1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux LTS 19 release. This RCPL provides fixes for known problems. For information on updating your projects, see the Product Updates section of the Wind River Linux Getting Started guide. https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/tfk1473951651031.html The update procedure involves updating your projectDir/wrlinux-x repository, and then re-running the setup.sh program with the original arguments. The procedure for upgrading your project is shown in the Updating Wind River Linux section of that guide: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html 2.0 RCPL Update Implementation The distribution is a set of git repositories that are used to generate project directories at setup time. An RCPL appends new fixes to these repositories. As a result, the git repositories can grow with each new RCPL. The product name branches include two specific branch names. The first is a continuous integration branch. The continuous integration branch tracks the latest RCPL version release by Wind River, and does not include an RCPL number. For example: * WRLINUX_10_19_BASE * WRLINUX_10_19_LTS These branches will always match the latest released RCPL. The second branch name is RCPL-specific, with a reference to a specific RCPL, such as: * WRLINUX_10_19_BASE_UPDATE0001 * WRLINUX_10_19_LTS_RCPL0002 To identify which branch you are on, run the following commands: $ cd projectDir/wrlinux-x $ git branch 3.0 Selecting a specific RCPL Follow the procedure as indicated in the Updating Wind River Linux section of the Wind River Linux Getting Started guide located at: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html In step 3, of the procedure you will use the branchName of the RCPL that you wish to use. For example: $ git checkout WRLINUX_10_19_LTS_RCPL0002 4.0 Change Log The following is a summary of the changes made in each RCPL version. The initial product distribution occurred with RCPL0001. Defect List: ======================= 10.19.45.9 =============================== LIN1019-4849: Security Advisory - libpcre - CVE-2020-14155 LIN1019-4844: Security Advisory - qemu - CVE-2020-1983 LIN1019-4807: Security Advisory - qemu - CVE-2020-13800 LIN1019-4805: Security Advisory - sqlite3 - CVE-2020-13871 LIN1019-4816: Security Advisory - dbus - CVE-2020-12049 LIN1019-4815: Security Advisory - qemu - CVE-2020-10702 LIN1019-4814: Security Advisory - ffmpeg - CVE-2020-13904 LIN1019-4809: Security Advisory - qemu - CVE-2020-13765 LIN1019-4841: Security Advisory - linux - CVE-2020-10732 LIN1019-4839: Security Advisory - qemu - CVE-2020-10761 LIN1019-4832: Security Advisory - linux - CVE-2020-10757 LIN1019-4770: Security Advisory - libvirt - CVE-2020-10703 LIN1019-4767: Security Advisory - qemu - CVE-2020-13659 LIN1019-4765: Security Advisory - linux - CVE-2019-20810 LIN1019-4788: Security Advisory - python3-django - CVE-2020-13596 LIN1019-4787: Security Advisory - python3-django - CVE-2020-9402 LIN1019-4786: Security Advisory - python3-django - CVE-2020-7471 LIN1019-4785: Security Advisory - python3-django - CVE-2019-19844 LIN1019-4784: Security Advisory - python3-django - CVE-2019-19118 LIN1019-4777: Security Advisory - openssh - CVE-2020-12062 LIN1019-4776: Security Advisory - python3-django - CVE-2020-13254 LIN1019-4731: Security Advisory - linux - CVE-2020-10751 LIN1019-4726: Security Advisory - sqlite3 - CVE-2020-13630 LIN1019-4725: Security Advisory - sqlite3 - CVE-2020-13631 LIN1019-4724: Security Advisory - sqlite3 - CVE-2020-13632 LIN1019-4679: Security Advisory - linux - CVE-2020-10711 LIN1019-3700: Security Advisory - linux - CVE-2019-19462 LIN1019-4418: Security Advisory - ffmpeg - CVE-2020-12284 LIN1019-3379: Security Advisory - linux - CVE-2019-18814 LIN1019-4658: Security