1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux 3.0.3 release. This RCPL provides fixes for known problems found in this base release. You can control which RCPL layer to use for a specific build via the "--with-rcpl-version" option of the configure command. The default value for "--with-rcpl-version" is "auto" which will automatically select the newest RCPL installed on the host machine. You can also specifically select an RCPL by setting the "--with-rcpl-version" value to the RCPL number that you wish to use. So, if you wanted to select RCPL 0002 for the project build you could specify that at configure time using "--with-rcpl-version=0002". $ /wrlinux-3.0/wrlinux/configure --enable-board=common_pc \ --enable-kernel=standard --enable-rootfs=glibc_std \ --with-rcpl-version=0002 This will force this project build to use RCPL 0002 even if an RCPL 0003 or RCPL 0004 has been installed on the host machine. If you wanted to build a project that doesn't use any RCPL's, but just uses the base installation layers, you can set "--with-rcpl-version=0". Once a newer RCPL has been added to the installation, existing projects that have been using the default "--with-rcpl-version=auto" can pick up the new fixes by doing a "make reconfig". When using the "make reconfig" command you may also want to use "LDAT_FORCE_CLEAN=distclean" on the subsequent make: $ make reconfig $ make LDAT_FORCE_CLEAN=distclean Any project that had specifically specified an RCPL, say with "--with-rcpl-version=0002", will be unaffected by the installation of a newer RCPL. It will continue to use the one previously specified. This allows a particular project to remain on a specific RCPL. It is also possible to override the "--with-rcpl-version" setting when you do a reconfig by setting the environment variable ENV_RCPL_VERSION . This will override any previous setting from the "--with-rcpl-version" configure option. The RCPL contains layers that are parallel to the base release's layers. If any file changed within a package or template in that layer, the entire package or template is reproduced in the RCPL version of that package or template. Any package or template that exists in the RCPL layer will be used instead of the corresponding base releases version. 2.0 TOOLS The RCPL layer also contains patch_history directories. These directories are scattered in the various sub-layers of the RCPL and contain all the patches that were applied to that sub-layer's files. The headers contain the defect ids to indicate what fixes were needed for that defect id. One defect could create a fix across multiple sub-layers. Also, one patch might fix multiple defects, and would have multiple defect lines. 2.1 A command line tool - rcpl-rcl.sh This command line tool has been provided to help correlate the various patches to the defects they fixed. It is located here: /wrlinux-3.0/scripts/rcpl/rcpl-cl.sh You can run this script and provide the defect id to see the patch file, package and files affected by the change to fix the defect. Run the tool's help option for more information. Here is a quick guide: Help : 'rcpl-cl.sh --help' All patches : 'rcpl-cl.sh all' All Linux patches : 'rcpl-cl.sh -p linux' All Toolchain patches : 'rcpl-cl.sh -p toolchain' All CVE patches : 'rcpl-cl.sh -c all' Single Defect : 'rcpl-cl.sh WIND00283578' Just show the Defect #: 'rcpl-cl.sh all -D' 2.2 A gui tool - rcpl-gui.sh This GUI line tool has been provided to help provide advanced functions on addition to the features of the command line tool, including: * Explore the content of an RCPL * Compare one RCPL with another * Compare an existing wrlinux project against an RCPL * Export the data to a Text, CSV, or HTML file. The GUI tool is located here: /wrlinux-3.0/scripts/rcpl/rcpl-gui.(sh|bat) * On Linux, start the tool with: $ cd $ ./wrlinux-3.0/scripts/rcpl/rcpl-gui.sh * On Windows, start the tool with: > cd > wrlinux-3.0\scripts\rcpl\rcpl-gui.bat You can open "Help > Help" for detailed information and examples. 3.0 WORKBENCH Platform projects in Workbench work the same way as the command line. Application Projects however in Workbench do not get their environment from configured projects, so you must do the following to set the RCPL version. Workbench explicitly uses the ENV_RCPL_VERSION value in the environment to set its RCPL environment. This value must be set globally in your shell's resource file, so that this value is passed to Workbench both when invoked from the command line and from a desktop icon or menu. As descripted above, if this value is undefined, then the highest installed version of RCPL is used. If a value is set, then that RCPL version is used. If the value is set to "0", then the original installation is used. By default, your system will have ENV_RCPL_VERSION undefined, which should provide the expected default behavior for almost all users. If you change the value for ENV_RCPL_VERSION, you must restart Workbench to get the toolchain that the RCPL may include. You may also need to restart your Linux windowing system to update the environment that the desktop icon or menu uses for Workbench. WARNING: if an invalid ENV_RCPL_VERSION value is set, then the warning message "Package 'wrlinux-3.0(platform/wrlinux/3.0.0)' is invalid ... variable ENV_RCPL_VERSION-IS-VALID not defined" will appear in the Error Log, and the entire wrlinux product will be disabled in Workbench. Reset the value and restart Workbench. For Linux, here is how you set ENV_RCPL_VERSION: * If your default shell is 'bash', add this to "~/.bashrc": export ENV_RCPL_VERSION=nnnn * If your default shell is 'csh', add this to "~/.cshrc": setenv ENV_RCPL_VERSION nnnn * To revert the RCPL version to the default, simply remove these assignments. For Windows, here is how you set ENV_RCPL_VERSION: 1) Select "Start > Control Panel > System", and click "Advanced System Settings" 2) Select the "Advanced" tab, and click the button "Environment Variables" 3) Click "New" for "User Variables". 4) Set the "Name" to ENV_RCPL_VERSION, and the "Value" to nnnn, and save. * To revert the RCPL version to the default, simply delete this environment variable. 4.0 INSTALLATION INSTRUCTIONS The RCPL zip files can be found on Wind River's On-Line Support web site. You need to unzip the RCPL zip file into the updates directory of the local installation. If there are also toolchain zip files you also need to unzip the toolchain zip files for the appropriate architecture into the updates directory of the local installation. 