linux-yocto/6.6: :cve_nist:`2020-16119`
384- openssh: :cve:`2023-48795`, :cve:`2023-51384`, :cve:`2023-51385` 384- openssh: :cve_nist:`2023-48795`, :cve_nist:`2023-51384`, :cve_nist:`2023-51385`
385- openssl: :cve:`2023-5363`, :cve:`2023-5678`, :cve:`2023-6129`, :cve_mitre:`2023-6237`, :cve:`2024-0727`, :cve:`2024-2511` 385- openssl: :cve_nist:`2023-5363`, :cve_nist:`2023-5678`, :cve_nist:`2023-6129`, :cve_mitre:`2023-6237`, :cve_nist:`2024-0727`, :cve_nist:`2024-2511`
386- perl: :cve:`2023-47100` 386- perl: :cve_nist:`2023-47100`
387- pixman: :cve:`2023-37769` (ignored) 387- pixman: :cve_nist:`2023-37769` (ignored)
388- python3-cryptography{-vectors}: :cve:`2023-49083`, :cve:`2024-26130` 388- python3-cryptography{-vectors}: :cve_nist:`2023-49083`, :cve_nist:`2024-26130`
389- python3-urllib3: :cve:`2023-45803` 389- python3-urllib3: :cve_nist:`2023-45803`
390- shadow: :cve:`2023-4641` 390- shadow: :cve_nist:`2023-4641`
391- sudo: :cve:`2023-42456` 391- sudo: :cve_nist:`2023-42456`
392- tiff: :cve:`2023-6228`, :cve:`2023-6277`, :cve:`2023-52355`, :cve:`2023-52356` 392- tiff: :cve_nist:`2023-6228`, :cve_nist:`2023-6277`, :cve_nist:`2023-52355`, :cve_nist:`2023-52356`
393- vim: :cve:`2023-46246`, :cve:`2023-48231`, :cve:`2023-48232`, :cve:`2023-48233`, :cve:`2023-48234`, :cve:`2023-48235`, :cve:`2023-48236`, :cve:`2023-48237`, :cve:`2024-22667` 393- vim: :cve_nist:`2023-46246`, :cve_nist:`2023-48231`, :cve_nist:`2023-48232`, :cve_nist:`2023-48233`, :cve_nist:`2023-48234`, :cve_nist:`2023-48235`, :cve_nist:`2023-48236`, :cve_nist:`2023-48237`, :cve_nist:`2024-22667`
394- wpa-supplicant: :cve:`2023-52160` 394- wpa-supplicant: :cve_nist:`2023-52160`
395- xserver-xorg: :cve:`2023-5574`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2024-21885`, :cve:`2024-21886` 395- xserver-xorg: :cve_nist:`2023-5574`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886`
396- xwayland: :cve:`2023-5367`, :cve:`2024-0408`, :cve:`2024-0409`, :cve:`2023-6816`, :cve:`2024-0229`, :cve:`2024-21885`, :cve:`2024-21886` 396- xwayland: :cve_nist:`2023-5367`, :cve_nist:`2024-0408`, :cve_nist:`2024-0409`, :cve_nist:`2023-6816`, :cve_nist:`2024-0229`, :cve_nist:`2024-21885`, :cve_nist:`2024-21886`
397- zlib: :cve:`2023-45853` (ignored), :cve:`2023-6992` (ignored) 397- zlib: :cve_nist:`2023-45853` (ignored), :cve_nist:`2023-6992` (ignored)
398 398
399 399
400Recipe Upgrades in 5.0 400Recipe Upgrades in 5.0
diff --git a/documentation/overview-manual/concepts.rst b/documentation/overview-manual/concepts.rst
index 62f2327a7e..56dd3b3b55 100644
--- a/documentation/overview-manual/concepts.rst
+++ b/documentation/overview-manual/concepts.rst
@@ -98,7 +98,7 @@ files, and how to package the compiled output.
98 98
99The term "package" is sometimes used to refer to recipes. However, since 99The term "package" is sometimes used to refer to recipes. However, since
100the word "package" is used for the packaged output from the OpenEmbedded 100the word "package" is used for the packaged output from the OpenEmbedded
101build system (i.e. ``.ipk`` or ``.deb`` files), this document avoids 101build system (i.e. ``.ipk``, ``.deb`` or ``.rpm`` files), this document avoids
102using the term "package" when referring to recipes. 102using the term "package" when referring to recipes.
103 103
104Classes 104Classes
@@ -256,7 +256,7 @@ development environment.
256.. note:: 256.. note::
257 257
258 The 258 The
259 scripts/oe-setup-builddir 259 ``scripts/oe-setup-builddir``
260 script uses the 260 script uses the
261 ``$TEMPLATECONF`` 261 ``$TEMPLATECONF``
262 variable to determine which sample configuration files to locate. 262 variable to determine which sample configuration files to locate.
@@ -352,7 +352,7 @@ layers the build system uses to further control the build. These layers
352provide Metadata for the software, machine, and policies. 352provide Metadata for the software, machine, and policies.
353 353
354In general, there are three types of layer input. You can see them below 354In general, there are three types of layer input. You can see them below
355the "User Configuration" box in the `general workflow 355the "User Configuration" box in the :ref:`general workflow
356figure <overview-manual/concepts:openembedded build system concepts>`: 356figure <overview-manual/concepts:openembedded build system concepts>`:
357 357
358- *Metadata (.bb + Patches):* Software layers containing 358- *Metadata (.bb + Patches):* Software layers containing
@@ -420,14 +420,14 @@ build.
420Distro Layer 420Distro Layer
421~~~~~~~~~~~~ 421~~~~~~~~~~~~
422 422
423The distribution layer provides policy configurations for your 423A distribution layer provides policy configurations for your
424distribution. Best practices dictate that you isolate these types of 424distribution. Best practices dictate that you isolate these types of
425configurations into their own layer. Settings you provide in 425configurations into their own layer. Settings you provide in
426``conf/distro/distro.conf`` override similar settings that BitBake finds 426``conf/distro/distro.conf`` override similar settings that BitBake finds
427in your ``conf/local.conf`` file in the :term:`Build Directory`. 427in your ``conf/local.conf`` file in the :term:`Build Directory`.
428 428
429The following list provides some explanation and references for what you 429The following list provides some explanation and references for what you
430typically find in the distribution layer: 430typically find in a distribution layer:
431 431
432- *classes:* Class files (``.bbclass``) hold common functionality that 432- *classes:* Class files (``.bbclass``) hold common functionality that
433 can be shared among recipes in the distribution. When your recipes 433 can be shared among recipes in the distribution. When your recipes
@@ -454,7 +454,7 @@ typically find in the distribution layer:
454BSP Layer 454BSP Layer
455~~~~~~~~~ 455~~~~~~~~~
456 456
457The BSP Layer provides machine configurations that target specific 457A BSP layer provides machine configurations that target specific
458hardware. Everything in this layer is specific to the machine for which 458hardware. Everything in this layer is specific to the machine for which
459you are building the image or the SDK. A common structure or form is 459you are building the image or the SDK. A common structure or form is
460defined for BSP layers. You can learn more about this structure in the 460defined for BSP layers. You can learn more about this structure in the
@@ -465,7 +465,7 @@ defined for BSP layers. You can learn more about this structure in the
465 In order for a BSP layer to be considered compliant with the Yocto 465 In order for a BSP layer to be considered compliant with the Yocto
466 Project, it must meet some structural requirements. 466 Project, it must meet some structural requirements.
467 467
468The BSP Layer's configuration directory contains configuration files for 468A BSP layer's configuration directory contains configuration files for
469the machine (``conf/machine/machine.conf``) and, of course, the layer 469the machine (``conf/machine/machine.conf``) and, of course, the layer
470(``conf/layer.conf``). 470(``conf/layer.conf``).
471 471
@@ -477,18 +477,18 @@ formfactors, graphics support systems, and so forth.
477.. note:: 477.. note::
478 478
479 While the figure shows several 479 While the figure shows several
480 recipes-\* 480 ``recipes-*``
481 directories, not all these directories appear in all BSP layers. 481 directories, not all these directories appear in all BSP layers.
482 482
483Software Layer 483Software Layer
484~~~~~~~~~~~~~~ 484~~~~~~~~~~~~~~
485 485
486The software layer provides the Metadata for additional software 486A software layer provides the Metadata for additional software
487packages used during the build. This layer does not include Metadata 487packages used during the build. This layer does not include Metadata
488that is specific to the distribution or the machine, which are found in 488that is specific to the distribution or the machine, which are found in
489their respective layers. 489their respective layers.
490 490
491This layer contains any recipes, append files, and patches, that your 491This layer contains any recipes, append files, and patches that your
492project needs. 492project needs.
493 493
494Sources 494Sources
@@ -560,9 +560,8 @@ source tree used by the group).
560 560
561The canonical method through which to include a local project is to use the 561The canonical method through which to include a local project is to use the
562:ref:`ref-classes-externalsrc` class to include that local project. You use 562:ref:`ref-classes-externalsrc` class to include that local project. You use
563either the ``local.conf`` or a recipe's append file to override or set the 563either ``local.conf`` or a recipe's append file to override or set the
564recipe to point to the local directory on your disk to pull in the whole 564recipe to point to the local directory from which to fetch the source.
565source tree.
566 565
567Source Control Managers (Optional) 566Source Control Managers (Optional)
568~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 567~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -736,9 +735,6 @@ following list describe the :term:`Build Directory`'s hierarchy:
736 - :term:`PV`: The version of the 735 - :term:`PV`: The version of the
737 recipe used to build the package. 736 recipe used to build the package.
738 737
739 - :term:`PR`: The revision of the
740 recipe used to build the package.
741
742- :term:`S`: Contains the unpacked source 738- :term:`S`: Contains the unpacked source
743 files for a given recipe. 739 files for a given recipe.
744 740
@@ -912,11 +908,62 @@ the analysis and package splitting process use several areas:
912 execute on a system and it generates code for yet another machine 908 execute on a system and it generates code for yet another machine
913 (e.g. :ref:`ref-classes-cross-canadian` recipes). 909 (e.g. :ref:`ref-classes-cross-canadian` recipes).
914 910
915The :term:`FILES` variable defines the 911Packages for a recipe are listed in the :term:`PACKAGES` variable. The
916files that go into each package in 912:oe_git:`bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>`
917:term:`PACKAGES`. If you want 913configuration file defines the following default list of packages::
918details on how this is accomplished, you can look at 914
919:yocto_git:`package.bbclass </poky/tree/meta/classes-global/package.bbclass>`. 915 PACKAGES = "${PN}-src ${PN}-dbg ${PN}-staticdev ${PN}-dev ${PN}-doc ${PN}-locale ${PACKAGE_BEFORE_PN} ${PN}"
916
917Each of these packages contains a default list of files defined with the
918:term:`FILES` variable. For example, the package ``${PN}-dev`` represents files
919useful to the development of applications depending on ``${PN}``. The default
920list of files for ``${PN}-dev``, also defined in :oe_git:`bitbake.conf
921</openembedded-core/tree/meta/conf/bitbake.conf>`, is defined as follows::
922
923 FILES:${PN}-dev = "${includedir} ${FILES_SOLIBSDEV} ${libdir}/*.la \
924 ${libdir}/*.o ${libdir}/pkgconfig ${datadir}/pkgconfig \
925 ${datadir}/aclocal ${base_libdir}/*.o \
926 ${libdir}/${BPN}/*.la ${base_libdir}/*.la \
927 ${libdir}/cmake ${datadir}/cmake"
928
929The paths in this list must be *absolute* paths from the point of view of the
930root filesystem on the target, and must *not* make a reference to the variable
931:term:`D` or any :term:`WORKDIR` related variable. A correct example would be::
932
933 ${sysconfdir}/foo.conf
934
935.. note::
936
937 The list of files for a package is defined using the override syntax by
938 separating :term:`FILES` and the package name by a semi-colon (``:``).
939
940A given file can only ever be in one package. By iterating from the leftmost to
941rightmost package in :term:`PACKAGES`, each file matching one of the patterns
942defined in the corresponding :term:`FILES` definition is included in the
943package.
944
945.. note::
946
947 To find out which package installs a file, the ``oe-pkgdata-util``
948 command-line utility can be used::
949
950 $ oe-pkgdata-util find-path '/etc/fstab'
951 base-files: /etc/fstab
952
953 For more information on the ``oe-pkgdata-util`` utility, see the section
954 :ref:`dev-manual/debugging:Viewing Package Information with
955 ``oe-pkgdata-util``` of the Yocto Project Development Tasks Manual.
956
957To add a custom package variant of the ``${PN}`` recipe named
958``${PN}-extra`` (name is arbitrary), one can add it to the
959:term:`PACKAGE_BEFORE_PN` variable::
960
961 PACKAGE_BEFORE_PN += "${PN}-extra"
962
963Alternatively, a custom package can be added by adding it to the
964:term:`PACKAGES` variable using the prepend operator (``=+``)::
965
966 PACKAGES =+ "${PN}-extra"
920 967
921Depending on the type of packages being created (RPM, DEB, or IPK), the 968Depending on the type of packages being created (RPM, DEB, or IPK), the
922:ref:`do_package_write_* <ref-tasks-package_write_deb>` 969:ref:`do_package_write_* <ref-tasks-package_write_deb>`
@@ -2153,7 +2200,7 @@ require root privileges, the fact that some earlier steps ran in a fake
2153root environment does not cause problems. 2200root environment does not cause problems.
2154 2201
2155The capability to run tasks in a fake root environment is known as 2202The capability to run tasks in a fake root environment is known as
2156"`fakeroot <http://man.he.net/man1/fakeroot>`__", which is derived from 2203":manpage:`fakeroot <fakeroot(1)>`", which is derived from
2157the BitBake keyword/variable flag that requests a fake root environment 2204the BitBake keyword/variable flag that requests a fake root environment
2158for a task. 2205for a task.
2159 2206
diff --git a/documentation/overview-manual/yp-intro.rst b/documentation/overview-manual/yp-intro.rst
index 4a27e12e01..11e6d99e32 100644
--- a/documentation/overview-manual/yp-intro.rst
+++ b/documentation/overview-manual/yp-intro.rst
@@ -400,7 +400,7 @@ Yocto Project:
400 Autobuilder :doc:`here </test-manual/understand-autobuilder>`. 400 Autobuilder :doc:`here </test-manual/understand-autobuilder>`.
401 401
402- *Pseudo:* Pseudo is the Yocto Project implementation of 402- *Pseudo:* Pseudo is the Yocto Project implementation of
403 `fakeroot <http://man.he.net/man1/fakeroot>`__, which is used to run 403 :manpage:`fakeroot <fakeroot(1)>`, which is used to run
404 commands in an environment that seemingly has root privileges. 404 commands in an environment that seemingly has root privileges.
405 405
406 During a build, it can be necessary to perform operations that 406 During a build, it can be necessary to perform operations that
diff --git a/documentation/poky.yaml.in b/documentation/poky.yaml.in
index 0c04b615ea..9c03e9959b 100644
--- a/documentation/poky.yaml.in
+++ b/documentation/poky.yaml.in
@@ -1,41 +1,27 @@
1#
2# Macros used in the documentation
3#
4
5# The DISTRO variable represents the current docs version. It should be used
6# when referring to the current docs version. See also DISTRO_LATEST_TAG.
1DISTRO : "5.0" 7DISTRO : "5.0"
8# The DISTRO_LATEST_TAG represents the latest tag on the current branch. It
9# should be used in HTTP link referring to the current docs version. In these
10# cases, the DISTRO may point to A.B.999 which does not exist (just used to
11# represent the latest HEAD revision on the branch). DISTRO_LATEST_TAG should
12# always point to an existing tag.
13DISTRO_LATEST_TAG : "5.0"
2DISTRO_NAME_NO_CAP : "scarthgap" 14DISTRO_NAME_NO_CAP : "scarthgap"
3DISTRO_NAME : "Scarthgap" 15DISTRO_NAME : "Scarthgap"
4DISTRO_NAME_NO_CAP_MINUS_ONE : "nanbield" 16DISTRO_NAME_NO_CAP_MINUS_ONE : "nanbield"
5DISTRO_NAME_NO_CAP_LTS : "scarthgap" 17DISTRO_NAME_NO_CAP_LTS : "scarthgap"
6YOCTO_DOC_VERSION : "5.0" 18YOCTO_DOC_VERSION : "5.0"
7DISTRO_REL_TAG : "yocto-5.0" 19DISTRO_REL_TAG : "yocto-$DISTRO;"
20DISTRO_REL_LATEST_TAG : "yocto-&DISTRO_LATEST_TAG;"
8DOCCONF_VERSION : "dev" 21DOCCONF_VERSION : "dev"
9BITBAKE_SERIES : "" 22BITBAKE_SERIES : ""
10YOCTO_DL_URL : "https://downloads.yoctoproject.org" 23YOCTO_DL_URL : "https://downloads.yoctoproject.org"
11YOCTO_AB_URL : "https://autobuilder.yoctoproject.org"
12YOCTO_RELEASE_DL_URL : "&YOCTO_DL_URL;/releases/yocto/yocto-&DISTRO;" 24YOCTO_RELEASE_DL_URL : "&YOCTO_DL_URL;/releases/yocto/yocto-&DISTRO;"
13UBUNTU_HOST_PACKAGES_ESSENTIAL : "gawk wget git diffstat unzip texinfo gcc \
14 build-essential chrpath socat cpio python3 python3-pip python3-pexpect \
15 xz-utils debianutils iputils-ping python3-git python3-jinja2 \
16 python3-subunit zstd liblz4-tool file locales libacl1
17 \n\ $ sudo locale-gen en_US.UTF-8"
18FEDORA_HOST_PACKAGES_ESSENTIAL : "gawk make wget tar bzip2 gzip python3 unzip perl patch \
19 diffutils diffstat git cpp gcc gcc-c++ glibc-devel texinfo chrpath \
20 ccache perl-Data-Dumper perl-Text-ParseWords perl-Thread-Queue perl-bignum socat \
21 python3-pexpect findutils which file cpio python python3-pip xz python3-GitPython \
22 python3-jinja2 rpcgen perl-FindBin perl-File-Compare \
23 perl-File-Copy perl-locale zstd lz4 hostname glibc-langpack-en libacl"
24OPENSUSE_HOST_PACKAGES_ESSENTIAL : "python gcc gcc-c++ git chrpath make wget python-xml \
25 diffstat makeinfo python-curses patch socat python3 python3-curses tar python3-pip \
26 python3-pexpect xz which python3-Jinja2 rpcgen \
27 zstd lz4 bzip2 gzip hostname libacl1
28 \n\ $ sudo pip3 install GitPython"
29ALMALINUX_HOST_PACKAGES_ESSENTIAL : "-y epel-release
30 \n\ $ sudo yum install dnf-plugins-core
31 \n\ $ sudo dnf config-manager --set-enabled crb
32 \n\ $ sudo dnf makecache
33 \n\ $ sudo dnf install gawk make wget tar bzip2 gzip python3 unzip perl patch \
34 diffutils diffstat git cpp gcc gcc-c++ glibc-devel texinfo chrpath ccache \
35 socat perl-Data-Dumper perl-Text-ParseWords perl-Thread-Queue python3-pip \
36 python3-GitPython python3-jinja2 python3-pexpect xz which \
37 rpcgen zstd lz4 cpio glibc-langpack-en libacl"
38PIP3_HOST_PACKAGES_DOC : "$ sudo pip3 install sphinx sphinx_rtd_theme pyyaml"
39MIN_PYTHON_VERSION : "3.8.0" 25MIN_PYTHON_VERSION : "3.8.0"
40MIN_TAR_VERSION : "1.28" 26MIN_TAR_VERSION : "1.28"
41MIN_GIT_VERSION : "1.8.3.1" 27MIN_GIT_VERSION : "1.8.3.1"
@@ -47,3 +33,237 @@ MIN_DISK_SPACE : "90"
47MIN_DISK_SPACE_RM_WORK : "40" 33MIN_DISK_SPACE_RM_WORK : "40"
48# RAM (Gbytes) needed to generate qemux86-64 core-image-sato on Ubuntu 22.04 (x86-64) on a 4 core system 34# RAM (Gbytes) needed to generate qemux86-64 core-image-sato on Ubuntu 22.04 (x86-64) on a 4 core system
49MIN_RAM : "8" 35MIN_RAM : "8"
36
37#
38# Dependencies
39#
40
41# Shared between distros
42PIP3_HOST_PACKAGES_DOC: sphinx sphinx_rtd_theme pyyaml
43
44UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL: >-
45 build-essential
46 chrpath
47 cpio
48 debianutils
49 diffstat
50 file
51 gawk
52 gcc
53 git
54 iputils-ping
55 libacl1
56 liblz4-tool
57 locales
58 python3
59 python3-git
60 python3-jinja2
61 python3-pexpect
62 python3-pip
63 python3-subunit
64 socat
65 texinfo
66 unzip
67 wget
68 xz-utils
69 zstd
70
71UBUNTU_DEBIAN_HOST_PACKAGES_DOC: >-
72 git
73 librsvg2-bin
74 locales
75 make
76 python3-saneyaml
77 python3-sphinx-rtd-theme
78 sphinx
79
80UBUNTU_DEBIAN_HOST_PACKAGES_DOC_PDF: >-
81 fonts-freefont-otf
82 latexmk
83 tex-gyre
84 texlive-fonts-extra
85 texlive-fonts-recommended
86 texlive-lang-all
87 texlive-latex-extra
88 texlive-latex-recommended
89 texlive-xetex
90
91FEDORA_HOST_PACKAGES_ESSENTIAL: >-
92 bzip2
93 ccache
94 chrpath
95 cpio
96 cpp
97 diffstat
98 diffutils
99 file
100 findutils
101 gawk
102 gcc
103 gcc-c++
104 git
105 glibc-devel
106 glibc-langpack-en
107 gzip
108 hostname
109 libacl
110 lz4
111 make
112 patch
113 perl
114 perl-Data-Dumper
115 perl-File-Compare
116 perl-File-Copy
117 perl-FindBin
118 perl-Text-ParseWords
119 perl-Thread-Queue
120 perl-bignum
121 perl-locale
122 python
123 python3
124 python3-GitPython
125 python3-jinja2
126 python3-pexpect
127 python3-pip
128 rpcgen
129 socat
130 tar
131 texinfo
132 unzip
133 wget
134 which
135 xz
136 zstd
137
138FEDORA_HOST_PACKAGES_DOC: >-
139 git
140 glibc-locale-source
141 librsvg2-tools
142 make
143 python3-pip
144 which
145
146FEDORA_HOST_PACKAGES_DOC_PDF: >-
147 'texlive-collection-lang*'
148 latexmk
149 texlive-collection-fontsextra
150 texlive-collection-fontsrecommended
151 texlive-collection-latex
152 texlive-collection-latexextra
153 texlive-collection-latexrecommended
154 texlive-collection-xetex
155 texlive-fncychap
156 texlive-gnu-freefont
157 texlive-tex-gyre
158 texlive-xetex
159
160OPENSUSE_HOST_PACKAGES_ESSENTIAL: >-
161 bzip2
162 chrpath
163 diffstat
164 gcc
165 gcc-c++
166 git
167 gzip
168 hostname
169 libacl1
170 lz4
171 make
172 makeinfo
173 patch
174 python
175 python-curses
176 python-xml
177 python3
178 python3-Jinja2
179 python3-curses
180 python3-pexpect
181 python3-pip
182 rpcgen
183 socat
184 tar
185 wget
186 which
187 xz
188 zstd
189
190OPENSUSE_PIP3_HOST_PACKAGES_ESSENTIAL: GitPython
191
192OPENSUSE_HOST_PACKAGES_DOC: >-
193 git
194 glibc-i18ndata
195 make
196 python3-pip
197 rsvg-convert
198 which
199
200OPENSUSE_HOST_PACKAGES_DOC_PDF: >-
201 'texlive-collection-lang*'
202 texlive-collection-fontsextra
203 texlive-collection-fontsrecommended
204 texlive-collection-latex
205 texlive-collection-latexextra
206 texlive-collection-latexrecommended
207 texlive-collection-xetex
208 texlive-fncychap
209 texlive-gnu-freefont
210 texlive-latexmk
211 texlive-tex-gyre
212 texlive-xetex
213
214ALMALINUX_HOST_PACKAGES_ESSENTIAL: >-
215 bzip2
216 ccache
217 chrpath
218 cpio
219 cpp
220 diffstat
221 diffutils
222 gawk
223 gcc
224 gcc-c++
225 git
226 glibc-devel
227 glibc-langpack-en
228 gzip
229 libacl
230 lz4
231 make
232 patch
233 perl
234 perl-Data-Dumper
235 perl-Text-ParseWords
236 perl-Thread-Queue
237 python3
238 python3-GitPython
239 python3-jinja2
240 python3-pexpect
241 python3-pip
242 rpcgen
243 socat
244 tar
245 texinfo
246 unzip
247 wget
248 which
249 xz
250 zstd
251
252ALMALINUX_HOST_PACKAGES_DOC: >-
253 git
254 glibc-locale-source
255 librsvg2-tools
256 make
257 python3-pip
258 which
259
260ALMALINUX_HOST_PACKAGES_DOC_PDF: >-
261 latexmk
262 texlive-collection-fontsrecommended
263 texlive-collection-latex
264 texlive-collection-latexrecommended
265 texlive-collection-xetex
266 texlive-fncychap
267 texlive-gnu-freefont
268 texlive-tex-gyre
269 texlive-xetex
diff --git a/documentation/ref-manual/classes.rst b/documentation/ref-manual/classes.rst
index 9520d0bf7c..1d76b36d45 100644
--- a/documentation/ref-manual/classes.rst
+++ b/documentation/ref-manual/classes.rst
@@ -159,27 +159,38 @@ software that includes bash-completion data.
159``bin_package`` 159``bin_package``
160=============== 160===============
161 161
162The :ref:`ref-classes-bin-package` class is a helper class for recipes that extract the 162The :ref:`ref-classes-bin-package` class is a helper class for recipes, that
163contents of a binary package (e.g. an RPM) and install those contents 163disables the :ref:`ref-tasks-configure` and :ref:`ref-tasks-compile` tasks and
164rather than building the binary from source. The binary package is 164copies the content of the :term:`S` directory into the :term:`D` directory. This
165extracted and new packages in the configured output package format are 165is useful for installing binary packages (e.g. RPM packages) by passing the
166created. Extraction and installation of proprietary binaries is a good 166package in the :term:`SRC_URI` variable and inheriting this class.
167example use for this class.
168 167
169.. note:: 168For RPMs and other packages that do not contain a subdirectory, you should set
169the :term:`SRC_URI` option ``subdir`` to :term:`BP` so that the contents are
170extracted to the directory expected by the default value of :term:`S`. For
171example::
172
173 SRC_URI = "https://example.com/downloads/somepackage.rpm;subdir=${BP}"
174
175This class can also be used for tarballs. For example::
176
177 SRC_URI = "file://somepackage.tar.xz;subdir=${BP}"
178
179The :ref:`ref-classes-bin-package` class will copy the extracted content of the
180tarball from :term:`S` to :term:`D`.
170 181
171 For RPMs and other packages that do not contain a subdirectory, you 182This class assumes that the content of the package as installed in :term:`S`
172 should specify an appropriate fetcher parameter to point to the 183mirrors the expected layout once installed on the target, which is generally the
173 subdirectory. For example, if BitBake is using the Git fetcher (``git://``), 184case for binary packages. For example, an RPM package for a library would
174 the "subpath" parameter limits the checkout to a specific subpath 185usually contain the ``usr/lib`` directory, and should be extracted to
175 of the tree. Here is an example where ``${BP}`` is used so that the files 186``${S}/usr/lib/<library>.so.<version>`` to be installed in :term:`D` correctly.
176 are extracted into the subdirectory expected by the default value of
177 :term:`S`::
178 187
179 SRC_URI = "git://example.com/downloads/somepackage.rpm;branch=main;subpath=${BP}" 188.. note::
180 189
181 See the ":ref:`bitbake-user-manual/bitbake-user-manual-fetching:fetchers`" section in the BitBake User Manual for 190 The extraction of the package passed in :term:`SRC_URI` is not handled by the
182 more information on supported BitBake Fetchers. 191 :ref:`ref-classes-bin-package` class, but rather by the appropriate
192 :ref:`fetcher <bitbake-user-manual/bitbake-user-manual-fetching:fetchers>`
193 depending on the file extension.
183 194
184.. _ref-classes-binconfig: 195.. _ref-classes-binconfig:
185 196
@@ -552,7 +563,7 @@ You can also look for vulnerabilities in specific packages by passing
552``-c cve_check`` to BitBake. 563``-c cve_check`` to BitBake.
553 564
554After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve`` 565After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve``
555and image specific summaries in ``tmp/deploy/images/*.cve`` or ``tmp/deploy/images/*.json`` files. 566and image specific summaries in ``tmp/deploy/images/*.json`` files.
556 567
557When building, the CVE checker will emit build time warnings for any detected 568When building, the CVE checker will emit build time warnings for any detected
558issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component 569issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component
@@ -1461,12 +1472,8 @@ The tests you can list with the :term:`WARN_QA` and
1461- ``patch-fuzz:`` Checks for fuzz in patch files that may allow 1472- ``patch-fuzz:`` Checks for fuzz in patch files that may allow
1462 them to apply incorrectly if the underlying code changes. 1473 them to apply incorrectly if the underlying code changes.
1463 1474
1464- ``patch-status-core:`` Checks that the Upstream-Status is specified 1475- ``patch-status:`` Checks that the ``Upstream-Status`` is specified and valid
1465 and valid in the headers of patches for recipes in the OE-Core layer. 1476 in the headers of patches for recipes.
1466
1467- ``patch-status-noncore:`` Checks that the Upstream-Status is specified
1468 and valid in the headers of patches for recipes in layers other than
1469 OE-Core.
1470 1477
1471- ``perllocalpod:`` Checks for ``perllocal.pod`` being erroneously 1478- ``perllocalpod:`` Checks for ``perllocal.pod`` being erroneously
1472 installed and packaged by a recipe. 1479 installed and packaged by a recipe.
@@ -1986,7 +1993,8 @@ a couple different ways:
1986 Not using this naming convention can lead to subtle problems 1993 Not using this naming convention can lead to subtle problems
1987 caused by existing code that depends on that naming convention. 1994 caused by existing code that depends on that naming convention.
1988 1995
1989- Create or modify a target recipe that contains the following:: 1996- Or, create a :ref:`ref-classes-native` variant of any target recipe (e.g.
1997 ``myrecipe.bb``) by adding the following to the recipe::
1990 1998
1991 BBCLASSEXTEND = "native" 1999 BBCLASSEXTEND = "native"
1992 2000
@@ -2017,24 +2025,25 @@ couple different ways:
2017 inherit statement in the recipe after all other inherit statements so 2025 inherit statement in the recipe after all other inherit statements so
2018 that the :ref:`ref-classes-nativesdk` class is inherited last. 2026 that the :ref:`ref-classes-nativesdk` class is inherited last.
2019 2027
2020- Create a :ref:`ref-classes-nativesdk` variant of any recipe by adding the following:: 2028 .. note::
2021 2029
2022 BBCLASSEXTEND = "nativesdk" 2030 When creating a recipe, you must follow this naming convention::
2023 2031
2024 Inside the 2032 nativesdk-myrecipe.bb
2025 recipe, use ``:class-nativesdk`` and ``:class-target`` overrides to
2026 specify any functionality specific to the respective SDK machine or
2027 target case.
2028 2033
2029.. note::
2030 2034
2031 When creating a recipe, you must follow this naming convention:: 2035 Not doing so can lead to subtle problems because there is code that
2036 depends on the naming convention.
2032 2037
2033 nativesdk-myrecipe.bb 2038- Or, create a :ref:`ref-classes-nativesdk` variant of any target recipe (e.g.
2039 ``myrecipe.bb``) by adding the following to the recipe::
2034 2040
2041 BBCLASSEXTEND = "nativesdk"
2035 2042
2036 Not doing so can lead to subtle problems because there is code that 2043 Inside the
2037 depends on the naming convention. 2044 recipe, use ``:class-nativesdk`` and ``:class-target`` overrides to
2045 specify any functionality specific to the respective SDK machine or
2046 target case.
2038 2047
2039Although applied differently, the :ref:`ref-classes-nativesdk` class is used with both 2048Although applied differently, the :ref:`ref-classes-nativesdk` class is used with both
2040methods. The advantage of the second method is that you do not need to 2049methods. The advantage of the second method is that you do not need to
@@ -2608,7 +2617,7 @@ runtime tests for recipes that build software that provides these tests.
2608This class is intended to be inherited by individual recipes. However, 2617This class is intended to be inherited by individual recipes. However,
2609the class' functionality is largely disabled unless "ptest" appears in 2618the class' functionality is largely disabled unless "ptest" appears in
2610:term:`DISTRO_FEATURES`. See the 2619:term:`DISTRO_FEATURES`. See the
2611":ref:`dev-manual/packages:testing packages with ptest`" 2620":ref:`test-manual/ptest:testing packages with ptest`"
2612section in the Yocto Project Development Tasks Manual for more information 2621section in the Yocto Project Development Tasks Manual for more information
2613on ptest. 2622on ptest.
2614 2623
@@ -2632,7 +2641,7 @@ Enables package tests (ptests) specifically for GNOME packages, which
2632have tests intended to be executed with ``gnome-desktop-testing``. 2641have tests intended to be executed with ``gnome-desktop-testing``.