Advisory - bind - CVE-2020-8617 LIN1019-4657: Security Advisory - bind - CVE-2020-8616 LIN1019-4624: Security Advisory - linux - CVE-2020-12888 LIN1019-4497: Security Advisory - linux - CVE-2020-12659 LIN1019-4498: Security Advisory - linux - CVE-2020-12657 LIN1019-4237: Security Advisory - gnutls - CVE-2020-11501 LIN1019-4245: Security Advisory - linux - CVE-2020-11565 LIN1019-4768: Security Advisory - systemd - CVE-2020-13776 LIN1019-4774: Security Advisory - gnutls - CVE-2020-13777 LIN1019-4817: Security Advisory - kubernetes - CVE-2020-8555 LIN1019-4220: Security Advisory - kubernetes - CVE-2019-11254 LIN1019-4900: Security Advisory - nginx - CVE-2019-9511 LIN1019-4904: Security Advisory - nginx - CVE-2019-9513 LIN1019-4766: Security Advisory - qemu - CVE-2020-13754 LIN1019-4829: Security Advisory - intel SRBDS - CVE-2020-0543 LIN1019-4773: Security Advisory - libjpeg-turbo - CVE-2020-13790 LIN1019-4853: Security Advisory - nfs-utils - CVE-2019-3689 LIN1019-4848: Request to backport upstream patch to fix lack of entropy LIN1019-4834: "wrl-small" rootfs has 435MB directory with firmware LIN1019-4827: Wrong permissions on module.tgz file. LIN1019-4742: [WARNING] do_kernel_configcheck warnings in builds of nxp-ls1028 LIN1019-4840: toolchain-shar-extract: ignore timestamp on decompress LIN1019-4615: Error doing "make scripts" in SDK LIN1019-4899: Many BSPs failed to build: libmodulemd_git failed (do_fetch) ======================= 10.19.45.8 =============================== LIN1019-4881: Security Advisory - linux - CVE-2020-14416 LIN1019-4695: Security Advisory - sqlite3 - CVE-2020-13434 LIN1019-4694: Security Advisory - sqlite3 - CVE-2020-13435 LIN1019-4728: Security Advisory - qemu - CVE-2020-13361 LIN1019-4678: Security Advisory - libexif - CVE-2020-13112 LIN1019-4677: Security Advisory - libexif - CVE-2020-13113 LIN1019-4676: Security Advisory - libexif - CVE-2020-13114 LIN1019-3776: Security Advisory - linux - CVE-2019-19768 LIN1019-4218: Security Advisory - apache2 - CVE-2020-1927 LIN1019-4217: Security Advisory - apache2 - CVE-2020-1934 LIN1019-4419: Security Advisory - openldap - CVE-2020-12243 LIN1019-4417: Security Advisory - libvirt - CVE-2020-12430 LIN1019-3979: Security Advisory - python - CVE-2020-8492 LIN1019-4655: Security Advisory - php - CVE-2019-11048 LIN1019-4584: Security Advisory - icu - CVE-2020-10531 LIN1019-4625: Security Advisory - apt - CVE-2020-3810 LIN1019-4591: Security Advisory - linux - CVE-2020-12826 LIN1019-4503: Security Advisory - linux - CVE-2020-12652 LIN1019-4502: Security Advisory - linux - CVE-2020-12653 LIN1019-4501: Security Advisory - linux - CVE-2020-12654 LIN1019-4511: Security Advisory - samba - CVE-2020-10704 LIN1019-4342: Security Advisory - mariadb - CVE-2020-2752 LIN1019-4340: Security Advisory - mariadb - CVE-2020-2760 LIN1019-4320: Security Advisory - mariadb - CVE-2020-2812 LIN1019-4319: Security Advisory - mariadb - CVE-2020-2814 LIN1019-4644: Security Advisory - linux - CVE-2020-13143 LIN1019-4542: Security Advisory - linux - CVE-2020-10690 LIN1019-4550: Security Advisory - libexif - CVE-2020-12767 LIN1019-4549: Security Advisory - linux - CVE-2020-12768 LIN1019-4548: Security Advisory - linux - CVE-2020-12769 LIN1019-4547: Security Advisory - linux - CVE-2020-12770 LIN1019-4660: Security Advisory - dpdk - CVE-2020-10723 LIN1019-4659: Security Advisory - dpdk - CVE-2020-10722 LIN1019-4661: Security Advisory - dpdk - CVE-2020-10724 LIN1019-4530: Security Advisory - qemu - CVE-2020-7211 LIN1019-4452: Security Advisory - samba - CVE-2020-10700 LIN1019-4449: Security Advisory - ruby - CVE-2020-10933 LIN1019-4448: Security Advisory - linux - CVE-2020-12114 LIN1019-4444: Security Advisory - linux - CVE-2020-11884 LIN1019-4443: Security Advisory - linux - CVE-2020-12464 LIN1019-4442: Security Advisory - linux - CVE-2020-12465 LIN1019-4253: Security Advisory - linux - CVE-2020-11609 LIN1019-4254: Security Advisory - linux - CVE-2020-11608 LIN1019-4269: Security Advisory - linux - CVE-2020-11668 LIN1019-4190: Security Advisory - kubernetes - CVE-2020-8551 LIN1019-4189: Security Advisory - kubernetes - CVE-2020-8552 LIN1019-4732: Security Advisory - glib-networking - CVE-2020-13645 LIN1019-4551: Security Advisory - json-c - CVE-2020-12762 LIN1019-4687: Overlay memory leak - request to backport patch from upstream LIN1019-3037: do_compile warings of linux-yocto-5.2.17 on qemuarm BSPs LIN1019-3036: [WARNING] do_kernel_configcheck warnings of qemumips64 both on standard and next configs LIN1019-4606: OV: WARNING: Your host glibc verson (2.31) is newer than that in uninative (2.30) LIN1019-4605: OV: WARNING: Host distribution "ubuntu-20.04" has not been validated with this version of the build system LIN1019-4579: lttng-tools-ptest : 1/4859 failed LIN1019-4672: mariadb_10.3.23.bb:do_compile() failed on xilinx_zynqmp LIN1019-4517: qemuarm: Internal error: Oops - BUG: 0 during boot LIN1019-4598: [WARNING] arm64/kernel/perf_regs.c:37:20: warning: array subscript 32 is above array bounds of 'u64[31]' LIN1019-4585: LTTng: vmalloc_sync_all symbol lookup failed LIN1019-4507: do_fetch errors of dce and u-boot-imx from git.freescale.com LIN1019-4506: ERROR: go-pty-git-r0 do_fetch: Fetcher failure LIN1019-4536: qemu-native_4.1.0.bb:do_compile() failed on Ubuntu-20.04 LIN1019-4627: Creating initramfs Images - Wrong initramfs-install feature README LIN1019-4257: [WARNING] compiling error of kernel "arm64/kernel/perf_callchain.c warning: cast from pointer to integer of different size" LIN1019-4405: perf script can not parser backtrace in 64bit kernel and 32bit system. ======================= 10.19.45.7 =============================== LIN1019-4806: Security Advisory - ntp - CVE-2020-13817 LIN1019-4763: Security Advisory - linux - CVE-2019-20812 LIN1019-3085: Security Advisory - python - CVE-2019-18348 LIN1019-3775: Security Advisory - linux - CVE-2019-19769 LIN1019-3581: Security Advisory - phpmyadmin - CVE-2019-18622 LIN1019-3716: Security Advisory - phpmyadmin - CVE-2019-19617 LIN1019-4176: Security Advisory - linux - CVE-2020-10942 LIN1019-4230: Security Advisory - linux - CVE-2020-11494 LIN1019-4231: Security Advisory - linux - CVE-2020-8835 LIN1019-4403: Security Advisory - qemu - CVE-2020-11869 LIN1019-4400: Security Advisory - php - CVE-2020-7067 LIN1019-3978: Security Advisory - linux - CVE-2020-8428 LIN1019-4012: Security Advisory - linux - CVE-2020-8647 LIN1019-4011: Security Advisory - linux - CVE-2020-8648 LIN1019-4010: Security Advisory - linux - CVE-2020-8649 LIN1019-3227: Security Advisory - php - CVE-2019-11043 LIN1019-4390: Security Advisory - ceph - CVE-2020-1760 LIN1019-4346: Security Advisory - ntp - CVE-2020-11868 LIN1019-4373: Security Advisory - git - CVE-2020-11008 LIN1019-4291: Security Advisory - git - CVE-2020-5260 LIN1019-4262: Security Advisory - sqlite3 - CVE-2020-11655 LIN1019-4261: Security Advisory - sqlite3 - CVE-2020-11656 LIN1019-4284: Security Advisory - ceph - CVE-2020-1759 LIN1019-4280: Security Advisory - openssl - CVE-2020-1967 LIN1019-4267: Security Advisory - linux - CVE-2019-14615 LIN1019-4208: Security Advisory - php - CVE-2020-7066 LIN1019-4212: Security Advisory - systemd - CVE-2020-1712 LIN1019-4210: Security Advisory - php - CVE-2020-7064 LIN1019-4209: Security Advisory - php - CVE-2020-7065 LIN1019-4079: Security Advisory - linux - CVE-2020-9383 LIN1019-4061: Security Advisory - linux - CVE-2020-8992 LIN1019-4156: Security Advisory - u-boot - CVE-2020-10648 LIN1019-3031: CGL: 2 kernel warnings on qemuppc LIN1019-3044: OverC builds will fail when passing '--all-layers' to setup.sh