1. Unzip the patches under [install_dir]/updates 2. From the [install_dir]/updates directory, run the command: $ ../maintenance/wrInstaller/x86-linux2/wrInstaller 3. Follow the instructions for installing a patch, Select the "Patch" option. This will create a new RCPL directory in the [install_dir]/wrlinux-3.0/layers/updates directory. See instructions above on how projects can include the fixes in the RCPL. 5. Troubleshooting 5.1 Patch not available There are certain patch file(s) that are not available in the RCPL tree for browsing. In some cases this is because the patches are directly wrapped into binary files (specifically the toolchain), in other cases it is because of the nature of how the fix was tracked. If you have questions about one of these patches, please contact your Wind River service representative. Patch History Defect List: WIND00154005: HOST_BUILD_BIN_DIR isn't being passed to linux-live iso creation script WIND00180270: Security Advisory - Linux - CVE-2009-2695 WIND00187713: Security Advisory - Samba - CVE-2009-2948 WIND00195572: float error in kernel (fsl_8572ds) WIND00197005: Security Advisory - Linux - CVE-2009-4537 WIND00197995: Security Advisory - Linux - CVE-2010-0291 WIND00203690: rpc.mountd return wrong value when it try to export on device which has > 256 major ID (with QEMU target) WIND00211612: Security Advisory - python - CVE-2009-4134 WIND00211613: Security Advisory - python - CVE-2010-1450 WIND00211614: Security Advisory - python - CVE-2010-1449 WIND00215250: Security Advisory - sudo - CVE-2010-1646 WIND00216703: wrlinux 3.0.2, multilib error WIND00217141: Security Advisory - Python - CVE-2010-1634 WIND00217143: Security Advisory - GnuTLS - CVE-2006-7239 WIND00217144: Security Advisory - Python - CVE-2010-2089 WIND00217697: /sys folder missing in uclibc_small filesystem image WIND00218112: Security Advisory - samba - CVE-2010-2063 WIND00218130: Security Advisory - libtiff - CVE-2010-2065 WIND00218806: Security Advisory - MySQL - CVE-2010-1849 WIND00218807: Security Advisory - MySQL - CVE-2010-1848 WIND00218808: Security Advisory - MySQL - CVE-2010-1850 WIND00218814: Security Advisory - dhcp - CVE-2010-2156 WIND00221132: Security Advisory - LibTIFF - CVE-2010-2481 WIND00221134: Security Advisory - LibTIFF - CVE-2010-2483 WIND00221319: Security Advisory - LibTIFF - CVE-2010-2595 WIND00221321: Security Advisory - LibTIFF - CVE-2010-2597 WIND00221324: Security Advisory - LibTIFF - CVE-2010-2598 WIND00221542: wrlinux 3.0.2, Cavium, "rpm -qa" produces assertion failed WIND00221672: Security Advisory - ruby - CVE-2010-2489 WIND00222223: Security Advisory - pcsc-lite - CVE-2010-0407 WIND00222224: Security Advisory - libpng - CVE-2010-1205 WIND00222635: wrlinux-3.0.2: busybox udhcpc script (default.script) generates 'syntax error' WIND00223152: Security Advisory - mipv6 - CVE-2010-2523 WIND00223158: Security Advisory - freetype - CVE-2010-2497 WIND00223160: Security Advisory - freetype - CVE-2010-2498 WIND00223161: Security Advisory - freetype - CVE-2010-2499 WIND00223162: Security Advisory - freetype - CVE-2010-2500 WIND00223163: Security Advisory - freetype - CVE-2010-2519 WIND00223164: Security Advisory - freetype - CVE-2010-2520 WIND00223583: Security Advisory - freetype - CVE-2010-2527 WIND00223791: Security Advisory - iputils - CVE-2010-2529 WIND00223986: Security Advisory - qt - CVE-2010-2621 WIND00224734: libxcb: X clients face slow transmission performance due to the Nagle algorithm. WIND00224919: Security Advisory - git - CVE-2010-2542 WIND00224920: Security Advisory - freetype - CVE-2010-2541 WIND00226086: Security Advisory - linux - CVE-2010-2524 WIND00226253: Security Advisory - Socat - CVE-2010-2799 WIND00226494: Security Advisory - apache - CVE-2010-1452 WIND00226495: Security Advisory - FreeType - CVE-2010-1797 WIND00226873: net-snmp : potential double free WIND00227224: Security Advisory - qemu - CVE-2010-2804 WIND00227241: Security Advisory - FreeType - CVE-2010-2805 WIND00227242: Security Advisory - FreeType - CVE-2010-2806 WIND00227244: Security Advisory - FreeType - CVE-2010-2807 WIND00227245: Security Advisory - FreeType - CVE-2010-2808 WIND00227461: Security Advisory - dbus-glib - CVE-2010-1172 WIND00227971: Configuring a glibc_small platform project with feature/small_xorg fails. WIND00228114: Security Advisory - openssl - CVE-2010-2939 WIND00228258: WR Linux 3.0.2 need kernel patch to fix dropped SCTP packets after IPSEC rekey WIND00228513: Security Advisory - lvm - CVE-2010-2526 WIND00230116: Security Advisory - FreeType - CVE-2010-3053 WIND00230121: Security Advisory - bzip2 - CVE-2010-0405 WIND00230573: Security Advisory - Quagga - CVE-2010-2948 WIND00230574: Security Advisory - Quagga - CVE-2010-2949 WIND00231598: Security Advisory - Linux - CVE-2010-2954 WIND00232137: WR Linux 3.0 mti_malta32_34k_be BSP does not have complete setting for QEMU WIND00232301: Security Advisory - freetype - CVE-2010-3054 WIND00232308: Security Advisory - Linux - CVE-2010-2784 WIND00232497: Security Advisory - samba - CVE-2010-3069 WIND00232834: Security Advisory - libtiff - CVE-2010-3087 WIND00232885: TCP wrapper is not working for sshd, vsftpd, etc WIND00234377: Security Advisory - python - CVE-2010-3493 WIND00234502: Security Advisory - freetype - CVE-2010-3311 WIND00234638: Security Advisory - nss - CVE-2010-3170 WIND00234644: Security Advisory - Linux - CVE-2010-3435 WIND00234670: bgpd is crushed when route-map command is executed. WIND00234850: Security Advisory - mysql - CVE-2010-3678 WIND00234851: Security Advisory - mysql - CVE-2010-3677 WIND00234852: Security Advisory - mysql - CVE-2010-3680 WIND00234855: Security Advisory - mysql - CVE-2010-3681 WIND00234856: Security Advisory - mysql - CVE-2010-3682 WIND00235091: Memory leak in net-snmp-5.4 found by code inspection WIND00235570: quagga/bgp : Can't set tag value with network command on vpnv4. WIND00235669: Security Advisory - mysql - CVE-2010-3835 WIND00235670: Security Advisory - mysql - CVE-2010-3836 WIND00235673: Security Advisory - mysql - CVE-2010-3837 WIND00235674: Security Advisory - mysql - CVE-2010-3838 WIND00235676: Security Advisory - mysql - CVE-2010-3840 WIND00235878: Security Advisory - Linux - CVE-2010-3477 WIND00236008: memory leak wrlinux-3.0.2 kvm WIND00236083: Security Advisory - PostgreSQL - CVE-2010-3433 WIND00236364: SRCDIR causes LDAT to fail when unpacking WIND00236692: SVN metadata causing build problems WIND00236958: Security Advisory - Linux - CVE-2010-3848 WIND00236992: Build fails when Build tool is configured to Shared Library Linker WIND00237158: Security Advisory - apache - CVE-2010-1623 WIND00237285: vlan packets with VID 0 are sent to interface WIND00237559: Security Advisory - freetype - CVE-2010-3814 WIND00237563: Security Advisory - freetype - CVE-2010-3855 WIND00237564: Security Advisory - pam - CVE-2010-3853 WIND00237797: Security Advisory - libxml - CVE-2010-XXXX WIND00237799: Security Advisory - Linux - CVE-2010-3859 WIND00238362: Security Advisory - Linux - CVE-2010-4075 WIND00238363: Security Advisory - Linux - CVE-2010-4074 WIND00238368: Security Advisory - Linux - CVE-2010-4078 WIND00238476: sctp_optname is different with application header and kernel header. WIND00238547: --enable-bootimage is not considered when importing a platform project WIND00239966: Security Advisory - Linux - CVE-2010-3876 WIND00239967: Security Advisory - Linux - CVE-2010-3877 WIND00240069: A kernel panic appears when the e1000e is initialized at kernel startup WIND00240278: wrlinux : lvm2 is not creating device names of 108-127 bytes long WIND00240392: Memory leak in net-snmp package. WIND00240428: Security Advisory - openssl - CVE-2010-3864 WIND00240429: Security Advisory - Linux - CVE-2010-3880 WIND00240430: Security Advisory - fuse - CVE-2010-3879 WIND00240710: Can't build apps on Windows (Error: Unable to determine sysroot!) WIND00241479: Fix request for the virt_to_phys () for the MIPS64 architecture. WIND00241525: Some sysroot uses wrong path and causes link error WIND00242274: Security Advisory - dhcp - CVE-2010-3611 WIND00242275: Security Advisory - Paste - CVE-2010-2477 WIND00243720: mpc837xemds-u-boot.bin.gz is not gzip format WIND00243988: CPU soft Lockup in Windriver Linux 3.0.2 WIND00244047: wrl 2 : after resize2fs, e2fsck reports wrong block count for resize inode WIND00244379: Design issue in buffer size in gfar_change_mtu() WIND00245437: Security Advisory - imagemagick - CVE-2010-4167 WIND00245438: Security Advisory - Linux - CVE-2010-4248 WIND00245439: Security Advisory - Linux - CVE-2010-4249 WIND00245443: Security Advisory - Linux - CVE-2010-4165 WIND00245613: wrlinux 3.0.3 - make reconfig fails to find templates WIND00246887: the system is stuck after doing CPU hotplug operation on RMI XLR board WIND00247364: Security Advisory - OpenSSL - CVE-2008-7270 WIND00247365: Security Advisory - krb5 - CVE-2010-1324 WIND00247372: Security Advisory - OpenSSL - CVE-2010-4180 WIND00248584: security enhancement request for iptables WIND00249004: Security Advisory - Linux - CVE-2010-4526 WIND00249133: Security Advisory - Linux - CVE-2010-4158 WIND00249134: Security Advisory - Linux - CVE-2010-4342 WIND00249136: Security Advisory - Linux - CVE-2010-4346 WIND00249647: With RPM_INSTALL="" the package is still put into the target filesystem WIND00252309: Security Advisory - Linux - CVE-2010-4527 WIND00252311: Security Advisory - Linux - CVE-2010-4242 WIND00252773: omapl138 GPIO - WR4.0 continuously trigger on the POLLIN event whereas WR3.0 does not. WIND00252809: pkg-config to nss package shows an error. WIND00253867: Incorrect license attributed to iozone package WIND00254763: Security Advisory - DHCP - CVE-2011-0413 WIND00254764: Security Advisory - libuser - CVE-2011-0002 WIND00254766: Security Advisory - libpng - CVE-2011-0408 WIND00254771: Security Advisory - Linux - CVE-2011-0521 WIND00254774: Security Advisory - pam - CVE-2010-4706 WIND00254776: Security Advisory - pango - CVE-2011-0020 WIND00254952: Hot plugging SATA HDD to mpc837x board fails when CONFIG_PREEMPT is `y' WIND00255277: wrlinux 3.0.3 - CONFIG_LLC2 WIND00255416: Unaligned access causes a segmentation fault on mips64_xlr. WIND00255794: Security Advisory - krb5 - CVE-2011-0282 WIND00255795: Security Advisory - krb5 - CVE-2011-0281 WIND00256034: Official patch request for WRLInux2.0.4 WIND00257870: qemu stswi instruction is broken WIND00258708: Security Advisory - nbd - CVE-2011-0530 WIND00258710: Security Advisory - shadow - CVE-2011-0721 WIND00258711: Security Advisory - Linux - CVE-2011-0712 WIND00259619: control M characters in userspace packages logs WIND00259735: Cannot resize window after starting simics in wrlinux default console with make start-simics WIND00259758: ntpd is crashing sometimes when system is booting up WIND00260003: Enabling CONFIG_X86_BIGSMP and CONFIG_HIGHMEM64G causes build faliure WIND00260699: Missing template: feature/small_debug WIND00260702: ltp mount patching failure WIND00261089: Simics console prompt loses focus when starting target in stopped mode WIND00261289: kernel oops due to NULL pointer access in pty driver WIND00262175: Security Advisory - vsftpd - CVE-2011-0762 WIND00262177: Security Advisory - Linux - CVE-2011-0695 WIND00262178: Security Advisory - Linux - CVE-2011-1010 WIND00262179: Security Advisory - Linux - CVE-2011-1017 WIND00262181: Security Advisory - Linux - CVE-2011-1012 WIND00262182: Security Advisory - pango - CVE-2011-0064 WIND00262183: Security Advisory - openssh - CVE-2010-4755 WIND00262185: Security Advisory - Ruby - CVE-2011-1004 WIND00262186: Security Advisory - Ruby - CVE-2011-1005 WIND00262567: error: '__NR_syscall_max' undeclared (first use in this function) WIND00262575: [SCTP] don't send ABORT chunk when receive SHUTDOWN chunk with illegal cumlative TSN Ack WIND00263523: Wind River Linux not able to connect to VPX6-185 Mottsec0 on WR Linux GOS WIND00263824: Possible deadlock problems in Linux kernel WIND00263846: WR-Linux kernel doesn't start on fsl_mpc8313e_rdb with early-ftrace and ftrace templates. WIND00263982: rpm multilib conflicts WIND00265642: wrlinux-3 : talitos security engine and OCF driver issues --> cannot execute the ocf_bench WIND00266141: Security Advisory - logrotate - CVE-2011-1155 WIND00266143: Security Advisory - logrotate - CVE-2011-1098 WIND00266144: Security Advisory - logrotate - CVE-2011-1548 WIND00266146: Security Advisory - LibTIFF - CVE-2011-1167 WIND00266367: Security Advisory - quagga - CVE-2010-1675 WIND00266368: Security Advisory - quagga - CVE-2010-1674 WIND00266369: Security Advisory - ruby - CVE-2011-0188 WIND00266989: Security Advisory - DHCP - CVE-2011-0997 WIND00267082: patches of .spec file does not work as intended WIND00268699: Ethernet issues on wrs_powerquiccii_82xx board WIND00269520: Security Advisory - Perl - CVE-2011-1487 WIND00269521: Security Advisory - Samba - CVE-2011-1678 WIND00269522: Security Advisory - util-linux - CVE-2011-1675 WIND00269524: Security Advisory - util-linux - CVE-2011-1677 WIND00269525: Security Advisory - x11 - CVE-2011-0465 WIND00269526: Security Advisory - xmlsec - CVE-2011-1425 WIND00270079: After Applying WR Linux 3 .0 Update pack 3 patches, VLANs stopped working WIND00270531: Errors when building gnu toolchain for WRL platform WIND00271407: python will not import bsddb WIND00273120: After Applying WR Linux 3 .0 Update pack 3 patches, VLANs stopped working on a multi interface setup one vlan tagged and other is not. WIND00276591: cmake host tool can not be built on some hosts WIND00277209: If UDP checksum error occurs, udpv6_recvmsg() always retry it WIND00277729: Security Advisory - LibTIFF - CVE-2010-4665 WIND00277730: Security Advisory - Linux - CVE-2011-1746 WIND00277731: Security Advisory - Linux - CVE-2011-1748 WIND00277734: Security Advisory - Linux - CVE-2011-1598 WIND00277736: Security Advisory - Linux - CVE-2011-1090 WIND00277737: Security Advisory - Linux - CVE-2011-1745 WIND00277745: Security Advisory - Linux - CVE-2011-1593 WIND00277746: Security Advisory - Linux - CVE-2011-1577 WIND00277751: Security Advisory - Python - CVE-2011-1015 WIND00279372: when starting oprofile function on cav_56xx board, system hang WIND00279434: WR Linux 3.0.3 - NTP server not creating a drift file WIND00281143: wrlinux 3.x/4.x cannot issue make export-layer in a kernel only build WIND00281162: wrl 2.0.4 : logrotate crashes on startup with default parameters WIND00281596: Security Advisory - Apache - CVE-2011-1752 WIND00281599: Security Advisory - Linux - CVE-2010-4805 WIND00281600: Security Advisory - Linux - CVE-2010-4251 WIND00281609: Security Advisory - Python - CVE-2011-1521 WIND00281975: Setting of MSG_TRUNC flag in udpv6_recvmsg() WIND00282267: Not able to access the same ip address(URL) with Apache web server via http(port 80) and https(port443) WIND00283575: Security Advisory - OProfile - CVE-2011-2473 WIND00283576: Security Advisory - OProfile - CVE-2011-1760 WIND00283577: Security Advisory - OProfile - CVE-2011-2471 WIND00283578: Security Advisory - OProfile - CVE-2011-2472 WIND00284246: Misalignment in raw packet socket output when vlan interface is enabled WIND00284697: dnssec-keygen and "keynote keygen" not work on wrlinux3.0.3 WIND00285141: kernel oops p4080 SLUB allocator WIND00286005: Oprofile fails to collect signal sample in powerpc on wrlinux3.0 WIND00286270: Fix request for RMI XLR Erratum: 3.4.6 (Product Alert #10409.2) WIND00286633: Not able to access the same ip address(URL) with Apache web server via http(port 80) and https(port443) without redirection WIND00286693: Security Advisory - DBus - CVE-2011-2200 WIND00286702: Security Advisory - Linux - CVE-2011-2484 WIND00286703: Security Advisory - Linux - CVE-2011-1171 WIND00286705: Security Advisory - Linux - CVE-2011-1173 WIND00286706: Security Advisory - Linux - CVE-2011-2534 WIND00286707: Security Advisory - Linux - CVE-2011-1172 WIND00287035: Xerces package contains vulnerability that can cause application crash and lead to security threat WIND00288980: pthread_cond_timedwait can not enter waiting state WIND00289141: Update qemu host tool from 0.9 to 0.14+ WIND00289213: Security Advisory - syslog-ng - CVE-2011-1951 WIND00289215: Security Advisory - libcurl - CVE-2011-2192 WIND00290484: When the telnet demon is done by kill,"tty_ldisc_deref: no references." is output. WIND00290669: elfutils host-tool does not compile on ubuntu 10.10 WIND00290846: oprofile can not work with "--event=" option in glibc_small rootfs WIND00291185: wrlinux-2.0.4: bugzilla 592956 issue in sysvinit not addressed and generates " pidof[13315]: can't get program name from /proc/13306/stat" error WIND00291241: Security Advisory - Linux - CVE-2011-1944 WIND00291617: Security Advisory - libpng - CVE-2011-2690 WIND00291619: Security Advisory - libpng - CVE-2011-2691 WIND00291620: Security Advisory - libpng - CVE-2011-2692 WIND00291621: Security Advisory - libpng - CVE-2011-2501 WIND00291622: Security Advisory - libsndfile - CVE-2011-2696 WIND00291629: Security Advisory - Linux - CVE-2010-4656 WIND00291630: Security Advisory - Linux - CVE-2011-1093 WIND00291631: Security Advisory - Linux - CVE-2011-0726 WIND00292499: unionfs will occasionally trigger a kernel oops WIND00294088: Security Advisory - DHCP - CVE-2011-2748 WIND00294092: Security Advisory - Ruby - CVE-2011-2705 WIND00294703: iptables-ipv6 not installed WIND00295620: INTEL: Feature Testing: WBtools:a lot of BSPs are not able to boot up with Simics WIND00295859: bash crashes due to failed read() operation WIND00296218: Incorrect text in wrs_kernheader package makefile WIND00299598: Security Advisory - libpng - CVE-2009-5063 WIND00299599: Security Advisory - libsoup - CVE-2011-2524 WIND00299600: Security Advisory - Linux - CVE-2011-2213 WIND00299601: Security Advisory - Linux - CVE-2011-2928 WIND00299602: Security Advisory - Linux - CVE-2011-2497 WIND00299687: vixie-cron package will not build in project with small file system WIND00303277: PAGEEXEC feature not functional on PPC plaform WIND00303286: Security threat in Xerces, Removing the content handler from SAX2XMLReader mid-parse causes a null-pointer exception in some circumstances WIND00303492: Samhain package contains race condition that causes vulnerability threat WIND00304592: memory leaks detected in net-snmp package WIND00306461: Security Advisory - Linux - CVE-2011-1776 WIND00306468: Security Advisory - samba - CVE-2011-2724 WIND00307464: Doing a make reconfig does not reshadow binary host tools WIND00307846: SEC 3.0 functionality does NOT work with BSP fsl_mpc8572_ds in WRLinux-4.2 WIND00308423: Switching over from primary to secondary path of a SCTP association causes Linux paging fault/error WIND00308461: build error of package ipmi-test WIND00309125: Allow kernel to use User Mode NFS server without rpcbind or portmap on the host system WIND00309157: WRL 3.0.3 has missing '-p' option for $(MKDIR) in ldat/scripts/packages.mk WIND00310559: [RCPL0003]build failed on fsl_mpc837xe board WIND00310834: [RCPL0001]Build error on common_pc_64-standard-glibc_std in WRLinux 3.0.3 RCPL WIND00311246: Security Advisory - Linux - CVE-2011-1573 WIND00311483: Security Advisory - Apache - CVE-2011-3368 WIND00311487: Security Advisory - OpenSSL - CVE-2011-3207 WIND00311488: Security Advisory - OpenSSL - CVE-2011-3210 WIND00311490: Security Advisory - acpid - CVE-2011-1159 WIND00311910: Exiting the script console mux with control-a x when running Simics kills the parent process WIND00312289: Build vixie-cron error on WRL-303 WIND00312585: TX packets and TX bytes does not counted up correctly with e1000 driver WIND00312649: Security Advisory - Linux - CVE-2011-2189 WIND00312959: Default config for rpc.statd do not match those for sm-notify WIND00313079: [RCPL0001]After applying RCPL reconfig doesn't recognize new layer WIND00313930: [RCPL0002]The update for wrll-unsupported bootstrap_openssl does not work in wrll-WRLinux 3.0.3 RCPL2 WIND00314175: [RCPL0002] the updates in ./wrlinux-3.0/layers/wrll-analysis-1.0 doesn't work in wrlinux-3.0.3+RCPL0002. WIND00314188: wrlinux-3.