2633 2642
2634For information on setting up and running ptests, see the 2643For information on setting up and running ptests, see the
2635":ref:`dev-manual/packages:testing packages with ptest`" 2644":ref:`test-manual/ptest:testing packages with ptest`"
2636section in the Yocto Project Development Tasks Manual. 2645section in the Yocto Project Development Tasks Manual.
2637 2646
2638.. _ref-classes-python3-dir: 2647.. _ref-classes-python3-dir:
@@ -3205,8 +3214,8 @@ after it is built, you can set :term:`TESTIMAGE_AUTO`::
3205 TESTIMAGE_AUTO = "1" 3214 TESTIMAGE_AUTO = "1"
3206 3215
3207For information on how to enable, run, and create new tests, see the 3216For information on how to enable, run, and create new tests, see the
3208":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 3217":ref:`test-manual/runtime-testing:performing automated runtime testing`"
3209section in the Yocto Project Development Tasks Manual. 3218section in the Yocto Project Test Environment Manual.
3210 3219
3211.. _ref-classes-testsdk: 3220.. _ref-classes-testsdk:
3212 3221
diff --git a/documentation/ref-manual/devtool-reference.rst b/documentation/ref-manual/devtool-reference.rst
index 9319addc3c..2db2adde95 100644
--- a/documentation/ref-manual/devtool-reference.rst
+++ b/documentation/ref-manual/devtool-reference.rst
@@ -24,7 +24,7 @@ The ``devtool`` command line is organized similarly to Git in that it
24has a number of sub-commands for each function. You can run 24has a number of sub-commands for each function. You can run
25``devtool --help`` to see all the commands:: 25``devtool --help`` to see all the commands::
26 26
27 $ devtool -h 27 $ devtool --help
28 NOTE: Starting bitbake server... 28 NOTE: Starting bitbake server...
29 usage: devtool [--basepath BASEPATH] [--bbpath BBPATH] [-d] [-q] [--color COLOR] [-h] <subcommand> ... 29 usage: devtool [--basepath BASEPATH] [--bbpath BBPATH] [-d] [-q] [--color COLOR] [-h] <subcommand> ...
30 30
@@ -50,6 +50,7 @@ has a number of sub-commands for each function. You can run
50 search Search available recipes 50 search Search available recipes
51 Working on a recipe in the workspace: 51 Working on a recipe in the workspace:
52 build Build a recipe 52 build Build a recipe
53 ide-sdk Setup the SDK and configure the IDE
53 rename Rename a recipe file in the workspace 54 rename Rename a recipe file in the workspace
54 edit-recipe Edit a recipe file 55 edit-recipe Edit a recipe file
55 find-recipe Find a recipe file 56 find-recipe Find a recipe file
@@ -63,17 +64,11 @@ has a number of sub-commands for each function. You can run
63 build-image Build image including workspace recipe packages 64 build-image Build image including workspace recipe packages
64 Advanced: 65 Advanced:
65 create-workspace Set up workspace in an alternative location 66 create-workspace Set up workspace in an alternative location
67 import Import exported tar archive into workspace
68 export Export workspace into a tar archive
66 extract Extract the source for an existing recipe 69 extract Extract the source for an existing recipe
67 sync Synchronize the source tree for an existing recipe 70 sync Synchronize the source tree for an existing recipe
68 menuconfig Alter build-time configuration for a recipe 71 menuconfig Alter build-time configuration for a recipe
69 import Import exported tar archive into workspace
70 export Export workspace into a tar archive
71 other:
72 selftest-reverse Reverse value (for selftest)
73 pluginfile Print the filename of this plugin
74 bbdir Print the BBPATH directory of this plugin
75 count How many times have this plugin been registered.
76 multiloaded How many times have this plugin been initialized
77 Use devtool <subcommand> --help to get help on a specific command 72 Use devtool <subcommand> --help to get help on a specific command
78 73
79As directed in the general help output, you can 74As directed in the general help output, you can
@@ -82,8 +77,8 @@ using ``--help``::
82 77
83 $ devtool add --help 78 $ devtool add --help
84 NOTE: Starting bitbake server... 79 NOTE: Starting bitbake server...
85 usage: devtool add [-h] [--same-dir | --no-same-dir] [--fetch URI] [--npm-dev] [--version VERSION] [--no-git] [--srcrev SRCREV | --autorev] [--srcbranch SRCBRANCH] [--binary] [--also-native] [--src-subdir SUBDIR] [--mirrors] 80 usage: devtool add [-h] [--same-dir | --no-same-dir] [--fetch URI] [--npm-dev] [--no-pypi] [--version VERSION] [--no-git] [--srcrev SRCREV | --autorev]
86 [--provides PROVIDES] 81 [--srcbranch SRCBRANCH] [--binary] [--also-native] [--src-subdir SUBDIR] [--mirrors] [--provides PROVIDES]
87 [recipename] [srctree] [fetchuri] 82 [recipename] [srctree] [fetchuri]
88 83
89 Adds a new recipe to the workspace to build a specified source tree. Can optionally fetch a remote URI and unpack it to create the source tree. 84 Adds a new recipe to the workspace to build a specified source tree. Can optionally fetch a remote URI and unpack it to create the source tree.
@@ -99,6 +94,7 @@ using ``--help``::
99 --no-same-dir Force build in a separate build directory 94 --no-same-dir Force build in a separate build directory
100 --fetch URI, -f URI Fetch the specified URI and extract it to create the source tree (deprecated - pass as positional argument instead) 95 --fetch URI, -f URI Fetch the specified URI and extract it to create the source tree (deprecated - pass as positional argument instead)
101 --npm-dev For npm, also fetch devDependencies 96 --npm-dev For npm, also fetch devDependencies
97 --no-pypi Do not inherit pypi class
102 --version VERSION, -V VERSION 98 --version VERSION, -V VERSION
103 Version to use within recipe (PV) 99 Version to use within recipe (PV)
104 --no-git, -g If fetching source, do not set up source tree as a git repository 100 --no-git, -g If fetching source, do not set up source tree as a git repository
@@ -439,7 +435,7 @@ You can read more on the ``devtool upgrade`` workflow in the
439":ref:`sdk-manual/extensible:use \`\`devtool upgrade\`\` to create a version of the recipe that supports a newer version of the software`" 435":ref:`sdk-manual/extensible:use \`\`devtool upgrade\`\` to create a version of the recipe that supports a newer version of the software`"
440section in the Yocto Project Application Development and the Extensible 436section in the Yocto Project Application Development and the Extensible
441Software Development Kit (eSDK) manual. You can also see an example of 437Software Development Kit (eSDK) manual. You can also see an example of
442how to use ``devtool upgrade`` in the ":ref:`dev-manual/upgrading-recipes:using \`\`devtool upgrade\`\``" 438how to use ``devtool upgrade`` in the ":ref:`dev-manual/upgrading-recipes:using ``devtool upgrade```"
443section in the Yocto Project Development Tasks Manual. 439section in the Yocto Project Development Tasks Manual.
444 440
445.. _devtool-resetting-a-recipe: 441.. _devtool-resetting-a-recipe:
@@ -467,6 +463,20 @@ Here is an example that resets the workspace directory that contains the
467 NOTE: Leaving source tree /home/scottrif/poky/build/workspace/sources/mtr as-is; if you no longer need it then please delete it manually 463 NOTE: Leaving source tree /home/scottrif/poky/build/workspace/sources/mtr as-is; if you no longer need it then please delete it manually
468 $ 464 $
469 465
466.. _devtool-finish-working-on-a-recipe:
467
468Finish Working on a Recipe
469==========================
470
471Use the ``devtool finish`` command to push any committed changes to the
472specified recipe in the specified layer and remove it from your workspace.
473
474This is roughly equivalent to the ``devtool update-recipe`` command followed by
475the ``devtool reset`` command. The changes must have been committed to the git
476repository created by ``devtool``. Here is an example::
477
478 $ devtool finish recipe /path/to/custom/layer
479
470.. _devtool-building-your-recipe: 480.. _devtool-building-your-recipe:
471 481
472Building Your Recipe 482Building Your Recipe
@@ -543,6 +553,26 @@ the packages are already on the target. Consequently, when a runtime
543call is made in the application for a dependent function (e.g. a library 553call is made in the application for a dependent function (e.g. a library
544call), the function cannot be found. 554call), the function cannot be found.
545 555
556.. warning::
557
558 Runtime dependencies can be explicitly listed in the :term:`RDEPENDS`
559 variable, but may also be the result of a :term:`DEPENDS` assignment in your
560 application's recipe. This is usually the case when your application depends
561 on libraries for compilation: these libraries are listed as build-time
562 dependencies in the :term:`DEPENDS` variable in your application's recipe.
563 However these may also be runtime dependencies if they install shared objects
564 on which your application will dynamically link to at runtime (e.g. shared
565 libraries ending with ``.so``).
566
567 These runtime dependencies are automatically resolved by the
568 :term:`OpenEmbedded Build System` during the packaging phase. Since
569 ``devtool`` ignores packaging dependencies, they will not be installed
570 automatically with ``devtool deploy-target``.
571
572 For more information on how the :term:`OpenEmbedded Build System` handles
573 packaging, see the :ref:`overview-manual/concepts:Automatically Added Runtime
574 Dependencies` section of the Yocto Project Overview and Concepts Manual.
575
546To be sure you have all the dependencies local to the target, you need 576To be sure you have all the dependencies local to the target, you need
547to be sure that the packages are pre-deployed (installed) on the target 577to be sure that the packages are pre-deployed (installed) on the target
548before attempting to run your application. 578before attempting to run your application.
@@ -618,3 +648,43 @@ a match.
618 648
619When you use the ``devtool search`` command, you must supply a keyword. 649When you use the ``devtool search`` command, you must supply a keyword.
620The command uses the keyword when searching for a match. 650The command uses the keyword when searching for a match.
651
652Alternatively, the ``devtool find-recipe`` command can be used to search for
653recipe files instead of recipe names. Likewise, you must supply a keyword.
654
655.. _devtool-get-the-configure-script-help:
656
657Get Information on Recipe Configuration Scripts
658===============================================
659
660Use the ``devtool configure-help`` command to get help on the configuration
661script options for a given recipe. You must supply the recipe name to the
662command. For example, it shows the output of ``./configure --help`` for
663:ref:`autotools <ref-classes-autotools>`-based recipes.
664
665The ``configure-help`` command will also display the configuration options
666currently in use, including the ones passed through the :term:`EXTRA_OECONF`
667variable.
668
669.. _devtool-generate-an-ide-configuration-for-a-recipe:
670
671Generate an IDE Configuration for a Recipe
672==========================================
673
674The ``devtool ide-sdk`` automatically creates an IDE configuration and SDK to
675work on a given recipe. Depending on the ``--mode`` parameter, different types
676of SDKs are generated:
677
678- ``modified`` mode: this creates an SDK and generates an IDE configuration in
679 the workspace directory.
680
681- ``shared`` mode: this creates a cross-compiling toolchain and the
682 corresponding shared sysroot directories of the supplied recipe(s).
683
684The ``--target`` option can be used to specify a ``username@hostname`` string
685and create a remote debugging configuration for the recipe. Similarly to
686``devtool deploy-target``, it requires an SSH server running on the target.
687
688For further details on the ``devtool ide-sdk`` command, see the
689":doc:`/sdk-manual/extensible`" chapter in the Yocto Project Application
690Development and the Extensible Software Development Kit (eSDK) manual.
diff --git a/documentation/ref-manual/faq.rst b/documentation/ref-manual/faq.rst
index bab284bbfd..7dd37c7a5c 100644
--- a/documentation/ref-manual/faq.rst
+++ b/documentation/ref-manual/faq.rst
@@ -45,6 +45,28 @@ See :yocto_wiki:`Products that use the Yocto Project
45Wiki. Don't hesitate to contribute to this page if you know other such 45Wiki. Don't hesitate to contribute to this page if you know other such
46products. 46products.
47 47
48Why isn't systemd the default init system for OpenEmbedded-Core/Yocto Project or in Poky?
49-----------------------------------------------------------------------------------------
50
51`systemd <https://systemd.io/>`__ is a desktop Linux init system with a specific
52focus that is not entirely aligned with a customisable "embedded" build
53system/environment.
54
55It understandably mandates certain layouts and configurations which may
56or may not align with what the objectives and direction :term:`OpenEmbedded-Core
57(OE-Core)` or Yocto Project want to take. It doesn't support all of our targets.
58For example `musl <https://www.musl-libc.org/>`__ support in systemd is
59problematic.
60
61If it were our default, we would have to align with all their choices
62and this doesn't make sense. It is therefore a configuration option and
63available to anyone where the design goals align. But we are clear it
64is not the only way to handle init.
65
66Our automated testing includes it through the ``poky-altcfg`` :term:`DISTRO` and
67we don't really need it to be the default: it is tested, it works, and people
68can choose to use it.
69
48Building environment 70Building environment
49==================== 71====================
50 72
@@ -259,6 +281,25 @@ Within the :term:`Build Directory`, is the ``tmp`` directory. To remove all the
259build output yet preserve any source code or downloaded files from 281build output yet preserve any source code or downloaded files from
260previous builds, simply remove the ``tmp`` directory. 282previous builds, simply remove the ``tmp`` directory.
261 283
284Why isn't there a way to append bbclass files like bbappend for recipes?
285------------------------------------------------------------------------
286
287The Yocto Project has consciously chosen not to implement such functionality.
288Class code is designed to be shared and reused, and exposes some level of
289configuration to its users. We want to encourage people to share these changes
290so we can build the best classes.
291
292If the ``append`` functionality was available for classes, our evidence and
293experience suggest that people would create their custom changes in their
294layer instead of sharing and discussing the issues and/or limitations they
295encountered. This would lead to bizarre class interactions when new layers are
296included. We therefore consciously choose to have a natural pressure to share
297class code improvements or fixes.
298
299There are also technical considerations like which recipes a class append would
300apply to and how that would fit within the layer model. These are complications
301we think we can live without!
302
262Customizing generated images 303Customizing generated images
263============================ 304============================
264 305
diff --git a/documentation/ref-manual/features.rst b/documentation/ref-manual/features.rst
index b2ba731bb2..5574ecafe2 100644
--- a/documentation/ref-manual/features.rst
+++ b/documentation/ref-manual/features.rst
@@ -12,7 +12,7 @@ Features provide a mechanism for working out which packages should be
12included in the generated images. Distributions can select which 12included in the generated images. Distributions can select which
13features they want to support through the :term:`DISTRO_FEATURES` variable, 13features they want to support through the :term:`DISTRO_FEATURES` variable,
14which is set or appended to in a distribution's configuration file such 14which is set or appended to in a distribution's configuration file such
15as ``poky.conf``, ``poky-tiny.conf``, ``poky-lsb.conf`` and so forth. 15as ``poky.conf``, ``poky-tiny.conf``, ``poky-altcfg.conf`` and so forth.
16Machine features are set in the :term:`MACHINE_FEATURES` variable, which is 16Machine features are set in the :term:`MACHINE_FEATURES` variable, which is
17set in the machine configuration file and specifies the hardware 17set in the machine configuration file and specifies the hardware
18features for a given machine. 18features for a given machine.
@@ -207,7 +207,7 @@ metadata, as extra layers can define their own:
207 207
208- *ptest:* Enables building the package tests where supported by 208- *ptest:* Enables building the package tests where supported by
209 individual recipes. For more information on package tests, see the 209 individual recipes. For more information on package tests, see the
210 ":ref:`dev-manual/packages:testing packages with ptest`" section 210 ":ref:`test-manual/ptest:testing packages with ptest`" section
211 in the Yocto Project Development Tasks Manual. 211 in the Yocto Project Development Tasks Manual.
212 212
213- *pulseaudio:* Include support for 213- *pulseaudio:* Include support for
diff --git a/documentation/ref-manual/images.rst b/documentation/ref-manual/images.rst
index c45f9104a9..c9d8989261 100644
--- a/documentation/ref-manual/images.rst
+++ b/documentation/ref-manual/images.rst
@@ -51,27 +51,6 @@ Here is a list of supported recipes:
51- ``core-image-full-cmdline``: A console-only image with more 51- ``core-image-full-cmdline``: A console-only image with more
52 full-featured Linux system functionality installed. 52 full-featured Linux system functionality installed.
53 53
54- ``core-image-lsb``: An image that conforms to the Linux Standard Base
55 (LSB) specification. This image requires a distribution configuration
56 that enables LSB compliance (e.g. ``poky-lsb``). If you build
57 ``core-image-lsb`` without that configuration, the image will not be
58 LSB-compliant.
59
60- ``core-image-lsb-dev``: A ``core-image-lsb`` image that is suitable
61 for development work using the host. The image includes headers and
62 libraries you can use in a host development environment. This image
63 requires a distribution configuration that enables LSB compliance
64 (e.g. ``poky-lsb``). If you build ``core-image-lsb-dev`` without that
65 configuration, the image will not be LSB-compliant.
66
67- ``core-image-lsb-sdk``: A ``core-image-lsb`` that includes everything
68 in the cross-toolchain but also includes development headers and
69 libraries to form a complete standalone SDK. This image requires a
70 distribution configuration that enables LSB compliance (e.g.
71 ``poky-lsb``). If you build ``core-image-lsb-sdk`` without that
72 configuration, the image will not be LSB-compliant. This image is
73 suitable for development using the target.
74
75- ``core-image-minimal``: A small image just capable of allowing a 54- ``core-image-minimal``: A small image just capable of allowing a
76 device to boot. 55 device to boot.
77 56
@@ -119,8 +98,8 @@ Here is a list of supported recipes:
119 deployed to a separate partition so that you can boot into it and use 98 deployed to a separate partition so that you can boot into it and use
120 it to deploy a second image to be tested. You can find more 99 it to deploy a second image to be tested. You can find more
121 information about runtime testing in the 100 information about runtime testing in the
122 ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 101 ":ref:`test-manual/runtime-testing:performing automated runtime testing`"
123 section in the Yocto Project Development Tasks Manual. 102 section in the Yocto Project Test Environment Manual.
124 103
125- ``core-image-testmaster-initramfs``: A RAM-based Initial Root 104- ``core-image-testmaster-initramfs``: A RAM-based Initial Root
126 Filesystem (:term:`Initramfs`) image tailored for use with the 105 Filesystem (:term:`Initramfs`) image tailored for use with the
diff --git a/documentation/ref-manual/qa-checks.rst b/documentation/ref-manual/qa-checks.rst
index 53b1836e74..27d46de3fd 100644
--- a/documentation/ref-manual/qa-checks.rst
+++ b/documentation/ref-manual/qa-checks.rst
@@ -752,21 +752,17 @@ Errors and Warnings
752 752
753.. _qa-check-patch-status: 753.. _qa-check-patch-status:
754 754
755- ``Missing Upstream-Status in patch <patchfile> Please add according to <url> [patch-status-core/patch-status-noncore]`` 755- ``Missing Upstream-Status in patch <patchfile> Please add according to <url> [patch-status]``
756 756
757 The ``Upstream-Status`` value is missing in the specified patch file's header. 757 The ``Upstream-Status`` value is missing in the specified patch file's header.
758 This value is intended to track whether or not the patch has been sent 758 This value is intended to track whether or not the patch has been sent
759 upstream, whether or not it has been merged, etc. 759 upstream, whether or not it has been merged, etc.
760 760
761 There are two options for this same check - ``patch-status-core`` (for
762 recipes in OE-Core) and ``patch-status-noncore`` (for recipes in any other
763 layer).
764
765 For more information, see the 761 For more information, see the
766 ":ref:`contributor-guide/recipe-style-guide:patch upstream status`" 762 ":ref:`contributor-guide/recipe-style-guide:patch upstream status`"
767 section in the Yocto Project and OpenEmbedded Contributor Guide. 763 section in the Yocto Project and OpenEmbedded Contributor Guide.
768 764
769- ``Malformed Upstream-Status in patch <patchfile> Please correct according to <url> [patch-status-core/patch-status-noncore]`` 765- ``Malformed Upstream-Status in patch <patchfile> Please correct according to <url> [patch-status]``
770 766
771 The ``Upstream-Status`` value in the specified patch file's header is invalid - 767 The ``Upstream-Status`` value in the specified patch file's header is invalid -
772 it must be a specific format. See the "Missing Upstream-Status" entry above 768 it must be a specific format. See the "Missing Upstream-Status" entry above
@@ -795,7 +791,7 @@ Errors and Warnings
795 791
796 This check will detect if the source of the package contains some 792 This check will detect if the source of the package contains some
797 upstream-provided tests and, if so, that ptests are implemented for this 793 upstream-provided tests and, if so, that ptests are implemented for this
798 recipe. See the ":ref:`dev-manual/packages:testing packages with ptest`" 794 recipe. See the ":ref:`test-manual/ptest:testing packages with ptest`"
799 section in the Yocto Project Development Tasks Manual. See also the 795 section in the Yocto Project Development Tasks Manual. See also the
800 ":ref:`ref-classes-ptest`" section. 796 ":ref:`ref-classes-ptest`" section.
801 797
diff --git a/documentation/ref-manual/release-process.rst b/documentation/ref-manual/release-process.rst
index 920794679d..639921b9f6 100644
--- a/documentation/ref-manual/release-process.rst
+++ b/documentation/ref-manual/release-process.rst
@@ -103,17 +103,22 @@ have reached their End of Life (EOL) won't receive such updates.
103 103
104This started with version 3.1 ("Dunfell"), released in April 2020, which 104This started with version 3.1 ("Dunfell"), released in April 2020, which
105the project initially committed to supporting for two years, but this duration 105the project initially committed to supporting for two years, but this duration
106was later extended to four years. Similarly, the following :term:`LTS` release, 106was later extended to four years.
107version 4.0 ("Kirkstone"), was released two years later in May 2022 and the
108project committed to supporting it for four years too.
109 107
110Therefore, a new :term:`LTS` release is made every two years and is supported 108A new :term:`LTS` release is made every two years and is supported for four
111for four years. This offers more stability to project users and leaves more 109years. This offers more stability to project users and leaves more time to
112time to upgrade to the following :term:`LTS` release. 110upgrade to the following :term:`LTS` release.
111
112The currently supported :term:`LTS` releases are:
113
114- Version 5.0 ("Scarthgap"), released in April 2024 and supported until April 2028.
115- Version 4.0 ("Kirkstone"), released in May 2022 and supported until May 2026.
113 116
114See :yocto_wiki:`/Stable_Release_and_LTS` for details about the management 117See :yocto_wiki:`/Stable_Release_and_LTS` for details about the management
115of stable and :term:`LTS` releases. 118of stable and :term:`LTS` releases.
116 119
120This documentation was built for the &DISTRO_NAME; release.
121
117.. image:: svg/releases.* 122.. image:: svg/releases.*
118 :width: 100% 123 :width: 100%
119 124
@@ -143,8 +148,8 @@ Additionally, because the test strategies are visible to you as a
143developer, you can validate your projects. This section overviews the 148developer, you can validate your projects. This section overviews the
144available test infrastructure used in the Yocto Project. For information 149available test infrastructure used in the Yocto Project. For information
145on how to run available tests on your projects, see the 150on how to run available tests on your projects, see the
146":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 151":ref:`test-manual/runtime-testing:performing automated runtime testing`"
147section in the Yocto Project Development Tasks Manual. 152section in the Yocto Project Test Environment Manual.
148 153
149The QA/testing infrastructure is woven into the project to the point 154The QA/testing infrastructure is woven into the project to the point
150where core developers take some of it for granted. The infrastructure 155where core developers take some of it for granted. The infrastructure
@@ -170,7 +175,7 @@ consists of the following pieces:
170 operation and functions. However, the test can also use the IP 175 operation and functions. However, the test can also use the IP
171 address of a machine to test. 176 address of a machine to test.
172 177
173- :ref:`ptest <dev-manual/packages:testing packages with ptest>`: 178- :ref:`ptest <test-manual/ptest:testing packages with ptest>`:
174 Runs tests against packages produced during the build for a given 179 Runs tests against packages produced during the build for a given
175 piece of software. The test allows the packages to be run within a 180 piece of software. The test allows the packages to be run within a
176 target image. 181 target image.
@@ -185,7 +190,7 @@ effort has been made to automate the tests so that more people can use
185them and the Yocto Project development team can run them faster and more 190them and the Yocto Project development team can run them faster and more
186efficiently. 191efficiently.
187 192
188The Yocto Project's main Autobuilder (&YOCTO_AB_URL;) publicly tests each Yocto 193The Yocto Project's main :yocto_ab:`Autobuilder <>` publicly tests each Yocto
189Project release's code in the :oe_git:`openembedded-core </openembedded-core>`, 194Project release's code in the :oe_git:`openembedded-core </openembedded-core>`,
190:yocto_git:`poky </poky>` and :oe_git:`bitbake </bitbake>` repositories. The 195:yocto_git:`poky </poky>` and :oe_git:`bitbake </bitbake>` repositories. The
191testing occurs for both the current state of the "master" branch and also for 196testing occurs for both the current state of the "master" branch and also for
diff --git a/documentation/ref-manual/structure.rst b/documentation/ref-manual/structure.rst
index e4d8b54bb9..2190f5b90e 100644
--- a/documentation/ref-manual/structure.rst
+++ b/documentation/ref-manual/structure.rst
@@ -335,6 +335,15 @@ Once the build process gets the sample file, it uses ``sed`` to substitute final
335 version of the ``bblayers.conf.sample`` file in the ``meta-poky/conf/templates/default`` 335 version of the ``bblayers.conf.sample`` file in the ``meta-poky/conf/templates/default``
336 directory. 336 directory.
337 337
338.. _structure-build-conf-bblock.conf:
339
340``build/conf/bblock.conf``
341--------------------------
342
343This configuration file is generated by :doc:`bblock </dev-manual/bblock>` and
344contains the signatures locked by ``bblock``. By default, it does not exist
345and will be created upon the first invocation of ``bblock``.
346
338.. _structure-build-downloads: 347.. _structure-build-downloads:
339 348
340``build/downloads/`` 349``build/downloads/``
@@ -484,6 +493,30 @@ the ":ref:`sdk-manual/appendix-obtain:building an sdk installer`"
484section in the Yocto Project Application Development and the Extensible 493section in the Yocto Project Application Development and the Extensible
485Software Development Kit (eSDK) manual. 494Software Development Kit (eSDK) manual.
486 495
496.. _structure-build-tmp-hosttools:
497
498``build/tmp/hosttools/``
499~~~~~~~~~~~~~~~~~~~~~~~~
500
501The OpenEmbedded build system uses this directory to create symbolic links to
502some of the host components that are allowed to be called within tasks. These
503are basic components listed in the :ref:`ref-manual/system-requirements:required
504packages for the build host` section. These components are also listed in the
505:term:`HOSTTOOLS` variable and are limited to this list to prevent host
506contamination.
507
508.. _structure-build-tmp-pkgdata:
509
510``build/tmp/pkgdata/``
511~~~~~~~~~~~~~~~~~~~~~~
512
513The OpenEmbedded build system uses this directory to store package metadata
514generated during the :ref:`ref-tasks-packagedata` task. The files stored in this
515directory contain information about each output package produced by the
516OpenEmbedded build system, and are used in different ways by the build system
517such as ":ref:`dev-manual/debugging:viewing package information with
518``oe-pkgdata-util```".
519
487.. _structure-build-tmp-sstate-control: 520.. _structure-build-tmp-sstate-control:
488 521
489``build/tmp/sstate-control/`` 522``build/tmp/sstate-control/``
@@ -657,8 +690,15 @@ Here are key subdirectories within each recipe work directory:
657 690
658For efficiency, the OpenEmbedded build system creates and uses this 691For efficiency, the OpenEmbedded build system creates and uses this
659directory to hold recipes that share a work directory with other 692directory to hold recipes that share a work directory with other
660recipes. In practice, this is only used for ``gcc`` and its variants 693recipes. This is for example used for ``gcc`` and its variants (e.g.
661(e.g. ``gcc-cross``, ``libgcc``, ``gcc-runtime``, and so forth). 694``gcc-cross``, ``libgcc``, ``gcc-runtime``, and so forth), or by the
695:ref:`ref-classes-kernel` class to make the kernel source code and kernel build
696artifacts available to out-of-tree kernel modules or other kernel-dependent
697recipes.
698
699In practice, only a few recipes make use of the ``work-shared`` directory. This
700directory is especially useful for recipes that would induce a lot of storage
701space if they were to be shared with the standard :term:`Sysroot` mechanism.