LIN1019-4204: Remove "_append_" for the PACKAGECONFIG of qemu LIN1019-4123: rngd takes 100% CPU time on startup Stratix10 LIN1019-4385: Uprev request of timezone: 2020a release of tz code and data available LIN1019-4393: make: occasional deadlock when using parallel build LIN1019-4359: [WARNING] do_kernel_configcheck warnings on qemumips64 LIN1019-4299: Request to port fix for kernel hang when allocating huge page LIN1019-2430: LTTNG issue with epoch negative clock offset LIN1019-4239: ERROR: mariadb-10.3.22-r0 do_package_qa: QA Issue: mariadb-dbg package is not obeying usrmerge distro feature. /lib should be relocated to /usr. [usrmerge] LIN1019-4235: [WARNING] kernel warnings "Section mismatch in reference from the variable __pci_fixup_malta_pcnet32_ioports_fixup163 to the function .init.text:malta_pcnet32_ioports_fixup()" on qemumips LIN1019-4248: need update ntp package to version 4.2.8p14 LIN1019-4247: file-native: build fails on ubu-16.04 LIN1019-4244: [lib32] openssh-ptest: openssh-ptest 1/51 failed LIN1019-4272: The rng-tools_6.7.bbappend from layers/intel-socfpga/recipes-support/rng-tools/ wil be included in non-x86 archs LIN1019-4112: perf call graphs lack symbols when running 32-bit applications on a 64-bit LIN1019-4102: "Creating a LUKS Partition on a Storage Device" page is missing some vital info ======================= 10.19.45.6 =============================== LIN1019-3886: Security Advisory - qemu - CVE-2019-20175 LIN1019-2995: Security Advisory - mysql - CVE-2019-2974 LIN1019-2830: libgcrypt - CVE-2019-13627 LIN1019-2826: Security Advisory - python - CVE-2019-16935 LIN1019-2812: Security Advisory - go - CVE-2019-16276 LIN1019-3910: Security Advisory - nginx - CVE-2019-20372 LIN1019-3957: Security Advisory - qemu - CVE-2020-7039 LIN1019-3950: Security Advisory - mariadb - CVE-2020-2574 LIN1019-3897: Security Advisory - cpio - CVE-2019-14866 LIN1019-3006: Security Advisory - mysql - CVE-2019-2938 LIN1019-2905: binutils - CVE-2019-17450 LIN1019-2904: binutils - CVE-2019-17451 LIN1019-972: Security Advisory - sssd - CVE-2018-16838 LIN1019-3571: Security Advisory - linux - CVE-2019-19037 LIN1019-3566: Security Advisory - glibc - CVE-2019-19126 LIN1019-3768: Security Advisory - git - CVE-2019-1387 LIN1019-3767: Security Advisory - git - CVE-2019-1354 LIN1019-3766: Security Advisory - git - CVE-2019-1353 LIN1019-3765: Security Advisory - git - CVE-2019-1352 LIN1019-3764: Security Advisory - git - CVE-2019-1351 LIN1019-3763: Security Advisory - git - CVE-2019-1350 LIN1019-3762: Security Advisory - git - CVE-2019-1349 LIN1019-3760: Security Advisory - git - CVE-2019-1348 LIN1019-3748: Security Advisory - git - CVE-2019-19604 LIN1019-4165: Security Advisory - phpmyadmin - CVE-2020-10802 LIN1019-4164: Security Advisory - phpmyadmin - CVE-2020-10803 LIN1019-4157: Security Advisory - phpmyadmin - CVE-2020-10804 LIN1019-4160: Security Advisory - freeradius - CVE-2019-17185 LIN1019-4159: Security Advisory - gnupg - CVE-2019-14855 LIN1019-4152: Security Advisory - postgresql - CVE-2020-1720 LIN1019-4155: Security Advisory - libvirt - CVE-2019-20485 LIN1019-4135: Security Advisory - bluez5 - CVE-2020-0556 LIN1019-4121: Security Advisory - python-urllib3 - CVE-2020-7212 LIN1019-4116: Security Advisory - qemu - CVE-2019-20382 LIN1019-4013: Security Advisory - ipmitool - CVE-2020-5208 LIN1019-3983: Security Advisory - aspell - CVE-2019-20433 LIN1019-1563: Security Advisory - bzip2 - CVE-2019-12900 LIN1019-1924: Security Advisory - mysql - CVE-2019-2737 LIN1019-1922: Security Advisory - mysql - CVE-2019-2739 LIN1019-1921: Security Advisory - mysql - CVE-2019-2740 LIN1019-1913: Security Advisory - mysql - CVE-2019-2758 LIN1019-1896: Security Advisory - mysql - CVE-2019-2805 LIN1019-2524: Security Advisory - python - CVE-2019-16056 LIN1019-3697: Security Advisory - linux - CVE-2019-19525 LIN1019-2547: Security Advisory - sqlite - CVE-2019-16168 LIN1019-2546: Security Advisory - sysstat - CVE-2019-16167 LIN1019-4147: Security Advisory - go - CVE-2020-7919 LIN1019-4048: Security Advisory - linux - CVE-2019-3016 LIN1019-4109: Security Advisory - glibc - CVE-2020-10029 LIN1019-4093: Security Advisory - php - CVE-2020-7063 LIN1019-4099: Security Advisory - gd - CVE-2017-6363 LIN1019-4095: Security Advisory - php - CVE-2020-7061 LIN1019-4094: Security Advisory - php - CVE-2020-7062 LIN1019-4072: Security Advisory - sqlite3 - CVE-2020-9327 LIN1019-4111: Security Advisory - webkitgtk - CVE-2020-10018 LIN1019-4110: Security Advisory - glib-2.0 - CVE-2020-6750 LIN1019-4070: Security Advisory - libarchive - CVE-2020-9308 LIN1019-4148: Security Advisory - nagios-nrpe - CVE-2020-6581 LIN1019-4144: Security Advisory - nagios-nrpe - CVE-2020-6582 LIN1019-3803: stmmac debugfs entry shows incorrect device name after rename LIN1019-3615: sysstat fails because of chkconfig error LIN1019-3389: Recipe oprofile blacklisted is still in white list at the same time LIN1019-1666: [BTS]Failures found during xilinx-zynqmp BSP ZCU102 target booting up LIN1019-3975: stmmac kernel crash - request to integrate patch LIN1019-4150: libpam: pam_userdb.so is not built even though libdb(Berkeley DB) exist LIN1019-4185: ERROR: freeradius-3.0.19-r0 do_unpack: Fetcher failure LIN1019-4183: Creating initramfs Images - initramfs bundled image isn't installed correctly LIN1019-4113: WRL 19 SPI controller registration bug LIN1019-4082: [WARNING] fetch warnings of package openl2tp LIN1019-4081: [WARNING] "host/xhci-pci.c:522:13: warning: 'xhci_pci_shutdown' defined but not used" in build of qemumips&qemumips64 LIN1019-4058: IMA Denial testcases: "windriver" password not working LIN1019-4107: Native sstate package list generation failure LIN1019-4057: IMA Denial testcases: document GPG homedir path length limit(80 characters) LIN1019-4025: Hardware RNG Entropy Gatherer Daemon slow stop ======================= 10.19.45.5 =============================== LIN1019-3665: Security Advisory - linux - CVE-2019-14896 LIN1019-3704: Security Advisory - linux - CVE-2019-14897 LIN1019-3703: Security Advisory - linux - CVE-2019-14901 LIN1019-3965: Security Advisory - libxml2 - CVE-2019-20388 LIN1019-3517: Security Advisory - linux - CVE-2019-19053 LIN1019-3986: Security Advisory - sudo - CVE-2019-18634 LIN1019-3985: Security Advisory - openjpeg - CVE-2020-8112 LIN1019-4004: Security Advisory - python - CVE-2019-9674 LIN1019-3922: Security Advisory - openjpeg - CVE-2020-6851 LIN1019-4047: Security Advisory - kubernetes - CVE-2019-11251 LIN1019-4073: Security Advisory - screen - CVE-2020-9366 LIN1019-4063: Security Advisory - pcre - CVE-2019-20454 LIN1019-4032: Security Advisory - qemu - CVE-2020-1711 LIN1019-4035: Security Advisory - gd - CVE-2018-14553 LIN1019-4027: Security Advisory - php - CVE-2020-7059 LIN1019-3823: Security Advisory - cyrus-sasl - CVE-2019-19906 LIN1019-2986: file /usr/share/polkit-1/rules.d conflicts between attempted installs of gvfs-1.41.2-r0.core2_64 and polkit-0.116-r0.core2_64 LIN1019-4000: Observing QEMU crash with WRL9 LIN1019-3249: OverC on qemuarm64 does not support the creation of snapshots LIN1019-3312: packagegroup-tpm2-initramfs-1.0-r0 do_package_write_rpm failed since long build path LIN1019-1683: intel-x86-64_secure-boot: Failed to verify file /initrd (err:0x8000000000000002) LIN1019-4065: Bug in dhclient ! (Crashes on early SIGINT/SIGTERM) LIN1019-4055: Process lttng-sessiond caused kernel NULL pointer dereference at virtual address 0000000000000080 ======================= 10.19.45.4 =============================== LIN1019-3920: Security Advisory - linux - CVE-2019-19332 LIN1019-3909: Security