*cgl: Can't set irq affinity of NIC on common_pc_64 WIND00314192: wrlinux-3.* cgl: lots of calltrace if append 'softirq-preempt=0' to kernel command line WIND00314539: Security Advisory - krb5 - CVE-2011-1527 WIND00314569: Security Advisory - quagga - CVE-2011-3323 WIND00314579: Security Advisory - quagga - CVE-2011-3324 WIND00314589: Security Advisory - quagga - CVE-2011-3325 WIND00314599: Security Advisory - quagga - CVE-2011-3326 WIND00314609: Security Advisory - quagga - CVE-2011-3327 WIND00315650: make fails on inetutils after a make reconfig WIND00315838: tipc deadlock problem when tipc link retransmit failed. WIND00315847: Softlockup(deadlock) problem when a flood of ipv6 dad patckets are existing WIND00316312: Security Advisory - libxml2 - CVE-2011-2834 WIND00317505: Simics will not cleanly exit with control-a x WIND00318514: Security Advisory - apache - CVE-2011-3607 WIND00318596: [RCPL0003] Fail to build 'xerces' on 3.0.3+RCPL0003. WIND00319044: Not all all of the fragments of UDP packets will get sent WIND00319130: Security Advisory - Linux - CVE-2011-4324 WIND00319143: Security Advisory - Linux - CVE-2011-4110 WIND00319163: Security Advisory - Linux - CVE-2011-4330 WIND00319164: Security Advisory - openssh - CVE-2011-4327 WIND00319165: Security Advisory - Linux - CVE-2011-4112 WIND00319168: Security Advisory - bind - CVE-2011-4313 WIND00319634: dhclient -n option not working WIND00319735: [RCPL0003] Fail to rebuild an existing project after installing RCPL0003 + wrll-toolchain-4.3a-299. WIND00319809: PYTHONPATH is replaced rather than appended to WIND00320850: Miscellaneous Kernel Fixes WIND00320879: Gdb can not get the backtrace from the kdump core file on x86_64 WIND00321130: wrlinux 2.0.4 SCTP uncompliance WIND00322171: [RCPL0003] Fail to build project in workbench on Windows. WIND00322496: Building perl as non-root user causes "Permission denied". WIND00322935: Security Advisory - DHCP - CVE-2011-4539 WIND00322936: Security Advisory - GnuTLS - CVE-2011-4128 WIND00322937: Security Advisory - krb5 - CVE-2011-1530 WIND00322939: Security Advisory - Apache - CVE-2011-4317 WIND00322941: Security Advisory - Apache - CVE-2011-3639 WIND00324927: Memory analyzer takes minutes to start with ARM and C++ on WRL / WB WIND00325054: build error on libselinux WIND00325260: WRL 3.0.3: using 'quet' kernel boot option prevents SPI serial device from being available WIND00325441: x86: the __cycles_2_ns calculation in sched_clock has an overflow WIND00325457: Security Advisory - openipmi - CVE-2011-4339 WIND00325460: Security Advisory - libxml2 - CVE-2011-3905 WIND00326545: tipc soft lockup problem. WIND00327989: Security Advisory - libxml2 - CVE-2011-3919 WIND00327991: Security Advisory - openssl - CVE-2011-4108 WIND00327992: Security Advisory - openssl - CVE-2011-4109 WIND00327996: Security Advisory - openssl - CVE-2011-4576 WIND00327997: Security Advisory - openssl - CVE-2011-4577 WIND00327998: Security Advisory - openssl - CVE-2011-4619 WIND00328006: Security Advisory - krb5 - CVE-2011-4862 WIND00330583: Security Advisory - Apache - CVE-2012-0031 WIND00330589: Security Advisory - mysql - CVE-2011-2262 WIND00330824: Security Advisory - mysql - CVE-2012-0087 WIND00330837: Security Advisory - mysql - CVE-2012-0101 WIND00330838: Security Advisory - mysql - CVE-2012-0102 WIND00330840: Security Advisory - mysql - CVE-2012-0113 WIND00330842: Security Advisory - mysql - CVE-2012-0115 WIND00330843: Security Advisory - mysql - CVE-2012-0116 WIND00330844: Security Advisory - mysql - CVE-2012-0118 WIND00330845: Security Advisory - mysql - CVE-2012-0119 WIND00330846: Security Advisory - mysql - CVE-2012-0120 WIND00330847: Security Advisory - mysql - CVE-2012-0484 WIND00330848: Security Advisory - mysql - CVE-2012-0485 WIND00330849: Security Advisory - mysql - CVE-2012-0490 WIND00330866: Security Advisory - openssl - CVE-2012-0050 WIND00331150: Need fix for CVE-2011-3188 WIND00331156: Need fix for CVE-2011-2699 WIND00331359: WRLX 3.0.2 - SCTP drops packets on failover - gap in TSN/SSN WIND00331920: [review_by_Brad] WR LInux 3.0.2 -- kernel oops while writing to jffs2 file system WIND00331969: Typo in user-nfs.sh script: SAVE_NFS_NFSTPROG= should be SAVE_NFS_NFSPROG= WIND00332154: Security Advisory - openssl - CVE-2011-4354 WIND00332159: Security Advisory - Apache - CVE-2012-0053 WIND00332161: Security Advisory - Linux - CVE-2011-4077 WIND00332163: Security Advisory - Linux - CVE-2011-1162 WIND00332164: Security Advisory - Linux - CVE-2011-4132 WIND00332173: Security Advisory - qemu-kvm - CVE-2012-0029 WIND00332174: Security Advisory - openssh - CVE-2012-0814 WIND00332598: sm-notify backup dir not created WIND00334407: Security Advisory - apache - CVE-2012-0840 WIND00334430: Security Advisory - linux - CVE-2011-2525 WIND00334777: kernel panic in e1000 driver (BSP: Intel Truxton) WIND00335259: Incorrectly discarded SCTP COOKIE ECHO WIND00337491: Security Advisory - openssl - CVE-2006-7250 WIND00338104: wrlinux 3.0.3, debuginfo RPM has a missing source and wrong paths WIND00338630: Ping with large packet size didn't work (related to WIND00227970) WIND00339930: Security Advisory - openssl - CVE-2012-0884 WIND00341405: pkg-data fails to get info from "time" package in WRL3.0.2 with unexpected EOF WIND00342780: Typpos in documents that use glibc_stanard instead of glibc_std WIND00343363: Security Advisory - gnutls - CVE-2012-1569 WIND00343366: Security Advisory - gnutls. - CVE-2012-1573 WIND00343415: Security Advisory - WRLinux doesn't ship openssl. - CVE-2012-1165 WIND00343575: CPU resource of radclient is too high, when changing date WIND00344059: wrlinux 3.0.3 + RCPL 4 - kernel build crash when CONFIG_SECURITY is not set WIND00344987: wrlinux 3.0.3 - tcpslice does not work on x86_64 WIND00345310: Security Advisory - quagga - CVE-2012-0249 WIND00345311: Security Advisory - quagga - CVE-2012-0255 WIND00345312: Security Advisory - openssh - CVE-2011-5000 WIND00345313: Security Advisory - quagga - CVE-2012-0250 WIND00345314: Security Advisory - samba - CVE-2012-1182 WIND00346497: wrlinux 3.0.3 - tcpslice problems WIND00346504: WR Linux 3.0.3 -- define in sysroot/usr/include/net-snmp/net-snmp-config.h causes compiler warnings WIND00347659: Security Advisory - freetype - CVE-2012-1137 WIND00347660: Security Advisory - freetype - CVE-2012-1130 WIND00347661: Security Advisory - freetype - CVE-2012-1143 WIND00347662: Security Advisory - freetype - CVE-2012-1136 WIND00347663: Security Advisory - freetype - CVE-2012-1133 WIND00347665: Security Advisory - freetype - CVE-2012-1128 WIND00347666: Security Advisory - freetype - CVE-2012-1142 WIND00347667: Security Advisory - freetype - CVE-2012-1138 WIND00347668: Security Advisory - freetype - CVE-2012-1126 WIND00347669: Security Advisory - freetype - CVE-2012-1141 WIND00347670: Security Advisory - freetype - CVE-2012-1134 WIND00347671: Security Advisory - openssl - CVE-2012-2110 WIND00347672: Security Advisory - freetype - CVE-2012-1131 WIND00347673: Security Advisory - openssl - CVE-2012-2131 WIND00347674: Security Advisory - freetype - CVE-2012-1127 WIND00347675: Security Advisory - apache - CVE-2012-0883 WIND00347676: Security Advisory - freetype - CVE-2012-1129 WIND00347677: Security Advisory - freetype - CVE-2012-1132 WIND00347678: Security Advisory - freetype - CVE-2012-1139 WIND00347679: Security Advisory - freetype - CVE-2012-1144 WIND00347680: Security Advisory - freetype - CVE-2012-1135 WIND00347681: Security Advisory - freetype - CVE-2012-1140 WIND00348602: wrlinux 3.0.3 - tcpslice cannot merge pcap dumps based on IPv4 packets WIND00348698: Building Wind River Linux Application failed due to 'CAN NOT OPEN *-wrapper.sh' in windows XP host WIND00350123: WR Linux 3.0.3 -- Panic in usb_disconnect WIND00353043: Security Advisory - libpng - CVE-2011-3048 WIND00353051: Security Advisory - linux - CVE-2012-2319 WIND00353057: Security Advisory - openssl - CVE-2012-2333 WIND00353059: Security Advisory - linux - CVE-2012-1097 WIND00353060: Security Advisory - linux - CVE-2011-4081 WIND00353072: Security Advisory - linux - CVE-2011-2898 WIND00353079: Security Advisory - linux - CVE-2011-3191 WIND00353083: Security Advisory - linux - CVE-2011-2707 WIND00355866: Security Advisory - xinetd - CVE-2012-0862 WIND00355868: Security Advisory - linux - CVE-2011-1767 WIND00355869: Security Advisory - linux - CVE-2011-2211 WIND00355872: Security Advisory - imagemagick - CVE-2012-0259 WIND00355873: Security Advisory - imagemagick - CVE-2012-0248 WIND00355874: Security Advisory - linux - CVE-2011-1759 WIND00355880: Security Advisory - imagemagick - CVE-2012-0260 WIND00355882: Security Advisory - imagemagick - CVE-2012-0247 WIND00355891: Security Advisory - bind - CVE-2012-1667 WIND00355892: Security Advisory - linux - CVE-2012-2390 WIND00355894: Security Advisory - imagemagick - CVE-2012-1610 WIND00355895: Security Advisory - linux - CVE-2011-2496 WIND00355900: Security Advisory - linux - CVE-2011-2182 WIND00358693: Security Advisory - libxml - CVE-2012-0841 WIND00358736: Security Advisory - libxslt - CVE-2011-3970 WIND00359304: Security Advisory - linux - CVE-2012-0028 WIND00359307: Security Advisory - linux - CVE-2011-1079 WIND00359309: Security Advisory - libxml2 - CVE-2012-2807 WIND00359316: Security Advisory - qt - CVE-2011-3193 WIND00359317: Security Advisory - linux - CVE-2011-1493 WIND00359327: Security Advisory - linux - CVE-2011-1160 WIND00360247: SIGXCPU is not sent properly in the time with RLIMIT_RTTIME limit value. WIND00361431: Does WRLinux 4.3 cause futex related load spikes after the leapsecond was inserted ? WIND00361518: disabale_ipv6 can not work in wind river linux 3.0.2 WIND00362909: Security Advisory - linux - CVE-2011-4127 WIND00362917: Security Advisory - linux - CVE-2012-2133 WIND00362918: Security Advisory - linux - CVE-2012-2100 WIND00362923: Security Advisory - linux - CVE-2011-4086 WIND00362925: Security Advisory - busybox - CVE-2011-2716 WIND00366161: racoon2 does not recovery from INVALD_KE_PAYLOAD event WIND00366779: Security Advisory - dhcp - CVE-2012-3571 WIND00366784: Security Advisory - postgresql - CVE-2012-0867 WIND00366788: Security Advisory - libexif - CVE-2012-2836 WIND00366790: Security Advisory - postgresql - CVE-2012-2655 WIND00366793: Security Advisory - libexif - CVE-2012-2840 WIND00366794: Security Advisory - libexif - CVE-2012-2812 WIND00366795: Security Advisory - postgresql - CVE-2012-0868 WIND00366798: Security Advisory - libexif - CVE-2012-2837 WIND00366802: Security Advisory - pam - CVE-2011-3148 WIND00366804: Security Advisory - squashfs - CVE-2012-4024 WIND00366808: Security Advisory - libexif - CVE-2012-2813 WIND00366809: Security Advisory - libexif - CVE-2012-2841 WIND00366816: Security Advisory - postgresql - CVE-2012-0866 WIND00367541: MIPS: oops when show backtrace of all active cpu WIND00367759: system panic when trying to grep /proc/kcore on cav58xx WIND00368584: When setting the RCPL layer to 0, configure fails to pickup out layer/template WIND00369818: Update timezone for RCPL WIND00370210: Security Advisory - linux - CVE-2012-2744 WIND00370217: Security Advisory - imagemagick - CVE-2012-3437 WIND00370219: Security Advisory - automake - CVE-2012-3386 WIND00370229: Security Advisory - qemu - CVE-2012-2652 WIND00371730: ntp update time will cause softlockup when system run WIND00372703: ripd advertises incorrect routes following SIGHUP WIND00373260: net-tools-1.60: "netstat" does not support SCTP WIND00373283: Building fetch-footprint is failed if there is 'patches' in your product path. WIND00373995: Security Advisory - Net-snmp - CVE-2012-2141 WIND00373999: Security Advisory - apache - CVE-2012-3502 WIND00374000: Security Advisory - bash - CVE-2012-3410 WIND00374012: Security Advisory - libtiff - CVE-2012-3401 WIND00374015: Security Advisory - python - CVE-2012-2135 WIND00376270: pty: deadlocks under heavy load. WIND00376773: Security Advisory - librsvg - CVE-2011-3146 WIND00376774: Security Advisory - bind - CVE-2012-4244 WIND00376775: Security Advisory - dhcp - CVE-2012-3955 WIND00376778: Security Advisory - libxslt - CVE-2012-2870 WIND00376779: Security Advisory - libxml2 - CVE-2012-2871 WIND00381266: RIP daemon sends first advertisement after SIGHUP irregularly WIND00382746: Security Advisory - python. - CVE-2012-0845 WIND00382754: Security Advisory - bind. - CVE-2012-5166 WIND00382760: Security Advisory - linux - CVE-2012-3400 WIND00382763: Security Advisory - postgresql - CVE-2012-3488 WIND00382770: Security Advisory - postgresql - CVE-2012-3489 WIND00383263: debuginfo lacks source to static libraries WIND00383719: [ipsec] xfrm_user: return error pointer instead of NULL WIND00383722: [ipsec] xfrm_user: fix info leak in copy_to_user_xxx WIND00386623: wrlinux 3.0.2 installer feature issue WIND00391068: when install iso created with installer feature, it show wrong progress info WIND00391080: pty: pty slave never wake up under heavy load. WIND00391781: jffs_gcd_mtd hang and cause kernel panic WIND00392008: Security Advisory - qemu - CVE-2012-3515 WIND00392072: Security Advisory - libxml2 - CVE-2012-5134 WIND00392897: Xorg takes maximum cpu load with -sharevts. WIND00394506: nfs server mountd bug WIND00394606: Security Advisory - apache - CVE-2012-4557 WIND00394999: libcurl version 7.19.3 has a known bug related to how timeouts are calculated WIND00395095: wrl 4.3 / ldat : configuring from wrl 4.3 Installation referenced by a soft- link may create unexpected behavior (fs_final.sh duplicated) WIND00395173: WR Linux 3.0.3 -- SCTP association can get stuck in SCTP_STATE_SHUTDOWN_PENDING state forever WIND00395179: WR Linux 3.0.3 -- SCTP can hang forever while attempting shutdown WIND00396458: BUG: soft lockup in i_size_read() WIND00396707: In WRL-3.0.2 executing the 'date nnnnnnnn' command causes a core dump. WIND00397027: Security Advisory - perl - CVE-2011-2728 WIND00397317: Update timezone WIND00397586: WR Linux 3.0.3 -- SCTP does not properly check the source address of COOKIE-ECHO chunk WIND00399160: lksctp-tools: sctp_xconnect: memory leak when malloc big buffer WIND00399177: Security Advisory - grep - CVE-2012-5667 WIND00399178: Security Advisory - libtiff - CVE-2012-5581 WIND00399480: Windriver 2.0 SP3 bash memory leak WIND00399814: SCTP Multi-homing issue in IPv6 WIND00400565: Cannot create platform project on WRL 3.0.3 / RCPL 14 on older dev hosts using glibc 2.3 WIND00402351: Security Advisory - freetype - CVE-2012-5669 WIND00402376: Security Advisory - freetype - CVE-2012-5670 WIND00402377: Security Advisory - freetype - CVE-2012-5668 WIND00402667: mpatrol command line fails on wrlinux-3.0.3 with memdemo example application WIND00403430: Random failure of mount on mips WIND00404141: Security Advisory - openssl - CVE-2013-0166 WIND00404143: Security Advisory - qemu - CVE-2012-6075 WIND00404148: Security Advisory - postgresql - CVE-2013-0255 WIND00404151: Security Advisory - openssl - CVE-2013-0169 WIND00404290: An issue about kernel crash when changing mtu under traffic stress WIND00404846: WR Linux 3.0.2 -- RIPD leaks file descriptors with each reconfig WIND00404924: error occured when run "export LC_CTYPE=en_US.UTF-8" WIND00406211: Security Advisory - apache - CVE-2012-3499 WIND00406226: Security Advisory - apache - CVE-2012-4558 WIND00407942: bind builds without IPv6 support WIND00408940: drbd full sync after reboot WIND00411209: Security Advisory - nss - CVE-2012-0441 WIND00412175: wrlinux 3.x - [package]-wr-integration.patch hardcodes libwrap path in 3.x WIND00413548: Security Advisory - postgresql - CVE-2013-1900 WIND00413550: Security Advisory - perl - CVE-2013-1667 WIND00413563: Security Advisory - linux - CVE-2013-1858 WIND00413569: Security Advisory - ruby - CVE-2013-1821 WIND00415960: Security Advisory - curl - CVE-2013-1944 WIND00415969: Security Advisory - libxml2 - CVE-2013-1969 WIND00415973: Security Advisory - libxslt - CVE-2012-6139 WIND00416693: net-snmp fails to create entries with a zero in the OID WIND00419759: WRLinux 3.0.3: Terminal display speed is degraded with WIND00376270 patch. WIND00419898: Security Advisory - krb5 - CVE-2002-2443 WIND00420898: memory leak issue of syslog-ng in WRLinux 3.0.2. WIND00420935: problem with Compress::Zlib perl module WIND00421920: Security Advisory - apache - CVE-2013-1862 WIND00421930: Security Advisory - linux - CVE-2011-1180 WIND00425738: SCTP socket could sometimes get locked during recvmsg/sendmsg in WRL-3.0.2 with Caivum%E2%80%99s CN58xxx BSP. WIND00425882: sctp: Fix potential data corruption in sctp_send() WIND00426596: Security Advisory - libtiff - CVE-2013-1961 WIND00426610: Security Advisory - libxml2 - CVE-2013-2877 WIND00426614: Security Advisory - libtiff - CVE-2013-1960 WIND00428535: In WRL-3.0.2, syslog-ng memory leak when server is down. WIND00428885: Security Advisory - linux - CVE-2013-4162 WIND00429486: TCP/IP SYN+FIN Packet Filtering Weakness WIND00430298: SCTP socket never recovers after a_rwnd = 0 in target (Cavium CN58XX) running WRL-3.0.2. WIND00434378: sometimes oom killer will kill init process WIND00434770: Security Advisory - libtiff - CVE-2013-4232 WIND00434772: Security Advisory - libtiff - CVE-2013-4243 WIND00439163: Security Advisory - libtiff - CVE-2013-4244 WIND00439167: Security Advisory - xorg_x11. - CVE-2013-4396 WIND00439172: Security Advisory - linux - CVE-2013-2889 WIND00439176: Security Advisory - linux - CVE-2013-4387 WIND00439182: Security Advisory - linux - CVE-2013-2888 WIND00439197: Security Advisory - gnupg - CVE-2013-4351 WIND00439205: Security Advisory - librsvg - CVE-2013-1881 WIND00439216: Security Advisory - xinetd - CVE-2013-4342 WIND00440917: Add support for CONFIG_DEBUG_KMEMLEAK in WRL-3.0.2. WIND00441874: Security Advisory - dropbear - CVE-2013-4434 WIND00441881: Security Advisory - dropbear - CVE-2013-4421 WIND00443301: unix_dgram_poll() optimization WIND00445846: Security Advisory - krb5 - CVE-2013-1418 WIND00445874: Security Advisory - nss - CVE-2013-5605 WIND00445876: Security Advisory - nss - CVE-2013-1741 WIND00445879: Security Advisory - ruby - CVE-2013-4164 No Patch History Defect List: WIND00169662: wb_kgdb failed when testing breakpoint function at 'do_fork' on broadcom_bcm91250a_64_le-standard-glibc_small. WIND00194731: Async BSP's are service and update pack specific WIND00196559: device-mapper package