662 702
663.. _structure-meta: 703.. _structure-meta:
664 704
diff --git a/documentation/ref-manual/svg/releases.svg b/documentation/ref-manual/svg/releases.svg
index 036aa467cc..3a379078b8 100644
--- a/documentation/ref-manual/svg/releases.svg
+++ b/documentation/ref-manual/svg/releases.svg
@@ -2,11 +2,14 @@
2<svg 2<svg
3 version="1.1" 3 version="1.1"
4 id="svg2" 4 id="svg2"
5 width="2040.0006" 5 width="1992.7236"
6 height="669.30511" 6 height="613.35602"
7 viewBox="0 0 2040.0006 669.30509" 7 viewBox="0 0 1992.7236 613.35599"
8 sodipodi:docname="releases.svg" 8 sodipodi:docname="releases.svg"
9 inkscape:version="1.1.2 (0a00cf5339, 2022-02-04)" 9 inkscape:version="1.4.1 (93de688d07, 2025-03-30)"
10 inkscape:export-filename="../../../../../../../../tmp/releases.png"
11 inkscape:export-xdpi="96"
12 inkscape:export-ydpi="96"
10 xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" 13 xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
11 xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" 14 xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
12 xmlns="http://www.w3.org/2000/svg" 15 xmlns="http://www.w3.org/2000/svg"
@@ -24,29 +27,29 @@
24 <dc:format>image/svg+xml</dc:format> 27 <dc:format>image/svg+xml</dc:format>
25 <dc:type 28 <dc:type
26 rdf:resource="http://purl.org/dc/dcmitype/StillImage" /> 29 rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
27 <cc:license
28 rdf:resource="http://artlibre.org/licence/lal" />
29 <dc:title>Yocto Project Release Timeline</dc:title> 30 <dc:title>Yocto Project Release Timeline</dc:title>
30 <dc:creator> 31 <dc:creator>
31 <cc:Agent> 32 <cc:Agent>
32 <dc:title>The Yocto Project</dc:title> 33 <dc:title>The Yocto Project</dc:title>
33 </cc:Agent> 34 </cc:Agent>
34 </dc:creator> 35 </dc:creator>
36 <cc:license
37 rdf:resource="http://artlibre.org/licence/lal" />
35 </cc:Work> 38 </cc:Work>
36 <cc:License 39 <cc:License
37 rdf:about="http://creativecommons.org/licenses/by-sa/4.0/"> 40 rdf:about="http://artlibre.org/licence/lal">
38 <cc:permits 41 <cc:permits
39 rdf:resource="http://creativecommons.org/ns#Reproduction" /> 42 rdf:resource="http://creativecommons.org/ns#Reproduction" />
40 <cc:permits 43 <cc:permits
41 rdf:resource="http://creativecommons.org/ns#Distribution" /> 44 rdf:resource="http://creativecommons.org/ns#Distribution" />
42 <cc:requires
43 rdf:resource="http://creativecommons.org/ns#Notice" />
44 <cc:requires
45 rdf:resource="http://creativecommons.org/ns#Attribution" />
46 <cc:permits 45 <cc:permits
47 rdf:resource="http://creativecommons.org/ns#DerivativeWorks" /> 46 rdf:resource="http://creativecommons.org/ns#DerivativeWorks" />
48 <cc:requires 47 <cc:requires
49 rdf:resource="http://creativecommons.org/ns#ShareAlike" /> 48 rdf:resource="http://creativecommons.org/ns#ShareAlike" />
49 <cc:requires
50 rdf:resource="http://creativecommons.org/ns#Notice" />
51 <cc:requires
52 rdf:resource="http://creativecommons.org/ns#Attribution" />
50 </cc:License> 53 </cc:License>
51 </rdf:RDF> 54 </rdf:RDF>
52 </metadata> 55 </metadata>
@@ -66,7 +69,8 @@
66 miter_limit="4" 69 miter_limit="4"
67 scale_width="1" 70 scale_width="1"
68 end_linecap_type="zerowidth" 71 end_linecap_type="zerowidth"
69 not_jump="false" /> 72 not_jump="false"
73 message="" />
70 <marker 74 <marker
71 style="overflow:visible" 75 style="overflow:visible"
72 id="marker5783" 76 id="marker5783"
@@ -404,15 +408,15 @@
404 guidetolerance="10" 408 guidetolerance="10"
405 inkscape:pageopacity="0" 409 inkscape:pageopacity="0"
406 inkscape:pageshadow="2" 410 inkscape:pageshadow="2"
407 inkscape:window-width="1920" 411 inkscape:window-width="3826"
408 inkscape:window-height="1043" 412 inkscape:window-height="2069"
409 id="namedview4" 413 id="namedview4"
410 showgrid="true" 414 showgrid="true"
411 inkscape:zoom="1.4472045" 415 inkscape:zoom="1.5536106"
412 inkscape:cx="987.76641" 416 inkscape:cx="1158.2696"
413 inkscape:cy="357.93145" 417 inkscape:cy="273.55632"
414 inkscape:window-x="1728" 418 inkscape:window-x="2256"
415 inkscape:window-y="0" 419 inkscape:window-y="60"
416 inkscape:window-maximized="1" 420 inkscape:window-maximized="1"
417 inkscape:current-layer="g10" 421 inkscape:current-layer="g10"
418 inkscape:document-rotation="0" 422 inkscape:document-rotation="0"
@@ -422,94 +426,109 @@
422 fit-margin-left="30" 426 fit-margin-left="30"
423 fit-margin-right="30" 427 fit-margin-right="30"
424 fit-margin-bottom="30" 428 fit-margin-bottom="30"
425 inkscape:pagecheckerboard="0"> 429 inkscape:pagecheckerboard="0"
430 inkscape:showpageshadow="2"
431 inkscape:deskcolor="#d1d1d1"
432 showguides="true">
426 <inkscape:grid 433 <inkscape:grid
427 type="xygrid" 434 type="xygrid"
428 id="grid1257" 435 id="grid1257"
429 originx="-289.99936" 436 originx="-289.06071"
430 originy="369.99998" /> 437 originy="478.43017"
438 spacingy="1"
439 spacingx="1"
440 units="px"
441 visible="true" />
431 </sodipodi:namedview> 442 </sodipodi:namedview>
432 <g 443 <g
433 inkscape:groupmode="layer" 444 inkscape:groupmode="layer"
434 inkscape:label="Image" 445 inkscape:label="Image"
435 id="g10" 446 id="g10"
436 transform="translate(-289.99936,370.00003)"> 447 transform="translate(-289.06072,478.43022)">
437 <path 448 <rect
438 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 449 style="fill:#333333;fill-opacity:0;stroke:#000000;stroke-width:0.713896;stroke-linejoin:bevel;stroke-miterlimit:0;stroke-opacity:0"
439 d="m 1080,220.00003 v -515.00007 0 0" 450 id="rect1"
451 width="1992.0098"
452 height="612.64215"
453 x="289.41766"
454 y="-478.07327"
455 ry="24.97636" />
456 <path
457 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
458 d="m 563.40434,64.000628 v -524.414808 0 0"
440 id="path207708" /> 459 id="path207708" />
441 <path 460 <path
442 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 461 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
443 d="m 1200,220.00003 v -515.00007 0 0" 462 d="m 683.40434,64.000628 v -524.414808 0 0"
444 id="path207708-4" /> 463 id="path207708-4" />
445 <path 464 <path
446 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 465 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
447 d="m 1320,220.00003 v -515.00007 0 0" 466 d="m 803.40434,64.000628 v -524.414808 0 0"
448 id="path207708-4-3" /> 467 id="path207708-4-3" />
449 <path 468 <path
450 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 469 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
451 d="m 1440,219.99998 v -515.00002 0 0" 470 d="m 923.40434,64.000577 v -524.414757 0 0"
452 id="path207708-4-3-6" /> 471 id="path207708-4-3-6" />
453 <path 472 <path
454 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 473 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
455 d="m 1560,219.99998 v -515.00001 0 0" 474 d="m 1043.4043,64.000577 v -524.414757 0 0"
456 id="path207708-4-3-6-2" /> 475 id="path207708-4-3-6-2" />
457 <path 476 <path
458 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 477 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
459 d="m 1680,219.99998 v -515.00002 0 0" 478 d="m 1163.4043,64.000577 v -524.414757 0 0"
460 id="path207708-4-3-6-2-8" /> 479 id="path207708-4-3-6-2-8" />
461 <path 480 <path
462 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 481 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
463 d="m 1800,219.99998 v -515.00002 0 0" 482 d="m 1283.4043,64.000577 v -524.414757 0 0"
464 id="path207708-4-3-6-2-8-4" /> 483 id="path207708-4-3-6-2-8-4" />
465 <path 484 <path
466 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 485 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
467 d="m 1920,219.99998 v -515.00002 0 0" 486 d="m 1403.4043,64.000577 v -524.414757 0 0"
468 id="path207708-4-3-6-2-8-4-3" /> 487 id="path207708-4-3-6-2-8-4-3" />
469 <path 488 <path
470 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 489 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.475347;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
471 d="m 2040,219.99997 v -460.00002 0 0" 490 d="m 1523.4043,64.000568 v -415.757648 0 0"
472 id="path207708-4-3-6-2-8-4-3-8" /> 491 id="path207708-4-3-6-2-8-4-3-8" />
473 <path 492 <path
474 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 493 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
475 d="m 2040,219.99998 v -515.00002 0 0" 494 d="m 1523.4043,64.000577 v -524.414757 0 0"
476 id="path207708-4-3-6-2-8-4-3-8-0" /> 495 id="path207708-4-3-6-2-8-4-3-8-0" />
477 <path 496 <path
478 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 497 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
479 d="m 2159.954,219.99997 v -514.99999 0 0" 498 d="m 1643.3583,64.000565 v -524.414715 0 0"
480 id="path207708-4-3-6-2-8-4-3-8-4" /> 499 id="path207708-4-3-6-2-8-4-3-8-4" />
481 <path 500 <path
482 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 501 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
483 d="m 2280,219.99997 v -514.99999 0 0" 502 d="m 1763.4043,64.000565 v -524.414715 0 0"
484 id="path207708-4-3-6-2-8-4-3-8-4-0" /> 503 id="path207708-4-3-6-2-8-4-3-8-4-0" />
485 <path 504 <path
486 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 505 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
487 d="m 960,220.00003 v -515.00007 0 0" 506 d="m 1883.7877,64.878769 v -524.414709 0 0"
488 id="path207708-9" /> 507 id="path207708-4-3-6-2-8-4-3-8-4-0-8" />
489 <path 508 <path
490 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 509 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
491 d="m 840,220.00001 v -375 0 0" 510 d="m 2002.9599,64.984489 v -524.414709 0 0"
492 id="path207708-9-6" /> 511 id="path207708-4-3-6-2-8-4-3-8-4-0-8-8" />
493 <path 512 <path
494 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 513 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
495 d="m 840,220.00002 v -515.00004 0 0" 514 d="m 2123.2232,62.984489 v -524.414709 0 0"
496 id="path207708-9-6-2" /> 515 id="path207708-4-3-6-2-8-4-3-8-4-0-8-8-1" />
497 <path 516 <path
498 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 517 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
499 d="m 720,220.00003 v -515.00007 0 0" 518 d="m 2243.313,63.984489 v -524.414709 0 0"
500 id="path207708-9-6-2-5" /> 519 id="path207708-4-3-6-2-8-4-3-8-4-0-8-8-1-9" />
501 <path 520 <path
502 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 521 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
503 d="m 600,220.00003 v -515.00007 0 0" 522 d="m 443.40434,64.000628 v -524.414808 0 0"
504 id="path207708-9-6-2-5-9" /> 523 id="path207708-9" />
505 <path 524 <path
506 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 525 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
507 d="m 480,220.00003 v -515.00007 0 0" 526 d="m 323.40434,64.000608 v -375.000008 0 0"
508 id="path207708-9-6-2-5-9-0" /> 527 id="path207708-9-6" />
509 <path 528 <path
510 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.5;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 529 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.50455;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
511 d="m 360,220.00003 v -515.00007 0 0" 530 d="m 323.40434,64.000616 v -524.414766 0 0"
512 id="path207708-9-6-2-5-9-0-5" /> 531 id="path207708-9-6-2" />
513 <text 532 <text
514 xml:space="preserve" 533 xml:space="preserve"
515 style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 534 style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
@@ -541,186 +560,152 @@
541 x="-59.575905" 560 x="-59.575905"
542 y="580.05695" /></text> 561 y="580.05695" /></text>
543 <rect 562 <rect
544 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 563 style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
545 id="rect917-0-0" 564 id="rect917-0-0-4-4-9-4"
546 width="980" 565 width="160.00002"
547 height="45.000004" 566 height="45.000004"
548 x="360" 567 x="443.40427"
549 y="154.99997" 568 y="-55.999405"
550 ry="2.2558987" /> 569 ry="2.2558987" />
551 <text 570 <text
552 xml:space="preserve" 571 xml:space="preserve"
553 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 572 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
554 x="420.52835" 573 x="491.89841"
555 y="174.12433" 574 y="-36.604408"
556 id="text1185-3-55-4"><tspan 575 id="text1185-3-55-4-0-0-0"><tspan
557 sodipodi:role="line" 576 sodipodi:role="line"
558 x="420.52835" 577 x="491.89841"
559 y="174.12433" 578 y="-36.604408"
560 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 579 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
561 id="tspan957-2-8">Dunfell (LTS)</tspan><tspan 580 id="tspan957-2-8-6-3-9">Langdale</tspan><tspan
562 sodipodi:role="line" 581 sodipodi:role="line"
563 x="420.52835" 582 x="491.89841"
564 y="192.121" 583 y="-18.607729"
565 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 584 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
566 id="tspan10317">3.1</tspan></text> 585 id="tspan10317-2-9-1">4.1</tspan></text>
567 <rect 586 <rect
568 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 587 style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
569 id="rect917-0-0-4" 588 id="rect917-0-0-4-4-9-4-5"
570 width="140.00002" 589 width="140.00003"
571 height="45.000004" 590 height="45.000004"
572 x="480" 591 x="583.40436"
573 y="99.999969" 592 y="-110.99944"
574 ry="2.2558987" /> 593 ry="2.2558987" />
575 <text 594 <text
576 xml:space="preserve" 595 xml:space="preserve"
577 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 596 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
578 x="534.10651" 597 x="639.46136"
579 y="118.94971" 598 y="-91.498215"
580 id="text1185-3-55-4-0"><tspan 599 id="text1185-3-55-4-0-0-0-1"><tspan
581 sodipodi:role="line" 600 sodipodi:role="line"
582 x="534.10651" 601 x="639.46136"
583 y="118.94971" 602 y="-91.498215"
584 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 603 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
585 id="tspan957-2-8-6">Gatesgarth</tspan><tspan 604 id="tspan957-2-8-6-3-9-7">Mickledore</tspan><tspan
586 sodipodi:role="line" 605 sodipodi:role="line"
587 x="534.10651" 606 x="639.46136"
588 y="136.94638" 607 y="-73.501534"
589 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 608 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
590 id="tspan10317-2">3.2</tspan></text> 609 id="tspan10317-2-9-1-4">4.2</tspan></text>
591 <rect
592 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
593 id="rect917-0-0-4-4"
594 width="260"
595 height="45.000004"
596 x="599.99994"
597 y="45.000011"
598 ry="2.2558987" />
599 <rect 610 <rect
600 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 611 style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
601 id="rect917-0-0-4-4-9" 612 id="rect917-0-0-4-4-9-4-5-3-9-2-3-6"
602 width="160.00002" 613 width="140"
603 height="45.000004" 614 height="45.000004"
604 x="720" 615 x="923.65302"
605 y="-9.9999905" 616 y="-275.19217"
606 ry="2.2558987" /> 617 ry="2.2558987" />
607 <text 618 <text
608 xml:space="preserve" 619 xml:space="preserve"
609 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 620 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
610 x="766.10297" 621 x="970.63739"
611 y="9.57586" 622 y="-256.32867"
612 id="text1185-3-55-4-0-0"><tspan 623 id="text1185-3-55-4-0-0-0-1-1-6-4"><tspan
613 sodipodi:role="line" 624 sodipodi:role="line"
614 x="766.10297" 625 x="970.63739"
615 y="9.57586" 626 y="-256.32867"
616 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 627 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
617 id="tspan957-2-8-6-3">Honister</tspan><tspan 628 id="tspan957-2-8-6-3-9-7-4-2-0">Styhead</tspan><tspan
618 sodipodi:role="line" 629 sodipodi:role="line"
619 x="766.10297" 630 x="970.63739"
620 y="27.57254" 631 y="-238.332"
621 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 632 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
622 id="tspan10317-2-9">3.4</tspan></text> 633 id="tspan10317-2-9-1-4-6-5-6">5.1</tspan></text>
623 <rect 634 <rect
624 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 635 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
625 id="rect917-0-0-4-4-9-4" 636 id="rect917-0-0-4-4-9-4-5-3-9-2-3-6-2"
626 width="160.00002" 637 width="140"
627 height="45.000004" 638 height="45.000004"
628 x="959.99994" 639 x="1043.4697"
629 y="-120" 640 y="-328.48172"
630 ry="2.2558987" /> 641 ry="2.2558987" />
631 <text 642 <text
632 xml:space="preserve" 643 xml:space="preserve"
633 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 644 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
634 x="1008.4941" 645 x="1090.4542"
635 y="-100.605" 646 y="-309.61823"
636 id="text1185-3-55-4-0-0-0"><tspan 647 id="text1185-3-55-4-0-0-0-1-1-6-4-7"><tspan
637 sodipodi:role="line" 648 sodipodi:role="line"
638 x="1008.4941" 649 x="1090.4542"
639 y="-100.605" 650 y="-309.61823"
640 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 651 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
641 id="tspan957-2-8-6-3-9">Langdale</tspan><tspan 652 id="tspan957-2-8-6-3-9-7-4-2-0-0">Walnascar</tspan><tspan
642 sodipodi:role="line" 653 sodipodi:role="line"
643 x="1008.4941" 654 x="1090.4542"
644 y="-82.608322" 655 y="-291.62155"
645 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 656 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
646 id="tspan10317-2-9-1">4.1</tspan></text> 657 id="tspan10317-2-9-1-4-6-5-6-9">5.2</tspan></text>
647 <rect 658 <rect
648 style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 659 style="opacity:0.75;fill:#251f32;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
649 id="rect917-0-0-4-4-9-4-5" 660 id="rect917-0-0-4-4-9-4-5-3-9-2-3-67"
650 width="140.00003" 661 width="140"
651 height="45.000004" 662 height="45.000004"
652 x="1100" 663 x="1163.6425"
653 y="-175.00003" 664 y="-382.27469"
654 ry="2.2558987" /> 665 ry="2.2558987" />
655 <text 666 <text
656 xml:space="preserve" 667 xml:space="preserve"
657 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 668 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
658 x="1156.057" 669 x="1214.9716"
659 y="-155.49881" 670 y="-363.89413"
660 id="text1185-3-55-4-0-0-0-1"><tspan 671 id="text1185-3-55-4-0-0-0-1-1-6-4-3-53"><tspan
661 sodipodi:role="line" 672 sodipodi:role="line"
662 x="1156.057" 673 x="1214.9716"
663 y="-155.49881" 674 y="-363.89413"
664 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 675 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
665 id="tspan957-2-8-6-3-9-7">Mickledore</tspan><tspan 676 id="tspan957-2-8-6-3-9-7-4-2-0-5-5">Whinlatter</tspan><tspan
666 sodipodi:role="line" 677 sodipodi:role="line"
667 x="1156.057" 678 x="1214.9716"
668 y="-137.50214" 679 y="-345.89746"
669 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 680 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
670 id="tspan10317-2-9-1-4">4.2</tspan></text> 681 id="tspan10317-2-9-1-4-6-5-6-6-6">5.3</tspan></text>
671 <g
672 id="g1258">
673 <rect
674 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
675 id="rect917-0-0-4-4-9-4-5-38"
676 width="120.00002"
677 height="45.000004"
678 x="1220"
679 y="-230.00005"
680 ry="2.2558987" />
681 <text
682 xml:space="preserve"
683 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
684 x="1269.2329"
685 y="-210.32925"
686 id="text1185-3-55-4-0-0-0-1-1"><tspan
687 sodipodi:role="line"
688 x="1269.2329"
689 y="-210.32925"
690 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
691 id="tspan957-2-8-6-3-9-7-4">Nanbield</tspan><tspan
692 sodipodi:role="line"
693 x="1269.2329"
694 y="-192.33258"
695 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
696 id="tspan10317-2-9-1-4-6">4.3</tspan></text>
697 </g>
698 <rect 682 <rect
699 style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 683 style="opacity:0.75;fill:#251f32;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:5.29752;stroke-opacity:1"
700 id="rect917-0-0-4-4-9-4-5-3-9-2" 684 id="rect917-0-0-4-4-9-4-5-3-9-2-3-67-6"
701 width="140" 685 width="982.23163"
702 height="45.000004" 686 height="45.000004"
703 x="1440" 687 x="1283.7023"
704 y="-340.00003" 688 y="-436.77539"
705 ry="2.2558987" /> 689 ry="2.2558987" />
706 <text 690 <text
707 xml:space="preserve" 691 xml:space="preserve"
708 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 692 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
709 x="1487.233" 693 x="1335.1118"
710 y="-320.32928" 694 y="-418.39484"
711 id="text1185-3-55-4-0-0-0-1-1-6-4"><tspan 695 id="text1185-3-55-4-0-0-0-1-1-6-4-3-53-0"><tspan
712 sodipodi:role="line" 696 sodipodi:role="line"
713 x="1487.233" 697 x="1335.1118"
714 y="-320.32928" 698 y="-418.39484"
715 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 699 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
716 id="tspan957-2-8-6-3-9-7-4-2-0">Styhead</tspan><tspan 700 id="tspan957-2-8-6-3-9-7-4-2-0-5-5-6">Wrynose</tspan><tspan
717 sodipodi:role="line" 701 sodipodi:role="line"
718 x="1487.233" 702 x="1335.1118"
719 y="-302.33261" 703 y="-400.39816"
720 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 704 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
721 id="tspan10317-2-9-1-4-6-5-6">5.1</tspan></text> 705 id="tspan10317-2-9-1-4-6-5-6-6-6-2">6.0</tspan></text>
722 <g 706 <g
723 id="g1591"> 707 id="g1591"
708 transform="translate(-516.59566,64.000598)">
724 <rect 709 <rect
725 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 710 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
726 id="rect917-0-0-4-4-9-9" 711 id="rect917-0-0-4-4-9-9"
@@ -749,42 +734,26 @@
749 <path 734 <path
750 id="rect917-0-0-4-4-9-9-9" 735 id="rect917-0-0-4-4-9-9-9"
751 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1" 736 style="fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2;stroke-opacity:1"
752 d="m 1322.3015,-285.00003 c -1.2753,0 -2.302,1.00609 -2.302,2.25586 v 40.48828 c 0,1.24977 1.0267,2.25586 2.302,2.25586 h 975.0412 c 1.2754,0 2.302,-1.00609 2.302,-2.25586 v -40.48828 c 0,-1.24977 -1.0266,-2.25586 -2.302,-2.25586 z" /> 737 d="m 805.70584,-220.99944 c -1.2753,0 -2.302,1.00609 -2.302,2.25586 v 40.48828 c 0,1.24977 1.0267,2.25586 2.302,2.25586 H 1780.747 c 1.2754,0 2.302,-1.00609 2.302,-2.25586 v -40.48828 c 0,-1.24977 -1.0266,-2.25586 -2.302,-2.25586 z" />
753 <text 738 <text
754 xml:space="preserve" 739 xml:space="preserve"
755 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 740 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
756 x="1390.4988" 741 x="873.90314"
757 y="-265.64832" 742 y="-201.64772"
758 id="text1185-3-55-4-0-0-9-0"><tspan 743 id="text1185-3-55-4-0-0-9-0"><tspan
759 sodipodi:role="line" 744 sodipodi:role="line"
760 x="1390.4988" 745 x="873.90314"
761 y="-265.64832" 746 y="-201.64772"
762 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 747 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
763 id="tspan957-2-8-6-3-6-8">Scarthgap (LTS)</tspan><tspan 748 id="tspan957-2-8-6-3-6-8">Scarthgap (LTS)</tspan><tspan
764 sodipodi:role="line" 749 sodipodi:role="line"
765 x="1390.4988" 750 x="873.90314"
766 y="-247.65164" 751 y="-183.65105"
767 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none" 752 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
768 id="tspan10317-2-9-0-1">5.0</tspan></text> 753 id="tspan10317-2-9-0-1">5.0</tspan></text>
769 <text
770 xml:space="preserve"
771 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
772 x="653.72168"
773 y="64.866302"
774 id="text1185-3-55-4-0-0-7"><tspan
775 sodipodi:role="line"
776 x="653.72168"
777 y="64.866302"
778 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
779 id="tspan957-2-8-6-3-2">Hardknott </tspan><tspan
780 sodipodi:role="line"
781 x="653.72168"
782 y="82.862984"
783 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
784 id="tspan10317-2-9-8">3.3</tspan></text>
785 <g 754 <g
786 id="g1125-0" 755 id="g1125-0"
787 transform="matrix(0.42240595,0,0,0.41654472,354.53445,-399.96314)" 756 transform="matrix(0.42240595,0,0,0.41654472,330.77064,-497.11721)"
788 style="stroke:none;stroke-width:2.38399"> 757 style="stroke:none;stroke-width:2.38399">
789 <rect 758 <rect
790 style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:4.76797;stroke-opacity:1" 759 style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:4.76797;stroke-opacity:1"
@@ -873,234 +842,149 @@
873 <text 842 <text
874 xml:space="preserve" 843 xml:space="preserve"
875 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 844 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
876 x="1199.6055" 845 x="683.00983"
877 y="250.21216" 846 y="94.212761"
878 id="text1185-9-7-1-1"><tspan 847 id="text1185-9-7-1-1"><tspan
879 sodipodi:role="line" 848 sodipodi:role="line"
880 x="1199.6055" 849 x="683.00983"
881 y="250.21216" 850 y="94.212761"
882 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 851 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
883 id="tspan31345">Oct.</tspan><tspan 852 id="tspan31345">Oct.</tspan><tspan
884 sodipodi:role="line" 853 sodipodi:role="line"
885 x="1199.6055" 854 x="683.00983"
886 y="268.20883" 855 y="112.20944"
887 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 856 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
888 id="tspan49906">2023</tspan></text> 857 id="tspan49906">2023</tspan></text>
889 <text 858 <text
890 xml:space="preserve" 859 xml:space="preserve"
891 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 860 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
892 x="1439.3904" 861 x="922.79474"
893 y="249.86044" 862 y="93.861046"
894 id="text1185-9-7-1-1-89"><tspan 863 id="text1185-9-7-1-1-89"><tspan
895 sodipodi:role="line" 864 sodipodi:role="line"
896 x="1439.3904" 865 x="922.79474"
897 y="249.86044" 866 y="93.861046"
898 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 867 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
899 id="tspan31345-7">Oct.</tspan><tspan 868 id="tspan31345-7">Oct.</tspan><tspan
900 sodipodi:role="line" 869 sodipodi:role="line"
901 x="1439.3904" 870 x="922.79474"
902 y="267.85712" 871 y="111.85773"
903 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 872 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
904 id="tspan49906-76">2024</tspan></text> 873 id="tspan49906-76">2024</tspan></text>
905 <text 874 <text
906 xml:space="preserve" 875 xml:space="preserve"
907 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 876 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
908 x="1679.3094" 877 x="1162.7139"
909 y="250.58356" 878 y="94.58416"
910 id="text1185-9-7-1-1-89-6"><tspan 879 id="text1185-9-7-1-1-89-6"><tspan
911 sodipodi:role="line" 880 sodipodi:role="line"
912 x="1679.3094" 881 x="1162.7139"
913 y="250.58356" 882 y="94.58416"
914 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 883 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
915 id="tspan31345-7-8">Oct.</tspan><tspan 884 id="tspan31345-7-8">Oct.</tspan><tspan
916 sodipodi:role="line" 885 sodipodi:role="line"
917 x="1679.3094" 886 x="1162.7139"
918 y="268.58023" 887 y="112.58084"
919 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 888 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
920 id="tspan49906-76-0">2025</tspan></text> 889 id="tspan49906-76-0">2025</tspan></text>
921 <text 890 <text
922 xml:space="preserve" 891 xml:space="preserve"
923 style="font-weight:bold;font-size:6.66667px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
924 x="849.49744"
925 y="61.106953"
926 id="text1185-9-7-1-1-0"><tspan
927 sodipodi:role="line"
928 x="849.49744"
929 y="61.106953"
930 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none"
931 id="tspan46212">Support for this version was extended to leave</tspan><tspan
932 sodipodi:role="line"
933 x="849.49744"
934 y="70.105324"
935 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none"
936 id="tspan120364">users more time to adapt to override syntax</tspan><tspan
937 sodipodi:role="line"
938 x="849.49744"
939 y="79.103691"
940 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:6.66667px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:end;text-anchor:end;fill:#fffefe;fill-opacity:1;stroke:none"
941 id="tspan123280">changes in the 3.4 release.</tspan></text>
942 <text
943 xml:space="preserve"
944 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 892 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
945 x="959.52008" 893 x="442.92441"
946 y="250.67822" 894 y="94.678825"
947 id="text1185-9-7-1-1-0-7"><tspan 895 id="text1185-9-7-1-1-0-7"><tspan
948 sodipodi:role="line" 896 sodipodi:role="line"
949 x="959.52008" 897 x="442.92441"
950 y="250.67822" 898 y="94.678825"
951 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 899 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
952 id="tspan31345-42-7">Oct.</tspan><tspan 900 id="tspan31345-42-7">Oct.</tspan><tspan
953 sodipodi:role="line" 901 sodipodi:role="line"
954 x="959.52008" 902 x="442.92441"
955 y="268.6749" 903 y="112.67551"
956 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 904 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
957 id="tspan49906-9-6">2022</tspan></text> 905 id="tspan49906-9-6">2022</tspan></text>
958 <text 906 <text
959 xml:space="preserve" 907 xml:space="preserve"
960 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 908 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
961 x="719.13617" 909 x="324.32913"
962 y="250.21216" 910 y="94.076042"
963 id="text1185-9-7-1-1-2"><tspan
964 sodipodi:role="line"
965 x="719.13617"
966 y="250.21216"
967 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
968 id="tspan31345-1">Oct.</tspan><tspan
969 sodipodi:role="line"
970 x="719.13617"
971 y="268.20883"
972 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
973 id="tspan49906-5">2021</tspan></text>
974 <text
975 xml:space="preserve"
976 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
977 x="478.82367"
978 y="250.21216"
979 id="text1185-9-7-1-1-80"><tspan
980 sodipodi:role="line"
981 x="478.82367"
982 y="250.21216"
983 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
984 id="tspan31345-5">Oct.</tspan><tspan
985 sodipodi:role="line"
986 x="478.82367"
987 y="268.20883"
988 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
989 id="tspan49906-6">2020</tspan></text>
990 <text
991 xml:space="preserve"
992 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
993 x="361.81961"
994 y="250.07544"
995 id="text1185-9-7-1-1-8"><tspan
996 sodipodi:role="line"
997 x="361.81961"
998 y="250.07544"
999 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1000 id="tspan31345-4">Apr.</tspan><tspan
1001 sodipodi:role="line"
1002 x="361.81961"
1003 y="268.07211"
1004 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1005 id="tspan49906-7">2020</tspan></text>
1006 <text
1007 xml:space="preserve"
1008 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1009 x="840.9248"
1010 y="250.07544"
1011 id="text1185-9-7-1-1-8-1"><tspan 911 id="text1185-9-7-1-1-8-1"><tspan
1012 sodipodi:role="line" 912 sodipodi:role="line"
1013 x="840.9248" 913 x="324.32913"
1014 y="250.07544" 914 y="94.076042"
1015 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 915 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1016 id="tspan31345-4-0">Apr</tspan><tspan 916 id="tspan31345-4-0">Apr</tspan><tspan
1017 sodipodi:role="line" 917 sodipodi:role="line"
1018 x="840.9248" 918 x="324.32913"
1019 y="268.07211" 919 y="112.07272"
1020 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 920 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1021 id="tspan49906-7-3">2022</tspan></text> 921 id="tspan49906-7-3">2022</tspan></text>
1022 <text 922 <text
1023 xml:space="preserve" 923 xml:space="preserve"
1024 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 924 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1025 x="1321.8608" 925 x="805.2652"
1026 y="250.07544" 926 y="94.076042"
1027 id="text1185-9-7-1-1-8-1-0"><tspan 927 id="text1185-9-7-1-1-8-1-0"><tspan
1028 sodipodi:role="line" 928 sodipodi:role="line"
1029 x="1321.8608" 929 x="805.2652"
1030 y="250.07544" 930 y="94.076042"
1031 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 931 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1032 id="tspan31345-4-0-4">Apr.</tspan><tspan 932 id="tspan31345-4-0-4">Apr.</tspan><tspan
1033 sodipodi:role="line" 933 sodipodi:role="line"
1034 x="1321.8608" 934 x="805.2652"
1035 y="268.07211" 935 y="112.07272"
1036 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 936 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1037 id="tspan49906-7-3-8">2024</tspan></text> 937 id="tspan49906-7-3-8">2024</tspan></text>
1038 <text 938 <text
1039 xml:space="preserve" 939 xml:space="preserve"
1040 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 940 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1041 x="1561.8163" 941 x="1045.2207"
1042 y="249.66977" 942 y="93.670372"
1043 id="text1185-9-7-1-1-8-1-0-4"><tspan 943 id="text1185-9-7-1-1-8-1-0-4"><tspan
1044 sodipodi:role="line" 944 sodipodi:role="line"
1045 x="1561.8163" 945 x="1045.2207"
1046 y="249.66977" 946 y="93.670372"
1047 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 947 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1048 id="tspan31345-4-0-4-81">Apr.</tspan><tspan 948 id="tspan31345-4-0-4-81">Apr.</tspan><tspan
1049 sodipodi:role="line" 949 sodipodi:role="line"
1050 x="1561.8163" 950 x="1045.2207"
1051 y="267.66644" 951 y="111.66705"
1052 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 952 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1053 id="tspan49906-7-3-8-2">2025</tspan></text> 953 id="tspan49906-7-3-8-2">2025</tspan></text>
1054 <text 954 <text
1055 xml:space="preserve" 955 xml:space="preserve"
1056 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 956 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1057 x="1802.1477" 957 x="1285.5521"
1058 y="250.26334" 958 y="94.263939"
1059 id="text1185-9-7-1-1-8-1-0-4-2"><tspan 959 id="text1185-9-7-1-1-8-1-0-4-2"><tspan
1060 sodipodi:role="line" 960 sodipodi:role="line"
1061 x="1802.1477" 961 x="1285.5521"
1062 y="250.26334" 962 y="94.263939"
1063 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 963 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1064 id="tspan31345-4-0-4-81-5">Apr.</tspan><tspan 964 id="tspan31345-4-0-4-81-5">Apr.</tspan><tspan
1065 sodipodi:role="line" 965 sodipodi:role="line"
1066 x="1802.1477" 966 x="1285.5521"
1067 y="268.26001" 967 y="112.26062"
1068 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 968 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1069 id="tspan49906-7-3-8-2-8">2026</tspan></text> 969 id="tspan49906-7-3-8-2-8">2026</tspan></text>
1070 <text 970 <text
1071 xml:space="preserve" 971 xml:space="preserve"
1072 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 972 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1073 x="1081.4458" 973 x="564.85016"
1074 y="250.07544" 974 y="94.076042"
1075 id="text1185-9-7-1-1-8-1-0-2"><tspan 975 id="text1185-9-7-1-1-8-1-0-2"><tspan
1076 sodipodi:role="line" 976 sodipodi:role="line"
1077 x="1081.4458" 977 x="564.85016"
1078 y="250.07544" 978 y="94.076042"
1079 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 979 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1080 id="tspan31345-4-0-4-8">Apr.</tspan><tspan 980 id="tspan31345-4-0-4-8">Apr.</tspan><tspan
1081 sodipodi:role="line" 981 sodipodi:role="line"
1082 x="1081.4458" 982 x="564.85016"
1083 y="268.07211" 983 y="112.07272"
1084 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 984 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1085 id="tspan49906-7-3-8-3">2023</tspan></text> 985 id="tspan49906-7-3-8-3">2023</tspan></text>
1086 <text 986 <text
1087 xml:space="preserve" 987 xml:space="preserve"
1088 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1089 x="602.51526"
1090 y="250.07544"
1091 id="text1185-9-7-1-1-8-1-7"><tspan
1092 sodipodi:role="line"
1093 x="602.51526"
1094 y="250.07544"
1095 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1096 id="tspan31345-4-0-5">Apr.</tspan><tspan
1097 sodipodi:role="line"
1098 x="602.51526"
1099 y="268.07211"
1100 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1101 id="tspan49906-7-3-6">2021</tspan></text>
1102 <text
1103 xml:space="preserve"
1104 style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 988 style="font-weight:bold;font-size:42.5884px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:none;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1105 x="-16.290483" 989 x="-16.290483"
1106 y="345.7359" 990 y="345.7359"
@@ -1111,252 +995,117 @@
1111 y="345.7359" /></text> 995 y="345.7359" /></text>
1112 <path 996 <path
1113 id="path29430" 997 id="path29430"
1114 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 998 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1.99503;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1115 d="M 319.99936,219.99912 H 2300 Z" /> 999 d="M 307.54809,63.999718 H 2277.72 Z" />
1116 <path
1117 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1118 d="m 360,219.99997 v 10.00004 0"
1119 id="path29548" />
1120 <path
1121 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1122 d="m 480,219.99996 v 10 0"
1123 id="path29548-5" />
1124 <path 1000 <path
1125 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1001 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1126 d="m 600,219.99992 v 10.00005 0" 1002 d="m 323.40434,64.000618 v 9.99995 0"
1127 id="path29548-5-1" />
1128 <path
1129 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1130 d="m 720,220.00002 v 9.99999 0"
1131 id="path29548-5-1-3" />
1132 <path
1133 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1134 d="m 840,220.00002 v 9.99995 0"
1135 id="path29548-5-1-3-6" /> 1003 id="path29548-5-1-3-6" />
1136 <path 1004 <path
1137 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1005 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1138 d="m 960,220.00002 v 9.99999 0" 1006 d="m 443.40434,64.000618 v 9.99999 0"
1139 id="path29548-5-1-3-6-3" /> 1007 id="path29548-5-1-3-6-3" />
1140 <path 1008 <path
1141 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1009 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1142 d="m 1080,220.00002 v 9.99999 0" 1010 d="m 563.40434,64.000618 v 9.99999 0"
1143 id="path29548-5-1-3-6-3-1" /> 1011 id="path29548-5-1-3-6-3-1" />
1144 <path 1012 <path
1145 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1013 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1146 d="m 380,219.99997 v 5.00004 0" 1014 d="m 343.40434,64.000568 v 5.00004 0"
1147 id="path29548-8"
1148 inkscape:transform-center-x="14.782001"
1149 inkscape:transform-center-y="-0.085282837" />
1150 <path
1151 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1152 d="m 400,219.99997 v 5.00004 0"
1153 id="path29548-8-5"
1154 inkscape:transform-center-x="14.782001"
1155 inkscape:transform-center-y="-0.085282837" />
1156 <path
1157 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1158 d="m 420,219.99997 v 5 0"
1159 id="path29548-8-5-0"
1160 inkscape:transform-center-x="14.782001"
1161 inkscape:transform-center-y="-0.085282155" />
1162 <path
1163 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1164 d="m 440,219.99997 v 5 0"
1165 id="path29548-8-5-0-6"
1166 inkscape:transform-center-x="14.782001"
1167 inkscape:transform-center-y="-0.085282155" />
1168 <path
1169 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1170 d="m 460,219.99997 v 5.00004 0"
1171 id="path29548-8-5-0-6-4-6"
1172 inkscape:transform-center-x="14.782001"
1173 inkscape:transform-center-y="-0.085282837" />
1174 <path
1175 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1176 d="m 500,219.99997 v 5.00004 0"
1177 id="path29548-8-5-0-6-4-6-2"
1178 inkscape:transform-center-x="14.782001"
