1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux 4.3 release. This RCPL provides fixes for known problems found in this base release. You can control which RCPL layer to use for a specific build via the "--with-rcpl-version" option of the configure command. The default value for "--with-rcpl-version" is "auto" which will automatically select the newest RCPL installed on the host machine. You can also specifically select an RCPL by setting the "--with-rcpl-version" value to the RCPL number that you wish to use. So, if you wanted to select RCPL 0002 for the project build you could specify that at configure time using "--with-rcpl-version=0002". $ /wrlinux-4/wrlinux/configure --enable-board=common_pc \ --enable-kernel=standard --enable-rootfs=glibc_std \ --with-rcpl-version=0002 This will force this project build to use RCPL 0002 even if an RCPL 0003 or RCPL 0004 has been installed on the host machine. If you wanted to build a project that doesn't use any RCPL's, but just uses the base installation layers, you can set "--with-rcpl-version=0". Once a newer RCPL has been added to the installation, existing projects that have been using the default "--with-rcpl-version=auto" can pick up the new fixes by doing a "make reconfig". When using the "make reconfig" command you may also want to use "LDAT_FORCE_CLEAN=distclean" on the subsequent make: $ make reconfig $ make LDAT_FORCE_CLEAN=distclean Any project that had specifically specified an RCPL, say with "--with-rcpl-version=0002", will be unaffected by the installation of a newer RCPL. It will continue to use the one previously specified. This allows a particular project to remain on a specific RCPL. It is also possible to override the "--with-rcpl-version" setting when you do a reconfig by setting the environment variable ENV_RCPL_VERSION . This will override any previous setting from the "--with-rcpl-version" configure option. The RCPL contains layers that are parallel to the base release's layers. If any file changed within a package or template in that layer, the entire package or template is reproduced in the RCPL version of that package or template. Any package or template that exists in the RCPL layer will be used instead of the corresponding base releases version. 2.0 TOOLS The RCPL layer also contains patch_history directories. These directories are scattered in the various sub-layers of the RCPL and contain all the patches that were applied to that sub-layer's files. The headers contain the defect ids to indicate what fixes were needed for that defect id. One defect could create a fix across multiple sub-layers. Also, one patch might fix multiple defects, and would have multiple defect lines. 2.1 A command line tool - rcpl-rcl.sh This command line tool has been provided to help correlate the various patches to the defects they fixed. It is located here: /wrlinux-4/scripts/rcpl/rcpl-cl.sh You can run this script and provide the defect id to see the patch file, package and files affected by the change to fix the defect. Run the tool's help option for more information. Here is a quick guide: Help : 'rcpl-cl.sh --help' All patches : 'rcpl-cl.sh all' All Linux patches : 'rcpl-cl.sh -p linux' All Toolchain patches : 'rcpl-cl.sh -p toolchain' All CVE patches : 'rcpl-cl.sh -c all' Single Defect : 'rcpl-cl.sh WIND00325969' Just show the Defect #: 'rcpl-cl.sh all -D' 2.2 A gui tool - rcpl-gui.sh This GUI line tool has been provided to help provide advanced functions on addition to the features of the command line tool, including: * Explore the content of an RCPL * Compare one RCPL with another * Compare an existing wrlinux project against an RCPL * Export the data to a Text, CSV, or HTML file. The GUI tool is located here: /wrlinux-4/scripts/rcpl/rcpl-gui.(sh|bat) * On Linux, start the tool with: $ cd $ ./wrlinux-4/scripts/rcpl/rcpl-gui.sh * On Windows, start the tool with: > cd > wrlinux-4\scripts\rcpl\rcpl-gui.bat You can open "Help > Help" for detailed information and examples. 3.0 WORKBENCH Platform projects in Workbench work the same way as the command line. Application Projects however in Workbench do not get their environment from configured projects, so you must do the following to set the RCPL version. Workbench explicitly uses the ENV_RCPL_VERSION value in the environment to set its RCPL environment. This value must be set globally in your shell's resource file, so that this value is passed to Workbench both when invoked from the command line and from a desktop icon or menu. As described above, if this value is undefined, then the highest installed version of RCPL is used. If a value is set, then that RCPL version is used. If the value is set to "0000", then the original installation is used. By default, your system will have ENV_RCPL_VERSION undefined, which should provide the expected default behavior for almost all users. If you change the value for ENV_RCPL_VERSION, you must restart Workbench to get the toolchain that the RCPL may include. You may also need to restart your Linux windowing system to update the environment that the desktop icon or menu uses for Workbench. WARNING: if an invalid ENV_RCPL_VERSION value is set, then there will be no toolchain available for wrlinux application projects, and you will see errors about missing toolchain binaries if you attempt to compile. Reset or clear the ENV_RCPL_VERSION value and restart Workbench. For Linux, here is how you set ENV_RCPL_VERSION: * If your default shell is 'bash', add this to "~/.bashrc": export ENV_RCPL_VERSION=nnnn * If your default shell is 'csh', add this to "~/.cshrc": setenv ENV_RCPL_VERSION nnnn * To revert the RCPL version to the default, simply remove these assignments. For Windows, here is how you set ENV_RCPL_VERSION: 1) Select "Start > Control Panel > System", and click "Advanced System Settings" 2) Select the "Advanced" tab, and click the button "Environment Variables" 3) Click "New" for "User Variables". 4) Set the "Name" to ENV_RCPL_VERSION, and the "Value" to nnnn, and save. * To revert the RCPL version to the default, simply delete this environment variable. 4.0 INSTALLATION INSTRUCTIONS The RCPL zip files can be found on Wind River's On-Line Support web site. You need to unzip the RCPL zip file into the updates directory of the local installation. If there are also toolchain zip files you also need to unzip the toolchain zip files for the appropriate architecture into the updates directory of the local installation. 1. Unzip the patches under [install_dir]/updates (create updates directory if it doesn't exist). 2. From the [install_dir]/updates directory, run the command: $ ../maintenance/wrInstaller/x86-linux2/wrInstaller 3. Follow the instructions for installing a patch, Select the "Patch" option. This will create a new RCPL directory in the [install_dir]/wrlinux-4/layers/updates directory. See instructions above on how projects can include the fixes in the RCPL. 5.0 SPECIAL NOTE One of the RCPL's primary features is the ability to roll back to previous versions, and even back to the original distribution. This is done by putting all changes into the layers within the RCPL instead of modifying the original installation directory. The previous per-package cumulative patch method did not follow this convention and directly modified the original installation directory. If you have applied any of the available 4.3 per-package cumulative patches you will not be able to roll back the RCPL's to the original installation. You will only be able to roll back to the state that includes any per-package cumulative patches that you may have applied. This might be fine for you. If you do want to be able to roll back to the original installation directory you will need to re-install Wind River Linux 4.3 in a different directory and then apply RCPL's without installing any per-package cumulative patches. 6. Troubleshooting 6.1 Patch not available There are certain patch file(s) that are not available in the RCPL tree for browsing. In some cases this is because the patches are directly wrapped into binary files (specifically the toolchain), in other cases it is because of the nature of how the fix was tracked. If you have questions about one of these patches, please contact your Wind River service representative. Patch History Defect List: LIN4-10695: Security Advisory - libxxf86dga - CVE-2013-2000 LIN4-10709: Security Advisory - libxv - CVE-2013-2066 LIN4-11737: Security Advisory - php - CVE-2012-3450 LIN4-11837: Security Advisory - libxext - CVE-2013-1982 LIN4-11857: Security Advisory - libxvmc - CVE-2013-1990 LIN4-11869: Security Advisory - quota - CVE-2012-3417 LIN4-12689: Security Advisory - libxrandr - CVE-2013-1986 LIN4-12698: Security Advisory - libxi - CVE-2013-1984 LIN4-12708: Security Advisory - libxtst - CVE-2013-2063 LIN4-12718: Security Advisory - libxcursor - CVE-2013-2003 LIN4-12739: Security Advisory - php - CVE-2011-4718 LIN4-12785: Security Advisory - php - CVE-2013-4248 LIN4-12887: ia64 board fails to boot properly when fix for defect WIND00393250 is inside. (perhaps due to CONFIG_NO_HZ ?) LIN4-13573: symlinks not preserved in intel-emgd LIN4-13601: In WRL-4.3, several application tasks gets killed by the kernel with "PAX: refcount overflow occurred" kernel message. LIN4-13630: Security Advisory - libx11 - CVE-2013-2004 LIN4-13640: Security Advisory - libxp - CVE-2013-2062 LIN4-13652: Security Advisory - libxrender - CVE-2013-1987 LIN4-13662: Security Advisory - libxinerama - CVE-2013-1985 LIN4-14506: Security Advisory - libx11 - CVE-2013-1981 LIN4-14517: Security Advisory - libxxf86vm - CVE-2013-2001 LIN4-14536: divide by zero error in WR Linux 4.3. LIN4-15251: Security Advisory - libxfixes - CVE-2013-1983 LIN4-15262: Security Advisory - libx11 - CVE-2013-1997 LIN4-15273: Security Advisory - libxxf86dga - CVE-2013-1991 LIN4-15282: Security Advisory - libxt - CVE-2013-2005 LIN4-15292: Security Advisory - libxi - CVE-2013-1998 LIN4-15301: Security Advisory - libxi - CVE-2013-1995 LIN4-20758: Security Advisory - curl - CVE-2013-4545 LIN4-20838: Java exception with WRL 3.0.3 rcpl-gui.sh script LIN4-20846: WRL4.3 installer image does not work with preempt_rt option LIN4-20851: Security Advisory - php - CVE-2013-6420 LIN4-20856: rpm5.1.9 with --root to install package, it seems that the rpm also access to the local database path LIN4-20857: can't compile libgd with freetype LIN4-20860: Security Advisory - linux - CVE-2013-7027 LIN4-20863: dpa driver codes can not provide concurrency protect LIN4-20866: CLONE - [WRLinux 5.0.1 Async][fsl_t4xxx ]a call trace appears when executing reboot command LIN4-20876: Security Advisory - nss - CVE-2013-0791 LIN4-20878: Security Advisory - libgssglue - CVE-2011-2709 LIN4-21006: Security Advisory - ruby - CVE-2013-4073 LIN4-21094: Security Advisory - xorg - CVE-2011-4028 LIN4-21105: Security Advisory - quagga - CVE-2013-2236 LIN4-21198: Security Advisory - x.org-xserver - CVE-2013-1940 LIN4-21218: Security Advisory - sudo - CVE-2013-1775 LIN4-21343: Security Advisory - qt - CVE-2013-0254 LIN4-21422: Security Advisory - php - CVE-2013-1643 LIN4-21493: Security Advisory - quagga - CVE-2012-1820 LIN4-21541: Security Advisory - php - CVE-2012-6113 LIN4-21604: Security Advisory - samba - CVE-2013-0213 LIN4-21721: Security Advisory - samba - CVE-2013-4124 LIN4-21724: Security Advisory - git - CVE-2013-0308 LIN4-21790: Security Advisory - DBus - CVE-2011-2533 LIN4-21943: Security Advisory - qt - CVE-2012-5624 LIN4-21970: Security Advisory - samba - CVE-2011-2694 LIN4-22986: Security Advisory - samba - CVE-2013-0214 LIN4-22993: Security Advisory - fuse - CVE-2011-0543 LIN4-22997: Security Advisory - linux - CVE-2013-4512 LIN4-23000: Security Advisory - linux - CVE-2013-2234 LIN4-23015: Security Advisory - linux - CVE-2013-0190 LIN4-23035: Security Advisory - linux - CVE-2013-2852 LIN4-23136: Security Advisory - linux - CVE-2013-2851 LIN4-23170: Security Advisory - linux - CVE-2012-5375 LIN4-23183: Security Advisory - linux - CVE-2013-2237 LIN4-23210: Security Advisory - xorg - CVE-2011-4029 LIN4-23233: Security Advisory - linux - CVE-2013-4511 LIN4-23268: Security Advisory - gnome - CVE-2012-2370 LIN4-23301: Security Advisory - libdmx - CVE-2013-1992 LIN4-23307: Security Advisory - linux - CVE-2013-0160 LIN4-23325: Security Advisory - nss - CVE-2013-5606 LIN4-23352: Security Advisory - linux - CVE-2013-4483 LIN4-23376: Security Advisory - linux - CVE-2012-5517 LIN4-23382: Security Advisory - gnupg - CVE-2012-6085 LIN4-23395: Security Advisory - linux - CVE-2013-3224 LIN4-23527: Security Advisory - fuse - CVE-2011-0541 LIN4-23546: Security Advisory - linux - CVE-2011-3638 LIN4-23580: Security Advisory - linux - CVE-2013-0309 LIN4-23640: Security Advisory - linux - CVE-2013-0311 LIN4-23681: Security Advisory - python - CVE-2013-4238 LIN4-23748: Security Advisory - linux - CVE-2013-1848 LIN4-23749: Security Advisory - linux - CVE-2013-6763 LIN4-23768: Security Advisory - linux - CVE-2012-4508 LIN4-23780: Security Advisory - qt - CVE-2012-6093 LIN4-23789: Security Advisory - linux - CVE-2013-2206 LIN4-23790: Security Advisory - linux - CVE-2013-4299 LIN4-23932: Security Advisory - curl - CVE-2013-2174 LIN4-23966: Security Advisory - apache - CVE-2013-1896 LIN4-23977: Security Advisory - openssh - CVE-2010-5107 LIN4-25032: Security Advisory - busybox - CVE-2013-1813 LIN4-25034: Security Advisory - libvirt - CVE-2011-1486 LIN4-25124: Security Advisory - hostapd - CVE-2012-2389 LIN4-25189: Security Advisory - linux - CVE-2012-4461 LIN4-25261: Security Advisory - linux - CVE-2013-0343 LIN4-25306: Security Advisory - gnupg - CVE-2013-4242 LIN4-25380: Security Advisory - freeradius - CVE-2011-4966 LIN4-25469: Security Advisory - linux - CVE-2013-4514 LIN4-25510: Security Advisory - linux - CVE-2013-2232 LIN4-25565: Security Advisory - linux - CVE-2013-2147 LIN4-25610: Security Advisory - libxcb - CVE-2013-2064 LIN4-25687: Security Advisory - linux - CVE-2013-3235 LIN4-25786: Security Advisory - fuse - CVE-2011-0542 LIN4-25874: Security Advisory - mesa - CVE-2013-1993 LIN4-27146: Security Advisory - expat - CVE-2012-1148 LIN4-27257: Security Advisory - dhcp - CVE-2012-3954 LIN4-27284: Security Advisory - mipv6 - CVE-2010-2522 LIN4-27327: Security Advisory - openldap - CVE-2012-1164 LIN4-27357: Security Advisory - python - CVE-2011-4944 LIN4-27410: Security Advisory - python - CVE-2011-4940 LIN4-27617: Security Advisory - apache - CVE-2012-2687 LIN4-27626: Security Advisory - libtiff - CVE-2012-2113 LIN4-27659: Security Advisory - qemu - CVE-2011-2527 LIN4-27674: Security Advisory - libtiff - CVE-2012-4447 LIN4-27711: Security Advisory - pam - CVE-2011-3149 LIN4-27729: Security Advisory - libtiff - CVE-2012-4564 LIN4-27856: Security Advisory - expat - CVE-2012-0876 LIN4-27942: Security Advisory - linux - CVE-2011-1021 LIN4-28064: Security Advisory - linux - CVE-2011-1833 LIN4-28110: Security Advisory - expat - CVE-2012-1147 LIN4-30953: Security Advisory - linux - CVE-2013-7266 LIN4-30955: Security Advisory - linux - CVE-2013-7271 LIN4-30958: Security Advisory - linux - CVE-2013-7263 LIN4-30959: Security Advisory - openssl - CVE-2013-6450 LIN4-30960: Security Advisory - linux - CVE-2013-7269 LIN4-30961: Security Advisory - ntp - CVE-2013-5211 LIN4-30962: Security Advisory - libpng - CVE-2013-6954 LIN4-30963: Security Advisory - linux - CVE-2013-7267 LIN4-30965: Security Advisory - linux - CVE-2013-7270 LIN4-30966: Security Advisory - linux - CVE-2013-7264 LIN4-30967: Security Advisory - libxfont - CVE-2013-6462 LIN4-30968: Security Advisory - linux - CVE-2013-7268 LIN4-30969: Security Advisory - linux - CVE-2013-7265 LIN4-30977: In WRLinux4.3,the computation of cycns_offset in set_cyc2ns_scale is prone to an overflow in Intel Xeon Processor E5. LIN4-30978: Codenomicon causes racoon to still crash (with fix from LIN4-6093 included) LIN4-30979: NFSv4 server support on WRL 4.3. LIN4-30983: Makefile.poky_deps : Dependencies Point to Different Recipe Version LIN4-30987: Security Advisory - libxslt - CVE-2013-4520 LIN4-30997: ring buffer of ftrace will leak after 'cat trace_pipe_raw' LIN4-30998: The patch "timers: Avoid the switch timers base set to NULL trick on RT" has not been implemented to WRL 4.3 yet LIN4-31002: In WRL-4.3, multiple definition of `__kc_pci_vfs_assigned' error when trying to build the kernel image. LIN4-31003: The amount of SYN retries is not equal to /proc/sys/net/ipv4/tcp_syn_retries LIN4-31004: wrl 4.3 : ixgbevf fails to suspend to ram LIN4-31006: Problem with load average reporting LIN4-31007: realtime process will pause a long time when put it into a cpu cgroup LIN4-31012: update timezone 2013i LIN4-31017: Security Advisory - openssh - CVE-2014-1692 LIN4-31020: Security Advisory - nfs-utils - CVE-2013-1923 LIN4-31024: Security Advisory - linux - CVE-2013-6378 LIN4-31026: Security Advisory - Net-snmp - CVE-2012-6151 LIN4-31028: Security Advisory - libcurl - CVE-2014-0015 LIN4-31030: Security Advisory - pixman - CVE-2013-6425 LIN4-31031: Security Advisory - linux - CVE-2014-1444 LIN4-31035: Security Advisory - linux - CVE-2013-4587 LIN4-31046: Security Advisory - linux - CVE-2013-6367 LIN4-31047: Security Advisory - linux - CVE-2013-6381 LIN4-31049: Security Advisory - bind - CVE-2014-0591 LIN4-31051: Security Advisory - x.org - CVE-2013-6424 LIN4-31054: Security Advisory - linux - CVE-2013-6380 LIN4-31056: Security Advisory - libxml2 - CVE-2013-0339 LIN4-31057: Security Advisory - libtiff - CVE-2013-4231 LIN4-31064: Security Advisory - linux - CVE-2013-6383 LIN4-31065: Security Advisory - linux - CVE-2013-6368 LIN4-31067: Security Advisory - linux - CVE-2014-1445 LIN4-31073: Security Advisory - openldap - CVE-2013-4449 LIN4-31077: Security Advisory - perl - CVE-2010-4777 LIN4-31085: Security Advisory - cups - CVE-2013-6891 LIN4-31087: Security Advisory - linux - CVE-2014-1446 LIN4-31094: syslog-ng has still memory leaks LIN4-31095: Memory leak found in gianfar.c driver LIN4-31096: oprofile will cause kernel oops when cpu munber of xlp board is more than 32 LIN4-31102: CLONE - WRL5: Memory Leak in syslog-ng 3.4.2 LIN4-31111: Oprofile crashes with 'callgraph' option on ppc platform LIN4-31113: the value of PME_DBE_ERR is not correct LIN4-31117: CLONE - CVE-2012-0249 and 0250 patches did break a feature in Quagga 0.99.10 package LIN4-31120: Security Advisory - linux - CVE-2014-1874 LIN4-31124: Security Advisory - linux - CVE-2014-2039 LIN4-31127: Security Advisory - nfs-utils. - CVE-2011-1749 LIN4-31128: Security Advisory - radvd - CVE-2011-3604 LIN4-31135: Security Advisory - radvd - CVE-2011-3605 LIN4-31136: Security Advisory - qemu - CVE-2011-4111 LIN4-31139: Security Advisory - iproute2 - CVE-2012-1088 LIN4-31143: Security Advisory - nfs-utils - CVE-2011-2500 LIN4-31147: Security Advisory - lxc - CVE-2013-6441 LIN4-31171: WRlinux4.3, configure vlan on two P2020 boards, can't ping from the non vlan interface LIN4-31175: wrlinux 4.3 - irqbalance symbolic links LIN4-31177: Dropbear Authentication Hangs with v0.52 and RCPL 23 LIN4-31178: wrl43 / syslog-342 (RCPL23+) : syslog-ng process memory leak with big messsages and different rules LIN4-31182: Security Advisory - sudo - CVE-2014-0106 LIN4-31183: Security Advisory - gnutls - CVE-2014-1959 LIN4-31185: Security Advisory - gnutls - CVE-2014-0092 LIN4-31186: Security Advisory - python - CVE-2014-1912 LIN4-31188: Security Advisory - linux - CVE-2014-0101 LIN4-31189: syslog-ng crashes 30 mins after start when remote connections are used (Segfault) LIN4-31191: wrlinux 4.3 - dpdk module build failure LIN4-31194: ethtool uprev needed after ixgbe driver update LIN4-31202: Security Advisory - net-snmp - CVE-2014-2284 LIN4-31205: Security Advisory - linux - CVE-2014-2523 LIN4-31208: Security Advisory - apache - CVE-2013-6438 LIN4-31210: Security Advisory - nss - CVE-2014-1492 LIN4-31211: Security Advisory - linux - CVE-2013-7339 LIN4-31212: Security Advisory - apache - CVE-2014-0098 LIN4-31213: Security Advisory - openssh - CVE-2014-2653 LIN4-31215: Security Advisory - php - CVE-2014-2497 LIN4-31216: Security Advisory - openssh - CVE-2014-2532 LIN4-31223: "nlm_xlp_64_be" build error with "--with-template=feature/analysis" LIN4-31228: wrl 4 kernel : Kernel lockdep warns about suspicious locking. LIN4-31233: BUG_ON() in svc_xprt_enqueue() is called when an ethernet switch turn on and off repeatedly. LIN4-31234: pfkey UPDATE failed: Interrupted system call LIN4-31238: wrl 4 : syslog-ng 3.4.2 memory leak after 16 hours when remote connections are used LIN4-31243: Prompted to overwrite files when ACL in use LIN4-31244: Lockups with JFS (inconsistent lock state), Kernel Bug 13613 LIN4-31247: wrl 4,5,6 : syslog-ng 3.4.2 crashes every few hours with TCP/TLS enabled LIN4-31258: Security Advisory - openssl - CVE-2010-5298 LIN4-31259: Security Advisory - pam - CVE-2014-2583 LIN4-31261: Security Advisory - linux - CVE-2014-2678 LIN4-31263: Security Advisory - postgresql - CVE-2014-0062 LIN4-31264: Security Advisory - qemu - CVE-2011-3346 LIN4-31265: Security Advisory - postgresql - CVE-2014-0063 LIN4-31267: Security Advisory - postgresql - CVE-2014-0067 LIN4-31268: Security Advisory - postgresql - CVE-2014-0060 LIN4-31269: Security Advisory - postgresql - CVE-2014-0064 LIN4-31270: Security Advisory - postgresql - CVE-2014-0061 LIN4-31272: Security Advisory - postgresql - CVE-2014-0065 LIN4-31273: Security Advisory - postgresql - CVE-2014-0066 LIN4-31278: Security Advisory - curl - CVE-2014-0138 LIN4-31279: Security Advisory - curl - CVE-2014-0139 LIN4-31287: Kernel BUG occurs while accessing RAM disk LIN4-31292: wrl 4 kernel : Kernel lockdep warns about suspicious locking on X86_32 boards and KVM. LIN4-31308: Security Advisory - apache - CVE-2013-5704 LIN4-31320: Security Advisory - cups - CVE-2014-2856 LIN4-31325: Security Advisory - qemu - CVE-2014-0150 LIN4-31328: Security Advisory - net-snmp - CVE-2014-2285 LIN4-31332: Security Advisory - qemu - CVE-2014-2894 LIN4-31336: IKEv2 rekey collision deletes wrong nonce LIN4-31337: Provide source code for GPL rt73.bin firmware LIN4-31342: Security Advisory - strongswan - CVE-2014-2338 LIN4-31343: In WRL-4.3 duplicate ICMP PING packets are seen in the bond interface. LIN4-31348: wrl 4 kernel : Kernel lockdep warns about suspicious locking on X86_64 boards LIN4-31350: The wrgit in PATH will cause 4.3 confure failed LIN4-31355: Security Advisory - linux - CVE-2014-0196 LIN4-31356: tracing_off can't stop tracing LIN4-31360: Security Advisory - qt - CVE-2014-0190 LIN4-31362: Security Advisory - linux - CVE-2014-1737 LIN4-31364: Security Advisory - libpng - CVE-2013-7353 LIN4-31365: Security Advisory - linux - CVE-2014-3144 LIN4-31366: Security Advisory - radvd - CVE-2011-3602 LIN4-31367: Security Advisory - strongswan - CVE-2014-2891 LIN4-31369: Security Advisory - linux - CVE-2014-3122 LIN4-31370: Security Advisory - radvd - CVE-2011-3603 LIN4-31371: Security Advisory - openssl - CVE-2014-0198 LIN4-31375: Security Advisory - libpng - CVE-2013-7354 LIN4-31376: Security Advisory - linux - CVE-2014-1738 LIN4-31377: Applications linked with mpatrol library are crashing LIN4-31378: WRlinux4.3 octeon2: asid value become to zero and cause the tlb flush abnormal LIN4-31399: Security Advisory - tftp-hpa - CVE-2011-2199 LIN4-31403: fdtable.h:85 invoked rcu_dereference_check() without protection LIN4-31404: wrl 4.3 : DRBD umount slow -- writeback patch missing ? LIN4-31405: ruby's host build fails on Ubuntu LIN4-31407: when disable CONFIG_FSL_RIO in kernel, function 'machine_check_e500mc' handle ld type machine check exception incorrectly LIN4-31425: wrlinux 4.3 - missing fonts.dir LIN4-31431: Security Advisory - libxfont - CVE-2014-0210 LIN4-31435: Security Advisory - libxfont - CVE-2014-0211 LIN4-31436: Security Advisory - libxfont - CVE-2014-0209 LIN4-31437: when insert/remove usb cdrom repeatly, system may oops. LIN4-31439: Security Advisory - openssl - CVE-2011-0014 LIN4-31440: WRHV 2.0.1: Rescanning PCI on Lx-GOS fails with WRL RCPL24. LIN4-31446: need integrate community patch 'jffs2: Fix segmentation fault found in stress test' to wrlinux 4.3 LIN4-31447: need integrate community patch 'jffs2: Fix crash due to truncation of csize' to wrlinux 4.3 LIN4-31448: need integrate community patch 'jffs2: remove from wait queue after schedule()' to wrlinux 4.3 LIN4-31451: need integrate community patch 'JFFS2: don't fail on bitflips in OOB' to wrlinux 4.3 LIN4-31453: need integrate community patch 'jffs2: validate symlink size in jffs2_do_read_inode_internal()' to wrlinux 4.3 LIN4-31457: need integrate community patch 'fix jffs2 ACLs on big-endian with 16bit mode_t' to wrlinux 4.3 LIN4-31458: need integrate community patch 'jffs2: fix IN_DELETE_SELF on overwriting rename() killing a directory' to wrlinux 4.3 LIN4-31459: need integrate community patch ' jffs2: fix error value sign' to wrlinux 4.3 LIN4-31461: need integrate community patch 'BKL: Explicitly add BKL around get_sb/fill_super' to wrlinux 4.3 LIN4-31462: need integrate community patch ' jffs2: Fix NFS race by using insert_inode_locked()' to wrlinux 4.3 LIN4-31463: need integrate community patch 'jffs2: Fix in-core inode leaks on error paths' to wrlinux 4.3 LIN4-31470: Security Advisory - openssl - CVE-2014-3470 LIN4-31473: Security Advisory - openssl - CVE-2014-0221 LIN4-31474: Security Advisory - openssl - CVE-2014-0224 LIN4-31478: socket ack_backlog counter wrap-around LIN4-31479: tftp-hpa-5.0-fix-NOSAPCE-ACK.patch only partial fix LIN4-31482: RCU freeze when running oprofile callgraph LIN4-31486: Security Advisory - libtasn1 - CVE-2014-3467 LIN4-31489: Security Advisory - libtasn1 - CVE-2014-3468 LIN4-31492: Security Advisory - libtasn1 - CVE-2014-3469 LIN4-31495: Segmentation fault in X server when repeatedly creating/destroying a QGLWidget LIN4-31498: Security Advisory - php - CVE-2014-0237 LIN4-31499: Security Advisory - linux - CVE-2014-3153 LIN4-31502: Security Advisory - php - CVE-2014-3981 LIN4-31504: Security Advisory - nspr - CVE-2014-1545 LIN4-31505: Security Advisory - pulseaudio - CVE-2014-3970 LIN4-31506: Security Advisory - gnutls - CVE-2014-3466 LIN4-31508: Security Advisory - php - CVE-2014-0238 LIN4-31510: Security Advisory - linux - CVE-2014-3917 LIN4-31514: update timezone 2014e LIN4-31518: wrl 4.3 : sctp: Don't lookup dst if transport dst is still valid LIN4-31530: [WRLinux4.3][BSP: nlm_xlp_64_be] nlm_xlp serial port prints call trace when runnning multithread program. LIN4-31543: Security Advisory - php - CVE-2014-4049 LIN4-31546: Security Advisory - gnupg - CVE-2014-4617 LIN4-31548: Security Advisory - linux - CVE-2014-4508 LIN4-31552: wrlinux4.3 P1020 board: hung task happens when using flash_erase to erase NOR flash LIN4-31553: Wrl 4.3 (RCPL24) kernel crash when repeteadly insmod/rmmod module LIN4-31557: [RCPL] tftp prints 'Disk full or allocation exceeded' when to put empty file LIN4-31569: Security Advisory - php - CVE-2014-3515 LIN4-31570: Security Advisory - linux - CVE-2014-4656 LIN4-31571: Security Advisory - linux - CVE-2014-4653 LIN4-31572: Security Advisory - php - CVE-2014-4670 LIN4-31574: Security Advisory - php - CVE-2014-4698 LIN4-31575: Security Advisory - linux - CVE-2014-4608 LIN4-31576: Security Advisory - linux - CVE-2014-4654 LIN4-31580: Security Advisory - linux - CVE-2014-4652 LIN4-31581: Security Advisory - php - CVE-2014-4721 LIN4-31582: Security Advisory - php - CVE-2014-3480 LIN4-31585: Security Advisory - linux - CVE-2014-4699 LIN4-31586: Security Advisory - linux - CVE-2014-4655 LIN4-31592: sync command locks up under heavy load. LIN4-31593: wrl 4.3 : race condition in bind LIN4-31598: when running 'strace' with option '-d', it will hung LIN4-31604: Security Advisory - apache - CVE-2014-0118 LIN4-31608: Security Advisory - apache - CVE-2014-0226 LIN4-31610: Security Advisory - cups - CVE-2014-3537 LIN4-31612: Security Advisory - linux - CVE-2014-4943 LIN4-31621: Security Advisory - apache - CVE-2014-0231 LIN4-31622: Security Advisory - linux - CVE-2014-5077 LIN4-31623: Security Advisory - krb5 - CVE-2014-4342 LIN4-31626: Security Advisory - nss - CVE-2014-1544 LIN4-31631: Security Advisory - krb5 - CVE-2014-4341 LIN4-31632: Security Advisory - apache - CVE-2014-0117 LIN4-31634: wrl 4.x : octeon2 68xx RCU stall detected LIN4-31635: Errors in scc files should halt build LIN4-31637: Upgrade timezone 2014f LIN4-31640: Link aggregation is failed with bonding 802.3ad driver. LIN4-31643: wrl 4.3 : SCTP_PEER_ADDR_CHANGE Notification over UNCONFIRMED path LIN4-31644: DHCP 4.1.x : invalid domain list when changing DHCP RPM LIN4-31647: Security Advisory - openssl - CVE-2014-3508 LIN4-31650: Security Advisory - openssl - CVE-2014-3509 LIN4-31656: Security Advisory - openssl - CVE-2014-3505 LIN4-31660: Security Advisory - openssl - CVE-2014-3506 LIN4-31663: Security Advisory - openssl - CVE-2014-3507 LIN4-31666: Security Advisory - openssl - CVE-2014-3510 LIN4-31669: Security Advisory - openssl - CVE-2014-3511 LIN4-31689: Security Advisory - krb5 - CVE-2014-4345 LIN4-31690: Security Advisory - libvirt - CVE-2014-0179 LIN4-31693: Security Advisory - krb5 - CVE-2014-4344 LIN4-31703: uboot may boot fail if reboot system when reading/writing i2c device LIN4-31705: ARM: futex: preserve oldval in SMP __futex_atomic_op LIN4-31707: sctp_darn send package failed LIN4-31713: arm kernel oops in 'vector_swi' when system run stress test LIN4-31714: Upgrade timezone 2014g LIN4-31717: Security Advisory - php - CVE-2014-3597 LIN4-31718: Security Advisory - linux - CVE-2014-5206 LIN4-31722: Security Advisory - php - CVE-2014-3587 LIN4-31743: Netconsole fails on some interfaces LIN4-31744: Kernel build failure since RCPL 26 LIN4-31746: In WRL-4.3 telnetd remains waiting on futex even after all the clients have exited. LIN4-31749: Security Advisory - lua - CVE-2014-5461 LIN4-31751: Security Advisory - linux - CVE-2014-5472 LIN4-31752: Security Advisory - linux - CVE-2014-5471 LIN4-31753: ipv6 build issue since RCPL 26 LIN4-31754: Security Advisory - curl - CVE-2014-3613 LIN4-31755: wrlinux 4.3 - pciutils db update LIN4-31756: The name kernel configuration file shows 2.6.34.13 after upgrading kernel to 2.6.34.15 LIN4-31763: wrl 4.3 / Racoon IPsec overlapping rules with different port LIN4-31765: RT Process sometimes blocked by low prio processes LIN4-31768: Racoon Using 100% CPU LIN4-31769: Security Advisory - bash - CVE-2014-6271 LIN4-31773: Security Advisory - bash - CVE-2014-7169 LIN4-31777: Security Advisory - bash - CVE-2014-7186 LIN4-31781: Security Advisory - bash - CVE-2014-7187 LIN4-31785: Security Advisory - bash - CVE-2014-6277 LIN4-31789: Security Advisory - bash - CVE-2014-6278 LIN4-31793: Update timezone to 2014h LIN4-31804: Security Advisory - linux - CVE-2014-6410 LIN4-31805: Security Advisory - krb5 - CVE-2014-5351 LIN4-31806: Security Advisory - libgcrypt - CVE-2014-5270 LIN4-31809: Security Advisory - net-snmp - CVE-2014-3565 LIN4-31810: Security Advisory - linux - CVE-2014-3535 LIN4-31813: Security Advisory - perl - CVE-2014-4330 LIN4-31815: Security Advisory - linux - CVE-2014-3184 LIN4-31816: Security Advisory - dbus - CVE-2014-3638 LIN4-31817: Security Advisory - python - CVE-2014-7185 LIN4-31823: Security Advisory - linux - CVE-2014-3185 LIN4-31825: Security Advisory - linux - CVE-2014-3181 LIN4-31826: Security Advisory - nss - CVE-2014-1568 LIN4-31828: WRlinux4.3, gianfar driver insert extra vlan tag after apply the patch to disable hardware tx vlan LIN4-31829: Regression: RCPL 26 kernel build error LIN4-31836: Security Advisory - openssl - CVE-2014-3566 LIN4-31840: e1000e: eth0 not up after rebooting LIN4-31841: Security Advisory - openssl - CVE-2014-3568 LIN4-31851: Security Advisory - openssl - CVE-2014-3567 LIN4-31860: mmap may cause kernel panic LIN4-31864: Security Advisory - curl - CVE-2014-3620 LIN4-31876: Security Advisory - hostapd - CVE-2014-3686 LIN4-31882: Security Advisory - linux - CVE-2014-7970 LIN4-31894: Security Advisory - linux - CVE-2014-7975 LIN4-31905: oprofile callgraph missing memset() calls LIN4-31909: wrlinux 4.3 udevd (workers bug) LIN4-31910: BUG: unable to handle kernel NULL pointer dereference at 000000000000013c LIN4-31913: [tz-announce] 2014i release of tz code and data available LIN4-31917: rsync may hung if time jumps backwards LIN4-31919: kernel may panic when access mtd device and mtdblock device at the same time LIN4-31920: wrlinux4.3, build perf failed LIN4-31925: wrlinux4.3 with rcpl27 shows ubifs error LIN4-31930: wrl 4 igbxevf 2.11 driver x86 + KVM has very bad performance LIN4-31933: How to use EDAC in nlm_xlp_64_be LIN4-31937: Security Advisory - linux - CVE-2014-3690 LIN4-31938: Security Advisory - qemu - CVE-2013-4527 LIN4-31940: Security Advisory - qemu - CVE-2013-4534 LIN4-31941: Security Advisory - qemu - CVE-2013-4538 LIN4-31943: Security Advisory - qemu - CVE-2013-4149 LIN4-31944: Security Advisory - qemu - CVE-2013-4529 LIN4-31945: Security Advisory - qemu - CVE-2013-4540 LIN4-31946: Security Advisory - qemu - CVE-2013-4530 LIN4-31947: Security Advisory - curl - CVE-2014-3707 LIN4-31949: Security Advisory - qemu - CVE-2013-4533 LIN4-31950: Security Advisory - qemu - CVE-2013-4537 LIN4-31951: Security Advisory - qemu - CVE-2013-4531 LIN4-31953: Security Advisory - qemu - CVE-2014-3640 LIN4-31955: Security Advisory - qemu - CVE-2013-4539 LIN4-31956: Security Advisory - qemu - CVE-2013-4151 LIN4-31957: Security Advisory - qemu - CVE-2013-6399 LIN4-31958: Security Advisory - qemu - CVE-2013-4148 LIN4-31960: contextual help of TIPC_UNICLUSTER_FRIENDLY kernel option is incomplete LIN4-31962: here is a warning when compiling wrlinux5.0.1 preempt-rt LIN4-31963: [tz-announce] 2014j release of tz code and data available LIN4-31967: delay time is only half of wanted when using 'mdelay' on xlp 832 LIN4-31993: coredump with rpm query command LIN4-31995: WRL-4.3 RCPL27 libnl-route pkgconfig bug LIN4-31999: charon crashing LIN4-32002: Security Advisory - qemu - CVE-2014-3615 LIN4-32005: Security Advisory - linux - CVE-2014-3610 LIN4-32007: Security Advisory - linux - CVE-2014-3673 LIN4-32008: Security Advisory - sysklogd - CVE-2014-3634 LIN4-32009: Security Advisory - linux - CVE-2014-9090 LIN4-32013: Security Advisory - php - CVE-2014-3710 LIN4-32014: Security Advisory - linux - CVE-2014-7826 LIN4-32017: Security Advisory - ruby - CVE-2014-8080 LIN4-32018: Security Advisory - qemu - CVE-2014-0223 LIN4-32019: Security Advisory - freeradius - CVE-2014-2015 LIN4-32020: Security Advisory - qemu - CVE-2014-7815 LIN4-32021: Security Advisory - linux - CVE-2014-3688 LIN4-32024: Security Advisory - php - CVE-2014-3669 LIN4-32025: Security Advisory - linux - CVE-2014-8709 LIN4-32026: Security Advisory - ppp - CVE-2014-3158 LIN4-32028: Security Advisory - php - CVE-2014-3670 LIN4-32029: Security Advisory - qemu - CVE-2014-0182 LIN4-32030: Security Advisory - linux - CVE-2014-3611 LIN4-32031: Security Advisory - wget - CVE-2014-4877 LIN4-32035: Security Advisory - tcpdump - CVE-2014-8767 LIN4-32036: Security Advisory - ruby - CVE-2014-8090 LIN4-32037: Security Advisory - glibc - CVE-2014-7817 LIN4-32039: Security Advisory - linux - CVE-2014-3687 LIN4-32043: Security Advisory - qemu - CVE-2014-3689 LIN4-32045: Security Advisory - php - CVE-2014-3668 LIN4-32046: Security Advisory - linux - CVE-2014-7841 LIN4-32048: Security Advisory - tcpdump - CVE-2014-8769 LIN4-32053: Security Advisory - linux - CVE-2014-7825 LIN4-32060: WRlinux4.3, RT/CGL kernel, irq can't be enabled after disable and enable repeatedly LIN4-32061: Charon process is getting crashed on FBSB hardware LIN4-32062: Charon core found on FBSA hardware LIN4-32064: Security Advisory - xorg-server - CVE-2014-8100 LIN4-32066: Security Advisory - xorg-server - CVE-2014-8094 LIN4-32067: Security Advisory - tcpdump - CVE-2014-9140 LIN4-32068: Security Advisory - cpio - CVE-2014-9112 LIN4-32069: Security Advisory - xorg-server - CVE-2014-8099 LIN4-32072: Security Advisory - bind - CVE-2014-8500 LIN4-32073: Security Advisory - xorg-server - CVE-2014-8096 LIN4-32075: Security Advisory - qemu - CVE-2014-7840 LIN4-32078: Security Advisory - xorg-server - CVE-2014-8092 LIN4-32079: Security Advisory - xorg-server - CVE-2014-8101 LIN4-32082: Security Advisory - xorg-server - CVE-2014-8095 LIN4-32084: Security Advisory - xorg-server - CVE-2014-8102 LIN4-32085: Security Advisory - xorg-server - CVE-2014-8098 LIN4-32087: Security Advisory - linux - CVE-2014-8134 LIN4-32089: Security Advisory - qemu - CVE-2014-8106 LIN4-32091: Security Advisory - xorg-server - CVE-2014-8093 LIN4-32094: Security Advisory - xorg-server - CVE-2014-8091 LIN4-32098: Security Advisory - xorg-server - CVE-2014-8097 LIN4-32099: There is memleaking issue in busybox LIN4-32102: NFSv4 causes an error with ACL. LIN4-32105: Security Advisory - ntp - CVE-2014-9293 LIN4-32110: Security Advisory - ntp - CVE-2014-9294 LIN4-32118: Security Advisory - ntp - CVE-2014-9296 LIN4-32125: wrlinux 4.3 - behaviour mismatch between ipv4 and ipv6 in UDP rx path LIN4-32129: Security Advisory - linux - CVE-2014-8133 LIN4-32135: Security Advisory - php - CVE-2014-8142 LIN4-32136: Security Advisory - krb5 - CVE-2014-5353 LIN4-32137: Security Advisory - linux - CVE-2014-9420 LIN4-32138: Security Advisory - linux - CVE-2014-9419 LIN4-32142: Security Advisory - nss - CVE-2014-1569 LIN4-32143: Security Advisory - linux - CVE-2014-9322 LIN4-32144: Security Advisory - openssl - CVE-2014-3569 LIN4-32153: Security Advisory - ntp - CVE-2014-9297 LIN4-32155: Security Advisory - ntp - CVE-2014-9298 LIN4-32167: Security Advisory - openssl - CVE-2014-3571 LIN4-32168: Security Advisory - openssl - CVE-2014-8275 LIN4-32170: Security Advisory - openssl - CVE-2015-0205 LIN4-32173: Security Advisory - linux - CVE-2014-9584 LIN4-32174: Security Advisory - openssl - CVE-2015-0204 LIN4-32176: Security Advisory - openssl - CVE-2014-3572 LIN4-32177: Security Advisory - openssl - CVE-2014-3570 LIN4-32178: Security Advisory - linux - CVE-2014-9585 LIN4-32179: Security Advisory - php - CVE-2014-9425 LIN4-32180: Security Advisory - openssl - CVE-2015-0206 LIN4-32181: Security Advisory - libpng - CVE-2014-9495 LIN4-32215: NFSv4 server returns NFS4ERR_RESOURCE with nfs4_getfacl command. LIN4-32223: wrlinux 4.3 - UDP encapsulation LIN4-32233: Security Advisory - libpng - CVE-2015-0973 LIN4-32237: Security Advisory - libtiff - CVE-2014-9330 LIN4-32241: Security Advisory - php - CVE-2015-0232 LIN4-32243: Security Advisory - coreutils - CVE-2014-9471 LIN4-32246: Security Advisory - libsndfile - CVE-2014-9496 LIN4-32248: Security Advisory - libcurl - CVE-2014-8150 LIN4-32256: Upgrade timezone to 2015a LIN4-32258: passwd --inactive can not work in windriver linux 4.3 std project LIN4-32260: need integrade bsp mv_armada_370 into RCPL LIN4-32274: met deadlock during long time pressure test after update to RCPL27 LIN4-32275: IPSec traffic loss observed with AH action IKEv1 LIN4-32276: wrl4 : Command 'find' crashes, when executed with option -ls LIN4-32277: wrl4 : suspicious rcu_dereference_check() usage in fib_trie.c LIN4-32278: Security Advisory - unzip - CVE-2014-9636 LIN4-32279: Security Advisory - freetype - CVE-2014-9660 LIN4-32280: Security Advisory - freetype - CVE-2014-9669 LIN4-32281: Security Advisory - cpio - CVE-2015-1197 LIN4-32282: Security Advisory - freetype - CVE-2014-9670 LIN4-32283: Security Advisory - xorg-server - CVE-2015-0255 LIN4-32284: Security Advisory - freetype - CVE-2014-9657 LIN4-32285: Security Advisory - openldap - CVE-2015-1546 LIN4-32286: Security Advisory - freetype - CVE-2014-9675 LIN4-32287: Security Advisory - krb5 - CVE-2014-9421 LIN4-32289: Security Advisory - krb5 - CVE-2014-9422 LIN4-32290: Security Advisory - bind - CVE-2015-1349 LIN4-32293: Security Advisory - freetype - CVE-2014-9663 LIN4-32295: Security Advisory - krb5 - CVE-2014-5352 LIN4-32296: Security Advisory - freetype - CVE-2014-9667 LIN4-32297: Security Advisory - unzip - CVE-2015-1315 LIN4-32298: Security Advisory - freetype - CVE-2014-9672 LIN4-32299: Security Advisory - freetype - CVE-2014-9658 LIN4-32300: Security Advisory - cups - CVE-2014-9679 LIN4-32301: Security Advisory - krb5 - CVE-2014-5355 LIN4-32302: Security Advisory - freetype - CVE-2014-9673 LIN4-32303: Security Advisory - openldap - CVE-2015-1545 LIN4-32304: Security Advisory - freetype - CVE-2014-9666 LIN4-32305: Security Advisory - freetype - CVE-2014-9664 LIN4-32308: Security Advisory - freetype - CVE-2014-9671 LIN4-32309: Security Advisory - freetype - CVE-2014-9656 LIN4-32310: Security Advisory - freetype - CVE-2014-9674 LIN4-32311: Security Advisory - e2fsprogs - CVE-2015-0247 LIN4-32314: Security Advisory - freetype - CVE-2014-9661 LIN4-32316: Security Advisory - d-bus - CVE-2015-0245 LIN4-32317: Security Advisory - krb5 - CVE-2014-9423 LIN4-32321: Security Advisory - mysql & php - CVE-2015-2305 LIN4-32328: WRL 4.3 kernel build failed when enabling CONFIG_EVLOG LIN4-32329: wrl4 : memory leak in bind package (named daemon) LIN4-32334: wrl4 : tar --acls is failing LIN4-32340: Security Advisory - libssh2 - CVE-2015-1782 LIN4-32341: Missing character in A-006184 FSL erratum workaround patch LIN4-32347: Security Advisory - linux - CVE-2015-0239 LIN4-32348: Security Advisory - linux - CVE-2014-9683 LIN4-32349: Security Advisory - linux - CVE-2013-7421 LIN4-32350: Security Advisory - linux - CVE-2014-9644 LIN4-32352: Security Advisory - e2fsprogs - CVE-2015-1572 LIN4-32353: Security Advisory - linux - CVE-2014-8160 LIN4-32356: Unable to use ext4 filesystem type for the boot image in WRL-4.3. LIN4-32359: Security Advisory - linux - CVE-2015-1593 LIN4-32364: Security Advisory - openssl - CVE-2015-0287 LIN4-32365: Security Advisory - openssl - CVE-2015-0289 LIN4-32366: Security Advisory - openssl - CVE-2015-0292 LIN4-32367: Security Advisory - openssl - CVE-2015-0293 LIN4-32368: Security Advisory - openssl - CVE-2015-0209 LIN4-32369: Security Advisory - openssl - CVE-2015-0288 LIN4-32370: Security Advisory - openssl - CVE-2015-0286 LIN4-32374: After upgrading to WRL 4.3.28, mmap is failing from rman driver. LIN4-32377: build error in arm_coretile_express_a9x4 UP platform project LIN4-32411: Security Advisory - libxfont - CVE-2015-1803 LIN4-32413: Security Advisory - tcpdump - CVE-2015-0261 LIN4-32416: Security Advisory - linux - CVE-2014-7822 LIN4-32418: Security Advisory - tcpdump - CVE-2015-2154 LIN4-32421: Security Advisory - libxfont - CVE-2015-1804 LIN4-32422: Security Advisory - linux - CVE-2015-1421 LIN4-32425: Security Advisory - libxfont - CVE-2015-1802 LIN4-32426: Security Advisory - qt - CVE-2015-0295 LIN4-32429: Security Advisory - tcpdump - CVE-2015-2155 LIN4-32432: Upgrade timezone to 2015b LIN4-32436: wrl : 4.3 : nss needs to be removable from pkglist (curl/corosync/xmlsec1 have forced dependencies) LIN4-32440: Security Advisory - ntp - CVE-2015-1798 LIN4-32441: Security Advisory - ntp - CVE-2015-1799 LIN4-32451: Upgrade timezone to 2015d LIN4-32458: Security Advisory - libxml2 - CVE-2015-1819 LIN4-32459: Security Advisory - linux - CVE-2015-2922 LIN4-32465: Security Advisory - php - CVE-2015-0273 LIN4-32466: Security Advisory - libtasn1 - CVE-2015-2806 LIN4-32472: Security Advisory - linux - CVE-2015-1465 LIN4-32478: Security Advisory - php - CVE-2015-2348 LIN4-32483: Security Advisory - php - CVE-2014-9705 LIN4-32485: Security Advisory - php - CVE-2015-1353 LIN4-32491: Security Advisory - php - CVE-2014-9709 LIN4-32492: Security Advisory - less - CVE-2014-9488 LIN4-32494: Security Advisory - php - CVE-2015-2331 LIN4-32496: Security Advisory - php - CVE-2015-2787 LIN4-32524: wrlinux 4 - preload syslog-ng segfault LIN4-32526: net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables LIN4-32527: WRlinux6, qemu vga output don't work after apply the patch for CVE-2014-3615 LIN4-32542: Security Advisory - linux - CVE-2015-2041 LIN4-32544: Security Advisory - qemu - CVE-2014-9718 LIN4-32551: Security Advisory - libx11 - CVE-2013-7439 LIN4-32556: Security Advisory - sqlite - CVE-2015-3416 LIN4-32560: Security Advisory - ppp - CVE-2015-3310 LIN4-32561: Security Advisory - sqlite - CVE-2015-3415 LIN4-32562: Security Advisory - curl - CVE-2015-3148 LIN4-32566: Security Advisory - curl - CVE-2015-3143 LIN4-32567: /etc/pam.d/passwd was added executed permission LIN4-32569: thread can not ptrace other thread in the same process LIN4-32570: WRliunx4.3 upgrade to RCPL 29, fdisk list nor flash as /dev/mtdblock0 LIN4-32582: Multiple XML Parsing Vulnerabilities LIN4-32604: In WRL-4.3 RCPL0028 when building the pcituils package for both 64 bit and 32 bit, the build fails LIN4-32605: Security Advisory - qemu - CVE-2015-3456 LIN4-32606: Security Advisory - qt - CVE-2015-1859 LIN4-32607: Security Advisory - util-linux - CVE-2014-9114 LIN4-32608: Security Advisory - qt - CVE-2015-1860 LIN4-32611: Security Advisory - busybox - CVE-2014-4607 LIN4-32612: Security Advisory - perl-XML-LibXML - CVE-2015-3451 LIN4-32613: Security Advisory - libtasn1 - CVE-2015-3622 LIN4-32637: when bond interface is first brought up, its state is 'RUNNING' LIN4-32639: Security Advisory - openssl & openssh - CVE-2015-4000 LIN4-32644: "Peer state" of an SCTP connection is reported incorrectly RCPL27 LIN4-32647: Security Advisory - fuse - CVE-2015-3202 LIN4-32678: Security Advisory - linux - CVE-2015-2830 LIN4-32680: Security Advisory - linux - CVE-2014-9715 LIN4-32686: Security Advisory - postgresql - CVE-2015-3165 LIN4-32687: Security Advisory - linux - CVE-2014-9710 LIN4-32690: Security Advisory - Ipsec-tools - CVE-2015-4047 LIN4-32700: Trouble writing a filesystem to an MMC chip using parted LIN4-32701: Security Advisory - linux - CVE-2015-1805 LIN4-32709: Security Advisory - postgresql - CVE-2015-3166 LIN4-32714: Security Advisory - postgresql - CVE-2015-3167 LIN4-32722: Jumbo packets may be dropped LIN4-32723: Security Advisory - strongswan - CVE-2015-4171 LIN4-32726: Security Advisory - postgresql - CVE-2015-0242 LIN4-32732: Security Advisory - cups - CVE-2015-1158 LIN4-32737: Security Advisory - cups - CVE-2015-1159 LIN4-32754: Security Advisory - openssl - CVE-2015-1791 LIN4-32756: Security Advisory - php - CVE-2015-4022 LIN4-32757: Security Advisory - php - CVE-2015-4021 LIN4-32758: Security Advisory - php - CVE-2015-4148 LIN4-32760: Security Advisory - php - CVE-2015-4147 LIN4-32761: Security Advisory - openssl - CVE-2015-1789 LIN4-32763: Security Advisory - php - CVE-2015-4025 