rebuild fails, requires distclean WIND00202126: Segmentation Fault occurs when execute "killall -i process_name" on arm_versatile_926ejs. WIND00204852: Security Advisory - Linux - CVE-2010-1087 WIND00204857: Security Advisory - Linux - CVE-2010-1084 WIND00206452: Security Advisory - glibc - CVE-2010-0296 WIND00212023: Security Advisory - PostgreSQL - CVE-2010-1170 WIND00212919: [OSPP] ARM - kernel call trace during booting up on ti_omap3530 WIND00213441: kernel 2.6.21 : input_dev parameter of skb_buff structure is not appropriately populated. WIND00217142: Security Advisory - PostgreSQL - CVE-2010-1975 WIND00217806: gdb using offsets not adjusted to load addresses for mti_malt32_le and 64-bit cav_octeon_58xx WIND00218116: Security Advisory - OpenLDAP - CVE-2010-0211 WIND00218802: Security Advisory - glibc - CVE-2010-0830 WIND00218803: Security Advisory - glibc - CVE-2009-4880 WIND00218804: Security Advisory - glibc - CVE-2009-4881 WIND00220092: Security Advisory - Linux - CVE-2010-2240 WIND00220599: Security Advisory - Linux - CVE-2010-2248 WIND00222238: Long delay after write() to UART Tx WIND00222512: sysconf(_SC_NPROCESSORS_CONF) does not returns correct value on MIPS cavium target. WIND00222801: linux ppp: ifconfig while shutting down a ppp session causes a kernel Oops. WIND00225773: request_irq() for external interrupts: a) ret error (wrongly), or kernel "panic" WIND00226252: Security Advisory - linux - CVE-2010-2798 WIND00227431: invalid syscall with auditing enabled causes kernel panic WIND00227462: Security Advisory - linux - CVE-2010-0435 WIND00227970: ping with large payload size fail on Cavium BSP WIND00228284: After upgrading toolchain, building toolchain from source code will fail on arm_versatile_926ejs. WIND00228348: Security Advisory - linux - CVE-2010-3015 WIND00229328: Security Advisory - linux - CVE-2010-2942 WIND00229594: Security Advisory - linux - CVE-2010-2959 WIND00229595: Security Advisory - linux - CVE-2010-2946 WIND00232051: glibc-locale RPMs may be owned by creating user WIND00232100: Security Advisory - Linux - CVE-2010-3078 WIND00232101: Security Advisory - Linux - CVE-2010-3079 WIND00232151: WR Linux 3.0: /proc/cpuinfo contains incorrect CPU cores information on Fort sumter target(Core i5/i7) WIND00232170: Security Advisory - Linux - CVE-2010-3080 WIND00232463: wrlinux-3.0.3 fails to boot on fsl_8548cds WIND00233529: Security Advisory - Linux - CVE-2010-3296 WIND00233530: Security Advisory - Linux - CVE-2010-3297 WIND00233531: Security Advisory - Linux - CVE-2010-3301 WIND00233536: Security Advisory - Linux - CVE-2010-3081 WIND00233945: Security Advisory - Linux - CVE-2010-3310 WIND00234156: typo in e1000_remove WIND00234264: RMI Phoenix IPI causes kernel panic. WIND00234848: Security Advisory - Linux - CVE-2010-3437 WIND00235659: Security Advisory - Linux - CVE-2010-3442 WIND00235662: Security Advisory - Linux - CVE-2010-3705 WIND00236036: KGDB doesn't connect when MSI enabled in kernel WIND00236966: Security Advisory - glibc - CVE-2010-3847 WIND00243473: cannot rebuild GDB resource code WIND00244178: backtrace function works not correctly in multi threads WIND00244450: [Async 3.0.3][BSP: NEW Freescale P1020_P1011] For ubifs in README WIND00250414: MIPS kernel panic, exception 24 WIND00251257: wrlinux 2.0.1. GNU linker non-deterministic WIND00254777: Security Advisory - pcsc-lite - CVE-2010-4530 WIND00254778: Security Advisory - pcsc-lite - CVE-2010-4531 WIND00254779: Security Advisory - PostgreSQL - CVE-2010-4015 WIND00260706: bootstrap openssl perl bad interpreter WIND00266365: Security Advisory - openldap - CVE-2011-1024 WIND00266366: Security Advisory - openldap - CVE-2011-1081 WIND00267465: qemu failure with ANT and tun/tap WIND00268347: Security Advisory - Python - CVE-2007-4965 WIND00269482: Security Advisory - glibc - CVE-2011-1089 WIND00269483: Security Advisory - glibc - CVE-2011-1095 WIND00269484: Security Advisory - glibc - CVE-2011-1658 WIND00269486: Security Advisory - glibc - CVE-2011-1071 WIND00269487: Security Advisory - glibc - CVE-2011-1659 WIND00269489: Security Advisory - glibc - CVE-2011-0536 WIND00277202: Can't build fsl_p4080 BSP on WrLinux3.03 with wrll-multicore feature WIND00286771: wrlinux 3.0.3 - wrhv_mpc8641d.c PCI bug WIND00291632: Security Advisory - samba - CVE-2011-2522 WIND00299581: Security Advisory - Apache - CVE-2011-3192 WIND00303058: In RT core based project, can not let two NIC work at the same time WIND00312304: Security Advisory - libxml2 - CVE-2011-4494 WIND00318295: [RCPL] RCPL does not account for all non-layer directories WIND00318374: Build failure of WRLinux3.02 apps in Workbench for windows WIND00319526: [RCPL0003] Configure error on SLED 10.2 32bit for wrlinux 3.0.3 RCPL WIND00321354: [RCPL0003] Failed to install toolchain for mips on RCPL0003. WIND00321724: [RCPL0003] Fail to 'make -C build linux' on RCPL0003. WIND00322181: [RCPL0003] '-A' option doesn't work in rcpl-cl.sh WIND00327642: [RCPL0003.01] toolchain-4.3a-299-*-20120109-spin1.zip are not installed correctly. WIND00328025: [RCPL0003.01] 'invalid number' is in setup.log on Redhat 5.2 after installing 3.0 + 3.0.3 + RCPL0003.01 WIND00370224: Security Advisory - ruby - CVE-2012-3424 WIND00370227: Security Advisory - ruby - CVE-2012-3464 WIND00372940: One Workbench default RSS feed URL does not exist WIND00374005: Security Advisory - glibc - CVE-2012-3480 WIND00376786: Security Advisory - gnu - CVE-2012-3509 WIND00380334: Host Tool Binaries are missing for 4.3 RCPL 8 and 3.0.3 RCPL 10 WIND00381330: [RCPL10] rcpl-gui.sh of RCPL0010.01 contians snapshot of RCPL0011. WIND00392428: WRL 3.0.2 CN58XX semaphore issue WIND00395182: Wind River Linux 3.0.3 RCPL 13 support for ppc_476 WIND00399168: Security Advisory - ruby - CVE-2012-6497 WIND00404145: Security Advisory - ruby - CVE-2013-0276 WIND00404152: Security Advisory - glibc - CVE-2013-0242 WIND00413546: Security Advisory - postgresql - CVE-2013-1899 WIND00416773: internal compiler error: in int_mode_for_mode, at stor-layout.c:258 WIND00417548: Security Advisory - glibc - CVE-2012-0864 WIND00417549: Security Advisory - glibc - CVE-2011-4609 WIND00417557: Security Advisory - glibc - CVE-2009-5029 WIND00431882: Java exception with WRL 3.0.3 rcpl-gui.sh script WIND00434069: bug in gdb find pattern matching WIND00443346: unzip errors in WRL_3_0_3-RCPL-0020-20131023-spin1.zip WIND00444043: Security Advisory - linux - CVE-2013-4515