1179 inkscape:transform-center-y="-0.085282837" />
1180 <path
1181 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:0.999997;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1182 d="m 520,219.99997 v 5 0"
1183 id="path29548-8-5-0-6-4-6-2-9"
1184 inkscape:transform-center-x="14.782001"
1185 inkscape:transform-center-y="-0.085282155" />
1186 <path
1187 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1188 d="m 540,219.99997 v 5.00004 0"
1189 id="path29548-8-5-0-6-4-6-2-9-0"
1190 inkscape:transform-center-x="14.782001"
1191 inkscape:transform-center-y="-0.085282837" />
1192 <path
1193 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1194 d="m 560,219.99997 v 5.00004 0"
1195 id="path29548-8-5-0-6-4-6-2-9-0-8"
1196 inkscape:transform-center-x="14.782001"
1197 inkscape:transform-center-y="-0.085282837" />
1198 <path
1199 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1200 d="m 580,219.99997 v 5.00004 0"
1201 id="path29548-8-5-0-6-4-6-2-9-0-8-1"
1202 inkscape:transform-center-x="14.782001"
1203 inkscape:transform-center-y="-0.085282837" />
1204 <path
1205 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1206 d="m 620.266,219.99997 v 5.00004 0"
1207 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3"
1208 inkscape:transform-center-x="14.782001"
1209 inkscape:transform-center-y="-0.085282837" />
1210 <path
1211 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1212 d="m 640,219.99997 v 5.00004 0"
1213 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1"
1214 inkscape:transform-center-x="14.782001"
1215 inkscape:transform-center-y="-0.085282837" />
1216 <path
1217 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1218 d="m 660,219.99997 v 5.00004 0"
1219 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9"
1220 inkscape:transform-center-x="14.782001"
1221 inkscape:transform-center-y="-0.085282837" />
1222 <path
1223 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1224 d="m 679.61073,219.99997 v 5.00004 0"
1225 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6"
1226 inkscape:transform-center-x="14.782001"
1227 inkscape:transform-center-y="-0.085282837" />
1228 <path
1229 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1230 d="m 700,219.99997 v 5.00004 0"
1231 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9"
1232 inkscape:transform-center-x="14.782001"
1233 inkscape:transform-center-y="-0.085282837" />
1234 <path
1235 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1236 d="m 740,219.99997 v 5.00004 0"
1237 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3"
1238 inkscape:transform-center-x="14.782001"
1239 inkscape:transform-center-y="-0.085282837" />
1240 <path
1241 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1242 d="m 760,219.99997 v 5.00004 0"
1243 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4"
1244 inkscape:transform-center-x="14.782001"
1245 inkscape:transform-center-y="-0.085282837" />
1246 <path
1247 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1248 d="m 780.36587,219.99997 v 5.00004 0"
1249 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0"
1250 inkscape:transform-center-x="14.782001"
1251 inkscape:transform-center-y="-0.085282837" />
1252 <path
1253 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1254 d="m 800,219.99997 v 5.00004 0"
1255 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4"
1256 inkscape:transform-center-x="14.782001"
1257 inkscape:transform-center-y="-0.085282837" />
1258 <path
1259 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1260 d="m 820,219.99997 v 5.00004 0"
1261 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6"
1262 inkscape:transform-center-x="14.782001"
1263 inkscape:transform-center-y="-0.085282837" />
1264 <path
1265 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1266 d="m 860,219.99997 v 5.00004 0"
1267 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2" 1015 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2"
1268 inkscape:transform-center-x="14.782001" 1016 inkscape:transform-center-x="14.782001"
1269 inkscape:transform-center-y="-0.085282837" /> 1017 inkscape:transform-center-y="-0.085282837" />
1270 <path 1018 <path
1271 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1019 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1272 d="m 880,219.99997 v 5.00004 0" 1020 d="m 363.40434,64.000568 v 5.00004 0"
1273 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2" 1021 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2"
1274 inkscape:transform-center-x="14.782001" 1022 inkscape:transform-center-x="14.782001"
1275 inkscape:transform-center-y="-0.085282837" /> 1023 inkscape:transform-center-y="-0.085282837" />
1276 <path 1024 <path
1277 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1025 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1278 d="m 899.72384,219.99997 v 5.00004 0" 1026 d="m 383.12818,64.000568 v 5.00004 0"
1279 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7" 1027 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7"
1280 inkscape:transform-center-x="14.782001" 1028 inkscape:transform-center-x="14.782001"
1281 inkscape:transform-center-y="-0.085282837" /> 1029 inkscape:transform-center-y="-0.085282837" />
1282 <path 1030 <path
1283 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1031 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1284 d="m 920,219.99997 v 5.00004 0" 1032 d="m 403.40434,64.000568 v 5.00004 0"
1285 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6" 1033 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6"
1286 inkscape:transform-center-x="14.782001" 1034 inkscape:transform-center-x="14.782001"
1287 inkscape:transform-center-y="-0.085282837" /> 1035 inkscape:transform-center-y="-0.085282837" />
1288 <path 1036 <path
1289 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1037 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1290 d="m 940,219.99997 v 5.00004 0" 1038 d="m 423.40434,64.000568 v 5.00004 0"
1291 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1" 1039 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1"
1292 inkscape:transform-center-x="14.782001" 1040 inkscape:transform-center-x="14.782001"
1293 inkscape:transform-center-y="-0.085282837" /> 1041 inkscape:transform-center-y="-0.085282837" />
1294 <path 1042 <path
1295 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1043 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1296 d="m 980,219.99997 v 5.00004 0" 1044 d="m 463.40434,64.000568 v 5.00004 0"
1297 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9" 1045 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9"
1298 inkscape:transform-center-x="14.782001" 1046 inkscape:transform-center-x="14.782001"
1299 inkscape:transform-center-y="-0.085282837" /> 1047 inkscape:transform-center-y="-0.085282837" />
1300 <path 1048 <path
1301 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1049 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1302 d="m 1000,219.99997 v 5.00004 0" 1050 d="m 483.40434,64.000568 v 5.00004 0"
1303 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9" 1051 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9"
1304 inkscape:transform-center-x="14.782001" 1052 inkscape:transform-center-x="14.782001"
1305 inkscape:transform-center-y="-0.085282837" /> 1053 inkscape:transform-center-y="-0.085282837" />
1306 <path 1054 <path
1307 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1055 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1308 d="m 1020,219.99997 v 5.00004 0" 1056 d="m 503.40434,64.000568 v 5.00004 0"
1309 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1" 1057 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1"
1310 inkscape:transform-center-x="14.782001" 1058 inkscape:transform-center-x="14.782001"
1311 inkscape:transform-center-y="-0.085282837" /> 1059 inkscape:transform-center-y="-0.085282837" />
1312 <path 1060 <path
1313 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1061 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1314 d="m 1040,219.99997 v 5.00004 0" 1062 d="m 523.40434,64.000568 v 5.00004 0"
1315 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4" 1063 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4"
1316 inkscape:transform-center-x="14.782001" 1064 inkscape:transform-center-x="14.782001"
1317 inkscape:transform-center-y="-0.085282837" /> 1065 inkscape:transform-center-y="-0.085282837" />
1318 <path 1066 <path
1319 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1067 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1320 d="m 1059.7216,219.99997 v 5.00004 0" 1068 d="m 543.12594,64.000568 v 5.00004 0"
1321 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9" 1069 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9"
1322 inkscape:transform-center-x="-14.78205" 1070 inkscape:transform-center-x="-14.78205"
1323 inkscape:transform-center-y="-0.085282837" /> 1071 inkscape:transform-center-y="-0.085282837" />
1324 <path 1072 <path
1325 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1073 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1326 d="m 1100,219.99997 v 5.00004 0" 1074 d="m 583.40434,64.000568 v 5.00004 0"
1327 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0" 1075 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0"
1328 inkscape:transform-center-x="14.782001" 1076 inkscape:transform-center-x="14.782001"
1329 inkscape:transform-center-y="-0.085282837" /> 1077 inkscape:transform-center-y="-0.085282837" />
1330 <path 1078 <path
1331 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1079 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1332 d="m 1120,219.99997 v 5.00004 0" 1080 d="m 603.40434,64.000568 v 5.00004 0"
1333 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7" 1081 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7"
1334 inkscape:transform-center-x="14.782001" 1082 inkscape:transform-center-x="14.782001"
1335 inkscape:transform-center-y="-0.085282837" /> 1083 inkscape:transform-center-y="-0.085282837" />
1336 <path 1084 <path
1337 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1085 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1338 d="m 1140,219.99997 v 5.00004 0" 1086 d="m 623.40434,64.000568 v 5.00004 0"
1339 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5" 1087 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5"
1340 inkscape:transform-center-x="14.782001" 1088 inkscape:transform-center-x="14.782001"
1341 inkscape:transform-center-y="-0.085282837" /> 1089 inkscape:transform-center-y="-0.085282837" />
1342 <path 1090 <path
1343 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1091 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1344 d="m 1160,219.99997 v 5.00004 0" 1092 d="m 643.40434,64.000568 v 5.00004 0"
1345 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8" 1093 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8"
1346 inkscape:transform-center-x="14.782001" 1094 inkscape:transform-center-x="14.782001"
1347 inkscape:transform-center-y="-0.085282837" /> 1095 inkscape:transform-center-y="-0.085282837" />
1348 <path 1096 <path
1349 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1097 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1350 d="m 1179.7216,219.99997 v 5.00004 0" 1098 d="m 663.12594,64.000568 v 5.00004 0"
1351 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7" 1099 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7"
1352 inkscape:transform-center-x="-14.78205" 1100 inkscape:transform-center-x="-14.78205"
1353 inkscape:transform-center-y="-0.085282837" /> 1101 inkscape:transform-center-y="-0.085282837" />
1354 <path 1102 <path
1355 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1103 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1356 d="m 1320,219.99996 v 10 0" 1104 d="m 803.40434,64.000558 v 10 0"
1357 id="path29548-5-1-3-6-3-1-0-8" /> 1105 id="path29548-5-1-3-6-3-1-0-8" />
1358 <g 1106 <g
1359 id="g1267"> 1107 id="g1267"
1108 transform="translate(-516.59566,-155.99941)">
1360 <path 1109 <path
1361 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1110 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1362 d="m 1200,220.00002 v 9.99999 0" 1111 d="m 1200,220.00002 v 9.99999 0"
@@ -1394,7 +1143,7 @@
1394 </g> 1143 </g>
1395 <g 1144 <g
1396 id="g1267-4" 1145 id="g1267-4"
1397 transform="translate(240,-4e-5)"> 1146 transform="translate(-276.59566,-155.99945)">
1398 <path 1147 <path
1399 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1148 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1400 d="m 1200,220.00002 v 9.99999 0" 1149 d="m 1200,220.00002 v 9.99999 0"
@@ -1432,7 +1181,7 @@
1432 </g> 1181 </g>
1433 <g 1182 <g
1434 id="g1267-4-5" 1183 id="g1267-4-5"
1435 transform="translate(480,-5e-5)"> 1184 transform="translate(-36.595659,-155.99946)">
1436 <path 1185 <path
1437 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1186 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1438 d="m 1200,220.00002 v 9.99999 0" 1187 d="m 1200,220.00002 v 9.99999 0"
@@ -1470,7 +1219,7 @@
1470 </g> 1219 </g>
1471 <g 1220 <g
1472 id="g1267-4-5-22" 1221 id="g1267-4-5-22"
1473 transform="translate(600,-4e-5)"> 1222 transform="translate(83.404341,-155.99945)">
1474 <path 1223 <path
1475 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1224 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1476 d="m 1200,220.00002 v 9.99999 0" 1225 d="m 1200,220.00002 v 9.99999 0"
@@ -1508,7 +1257,7 @@
1508 </g> 1257 </g>
1509 <g 1258 <g
1510 id="g1267-4-5-9" 1259 id="g1267-4-5-9"
1511 transform="translate(360,-4e-5)"> 1260 transform="translate(-156.59566,-155.99945)">
1512 <path 1261 <path
1513 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1262 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1514 d="m 1200,220.00002 v 9.99999 0" 1263 d="m 1200,220.00002 v 9.99999 0"
@@ -1546,105 +1295,105 @@
1546 </g> 1295 </g>
1547 <path 1296 <path
1548 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1297 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1549 d="m 1800,219.99997 v 9.99999 0" 1298 d="m 1283.4043,64.000568 v 9.99999 0"
1550 id="path29548-5-1-3-6-3-1-0-3-4-2-0" /> 1299 id="path29548-5-1-3-6-3-1-0-3-4-2-0" />
1551 <path 1300 <path
1552 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1301 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1553 d="m 1340,219.99997 v 5.00004 0" 1302 d="m 823.40434,64.000568 v 5.00004 0"
1554 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-3" 1303 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-3"
1555 inkscape:transform-center-x="14.782001" 1304 inkscape:transform-center-x="14.782001"
1556 inkscape:transform-center-y="-0.085282837" /> 1305 inkscape:transform-center-y="-0.085282837" />
1557 <path 1306 <path
1558 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1307 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1559 d="m 1360,219.99997 v 5.00004 0" 1308 d="m 843.40434,64.000568 v 5.00004 0"
1560 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-0" 1309 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-0"
1561 inkscape:transform-center-x="14.782001" 1310 inkscape:transform-center-x="14.782001"
1562 inkscape:transform-center-y="-0.085282837" /> 1311 inkscape:transform-center-y="-0.085282837" />
1563 <path 1312 <path
1564 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1313 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1565 d="m 1380,219.99997 v 5.00004 0" 1314 d="m 863.40434,64.000568 v 5.00004 0"
1566 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-3" 1315 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-3"
1567 inkscape:transform-center-x="14.782001" 1316 inkscape:transform-center-x="14.782001"
1568 inkscape:transform-center-y="-0.085282837" /> 1317 inkscape:transform-center-y="-0.085282837" />
1569 <path 1318 <path
1570 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1319 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1571 d="m 1400,219.99997 v 5.00004 0" 1320 d="m 883.40434,64.000568 v 5.00004 0"
1572 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-0" 1321 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-0"
1573 inkscape:transform-center-x="14.782001" 1322 inkscape:transform-center-x="14.782001"
1574 inkscape:transform-center-y="-0.085282837" /> 1323 inkscape:transform-center-y="-0.085282837" />
1575 <path 1324 <path
1576 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1325 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1577 d="m 1419.7216,219.99997 v 5.00004 0" 1326 d="m 903.12594,64.000568 v 5.00004 0"
1578 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-9" 1327 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-9"
1579 inkscape:transform-center-x="-14.78205" 1328 inkscape:transform-center-x="-14.78205"
1580 inkscape:transform-center-y="-0.085282837" /> 1329 inkscape:transform-center-y="-0.085282837" />
1581 <text 1330 <text
1582 xml:space="preserve" 1331 xml:space="preserve"
1583 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 1332 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1584 x="1919.3904" 1333 x="1402.7948"
1585 y="249.86044" 1334 y="93.861046"
1586 id="text1185-9-7-1-1-89-62"><tspan 1335 id="text1185-9-7-1-1-89-62"><tspan
1587 sodipodi:role="line" 1336 sodipodi:role="line"
1588 x="1919.3904" 1337 x="1402.7948"
1589 y="249.86044" 1338 y="93.861046"
1590 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1339 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1591 id="tspan31345-7-6">Oct.</tspan><tspan 1340 id="tspan31345-7-6">Oct.</tspan><tspan
1592 sodipodi:role="line" 1341 sodipodi:role="line"
1593 x="1919.3904" 1342 x="1402.7948"
1594 y="267.85712" 1343 y="111.85773"
1595 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1344 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1596 id="tspan49906-76-7">2026</tspan></text> 1345 id="tspan49906-76-7">2026</tspan></text>
1597 <text 1346 <text
1598 xml:space="preserve" 1347 xml:space="preserve"
1599 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 1348 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1600 x="2159.3093" 1349 x="1642.7137"
1601 y="250.58356" 1350 y="94.58416"
1602 id="text1185-9-7-1-1-89-6-5"><tspan 1351 id="text1185-9-7-1-1-89-6-5"><tspan
1603 sodipodi:role="line" 1352 sodipodi:role="line"
1604 x="2159.3093" 1353 x="1642.7137"
1605 y="250.58356" 1354 y="94.58416"
1606 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1355 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1607 id="tspan31345-7-8-6">Oct.</tspan><tspan 1356 id="tspan31345-7-8-6">Oct.</tspan><tspan
1608 sodipodi:role="line" 1357 sodipodi:role="line"
1609 x="2159.3093" 1358 x="1642.7137"
1610 y="268.58023" 1359 y="112.58084"
1611 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1360 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1612 id="tspan49906-76-0-9">2027</tspan></text> 1361 id="tspan49906-76-0-9">2027</tspan></text>
1613 <text 1362 <text
1614 xml:space="preserve" 1363 xml:space="preserve"
1615 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 1364 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1616 x="2041.8163" 1365 x="1525.2207"
1617 y="249.66977" 1366 y="93.670372"
1618 id="text1185-9-7-1-1-8-1-0-4-8"><tspan 1367 id="text1185-9-7-1-1-8-1-0-4-8"><tspan
1619 sodipodi:role="line" 1368 sodipodi:role="line"
1620 x="2041.8163" 1369 x="1525.2207"
1621 y="249.66977" 1370 y="93.670372"
1622 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1371 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1623 id="tspan31345-4-0-4-81-7">Apr.</tspan><tspan 1372 id="tspan31345-4-0-4-81-7">Apr.</tspan><tspan
1624 sodipodi:role="line" 1373 sodipodi:role="line"
1625 x="2041.8163" 1374 x="1525.2207"
1626 y="267.66644" 1375 y="111.66705"
1627 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1376 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1628 id="tspan49906-7-3-8-2-2">2027</tspan></text> 1377 id="tspan49906-7-3-8-2-2">2027</tspan></text>
1629 <text 1378 <text
1630 xml:space="preserve" 1379 xml:space="preserve"
1631 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1" 1380 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1632 x="2282.1477" 1381 x="1765.5521"
1633 y="250.26334" 1382 y="94.263939"
1634 id="text1185-9-7-1-1-8-1-0-4-2-8"><tspan 1383 id="text1185-9-7-1-1-8-1-0-4-2-8"><tspan
1635 sodipodi:role="line" 1384 sodipodi:role="line"
1636 x="2282.1477" 1385 x="1765.5521"
1637 y="250.26334" 1386 y="94.263939"
1638 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1387 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1639 id="tspan31345-4-0-4-81-5-2">Apr.</tspan><tspan 1388 id="tspan31345-4-0-4-81-5-2">Apr.</tspan><tspan
1640 sodipodi:role="line" 1389 sodipodi:role="line"
1641 x="2282.1477" 1390 x="1765.5521"
1642 y="268.26001" 1391 y="112.26062"
1643 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none" 1392 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1644 id="tspan49906-7-3-8-2-8-9">2028</tspan></text> 1393 id="tspan49906-7-3-8-2-8-9">2028</tspan></text>
1645 <g 1394 <g
1646 id="g1267-4-9" 1395 id="g1267-4-9"
1647 transform="translate(720,-3e-5)"> 1396 transform="translate(203.40434,-155.99944)">
1648 <path 1397 <path
1649 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1398 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1650 d="m 1200,220.00002 v 9.99999 0" 1399 d="m 1200,220.00002 v 9.99999 0"
@@ -1682,7 +1431,7 @@
1682 </g> 1431 </g>
1683 <g 1432 <g
1684 id="g1267-4-5-2" 1433 id="g1267-4-5-2"
1685 transform="translate(960,-4e-5)"> 1434 transform="translate(443.40434,-155.99945)">
1686 <path 1435 <path
1687 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1436 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1688 d="m 1200,220.00002 v 9.99999 0" 1437 d="m 1200,220.00002 v 9.99999 0"
@@ -1720,7 +1469,7 @@
1720 </g> 1469 </g>
1721 <g 1470 <g
1722 id="g1267-4-5-9-9" 1471 id="g1267-4-5-9-9"
1723 transform="translate(840,-3e-5)"> 1472 transform="translate(323.40434,-155.99944)">
1724 <path 1473 <path
1725 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1474 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1726 d="m 1200,220.00002 v 9.99999 0" 1475 d="m 1200,220.00002 v 9.99999 0"
@@ -1758,8 +1507,390 @@
1758 </g> 1507 </g>
1759 <path 1508 <path
1760 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" 1509 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1761 d="m 2280,219.99998 v 9.99999 0" 1510 d="m 1763.4043,64.000578 v 9.99999 0"
1762 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0" /> 1511 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0" />
1512 <text
1513 xml:space="preserve"
1514 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1515 x="1885.6029"
1516 y="94.285194"
1517 id="text1185-9-7-1-1-8-1-0-4-2-8-2"><tspan
1518 sodipodi:role="line"
1519 x="1885.6029"
1520 y="94.285194"
1521 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1522 id="tspan31345-4-0-4-81-5-2-8">Oct.</tspan><tspan
1523 sodipodi:role="line"
1524 x="1885.6029"
1525 y="112.28188"
1526 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1527 id="tspan49906-7-3-8-2-8-9-9">2028</tspan></text>
1528 <g
1529 id="g1267-4-5-2-7"
1530 transform="translate(563.45518,-155.9782)">
1531 <path
1532 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1533 d="m 1200,220.00002 v 9.99999 0"
1534 id="path29548-5-1-3-6-3-1-0-3-4-1-3" />
1535 <path
1536 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1537 d="m 1220,219.99997 v 5.00004 0"
1538 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6"
1539 inkscape:transform-center-x="14.782001"
1540 inkscape:transform-center-y="-0.085282837" />
1541 <path
1542 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1543 d="m 1240,219.99997 v 5.00004 0"
1544 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1"
1545 inkscape:transform-center-x="14.782001"
1546 inkscape:transform-center-y="-0.085282837" />
1547 <path
1548 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1549 d="m 1260,219.99997 v 5.00004 0"
1550 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2"
1551 inkscape:transform-center-x="14.782001"
1552 inkscape:transform-center-y="-0.085282837" />
1553 <path
1554 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1555 d="m 1280,219.99997 v 5.00004 0"
1556 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9"
1557 inkscape:transform-center-x="14.782001"
1558 inkscape:transform-center-y="-0.085282837" />
1559 <path
1560 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1561 d="m 1299.7216,219.99997 v 5.00004 0"
1562 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3"
1563 inkscape:transform-center-x="-14.78205"
1564 inkscape:transform-center-y="-0.085282837" />
1565 </g>
1566 <path
1567 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1568 d="m 1883.4551,64.021829 v 9.99999 0"
1569 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1" />
1570 <text
1571 xml:space="preserve"
1572 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1573 x="2005.5908"
1574 y="94.339828"
1575 id="text1185-9-7-1-1-8-1-0-4-2-8-2-4"><tspan
1576 sodipodi:role="line"
1577 x="2005.5908"
1578 y="94.339828"
1579 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1580 id="tspan31345-4-0-4-81-5-2-8-7">Apr.</tspan><tspan
1581 sodipodi:role="line"
1582 x="2005.5908"
1583 y="112.33651"
1584 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1585 id="tspan49906-7-3-8-2-8-9-9-8">2029</tspan></text>
1586 <g
1587 id="g1267-4-5-2-7-4"
1588 transform="translate(683.44312,-155.92356)">
1589 <path
1590 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1591 d="m 1200,220.00002 v 9.99999 0"
1592 id="path29548-5-1-3-6-3-1-0-3-4-1-3-5" />
1593 <path
1594 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1595 d="m 1220,219.99997 v 5.00004 0"
1596 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0"
1597 inkscape:transform-center-x="14.782001"
1598 inkscape:transform-center-y="-0.085282837" />
1599 <path
1600 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1601 d="m 1240,219.99997 v 5.00004 0"
1602 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3"
1603 inkscape:transform-center-x="14.782001"
1604 inkscape:transform-center-y="-0.085282837" />
1605 <path
1606 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1607 d="m 1260,219.99997 v 5.00004 0"
1608 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6"
1609 inkscape:transform-center-x="14.782001"
1610 inkscape:transform-center-y="-0.085282837" />
1611 <path
1612 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1613 d="m 1280,219.99997 v 5.00004 0"
1614 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1"
1615 inkscape:transform-center-x="14.782001"
1616 inkscape:transform-center-y="-0.085282837" />
1617 <path
1618 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1619 d="m 1299.7216,219.99997 v 5.00004 0"
1620 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0"
1621 inkscape:transform-center-x="-14.78205"
1622 inkscape:transform-center-y="-0.085282837" />
1623 </g>
1624 <path
1625 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1626 d="m 2003.443,64.076464 v 9.99999 0"
1627 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6" />
1628 <text
1629 xml:space="preserve"
1630 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1631 x="2125.6079"
1632 y="94.692207"
1633 id="text1185-9-7-1-1-8-1-0-4-2-8-2-4-2"><tspan
1634 sodipodi:role="line"
1635 x="2125.6079"
1636 y="94.692207"
1637 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1638 id="tspan31345-4-0-4-81-5-2-8-7-0">Oct.</tspan><tspan
1639 sodipodi:role="line"
1640 x="2125.6079"
1641 y="112.68889"
1642 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1643 id="tspan49906-7-3-8-2-8-9-9-8-6">2029</tspan></text>
1644 <g
1645 id="g1267-4-5-2-7-4-1"
1646 transform="translate(803.46019,-155.57118)">
1647 <path
1648 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1649 d="m 1200,220.00002 v 9.99999 0"
1650 id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5" />
1651 <path
1652 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1653 d="m 1220,219.99997 v 5.00004 0"
1654 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5"
1655 inkscape:transform-center-x="14.782001"
1656 inkscape:transform-center-y="-0.085282837" />
1657 <path
1658 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1659 d="m 1240,219.99997 v 5.00004 0"
1660 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4"
1661 inkscape:transform-center-x="14.782001"
1662 inkscape:transform-center-y="-0.085282837" />
1663 <path
1664 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1665 d="m 1260,219.99997 v 5.00004 0"
1666 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7"
1667 inkscape:transform-center-x="14.782001"
1668 inkscape:transform-center-y="-0.085282837" />
1669 <path
1670 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1671 d="m 1280,219.99997 v 5.00004 0"
1672 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6"
1673 inkscape:transform-center-x="14.782001"
1674 inkscape:transform-center-y="-0.085282837" />
1675 <path
1676 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1677 d="m 1299.7216,219.99997 v 5.00004 0"
1678 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5"
1679 inkscape:transform-center-x="-14.78205"
1680 inkscape:transform-center-y="-0.085282837" />
1681 </g>
1682 <path
1683 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1684 d="m 2123.4601,64.428843 v 9.99999 0"
1685 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-6" />
1686 <path
1687 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1688 d="m 2123.3825,64.223284 v 9.99999 0"
1689 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-3" />
1690 <text
1691 xml:space="preserve"
1692 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#000000;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1693 x="2245.5474"
1694 y="94.839027"
1695 id="text1185-9-7-1-1-8-1-0-4-2-8-2-4-2-7"><tspan
1696 sodipodi:role="line"
1697 x="2245.5474"
1698 y="94.839027"
1699 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1700 id="tspan31345-4-0-4-81-5-2-8-7-0-4">Apr.</tspan><tspan
1701 sodipodi:role="line"
1702 x="2245.5474"
1703 y="112.83571"
1704 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-east-asian:normal;text-align:center;text-anchor:middle;stroke:none"
1705 id="tspan49906-7-3-8-2-8-9-9-8-6-5">2030</tspan></text>
1706 <g
1707 id="g1267-4-5-2-7-4-1-2"
1708 transform="translate(923.39972,-155.42436)">
1709 <path
1710 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1711 d="m 1200,220.00002 v 9.99999 0"
1712 id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5-5" />
1713 <path
1714 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1715 d="m 1220,219.99997 v 5.00004 0"
1716 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5-4"
1717 inkscape:transform-center-x="14.782001"
1718 inkscape:transform-center-y="-0.085282837" />
1719 <path
1720 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1721 d="m 1240,219.99997 v 5.00004 0"
1722 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4-7"
1723 inkscape:transform-center-x="14.782001"
1724 inkscape:transform-center-y="-0.085282837" />
1725 <path
1726 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1727 d="m 1260,219.99997 v 5.00004 0"
1728 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7-4"
1729 inkscape:transform-center-x="14.782001"
1730 inkscape:transform-center-y="-0.085282837" />
1731 <path
1732 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1733 d="m 1280,219.99997 v 5.00004 0"
1734 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6-4"
1735 inkscape:transform-center-x="14.782001"
1736 inkscape:transform-center-y="-0.085282837" />
1737 <path
1738 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1739 d="m 1299.7216,219.99997 v 5.00004 0"
1740 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5-3"
1741 inkscape:transform-center-x="-14.78205"
1742 inkscape:transform-center-y="-0.085282837" />
1743 </g>
1744 <g
1745 id="g1267-4-5-2-7-4-1-2-0"
1746 transform="translate(1043.3579,-155.33829)">
1747 <path
1748 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1749 d="m 1200,220.00002 v 9.99999 0"
1750 id="path29548-5-1-3-6-3-1-0-3-4-1-3-5-5-5-6" />
1751 <path
1752 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1753 d="m 1220,219.99997 v 5.00004 0"
1754 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-0-5-0-0-5-6-0-5-4-8"
1755 inkscape:transform-center-x="14.782001"
1756 inkscape:transform-center-y="-0.085282837" />
1757 <path
1758 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1759 d="m 1240,219.99997 v 5.00004 0"
1760 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-7-5-3-5-9-1-3-4-7-9"
1761 inkscape:transform-center-x="14.782001"
1762 inkscape:transform-center-y="-0.085282837" />
1763 <path
1764 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1765 d="m 1260,219.99997 v 5.00004 0"
1766 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-5-2-0-9-9-2-6-7-4-2"
1767 inkscape:transform-center-x="14.782001"
1768 inkscape:transform-center-y="-0.085282837" />
1769 <path
1770 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1771 d="m 1280,219.99997 v 5.00004 0"
1772 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-8-9-9-4-1-9-1-6-4-6"
1773 inkscape:transform-center-x="14.782001"
1774 inkscape:transform-center-y="-0.085282837" />
1775 <path
1776 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1777 d="m 1299.7216,219.99997 v 5.00004 0"
1778 id="path29548-8-5-0-6-4-6-2-9-0-8-1-3-1-9-6-9-3-4-0-4-6-2-2-7-6-1-9-9-1-4-9-7-0-2-6-4-3-0-5-3-6"
1779 inkscape:transform-center-x="-14.78205"
1780 inkscape:transform-center-y="-0.085282837" />
1781 </g>
1782 <path
1783 style="fill:none;fill-rule:evenodd;stroke:#000000;stroke-width:2;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
1784 d="m 2243.3996,64.575663 v 9.99999 0"
1785 id="path29548-5-1-3-6-3-1-0-3-4-2-0-0-1-6-6-0" />
1786 <rect
1787 style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.751473;stroke-opacity:1"
1788 id="rect917-0-0-4-4-9-4-5-3-9-2-36"
1789 width="38.418175"
1790 height="23.151052"
1791 x="2047.6135"
1792 y="-45.172161"
1793 ry="1.1605872" />
1794 <rect
1795 style="opacity:1;fill:#ffffff;fill-opacity:1;fill-rule:evenodd;stroke:#000000;stroke-width:1.98878;stroke-dasharray:none;stroke-opacity:1"
1796 id="rect917-0-0-4-4-9-4-5-3-9-2-36-7"
1797 width="186.42949"
1798 height="110.40546"
1799 x="2036.5294"
1800 y="-77.753708"
1801 ry="5.5347452" />
1802 <rect
1803 style="opacity:0.75;fill:#241f31;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1"
1804 id="rect917-0-0-4-4-9-4-5-3-9-2-6"
1805 width="21.197233"
1806 height="19.28739"
1807 x="2053.8164"
1808 y="-45.883858"
1809 ry="0.96689767" />
1810 <text
1811 xml:space="preserve"
1812 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1813 x="2132.4917"
1814 y="-57.687912"
1815 id="text1185-3-55-4-0-0-0-1-1-6-4-3-5"><tspan
1816 sodipodi:role="line"
1817 x="2132.4917"
1818 y="-57.687912"
1819 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none"
1820 id="tspan10317-2-9-1-4-6-5-6-6-5">Legend</tspan></text>
1821 <text
1822 xml:space="preserve"
1823 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1824 x="2098.0986"
1825 y="-31.899874"
1826 id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2"><tspan
1827 sodipodi:role="line"
1828 x="2098.0986"
1829 y="-31.899874"
1830 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none"
1831 id="tspan10317-2-9-1-4-6-5-6-6-5-9">Future</tspan></text>
1832 <rect
1833 style="opacity:1;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1"
1834 id="rect917-0-0-4-4-9-4-5-3-9-2-6-1"
1835 width="21.197233"
1836 height="19.28739"
1837 x="2053.8672"
1838 y="-21.756365"
1839 ry="0.96689767" />
1840 <text
1841 xml:space="preserve"
1842 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1843 x="2128.7158"
1844 y="-7.6722765"
1845 id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2-2"><tspan
1846 sodipodi:role="line"
1847 x="2128.7158"
1848 y="-7.6722765"
1849 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none"
1850 id="tspan10317-2-9-1-4-6-5-6-6-5-9-7">Current (Apr. 25)</tspan></text>
1851 <text
1852 xml:space="preserve"
1853 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1854 x="2109.363"
1855 y="16.03771"
1856 id="text1185-3-55-4-0-0-0-1-1-6-4-3-5-2-2-9"><tspan
1857 sodipodi:role="line"
1858 x="2109.363"
1859 y="16.03771"
1860 style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans';text-align:center;text-anchor:middle;fill:#000000;fill-opacity:1;stroke:none"
1861 id="tspan10317-2-9-1-4-6-5-6-6-5-9-7-3">End-of-life</tspan></text>
1862 <rect
1863 style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:0.50949;stroke-opacity:1"
1864 id="rect917-0-0-4-4-9-4-5-3-9-2-6-1-0"
1865 width="21.197233"
1866 height="19.28739"
1867 x="2054.0239"
1868 y="1.9667883"
1869 ry="0.96689767" />
1870 <rect
1871 style="opacity:0.5;fill:#333333;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:1.85786;stroke-opacity:1"
1872 id="rect917-0-0-4-4-9-4-5-6"
1873 width="120.80748"
1874 height="45.000004"
1875 x="703.10553"
1876 y="-165.72791"
1877 ry="2.2558987" />
1878 <text
1879 xml:space="preserve"
1880 style="font-weight:bold;font-size:13.3333px;line-height:125%;font-family:'Nimbus Roman';-inkscape-font-specification:'Nimbus Roman, Bold';letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;fill:#fffefe;fill-opacity:1;stroke:#000000;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1"
1881 x="752.16809"
1882 y="-147.18787"
1883 id="text1185-3-55-4-0-0-0-1-2"><tspan
1884 sodipodi:role="line"
1885 x="752.16809"
1886 y="-147.18787"
1887 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
1888 id="tspan1">Nanbield</tspan><tspan
1889 sodipodi:role="line"
1890 x="752.16809"
1891 y="-129.19119"
1892 style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:13.3333px;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans Bold';text-align:center;text-anchor:middle;fill:#fffefe;fill-opacity:1;stroke:none"
1893 id="tspan2">4.3</tspan></text>
1763 </g> 1894 </g>
1764 <style 1895 <style
1765 type="text/css" 1896 type="text/css"
diff --git a/documentation/ref-manual/system-requirements.rst b/documentation/ref-manual/system-requirements.rst
index 0fc92550a5..b22572c6b4 100644
--- a/documentation/ref-manual/system-requirements.rst
+++ b/documentation/ref-manual/system-requirements.rst
@@ -62,8 +62,12 @@ supported on the following distributions:
62 62
63- Ubuntu 22.04 (LTS) 63- Ubuntu 22.04 (LTS)
64 64
65- Ubuntu 23.04
66
65- Fedora 38 67- Fedora 38
66 68
69- Fedora 39
70
67- CentOS Stream 8 71- CentOS Stream 8
68 72
69- Debian GNU/Linux 11 (Bullseye) 73- Debian GNU/Linux 11 (Bullseye)
@@ -150,10 +154,27 @@ Ubuntu and Debian
150Here are the packages needed to build an image on a headless system 154Here are the packages needed to build an image on a headless system
151with a supported Ubuntu or Debian Linux distribution:: 155with a supported Ubuntu or Debian Linux distribution::
152 156
153 $ sudo apt install &UBUNTU_HOST_PACKAGES_ESSENTIAL; 157 $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_ESSENTIAL;
158
159You also need to ensure you have the ``en_US.UTF-8`` locale enabled::
160
161 $ locale --all-locales | grep en_US.utf8
162
163If this is not the case, you can reconfigure the ``locales`` package to add it
164(requires an interactive shell)::
165
166 $ sudo dpkg-reconfigure locales
154 167
155.. note:: 168.. note::
156 169
170 - If you are not in an interactive shell, ``dpkg-reconfigure`` will
171 not work as expected. To add the locale you will need to edit
172 ``/etc/locale.gen`` file to add/uncomment the ``en_US.UTF-8`` locale.