LIN4-32765: Security Advisory - php - CVE-2015-3330 LIN4-32766: Security Advisory - php - CVE-2015-4024 LIN4-32767: Security Advisory - openssl - CVE-2014-8176 LIN4-32769: Security Advisory - php - CVE-2015-3329 LIN4-32771: Security Advisory - openssl - CVE-2015-1788 LIN4-32772: Security Advisory - php - CVE-2015-2783 LIN4-32773: Security Advisory - openssl - CVE-2015-1792 LIN4-32782: Security Advisory - openssl - CVE-2015-1790 LIN4-32787: coredump with rpm query command LIN4-32789: Security Advisory - unzip - CVE-2014-8139 LIN4-32790: Security Advisory - unzip - CVE-2014-8140 LIN4-32797: Udevd errors with temperory files LIN4-32805: Upgrade timezone to 2015e LIN4-32820: WRlinux4.3: sched: Fix switch_from_fair, and sched, rt: Provide means of disabling cross-cpu bandwidth sharing LIN4-32826: Security Advisory - xerces-c - CVE-2015-0252 LIN4-32834: Security Advisory - qemu - CVE-2015-3209 LIN4-32839: Security Advisory - Hostapd - CVE-2015-4141 LIN4-32840: Security Advisory - Hostapd - CVE-2015-4142 LIN4-32842: Security Advisory - ntp - CVE-2015-5146 LIN4-32843: WRL 4.3 : RCPL 29 : Scheduling in atomic in ppc board LIN4-32844: Leap Second Isssue and Deadlock LIN4-32847: Security Advisory - Linux-Pam - CVE-2015-3238 LIN4-32850: Security Advisory - postgresql - CVE-2015-0243 LIN4-32855: Security Advisory - postgresql - CVE-2015-0244 LIN4-32865: after enable jumbo package support, on p2041 board, ping will failed when with big size package(more than 1500 bytes) LIN4-32875: Security Advisory - nss - CVE-2015-2721 LIN4-32878: Security Advisory - bind - CVE-2015-4620 LIN4-32894: Security Advisory - linux - CVE-2015-5366 LIN4-32901: Security Advisory - linux - CVE-2015-5364 LIN4-32909: ipmitool bug with WRlinux4.3 P2041 board LIN4-32915: wrl 4.3 : SCTP not supported in nmap scan LIN4-32917: wrl 4.2 : kernel panic in octeon+ (cavium 56xx) Based Kernel. LIN4-32923: Security Advisory - apache - CVE-2015-3183 LIN4-32929: Security Advisory - bind - CVE-2015-5477 LIN4-32945: Integrate an upstreram kernel patch( commit id: 30a6b8031fe ) LIN4-32947: Update timezone 2015f release of tz code and data available LIN4-32951: Security Advisory - libuser - CVE-2015-3246 LIN4-32952: Security Advisory - openssh - CVE-2015-5600 LIN4-32954: Security Advisory - ghostscript - CVE-2015-3228 LIN4-32955: Security Advisory - gdk-pixbuf - CVE-2015-4491 LIN4-32957: Security Advisory - qemu - CVE-2015-5165 LIN4-32958: Security Advisory - linux - CVE-2015-4167 LIN4-32959: Security Advisory - libidn - CVE-2015-2059 LIN4-32960: Security Advisory - qemu - CVE-2015-5154 LIN4-32962: Security Advisory - libuser - CVE-2015-3245 LIN4-32964: Security Advisory - openssh - CVE-2015-5352 LIN4-32966: Possible SMP deadlock on multicore p4080 LIN4-32972: Applicative processes take very long time to exit due to munlockall(). LIN4-32973: ADSP2 hwclock errors LIN4-32974: Mpatrol problem with libnl LIN4-32977: tty_mode_ioctl TCGETS and TCSETSW in WRL 4.3 LIN4-32979: Security Advisory - xfsprogs - CVE-2012-2150 LIN4-32980: Security Advisory - openssh - CVE-2015-6564 LIN4-32981: Security Advisory - libevent - CVE-2014-6272 LIN4-32983: Security Advisory - openssh - CVE-2015-6563 LIN4-32984: Security Advisory - perl - CVE-2013-7422 LIN4-32985: Security Advisory - qemu - CVE-2015-4037 LIN4-32986: Security Advisory - libevent - CVE-2015-6525 LIN4-32992: build error when building curl with libssh2 support : libssh2.h:443: note: previous declaration of 'libssh2_free' was here LIN4-32993: Security Advisory - bind - CVE-2015-5722 LIN4-32994: Security Advisory - linux - CVE-2015-6526 LIN4-32995: Security Advisory - linux - CVE-2014-9730 LIN4-32997: Security Advisory - linux - CVE-2014-9729 LIN4-32999: Security Advisory - linux - CVE-2014-9731 LIN4-33008: Security Advisory - linux - CVE-2014-9728 LIN4-33009: Security Advisory - openldap - CVE-2015-6908 LIN4-33011: Security Advisory - linux - CVE-2015-5697 LIN4-33013: wrlinux 4 - SCTP PMTU Discovery doesn't work if MTU is not multiple of 4 LIN4-33018: wrl 4.3 Processes hanged in D state (deadlock in DRBD) ? LIN4-33021: wrlinux 4.x : Kernel panic due to division by zero in find_busiest_group() LIN4-33024: Security Advisory - freetype - CVE-2014-9745 LIN4-33026: PCI: can't handle 64-bit address space for bridge LIN4-33027: wrl 4.3 : OS/scheduling hang during unmount of the filesystem LIN4-33028: Update timezone 2015g LIN4-33039: Security Advisory - rpcbind - CVE-2015-7236 LIN4-33041: Security Advisory - qemu - CVE-2015-5279 LIN4-33045: Security Advisory - ntp - CVE-2015-7871 LIN4-33055: Security Advisory - ntp - CVE-2015-7853 LIN4-33060: Security Advisory - ntp - CVE-2015-7852 LIN4-33069: Security Advisory - ntp - CVE-2015-7851 LIN4-33070: Security Advisory - ntp - CVE-2015-7850 LIN4-33084: Security Advisory - ntp - CVE-2015-7691 LIN4-33089: Security Advisory - ntp - CVE-2015-7692 LIN4-33099: Security Advisory - ntp - CVE-2015-7703 LIN4-33104: Security Advisory - ntp - CVE-2015-7704 LIN4-33109: Security Advisory - ntp - CVE-2015-7705 LIN4-33114: Security Advisory - ntp - CVE-2015-7701 LIN4-33119: Security Advisory - ntp - CVE-2015-7855 LIN4-33128: Security Advisory - gdk-pixbuf - CVE-2015-7673 LIN4-33136: Security Advisory - linux - CVE-2015-5707 LIN4-33143: Security Advisory - gdk-pixbuf - CVE-2015-7674 LIN4-33146: Security Advisory - linux - CVE-2015-7613 LIN4-33155: Security Advisory - linux - CVE-2015-7799 LIN4-33159: Security Advisory - linux - CVE-2015-6937 LIN4-33160: Security Advisory - linux - CVE-2015-5156 LIN4-33167: Security Advisory - util-linux - CVE-2015-5218 LIN4-33168: Security Advisory - unzip - CVE-2015-7696 LIN4-33171: Security Advisory - unzip - CVE-2015-7697 LIN4-33174: Security Advisory - krb5 - CVE-2015-2695 LIN4-33202: Security Advisory - openssl - Patch for CVE-2015-1789 is incomplete LIN4-33204: Security Advisory - libsndfile - CVE-2014-9756 LIN4-33205: Security Advisory - libpng - CVE-2015-7981 LIN4-33211: Security Advisory - linux - CVE-2015-5257 LIN4-33214: Security Advisory - linux - CVE-2015-5307 LIN4-33215: Security Advisory - libpng - CVE-2015-8126 LIN4-33216: Security Advisory - libsndfile - CVE-2015-7805 LIN4-33217: Security Advisory - libxslt - CVE-2015-7995 LIN4-33218: Security Advisory - libxml2 - CVE-2015-7941 LIN4-33221: Security Advisory - libxml2 - CVE-2015-7942 LIN4-33222: Security Advisory - linux - CVE-2015-8215 LIN4-33231: Security Advisory - php - CVE-2015-7803 LIN4-33239: Security Advisory - libxml2 - CVE-2015-8242 LIN4-33240: Security Advisory - openssl - CVE-2015-3195 LIN4-33244: Security Advisory - libxml2 - CVE-2015-7497 LIN4-33245: Security Advisory - git - CVE-2015-7082 LIN4-33248: Security Advisory - openldap - CVE-2015-3276 LIN4-33255: Security Advisory - php - CVE-2015-7804 LIN4-33257: Security Advisory - libxml2 - CVE-2015-5312 LIN4-33261: Security Advisory - openssl - CVE-2015-3196 LIN4-33263: Security Advisory - expat - CVE-2015-1283 LIN4-33272: Security Advisory - libxml2 - CVE-2015-7499 LIN4-33273: Security Advisory - libxml2 - CVE-2015-7500 LIN4-33279: Security Advisory - bind - CVE-2015-8000 LIN4-33280: Security Advisory - libxml2 - CVE-2015-7498 LIN4-33285: Security Advisory - bind - CVE-2015-8461 LIN4-33288: Security Advisory - libxml2 - CVE-2015-8241 LIN4-33290: Security Advisory - libxml2 - CVE-2015-8317 LIN4-33295: Unable to write to flash on JFFS2 file system, giving Input/Output Error. LIN4-33302: failed to remove RC4 from openssl LIN4-6516: An issue of jffs2 on p2041hfp LIN4-7067: WRlinux4.3+P1010, kernel oops when booting up LIN4-7953: WIND00437970 have fixed global pointer variables print problem, but cannot print local viriables LIN4-9150: Security Advisory - libxres - CVE-2013-1988 LIN4-9160: Security Advisory - libxvmc - CVE-2013-1999 LIN4-9893: Security Advisory - libxv - CVE-2013-1989 LIN4-9903: Security Advisory - libxt - CVE-2013-2002 WIND00187713: Security Advisory - Samba - CVE-2009-2948 WIND00200925: Security Advisory - Samba - CVE-2010-0547 WIND00218815: Security Advisory - openssl - CVE-2010-XXXX WIND00232302: Security Advisory - ghostscript - CVE-2009-3743 WIND00239967: Security Advisory - Linux - CVE-2010-3877 WIND00266144: Security Advisory - logrotate - CVE-2011-1548 WIND00269521: Security Advisory - Samba - CVE-2011-1678 WIND00269522: Security Advisory - util-linux - CVE-2011-1675 WIND00269524: Security Advisory - util-linux - CVE-2011-1677 WIND00281599: Security Advisory - Linux - CVE-2010-4805 WIND00283549: Feature Testing: Fail to build MIPS64 CGL kernel with CONFIG_PREEMPT_NONE=y WIND00286695: Security Advisory - groff - CVE-2009-5082 WIND00286696: Security Advisory - groff - CVE-2009-5081 WIND00286698: Security Advisory - groff - CVE-2009-5079 WIND00286699: Security Advisory - groff - CVE-2009-5080 WIND00286700: Security Advisory - groff - CVE-2009-5044 WIND00299601: Security Advisory - Linux - CVE-2011-2928 WIND00306468: Security Advisory - samba - CVE-2011-2724 WIND00307370: Missing instructions for UBIFS on WR Linux 4.2 BSP for the Freescale P4080DS WIND00307464: [RCPL0001]Doing a make reconfig does not reshadow binary host tools WIND00309310: pramfs is still broken and there is a disk space leak WIND00311483: Security Advisory - Apache - CVE-2011-3368 WIND00311487: Security Advisory - OpenSSL - CVE-2011-3207 WIND00311488: Security Advisory - OpenSSL - CVE-2011-3210 WIND00311490: Security Advisory - acpid - CVE-2011-1159 WIND00312373: wrlinux 4.2 - EDAC not working with cav_octeon_cn68xx BSP WIND00312805: libvirt fails to assign passthrough WIND00312959: Default config for rpc.statd do not match those for sm-notify WIND00314192: wrlinux-3.* cgl: lots of calltrace if append 'softirq-preempt=0' to kernel command line WIND00314539: Security Advisory - krb5 - CVE-2011-1527 WIND00314569: Security Advisory - quagga - CVE-2011-3323 WIND00314579: Security Advisory - quagga - CVE-2011-3324 WIND00314589: Security Advisory - quagga - CVE-2011-3325 WIND00314599: Security Advisory - quagga - CVE-2011-3326 WIND00314609: Security Advisory - quagga - CVE-2011-3327 WIND00315650: make fails on inetutils after a make reconfig WIND00315729: Intel Tunnel Creek - Suspend and Resume is not optimized/stable under Linux WIND00315838: tipc deadlock problem when tipc link retransmit failed. WIND00315847: Softlockup(deadlock) problem when a flood of ipv6 dad patckets are existing WIND00316223: Warning about WR internal templates WIND00316312: Security Advisory - libxml2 - CVE-2011-2821 CVE-2011-2834 WIND00316315: Security Advisory - OpenLDAP - CVE-2011-4079 WIND00316328: Using 'feature/valgrind_small' with a non-small file system results in incomplete perl package WIND00316562: CRYPTO_SHA1_HMAC and CRYPTO_MD5_HMAC doesn't work in wrlinux-4.1 MPC8572 BSP WIND00317745: qtdemoE crashes on WRL 4.2 target system WIND00317798: enscript can fail to build for some targets WIND00317874: [BSP4.3][ BSP: 85xx ] kftp kretprobe test failed caught call trace on lx21a preempt_rt kernel WIND00318121: [BSP4.3][ BSP: fsl_p1022_p1013]can not wake up the system which enter deep sleep with 32bits kernel. WIND00318514: Security Advisory - apache - CVE-2011-3607 WIND00318590: Feature Testing: glibc.install fails after toolchain rebuilt from source WIND00318686: kernel Oops when loading and unloading driver WIND00318727: WRL Mesa lib crashes due to known issue in Intel i965 driver WIND00318910: building glibc print '... No such file or directory' error info WIND00318914: building boost print 'Not all Boost libraries built properly.' error info WIND00319143: Security Advisory - Linux - CVE-2011-4110 WIND00319163: Security Advisory - Linux - CVE-2011-4330 WIND00319164: Security Advisory - openssh - CVE-2011-4327 WIND00319165: Security Advisory - Linux - CVE-2011-4112 WIND00319166: Security Advisory - Linux - CVE-2011-4326 WIND00319168: Security Advisory - bind - CVE-2011-4313 WIND00319335: Security Advisory - Linux - CVE-2011-4347 WIND00319448: sd / mmc crash at probe time on Eurotech board WIND00319716: make boot-image fails on 4.3 ASYNC Crystal Forest and Romley BPSs WIND00319737: wrlinux-4.2: clocksource->mult values might overflow when adjusted WIND00319768: command "mount -t pramfs xxx" may block sometimes WIND00319915: In 4.3 ldat is emitting extra logging information that should not be seen with rules started in variant directories WIND00320290: libvirt failed to recognize qemu-kvm version WIND00320531: Unable to change configure options for poky package in a layer WIND00320879: Gdb can not get the backtrace from the kdump core file on x86_64 WIND00321130: wrlinux 2.0.4 SCTP uncompliance WIND00322353: On Ubuntu host if dash not replaced with dash BSPs do not show up in 'configure' and Workbench WIND00322389: busybox deletes its build log WIND00322496: Building perl as non-root user causes "Permission denied". WIND00322935: Security Advisory - DHCP - CVE-2011-4539 WIND00322936: Security Advisory - GnuTLS - CVE-2011-4128 WIND00322937: Security Advisory - krb5 - CVE-2011-1530 WIND00322939: Security Advisory - Apache - CVE-2011-4317 WIND00322941: Security Advisory - Apache - CVE-2011-3639 WIND00323265: WRlinux 4.2 contains a broken driver for P5020DS board WIND00323712: [BSP4.3 Async ][ BSP: fsl-p2040/2041] system call mq_timedsend make stack smashing when send an msg with max_msgsize+1 WIND00324255: Segmentation Violation reported when a .zip archive is imported as a userspace package WIND00324478: Importing a mix of C and C++ sources with importPackages.tcl compiles everything with g++ WIND00324927: Memory analyzer takes minutes to start with ARM and C++ on WRL / WB WIND00325298: fsl_p4080 bsp: this bps is based on fsl dpaa sdk 1.0, but we still refer to sdk 2.2 in the bsp readme WIND00325441: x86: the __cycles_2_ns calculation in sched_clock has an overflow WIND00325457: Security Advisory - openipmi - CVE-2011-4339 WIND00325460: Security Advisory - libxml2 - CVE-2011-3905 WIND00325562: Security Advisory - phpMyAdmin - CVE-2010-4480 WIND00325564: Security Advisory - phpMyAdmin - CVE-2010-4481 WIND00325566: Security Advisory - phpMyAdmin - CVE-2011-0986 WIND00325567: Security Advisory - phpMyAdmin - CVE-2011-0987 WIND00325568: Security Advisory - phpMyAdmin - CVE-2011-2505 WIND00325569: Security Advisory - phpMyAdmin - CVE-2011-2506 WIND00325572: Security Advisory - phpMyAdmin - CVE-2011-2507 WIND00325575: Security Advisory - phpMyAdmin - CVE-2011-2508 WIND00325578: Security Advisory - phpMyAdmin - CVE-2011-2642 WIND00325581: Security Advisory - phpMyAdmin - CVE-2011-2719 WIND00325583: Security Advisory - phpMyAdmin - CVE-2011-3181 WIND00325584: Security Advisory - phpMyAdmin - CVE-2011-4107 WIND00325676: [4.2][BSP: fsl_imx51pdk] rmmod modules failed when doing one wire test WIND00325845: ssh login may cause fsl_p4080 panic WIND00325868: dpaa: the get/set pauseparam interfaces for ethtool is incomplete WIND00325871: Security Advisory - PHP - CVE-2011-3268 WIND00325873: Security Advisory - PHP - CVE-2011-3267 WIND00325877: Security Advisory - PHP - CVE-2011-3182 WIND00325881: Security Advisory - PHP - CVE-2011-2483 WIND00325885: Security Advisory - PHP - CVE-2011-2202 WIND00325888: Security Advisory - PHP - CVE-2011-1471 WIND00325891: Security Advisory - PHP - CVE-2011-1470 WIND00325892: Security Advisory - PHP - CVE-2011-1469 WIND00325950: Security Advisory - PHP - CVE-2011-1468 WIND00325951: Security Advisory - PHP - CVE-2011-1467 WIND00325953: Security Advisory - PHP - CVE-2011-1466 WIND00325954: Security Advisory - PHP - CVE-2011-1464 WIND00325955: Security