Advisory - phpmyadmin - CVE-2020-5504 LIN1019-3896: Security Advisory - dnsmasq - CVE-2019-14834 LIN1019-3877: Security Advisory - tigervnc - CVE-2019-15691 LIN1019-3875: Security Advisory - tigervnc - CVE-2019-15693 LIN1019-3873: Security Advisory - tigervnc - CVE-2019-15695 LIN1019-3705: Security Advisory - linux - CVE-2019-14895 LIN1019-3851: Security Advisory - linux - CVE-2019-19965 LIN1019-3789: Security Advisory - linux - CVE-2019-19807 LIN1019-3966: Security Advisory - libxml2 - CVE-2020-7595 LIN1019-3964: Security Advisory - samba - CVE-2019-19344 LIN1019-3963: Security Advisory - samba - CVE-2019-14907 LIN1019-3962: Security Advisory - samba - CVE-2019-14902 LIN1019-4002: Security Advisory - ppp - CVE-2020-8597 LIN1019-3982: Security Advisory - virglrenderer - CVE-2020-8002 LIN1019-3981: Security Advisory - virglrenderer - CVE-2020-8003 LIN1019-3841: Security Advisory - linux - CVE-2019-19947 LIN1019-2197: Security Advisory - patch - CVE-2018-20969 LIN1019-3794: Intel RSU driver not loading correctly LIN1019-3815: rpcbind.socket: systemd legacy directory notification LIN1019-3911: Nothing RPROVIDES 'cri-o' of wrlinux_qemumips_std-sato_faw_alldistro_ccache_predefined_20. LIN1019-3868: Premirror not used when parsing linux-yocto-rt LIN1019-3849: WARNING: No recipes available for wrlinux-kernel-dev linux-yocto_4.18.bbappend LIN1019-3900: Please prompt to install package rpcgen on Fedora31 LIN1019-3824: meta-secure-core: rpm_%.bbappend overwrites PACKAGECONFIG LIN1019-3932: OV: ERROR: wr-systemd-container-1.0-r0 do_image_wic LIN1019-3931: OV: ERROR: wr-app-container-1.0-r0 do_image_wic LIN1019-3893: [WARNING] kernel warnings on intel-socfpga-64 LIN1019-3866: efitools_git failed (do_sign) LIN1019-3935: grub-efi-native-2.04-r0 do_sign LIN1019-3919: gpio: altera: Allocate irq_chip dynamically LIN1019-3926: kbd: enable vlock as configuration option but vlock not be compiled. ======================= 10.19.45.3 =============================== LIN1019-3883: Security Advisory - sqlite3 - CVE-2019-19959 LIN1019-3882: Security Advisory - sqlite3 - CVE-2019-20218 LIN1019-3845: Security Advisory - virglrenderer - CVE-2019-18388 LIN1019-3844: Security Advisory - virglrenderer - CVE-2019-18389 LIN1019-3843: Security Advisory - virglrenderer - CVE-2019-18390 LIN1019-3842: Security Advisory - virglrenderer - CVE-2019-18391 LIN1019-3801: Security Advisory - linux - CVE-2019-19241 LIN1019-3817: Security Advisory - sudo - CVE-2019-19232 LIN1019-3816: Security Advisory - sudo - CVE-2019-19234 LIN1019-3811: Security Advisory - shadow - CVE-2019-19882 LIN1019-3812: Security Advisory - sqlite3 - CVE-2019-19880 LIN1019-3954: Security Advisory - linux - CVE-2019-18282 LIN1019-3857: Security Advisory - sqlite3 - CVE-2019-19923 LIN1019-3777: Security Advisory - linux - CVE-2019-19767 LIN1019-3717: Security Advisory - linux - CVE-2019-19602 LIN1019-3698: Security Advisory - linux - CVE-2019-19524 LIN1019-3862: Security Advisory - libxml2 - CVE-2019-19956 LIN1019-3856: Security Advisory - sqlite3 - CVE-2019-19924 LIN1019-3855: Security Advisory - sqlite3 - CVE-2019-19925 LIN1019-3831: Security Advisory - php - CVE-2019-11045 LIN1019-3832: Security Advisory - php - CVE-2019-11044 LIN1019-3769: Security Advisory - sysstat - CVE-2019-19725 LIN1019-3753: Security Advisory - freeradius - CVE-2019-13456 LIN1019-3747: Security Advisory - samba - CVE-2019-14861 LIN1019-3737: Security Advisory - sqlite3 - CVE-2019-19603 LIN1019-3736: Security Advisory - sqlite3 - CVE-2019-19645 LIN1019-3735: Security Advisory - sqlite3 - CVE-2019-19646 LIN1019-3746: Security Advisory - samba - CVE-2019-14870 LIN1019-3745: Security Advisory - libxslt - CVE-2019-5815 LIN1019-3515: Security Advisory - linux - CVE-2019-19054 LIN1019-3690: Security Advisory - linux - CVE-2019-19532 