173 A naive way to do this as root is::
174
175 $ echo "en_US.UTF-8 UTF-8" >> /etc/locale.gen
176 $ locale-gen
177
157 - If your build system has the ``oss4-dev`` package installed, you 178 - If your build system has the ``oss4-dev`` package installed, you
158 might experience QEMU build failures due to the package installing 179 might experience QEMU build failures due to the package installing
159 its own custom ``/usr/include/linux/soundcard.h`` on the Debian 180 its own custom ``/usr/include/linux/soundcard.h`` on the Debian
@@ -164,8 +185,12 @@ with a supported Ubuntu or Debian Linux distribution::
164 185
165Here are the packages needed to build Project documentation manuals:: 186Here are the packages needed to build Project documentation manuals::
166 187
167 $ sudo apt install git make inkscape texlive-latex-extra 188 $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_DOC;
168 $ sudo apt install sphinx python3-saneyaml python3-sphinx-rtd-theme 189
190In addition to the previous packages, here are the packages needed to build the
191documentation in PDF format::
192
193 $ sudo apt install &UBUNTU_DEBIAN_HOST_PACKAGES_DOC_PDF;
169 194
170Fedora Packages 195Fedora Packages
171--------------- 196---------------
@@ -177,8 +202,13 @@ with a supported Fedora Linux distribution::
177 202
178Here are the packages needed to build Project documentation manuals:: 203Here are the packages needed to build Project documentation manuals::
179 204
180 $ sudo dnf install git make python3-pip which inkscape texlive-fncychap 205 $ sudo dnf install &FEDORA_HOST_PACKAGES_DOC;
181 &PIP3_HOST_PACKAGES_DOC; 206 $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC;
207
208In addition to the previous packages, here are the packages needed to build the
209documentation in PDF format::
210
211 $ sudo dnf install &FEDORA_HOST_PACKAGES_DOC_PDF;
182 212
183openSUSE Packages 213openSUSE Packages
184----------------- 214-----------------
@@ -187,11 +217,17 @@ Here are the packages needed to build an image on a headless system
187with a supported openSUSE distribution:: 217with a supported openSUSE distribution::
188 218
189 $ sudo zypper install &OPENSUSE_HOST_PACKAGES_ESSENTIAL; 219 $ sudo zypper install &OPENSUSE_HOST_PACKAGES_ESSENTIAL;
220 $ sudo pip3 install &OPENSUSE_PIP3_HOST_PACKAGES_ESSENTIAL;
190 221
191Here are the packages needed to build Project documentation manuals:: 222Here are the packages needed to build Project documentation manuals::
192 223
193 $ sudo zypper install git make python3-pip which inkscape texlive-fncychap 224 $ sudo zypper install &OPENSUSE_HOST_PACKAGES_DOC;
194 &PIP3_HOST_PACKAGES_DOC; 225 $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC;
226
227In addition to the previous packages, here are the packages needed to build the
228documentation in PDF format::
229
230 $ sudo zypper install &OPENSUSE_HOST_PACKAGES_DOC_PDF;
195 231
196 232
197AlmaLinux Packages 233AlmaLinux Packages
@@ -200,6 +236,10 @@ AlmaLinux Packages
200Here are the packages needed to build an image on a headless system 236Here are the packages needed to build an image on a headless system
201with a supported AlmaLinux distribution:: 237with a supported AlmaLinux distribution::
202 238
239 $ sudo dnf install -y epel-release
240 $ sudo yum install dnf-plugins-core
241 $ sudo dnf config-manager --set-enabled crb
242 $ sudo dnf makecache
203 $ sudo dnf install &ALMALINUX_HOST_PACKAGES_ESSENTIAL; 243 $ sudo dnf install &ALMALINUX_HOST_PACKAGES_ESSENTIAL;
204 244
205.. note:: 245.. note::
@@ -217,8 +257,20 @@ with a supported AlmaLinux distribution::
217 257
218Here are the packages needed to build Project documentation manuals:: 258Here are the packages needed to build Project documentation manuals::
219 259
220 $ sudo dnf install git make python3-pip which inkscape texlive-fncychap 260 $ sudo dnf install &ALMALINUX_HOST_PACKAGES_DOC;
221 &PIP3_HOST_PACKAGES_DOC; 261 $ sudo pip3 install &PIP3_HOST_PACKAGES_DOC;
262
263In addition to the previous packages, here are the packages needed to build the
264documentation in PDF format::
265
266 $ sudo dnf install &ALMALINUX_HOST_PACKAGES_DOC_PDF;
267
268.. warning::
269
270 Unlike Fedora or OpenSUSE, AlmaLinux does not provide the packages
271 ``texlive-collection-fontsextra``, ``texlive-collection-lang*`` and
272 ``texlive-collection-latexextra``, so you may run into issues. These may be
273 installed using `tlmgr <https://tug.org/texlive/tlmgr.html>`_.
222 274
223.. _system-requirements-buildtools: 275.. _system-requirements-buildtools:
224 276
@@ -319,7 +371,7 @@ If you would prefer not to use the ``install-buildtools`` script, you can instea
319download and run a pre-built :term:`buildtools` installer yourself with the following 371download and run a pre-built :term:`buildtools` installer yourself with the following
320steps: 372steps:
321 373
322#. Go to :yocto_dl:`/releases/yocto/yocto-&DISTRO;/buildtools/`, locate and 374#. Go to :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/buildtools/`, locate and
323 download the ``.sh`` file corresponding to your host architecture 375 download the ``.sh`` file corresponding to your host architecture
324 and to :term:`buildtools`, :term:`buildtools-extended` or :term:`buildtools-make`. 376 and to :term:`buildtools`, :term:`buildtools-extended` or :term:`buildtools-make`.
325 377
diff --git a/documentation/ref-manual/tasks.rst b/documentation/ref-manual/tasks.rst
index 2e4b23408d..cf6b9876ca 100644
--- a/documentation/ref-manual/tasks.rst
+++ b/documentation/ref-manual/tasks.rst
@@ -616,8 +616,8 @@ information on how the root filesystem is created.
616 616
617Boots an image and performs runtime tests within the image. For 617Boots an image and performs runtime tests within the image. For
618information on automatically testing images, see the 618information on automatically testing images, see the
619":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 619":ref:`test-manual/runtime-testing:performing automated runtime testing`"
620section in the Yocto Project Development Tasks Manual. 620section in the Yocto Project Test Environment Manual.
621 621
622.. _ref-tasks-testimage_auto: 622.. _ref-tasks-testimage_auto:
623 623
@@ -629,8 +629,8 @@ after it has been built. This task is enabled when you set
629:term:`TESTIMAGE_AUTO` equal to "1". 629:term:`TESTIMAGE_AUTO` equal to "1".
630 630
631For information on automatically testing images, see the 631For information on automatically testing images, see the
632":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 632":ref:`test-manual/runtime-testing:performing automated runtime testing`"
633section in the Yocto Project Development Tasks Manual. 633section in the Yocto Project Test Environment Manual.
634 634
635Kernel-Related Tasks 635Kernel-Related Tasks
636==================== 636====================
@@ -727,7 +727,7 @@ tool, which you then use to modify the kernel configuration.
727 $ bitbake linux-yocto -c menuconfig 727 $ bitbake linux-yocto -c menuconfig
728 728
729 729
730See the ":ref:`kernel-dev/common:using \`\`menuconfig\`\``" 730See the ":ref:`kernel-dev/common:using ``menuconfig```"
731section in the Yocto Project Linux Kernel Development Manual for more 731section in the Yocto Project Linux Kernel Development Manual for more
732information on this configuration tool. 732information on this configuration tool.
733 733
@@ -751,7 +751,7 @@ which can then be applied by subsequent tasks such as
751 751
752Runs ``make menuconfig`` for the kernel. For information on 752Runs ``make menuconfig`` for the kernel. For information on
753``menuconfig``, see the 753``menuconfig``, see the
754":ref:`kernel-dev/common:using \`\`menuconfig\`\``" 754":ref:`kernel-dev/common:using ``menuconfig```"
755section in the Yocto Project Linux Kernel Development Manual. 755section in the Yocto Project Linux Kernel Development Manual.
756 756
757.. _ref-tasks-savedefconfig: 757.. _ref-tasks-savedefconfig:
diff --git a/documentation/ref-manual/terms.rst b/documentation/ref-manual/terms.rst
index b18c4183b6..9f61061415 100644
--- a/documentation/ref-manual/terms.rst
+++ b/documentation/ref-manual/terms.rst
@@ -63,7 +63,7 @@ universal, the list includes them just in case:
63 This term refers to the area used by the OpenEmbedded build system for 63 This term refers to the area used by the OpenEmbedded build system for
64 builds. The area is created when you ``source`` the setup environment 64 builds. The area is created when you ``source`` the setup environment
65 script that is found in the Source Directory 65 script that is found in the Source Directory
66 (i.e. :ref:`ref-manual/structure:\`\`oe-init-build-env\`\``). The 66 (i.e. :ref:`ref-manual/structure:``oe-init-build-env```). The
67 :term:`TOPDIR` variable points to the :term:`Build Directory`. 67 :term:`TOPDIR` variable points to the :term:`Build Directory`.
68 68
69 You have a lot of flexibility when creating the :term:`Build Directory`. 69 You have a lot of flexibility when creating the :term:`Build Directory`.
@@ -452,7 +452,7 @@ universal, the list includes them just in case:
452 the Source Directory, if you do, the top-level directory name of the 452 the Source Directory, if you do, the top-level directory name of the
453 Source Directory is derived from the Yocto Project release tarball. 453 Source Directory is derived from the Yocto Project release tarball.
454 For example, downloading and unpacking poky tarballs from 454 For example, downloading and unpacking poky tarballs from
455 :yocto_dl:`/releases/yocto/&DISTRO_REL_TAG;/` 455 :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/`
456 results in a Source Directory whose root folder is named poky. 456 results in a Source Directory whose root folder is named poky.
457 457
458 458
diff --git a/documentation/ref-manual/variables.rst b/documentation/ref-manual/variables.rst
index f694640c00..9406f3548c 100644
--- a/documentation/ref-manual/variables.rst
+++ b/documentation/ref-manual/variables.rst
@@ -143,7 +143,7 @@ system and gives an overview of their function and contents.
143 information on how this variable is used. 143 information on how this variable is used.
144 144
145 :term:`AR` 145 :term:`AR`
146 The minimal command and arguments used to run ``ar``. 146 The minimal command and arguments used to run :manpage:`ar <ar(1)>`.
147 147
148 :term:`ARCHIVER_MODE` 148 :term:`ARCHIVER_MODE`
149 When used with the :ref:`ref-classes-archiver` class, 149 When used with the :ref:`ref-classes-archiver` class,
@@ -165,7 +165,8 @@ system and gives an overview of their function and contents.
165 ``meta/classes/archiver.bbclass`` file in the :term:`Source Directory`. 165 ``meta/classes/archiver.bbclass`` file in the :term:`Source Directory`.
166 166
167 :term:`AS` 167 :term:`AS`
168 Minimal command and arguments needed to run the assembler. 168 Minimal command and arguments needed to run the :manpage:`assembler
169 <as(1)>`.
169 170
170 :term:`ASSUME_PROVIDED` 171 :term:`ASSUME_PROVIDED`
171 Lists recipe names (:term:`PN` values) BitBake does not 172 Lists recipe names (:term:`PN` values) BitBake does not
@@ -209,12 +210,11 @@ system and gives an overview of their function and contents.
209 SRCREV = "${AUTOREV}" 210 SRCREV = "${AUTOREV}"
210 211
211 If you use the previous statement to retrieve the latest version of 212 If you use the previous statement to retrieve the latest version of
212 software, you need to be sure :term:`PV` contains 213 software, you need to make sure :term:`PV` contains the ``+`` sign so
213 ``${``\ :term:`SRCPV`\ ``}``. For example, suppose you have a kernel 214 :term:`bitbake` includes source control information to :term:`PKGV` when
214 recipe that inherits the :ref:`ref-classes-kernel` class and you 215 packaging the recipe. For example::
215 use the previous statement. In this example, ``${SRCPV}`` does not 216
216 automatically get into :term:`PV`. Consequently, you need to change 217 PV = "6.10.y+git"
217 :term:`PV` in your recipe so that it does contain ``${SRCPV}``.
218 218
219 For more information see the 219 For more information see the
220 ":ref:`dev-manual/packages:automatically incrementing a package version number`" 220 ":ref:`dev-manual/packages:automatically incrementing a package version number`"
@@ -225,6 +225,12 @@ system and gives an overview of their function and contents.
225 must set this variable in your recipe. The 225 must set this variable in your recipe. The
226 :ref:`ref-classes-syslinux` class checks this variable. 226 :ref:`ref-classes-syslinux` class checks this variable.
227 227
228 :term:`AUTOTOOLS_SCRIPT_PATH`
229 When using the :ref:`ref-classes-autotools` class, the
230 :term:`AUTOTOOLS_SCRIPT_PATH` variable stores the location of the
231 different scripts used by the Autotools build system. The default
232 value for this variable is :term:`S`.
233
228 :term:`AVAILTUNES` 234 :term:`AVAILTUNES`
229 The list of defined CPU and Application Binary Interface (ABI) 235 The list of defined CPU and Application Binary Interface (ABI)
230 tunings (i.e. "tunes") available for use by the OpenEmbedded build 236 tunings (i.e. "tunes") available for use by the OpenEmbedded build
@@ -972,55 +978,165 @@ system and gives an overview of their function and contents.
972 variable is a useful pointer in case a bug in the software being 978 variable is a useful pointer in case a bug in the software being
973 built needs to be manually reported. 979 built needs to be manually reported.
974 980
981 :term:`BUILD_AR`
982 Specifies the architecture-specific :manpage:`archiver <ar(1)>` for the
983 build host, and its default definition is derived in part from
984 :term:`BUILD_PREFIX`::
985
986 BUILD_AR = "${BUILD_PREFIX}ar"
987
988 When building a :ref:`ref-classes-native` recipe, :term:`AR` is set to the
989 value of this variable by default.
990
991 The :term:`BUILD_AR` variable should not be set manually, and is rarely
992 used in recipes as :term:`AR` contains the appropriate value depending on
993 the context (native or target recipes). Exception be made for target
994 recipes that need to use the :manpage:`archiver <ar(1)>` from the build
995 host at some point during the build.
996
975 :term:`BUILD_ARCH` 997 :term:`BUILD_ARCH`
976 Specifies the architecture of the build host (e.g. ``i686``). The 998 Specifies the architecture of the build host (e.g. ``i686``). The
977 OpenEmbedded build system sets the value of :term:`BUILD_ARCH` from the 999 OpenEmbedded build system sets the value of :term:`BUILD_ARCH` from the
978 machine name reported by the ``uname`` command. 1000 machine name reported by the ``uname`` command.
979 1001
1002 :term:`BUILD_AS`
1003 Specifies the architecture-specific :manpage:`assembler <as(1)>` for the
1004 build host, and its default definition is derived in part from
1005 :term:`BUILD_PREFIX`::
1006
1007 BUILD_AS = "${BUILD_PREFIX}as ${BUILD_AS_ARCH}"
1008
1009 When building a :ref:`ref-classes-native` recipe, :term:`AS` is set to the
1010 value of this variable by default.
1011
1012 The :term:`BUILD_AS` variable should not be set manually, and is rarely
1013 used in recipes as :term:`AS` contains the appropriate value depending on
1014 the context (native or target recipes). Exception be made for target
1015 recipes that need to use the :manpage:`assembler <as(1)>` from the build
1016 host at some point during the build.
1017
980 :term:`BUILD_AS_ARCH` 1018 :term:`BUILD_AS_ARCH`
981 Specifies the architecture-specific assembler flags for the build 1019 Specifies the architecture-specific assembler flags for the build
982 host. By default, the value of :term:`BUILD_AS_ARCH` is empty. 1020 host. By default, the value of :term:`BUILD_AS_ARCH` is empty.
983 1021
1022 :term:`BUILD_CC`
1023 Specifies the architecture-specific C compiler for the build host,
1024 and its default definition is derived in part from :term:`BUILD_PREFIX`
1025 and :term:`BUILD_CC_ARCH`::
1026
1027 BUILD_CC = "${CCACHE}${BUILD_PREFIX}gcc ${BUILD_CC_ARCH}"
1028
1029 When building a :ref:`ref-classes-native` recipe, :term:`CC` is set to the
1030 value of this variable by default.
1031
1032 The :term:`BUILD_CC` variable should not be set manually, and is rarely
1033 used in recipes as :term:`CC` contains the appropriate value depending on
1034 the context (native or target recipes). Exception be made for target
1035 recipes that need to use the compiler from the build host at some point
1036 during the build.
1037
984 :term:`BUILD_CC_ARCH` 1038 :term:`BUILD_CC_ARCH`
985 Specifies the architecture-specific C compiler flags for the build 1039 Specifies the architecture-specific C compiler flags for the build
986 host. By default, the value of :term:`BUILD_CC_ARCH` is empty. 1040 host. By default, the value of :term:`BUILD_CC_ARCH` is empty.
987 1041
988 :term:`BUILD_CCLD` 1042 :term:`BUILD_CCLD`
989 Specifies the linker command to be used for the build host when the C 1043 Specifies the :manpage:`linker <ld(1)>` command to be used for the build
990 compiler is being used as the linker. By default, :term:`BUILD_CCLD` 1044 host when the C compiler is being used as the linker, and its default
991 points to GCC and passes as arguments the value of 1045 definition is derived in part from :term:`BUILD_PREFIX` and
992 :term:`BUILD_CC_ARCH`, assuming 1046 :term:`BUILD_CC_ARCH`::
993 :term:`BUILD_CC_ARCH` is set. 1047
1048 BUILD_CCLD = "${BUILD_PREFIX}gcc ${BUILD_CC_ARCH}"
1049
1050 When building a :ref:`ref-classes-native` recipe, :term:`CCLD` is set to
1051 the value of this variable by default.
1052
1053 The :term:`BUILD_CCLD` variable should not be set manually, and is rarely
1054 used in recipes as :term:`CCLD` contains the appropriate value depending on
1055 the context (native or target recipes). Exception be made for target
1056 recipes that need to use the :manpage:`linker <ld(1)>` from the build host
1057 at some point during the build.
994 1058
995 :term:`BUILD_CFLAGS` 1059 :term:`BUILD_CFLAGS`
996 Specifies the flags to pass to the C compiler when building for the 1060 Specifies the flags to pass to the C compiler when building for the
997 build host. When building in the ``-native`` context, 1061 build host. When building a :ref:`ref-classes-native` recipe,
998 :term:`CFLAGS` is set to the value of this variable by 1062 :term:`CFLAGS` is set to the value of this variable by
999 default. 1063 default.
1000 1064
1065 :term:`BUILD_CPP`
1066 Specifies the C preprocessor command (to both the C and the C++ compilers)
1067 when building for the build host, and its default definition is derived in
1068 part from :term:`BUILD_PREFIX` and :term:`BUILD_CC_ARCH`::
1069
1070 BUILD_CPP = "${BUILD_PREFIX}gcc ${BUILD_CC_ARCH} -E"
1071
1072 When building a :ref:`ref-classes-native` recipe, :term:`CPP` is set to
1073 the value of this variable by default.
1074
1075 The :term:`BUILD_CPP` variable should not be set manually, and is rarely
1076 used in recipes as :term:`CPP` contains the appropriate value depending on
1077 the context (native or target recipes). Exception be made for target
1078 recipes that need to use the preprocessor from the build host at some
1079 point during the build.
1080
1001 :term:`BUILD_CPPFLAGS` 1081 :term:`BUILD_CPPFLAGS`
1002 Specifies the flags to pass to the C preprocessor (i.e. to both the C 1082 Specifies the flags to pass to the C preprocessor (i.e. to both the C
1003 and the C++ compilers) when building for the build host. When 1083 and the C++ compilers) when building for the build host. When
1004 building in the ``-native`` context, :term:`CPPFLAGS` 1084 building in the ``-native`` context, :term:`CPPFLAGS`
1005 is set to the value of this variable by default. 1085 is set to the value of this variable by default.
1006 1086
1087 :term:`BUILD_CXX`
1088 Specifies the architecture-specific C++ compiler for the build host,
1089 and its default definition is derived in part from :term:`BUILD_PREFIX`
1090 and :term:`BUILD_CC_ARCH`::
1091
1092 BUILD_CXX = "${CCACHE}${BUILD_PREFIX}g++ ${BUILD_CC_ARCH}"
1093
1094 When building a :ref:`ref-classes-native` recipe, :term:`CXX` is set to
1095 the value of this variable by default.
1096
1097 The :term:`BUILD_CXX` variable should not be set manually, and is rarely
1098 used in recipes as :term:`CXX` contains the appropriate value depending on
1099 the context (native or target recipes). Exception be made for target
1100 recipes that need to use the C++ compiler from the build host at some
1101 point during the build.
1102
1007 :term:`BUILD_CXXFLAGS` 1103 :term:`BUILD_CXXFLAGS`
1008 Specifies the flags to pass to the C++ compiler when building for the 1104 Specifies the flags to pass to the C++ compiler when building for the
1009 build host. When building in the ``-native`` context, 1105 build host. When building a :ref:`ref-classes-native` recipe,
1010 :term:`CXXFLAGS` is set to the value of this variable 1106 :term:`CXXFLAGS` is set to the value of this variable
1011 by default. 1107 by default.
1012 1108
1013 :term:`BUILD_FC` 1109 :term:`BUILD_FC`
1014 Specifies the Fortran compiler command for the build host. By 1110 Specifies the Fortran compiler command for the build host, and its default
1015 default, :term:`BUILD_FC` points to Gfortran and passes as arguments the 1111 definition is derived in part from :term:`BUILD_PREFIX` and
1016 value of :term:`BUILD_CC_ARCH`, assuming 1112 :term:`BUILD_CC_ARCH`::
1017 :term:`BUILD_CC_ARCH` is set. 1113
1114 BUILD_FC = "${BUILD_PREFIX}gfortran ${BUILD_CC_ARCH}"
1115
1116 When building a :ref:`ref-classes-native` recipe, :term:`FC` is set to the
1117 value of this variable by default.
1118
1119 The :term:`BUILD_FC` variable should not be set manually, and is rarely
1120 used in recipes as :term:`FC` contains the appropriate value depending on
1121 the context (native or target recipes). Exception be made for target
1122 recipes that need to use the Fortran compiler from the build host at some
1123 point during the build.
1018 1124
1019 :term:`BUILD_LD` 1125 :term:`BUILD_LD`
1020 Specifies the linker command for the build host. By default, 1126 Specifies the linker command for the build host, and its default
1021 :term:`BUILD_LD` points to the GNU linker (ld) and passes as arguments 1127 definition is derived in part from :term:`BUILD_PREFIX` and
1022 the value of :term:`BUILD_LD_ARCH`, assuming 1128 :term:`BUILD_LD_ARCH`::
1023 :term:`BUILD_LD_ARCH` is set. 1129
1130 BUILD_LD = "${BUILD_PREFIX}ld ${BUILD_LD_ARCH}"
1131
1132 When building a :ref:`ref-classes-native` recipe, :term:`LD` is set to the
1133 value of this variable by default.
1134
1135 The :term:`BUILD_LD` variable should not be set manually, and is rarely
1136 used in recipes as :term:`LD` contains the appropriate value depending on
1137 the context (native or target recipes). Exception be made for target
1138 recipes that need to use the linker from the build host at some point
1139 during the build.
1024 1140
1025 :term:`BUILD_LD_ARCH` 1141 :term:`BUILD_LD_ARCH`
1026 Specifies architecture-specific linker flags for the build host. By 1142 Specifies architecture-specific linker flags for the build host. By
@@ -1028,10 +1144,58 @@ system and gives an overview of their function and contents.
1028 1144
1029 :term:`BUILD_LDFLAGS` 1145 :term:`BUILD_LDFLAGS`
1030 Specifies the flags to pass to the linker when building for the build 1146 Specifies the flags to pass to the linker when building for the build
1031 host. When building in the ``-native`` context, 1147 host. When building a :ref:`ref-classes-native` recipe,
1032 :term:`LDFLAGS` is set to the value of this variable 1148 :term:`LDFLAGS` is set to the value of this variable
1033 by default. 1149 by default.
1034 1150
1151 :term:`BUILD_NM`
1152 Specifies the architecture-specific utility to list symbols from object
1153 files for the build host, and its default definition is derived in part
1154 from :term:`BUILD_PREFIX`::
1155
1156 BUILD_NM = "${BUILD_PREFIX}nm"
1157
1158 When building a :ref:`ref-classes-native` recipe, :term:`NM` is set to the
1159 value of this variable by default.
1160
1161 The :term:`BUILD_NM` variable should not be set manually, and is rarely
1162 used in recipes as :term:`NM` contains the appropriate value depending on
1163 the context (native or target recipes). Exception be made for target
1164 recipes that need to use the utility from the build host at some point
1165 during the build.
1166
1167 :term:`BUILD_OBJCOPY`
1168 Specifies the architecture-specific utility to copy object files for the
1169 build host, and its default definition is derived in part from
1170 :term:`BUILD_PREFIX`::
1171
1172 BUILD_OBJCOPY = "${BUILD_PREFIX}objcopy"
1173
1174 When building a :ref:`ref-classes-native` recipe, :term:`OBJCOPY` is set
1175 to the value of this variable by default.
1176
1177 The :term:`BUILD_OBJCOPY` variable should not be set manually, and is
1178 rarely used in recipes as :term:`OBJCOPY` contains the appropriate value
1179 depending on the context (native or target recipes). Exception be made for
1180 target recipes that need to use the utility from the build host at some
1181 point during the build.
1182
1183 :term:`BUILD_OBJDUMP`
1184 Specifies the architecture-specific utility to display object files
1185 information for the build host, and its default definition is derived in
1186 part from :term:`BUILD_PREFIX`::
1187
1188 BUILD_OBJDUMP = "${BUILD_PREFIX}objdump"
1189
1190 When building a :ref:`ref-classes-native` recipe, :term:`OBJDUMP` is set
1191 to the value of this variable by default.
1192
1193 The :term:`BUILD_OBJDUMP` variable should not be set manually, and is
1194 rarely used in recipes as :term:`OBJDUMP` contains the appropriate value
1195 depending on the context (native or target recipes). Exception be made for
1196 target recipes that need to use the utility from the build host at some
1197 point during the build.
1198
1035 :term:`BUILD_OPTIMIZATION` 1199 :term:`BUILD_OPTIMIZATION`
1036 Specifies the optimization flags passed to the C compiler when 1200 Specifies the optimization flags passed to the C compiler when
1037 building for the build host or the SDK. The flags are passed through 1201 building for the build host or the SDK. The flags are passed through
@@ -1052,11 +1216,53 @@ system and gives an overview of their function and contents.
1052 build system uses the :term:`BUILD_PREFIX` value to set the 1216 build system uses the :term:`BUILD_PREFIX` value to set the
1053 :term:`TARGET_PREFIX` when building for :ref:`ref-classes-native` recipes. 1217 :term:`TARGET_PREFIX` when building for :ref:`ref-classes-native` recipes.
1054 1218
1219 :term:`BUILD_RANLIB`
1220 Specifies the architecture-specific utility to generate indexes for
1221 archives for the build host, and its default definition is derived in part
1222 from :term:`BUILD_PREFIX`::
1223
1224 BUILD_RANLIB = "${BUILD_PREFIX}ranlib -D"
1225
1226 When building a :ref:`ref-classes-native` recipe, :term:`RANLIB` is set to
1227 the value of this variable by default.
1228
1229 The :term:`BUILD_RANLIB` variable should not be set manually, and is
1230 rarely used in recipes as :term:`RANLIB` contains the appropriate value
1231 depending on the context (native or target recipes). Exception be made for
1232 target recipes that need to use the utility from the build host at some
1233 point during the build.
1234
1235 :term:`BUILD_READELF`
1236 Specifies the architecture-specific utility to display information about
1237 ELF files for the build host, and its default definition is derived in
1238 part from :term:`BUILD_PREFIX`::
1239
1240 BUILD_READELF = "${BUILD_PREFIX}readelf"
1241
1242 When building a :ref:`ref-classes-native` recipe, :term:`READELF` is set
1243 to the value of this variable by default.