Advisory - PHP - CVE-2011-1453 WIND00325957: Security Advisory - PHP - CVE-2011-1148 WIND00325958: Security Advisory - PHP - CVE-2011-1092 WIND00325959: Security Advisory - PHP - CVE-2011-0755 WIND00325961: Security Advisory - PHP - CVE-2011-0753 WIND00325962: Security Advisory - PHP - CVE-2011-0708 WIND00325963: Security Advisory - PHP - CVE-2011-0421 WIND00325964: Security Advisory - PHP - CVE-2010-4700 WIND00325965: Security Advisory - PHP - CVE-2010-4699 WIND00325966: Security Advisory - PHP - CVE-2010-4698 WIND00325967: Security Advisory - PHP - CVE-2010-4697 WIND00325968: Security Advisory - PHP - CVE-2010-4645 WIND00325969: Security Advisory - PHP - CVE-2010-4409 WIND00325971: Security Advisory - PHP - CVE-2010-4150 WIND00325972: Security Advisory - PHP - CVE-2010-3870 WIND00325974: Security Advisory - PHP - CVE-2010-3710 WIND00325975: Security Advisory - PHP - CVE-2010-3709 WIND00325976: Security Advisory - PHP - CVE-2010-3436 WIND00325977: Security Advisory - PHP - CVE-2010-3065 WIND00325980: Security Advisory - PHP - CVE-2010-3064 WIND00325981: Security Advisory - PHP - CVE-2010-3062 WIND00325986: Security Advisory - PHP - CVE-2010-2531 WIND00325987: Security Advisory - PHP - CVE-2010-2225 WIND00325989: Security Advisory - PHP - CVE-2010-2191 WIND00325997: Security Advisory - PHP - CVE-2010-2950 WIND00325999: Security Advisory - PHP - CVE-2010-1917 WIND00326001: Security Advisory - PHP - CVE-2010-1914 WIND00326002: Security Advisory - PHP - CVE-2010-1868 WIND00326003: Security Advisory - PHP - CVE-2010-1866 WIND00326004: Security Advisory - PHP - CVE-2010-2190 WIND00326006: Security Advisory - PHP - CVE-2010-1861 WIND00326009: Security Advisory - PHP - CVE-2010-0397 WIND00326010: Security Advisory - PHP - CVE-2006-7243 WIND00326545: tipc soft lockup problem. WIND00327231: Cannot find -lstdc++ when build gnutls for arm_versatile_926ejs WIND00327820: python2.6/sitepackages/xcbgen/ files conflict when building xcb-proto for 32 and 64 bit WIND00327989: Security Advisory - libxml2 - CVE-2011-3919 WIND00327991: Security Advisory - openssl - CVE-2011-4108 WIND00327996: Security Advisory - openssl - CVE-2011-4576 WIND00327997: Security Advisory - openssl - CVE-2011-4577 WIND00327998: Security Advisory - openssl - CVE-2011-4619 WIND00327999: Security Advisory - openssl - CVE-2012-0027 WIND00328001: Security Advisory - PHP - CVE-2011-4885 WIND00328006: Security Advisory - krb5 - CVE-2011-4862 WIND00328010: Acquiring CPU resource of kmmcd is too high, when a SD card is not attached to the board P1022 DS WIND00328041: When calling the vconfig in usespace, preempt-rt kernel print a BUG info WIND00328142: Running "make net-start TOPTS=-t" as root can lead to unusable TAP interfaces by the non-root user WIND00328156: Using make usb-image-loop creates syslinux.cfg owned by root WIND00328158: package database is missing 3 items, add elinks. WIND00329520: Kernel panic with fsl_p4080 BSP and preempt_rt kernel WIND00329536: "Value too large for defined data type" with make boot-image-create on 32-bit host. WIND00330583: Security Advisory - Apache - CVE-2012-0031 WIND00330589: Security Advisory - mysql - CVE-2011-2262 WIND00330824: Security Advisory - mysql - CVE-2012-0087 WIND00330837: Security Advisory - mysql - CVE-2012-0101 WIND00330838: Security Advisory - mysql - CVE-2012-0102 WIND00330840: Security Advisory - mysql - CVE-2012-0113 WIND00330842: Security Advisory - mysql - CVE-2012-0115 WIND00330843: Security Advisory - mysql - CVE-2012-0116 WIND00330844: Security Advisory - mysql - CVE-2012-0118 WIND00330845: Security Advisory - mysql - CVE-2012-0119 WIND00330846: Security Advisory - mysql - CVE-2012-0120 WIND00330847: Security Advisory - mysql - CVE-2012-0484 WIND00330848: Security Advisory - mysql - CVE-2012-0485 WIND00330849: Security Advisory - mysql - CVE-2012-0490 WIND00330866: Security Advisory - openssl - CVE-2012-0050 WIND00331150: Need fix for CVE-2011-3188 WIND00331156: Need fix for CVE-2011-2699 WIND00331209: vsftpd-2.1.0-tcp_wrappers.patch is not applied in WR Linux 4.3 WIND00331968: WR LInux 4.3 -- cat and cp fail on a pramfs filesystem WIND00331969: Typo in user-nfs.sh script: SAVE_NFS_NFSTPROG= should be SAVE_NFS_NFSPROG= WIND00332155: Security Advisory - phpMyAdmin - CVE-2011-1940 WIND00332159: Security Advisory - Apache - CVE-2012-0053 WIND00332161: Security Advisory - Linux - CVE-2011-4077 WIND00332164: Security Advisory - Linux - CVE-2011-4132 WIND00332172: Security Advisory - KVM - CVE-2011-4622 WIND00332173: Security Advisory - qemu-kvm - CVE-2012-0029 WIND00332174: Security Advisory - openssh - CVE-2012-0814 WIND00332844: Patch errors should halt builds WIND00333073: ace package build error when adding "--with-template=feature/usdpaa" WIND00333161: grub fails with cgl iso installer WIND00333190: WR Linux 4.3 -- header files in iptables-devel-1.4.7-2_WR4.3.0.0.x86_32 conflicts with those in iptables-devel-1.4.7-2_WR4.3.0.0.x86_64 WIND00333353: wrlinux 4.3 + with-local-build-dir results in kernel build failure WIND00333587: On Cavium Octeon BSP cn56xx, cn58xx and cn 63xx the WRS_BOARD of cgl kernel wasn't identical as --enable-board WIND00333699: Unable to build kernel with CONFIG_IXGBE=y WIND00333749: [RCPL0001] Failed to build linux on amcc_kilauea_405ex-preempt_rt-glibc_small WIND00333879: wrlinux 4.3 - grsec git commit introduces a memory leak WIND00333905: host tools added in a custom layer can not be added to the tool-pathfixes for fixup when exporting the host-tools WIND00333935: [review_by_Gautam] feature/wifi is lacking required kernel config options for intel_atom_z530 WIND00334215: tipc-1.6 file remain while tipc-1.7 files are added leading to confusion WIND00334375: Deselecting CONFIG_KGDB_KDB causes compilation error WIND00334391: Security Advisory - php - CVE-2012-0789 WIND00334403: Security Advisory - php - CVE-2012-0788 WIND00334406: Security Advisory - php - CVE-2012-0831 WIND00334407: Security Advisory - apache - CVE-2012-0840 WIND00334416: Security Advisory - php - CVE-2012-0830 WIND00334430: Security Advisory - linux - CVE-2011-2525 WIND00334434: Security Advisory - php - CVE-2012-0057 WIND00334530: depmod not run during filesystem generation if kernel is prebuilt WIND00334634: [RCPL0001] wrlinux 4.3 RCPL0001.04 + with-local-build-dir results in build failure WIND00334732: visudo: the default path to vi. WIND00334733: WRLX 4.3 - IPMI potential memory leak in main_sdr_add() WIND00334783: xserver-xf86-dri-lite build error on RHEL-6.x hosts WIND00335073: prelink_errs reported WIND00335080: upstream fedora repository has moved as of late February 2012 WIND00335259: Incorrectly discarded SCTP COOKIE ECHO WIND00335396: WR Linux 4.3: sysklogd: inappropriate lock file name WIND00336483: Cannot use "make start-simics" when your shell is /bin/csh on fc12 WIND00336826: wrl 4.2 / 4.3 : xerces does not build samples WIND00336886: Atom serial ports fail upon resume after suspend WIND00337324: WR Linunx 4.3 -- soft lockups seen during heavy network traffic. WIND00337668: broken fs-install script WIND00337674: Visual artifacts with Intel EMGD driver when using OpenGL WIND00337786: texinfo parallel build problems WIND00338103: WR Linux 4.3 -- enabling CONFIG_FSL_DPA_CHECKING results in panic WIND00338104: wrlinux 3.0.3, debuginfo RPM has a missing source and wrong paths WIND00338331: [UPDATE Kontron KM2M806 nanoETXexpress]wifi can not use in glibc_small WIND00339183: [WRL4.3 ][BSP: cav_octeon_cn56xx, cav_octeon_cn58xx, cav_octeon_cn63xx, cav_octeon_cn68xx ] The WRL43 latest dvd package missed the "MIPS-Return-after-handling-coprocessor-2-exception.patch ", and it would cause the "Illegal instruction" exception. WIND00339273: wrl 4.3 : postinst_*.sh scripts corrupt repository data WIND00339429: pppol2tp connection failed due to pppd lib file located in wrong place WIND00339711: drbd-tools does not build on hosts with a 3.x kernel WIND00339930: Security Advisory - openssl - CVE-2012-0884 WIND00340426: wrlinux 4.3 - header conflict between 32 and 64 bit version of the packages WIND00340458: rpm unable to extract some info on non-x86 targets WIND00340894: Writing and erasing NAND flash occur, when sync() is called and UBIFS is used WIND00341934: wrlinux-4/ldat/scripts/listsort.pl can remove extra packages WIND00341943: Missing patch for atftp package in WRL 4.x WIND00342219: kernel call number mismatched with kernel call table WIND00342780: Typpos in documents that use glibc_stanard instead of glibc_std WIND00343033: p1022ds can't correctly enter deep sleep when CONFIG_PHYS_64BIT disabled WIND00343096: [WRL4.3][BSP: nlm_xlr_atx_64_be ] The latest WRL43 dvd package (lx23h) missed the "nlm_xlr_atx_64_be-Add-cpu-hotplug-support.patch", it would cause kernel compiling failed. WIND00343363: Security Advisory - gnutls - CVE-2012-1569 WIND00343366: Security Advisory - gnutls. - CVE-2012-1573 WIND00343415: Security Advisory - WRLinux doesn't ship openssl. - CVE-2012-1165 WIND00343456: gdb -ex "set sysroot $SYSROOT_PATH" failed under Windows XP environment WIND00343575: CPU resource of radclient is too high, when changing date WIND00343709: IPMI is disabled by default for CGL configurations in some bsps which have bmc hardware WIND00343849: wrlinux 4.3, serial port output delayed by 30 seconds at boot time WIND00343851: wrlinux 4.3 sched_clock wrap WIND00344306: Build error for core2 cracklib, possible missing dependency on core2 zlib libraries WIND00344561: Build failure caused when using feature/ipsec WIND00344636: Adding openssh package leads to sshd misconfigured and access denied for root WIND00344729: The README of ipsec, vlan and net_subsets is not correct WIND00344793: wrlinux 4.3 - random crashes with task migration enabled WIND00344909: e500mc does not have BUS_RBERR bit on MCSR WIND00345017: vsftpd cannot install if chkconfig is missing WIND00345124: wrlinux 4.3 - telnetd nodns WIND00345310: Security Advisory - quagga - CVE-2012-0249 WIND00345311: Security Advisory - quagga - CVE-2012-0255 WIND00345312: Security Advisory - openssh - CVE-2011-5000 WIND00345313: Security Advisory - quagga - CVE-2012-0250 WIND00345314: Security Advisory - samba - CVE-2012-1182 WIND00345582: Feature Testing:[Userspace Testing] dbus-glib package will configure twice when building WIND00345791: Dhcp cannot install if chkconfig is missing WIND00345827: ifconfig add can not set the correct alias number WIND00346055: wrlinux 4.3 - fsl_p1021_p1012 yaffs deploy error WIND00346082: TOOL_PATH in .wrproject is hardcoded for specific host type. WIND00346252: kexec-tools 16MB limitation on PPC. WIND00346504: WR Linux 3.0.3 -- define in sysroot/usr/include/net-snmp/net-snmp-config.h causes compiler warnings WIND00346675: can not write jffs2 image to nand flash correctly on p1020 WIND00346857: some package cannot install if chkconfig is missing WIND00346876: wrl 4.3 : --with-package-release= causes host tool build verification to take *very* long WIND00346904: MIPC/SIPC on WRLinux 4.3 fails to initialize when project is configured with the 'feature/safety_profile' WIND00347257: Workbench build of the qtdemo project fails for arm_coretile_express_a9x4 WIND00347339: [BSP4.3][BSP-intel_atom_z530]Using intel_atom_z530 BSP, The gpio pin of Portwell NANO-8044 ITX cannot work normally. WIND00347621: Fatal kernel crash on removal of USB storage device without unmounting. WIND00347659: Security Advisory - freetype - CVE-2012-1137 WIND00347660: Security Advisory - freetype - CVE-2012-1130 WIND00347661: Security Advisory - freetype - CVE-2012-1143 WIND00347662: Security Advisory - freetype - CVE-2012-1136 WIND00347663: Security Advisory - freetype - CVE-2012-1133 WIND00347665: Security Advisory - freetype - CVE-2012-1128 WIND00347666: Security Advisory - freetype - CVE-2012-1142 WIND00347667: Security Advisory - freetype - CVE-2012-1138 WIND00347668: Security Advisory - freetype - CVE-2012-1126 WIND00347669: Security Advisory - freetype - CVE-2012-1141 WIND00347670: Security Advisory - freetype - CVE-2012-1134 WIND00347671: Security Advisory - openssl - CVE-2012-2110 WIND00347672: Security Advisory - freetype - CVE-2012-1131 WIND00347673: Security Advisory - openssl - CVE-2012-2131 WIND00347674: Security Advisory - freetype - CVE-2012-1127 WIND00347675: Security Advisory - apache - CVE-2012-0883 WIND00347676: Security Advisory - freetype - CVE-2012-1129 WIND00347677: Security Advisory - freetype - CVE-2012-1132 WIND00347678: Security Advisory - freetype - CVE-2012-1139 WIND00347679: Security Advisory - freetype - CVE-2012-1144 WIND00347680: Security Advisory - freetype - CVE-2012-1135 WIND00347681: Security Advisory - freetype - CVE-2012-1140 WIND00347682: Security Advisory - curl - CVE-2012-0036 WIND00348183: packages.mk does not strip trailing spaces from Makefile variables that are combined into path names, causing erroneous results. WIND00348339: wrl 4.3 : udevd : in /sbin/start_udevd, the function kill_udevd is no longer present, causing udevd that has been originally started from the initrd image isn't killed & restarted properly during the boot WIND00348698: Building Wind River Linux Application failed due to 'CAN NOT OPEN *-wrapper.sh' in windows XP host WIND00348855: valgrind segfaults when startup in wind river linux 4.3 project WIND00349271: Possible security vulnerability in dropbear WIND00349505: wrl 4.3 / 4.2 : Can't exec "/bin/sh": Argument list too long at wrlinux-4/ldat/scripts/rpmlicense.pl line 46 WIND00349740: Security Advisory - php - CVE-2012-2311 WIND00349743: Security Advisory - php - CVE-2012-1823 WIND00349950: powerpc-wrs-linux-gnu-ppc_e500mc-glibc_std-ldd can not run in sysroot WIND00349976: preempt_rt kernel print 'BUG: sleeping function called from invalid context' when p1020 load pcie device driver WIND00349982: MIIMCFG[MgmtClk] value is invaild WIND00350575: [WRL 4.3 BSP] Freescale QorIQ erratas fixes integration - fsl_p4080 WIND00351839: Fail to build rootfs of nlm_xls_atx_64_be-standard-glibc_std.mips64_xlr for MIPS64 wrlinux-4.3 WIND00351908: The "perf callchain fixlet" patch would be useful to apply wrlinux WIND00352093: WRLinux4.3 Oprofile don't support Intel Sandy Bridge WIND00352471: fsl_p204x kernel build error with WR-Linux 4.3 RCPL-0003 WIND00352520: TIPC connection is broken when running tipcTC & tipcTS unit test WIND00352523: tipc-config tool cannot display its correct version number WIND00352654: wrl 4.3 : openssl has invalid dependencies, which prevents rpm to be installed on running system WIND00352670: X86 WR Linux 4.3 kernel crashes on boot when compiled with VNIC support WIND00352754: can not dump stack in kprobe's handler of wind river linux 4.3 powerpc(1010, 2020, 4080) project WIND00353043: Security Advisory - libpng - CVE-2011-3048 WIND00353047: Security Advisory - php - CVE-2012-1172 WIND00353049: Security Advisory - sudo - CVE-2012-2337 WIND00353057: Security Advisory - openssl - CVE-2012-2333 WIND00353060: Security Advisory - linux - CVE-2011-4081 WIND00353067: Security Advisory - linux - CVE-2012-2121 WIND00353071: Security Advisory - linux - CVE-2012-0038 WIND00353355: wrl 4.3 : --with-template=feature/xorg : export-sysroot causes links to outside of the sysroot. (usr/lib64/fonts) WIND00353472: ethtool cannot provide statistics on p4080 WIND00353528: The libvirt meet issue in Wind River Linux 4.1 WIND00353630: WR Linux 4.3 + RCPL2 -- PCI bus rescan appears to be broken WIND00353871: wrlinux 4.3 - bash - echo interrupted by SIGCHILD from a dying coprocess