1244
1245 The :term:`BUILD_READELF` variable should not be set manually, and is
1246 rarely used in recipes as :term:`READELF` contains the appropriate value
1247 depending on the context (native or target recipes). Exception be made for
1248 target recipes that need to use the utility from the build host at some
1249 point during the build.
1250
1055 :term:`BUILD_STRIP` 1251 :term:`BUILD_STRIP`
1056 Specifies the command to be used to strip debugging symbols from 1252 Specifies the command to be used to strip debugging symbols from binaries
1057 binaries produced for the build host. By default, :term:`BUILD_STRIP` 1253 produced for the build host, and its default definition is derived in part
1058 points to 1254 from :term:`BUILD_PREFIX`::
1059 ``${``\ :term:`BUILD_PREFIX`\ ``}strip``. 1255
1256 BUILD_STRIP = "${BUILD_PREFIX}strip"
1257
1258 When building a :ref:`ref-classes-native` recipe, :term:`STRIP` is set to
1259 the value of this variable by default.
1260
1261 The :term:`BUILD_STRIP` variable should not be set manually, and is
1262 rarely used in recipes as :term:`STRIP` contains the appropriate value
1263 depending on the context (native or target recipes). Exception be made for
1264 target recipes that need to use the utility from the build host at some
1265 point during the build.
1060 1266
1061 :term:`BUILD_SYS` 1267 :term:`BUILD_SYS`
1062 Specifies the system, including the architecture and the operating 1268 Specifies the system, including the architecture and the operating
@@ -1252,6 +1458,10 @@ system and gives an overview of their function and contents.
1252 :term:`CC` 1458 :term:`CC`
1253 The minimal command and arguments used to run the C compiler. 1459 The minimal command and arguments used to run the C compiler.
1254 1460
1461 :term:`CCLD`
1462 The minimal command and arguments used to run the linker when the C
1463 compiler is being used as the linker.
1464
1255 :term:`CFLAGS` 1465 :term:`CFLAGS`
1256 Specifies the flags to pass to the C compiler. This variable is 1466 Specifies the flags to pass to the C compiler. This variable is
1257 exported to an environment variable and thus made visible to the 1467 exported to an environment variable and thus made visible to the
@@ -1495,6 +1705,17 @@ system and gives an overview of their function and contents.
1495 :term:`CONFIGURE_FLAGS` 1705 :term:`CONFIGURE_FLAGS`
1496 The minimal arguments for GNU configure. 1706 The minimal arguments for GNU configure.
1497 1707
1708 :term:`CONFIGURE_SCRIPT`
1709 When using the :ref:`ref-classes-autotools` class, the
1710 :term:`CONFIGURE_SCRIPT` variable stores the location of the ``configure``
1711 script for the Autotools build system. The default definition for this
1712 variable is::
1713
1714 CONFIGURE_SCRIPT ?= "${AUTOTOOLS_SCRIPT_PATH}/configure"
1715
1716 Where :term:`AUTOTOOLS_SCRIPT_PATH` is the location of the of the
1717 Autotools build system scripts, which defaults to :term:`S`.
1718
1498 :term:`CONFLICT_DISTRO_FEATURES` 1719 :term:`CONFLICT_DISTRO_FEATURES`
1499 When inheriting the :ref:`ref-classes-features_check` 1720 When inheriting the :ref:`ref-classes-features_check`
1500 class, this variable identifies distribution features that would be 1721 class, this variable identifies distribution features that would be
@@ -1678,9 +1899,27 @@ system and gives an overview of their function and contents.
1678 variable only in certain contexts (e.g. when building for kernel 1899 variable only in certain contexts (e.g. when building for kernel
1679 and kernel module recipes). 1900 and kernel module recipes).
1680 1901
1902 :term:`CVE_CHECK_CREATE_MANIFEST`
1903 Specifies whether to create a CVE manifest to place in the deploy
1904 directory. The default is "1".
1905
1681 :term:`CVE_CHECK_IGNORE` 1906 :term:`CVE_CHECK_IGNORE`
1682 This variable is deprecated and should be replaced by :term:`CVE_STATUS`. 1907 This variable is deprecated and should be replaced by :term:`CVE_STATUS`.
1683 1908
1909 :term:`CVE_CHECK_MANIFEST_JSON`
1910 Specifies the path to the CVE manifest in JSON format. See
1911 :term:`CVE_CHECK_CREATE_MANIFEST`.
1912
1913 :term:`CVE_CHECK_MANIFEST_JSON_SUFFIX`
1914 Allows to modify the JSON manifest suffix. See
1915 :term:`CVE_CHECK_MANIFEST_JSON`.
1916
1917 :term:`CVE_CHECK_REPORT_PATCHED`
1918 Specifies whether or not the :ref:`ref-classes-cve-check`
1919 class should report patched or ignored CVEs. The default is "1", but you
1920 may wish to set it to "0" if you do not need patched or ignored CVEs in
1921 the logs.
1922
1684 :term:`CVE_CHECK_SHOW_WARNINGS` 1923 :term:`CVE_CHECK_SHOW_WARNINGS`
1685 Specifies whether or not the :ref:`ref-classes-cve-check` 1924 Specifies whether or not the :ref:`ref-classes-cve-check`
1686 class should generate warning messages on the console when unpatched 1925 class should generate warning messages on the console when unpatched
@@ -1960,7 +2199,7 @@ system and gives an overview of their function and contents.
1960 resides within the :term:`Build Directory` as ``${TMPDIR}/deploy``. 2199 resides within the :term:`Build Directory` as ``${TMPDIR}/deploy``.
1961 2200
1962 For more information on the structure of the Build Directory, see 2201 For more information on the structure of the Build Directory, see
1963 ":ref:`ref-manual/structure:the build directory --- \`\`build/\`\``" section. 2202 ":ref:`ref-manual/structure:the build directory --- ``build/```" section.
1964 For more detail on the contents of the ``deploy`` directory, see the 2203 For more detail on the contents of the ``deploy`` directory, see the
1965 ":ref:`overview-manual/concepts:images`", 2204 ":ref:`overview-manual/concepts:images`",
1966 ":ref:`overview-manual/concepts:package feeds`", and 2205 ":ref:`overview-manual/concepts:package feeds`", and
@@ -2002,7 +2241,7 @@ system and gives an overview of their function and contents.
2002 contents of :term:`IMGDEPLOYDIR` by the :ref:`ref-classes-image` class. 2241 contents of :term:`IMGDEPLOYDIR` by the :ref:`ref-classes-image` class.
2003 2242
2004 For more information on the structure of the :term:`Build Directory`, see 2243 For more information on the structure of the :term:`Build Directory`, see
2005 ":ref:`ref-manual/structure:the build directory --- \`\`build/\`\``" section. 2244 ":ref:`ref-manual/structure:the build directory --- ``build/```" section.
2006 For more detail on the contents of the ``deploy`` directory, see the 2245 For more detail on the contents of the ``deploy`` directory, see the
2007 ":ref:`overview-manual/concepts:images`" and 2246 ":ref:`overview-manual/concepts:images`" and
2008 ":ref:`overview-manual/concepts:application development sdk`" sections both in 2247 ":ref:`overview-manual/concepts:application development sdk`" sections both in
@@ -2501,6 +2740,13 @@ system and gives an overview of their function and contents.
2501 external tools. See the :ref:`ref-classes-kernel-yocto` class in 2740 external tools. See the :ref:`ref-classes-kernel-yocto` class in
2502 ``meta/classes-recipe`` to see how the variable is used. 2741 ``meta/classes-recipe`` to see how the variable is used.
2503 2742
2743 :term:`EXTERNAL_KERNEL_DEVICETREE`
2744 When inheriting :ref:`ref-classes-kernel-fitimage` and a
2745 :term:`PREFERRED_PROVIDER` for ``virtual/dtb`` set to ``devicetree``, the
2746 variable :term:`EXTERNAL_KERNEL_DEVICETREE` can be used to specify a
2747 directory containing one or more compiled device tree or device tree
2748 overlays to use.
2749
2504 :term:`KERNEL_LOCALVERSION` 2750 :term:`KERNEL_LOCALVERSION`
2505 This variable allows to append a string to the version 2751 This variable allows to append a string to the version
2506 of the kernel image. This corresponds to the ``CONFIG_LOCALVERSION`` 2752 of the kernel image. This corresponds to the ``CONFIG_LOCALVERSION``
@@ -2744,6 +2990,9 @@ system and gives an overview of their function and contents.
2744 :term:`FAKEROOTNOENV` 2990 :term:`FAKEROOTNOENV`
2745 See :term:`bitbake:FAKEROOTNOENV` in the BitBake manual. 2991 See :term:`bitbake:FAKEROOTNOENV` in the BitBake manual.
2746 2992
2993 :term:`FC`
2994 The minimal command and arguments used to run the Fortran compiler.
2995
2747 :term:`FEATURE_PACKAGES` 2996 :term:`FEATURE_PACKAGES`
2748 Defines one or more packages to include in an image when a specific 2997 Defines one or more packages to include in an image when a specific
2749 item is included in :term:`IMAGE_FEATURES`. 2998 item is included in :term:`IMAGE_FEATURES`.
@@ -3323,6 +3572,20 @@ system and gives an overview of their function and contents.
3323 - mips 3572 - mips
3324 - mipsel 3573 - mipsel
3325 3574
3575 :term:`HOST_AS_ARCH`
3576 Specifies architecture-specific assembler flags.
3577
3578 Default initialization for :term:`HOST_AS_ARCH` varies depending on what
3579 is being built:
3580
3581 - :term:`TARGET_AS_ARCH` when building for the
3582 target
3583
3584 - :term:`BUILD_AS_ARCH` when building for the build host (i.e.
3585 ``-native``)
3586
3587 - :term:`SDK_AS_ARCH` when building for an SDK (i.e. ``nativesdk-``)
3588
3326 :term:`HOST_CC_ARCH` 3589 :term:`HOST_CC_ARCH`
3327 Specifies architecture-specific compiler flags that are passed to the 3590 Specifies architecture-specific compiler flags that are passed to the
3328 C compiler. 3591 C compiler.
@@ -3336,8 +3599,20 @@ system and gives an overview of their function and contents.
3336 - :term:`BUILD_CC_ARCH` when building for the build host (i.e. 3599 - :term:`BUILD_CC_ARCH` when building for the build host (i.e.
3337 ``-native``) 3600 ``-native``)
3338 3601
3339 - ``BUILDSDK_CC_ARCH`` when building for an SDK (i.e. 3602 - :term:`SDK_CC_ARCH` when building for an SDK (i.e. ``nativesdk-``)
3340 ``nativesdk-``) 3603
3604 :term:`HOST_LD_ARCH`
3605 Specifies architecture-specific linker flags.
3606
3607 Default initialization for :term:`HOST_LD_ARCH` varies depending on what
3608 is being built:
3609
3610 - :term:`TARGET_LD_ARCH` when building for the target
3611
3612 - :term:`BUILD_LD_ARCH` when building for the build host (i.e.
3613 ``-native``)
3614
3615 - :term:`SDK_LD_ARCH` when building for an SDK (i.e. ``nativesdk-``)
3341 3616
3342 :term:`HOST_OS` 3617 :term:`HOST_OS`
3343 Specifies the name of the target operating system, which is normally 3618 Specifies the name of the target operating system, which is normally
@@ -3878,6 +4153,36 @@ system and gives an overview of their function and contents.
3878 4153
3879 IMAGE_ROOTFS_EXTRA_SPACE = "41943040" 4154 IMAGE_ROOTFS_EXTRA_SPACE = "41943040"
3880 4155
4156 :term:`IMAGE_ROOTFS_MAXSIZE`
4157 Defines the maximum allowed size of the generated image in kilobytes.
4158 The build will fail if the generated image size exceeds this value.
4159
4160 The generated image size undergoes several calculation steps before being
4161 compared to :term:`IMAGE_ROOTFS_MAXSIZE`.
4162 In the first step, the size of the directory pointed to by :term:`IMAGE_ROOTFS`
4163 is calculated.
4164 In the second step, the result from the first step is multiplied
4165 by :term:`IMAGE_OVERHEAD_FACTOR`.
4166 In the third step, the result from the second step is compared with
4167 :term:`IMAGE_ROOTFS_SIZE`. The larger value of these is added to
4168 :term:`IMAGE_ROOTFS_EXTRA_SPACE`.
4169 In the fourth step, the result from the third step is checked for
4170 a decimal part. If it has one, it is rounded up to the next integer.
4171 If it does not, it is simply converted into an integer.
4172 In the fifth step, the :term:`IMAGE_ROOTFS_ALIGNMENT` is added to the result
4173 from the fourth step and "1" is subtracted.
4174 In the sixth step, the remainder of the division between the result
4175 from the fifth step and :term:`IMAGE_ROOTFS_ALIGNMENT` is subtracted from the
4176 result of the fifth step. In this way, the result from the fourth step is
4177 rounded up to the nearest multiple of :term:`IMAGE_ROOTFS_ALIGNMENT`.
4178
4179 Thus, if the :term:`IMAGE_ROOTFS_MAXSIZE` is set, is compared with the result
4180 of the above calculations and is independent of the final image type.
4181 No default value is set for :term:`IMAGE_ROOTFS_MAXSIZE`.
4182
4183 It's a good idea to set this variable for images that need to fit on a limited
4184 space (e.g. SD card, a fixed-size partition, ...).
4185
3881 :term:`IMAGE_ROOTFS_SIZE` 4186 :term:`IMAGE_ROOTFS_SIZE`
3882 Defines the size in Kbytes for the generated image. The OpenEmbedded 4187 Defines the size in Kbytes for the generated image. The OpenEmbedded
3883 build system determines the final size for the generated image using 4188 build system determines the final size for the generated image using
@@ -4059,6 +4364,23 @@ system and gives an overview of their function and contents.
4059 Set the variable to "1" to prevent the default dependencies from 4364 Set the variable to "1" to prevent the default dependencies from
4060 being added. 4365 being added.
4061 4366
4367 :term:`INHIBIT_DEFAULT_RUST_DEPS`
4368 Prevents the :ref:`ref-classes-rust` class from automatically adding
4369 its default build-time dependencies.
4370
4371 When a recipe inherits the :ref:`ref-classes-rust` class, several
4372 tools such as ``rust-native`` and ``${RUSTLIB_DEP}`` (only added when cross-compiling) are added
4373 to :term:`DEPENDS` to support the ``rust`` build process.
4374
4375 To prevent the build system from adding these dependencies automatically,
4376 set the :term:`INHIBIT_DEFAULT_RUST_DEPS` variable as follows::
4377
4378 INHIBIT_DEFAULT_RUST_DEPS = "1"
4379
4380 By default, the value of :term:`INHIBIT_DEFAULT_RUST_DEPS` is empty. Setting
4381 it to "0" does not disable inhibition. Only the empty string will disable
4382 inhibition.
4383
4062 :term:`INHIBIT_PACKAGE_DEBUG_SPLIT` 4384 :term:`INHIBIT_PACKAGE_DEBUG_SPLIT`
4063 Prevents the OpenEmbedded build system from splitting out debug 4385 Prevents the OpenEmbedded build system from splitting out debug
4064 information during packaging. By default, the build system splits out 4386 information during packaging. By default, the build system splits out
@@ -4105,6 +4427,25 @@ system and gives an overview of their function and contents.
4105 even if the toolchain's binaries are strippable, there are other files 4427 even if the toolchain's binaries are strippable, there are other files
4106 needed for the build that are not strippable. 4428 needed for the build that are not strippable.
4107 4429
4430 :term:`INHIBIT_UPDATERCD_BBCLASS`
4431 Prevents the :ref:`ref-classes-update-rc.d` class from automatically
4432 installing and registering SysV init scripts for packages.
4433
4434 When a recipe inherits the :ref:`ref-classes-update-rc.d` class, init
4435 scripts are typically installed and registered for the packages listed in
4436 :term:`INITSCRIPT_PACKAGES`. This ensures that the relevant
4437 services are started and stopped at the appropriate runlevels using the
4438 traditional SysV init system.
4439
4440 To prevent the build system from adding these scripts and configurations
4441 automatically, set the :term:`INHIBIT_UPDATERCD_BBCLASS` variable as follows::
4442
4443 INHIBIT_UPDATERCD_BBCLASS = "1"
4444
4445 By default, the value of :term:`INHIBIT_UPDATERCD_BBCLASS` is empty. Setting
4446 it to "0" does not disable inhibition. Only the empty string will disable
4447 inhibition.
4448
4108 :term:`INIT_MANAGER` 4449 :term:`INIT_MANAGER`
4109 Specifies the system init manager to use. Available options are: 4450 Specifies the system init manager to use. Available options are:
4110 4451
@@ -4271,6 +4612,20 @@ system and gives an overview of their function and contents.
4271 See the :term:`MACHINE` variable for additional 4612 See the :term:`MACHINE` variable for additional
4272 information. 4613 information.
4273 4614
4615 :term:`INITRAMFS_MAXSIZE`
4616 Defines the maximum allowed size of the :term:`Initramfs` image in Kbytes.
4617 The build will fail if the :term:`Initramfs` image size exceeds this value.
4618
4619 The :term:`Initramfs` image size undergoes several calculation steps before
4620 being compared to :term:`INITRAMFS_MAXSIZE`.
4621 These steps are the same as those used for :term:`IMAGE_ROOTFS_MAXSIZE`
4622 and are described in detail in that entry.
4623
4624 Thus, :term:`INITRAMFS_MAXSIZE` is compared with the result of the calculations
4625 and is independent of the final image type (e.g. compressed).
4626 A default value for :term:`INITRAMFS_MAXSIZE` is set in
4627 :oe_git:`meta/conf/bitbake.conf </openembedded-core/tree/meta/conf/bitbake.conf>`.
4628
4274 :term:`INITRAMFS_MULTICONFIG` 4629 :term:`INITRAMFS_MULTICONFIG`
4275 Defines the multiconfig to create a multiconfig dependency to be used by 4630 Defines the multiconfig to create a multiconfig dependency to be used by
4276 the :ref:`ref-classes-kernel` class. 4631 the :ref:`ref-classes-kernel` class.
@@ -4336,8 +4691,7 @@ system and gives an overview of their function and contents.
4336 4691
4337 The value in :term:`INITSCRIPT_PARAMS` is passed through to the 4692 The value in :term:`INITSCRIPT_PARAMS` is passed through to the
4338 ``update-rc.d`` command. For more information on valid parameters, 4693 ``update-rc.d`` command. For more information on valid parameters,
4339 please see the ``update-rc.d`` manual page at 4694 please see the manual page: :manpage:`update-rc.d <update-rc.d(8)>`.
4340 https://manpages.debian.org/buster/init-system-helpers/update-rc.d.8.en.html
4341 4695
4342 :term:`INSANE_SKIP` 4696 :term:`INSANE_SKIP`
4343 Specifies the QA checks to skip for a specific package within a 4697 Specifies the QA checks to skip for a specific package within a
@@ -4454,15 +4808,8 @@ system and gives an overview of their function and contents.
4454 options not explicitly specified will be disabled in the kernel 4808 options not explicitly specified will be disabled in the kernel
4455 config. 4809 config.
4456 4810
4457 In case :term:`KCONFIG_MODE` is not set the behaviour will depend on where 4811 In case :term:`KCONFIG_MODE` is not set the ``defconfig`` file
4458 the ``defconfig`` file is coming from. An "in-tree" ``defconfig`` file 4812 will be handled in ``allnoconfig`` mode.
4459 will be handled in ``alldefconfig`` mode, a ``defconfig`` file placed
4460 in ``${WORKDIR}`` through a meta-layer will be handled in
4461 ``allnoconfig`` mode.
4462
4463 An "in-tree" ``defconfig`` file can be selected via the
4464 :term:`KBUILD_DEFCONFIG` variable. :term:`KCONFIG_MODE` does not need to
4465 be explicitly set.
4466 4813
4467 A ``defconfig`` file compatible with ``allnoconfig`` mode can be 4814 A ``defconfig`` file compatible with ``allnoconfig`` mode can be
4468 generated by copying the ``.config`` file from a working Linux kernel 4815 generated by copying the ``.config`` file from a working Linux kernel
@@ -4906,7 +5253,8 @@ system and gives an overview of their function and contents.
4906 ``LAYERVERSION_mylayer``). 5253 ``LAYERVERSION_mylayer``).
4907 5254
4908 :term:`LD` 5255 :term:`LD`
4909 The minimal command and arguments used to run the linker. 5256 The minimal command and arguments used to run the :manpage:`linker
5257 <ld(1)>`.
4910 5258
4911 :term:`LDFLAGS` 5259 :term:`LDFLAGS`
4912 Specifies the flags to pass to the linker. This variable is exported 5260 Specifies the flags to pass to the linker. This variable is exported
@@ -5084,7 +5432,7 @@ system and gives an overview of their function and contents.
5084 The :term:`LINUX_VERSION` variable is used to define :term:`PV` 5432 The :term:`LINUX_VERSION` variable is used to define :term:`PV`
5085 for the recipe:: 5433 for the recipe::
5086 5434
5087 PV = "${LINUX_VERSION}+git${SRCPV}" 5435 PV = "${LINUX_VERSION}+git"
5088 5436
5089 :term:`LINUX_VERSION_EXTENSION` 5437 :term:`LINUX_VERSION_EXTENSION`
5090 A string extension compiled into the version string of the Linux 5438 A string extension compiled into the version string of the Linux
@@ -5512,7 +5860,7 @@ system and gives an overview of their function and contents.
5512 variable is set. 5860 variable is set.
5513 5861
5514 :term:`NM` 5862 :term:`NM`
5515 The minimal command and arguments to run ``nm``. 5863 The minimal command and arguments to run :manpage:`nm <nm(1)>`.
5516 5864
5517 :term:`NO_GENERIC_LICENSE` 5865 :term:`NO_GENERIC_LICENSE`
5518 Avoids QA errors when you use a non-common, non-CLOSED license in a 5866 Avoids QA errors when you use a non-common, non-CLOSED license in a
@@ -5586,10 +5934,10 @@ system and gives an overview of their function and contents.
5586 NON_MULTILIB_RECIPES = "grub grub-efi make-mod-scripts ovmf u-boot" 5934 NON_MULTILIB_RECIPES = "grub grub-efi make-mod-scripts ovmf u-boot"
5587 5935
5588 :term:`OBJCOPY` 5936 :term:`OBJCOPY`
5589 The minimal command and arguments to run ``objcopy``. 5937 The minimal command and arguments to run :manpage:`objcopy <objcopy(1)>`.
5590 5938
5591 :term:`OBJDUMP` 5939 :term:`OBJDUMP`
5592 The minimal command and arguments to run ``objdump``. 5940 The minimal command and arguments to run :manpage:`objdump <objdump(1)>`.
5593 5941
5594 :term:`OE_BINCONFIG_EXTRA_MANGLE` 5942 :term:`OE_BINCONFIG_EXTRA_MANGLE`
5595 When inheriting the :ref:`ref-classes-binconfig` class, 5943 When inheriting the :ref:`ref-classes-binconfig` class,
@@ -5614,14 +5962,6 @@ system and gives an overview of their function and contents.
5614 5962
5615 OECMAKE_GENERATOR = "Unix Makefiles" 5963 OECMAKE_GENERATOR = "Unix Makefiles"
5616 5964
5617 :term:`OE_IMPORTS`
5618 An internal variable used to tell the OpenEmbedded build system what
5619 Python modules to import for every Python function run by the system.
5620
5621 .. note::
5622
5623 Do not set this variable. It is for internal use only.
5624
5625 :term:`OE_INIT_ENV_SCRIPT` 5965 :term:`OE_INIT_ENV_SCRIPT`
5626 The name of the build environment setup script for the purposes of 5966 The name of the build environment setup script for the purposes of
5627 setting up the environment within the extensible SDK. The default 5967 setting up the environment within the extensible SDK. The default
@@ -5684,6 +6024,13 @@ system and gives an overview of their function and contents.
5684 :term:`OPKG_MAKE_INDEX_EXTRA_PARAMS` 6024 :term:`OPKG_MAKE_INDEX_EXTRA_PARAMS`
5685 Specifies extra parameters for the ``opkg-make-index`` command. 6025 Specifies extra parameters for the ``opkg-make-index`` command.
5686 6026
6027 :term:`OPKGBUILDCMD`
6028 The variable :term:`OPKGBUILDCMD` specifies the command used to build opkg
6029 packages when using the :ref:`ref-classes-package_ipk` class. It is
6030 defined in :ref:`ref-classes-package_ipk` as::
6031
6032 OPKGBUILDCMD ??= 'opkg-build -Z zstd -a "${ZSTD_DEFAULTS}"'
6033
5687 :term:`OVERLAYFS_ETC_DEVICE` 6034 :term:`OVERLAYFS_ETC_DEVICE`
5688 When the :ref:`ref-classes-overlayfs-etc` class is 6035 When the :ref:`ref-classes-overlayfs-etc` class is
5689 inherited, specifies the device to be mounted for the read/write 6036 inherited, specifies the device to be mounted for the read/write
@@ -6450,7 +6797,7 @@ system and gives an overview of their function and contents.
6450 For examples of how this data is used, see the 6797 For examples of how this data is used, see the
6451 ":ref:`overview-manual/concepts:automatically added runtime dependencies`" 6798 ":ref:`overview-manual/concepts:automatically added runtime dependencies`"
6452 section in the Yocto Project Overview and Concepts Manual and the 6799 section in the Yocto Project Overview and Concepts Manual and the
6453 ":ref:`dev-manual/debugging:viewing package information with \`\`oe-pkgdata-util\`\``" 6800 ":ref:`dev-manual/debugging:viewing package information with ``oe-pkgdata-util```"
6454 section in the Yocto Project Development Tasks Manual. For more 6801 section in the Yocto Project Development Tasks Manual. For more
6455 information on the shared, global-state directory, see 6802 information on the shared, global-state directory, see
6456 :term:`STAGING_DIR_HOST`. 6803 :term:`STAGING_DIR_HOST`.
@@ -6491,6 +6838,23 @@ system and gives an overview of their function and contents.
6491 The version of the package(s) built by the recipe. By default, 6838 The version of the package(s) built by the recipe. By default,
6492 :term:`PKGV` is set to :term:`PV`. 6839 :term:`PKGV` is set to :term:`PV`.
6493 6840
6841 If :term:`PV` contains the ``+`` sign, source control information will be
6842 included in :term:`PKGV` later in the packaging phase. For more
6843 information, see the :doc:`/dev-manual/external-scm` section of the Yocto
6844 Project Development Tasks Manual.
6845
6846 .. warning::
6847
6848 Since source control information is included in a late stage by the
6849 :ref:`ref-classes-package` class, it cannot be seen from the BitBake
6850 environment with ``bitbake -e`` or ``bitbake-getvar``. Instead, after
6851 the package is built, the version information can be retrieved with
6852 ``oe-pkgdata-util package-info <package name>``. See the
6853 :ref:`dev-manual/debugging:Viewing Package Information with
6854 ``oe-pkgdata-util``` section of the Yocto Project Development Tasks
6855 Manual for more information on ``oe-pkgdata-util``.
6856
6857
6494 :term:`PN` 6858 :term:`PN`
6495 This variable can have two separate functions depending on the 6859 This variable can have two separate functions depending on the
6496 context: a recipe name or a resulting package name. 6860 context: a recipe name or a resulting package name.
@@ -6625,22 +6989,14 @@ system and gives an overview of their function and contents.
6625 string. You cannot use the wildcard character in any other 6989 string. You cannot use the wildcard character in any other
6626 location of the string. 6990 location of the string.
6627 6991
6628 The specified version is matched against :term:`PV`, which 6992 The specified version is matched against :term:`PV`, which does not
6629 does not necessarily match the version part of the recipe's filename. 6993 necessarily match the version part of the recipe's filename.
6630 For example, consider two recipes ``foo_1.2.bb`` and ``foo_git.bb``
6631 where ``foo_git.bb`` contains the following assignment::
6632
6633 PV = "1.1+git${SRCPV}"
6634
6635 In this case, the correct way to select
6636 ``foo_git.bb`` is by using an assignment such as the following::
6637
6638 PREFERRED_VERSION_foo = "1.1+git%"
6639 6994
6640 Compare that previous example 6995 If you want to select a recipe named ``foo_git.bb`` which has :term:`PV`
6641 against the following incorrect example, which does not work:: 6996 set to ``1.2.3+git``, you can do so by setting ```PREFERRED_VERSION_foo``
6642 6997 to ``1.2.3%`` (i.e. simply setting ``PREFERRED_VERSION_foo`` to ``git``
6643 PREFERRED_VERSION_foo = "git" 6998 will not work as the name of the recipe isn't used, but rather its
6999 :term:`PV` definition).
6644 7000
6645 Sometimes the :term:`PREFERRED_VERSION` variable can be set by 7001 Sometimes the :term:`PREFERRED_VERSION` variable can be set by
6646 configuration files in a way that is hard to change. You can use 7002 configuration files in a way that is hard to change. You can use
@@ -6805,7 +7161,7 @@ system and gives an overview of their function and contents.
6805 7161
6806 :term:`PTEST_ENABLED` 7162 :term:`PTEST_ENABLED`
6807 Specifies whether or not :ref:`Package 7163 Specifies whether or not :ref:`Package
6808 Test <dev-manual/packages:testing packages with ptest>` (ptest) 7164 Test <test-manual/ptest:testing packages with ptest>` (ptest)
6809 functionality is enabled when building a recipe. You should not set 7165 functionality is enabled when building a recipe. You should not set
6810 this variable directly. Enabling and disabling building Package Tests 7166 this variable directly. Enabling and disabling building Package Tests
6811 at build time should be done by adding "ptest" to (or removing it 7167 at build time should be done by adding "ptest" to (or removing it
@@ -6862,7 +7218,7 @@ system and gives an overview of their function and contents.
6862 QA_EMPTY_DIRS_RECOMMENDATION:/dev = "but all devices must be created at runtime" 7218 QA_EMPTY_DIRS_RECOMMENDATION:/dev = "but all devices must be created at runtime"
6863 7219
6864 :term:`RANLIB` 7220 :term:`RANLIB`
6865 The minimal command and arguments to run ``ranlib``. 7221 The minimal command and arguments to run :manpage:`ranlib <ranlib(1)>`.
6866 7222
6867 :term:`RCONFLICTS` 7223 :term:`RCONFLICTS`
6868 The list of packages that conflict with packages. Note that packages 7224 The list of packages that conflict with packages. Note that packages
@@ -6999,6 +7355,9 @@ system and gives an overview of their function and contents.
6999 ":ref:`bitbake-user-manual/bitbake-user-manual-execution:dependencies`" sections in the 7355 ":ref:`bitbake-user-manual/bitbake-user-manual-execution:dependencies`" sections in the
7000 BitBake User Manual for additional information on tasks and dependencies. 7356 BitBake User Manual for additional information on tasks and dependencies.
7001 7357
7358 :term:`READELF`
7359 The minimal command and arguments to run :manpage:`readelf <readelf(1)>`.
7360
7002 :term:`RECIPE_MAINTAINER` 7361 :term:`RECIPE_MAINTAINER`
7003 This variable defines the name and e-mail address of the maintainer of a 7362 This variable defines the name and e-mail address of the maintainer of a
7004 recipe. Such information can be used by human users submitted changes, 7363 recipe. Such information can be used by human users submitted changes,
@@ -7093,17 +7452,12 @@ system and gives an overview of their function and contents.
7093 prefer to have a read-only root filesystem and prefer to keep 7452 prefer to have a read-only root filesystem and prefer to keep
7094 writeable data in one place. 7453 writeable data in one place.
7095 7454
7096 You can override the default by setting the variable in any layer or 7455 When setting ``INIT_MANAGER = systemd``, the default will be set to::
7097 in the ``local.conf`` file. Because the default is set using a "weak"
7098 assignment (i.e. "??="), you can use either of the following forms to
7099 define your override::
7100 7456
7101 ROOT_HOME = "/root"
7102 ROOT_HOME ?= "/root" 7457 ROOT_HOME ?= "/root"
7103 7458
7104 These 7459 You can also override the default by setting the variable in your distro
7105 override examples use ``/root``, which is probably the most commonly 7460 configuration or in the ``local.conf`` file.
7106 used override.
7107 7461
7108 :term:`ROOTFS` 7462 :term:`ROOTFS`
7109 Indicates a filesystem image to include as the root filesystem. 7463 Indicates a filesystem image to include as the root filesystem.
@@ -7348,11 +7702,21 @@ system and gives an overview of their function and contents.
7348 7702
7349 Only one archive type can be specified. 7703 Only one archive type can be specified.
7350 7704
7705 :term:`SDK_AS_ARCH`
7706 Specifies architecture-specific assembler flags when building
7707 :ref:`ref-classes-nativesdk` recipes. By default, the value of
7708 :term:`SDK_AS_ARCH` equals the one of :term:`BUILD_AS_ARCH`.
7709
7351 :term:`SDK_BUILDINFO_FILE` 7710 :term:`SDK_BUILDINFO_FILE`
7352 When using the :ref:`ref-classes-image-buildinfo` class, 7711 When using the :ref:`ref-classes-image-buildinfo` class,
7353 specifies the file in the SDK to write the build information into. The 7712 specifies the file in the SDK to write the build information into. The
7354 default value is "``/buildinfo``". 7713 default value is "``/buildinfo``".