WIND00354169: wrlinux4.2 have no EDAC function based on p1021 BSP WIND00354231: mmc driver times out when S3 ACPI resumes from suspend. WIND00354552: wrll_kbc_km2m806 BSP doesnt build on Fedora 16 WIND00354995: Failed to rebuild glibc in wind river linux 4.3 project WIND00355139: after two hours of pressure testing, serial port 8250 cause the whole system hang up. WIND00355348: build error when building target gcc WIND00355439: CONFIG_OCF_TALITOS is not compatible with CONFIG_CRYPTO_DEV_TALITOS and CONFIG_CRYPTO_DEV_EXTENS_T23X. WIND00355463: Enhancement request: WRL 4.3: Flash device Numonyx(Micron) Axcell M29EW support WIND00355634: [WRL 4.3 BSP] Freescale QorIQ erratas fixes integration - fsl_p50x0 WIND00355638: [WRL 4.3 BSP] Freescale QorIQ erratas fixes integration - fsl_p3041 WIND00355639: [WRL 4.3 BSP] Freescale QorIQ erratas fixes integration - fsl_p204x WIND00355659: wrl 1.3 dhcpd crashes when configured with *very* long lease times WIND00355851: NT_PRSTATUS is not saved corrrctly into vmcore. WIND00355866: Security Advisory - xinetd - CVE-2012-0862 WIND00355872: Security Advisory - imagemagick - CVE-2012-0259 WIND00355873: Security Advisory - imagemagick - CVE-2012-0248 WIND00355880: Security Advisory - imagemagick - CVE-2012-0260 WIND00355882: Security Advisory - imagemagick - CVE-2012-0247 WIND00355891: Security Advisory - bind - CVE-2012-1667 WIND00355892: Security Advisory - linux - CVE-2012-2390 WIND00355894: Security Advisory - imagemagick - CVE-2012-1610 WIND00356221: crypto-tools doen't test md5_hmac, sha1_hmac WIND00356545: perf callchain invoke warning on x86_64 WIND00356658: FTChart tool is broken in WRL 4.3 WIND00357035: Should template lsb_core have dependencies on non-core packages? WIND00357437: WR Linux 4.3 -- backport of namespaces from 2.6.35 breaks Bluetooth PAN WIND00358485: readonly root templateuses union FS, but does not add the UNION_FS kernel option WIND00358693: Security Advisory - libxml - CVE-2012-0841 WIND00358736: Security Advisory - libxslt - CVE-2011-3970 WIND00358860: when accessing flash memory formatted with jffs2,Call Trace occurs WIND00358955: tftp of busybox gets stuck on somewhere and never finishes the transmission WIND00359083: emgd-import.sh fails to import the latest Intel EMGD package WIND00359309: Security Advisory - libxml2 - CVE-2012-2807 WIND00359312: Security Advisory - linux - CVE-2010-4250 WIND00359313: Security Advisory - qemu - CVE-2011-1750 WIND00359316: Security Advisory - qt - CVE-2011-3193 WIND00359329: Security Advisory - linux - CVE-2011-1479 WIND00359335: Security Advisory - qt - CVE-2011-3194 WIND00359352: Security Advisory - linux - CVE-2011-0716 WIND00359702: "ip xfrm policy add" command can't set mark mask accurately. WIND00359767: system lockup when run perf on preempt_rt WIND00360179: NULL pointer exception in igb / ixgbe driver during wrlinux bootup WIND00360247: SIGXCPU is not sent properly in the time with RLIMIT_RTTIME limit value. WIND00360886: dpa: ethtool statistics for rx-pause-frame-packets and tx-pause-frame-packets should be swapped. WIND00360926: perl-XML-Parser failed to build due to cannot find libexpat.so on Ubuntu10.04-32bit WIND00362461: sched/rt: Fix task stack corruption under __ARCH_WANT_INTERRUPTS_ON_CTXSW WIND00362909: Security Advisory - linux - CVE-2011-4127 WIND00362911: Security Advisory - linux - CVE-2012-0045 WIND00362915: Security Advisory - php - CVE-2012-2386 WIND00362917: Security Advisory - linux - CVE-2012-2133 WIND00362921: Security Advisory - gnome - CVE-2011-2485 WIND00362923: Security Advisory - linux - CVE-2011-4086 WIND00362925: Security Advisory - busybox - CVE-2011-2716 WIND00362926: Security Advisory - php - CVE-2012-2143 WIND00363421: perf: kernel memory leak when inherit enabled WIND00363515: wrlinux 4.3- up-rev libssh2 to 1.4.2 WIND00363705: libvirt: provide qemu stdout when "monitor socket did not show up: : Connection refused" WIND00363726: libvirt: encounter "two devices with same boot index 0" error WIND00364048: Can not boot up the intel Rosecity CRB using intel_xeon_c600_pch BSP WIND00364515: can not build project with previuos pkglist after apply RCPL5 WIND00364530: nlm_xlr_atx_64_be: wrong use of kunmap_atomic() in ecc_init() WIND00365216: mount issue in busybox WIND00365383: There appears to be a bug in the "rpm-5.1.9" package which causes it to fail incorrectly under certain conditions. WIND00365494: WR Linux 4.3 + RCPL5: sysklogd: another lock file name problem WIND00366161: racoon2 does not recovery from INVALD_KE_PAYLOAD event WIND00366172: Cavium Octeon II Errata and Patch WIND00366574: dbus-glib fails to build with analysis for omap3530 WIND00366779: Security Advisory - dhcp - CVE-2012-3571 WIND00366784: Security Advisory - postgresql - CVE-2012-0867 WIND00366788: Security Advisory - libexif - CVE-2012-2836 WIND00366790: Security Advisory - postgresql - CVE-2012-2655 WIND00366792: Security Advisory - dhcp - CVE-2012-3570 WIND00366793: Security Advisory - libexif - CVE-2012-2840 WIND00366794: Security Advisory - libexif - CVE-2012-2812 WIND00366795: Security Advisory - postgresql - CVE-2012-0868 WIND00366796: Security Advisory - php - CVE-2012-3365 WIND00366798: Security Advisory - libexif - CVE-2012-2837 WIND00366802: Security Advisory - pam - CVE-2011-3148 WIND00366804: Security Advisory - squashfs - CVE-2012-4024 WIND00366808: Security Advisory - libexif - CVE-2012-2813 WIND00366809: Security Advisory - libexif - CVE-2012-2841 WIND00366812: Security Advisory - php - CVE-2012-2688 WIND00366813: Security Advisory - squashfs - CVE-2012-4025 WIND00366815: Security Advisory - bind - CVE-2012-3817 WIND00366816: Security Advisory - postgresql - CVE-2012-0866 WIND00367245: "Segmentation fault" occurs when "send fqdn.*" is written on dhclient.conf WIND00367541: MIPS: oops when show backtrace of all active cpu WIND00367944: wrlinux 4.3 : lots of unsatisfied dependencies between RPMs. WIND00367958: WR Linux 4.0 -- Oops in skb_over_panic when target boots under heavy networking traffic WIND00368376: the build provider spec for wrlinux-4.3 fails when later versions of wrlinux are installed WIND00369818: Update timezone for RCPL WIND00370217: Security Advisory - imagemagick - CVE-2012-3437 WIND00370219: Security Advisory - automake - CVE-2012-3386 WIND00370229: Security Advisory - qemu - CVE-2012-2652 WIND00370670: Kernel OOPs when removing/reinserting a PCI device WIND00370722: USB devices disconnect briefly and reconnect WIND00371595: When configuring a boot disk with a USB/ISO image mtab is not updated correctly after reboot WIND00371618: wrlinux 4.1 - unsatisfied dependencies at build time WIND00372197: WR BSP for XLP B1 (memory ordering instruction errata) WIND00372230: There is a errata about "Scheduler Q3 Priority of BR/ALU Ops Can Encounter a Livelock State" WIND00372232: There is a errata about "Shadow BARs Are Always Big Endian" WIND00372468: build error occured in rebuild freeradius package WIND00372470: IE_LIBTOOL_DIE is not deleted after clean freeradius package WIND00372478: [WRL4.3 Async][BSP: nlm_xlp_64_be ] Missed some XLP316 B0 and XLP832 B1 descriptions in README. WIND00372703: ripd advertises incorrect routes following SIGHUP WIND00372752: OpenSSL: NULL pointer dereference in EVP_DigestInit_ex() WIND00372754: OpenSSL: NULL pointer dereference in dh_pub_encode() WIND00373283: Building fetch-footprint is failed if there is 'patches' in your product path. WIND00373529: boost-debuginfo package is empty WIND00373995: Security Advisory - Net-snmp - CVE-2012-2141 WIND00373999: Security Advisory - apache - CVE-2012-3502 WIND00374000: Security Advisory - bash - CVE-2012-3410 WIND00374007: Security Advisory - libsoup - CVE-2012-2132 WIND00374012: Security Advisory - libtiff - CVE-2012-3401 WIND00374015: Security Advisory - python - CVE-2012-2135 WIND00374280: After execute "/usr/bin/wrsv-lttconfig -a" on PPC target, the marker "syscall_state:sys_call_table" is missing for wrlinux 4.3. WIND00374841: The network performance goes bad if modify CPU online mask WIND00375884: The intel_core_qm67_pch crashes during boot sometimes WIND00376025: When excuting mkfs.ubifs command on WR Linux 4.3, error occured. WIND00376378: Need to insert instruction about how to use INITRD as ROOTFS into README WIND00376773: Security Advisory - librsvg - CVE-2011-3146 WIND00376774: Security Advisory - bind - CVE-2012-4244 WIND00376775: Security Advisory - dhcp - CVE-2012-3955 WIND00376778: Security Advisory - libxslt - CVE-2012-2870 WIND00376779: Security Advisory - libxml2 - CVE-2012-2871 WIND00376783: Security Advisory - php - CVE-2011-1398 WIND00376956: valgrind does not build on wrl 4.3 for x86_32 multilibs WIND00376967: find-debuginfo script rights filter is too restrictive when looking for debug files WIND00377268: WRLinux 4.3 ti_sitara_am37xx cannot build user space package libatomic_ops WIND00377394: nfs mount error occured after changed system time WIND00377560: kexec: dump-capture kernel doesn't boot if nosmp is added into kernel command line. WIND00377667: oprofile-wrs-busybox.patch will cause unload oprofile.ko failed WIND00378677: PreemptRT enabled we are seeing a lockup in disk I/O subsystem WIND00378696: numactl has a syscall map problem. WIND00379367: ocfs2-tools fails to build if DIR environment variable is set WIND00379568: Using 'isolcpus=' in bootargs with wrlinux4.3 Preempt_rt kernel can cause cpu hang WIND00379924: Wrlinux 4.3 : valgrind does not build on Ubuntu 12.04 LTS WIND00379939: wrlinux 4.3 - Unable to create empty ubifs image WIND00380138: git fails to build after make reconfig WIND00380139: cmake fails to build after make reconfig WIND00380277: mq_timedreceive locks up WIND00380583: elfutils host tool build failure WIND00380710: qemu host tool build failure WIND00380746: iproute host contamination issue WIND00380830: busybox v1.18.4 - udhcpc doesn't work on ethernet aliases WIND00381090: WRL 4.3 Octeon ethernet module does not bring up XAUI ports WIND00381227: relative paths in git alternates doesn't work when nested WIND00381291: PCH_GBE driver crash WIND00381590: kernel will crash when download file in WR 4.3 RCPL6 via eth4(or eth5) on XLP832 WIND00382341: [Regression] NULL dereference in udp6_ufo_fragment() WIND00382402: wrlinux 4.3 - e2fsprogs up-rev WIND00382490: Cannot get address using DHCP on a VLAN interface WIND00382664: busybox fails to build when included with glibc_cgl filesystem WIND00382745: Security Advisory - python. - CVE-2012-1150 WIND00382746: Security Advisory - python. - CVE-2012-0845 WIND00382754: Security Advisory - bind. - CVE-2012-5166 WIND00382760: Security Advisory - linux - CVE-2012-3400 WIND00382763: Security Advisory - postgresql - CVE-2012-3488 WIND00382770: Security Advisory - postgresql - CVE-2012-3489 WIND00382771: Security Advisory - linux - CVE-2012-3552 WIND00383222: openssl: remove redunant harmful CVE-2009-3555 patch WIND00383251: sctp: Fix list corruption resulting from freeing an association on a list WIND00383263: debuginfo lacks source to static libraries WIND00383366: Heavy 10GbE Traffic using WRL 4.3 w/CGL results in a " NMI received for unknown reason" Error WIND00383521: wrlinux 4.3 - mysql dependency issue WIND00383543: Kernel layers can not be added using --with-layer WIND00383551: tftp-hpa has a problem with large file transfers WIND00383719: [ipsec] xfrm_user: return error pointer instead of NULL WIND00383722: [ipsec] xfrm_user: fix info leak in copy_to_user_xxx WIND00383801: drbd-tools depends list incomplete WIND00383835: wrlinux 4.3 - linux kernel crash when pressing a key during boot WIND00383923: intel_atom_eg20t_pch interrupt share cause crash under interrupt press WIND00383929: sctp: kernel panic when four 4bytes Unrecognized Parameters in ASCONF chunk WIND00384099: fsl_p1010_p1014 BSP, ethtool command cause kernel WIND00385144: Unmatched spinlock lock/unlock in bman handler of DPAA driver WIND00385377: using icc with packages based on poky in wrlinux 4.3 fails to switch compilers with overlay_icc WIND00385533: fix race condition on update_vsyscall/update_vsyscall_tz WIND00385846: gmp license incorrectly changed WIND00385878: bind aborts on Octeon targets WIND00386650: umount segfaults with inconsistent entry in /etc/fstab WIND00386658: code review: M29EW flash judgement is not correct WIND00387057: WR Linux 4.3 -- kernel oops possible when listing the /proc//ns directory of a zombie process WIND00387194: When adjust dirty_ratio to zero, will cause kernel exception of divdied by zero WIND00387514: wrlinux 4.3 - CUSTOM_UNPACK extract location WIND00387629: hyperexec NAE performance is very low when run on WR4.3 RCPL6 XLP832 WIND00387633: POE can't be reconfigured with hyperexec application WIND00388094: Revert "kgdb,mutex: add a kgdb integrity check" in 4.3 kernel WIND00388354: Patch requested for fsl_p3041 BSP WIND00388408: sctp: race condition exists between sctp_bind_addr_free() and sctp_bind_addr_conflict() WIND00388902: kernel oops on ip link add netns WIND00389241: wrlinux 4.3 - kernel panic on cgl kernel (fsl_p3041) WIND00389288: usbutils does not build with cav2 bsp glibc_small WIND00389436: Security Advisory - libproxy - CVE-2012-4504 WIND00389781: WRL 4.3 + xeon_core_dh89xx_pch BSP : qat_mem does not build with ldat_cache used WIND00389888: WRLinux 4.3 - Unable to boot second kernel using kexec for kdump WIND00389988: wrl 4.3 : libtirpc is too dependent upon krb5 WIND00390151: intel_xeon_c600_pch CGL kernel with 32G ram boot failed WIND00390688: wrlinux 4.3 - rpcbind problem WIND00390853: WRL 4.3 + xeon_core_dh89xx_pch BSP : dpdk does not build with ldat_cache used WIND00390941: Kdump fails to work on PPC board WIND00391080: pty: pty slave never wake up under heavy load. WIND00391081: ocf/talitos driver don't support freescale SEC 4.0 hardware WIND00391186: WR Linux 4.3 -- audio playback problems with Qt Phonon / qmusicplayer WIND00391292: Update SDK version in README to 2.3-427 WIND00391781: jffs_gcd_mtd hang and cause kernel panic WIND00391811: iptables rules not accepted WIND00392008: Security Advisory - qemu - CVE-2012-3515 WIND00392016: Security Advisory - cups - CVE-2012-5519 WIND00392018: Add more than 16GB memory support for xlp bsp WIND00392072: Security Advisory - libxml2 - CVE-2012-5134 WIND00392363: kernel panic caused by usb plug/unplug continuously WIND00392670: wrlinux4.3 compile error when disable p5020 option on p50x0 BSP WIND00393250: systemviewer/lttng doesn't report time correctly on tunnel creek HW WIND00393510: FMAN Micro code and FMD components from SDK 1.0 packaged with WRL 4.3 need to be aligned with FMC and FMLIB from SDK 1.1 WIND00393657: Using 'isolcpus=' in bootargs and use 'sched_setaffinity' in pthread, the pthread stops and the kernel prints out BUG_ON WIND00394001: fsl_p2041 network traffic causes soft lockup WIND00394186: mutex: Place lock in contended state after fastpath_lock failure WIND00394506: nfs server mountd bug WIND00394606: Security Advisory - apache - CVE-2012-4557 WIND00394752: WRLinux 4.3 compile error when disable p5020 on p50x0 BSP WIND00394999: libcurl version 7.19.3 has a known bug related to how timeouts are calculated WIND00395095: wrl 4.3 / ldat : configuring from wrl 4.3 Installation referenced by a soft- link may create unexpected behavior (fs_final.sh duplicated) WIND00395173: WR Linux 3.0.3 -- SCTP association can get stuck in SCTP_STATE_SHUTDOWN_PENDING state forever WIND00395179: WR Linux 3.0.3 -- SCTP can hang forever while attempting shutdown WIND00395278: WRL 4.3+RCPL11: nlm_xlp_be64 BSP: Undefined reference error "cpu_hotplug_fixup_poe" when CONFIG_KEXEC is configured WIND00395351: The bonding driver cannot detect the XAUI link down status if disable the ports WIND00395601: wrl 4.3 + RCPL 11 : boost does not export all .so files to sysroot -> application fails to build WIND00395990: sched: fix divide by zero at {thread_group,task}_times WIND00396458: BUG: soft lockup in i_size_read() WIND00396737: sending multicast datagram over VLAN causes fsl_p204x to crash WIND00397027: Security Advisory - perl - CVE-2011-2728 WIND00397317: Update timezone WIND00397533: flash write time out issue WIND00397586: WR Linux 3.0.3 -- SCTP does not properly check the source address of COOKIE-ECHO chunk WIND00398171: [ WRL4.3 Async][BSP:BSP:nlm_xlp_64_be ] bts compile error WIND00398243: WR Linux/HyperExec Linux NAE sharing issue WIND00398484: sctp: memory leak and wrong return value when invalid user space pointer passed to sendto() syscall WIND00398550: wrl 4.3 : common_pc_64 SMP : writing on DVD rom causes strange trace errors in kernel log WIND00398785: [ WRL4.3 Async][BSP:BSP:nlm_xlp_64_be ] kftp boot failed WIND00398966: The usdpaa README need to refactor WIND00399160: lksctp-tools: sctp_xconnect: memory leak when malloc big buffer WIND00399177: Security Advisory - grep - CVE-2012-5667 WIND00399178: Security Advisory - libtiff - CVE-2012-5581 WIND00399272: WRLinux 4.3 - apache can not transmit gz file normally WIND00399548: wrlinux 4.3 - kernel RPM naming convention WIND00399719: [ WRL4.3 Async][BSP:BSP:nlm_xlp_64_be ] kexec kdump build failed WIND00399814: SCTP Multi-homing issue in IPv6 WIND00400469: [ WRL4.3 Async][BSP:BSP:nlm_xlp_64_be ] Add "Debug preemptible kernel" description into README WIND00400479: ebtables OUTPUT table rule using interface in bridge with STP causes kernel oops and panic. WIND00400533: Need option to specify UDP port in rpcbind WIND00400744: rpc.statd using lockd port WIND00401429: rpcbind can not rebuild WIND00401630: [WRL4.3 Async][BSP: nlm_xlp_64_be ] The KFTP ptrace testing always prints some FPU emulate Call Trace informations. WIND00401723: build emgd driver with RCPL11 fails WIND00402037: Python error ": task_done() called too many times" WIND00402074: wrlinux4.3 does not generate the header files for setns syscall in /usr/include WIND00402351: Security Advisory - freetype - CVE-2012-5669 WIND00402376: Security Advisory - freetype - CVE-2012-5670 WIND00402377: Security Advisory - freetype - CVE-2012-5668 WIND00402667: mpatrol command line fails on wrlinux-3.0.3 with memdemo example application WIND00402761: wrl-4.3 p4080 kernel configuration ignored WIND00402764: Parallel access the NOR flash of P4080 may caue the very device can't work in order WIND00403117: inteldrm frame buffer is not available when WRLinux is booted without connecting a VGA cable WIND00403187: wrlinux 4.3 - kernel RPM contents. WIND00403257: /usr/include/linux/if_pppox.h:75:25: error: field 'pppol2tp' has incomplete type WIND00403430: Random failure of mount on mips WIND00404141: Security Advisory - openssl - CVE-2013-0166 WIND00404143: Security Advisory - qemu - CVE-2012-6075 WIND00404148: Security Advisory - postgresql - CVE-2013-0255 WIND00404151: Security Advisory - openssl - CVE-2013-0169 WIND00404310: ace: fail to compile under some host surrounding WIND00404340: jbd2: Fix I/O hang in jbd2_journal_release_jbd_inode' patch WIND00404425: [ WRL4.3 Async][BSP:BSP:nlm_xlp_64_be ] The README of this BSP needs to be updated WIND00404477: EDAC should be a supported feature on p2020 platforms WIND00404846: WR Linux 3.0.2 -- RIPD leaks file descriptors with each reconfig WIND00404971: wrl 4.3 / octeon drivers/net/octeon/ethernet-napi.c : high load ethernet traffic causes board to fail to bootup WIND00404978: EXT4-fs error on P2020RDB WIND00405008: kernel compile options conflicts with userspace's for wrs_sbc8548 bsp WIND00405171: posix-cpu-timers: Fix nanosleep task_struct leak WIND00405455: Build fail if template/fs/usr/lib/libmongoclient.a exists WIND00405822: xorg feature includes multiple packages with the same output binaries WIND00406152: wrlinux-4.3 wrong signature of kvm_iommu_map_pages stub WIND00406211: Security Advisory - apache - CVE-2012-3499 WIND00406226: Security Advisory - apache - CVE-2012-4558 WIND00406465: Linux 4.3 post install script assumes Mulitcore is always there. WIND00406726: System deadlocks from recursive kmod call WIND00406735: wrlinux-4.3 qemu-kvm: Could not ping guest successfully after changing e1000 MTU WIND00406771: RCPL 14 breaks builds using older RCPLs WIND00407019: sctp: association may hang due to several exceptional conditions WIND00407204: Hypervisor met panic when wrlinux configured greater then 4 GB memory address space WIND00407490: Kdump don't create vmcore on XLP832 board WIND00407508: wrlinux-4.3 qemu-kvm: When CLONE_THREAD is used, qemu crashes on an infinite cascade of stack WIND00407833: wrlinux-4.3 busybox: segfault in lineedit VI mode WIND00407855: wrlinux-4.3 busybox: segfault in printenv if environ == NULL WIND00408752: windriver4.3+RCPL12 nfs share folder set makethe kernel block after setting the date WIND00408770: Security Advisory - php - CVE-2013-1635 WIND00408878: wrlinux-4.3 : libvirt: encounter segfault if PATH is unset WIND00408896: wrlinux-4.3 libvirt: potential segfault when preparing dnsmasq arguments WIND00408940: drbd full sync after reboot WIND00410096: mpc8572_gpio_get function can not get right value on p2020 board WIND00410565: wrlinux 4.3 - force ldat_cache operations ato accomodate automated builds. WIND00410978: Add support for Ubuntu 12 in WRL 4.3 WIND00411209: Security Advisory - nss - CVE-2012-0441 WIND00411406: Errata A-006184 from FSL requires implementation of a workaround in WRL for E500mc and e5500 core based BSPs WIND00411479: intel_atom_eg20t_pch use unstable TSC as clocksource or low precision pit as timer WIND00411699: backport perf kvm tool from Wind River Linux 5 to 4.3 WIND00411986: wrlinux4.3 - apache proxy server close TCP session during transmission WIND00412056: possible deadlock in panic() WIND00412893: WRLinux 4.3 ntp - uses a non-recommended min poll interval WIND00413349: A vulnerability of CVE-2013-2266 WIND00413548: Security Advisory - postgresql - CVE-2013-1900 WIND00413550: Security Advisory - perl - CVE-2013-1667 WIND00413563: Security Advisory - linux - CVE-2013-1858 WIND00413569: Security Advisory - ruby - CVE-2013-1821 WIND00413582: Security Advisory - strongswan - CVE-2012-2388 WIND00414266: make fs for i.mx6 fails when host's network connection is not available WIND00414456: a issue occured when mounting flash fs WIND00414488: git-reset --hard HEAD^ instead of git reset --hard HEAD^ WIND00414576: the float issue on p2041 WIND00415172: XLP316, load nae driver as kernel module, network don't work WIND00415292: wrlinux 4.3 - ecryptfs bug WIND00415543: TASK_SIZE_USER32 reduced to less than 4G by Wind River patch in WRL 4.3 WIND00415554: In WRL-4.3 bringing the interface down and then back up causes PING to the interface's Global IP address to fail. WIND00415556: wrlinux 4.3 - mount request denied by nfs server WIND00415945: Security Advisory - phpmyadmin - CVE-2013-3238 WIND00415950: Security Advisory - linux - CVE-2013-3301 WIND00415960: Security Advisory - curl - CVE-2013-1944 WIND00415969: Security Advisory - libxml2 - CVE-2013-1969 WIND00415973: Security Advisory - libxslt - CVE-2012-6139 WIND00416621: WRlinux4.3, can't insmod the SPI driver module WIND00416794: WR Linux 4.3 + p1022 ds BSP: Unable to read partition table on SD card at boot. WIND00416898: when enable msi for PCI device, driver will hung on complete signal WIND00416900: cannot create jffs2 filesystem on xlp832's nand flash WIND00416922: building canutils fails when host's network connection is not available WIND00416944: e1000 net card adapter driver issue WIND00417023: backport emulated PMU functionality from Wind River Linux 5 to 4.3 WIND00417253: tftp can send ack even if the space is full. WIND00417273: Rebuild kernel will meet error when enable mpt2sas driver in kernel configure WIND00417288: After USB disk failure injected, the USB disk can't be detected WIND00417547: Security Advisory - strongswan - CVE-2013-2944 WIND00417810: Compiler generating incorrect code for access to bitfields in MIPS64 WIND00418133: WRlinux4.3, USB plug in/off cause system crash WIND00418817: wrlinux 4.3 ldat kernel Makefile : strange parallel access bugs WIND00419010: wrlinux 4.3 - ecryptfs crash when overwriting data in a file (ecryptfs_write) WIND00419017: wrlinux 4.3 - ecryptfs data visible even with wrong passphrase WIND00419166: update the BSP supported list of cav-octeon2 BSP README of WRL 4.3 WIND00419405: wrlinux 4.3 - bash segfault WIND00419493: a wrong use of the return value of a funtion WIND00419732: Call usleep, the thread may be blocked for long time WIND00419898: Security Advisory - krb5 - CVE-2002-2443 WIND00420779: [WR43] build error : package ace build failed on arm BSP WIND00420932: ACPI S3 resume issue on Intel Atom Tunnel Creek board(s) - Eurotech TC Carrier and Emerson NITX-315 WIND00420935: problem with Compress::Zlib perl module WIND00420975: Kernel Oops occurs, and deletion of calling local_irq_enable() in traps.c by Wind River may cause this issue WIND00421103: PCIe device not resumed correctly after target is waked up by magic packet. WIND00421627: (Extened SDP Controlixgbe driver doesn't turn off the laser of 82599-based SFP+ fiber adapters WIND00421684: pyetree depricated package is currently listed as required (via pklist.add) for selinux WIND00421728: Under certain traffic flow, DPAA dTSEC drops packets because RxFIFO resources not available and increments RPRD register count. WIND00421920: Security Advisory - apache - CVE-2013-1862 WIND00421922: Security Advisory - php - CVE-2013-3735 WIND00422176: FMAN uCode delivered in PNE4.3. is 91.1 version which does not match the README version which is 101.8 WIND00422252: When rebuild of IMSM volume is started in OROM, rebuild does not proceed when in the Linux OS WIND00422262: [WRL4.3][fsl_p1022_p1013]enable USB port #2 WIND00422679: vim crashes when receiving -HUP signal (segfault) WIND00422984: On P4080 bsp, windriver linux 4.3 rcpl 9: Running a sample client/server TCP application on loopback results in, corrupted data in reception path. WIND00423895: WRL 4.3: NFS client hang. WIND00424404: wrlinux 4.3 - glibc dependency for qat_mem WIND00424708: Security Advisory - php - CVE-2013-4635 WIND00424980: WR Linux 4.3 RCPL 11 -- build fails in syslinux for cav_octeon2 WIND00425370: Merge IDP 1.0 kernel into WRLinux 4.3 RCPL WIND00425752: There is an issue about sched policy WIND00425882: sctp: Fix potential data corruption in sctp_send() WIND00425962: Backport MADV_DONTDUMP from WRL 5 to WRL 4.3 WIND00426458: Random SD Corruption and kernel crashes after large file copies WIND00426596: Security Advisory - libtiff - CVE-2013-1961 WIND00426603: Security Advisory - gnutls - CVE-2013-2116 WIND00426605: Security Advisory - linux - CVE-2013-1059 WIND00426610: Security Advisory - libxml2 - CVE-2013-2877 WIND00426614: Security Advisory - libtiff - CVE-2013-1960 WIND00426891: imx_adc_ts increases WIND00426906: stty can not work on p1010 and p2041 WIND00426935: The fix of defect WIND00426918 is incomplete WIND00427129: kernel panic in icmp_send WIND00427173: Kernel panic after WARN_ON(p == src_rq->curr) WIND00427532: Integrate perf_event sample_id_all feature into WRL 4.3 WIND00428535: In WRL-3.0.2, syslog-ng memory leak when server is down. WIND00428732: WRlinux4.3+CN61XX,can't set affinity of OCTEON_IRQ_TIMER3 WIND00428775: norflash issue WIND00428856: JFFS2 dead lock issue WIND00428869: Security Advisory - php - CVE-2013-4113 WIND00428885: Security Advisory - linux - CVE-2013-4162 WIND00429486: TCP/IP SYN+FIN Packet Filtering Weakness WIND00429504: building kernel fails when create am35xx project with template feature/analysis WIND00429598: building apache-ssl fail in glibc_small project WIND00429664: WRL 4.3 : ixgbe driver : after corrupted packet sent to the interface the device doesn't receive any packets any more WIND00430127: e1000e driver cannot link up with Gibabit speed on Ivy Bridge board WIND00430188: wrl 4.3 : vsftpd : delete_failed_uploads config option doesn't work WIND00430293: DPAA skb buffer overflow WIND00430396: wrl 4.3 : vsftpd : ses reverse DNS lookups unconditionally which causes unnecessary 10 second delays during connection setup because there is no reverse DNS available WIND00430725: core file truncation due to poor signal handling - bugzilla 759213 WIND00431108: Potential buffer overflow problem in bash 3.2.39 WIND00431436: mtd issue WIND00431884: FSL DPAA issue in SDK 1.0 version of fm_cc.c WIND00432072: wrlinux 4.3 - dd does not return and gives kernel trace WIND00432087: Kernel Oops might be occurs when it resume from deep sleep state duaring heavy network. WIND00432134: wrlinux 4.3 - update timezone files WIND00432705: customer spi flash can not be read/write on xlp832 WIND00433014: In WRL-4.3, problem adding the route with nl_route_add when using libnl-3.1. WIND00433019: Security Advisory - strongswan - CVE-2013-5018 WIND00433359: wrlinux 4.3 - RCPL18 + changes ipv6 behaviour WIND00434646: wrlinux 4.3 - pxelinux.0 limitattions WIND00434671: wrl 4.3 : igb driver fails with itl_romley board WIND00434770: Security Advisory - libtiff - CVE-2013-4232 WIND00434772: Security Advisory - libtiff - CVE-2013-4243 WIND00435092: WR Linux 4.3 Guest VB searches for interrupt, always associated with IDE PCI storage device, incorrectly. WIND00435129: RPM rollback fails with dependency failure WIND00435233: NSN : wrl 4.3 : ipsec-tools racoon crashes with Codenomicon testsuites WIND00435354: Multicore layer build fails on WRL4.3 for p4080 Latest RCPL WIND00435497: known race condition believed to be happening at a customer side and fixed in upstream squashfs-tools (v4.2) WIND00436586: SCTP over IPSec is not working when SCTP checksum is offloaded to hardware WIND00438355: Panic in Linux Image for ARM built with WRLinux 4.3 RCPL 20 while loading as guest WIND00438511: wr Linux 4.3 will not detect sata controller on intel q77 chipset WIND00438775: On p2020 board, sometimes, kernel will hang when do `ifconfig down` in init script WIND00439163: Security Advisory - libtiff - CVE-2013-4244 WIND00439164: Security Advisory - linux - CVE-2013-2892 WIND00439167: Security Advisory - xorg_x11. - CVE-2013-4396 WIND00439172: Security Advisory - linux - CVE-2013-2889 WIND00439176: Security Advisory - linux - CVE-2013-4387 WIND00439180: Security Advisory - linux - CVE-2013-2893 WIND00439182: Security Advisory - linux - CVE-2013-2888 WIND00439197: Security Advisory - gnupg - CVE-2013-4351 WIND00439200: Security Advisory - php - CVE-2013-1824 WIND00439205: Security Advisory - librsvg - CVE-2013-1881 WIND00439207: Security Advisory - linux - CVE-2013-4345 WIND00439216: Security Advisory - xinetd - CVE-2013-4342 WIND00439902: lm_sensors host contaimination WIND00439984: WRHV 2.0.1: Rescanning PCI on Lx-GOS doesn't set BARs correctly. WIND00440259: another FC17 issue - python package doesn't build. WIND00440309: wrlinux 4.3 - update timezone to 2013g WIND00440438: WR Linux 4.3 fails to boot on TI AM3505 Target WIND00441202: Ixgbevf : impossible to use MTU larger than 1550 WIND00441359: wrl 4.3 : unregister_netdevice: waiting for eth0 to become free. Usage count = 1 WIND00441801: wrl 4.2 : rcpl21 : syslog-ng doesn't build on 64 bit host WIND00441874: Security Advisory - dropbear - CVE-2013-4434 WIND00441881: Security Advisory - dropbear - CVE-2013-4421 WIND00441889: Security Advisory - X.org - CVE-2013-1056 WIND00442232: Security Advisory - strongswan - CVE-2013-6075 WIND00442343: net-snmp will be blocked for a long time when system time is changed WIND00443301: unix_dgram_poll() optimization WIND00443963: building syslog-ng on sbc8548 fails - host contamination w/ x86 version of libgmodule WIND00444028: Security Advisory - linux - CVE-2013-4470 WIND00444434: xslt-config returns local dir instead of sysroot dir WIND00444561: wrl 4.3 : SCTP : RTO is always set to RTO initial after many DATA packets have recv SACK WIND00445610: TPM not working on WRL4.3 WIND00445846: Security Advisory - krb5 - CVE-2013-1418 WIND00445874: Security Advisory - nss - CVE-2013-5605 WIND00445876: Security Advisory - nss - CVE-2013-1741 WIND00445879: Security Advisory - ruby - CVE-2013-4164 WIND00446238: when kernel module use string parameter, inserting and removing it will cause memory leak WIND00446347: wr; 4.3 : ipsec : If there are more than one IPSec IKEv2 rule configured, deletion of one rule doesn%E2%80%99t delete the rule in kernel. WIND00447049: kernel will panic when set /proc/sys/net/core/dev_weight to 0, if ethernet driver does not support NAPI No Patch History Defect List: LIN4-20862: WRlinux4.3 P3041 toolchain, compile with -O2, the program running is not right LIN4-21054: Security Advisory - mysql - CVE-2013-2389 LIN4-21083: Security Advisory - mysql - CVE-2013-0384 LIN4-21117: Security Advisory - mysql - CVE-2013-1532 LIN4-21121: Security Advisory - mysql - CVE-2013-1506 LIN4-21137: Security Advisory - glibc - CVE-2013-4788 LIN4-21188: Security Advisory - mysql - CVE-2013-2391 LIN4-21204: Security Advisory - mysql - CVE-2013-0385 LIN4-21226: Security Advisory - mysql - CVE-2012-0572 LIN4-21256: Security Advisory - mysql - CVE-2012-5060 LIN4-21310: Security Advisory - mysql - CVE-2013-2375 LIN4-21316: Security Advisory - mysql - CVE-2013-0375 LIN4-21388: Security Advisory - mysql - CVE-2013-0389 LIN4-21398: Security Advisory - mysql - CVE-2013-2392 LIN4-21432: Security Advisory - mysql - CVE-2013-1531 LIN4-21490: Security Advisory - mysql - CVE-2013-2378 LIN4-21531: Security Advisory - mysql - CVE-2013-3808 LIN4-21683: Security Advisory - mysql - CVE-2013-1544 LIN4-21783: Security Advisory - mysql - CVE-2012-4414 LIN4-21895: Security Advisory - glibc - CVE-2012-4424 LIN4-23014: Security Advisory - glibc - CVE-2013-4458 LIN4-23062: Security Advisory - mysql - CVE-2013-3804 LIN4-23140: Security Advisory - mysql - CVE-2013-1521 LIN4-23417: Security Advisory - glibc - CVE-2012-4412 LIN4-23481: Security Advisory - mysql - CVE-2013-1552 LIN4-23581: Security Advisory - glibc - CVE-2013-4332 LIN4-23687: Security Advisory - mysql - CVE-2012-0882 LIN4-23729: Security Advisory - mysql - CVE-2013-0383 LIN4-23849: Security Advisory - mysql - CVE-2013-3802 LIN4-25003: Security Advisory - mysql - CVE-2013-1555 LIN4-25246: Security Advisory - mysql - CVE-2012-1702 LIN4-25400: Security Advisory - mysql - CVE-2013-3839 LIN4-25572: Security Advisory - mysql - CVE-2012-1705 LIN4-25661: Security Advisory - mysql - CVE-2013-1492 LIN4-25807: Security Advisory - mysql - CVE-2013-1548 LIN4-25818: Security Advisory - glibc - CVE-2013-4237 LIN4-25928: Security Advisory - mysql - CVE-2012-0574 LIN4-27263: Security Advisory - mysql - CVE-2012-0583 LIN4-27265: Security Advisory - mysql - CVE-2012-3180 LIN4-27279: Security Advisory - mysql - CVE-2012-1689 LIN4-27338: Security Advisory - mysql - CVE-2012-0540 LIN4-27462: Security Advisory - mysql - CVE-2012-3197 LIN4-27492: Security Advisory - mysql - CVE-2012-1734 LIN4-27512: Security Advisory - mysql - CVE-2012-2749 LIN4-27607: Security Advisory - mysql - CVE-2012-2122 LIN4-27650: Security Advisory - mysql - CVE-2012-3150 LIN4-27773: Security Advisory - mysql - CVE-2012-2102 LIN4-27814: Security Advisory - mysql - CVE-2012-3158 LIN4-27841: Security Advisory - mysql - CVE-2012-3160 LIN4-27875: Security Advisory - mysql - CVE-2012-3173 LIN4-27926: Security Advisory - mysql - CVE-2012-3163 LIN4-27983: Security Advisory - mysql - CVE-2012-1690 LIN4-28022: Security Advisory - mysql - CVE-2012-3166 LIN4-28042: Security Advisory - mysql - CVE-2012-3177 LIN4-28047: Security Advisory - mysql - CVE-2012-3167 LIN4-30971: WRlinux4.3, objdump can't recognize some instructions LIN4-30988: Rebiuld glibc, modification to the glibc source can't be compiled into the glibc rpm package LIN4-31005: In WRL-4.0, syslogd hangs when it receives the "HUP" signal. LIN4-31016: Security Advisory - mysql - CVE-2014-0401 LIN4-31021: Security Advisory - mysql - CVE-2014-0437 LIN4-31034: Security Advisory - mysql - CVE-2014-0393 LIN4-31039: Security Advisory - glibc - CVE-2012-3405 LIN4-31041: Security Advisory - mysql - CVE-2014-0412 LIN4-31048: Security Advisory - glibc - CVE-2012-3406 LIN4-31052: Security Advisory - libcap - CVE-2011-4099 LIN4-31074: Security Advisory - mysql - CVE-2014-0402 LIN4-31078: Security Advisory - mysql - CVE-2014-0386 LIN4-31083: Security Advisory - mysql - CVE-2013-5908 LIN4-31107: wrl 4.3 : Charon-ABRT core were generated during Codenomicon security scan testing for IKEv2 LIN4-31229: WRL 4.3 : lib2 g_static_private_free() error LIN4-31232: wrlinux 4.3 - strip breaks ELF binaries LIN4-31255: wrl4.3 : toolchain : PPC : compilation results differently with ccache / without ccache LIN4-31353: 'strtof' return error value when set round mode to FE_TOWARDZERO, FE_UPWARD or FE_DOWNWARD LIN4-31400: WRL 4.3 project requires access to obsolete RCPL 0014 and RCPL0012 LIN4-31441: The RCPL gui tool is not working as expected. LIN4-31465: Compiler optimization problem LIN4-31560: IA64 : glibc invalid free detected with valgrind LIN4-31620: Security Advisory - glibc - CVE-2014-0475 LIN4-31651: OpenSSL CVEs for wrlinux4.3 LIN4-31716: Security Advisory - glibc - CVE-2014-5119 LIN4-31760: wrlinux4.3 build glibc from source, make -C build glibc.distclean failed and can't build glibc again LIN4-31766: gcc : RCPl 26 : wrl 4.3 : memory leak when loading shared objects LIN4-31767: wrl 4.3 : toolchain : mips-strip deletes more than expected LIN4-31798: CVE-2011-3637 is introduced in RCPL-25. LIN4-31830: README in RCPL25 doesn't have "Patch History Defect List". LIN4-31831: rcpl-cl.sh can't print all patches in RCPL LIN4-31906: Xorg crashes due to garbage pointer at do_get_buffers() at dri2 LIN4-31907: BUG: unable to handle kernel paging request at fffffffd LIN4-31911: wrl 4.3 : toolchain : ld: not enough GOT space for local GOT entries LIN4-31935: grep causes kernel oops LIN4-32054: Security Advisory - qemu - CVE-2014-0222 LIN4-32063: charon : if SA entries are flushed from responder side, further initiation of tunnel from responder is not feasible. LIN4-32065: Security Advisory - binutils - CVE-2014-8503 LIN4-32070: Security Advisory - glibc - CVE-2012-6656 LIN4-32074: Security Advisory - glibc - CVE-2014-6040 LIN4-32081: Security Advisory - binutils - CVE-2014-8484 LIN4-32088: Security Advisory - binutils - CVE-2014-8504 LIN4-32092: Security Advisory - binutils - CVE-2014-8737 LIN4-32093: Security Advisory - binutils - CVE-2014-8485 LIN4-32101: Security Advisory - libxml2 - CVE-2014-0191 LIN4-32149: IPSec: XfrmInNoStates counter is incremented for DPD packets LIN4-32166: getaddrinfo()/make_request() may spin forever LIN4-32198: Security Advisory - ntp - CVE-2014-9295 LIN4-32221: Security Advisory - glibc - CVE-2015-0235 LIN4-32224: spe instructions use unsaved volatile register directly after calling functions LIN4-32236: Security Advisory - binutils - CVE-2014-8738 LIN4-32292: Security Advisory - glibc - CVE-2014-9402 LIN4-32315: Security Advisory - glibc - CVE-2013-7423 LIN4-32330: sem_timedwait function behaves differently in MIPS and X86 targets. LIN4-32336: LIN4-31760 is not fixed in WRlinux4.3 RCPL 28 LIN4-32339: Memory leak observed from "getaddrinfo" in the glibc LIN4-32375: Is WRL-4.3 affected by these OpenSSL CVEs (CVE-2015-0286 CVE-2015-0287 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-0288). LIN4-32376: WRL4.x openssl JVNVU#95877131 vulnerabilities LIN4-32417: Security Advisory - glibc - CVE-2014-8121 LIN4-32447: charon : strongswan 552 patch layer in 4.3 is having bugs LIN4-32529: Security Advisory - glibc - CVE-2015-1781 LIN4-32609: Security Advisory - qt - CVE-2015-1858 LIN4-32752: Security Advisory - glibc - CVE-2013-7424 LIN4-32764: Security Advisory - php - CVE-2015-3307 LIN4-32770: Security Advisory - php - CVE-2015-4026 LIN4-32792: RCPL tools does not show information about LIN4-31909 LIN4-32793: RCPL tools does not show information about LIN4-31999 LIN4-32794: RCPL tools does not show information about LIN4-32061 LIN4-32795: RCPL tools does not show information about LIN4-32062 LIN4-32798: wrl 43 : Linux ps command core randomly LIN4-32874: bugzilla 13844: libc-lowlevellock.c missing LIN4-32910: memcmp alway return 0 when the 3rd parameter is '-1' in 32 bit glibc LIN4-32912: Security Advisory - strongswan - CVE-2015-3991 LIN4-32913: wrl 4.3 : gdb assertion Assertion `ti_p->ti_tid != 0' failed on PPC LIN4-32944: CPU watchdog timer expired, when some ftp client is downloading(Case#00030666) LIN4-33015: wrlinux 4.3 - regression, file command malfunctions LIN4-33035: Security Advisory - ntp - CVE-2014-9751 LIN4-33040: Security Advisory - ntp - CVE-2014-9750 LIN4-33083: ld segment fault issue in octeon2 project LIN4-33094: Security Advisory - ntp - CVE-2015-7702 LIN4-33269: run rcpl-gui.sh failed LIN4-7958: if using mtrace in program, program will hung when memory double freeing occu LIN4-8041: MIPS compilation is generating illegal assembler. LIN4-8263: Run-time linker fails (x86_64) when many shared libs (symbols) are loaded WIND00265836: WR Linux 4.0: Supported package list is needed WIND00269482: Security Advisory - glibc - CVE-2011-1089 WIND00269483: Security Advisory - glibc - CVE-2011-1095 WIND00269484: Security Advisory - glibc - CVE-2011-1658 WIND00269486: Security Advisory - glibc - CVE-2011-1071 WIND00269487: Security Advisory - glibc - CVE-2011-1659 WIND00269489: Security Advisory - glibc - CVE-2011-0536 WIND00281608: Security Advisory - OpenSSL - CVE-2011-1945 WIND00296900: Incorrect path specified in docs for installation of Workbench Qt plug-in WIND00316742: glibc strcmp E500v2 assembler function returns 0 (equal) when the strings are not really equal WIND00317240: [WRlinux4.3][BSP: nlm_xls_atx_64_be] The LTP nftw64 test case always failed on the mips64 serial BSPs if using the mips 64bits FS as the rootfs. WIND00317780: McAfee (all PDF-linked docs) docs do not display or download when the TOC link is selected in Workbench on Ubuntu hosts WIND00329293: [RCPL0001] 'make fs' fails on common_pc-standard-glibc_small on WRLinux 4.3 RCPL 0001. WIND00331774: [RCPL0001] Can not find the patch about Fix WIND00315281 on WR43RCPL1 WIND00331776: [RCPL0001] 'feature' directory is missing in $PRODPATH/wrlinux-4/layers/updates/RCPL-4.3-WRL.0001/wrll-userspace/graphics/templates. WIND00331780: [RCPL0001] Missing directories in $PRODPATH/wrlinux-4/layers/updates/RCPL-4.3-WRL.0001/ldat-tools. WIND00332135: [RCPL0001] Patches of 'php' package are missing in RCPL0001. WIND00332178: [RCPL0001] Generating patch_history for templates twice WIND00334777: kernel panic in e1000 driver (BSP: Intel Truxton) WIND00335633: [RCPL0001] 'dist' directory is missing in ./wrlinux-4/layers/updates/RCPL-4.3-WRL.0001/bsps/wrll-fsl_p204x for FIX WIND00333751. WIND00344477: omap44xx qt-embedded qt examples don't run WIND00346128: EMGD build issue - error: 'AGP_NORMAL_MEMORY' WIND00346862: toolchain hang when build valgrid package in wind river linux 4.3 p4080 project WIND00353046: Security Advisory - linux - CVE-2012-2123 WIND00353051: Security Advisory - linux - CVE-2012-2319 WIND00353053: Security Advisory - linux - CVE-2012-1090 WIND00353059: Security Advisory - linux - CVE-2012-1097 WIND00353061: Security Advisory - linux - CVE-2012-1601 WIND00353077: Security Advisory - linux - CVE-2012-0044 WIND00353079: Security Advisory - linux - CVE-2011-3191 WIND00354074: unap media-less install pulling the wrong content WIND00354164: objdump doesn't generate symbol names in disassembled code for MIPS-64 binaries. WIND00359317: Security Advisory - linux - CVE-2011-1493 WIND00360193: RCPL 5 on ala-lpd-susbld manufactured incorrectly WIND00362918: Security Advisory - linux - CVE-2012-2100 WIND00363816: hardware watch point meet issue when debuging with gdb on target WIND00366563: wrl 4.2 / 4.3 : GNU compiler can hang longly (see http://gcc.gnu.org/bugzilla/show_bug.cgi?id=43036) WIND00368966: shutdown fails for wrlinux 4.2 for intel tunnel creek WIND00369823: [WRL] ust package build error with BUILD_TYPE=debug. WIND00370227: Security Advisory - ruby - CVE-2012-3464 WIND00371906: Customer needs to have the 1.14 EMGD driver ported back to the 4.X WRL release WIND00372154: sem_post on MIPS does not ensure that memory is consistent before releasing semaphore WIND00372940: One Workbench default RSS feed URL does not exist WIND00374005: Security Advisory - glibc - CVE-2012-3480 WIND00374181: WR BSP for XLP B1 (memory ordering instruction errata) ToolChain part WIND00376786: Security Advisory - gnu - CVE-2012-3509 WIND00380334: Host Tool Binaries are missing for 4.3 RCPL 8 and 3.0.3 RCPL 10 WIND00382703: Prebuilt host tools should be separated into each layers in RCPL WIND00383309: WRL 4.3 segfault with AVX extension WIND00385869: build warnings in emgd 1.14 backport WIND00389733: nfs_utils build without tirpc exposes glibc bug on MIPS64 WIND00392986: WRlinux 4.3, Cavium CN56xx, GDB can't debug using call function with parameter WIND00400565: Cannot create platform project on WRL 3.0.3 / RCPL 14 on older dev hosts using glibc 2.3 WIND00403456: Occasional abort in glibc while creating or deleting network interfaces WIND00403798: gcc bug : "Bug 42229 - [4.5 Regression] cancel_loop_tree: bad read causes ice " WIND00404152: Security Advisory - glibc - CVE-2013-0242 WIND00408760: Security Advisory - gdb - CVE-2011-4355 WIND00413166: wrl 4.3 : gnu compuiler is not serializing properly when compiling with -O WIND00413546: Security Advisory - postgresql - CVE-2013-1899 WIND00413565: Security Advisory - postgresql - CVE-2013-1901 WIND00415910: Security Advisory - glibc - CVE-2013-1914 WIND00417548: Security Advisory - glibc - CVE-2012-0864 WIND00417549: Security Advisory - glibc - CVE-2011-4609 WIND00417557: Security Advisory - glibc - CVE-2009-5029 WIND00418000: error occured when producing a dynamic lib in ppc64 WIND00418617: clock_gettime(2) can not make with CLOCK_MONOTONIC_RAW WIND00421655: a testcase named crah01 of ltp-full run failed frequently. WIND00427422: GDB cannot print global pointer viriable correctly on xlr732 WIND00430055: GDB cannot access struct member whose offset is larger than 256MB WIND00431318: wrlinux 4.3 - gcc 4.4 no return statement WIND00431740: An issue of jffs2 on p2041hfp WIND00431882: Java exception with WRL 3.0.3 rcpl-gui.sh script WIND00436439: glibc spec file issue WIND00438694: WIND00437970 have fixed global pointer variables print problem, but cannot print local viriables WIND00442679: symlinks not preserved in intel-emgd WIND00443226: WRL4.3 installer image does not work with preempt_rt option