7355 7714
7715 :term:`SDK_CC_ARCH`
7716 Specifies the architecture-specific C compiler flags when building
7717 :ref:`ref-classes-nativesdk` recipes. By default, the value of
7718 :term:`SDK_CC_ARCH` equals the one of :term:`BUILD_CC_ARCH`.
7719
7356 :term:`SDK_CUSTOM_TEMPLATECONF` 7720 :term:`SDK_CUSTOM_TEMPLATECONF`
7357 When building the extensible SDK, if :term:`SDK_CUSTOM_TEMPLATECONF` is set to 7721 When building the extensible SDK, if :term:`SDK_CUSTOM_TEMPLATECONF` is set to
7358 "1" and a ``conf/templateconf.cfg`` file exists in the :term:`Build Directory` 7722 "1" and a ``conf/templateconf.cfg`` file exists in the :term:`Build Directory`
@@ -7434,6 +7798,11 @@ system and gives an overview of their function and contents.
7434 :term:`SDK_EXT_TYPE` is set to "minimal", and defaults to "1" if 7798 :term:`SDK_EXT_TYPE` is set to "minimal", and defaults to "1" if
7435 :term:`SDK_EXT_TYPE` is set to "full". 7799 :term:`SDK_EXT_TYPE` is set to "full".
7436 7800
7801 :term:`SDK_LD_ARCH`
7802 Specifies architecture-specific linker flags when building
7803 :ref:`ref-classes-nativesdk` recipes. By default, the value of
7804 :term:`SDK_LD_ARCH` equals the one of :term:`BUILD_LD_ARCH`.
7805
7437 :term:`SDK_NAME` 7806 :term:`SDK_NAME`
7438 The base name for SDK output files. The default value (as set in 7807 The base name for SDK output files. The default value (as set in
7439 ``meta-poky/conf/distro/poky.conf``) is derived from the 7808 ``meta-poky/conf/distro/poky.conf``) is derived from the
@@ -7725,6 +8094,53 @@ system and gives an overview of their function and contents.
7725 might break at runtime if the interface of the recipe was changed 8094 might break at runtime if the interface of the recipe was changed
7726 after the other had been built. 8095 after the other had been built.
7727 8096
8097 :term:`SIGGEN_LOCKEDSIGS`
8098 The list of locked tasks, with the form::
8099
8100 SIGGEN_LOCKEDSIGS += "<package>:<task>:<signature>"
8101
8102 If ``<signature>`` exists for the specified ``<task>`` and ``<package>``
8103 in the sstate cache, BitBake will use the cached output instead of
8104 rebuilding the ``<task>``. If it does not exist, BitBake will build the
8105 ``<task>`` and the sstate cache will be used next time.
8106
8107 Example::
8108
8109 SIGGEN_LOCKEDSIGS += "bc:do_compile:09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0"
8110
8111 You can obtain the signature of all the tasks for the recipe ``bc`` using::
8112
8113 bitbake -S none bc
8114
8115 Then you can look at files in ``build/tmp/stamps/<arch>/bc`` and look for
8116 files like: ``<PV>.do_compile.sigdata.09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0``.
8117
8118 Alternatively, you can also use :doc:`bblock </dev-manual/bblock>` to
8119 generate this line for you.
8120
8121 :term:`SIGGEN_LOCKEDSIGS_TASKSIG_CHECK`
8122 Specifies the debug level of task signature check. 3 levels are supported:
8123
8124 * ``info``: displays a "Note" message to remind the user that a task is locked
8125 and the current signature matches the locked one.
8126 * ``warn``: displays a "Warning" message if a task is locked and the current
8127 signature does not match the locked one.
8128 * ``error``: same as warn but displays an "Error" message and aborts.
8129
8130 :term:`SIGGEN_LOCKEDSIGS_TYPES`
8131 Allowed overrides for :term:`SIGGEN_LOCKEDSIGS`. This is mainly used
8132 for architecture specific locks. A common value for
8133 :term:`SIGGEN_LOCKEDSIGS_TYPES` is ``${PACKAGE_ARCHS}``::
8134
8135 SIGGEN_LOCKEDSIGS_TYPES += "${PACKAGE_ARCHS}"
8136
8137 SIGGEN_LOCKEDSIGS_core2-64 += "bc:do_compile:09772aa4532512baf96d433484f27234d4b7c11dd9cda0d6f56fa1b7ce6f25f0"
8138 SIGGEN_LOCKEDSIGS_cortexa57 += "bc:do_compile:12178eb6d55ef602a8fe638e49862fd247e07b228f0f08967697b655bfe4bb61"
8139
8140 Here, the ``do_compile`` task from ``bc`` will be locked only for
8141 ``core2-64`` and ``cortexa57`` but not for other architectures such as
8142 ``mips32r2``.
8143
7728 :term:`SITEINFO_BITS` 8144 :term:`SITEINFO_BITS`
7729 Specifies the number of bits for the target system CPU. The value 8145 Specifies the number of bits for the target system CPU. The value
7730 should be either "32" or "64". 8146 should be either "32" or "64".
@@ -7835,6 +8251,31 @@ system and gives an overview of their function and contents.
7835 8251
7836 You can specify only a single URL in :term:`SOURCE_MIRROR_URL`. 8252 You can specify only a single URL in :term:`SOURCE_MIRROR_URL`.
7837 8253
8254 .. note::
8255
8256 If the mirror is protected behind a username and password, the
8257 :term:`build host` needs to be configured so the :term:`build system
8258 <OpenEmbedded Build System>` is able to fetch from the mirror.
8259
8260 The recommended way to do that is by setting the following parameters
8261 in ``$HOME/.netrc`` (``$HOME`` being the :term:`build host` home
8262 directory)::
8263
8264 machine example.com
8265 login <user>
8266 password <password>
8267
8268 This file requires permissions set to ``400`` or ``600`` to prevent
8269 other users from reading the file::
8270
8271 chmod 600 "$HOME/.netrc"
8272
8273 Another method to configure the username and password is from the URL
8274 in :term:`SOURCE_MIRROR_URL` directly, with the ``user`` and ``pswd``
8275 parameters::
8276
8277 SOURCE_MIRROR_URL = "http://example.com/my_source_mirror;user=<user>;pswd=<password>"
8278
7838 :term:`SPDX_ARCHIVE_PACKAGED` 8279 :term:`SPDX_ARCHIVE_PACKAGED`
7839 This option allows to add to :term:`SPDX` output compressed archives 8280 This option allows to add to :term:`SPDX` output compressed archives
7840 of the files in the generated target packages. 8281 of the files in the generated target packages.
@@ -8009,7 +8450,7 @@ system and gives an overview of their function and contents.
8009 class. 8450 class.
8010 8451
8011 :term:`SPL_SIGN_KEYNAME` 8452 :term:`SPL_SIGN_KEYNAME`
8012 The name of keys used by the :ref:`ref-classes-kernel-fitimage` class 8453 The name of keys used by the :ref:`ref-classes-uboot-sign` class
8013 for signing U-Boot FIT image stored in the :term:`SPL_SIGN_KEYDIR` 8454 for signing U-Boot FIT image stored in the :term:`SPL_SIGN_KEYDIR`
8014 directory. If we have for example a ``dev.key`` key and a ``dev.crt`` 8455 directory. If we have for example a ``dev.key`` key and a ``dev.crt``
8015 certificate stored in the :term:`SPL_SIGN_KEYDIR` directory, you will 8456 certificate stored in the :term:`SPL_SIGN_KEYDIR` directory, you will
@@ -8115,21 +8556,23 @@ system and gives an overview of their function and contents.
8115 (SCM). 8556 (SCM).
8116 8557
8117 :term:`SRCPV` 8558 :term:`SRCPV`
8118 Returns the version string of the current package. This string is 8559 The variable :term:`SRCPV` is deprecated. It was previously used to
8119 used to help define the value of :term:`PV`. 8560 include source control information in :term:`PV` for :term:`bitbake` to
8561 work correctly but this is no longer a requirement. Source control
8562 information will be automatically included by :term:`bitbake` in the
8563 variable :term:`PKGV` during packaging if the ``+`` sign is present in
8564 :term:`PV`.
8120 8565
8121 The :term:`SRCPV` variable is defined in the ``meta/conf/bitbake.conf`` 8566 .. note::
8122 configuration file in the :term:`Source Directory` as
8123 follows::
8124 8567
8125 SRCPV = "${@bb.fetch2.get_srcrev(d)}" 8568 The :term:`SRCPV` variable used to be defined in the
8569 ``meta/conf/bitbake.conf`` configuration file in the :term:`Source
8570 Directory` as follows::
8126 8571
8127 Recipes that need to define :term:`PV` do so with the help of the 8572 SRCPV = "${@bb.fetch2.get_srcrev(d)}"
8128 :term:`SRCPV`. For example, the ``ofono`` recipe (``ofono_git.bb``)
8129 located in ``meta/recipes-connectivity`` in the Source Directory
8130 defines :term:`PV` as follows::
8131 8573
8132 PV = "0.12-git${SRCPV}" 8574 The ``get_srcrev`` function can still be used to include source control
8575 information in variables manually.
8133 8576
8134 :term:`SRCREV` 8577 :term:`SRCREV`
8135 The revision of the source code used to build the package. This 8578 The revision of the source code used to build the package. This
@@ -8240,10 +8683,38 @@ system and gives an overview of their function and contents.
8240 file://.* https://someserver.tld/share/sstate/PATH;downloadfilename=PATH \ 8683 file://.* https://someserver.tld/share/sstate/PATH;downloadfilename=PATH \
8241 file://.* file:///some-local-dir/sstate/PATH" 8684 file://.* file:///some-local-dir/sstate/PATH"
8242 8685
8686 .. note::
8687
8688 If the mirror is protected behind a username and password, the
8689 :term:`build host` needs to be configured so the :term:`build system
8690 <OpenEmbedded Build System>` is able to download the sstate cache using
8691 authentication.
8692
8693 The recommended way to do that is by setting the following parameters
8694 in ``$HOME/.netrc`` (``$HOME`` being the :term:`build host` home
8695 directory)::
8696
8697 machine someserver.tld
8698 login <user>
8699 password <password>
8700
8701 This file requires permissions set to ``400`` or ``600`` to prevent
8702 other users from reading the file::
8703
8704 chmod 600 "$HOME/.netrc"
8705
8706 Another method to configure the username and password is from the
8707 URL in :term:`SSTATE_MIRRORS` directly, with the ``user`` and ``pswd``
8708 parameters::
8709
8710 SSTATE_MIRRORS ?= "\
8711 file://.* https://someserver.tld/share/sstate/PATH;user=<user>;pswd=<password>;downloadfilename=PATH \
8712 "
8713
8243 The Yocto Project actually shares the cache data objects built by its 8714 The Yocto Project actually shares the cache data objects built by its
8244 autobuilder:: 8715 autobuilder::
8245 8716
8246 SSTATE_MIRRORS ?= "file://.* http://cdn.jsdelivr.net/yocto/sstate/all/PATH;downloadfilename=PATH" 8717 SSTATE_MIRRORS ?= "file://.* http://sstate.yoctoproject.org/all/PATH;downloadfilename=PATH"
8247 8718
8248 As such binary artifacts are built for the generic QEMU machines 8719 As such binary artifacts are built for the generic QEMU machines
8249 supported by the various Poky releases, they are less likely to be 8720 supported by the various Poky releases, they are less likely to be
@@ -8267,6 +8738,26 @@ system and gives an overview of their function and contents.
8267 8738
8268 For details on the process, see the :ref:`ref-classes-staging` class. 8739 For details on the process, see the :ref:`ref-classes-staging` class.
8269 8740
8741 :term:`SSTATE_SKIP_CREATION`
8742 The :term:`SSTATE_SKIP_CREATION` variable can be used to skip the
8743 creation of :ref:`shared state <overview-manual/concepts:shared state cache>`
8744 tarball files. It makes sense e.g. for image creation tasks as tarring images
8745 and keeping them in sstate would consume a lot of disk space.
8746
8747 In general it is not recommended to use this variable as missing sstate
8748 artefacts adversely impact the build, particularly for entries in the
8749 middle of dependency chains. The case it can make sense is where the
8750 size and time costs of the artefact are similar to just running the
8751 tasks. This generally only applies to end artefact output like images.
8752
8753 The syntax to disable it for one task is::
8754
8755 SSTATE_SKIP_CREATION:task-image-complete = "1"
8756
8757 The syntax to disable it for the whole recipe is::
8758
8759 SSTATE_SKIP_CREATION = "1"
8760
8270 :term:`STAGING_BASE_LIBDIR_NATIVE` 8761 :term:`STAGING_BASE_LIBDIR_NATIVE`
8271 Specifies the path to the ``/lib`` subdirectory of the sysroot 8762 Specifies the path to the ``/lib`` subdirectory of the sysroot
8272 directory for the build host. 8763 directory for the build host.
@@ -8457,8 +8948,8 @@ system and gives an overview of their function and contents.
8457 places stamps. The default directory is ``${TMPDIR}/stamps``. 8948 places stamps. The default directory is ``${TMPDIR}/stamps``.
8458 8949
8459 :term:`STRIP` 8950 :term:`STRIP`
8460 The minimal command and arguments to run ``strip``, which is used to 8951 The minimal command and arguments to run :manpage:`strip <strip(1)>`,
8461 strip symbols. 8952 which is used to strip symbols.
8462 8953
8463 :term:`SUMMARY` 8954 :term:`SUMMARY`
8464 The short (72 characters or less) summary of the binary package for 8955 The short (72 characters or less) summary of the binary package for
@@ -9018,8 +9509,8 @@ system and gives an overview of their function and contents.
9018 file. 9509 file.
9019 9510
9020 For more information on testing images, see the 9511 For more information on testing images, see the
9021 ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 9512 ":ref:`test-manual/runtime-testing:performing automated runtime testing`"
9022 section in the Yocto Project Development Tasks Manual. 9513 section in the Yocto Project Test Environment Manual.
9023 9514
9024 :term:`TEST_SERIALCONTROL_CMD` 9515 :term:`TEST_SERIALCONTROL_CMD`
9025 For automated hardware testing, specifies the command to use to 9516 For automated hardware testing, specifies the command to use to
@@ -9090,8 +9581,8 @@ system and gives an overview of their function and contents.
9090 TEST_SUITES = "test_A test_B" 9581 TEST_SUITES = "test_A test_B"
9091 9582
9092 For more information on testing images, see the 9583 For more information on testing images, see the
9093 ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 9584 ":ref:`test-manual/runtime-testing:performing automated runtime testing`"
9094 section in the Yocto Project Development Tasks Manual. 9585 section in the Yocto Project Test Environment Manual.
9095 9586
9096 :term:`TEST_TARGET` 9587 :term:`TEST_TARGET`
9097 Specifies the target controller to use when running tests against a 9588 Specifies the target controller to use when running tests against a
@@ -9109,8 +9600,8 @@ system and gives an overview of their function and contents.
9109 You can provide the following arguments with :term:`TEST_TARGET`: 9600 You can provide the following arguments with :term:`TEST_TARGET`:
9110 9601
9111 - *"qemu":* Boots a QEMU image and runs the tests. See the 9602 - *"qemu":* Boots a QEMU image and runs the tests. See the
9112 ":ref:`dev-manual/runtime-testing:enabling runtime tests on qemu`" section 9603 ":ref:`test-manual/runtime-testing:enabling runtime tests on qemu`" section
9113 in the Yocto Project Development Tasks Manual for more 9604 in the Yocto Project Test Environment Manual for more
9114 information. 9605 information.
9115 9606
9116 - *"simpleremote":* Runs the tests on target hardware that is 9607 - *"simpleremote":* Runs the tests on target hardware that is
@@ -9125,8 +9616,8 @@ system and gives an overview of their function and contents.
9125 ``meta/lib/oeqa/controllers/simpleremote.py``. 9616 ``meta/lib/oeqa/controllers/simpleremote.py``.
9126 9617
9127 For information on running tests on hardware, see the 9618 For information on running tests on hardware, see the
9128 ":ref:`dev-manual/runtime-testing:enabling runtime tests on hardware`" 9619 ":ref:`test-manual/runtime-testing:enabling runtime tests on hardware`"
9129 section in the Yocto Project Development Tasks Manual. 9620 section in the Yocto Project Test Environment Manual.
9130 9621
9131 :term:`TEST_TARGET_IP` 9622 :term:`TEST_TARGET_IP`
9132 The IP address of your hardware under test. The :term:`TEST_TARGET_IP` 9623 The IP address of your hardware under test. The :term:`TEST_TARGET_IP`
@@ -9162,10 +9653,15 @@ system and gives an overview of their function and contents.
9162 9653
9163 For more information 9654 For more information
9164 on enabling, running, and writing these tests, see the 9655 on enabling, running, and writing these tests, see the
9165 ":ref:`dev-manual/runtime-testing:performing automated runtime testing`" 9656 ":ref:`test-manual/runtime-testing:performing automated runtime testing`"
9166 section in the Yocto Project Development Tasks Manual and the 9657 section in the Yocto Project Test Environment Manual and the
9167 ":ref:`ref-classes-testimage`" section. 9658 ":ref:`ref-classes-testimage`" section.
9168 9659
9660 :term:`TESTIMAGE_FAILED_QA_ARTIFACTS`
9661 When using the :ref:`ref-classes-testimage` class, the variable
9662 :term:`TESTIMAGE_FAILED_QA_ARTIFACTS` lists space-separated paths on the
9663 target to retrieve onto the host.
9664
9169 :term:`THISDIR` 9665 :term:`THISDIR`
9170 The directory in which the file BitBake is currently parsing is 9666 The directory in which the file BitBake is currently parsing is
9171 located. Do not manually set this variable. 9667 located. Do not manually set this variable.
@@ -9957,8 +10453,22 @@ system and gives an overview of their function and contents.
9957 ":ref:`ref-classes-insane`" section. 10453 ":ref:`ref-classes-insane`" section.
9958 10454
9959 :term:`WATCHDOG_TIMEOUT` 10455 :term:`WATCHDOG_TIMEOUT`
9960 Specifies the timeout in seconds used by the ``watchdog`` recipe and 10456 Specifies the timeout in seconds used by the ``watchdog-config`` recipe
9961 also by ``systemd`` during reboot. The default is 60 seconds. 10457 and also by ``systemd`` during reboot. The default is 60 seconds.
10458
10459 :term:`WIC_CREATE_EXTRA_ARGS`
10460 If the :term:`IMAGE_FSTYPES` variable contains "wic", the build
10461 will generate a
10462 :ref:`Wic image <dev-manual/wic:creating partitioned images using wic>`
10463 automatically when BitBake builds an image recipe. As part of
10464 this process BitBake will invoke the "`wic create`" command. The
10465 :term:`WIC_CREATE_EXTRA_ARGS` variable is placed at the end of this
10466 command which allows the user to supply additional arguments.
10467
10468 One such useful purpose for this mechanism is to add the ``-D`` (or
10469 ``--debug``) argument to the "`wic create`" command. This increases the
10470 amount of debugging information written out to the Wic log during the
10471 Wic creation process.
9962 10472
9963 :term:`WIRELESS_DAEMON` 10473 :term:`WIRELESS_DAEMON`
9964 For ``connman`` and ``packagegroup-base``, specifies the wireless 10474 For ``connman`` and ``packagegroup-base``, specifies the wireless
diff --git a/documentation/sdk-manual/appendix-obtain.rst b/documentation/sdk-manual/appendix-obtain.rst
index d06d6ec6b5..a42cbc31bb 100644
--- a/documentation/sdk-manual/appendix-obtain.rst
+++ b/documentation/sdk-manual/appendix-obtain.rst
@@ -29,7 +29,7 @@ and then run the script to hand-install the toolchain.
29Follow these steps to locate and hand-install the toolchain: 29Follow these steps to locate and hand-install the toolchain:
30 30
31#. *Go to the Installers Directory:* Go to 31#. *Go to the Installers Directory:* Go to
32 :yocto_dl:`/releases/yocto/yocto-&DISTRO;/toolchain/` 32 :yocto_dl:`/releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/`
33 33
34#. *Open the Folder for Your Build Host:* Open the folder that matches 34#. *Open the Folder for Your Build Host:* Open the folder that matches
35 your :term:`Build Host` (i.e. 35 your :term:`Build Host` (i.e.
@@ -201,7 +201,7 @@ Follow these steps to extract the root filesystem:
201 Image File:* You need to find and download the root filesystem image 201 Image File:* You need to find and download the root filesystem image
202 file that is appropriate for your target system. These files are kept 202 file that is appropriate for your target system. These files are kept
203 in machine-specific folders in the 203 in machine-specific folders in the
204 :yocto_dl:`Index of Releases </releases/yocto/yocto-&DISTRO;/machines/>` 204 :yocto_dl:`Index of Releases </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>`
205 in the "machines" directory. 205 in the "machines" directory.
206 206
207 The machine-specific folders of the "machines" directory contain 207 The machine-specific folders of the "machines" directory contain
@@ -245,7 +245,7 @@ Follow these steps to extract the root filesystem:
245 245
246 Here is an example command that extracts the root filesystem 246 Here is an example command that extracts the root filesystem
247 from a previously built root filesystem image that was downloaded 247 from a previously built root filesystem image that was downloaded
248 from the :yocto_dl:`Index of Releases </releases/yocto/yocto-&DISTRO;/machines/>`. 248 from the :yocto_dl:`Index of Releases </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>`.
249 This command extracts the root filesystem into the ``core2-64-sato`` 249 This command extracts the root filesystem into the ``core2-64-sato``
250 directory:: 250 directory::
251 251
diff --git a/documentation/sdk-manual/extensible.rst b/documentation/sdk-manual/extensible.rst
index 3f6a754d88..ab4956f466 100644
--- a/documentation/sdk-manual/extensible.rst
+++ b/documentation/sdk-manual/extensible.rst
@@ -87,7 +87,7 @@ Host` by running the ``*.sh`` installation script.
87You can download a tarball installer, which includes the pre-built 87You can download a tarball installer, which includes the pre-built
88toolchain, the ``runqemu`` script, the internal build system, 88toolchain, the ``runqemu`` script, the internal build system,
89``devtool``, and support files from the appropriate 89``devtool``, and support files from the appropriate
90:yocto_dl:`toolchain </releases/yocto/yocto-&DISTRO;/toolchain/>` directory within the Index of 90:yocto_dl:`toolchain </releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/>` directory within the Index of
91Releases. Toolchains are available for several 32-bit and 64-bit 91Releases. Toolchains are available for several 32-bit and 64-bit
92architectures with the ``x86_64`` directories, respectively. The 92architectures with the ``x86_64`` directories, respectively. The
93toolchains the Yocto Project provides are based off the 93toolchains the Yocto Project provides are based off the
@@ -178,7 +178,7 @@ Running the Extensible SDK Environment Setup Script
178Once you have the SDK installed, you must run the SDK environment setup 178Once you have the SDK installed, you must run the SDK environment setup
179script before you can actually use the SDK. 179script before you can actually use the SDK.
180 180
181When using a SDK directly in a Yocto build, you will find the script in 181When using an SDK directly in a Yocto build, you will find the script in
182``tmp/deploy/images/qemux86-64/`` in your :term:`Build Directory`. 182``tmp/deploy/images/qemux86-64/`` in your :term:`Build Directory`.
183 183
184When using a standalone SDK installer, this setup script resides in 184When using a standalone SDK installer, this setup script resides in
@@ -622,28 +622,91 @@ command:
622 decide you do not want to proceed with your work. If you do use this 622 decide you do not want to proceed with your work. If you do use this
623 command, realize that the source tree is preserved. 623 command, realize that the source tree is preserved.
624 624
625``devtool ide-sdk`` configures IDEs for the extensible SDK 625``devtool ide-sdk`` configures IDEs and bootstraps SDKs
626---------------------------------------------------------- 626-------------------------------------------------------
627 627
628``devtool ide-sdk`` automatically configures IDEs to use the extensible SDK. 628The ``devtool ide-sdk`` command can provide an IDE configuration for IDEs when
629To make sure that all parts of the extensible SDK required by the generated 629working on the source code of one or more recipes.
630IDE configuration are available, ``devtool ide-sdk`` uses BitBake in the 630Depending on the programming language, and the build system used by the recipe,
631background to bootstrap the extensible SDK. 631the tools required for cross-development and remote debugging are different.
632For example:
632 633
633The extensible SDK supports two different development modes. 634- A C/C++ project usually uses CMake or Meson.
634``devtool ide-sdk`` supports both of them:
635 635
636#. *Modified mode*: 636- A Python project uses setuptools or one of its successors.
637
638- A Rust project uses Cargo.
639
640Also, the IDE plugins needed for the integration of a build system with the
641IDE and the corresponding settings are usually specific to these build-systems.
642To hide all these details from the user, ``devtool ide-sdk`` does two things:
643
644- It generates any kind of SDK needed for cross-development and remote
645 debugging of the specified recipes.
646
647- It generates the configuration for the IDE (and the IDE plugins) for using
648 the cross-toolchain and remote debugging tools provided by the SDK directly
649 from the IDE.
650
651For supported build systems the configurations generated by ``devtool ide-sdk``
652combine the advantages of the ``devtool modify`` based workflow
653(see :ref:`using_devtool`) with the advantages of the simple Environment Setup
654script based workflow (see :ref:`running_the_ext_sdk_env`) provided by Yocto's
655SDK or eSDK:
656
657- The source code of the recipe is in the workspace created by
658 ``devtool modify`` or ``devtool add``.
659 Using ``devtool build``, ``devtool build-image``,
660 ``devtool deploy-target`` or ``bitbake`` is possible.
661 Also ``devtool ide-sdk`` can be used to update the SDK and the IDE
662 configuration at any time.
637 663
638 By default ``devtool ide-sdk`` generates IDE configurations for recipes in 664- ``devtool ide-sdk`` aims to support multiple programming languages and
639 workspaces created by ``devtool modify`` or ``devtool add`` as described in 665 multiple IDEs natively. "Natively" means that the IDE is configured to call
640 :ref:`using_devtool`. This mode creates IDE configurations with support for 666 the build tool (e.g. ``cmake`` or ``meson``) directly. This has several
641 advanced features, such as deploying the binaries to the remote target 667 advantages.
642 device and performing remote debugging sessions. The generated IDE 668 First of all, it is usually much faster to call for example ``cmake`` than
643 configurations use the per recipe sysroots as Bitbake does internally. 669 ``devtool build``.
670 It also allows to benefit from the very good integration that IDEs like
671 VSCode offer for tools like CMake or GDB.
672
673 However, supporting many programming languages and multiple
674 IDEs is quite an elaborate and constantly evolving thing. Support for IDEs
675 is therefore implemented as plugins. Plugins can also be provided by
676 optional layers.
644 677
645 In order to use the tool, a few settings are needed. As a starting example, 678So much about the introduction to the default mode of ``devtool sdk-ide`` which
646 the following lines of code can be added to the ``local.conf`` file:: 679is called the "modified" mode because it uses the workspace created by
680``devtool modify`` and the per recipe :term:`Sysroots <Sysroot>` of BitBake.
681
682For some recipes and use cases, this default behavior of ``devtool ide-sdk``
683with full ``devtool`` and ``bitbake`` integration might not be suitable.
684To offer full feature parity with the SDK and the eSDK, ``devtool ide-sdk`` has
685a second mode called "shared" mode.
686If ``devtool ide-sdk`` is called with the ``--mode=shared`` option, it
687bootstraps an SDK directly from the BitBake environment, which offers the same
688Environment Setup script as described in :ref:`running_the_ext_sdk_env`.
689In addition to the (e)SDK installer-based setup, the IDE gets configured
690to use the shared :term:`Sysroots <Sysroot>` and the tools from the SDK.
691``devtool ide-sdk --mode=shared`` is basically a wrapper for the setup of the
692extensible SDK as described in :ref:`setting_up_ext_sdk_in_build`.
693
694The use of ``devtool ide-sdk`` is an alternative to using one of the SDK
695installers.
696``devtool ide-sdk`` allows the creation of SDKs that offer all the
697functionality of the SDK and the eSDK installers. Compared to the installers,
698however, the SDK created with ``devtool ide-sdk`` is much more flexible.
699For example, it is very easy to change the :term:`MACHINE` in the
700``local.conf`` file, update the layer meta data and then regenerate the SDK.
701
702Let's take a look at an example of how to use ``devtool ide-sdk`` in each of
703the two modes:
704
705#. *Modified mode*:
706
707 In order to use the ``devtool ide-sdk``, a few settings are needed. As a
708 starting example, the following lines of code can be added to the
709 ``local.conf`` file::
647 710
648 # Build the companion debug file system 711 # Build the companion debug file system
649 IMAGE_GEN_DEBUGFS = "1" 712 IMAGE_GEN_DEBUGFS = "1"
@@ -666,15 +729,20 @@ The extensible SDK supports two different development modes.
666 IMAGE_INSTALL:append = " my-recipe" 729 IMAGE_INSTALL:append = " my-recipe"
667 730
668 Assuming the BitBake environment is set up correctly and a workspace has 731 Assuming the BitBake environment is set up correctly and a workspace has
669 been created for the recipe using ``devtool modify my-recipe``, the 732 been created for the recipe using ``devtool modify my-recipe`` or probably
733 even better by using ``devtool modify my-recipe --debug-build``, the
670 following command can create the SDK and the configuration for VSCode in 734 following command can create the SDK and the configuration for VSCode in
671 the recipe workspace:: 735 the recipe workspace::
672 736
673 $ devtool ide-sdk my-recipe core-image-minimal --target root@192.168.7.2 737 $ devtool ide-sdk my-recipe core-image-minimal --target root@192.168.7.2
674 738
675 The command requires an image recipe (``core-image-minimal`` for this example) 739 The command requires an image recipe (``core-image-minimal`` for this
676 that is used to create the SDK. This firmware image should also be installed 740 example) that is used to create the SDK.
677 on the target device. It is possible to pass multiple package recipes. 741 This firmware image should also be installed on the target device.
742 It is possible to pass multiple package recipes::
743
744 $ devtool ide-sdk my-recipe-1 my-recipe-2 core-image-minimal --target root@192.168.7.2
745
678 ``devtool ide-sdk`` tries to create an IDE configuration for all package 746 ``devtool ide-sdk`` tries to create an IDE configuration for all package
679 recipes. 747 recipes.
680 748
@@ -684,9 +752,9 @@ The extensible SDK supports two different development modes.
684 752
685 For example, a CMake preset is created for a recipe that inherits 753 For example, a CMake preset is created for a recipe that inherits
686 :ref:`ref-classes-cmake`. In the case of VSCode, CMake presets are supported 754 :ref:`ref-classes-cmake`. In the case of VSCode, CMake presets are supported
687 by the CMake Tools plugin. This is an example of how the build 755 by the CMake Tools plugin. This is an example of how the build configuration
688 configuration used by ``bitbake`` is exported to an IDE configuration that 756 used by ``bitbake`` is exported to an IDE configuration that gives exactly
689 gives exactly the same build results. 757 the same build results.
690 758
691 Support for remote debugging with seamless integration into the IDE is 759 Support for remote debugging with seamless integration into the IDE is
692 important for a cross-SDK. ``devtool ide-sdk`` automatically generates the 760 important for a cross-SDK. ``devtool ide-sdk`` automatically generates the
@@ -699,23 +767,54 @@ The extensible SDK supports two different development modes.
699 running on the target device, it is essential that the image built by 767 running on the target device, it is essential that the image built by
700 ``devtool ide-sdk`` is running on the target device. 768 ``devtool ide-sdk`` is running on the target device.
701 769
702 ``devtool ide-sdk`` aims to support multiple programming languages and
703 multiple IDEs natively. "Natively" means that the IDE is configured to call
704 the build tool (e.g. CMake or Meson) directly. This has several advantages.
705 First of all, it is much faster than ``devtool build``, but it also allows
706 to use the very good integration of tools like CMake or GDB in VSCode and
707 other IDEs. However, supporting many programming languages and multiple
708 IDEs is quite an elaborate and constantly evolving thing. Support for IDEs
709 is therefore implemented as plugins. Plugins can also be provided by
710 optional layers.
711
712 The default IDE is VSCode. Some hints about using VSCode: 770 The default IDE is VSCode. Some hints about using VSCode:
713 771
714 - To work on the source code of a recipe an instance of VSCode is started in 772 - VSCode can be used to work on the BitBake recipes or the application
715 the recipe's workspace. Example:: 773 source code.
774 Usually there is one instance of VSCode running in the folder where the
775 BitBake recipes are. This instance has the
776 `Yocto Project BitBake plugin <https://marketplace.visualstudio.com/items?itemName=yocto-project.yocto-bitbake>`_
777 running.
778
779 .. warning::
780
781 Some VSCode plugins (Python, BitBake and others) need a reasonable
782 configuration to work as expected. Otherwise, some plugins try to
783 index the build directory of BitBake, which keeps your system quite
784 busy until an out of memory exception stops this nonsense.
785 Other plugins, such as the BitBake plugin, do not behave as expected.
786
787 To work around such issues, the ``oe-init-build-env`` script creates
788 an initial ``.vscode/settings.json`` file if ``code`` can be found
789 and the ``.vscode`` folder does not yet exist.
790 It is best to run ``oe-init-build-env`` once before starting VSCode.
791 An alternative approach is to use a build folder outside the layers,
792 e.g. ``oe-init-build-env ../build``.
793
794 The BitBake plugin also offers to create devtool workspaces and run
795 ``devtool ide-sdk`` with a few mouse clicks.
796 Of course, issuing commands in the terminal works as well.
797
798 - To work on the source code of a recipe another instance of VSCode is
799 started in the recipe's workspace. Example::
716 800
717 code build/workspace/sources/my-recipe 801 code build/workspace/sources/my-recipe
718 802
803 This instance of VSCode uses plugins that are useful for the development
804 of the application. ``devtool ide-sdk`` generates the necessary
805 ``extensions.json``, ``settings.json``, ``tasks.json`` and ``launch.json``
806 configuration files for all the involved plugins.
807
808 When the source code folder present in the workspace folder is opened in
809 VSCode for the first time, a pop-up message recommends installing the
810 required plugins.
811 After accepting the installation of the plugins, working with the source
812 code or some debugging tasks should work as usual with VSCode.
813
814 Starting the VSCode instances in the recipe workspace folders can also be
815 done by a mouse click on the recipe workspaces in the first VSCode
816 instance.
817
719 - To work with CMake press ``Ctrl + Shift + p``, type ``cmake``. This will 818 - To work with CMake press ``Ctrl + Shift + p``, type ``cmake``. This will
720 show some possible commands like selecting a CMake preset, compiling or 819 show some possible commands like selecting a CMake preset, compiling or
721 running CTest. 820 running CTest.
@@ -728,10 +827,9 @@ The extensible SDK supports two different development modes.
728 show some possible commands like compiling or executing the unit tests. 827 show some possible commands like compiling or executing the unit tests.
729 828
730 A note on running cross-compiled unit tests on the host: Meson enables 829 A note on running cross-compiled unit tests on the host: Meson enables
731 support for QEMU user-mode by default. It is expected that the execution 830 support for QEMU user mode by default. It is expected that the execution
732 of the unit tests from the IDE will work easily without any additional 831 of the unit tests from the IDE will work without any additional steps,
733 steps, provided that the code is suitable for execution on the host 832 given that the code is suitable for the execution on the host machine.
734 machine.
735 833
736 - For the deployment to the target device, just press ``Ctrl + Shift + p``, 834 - For the deployment to the target device, just press ``Ctrl + Shift + p``,
737 type ``task``. Select ``install && deploy-target``. 835 type ``task``. Select ``install && deploy-target``.
@@ -742,23 +840,23 @@ The extensible SDK supports two different development modes.
742 selected. After selecting one of the generated configurations, press the 840 selected. After selecting one of the generated configurations, press the
743 "play" button. 841 "play" button.
744 842
745 Starting a remote debugging session automatically initiates the deployment 843 Starting a remote debugging session automatically initiates the
746 to the target device. If this is not desired, the 844 deployment to the target device. If this is not desired, the
747 ``"dependsOn": ["install && deploy-target...]`` parameter of the tasks 845 ``"dependsOn": ["install && deploy-target...]`` parameter of the tasks
748 with ``"label": "gdbserver start...`` can be removed from the 846 with ``"label": "gdbserver start...`` can be removed from the
749 ``tasks.json`` file. 847 ``tasks.json`` file.
750 848
751 VSCode supports GDB with many different setups and configurations for many 849 VSCode supports GDB with many different setups and configurations for
752 different use cases. However, most of these setups have some limitations 850 many different use cases. However, most of these setups have some
753 when it comes to cross-development, support only a few target 851 limitations when it comes to cross-development, support only a few target
754 architectures or require a high performance target device. Therefore 852 architectures or require a high performance target device. Therefore
755 ``devtool ide-sdk`` supports the classic, generic setup with GDB on the 853 ``devtool ide-sdk`` supports the classic, generic setup with GDB on the
756 development host and gdbserver on the target device. 854 development host and gdbserver on the target device.
757 855
758 Roughly summarized, this means: 856 Roughly summarized, this means:
759 857
760 - The binaries are copied via SSH to the remote target device by a script 858 - The binaries are copied via SSH to the remote target device by a
761 referred by ``tasks.json``. 859 script referred by ``tasks.json``.
762 860
763 - gdbserver is started on the remote target device via SSH by a script 861 - gdbserver is started on the remote target device via SSH by a script
764 referred by ``tasks.json``. 862 referred by ``tasks.json``.
@@ -783,8 +881,8 @@ The extensible SDK supports two different development modes.
783 .. code-block:: sh 881 .. code-block:: sh
784 882
785 # Create the SDK 883 # Create the SDK
786 devtool modify cmake-example 884 devtool modify cmake-example --debug-build
787 devtool ide-sdk cmake-example core-image-minimal -c --debug-build-config --ide=none 885 devtool ide-sdk cmake-example core-image-minimal -c --ide=none
788 886
789 # Install the firmware on a target device or start QEMU 887 # Install the firmware on a target device or start QEMU
790 runqemu 888 runqemu
@@ -860,16 +958,9 @@ The extensible SDK supports two different development modes.
860 958
861#. *Shared sysroots mode* 959#. *Shared sysroots mode*
862 960
863 For some recipes and use cases a per-recipe sysroot based SDK is not 961 Creating an SDK with shared :term:`Sysroots <Sysroot>` that contains all the
864 suitable. Optionally ``devtool ide-sdk`` configures the IDE to use the 962 dependencies needed to work with ``my-recipe`` is possible with the following
865 toolchain provided by the extensible SDK as described in 963 example command::
866 :ref:`running_the_ext_sdk_env`. ``devtool ide-sdk --mode=shared`` is
867 basically a wrapper for the setup of the extensible SDK as described in
868 :ref:`setting_up_ext_sdk_in_build`. The IDE gets a configuration to use the
869 shared sysroots.
870
871 Creating a SDK with shared sysroots that contains all the dependencies needed
872 to work with ``my-recipe`` is possible with the following example command::
873 964
874 $ devtool ide-sdk --mode=shared my-recipe 965 $ devtool ide-sdk --mode=shared my-recipe
875 966
@@ -883,12 +974,14 @@ The extensible SDK supports two different development modes.
883 echo "project(foo VERSION 1.0)" > kit-test/CMakeLists.txt 974 echo "project(foo VERSION 1.0)" > kit-test/CMakeLists.txt
884 code kit-test 975 code kit-test
885 976
886 If there is a CMake project in the workspace, cross-compilation is supported: 977 If there is a CMake project in the workspace, cross-compilation is
978 supported:
887 979
888 - Press ``Ctrl + Shift + P``, type ``CMake: Scan for Kits`` 980 - Press ``Ctrl + Shift + P``, type ``CMake: Scan for Kits``
889 - Press ``Ctrl + Shift + P``, type ``CMake: Select a Kit`` 981 - Press ``Ctrl + Shift + P``, type ``CMake: Select a Kit``
890 982
891 Finally most of the features provided by CMake and the IDE should be available. 983 Finally most of the features provided by CMake and the IDE should be
984 available.
892 985
893 Other IDEs than VSCode are supported as well. However, 986 Other IDEs than VSCode are supported as well. However,
894 ``devtool ide-sdk --mode=shared --ide=none my-recipe`` is currently 987 ``devtool ide-sdk --mode=shared --ide=none my-recipe`` is currently
diff --git a/documentation/sdk-manual/intro.rst b/documentation/sdk-manual/intro.rst
index e8fd191dbc..fbfc8c2ac7 100644
--- a/documentation/sdk-manual/intro.rst
+++ b/documentation/sdk-manual/intro.rst
@@ -173,7 +173,7 @@ You just need to follow these general steps:
173 root filesystem images. 173 root filesystem images.
174 174
175 If you are going to develop your application on hardware, go to the 175 If you are going to develop your application on hardware, go to the
176 :yocto_dl:`machines </releases/yocto/yocto-&DISTRO;/machines/>` download area and choose a 176 :yocto_dl:`machines </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/>` download area and choose a
177 target machine area from which to download the kernel image and root 177 target machine area from which to download the kernel image and root
178 filesystem. This download area could have several files in it that 178 filesystem. This download area could have several files in it that
179 support development using actual hardware. For example, the area 179 support development using actual hardware. For example, the area
@@ -183,7 +183,7 @@ You just need to follow these general steps:
183 183
184 If you are going to develop your application and then run and test it 184 If you are going to develop your application and then run and test it
185 using the QEMU emulator, go to the 185 using the QEMU emulator, go to the
186 :yocto_dl:`machines/qemu </releases/yocto/yocto-&DISTRO;/machines/qemu>` download area. From this 186 :yocto_dl:`machines/qemu </releases/yocto/&DISTRO_REL_LATEST_TAG;/machines/qemu>` download area. From this
187 area, go down into the directory for your target architecture (e.g. 187 area, go down into the directory for your target architecture (e.g.
188 ``qemux86_64`` for an Intel-based 64-bit architecture). Download the 188 ``qemux86_64`` for an Intel-based 64-bit architecture). Download the
189 kernel, root filesystem, and any other files you need for your 189 kernel, root filesystem, and any other files you need for your
diff --git a/documentation/sdk-manual/using.rst b/documentation/sdk-manual/using.rst
index f1ff0c76ca..bfb306abf5 100644
--- a/documentation/sdk-manual/using.rst
+++ b/documentation/sdk-manual/using.rst
@@ -43,7 +43,7 @@ Host` by running the ``*.sh`` installation script.
43 43
44You can download a tarball installer, which includes the pre-built 44You can download a tarball installer, which includes the pre-built
45toolchain, the ``runqemu`` script, and support files from the 45toolchain, the ``runqemu`` script, and support files from the
46appropriate :yocto_dl:`toolchain </releases/yocto/yocto-&DISTRO;/toolchain/>` directory within 46appropriate :yocto_dl:`toolchain </releases/yocto/&DISTRO_REL_LATEST_TAG;/toolchain/>` directory within
47the Index of Releases. Toolchains are available for several 32-bit and 47the Index of Releases. Toolchains are available for several 32-bit and
4864-bit architectures with the ``x86_64`` directories, respectively. The 4864-bit architectures with the ``x86_64`` directories, respectively. The
49toolchains the Yocto Project provides are based off the 49toolchains the Yocto Project provides are based off the
diff --git a/documentation/set_versions.py b/documentation/set_versions.py
index dec0780834..820bd64036 100755
--- a/documentation/set_versions.py
+++ b/documentation/set_versions.py
@@ -168,17 +168,29 @@ series = [k for k in release_series]
168previousseries = series[series.index(ourseries)+1:] or [""] 168previousseries = series[series.index(ourseries)+1:] or [""]
169lastlts = [k for k in previousseries if k in ltsseries] or "dunfell" 169lastlts = [k for k in previousseries if k in ltsseries] or "dunfell"
170 170
171latestreltag = subprocess.run(["git", "describe", "--abbrev=0", "--tags", "--match", "yocto-*"], capture_output=True, text=True).stdout
172latestreltag = latestreltag.strip()
173if latestreltag:
174 if latestreltag.startswith("yocto-"):
175 latesttag = latestreltag[6:]
176else:
177 # fallback on the calculated version
178 print("Did not find a tag with 'git describe', falling back to %s" % ourversion)
179 latestreltag = "yocto-" + ourversion
180 latesttag = ourversion
181
171print("Version calculated to be %s" % ourversion) 182print("Version calculated to be %s" % ourversion)
183print("Latest release tag found is %s" % latestreltag)
172print("Release series calculated to be %s" % ourseries) 184print("Release series calculated to be %s" % ourseries)
173 185
174replacements = { 186replacements = {
175 "DISTRO" : ourversion, 187 "DISTRO" : ourversion,
188 "DISTRO_LATEST_TAG": latesttag,
176 "DISTRO_NAME_NO_CAP" : ourseries, 189 "DISTRO_NAME_NO_CAP" : ourseries,
177 "DISTRO_NAME" : ourseries.capitalize(), 190 "DISTRO_NAME" : ourseries.capitalize(),
178 "DISTRO_NAME_NO_CAP_MINUS_ONE" : previousseries[0], 191 "DISTRO_NAME_NO_CAP_MINUS_ONE" : previousseries[0],
179 "DISTRO_NAME_NO_CAP_LTS" : lastlts[0], 192 "DISTRO_NAME_NO_CAP_LTS" : lastlts[0],
180 "YOCTO_DOC_VERSION" : ourversion, 193 "YOCTO_DOC_VERSION" : ourversion,
181 "DISTRO_REL_TAG" : "yocto-" + ourversion,
182 "DOCCONF_VERSION" : docconfver, 194 "DOCCONF_VERSION" : docconfver,
183 "BITBAKE_SERIES" : bitbakeversion, 195 "BITBAKE_SERIES" : bitbakeversion,
184} 196}
@@ -316,3 +328,5 @@ with open('releases.rst', 'w') as f:
316 if tag == release_series[series] or tag.startswith('%s.' % release_series[series]): 328 if tag == release_series[series] or tag.startswith('%s.' % release_series[series]):
317 f.write('- :yocto_docs:`%s Documentation </%s>`\n' % (tag, tag)) 329 f.write('- :yocto_docs:`%s Documentation </%s>`\n' % (tag, tag))
318 f.write('\n') 330 f.write('\n')
331
332
diff --git a/documentation/sphinx-static/favicon.ico b/documentation/sphinx-static/favicon.ico
new file mode 100644
index 0000000000..85a921e3ef
--- /dev/null
+++ b/documentation/sphinx-static/favicon.ico
Binary files differ
diff --git a/documentation/sphinx-static/switchers.js.in b/documentation/sphinx-static/switchers.js.in
index 8c016859bc..b1c0812b53 100644
--- a/documentation/sphinx-static/switchers.js.in
+++ b/documentation/sphinx-static/switchers.js.in
@@ -133,7 +133,13 @@ by https://git.yoctoproject.org/yocto-autobuilder-helper/tree/scripts/run-docs-b
133 133
134 function get_docroot_url() { 134 function get_docroot_url() {
135 var url = window.location.href; 135 var url = window.location.href;
136 // Try to get the variable from documentation_options.js
136 var root = DOCUMENTATION_OPTIONS.URL_ROOT; 137 var root = DOCUMENTATION_OPTIONS.URL_ROOT;
138 if (root == null) {
139 // In recent versions of Sphinx, URL_ROOT was removed from
140 // documentation_options.js, so get it like searchtools.js does.
141 root = document.documentElement.dataset.content_root;
142 }
137 143
138 var urlarray = url.split('/'); 144 var urlarray = url.split('/');
139 // Trim off anything after '/' 145 // Trim off anything after '/'
diff --git a/documentation/standards.md b/documentation/standards.md
index bc403e393e..8300d813dc 100644
--- a/documentation/standards.md
+++ b/documentation/standards.md
@@ -1,6 +1,6 @@
1# Standards for contributing to Yocto Project documentation 1# Standards for contributing to Yocto Project documentation
2 2
3This document attemps to standardize the way the Yocto Project 3This document attempts to standardize the way the Yocto Project
4documentation is created. 4documentation is created.
5 5
6It is currently a work in progress. 6It is currently a work in progress.
@@ -109,6 +109,21 @@ or in the BitBake User Manual
109If it is not described yet, the variable should be added to the 109If it is not described yet, the variable should be added to the
110glossary before or in the same patch it is used, so that `:term:` can be used. 110glossary before or in the same patch it is used, so that `:term:` can be used.
111 111
112### Admonitions
113
114Sphinx has predefined admonitions that can be used to highlight a bit of text or
115add a side-note to the documentation. For example:
116
117```rst
118.. note::
119
120 This is a note admonition.
121```
122
123We try to limit our usage of these admonitions to `note` and `warning`, as the
124Sphinx documentation [warns](https://www.sphinx-doc.org/en/master/usage/restructuredtext/basics.html#directives)
125that most themes only style these two admonitions.
126
112## ReStructured Text Syntax standards 127## ReStructured Text Syntax standards
113 128
114This section has not been filled yet 129This section has not been filled yet
diff --git a/documentation/styles/config/vocabularies/Yocto/accept.txt b/documentation/styles/config/vocabularies/Yocto/accept.txt
index ca622ba412..7fedda8ae2 100644
--- a/documentation/styles/config/vocabularies/Yocto/accept.txt
+++ b/documentation/styles/config/vocabularies/Yocto/accept.txt
@@ -2,4 +2,5 @@ BitBake
2BSP 2BSP
3crosstap 3crosstap
4OpenEmbedded 4OpenEmbedded
5sstate
5Yocto 6Yocto
diff --git a/documentation/test-manual/index.rst b/documentation/test-manual/index.rst
index 86a2f436ea..d365d337ea 100644
--- a/documentation/test-manual/index.rst
+++ b/documentation/test-manual/index.rst
@@ -12,6 +12,8 @@ Yocto Project Test Environment Manual
12 12
13 intro 13 intro
14 test-process 14 test-process
15 ptest
16 runtime-testing
15 understand-autobuilder 17 understand-autobuilder
16 reproducible-builds 18 reproducible-builds
17 yocto-project-compatible 19 yocto-project-compatible
diff --git a/documentation/test-manual/intro.rst b/documentation/test-manual/intro.rst
index c31fd11c7a..caa0a8a792 100644
--- a/documentation/test-manual/intro.rst
+++ b/documentation/test-manual/intro.rst
@@ -51,13 +51,11 @@ fashion. Basically, during the development of a Yocto Project release,
51the Autobuilder tests if things work. The Autobuilder builds all test 51the Autobuilder tests if things work. The Autobuilder builds all test
52targets and runs all the tests. 52targets and runs all the tests.
53 53
54The Yocto Project uses now uses standard upstream 54The Yocto Project uses standard upstream Buildbot to drive its integration and
55Buildbot (`version 3.8 <https://docs.buildbot.net/3.8.0/>`__) to 55testing. Buildbot has a plug-in interface that the Yocto Project customizes
56drive its integration and testing. Buildbot has a plug-in interface 56using code from the :yocto_git:`yocto-autobuilder2 </yocto-autobuilder2>`
57that the Yocto Project customizes using code from the 57repository, adding its own console UI plugin. The resulting UI plug-in allows
58``yocto-autobuilder2`` repository, adding its own console UI plugin. The 58you to visualize builds in a way suited to the project's needs.
59resulting UI plug-in allows you to visualize builds in a way suited to
60the project's needs.
61 59
62A ``helper`` layer provides configuration and job management through 60A ``helper`` layer provides configuration and job management through
63scripts found in the ``yocto-autobuilder-helper`` repository. The 61scripts found in the ``yocto-autobuilder-helper`` repository. The
@@ -130,7 +128,9 @@ the following types of tests:
130 $ bitbake image -c testimage 128 $ bitbake image -c testimage
131 129
132 The tests use the :ref:`ref-classes-testimage` 130 The tests use the :ref:`ref-classes-testimage`
133 class and the :ref:`ref-tasks-testimage` task. 131 class and the :ref:`ref-tasks-testimage` task. See the
132 :ref:`test-manual/runtime-testing:Performing Automated Runtime Testing`
133 section of the Yocto Project Test Environment Manual for more information.
134 134
135- *Layer Testing:* The Autobuilder has the possibility to test whether 135- *Layer Testing:* The Autobuilder has the possibility to test whether
136 specific layers work with the test of the system. The layers tested 136 specific layers work with the test of the system. The layers tested
@@ -140,7 +140,7 @@ the following types of tests:
140- *Package Testing:* A Package Test (ptest) runs tests against packages 140- *Package Testing:* A Package Test (ptest) runs tests against packages
141 built by the OpenEmbedded build system on the target machine. See the 141 built by the OpenEmbedded build system on the target machine. See the
142 :ref:`Testing Packages With 142 :ref:`Testing Packages With
143 ptest <dev-manual/packages:Testing Packages With ptest>` section 143 ptest <test-manual/ptest:Testing Packages With ptest>` section
144 in the Yocto Project Development Tasks Manual and the 144 in the Yocto Project Development Tasks Manual and the
145 ":yocto_wiki:`Ptest </Ptest>`" Wiki page for more 145 ":yocto_wiki:`Ptest </Ptest>`" Wiki page for more
146 information on Ptest. 146 information on Ptest.
diff --git a/documentation/test-manual/ptest.rst b/documentation/test-manual/ptest.rst
new file mode 100644
index 0000000000..2c021af515
--- /dev/null
+++ b/documentation/test-manual/ptest.rst
@@ -0,0 +1,128 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2
3***************************
4Testing Packages With ptest
5***************************
6
7A Package Test (ptest) runs tests against packages built by the
8OpenEmbedded build system on the target machine. A ptest contains at
9least two items: the actual test, and a shell script (``run-ptest``)
10that starts the test. The shell script that starts the test must not
11contain the actual test --- the script only starts the test. On the other
12hand, the test can be anything from a simple shell script that runs a
13binary and checks the output to an elaborate system of test binaries and
14data files.
15
16The test generates output in the format used by Automake::
17
18 result: testname
19
20where the result can be ``PASS``, ``FAIL``, or ``SKIP``, and
21the testname can be any identifying string.
22
23For a list of Yocto Project recipes that are already enabled with ptest,
24see the :yocto_wiki:`Ptest </Ptest>` wiki page.
25
26.. note::
27
28 A recipe is "ptest-enabled" if it inherits the :ref:`ref-classes-ptest`
29 class.
30
31Adding ptest to Your Build
32==========================
33
34To add package testing to your build, add the :term:`DISTRO_FEATURES` and
35:term:`EXTRA_IMAGE_FEATURES` variables to your ``local.conf`` file, which
36is found in the :term:`Build Directory`::
37
38 DISTRO_FEATURES:append = " ptest"
39 EXTRA_IMAGE_FEATURES += "ptest-pkgs"
40
41Once your build is complete, the ptest files are installed into the
42``/usr/lib/package/ptest`` directory within the image, where ``package``
43is the name of the package.
44
45Running ptest
46=============
47
48The ``ptest-runner`` package installs a shell script that loops through
49all installed ptest test suites and runs them in sequence. Consequently,
50you might want to add this package to your image.
51
52Getting Your Package Ready
53==========================
54
55In order to enable a recipe to run installed ptests on target hardware,
56you need to prepare the recipes that build the packages you want to
57test. Here is what you have to do for each recipe:
58
59- *Be sure the recipe inherits the* :ref:`ref-classes-ptest` *class:*
60 Include the following line in each recipe::
61
62 inherit ptest
63
64 .. note::
65
66 Classes for common frameworks already exist in :term:`OpenEmbedded-Core
67 (OE-Core)`, such as:
68
69 - :oe_git:`go-ptest </openembedded-core/tree/meta/classes-recipe/go-ptest.bbclass>`
70 - :ref:`ref-classes-ptest-cargo`
71 - :ref:`ref-classes-ptest-gnome`
72 - :oe_git:`ptest-perl </openembedded-core/tree/meta/classes-recipe/ptest-perl.bbclass>`
73 - :oe_git:`ptest-python-pytest </openembedded-core/tree/meta/classes-recipe/ptest-python-pytest.bbclass>`
74
75 Inheriting these classes with the ``inherit`` keyword in your recipe will
76 make the next steps automatic.
77
78- *Create run-ptest:* This script starts your test. Locate the
79 script where you will refer to it using
80 :term:`SRC_URI`. Here is an
81 example that starts a test for ``dbus``::
82
83 #!/bin/sh
84 cd test
85 make -k runtest-TESTS
86
87- *Ensure dependencies are met:* If the test adds build or runtime
88 dependencies that normally do not exist for the package (such as
89 requiring "make" to run the test suite), use the
90 :term:`DEPENDS` and
91 :term:`RDEPENDS` variables in
92 your recipe in order for the package to meet the dependencies. Here
93 is an example where the package has a runtime dependency on "make"::
94
95 RDEPENDS:${PN}-ptest += "make"
96
97- *Add a function to build the test suite:* Not many packages support
98 cross-compilation of their test suites. Consequently, you usually
99 need to add a cross-compilation function to the package.
100
101 Many packages based on Automake compile and run the test suite by
102 using a single command such as ``make check``. However, the host
103 ``make check`` builds and runs on the same computer, while
104 cross-compiling requires that the package is built on the host but
105 executed for the target architecture (though often, as in the case
106 for ptest, the execution occurs on the host). The built version of
107 Automake that ships with the Yocto Project includes a patch that
108 separates building and execution. Consequently, packages that use the
109 unaltered, patched version of ``make check`` automatically
110 cross-compiles.
111
112 Regardless, you still must add a ``do_compile_ptest`` function to
113 build the test suite. Add a function similar to the following to your
114 recipe::
115
116 do_compile_ptest() {
117 oe_runmake buildtest-TESTS
118 }
119
120- *Ensure special configurations are set:* If the package requires
121 special configurations prior to compiling the test code, you must
122 insert a ``do_configure_ptest`` function into the recipe.
123
124- *Install the test suite:* The :ref:`ref-classes-ptest` class
125 automatically copies the file ``run-ptest`` to the target and then runs make
126 ``install-ptest`` to run the tests. If this is not enough, you need
127 to create a ``do_install_ptest`` function and make sure it gets
128 called after the "make install-ptest" completes.
diff --git a/documentation/test-manual/reproducible-builds.rst b/documentation/test-manual/reproducible-builds.rst
index 91f94a5c74..aaf2e4541e 100644
--- a/documentation/test-manual/reproducible-builds.rst
+++ b/documentation/test-manual/reproducible-builds.rst
@@ -91,13 +91,21 @@ run::
91 91
92 oe-selftest -r reproducible.ReproducibleTests.test_reproducible_builds 92 oe-selftest -r reproducible.ReproducibleTests.test_reproducible_builds
93 93
94This defaults to including a ``world`` build so, if other layers are added, it would 94This defaults to including a ``world`` build so, if other layers are added, it
95also run the tests for recipes in the additional layers. Different build targets 95would also run the tests for recipes in the additional layers. Different build
96can be defined using the :term:`OEQA_REPRODUCIBLE_TEST_TARGET` variable in ``local.conf``. 96targets can be defined using the :term:`OEQA_REPRODUCIBLE_TEST_TARGET` variable
97The first build will be run using :ref:`Shared State <overview-manual/concepts:Shared State>` if 97in ``local.conf``. For example, running reproducibility tests for only the
98available, the second build explicitly disables 98``python3-numpy`` recipe can be done by setting::
99:ref:`Shared State <overview-manual/concepts:Shared State>` except for recipes defined in 99
100the :term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS` variable, and builds on the 100 OEQA_REPRODUCIBLE_TEST_TARGET = "python3-numpy"
101
102in local.conf before running the ``oe-selftest`` command shown above.
103
104Reproducibility builds the target list twice. The first build will be run using
105:ref:`Shared State <overview-manual/concepts:Shared State>` if available, the
106second build explicitly disables :ref:`Shared State
107<overview-manual/concepts:Shared State>` except for recipes defined in the
108:term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS` variable, and builds on the
101specific host the build is running on. This means we can test reproducibility 109specific host the build is running on. This means we can test reproducibility
102builds between different host distributions over time on the Autobuilder. 110builds between different host distributions over time on the Autobuilder.
103 111
@@ -111,12 +119,8 @@ https://autobuilder.yocto.io/pub/repro-fail/ in the form ``oe-reproducible +
111The project's current reproducibility status can be seen at 119The project's current reproducibility status can be seen at
112:yocto_home:`/reproducible-build-results/` 120:yocto_home:`/reproducible-build-results/`
113 121
114You can also check the reproducibility status on supported host distributions: 122You can also check the reproducibility status on the Autobuilder:
115 123:yocto_ab:`/valkyrie/#/builders/reproducible`.
116- CentOS: :yocto_ab:`/typhoon/#/builders/reproducible-centos`
117- Debian: :yocto_ab:`/typhoon/#/builders/reproducible-debian`
118- Fedora: :yocto_ab:`/typhoon/#/builders/reproducible-fedora`
119- Ubuntu: :yocto_ab:`/typhoon/#/builders/reproducible-ubuntu`
120 124
121=============================== 125===============================
122Can I test my layer or recipes? 126Can I test my layer or recipes?
diff --git a/documentation/dev-manual/runtime-testing.rst b/documentation/test-manual/runtime-testing.rst
index 7a2b42f25a..557e0530b0 100644
--- a/documentation/dev-manual/runtime-testing.rst
+++ b/documentation/test-manual/runtime-testing.rst
@@ -1,5 +1,6 @@
1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK 1.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
2 2
3************************************
3Performing Automated Runtime Testing 4Performing Automated Runtime Testing
4************************************ 5************************************
5 6
@@ -153,7 +154,7 @@ options are available:
153 154
154 If you choose "SystemdbootTarget", there are additional requirements 155 If you choose "SystemdbootTarget", there are additional requirements
155 and considerations. See the 156 and considerations. See the
156 ":ref:`dev-manual/runtime-testing:selecting systemdboottarget`" section, which 157 ":ref:`test-manual/runtime-testing:selecting systemdboottarget`" section, which
157 follows, for more information. 158 follows, for more information.
158 159
159- *"BeagleBoneTarget":* Choose "BeagleBoneTarget" if you are deploying 160- *"BeagleBoneTarget":* Choose "BeagleBoneTarget" if you are deploying
@@ -179,7 +180,7 @@ Selecting SystemdbootTarget
179 180
180If you did not set :term:`TEST_TARGET` to "SystemdbootTarget", then you do 181If you did not set :term:`TEST_TARGET` to "SystemdbootTarget", then you do
181not need any information in this section. You can skip down to the 182not need any information in this section. You can skip down to the
182":ref:`dev-manual/runtime-testing:running tests`" section. 183":ref:`test-manual/runtime-testing:running tests`" section.
183 184
184If you did set :term:`TEST_TARGET` to "SystemdbootTarget", you also need to 185If you did set :term:`TEST_TARGET` to "SystemdbootTarget", you also need to
185perform a one-time setup of your controller image by doing the following: 186perform a one-time setup of your controller image by doing the following:
diff --git a/documentation/test-manual/test-process.rst b/documentation/test-manual/test-process.rst
index 7bec5ba828..945b56830f 100644
--- a/documentation/test-manual/test-process.rst
+++ b/documentation/test-manual/test-process.rst
@@ -20,7 +20,7 @@ helps review and test patches and this is his testing tree).
20We have two broad categories of test builds, including "full" and 20We have two broad categories of test builds, including "full" and
21"quick". On the Autobuilder, these can be seen as "a-quick" and 21"quick". On the Autobuilder, these can be seen as "a-quick" and
22"a-full", simply for ease of sorting in the UI. Use our Autobuilder 22"a-full", simply for ease of sorting in the UI. Use our Autobuilder
23:yocto_ab:`console view </typhoon/#/console>` to see where we manage most 23:yocto_ab:`console view </valkyrie/#/console>` to see where we manage most
24test-related items. 24test-related items.
25 25
26Builds are triggered manually when the test branches are ready. The 26Builds are triggered manually when the test branches are ready. The
diff --git a/documentation/test-manual/understand-autobuilder.rst b/documentation/test-manual/understand-autobuilder.rst
index 6b4fab4f0b..7f4d1be3cd 100644
--- a/documentation/test-manual/understand-autobuilder.rst
+++ b/documentation/test-manual/understand-autobuilder.rst
@@ -10,7 +10,7 @@ Execution Flow within the Autobuilder
10The "a-full" and "a-quick" targets are the usual entry points into the 10The "a-full" and "a-quick" targets are the usual entry points into the
11Autobuilder and it makes sense to follow the process through the system 11Autobuilder and it makes sense to follow the process through the system
12starting there. This is best visualized from the :yocto_ab:`Autobuilder 12starting there. This is best visualized from the :yocto_ab:`Autobuilder
13Console view </typhoon/#/console>`. 13Console view </valkyrie/#/console>`.
14 14
15Each item along the top of that view represents some "target build" and 15Each item along the top of that view represents some "target build" and
16these targets are all run in parallel. The 'full' build will trigger the 16these targets are all run in parallel. The 'full' build will trigger the
diff --git a/documentation/toaster-manual/reference.rst b/documentation/toaster-manual/reference.rst
index 755b895cee..3050b5d0f5 100644
--- a/documentation/toaster-manual/reference.rst
+++ b/documentation/toaster-manual/reference.rst
@@ -546,7 +546,7 @@ database.
546 546
547You need to run the ``buildslist`` command first to identify existing 547You need to run the ``buildslist`` command first to identify existing
548builds in the database before using the 548builds in the database before using the
549:ref:`toaster-manual/reference:\`\`builddelete\`\`` command. Here is an 549:ref:`toaster-manual/reference:``builddelete``` command. Here is an
550example that assumes default repository and :term:`Build Directory` names: 550example that assumes default repository and :term:`Build Directory` names:
551 551
552.. code-block:: shell 552.. code-block:: shell
@@ -555,7 +555,7 @@ example that assumes default repository and :term:`Build Directory` names:
555 $ python ../bitbake/lib/toaster/manage.py buildslist 555 $ python ../bitbake/lib/toaster/manage.py buildslist
556 556
557If your Toaster database had only one build, the above 557If your Toaster database had only one build, the above
558:ref:`toaster-manual/reference:\`\`buildslist\`\`` 558:ref:`toaster-manual/reference:``buildslist```
559command would return something like the following:: 559command would return something like the following::
560 560
561 1: qemux86 poky core-image-minimal 561 1: qemux86 poky core-image-minimal
@@ -576,7 +576,7 @@ the database.
576 576
577Prior to running the ``builddelete`` command, you need to get the ID 577Prior to running the ``builddelete`` command, you need to get the ID
578associated with builds by using the 578associated with builds by using the
579:ref:`toaster-manual/reference:\`\`buildslist\`\`` command. 579:ref:`toaster-manual/reference:``buildslist``` command.
580 580
581``perf`` 581``perf``
582-------- 582--------