LIN1019-3688: Security Advisory - linux - CVE-2019-19534 LIN1019-3693: Security Advisory - linux - CVE-2019-19529 LIN1019-3696: Security Advisory - linux - CVE-2019-19526 LIN1019-3826: Security Advisory - linux - CVE-2019-19922 LIN1019-3825: Security Advisory - sqlite3 - CVE-2019-19926 LIN1019-3830: Security Advisory - php - CVE-2019-11046 LIN1019-3829: Security Advisory - php - CVE-2019-11047 LIN1019-3828: Security Advisory - php - CVE-2019-11049 LIN1019-3827: Security Advisory - php - CVE-2019-11050 LIN1019-3726: Security Advisory - openssl - CVE-2019-1551 LIN1019-3782: Security Advisory - rabbitmq-c - CVE-2019-18609 LIN1019-3837: setup.sh fails with updated Python v3 LIN1019-3835: libpython3-staticdev: Incorrect path for 64-bit libs LIN1019-3836: stratix10: DesignWare SPI controller driver not enabled LIN1019-3821: stmmac: UDP performance degraded in LTS 19 - Stratix10 LIN1019-3814: dbus.socket: systemd legacy directory notification LIN1019-2890: ostree: Corrupted file object for ostree fsck --repo=/sysroot/ostree/repo on cgl rootfs LIN1019-2857: ostree not currently compatible with CGL LIN1019-3860: Invalid python interpreter 'python3/' in /usr/bin/samba_xxx script LIN1019-3740: intel-x86-32 should be removed from README of anaconda LIN1019-3744: Host distribution "rhel-7.7" has been validated LIN1019-3732: xhci_hcd 0001:00:0c.0: ERROR unknown event type 37 LIN1019-3333: kernel_configcheck warings with feature/host-rt-tune LIN1019-3729: MTD device erase block size incorrectly set to 256KiB in RCPL16 [Regression] LIN1019-3617: CLONE - NFS daemon consumes 100% CPU ======================= 10.19.45.2 =============================== LIN1019-2823: Security Advisory - linux - CVE-2019-17075 LIN1019-2886: Security Advisory - bind - CVE-2018-5743 LIN1019-3666: Security Advisory - linux - CVE-2019-10220 LIN1019-3663: Security Advisory - ruby - CVE-2019-16201 LIN1019-3660: Security Advisory - sqlite3 - CVE-2019-19242 LIN1019-3602: Security Advisory - sqlite3 - CVE-2019-19244 LIN1019-3596: Security Advisory - linux - CVE-2019-19252 LIN1019-3578: Security Advisory - libarchive - CVE-2019-19221 LIN1019-3699: Security Advisory - linux - CVE-2019-19523 LIN1019-3657: Security Advisory - ruby - CVE-2019-15845 LIN1019-3656: Security Advisory - ruby - CVE-2019-16254 LIN1019-3655: Security Advisory - ruby - CVE-2019-16255 LIN1019-3650: Security Advisory - linux - CVE-2019-18660 LIN1019-3522: Security Advisory - linux - CVE-2019-19050 LIN1019-3519: Security Advisory - linux - CVE-2019-19051 LIN1019-3518: Security Advisory - linux - CVE-2019-19052 LIN1019-3514: Security Advisory - linux - CVE-2019-19055 LIN1019-3512: Security Advisory - linux - CVE-2019-19056 LIN1019-3511: Security Advisory - linux - CVE-2019-19057 LIN1019-3509: Security Advisory - linux - CVE-2019-19058 LIN1019-3507: Security Advisory - linux - CVE-2019-19059 LIN1019-3501: Security Advisory - linux - CVE-2019-19063 LIN1019-3500: Security Advisory - linux - CVE-2019-19064 LIN1019-3498: Security Advisory - linux - CVE-2019-19065 LIN1019-3496: Security Advisory - linux - CVE-2019-19066 LIN1019-3495: Security Advisory - linux - CVE-2019-19067 LIN1019-3494: Security Advisory - linux - CVE-2019-19068 LIN1019-3493: Security Advisory - linux - CVE-2019-19069 LIN1019-3492: Security Advisory - linux - CVE-2019-19070 LIN1019-3491: Security Advisory - linux - CVE-2019-19071 LIN1019-3490: Security Advisory - linux - CVE-2019-19072 LIN1019-3489: Security Advisory - linux - CVE-2019-19073 LIN1019-3488: Security Advisory - linux - CVE-2019-19074 LIN1019-3528: Security Advisory - linux - CVE-2019-19045 LIN1019-3527: Security Advisory - linux - CVE-2019-19046 LIN1019-3485: Security Advisory - linux - CVE-2019-19076 LIN1019-3484: Security Advisory - linux - CVE-2019-19077 LIN1019-3483: Security Advisory - linux - CVE-2019-19078 LIN1019-3482: Security Advisory - linux - CVE-2019-19079 LIN1019-3524: Security Advisory - linux - CVE-2019-19048 LIN1019-3523: Security Advisory - linux - CVE-2019-19049 LIN1019-3475: Security Advisory - ghostscript - CVE-2019-14869 LIN1019-3450: Security Advisory - fribidi - CVE-2019-18397 LIN1019-3386: Security Advisory - linux - CVE-2019-18807 LIN1019-3385: Security Advisory - linux - CVE-2019-18808 LIN1019-3384: Security Advisory - linux - CVE-2019-18809 LIN1019-3382: Security Advisory - linux - CVE-2019-18811 LIN1019-3380: Security Advisory - linux - CVE-2019-18813 LIN1019-3479: Security Advisory - linux - CVE-2019-19082 LIN1019-3478: Security Advisory - linux - CVE-2019-19083 LIN1019-3486: Security Advisory - linux - CVE-2019-19075 LIN1019-3297: Security Advisory - samba - CVE-2019-10218 LIN1019-3296: Security Advisory - samba - CVE-2019-14833 LIN1019-3295: Security Advisory - samba - CVE-2019-14847 LIN1019-3291: Security Advisory - linux - CVE-2019-18786 LIN1019-3293: Security Advisory - linux - CVE-2019-18683 LIN1019-3505: Security Advisory - linux - CVE-2019-19060 LIN1019-3504: Security Advisory - linux - CVE-2019-19061 LIN1019-3502: Security Advisory - linux - CVE-2019-19062 LIN1019-1882: Security Advisory - nasm - CVE-2019-14248 LIN1019-1880: Security Advisory - gdb - CVE-2019-1010180 LIN1019-3691: Security Advisory - linux - CVE-2019-19531 LIN1019-3689: Security Advisory - linux - CVE-2019-19533 LIN1019-3687: Security Advisory - linux - CVE-2019-19535 LIN1019-3686: Security Advisory - linux - CVE-2019-19536 LIN1019-3685: Security Advisory - linux - CVE-2019-19537 LIN1019-3684: Security Advisory - linux - CVE-2019-19543 LIN1019-3694: Security Advisory - linux - CVE-2019-19528 LIN1019-3692: Security Advisory - linux - CVE-2019-19530 LIN1019-3695: Security Advisory - linux - CVE-2019-19527 LIN1019-3722: Security Advisory - linux - CVE-2019-19447 LIN1019-2642: Security Advisory - hostapd&wpa-supplicant - CVE-2019-16275 LIN1019-3042: intel-x86-64: There is one call trace for rt+cgl kernel on nuc7 target LIN1019-2868: ostree: error: Locking repo exclusive failed: Resource temporarily unavailable LIN1019-3670: [DOC] issues in Wind River Linux Getting Started, LTS 19 LIN1019-3607: python3-config: No module named 'distutils' LIN1019-3580: u-boot-uenv_2.0 failed (do_deploy) of wrlinux_qemumips64_std-sato_faw_alldistro_debug_predefined_20 LIN1019-3565: Security: ERROR: shadow-securetty-4.6-r3 do_package_write_rpm: Failed to import gpg key LIN1019-3646: ostree: Can not install one complete image into SD card which has been deployed one standard WIC image on xilinx-zynqmp target LIN1019-3644: [DOC] The kernel version (v4.18) should be updated in " Wind River Linux Kernel Development, LTS 19" LIN1019-3404: ostree: There is no boot.scr for multilib rootfs on xilinx-zynqmp bsp LIN1019-3264: wrlinux-image-std do_image_ostree failed: gpg signing failed: No secret key LIN1019-3212: Kernel build warnings found on bcm-2xxx-rpi4 BSP LIN1019-3210: [BTS]"dma_kernel_test" test failed on bcm-2xxx-rpi4 BSP target LIN1019-3208: [BTS]Errors were found during bcm-2xxx-rpi4 BSP target boot up LIN1019-3369: OverC networking can fail at startup LIN1019-3261: do_populate_sdk hang in build with feature feature/kernel-dev LIN1019-3257: [KTS] create cgroup ("cgroup_ad-hoc") failed on bcm-2xxx-rpi4 BSP target LIN1019-3263: intel-x86-64: WARNING: do_kernel_configcheck: [kernel config]: specified values did not make it into the kernel's final configuration when with wifi-usb.scc LIN1019-3200: "aplay -l" command return null device name on xilinx-zynqmp BSP LIN1019-3314: OV: failed to run systemReport without lspci LIN1019-3307: ostree: There are some systemd service failed due to No such file or directory in /var on NoAB model LIN1019-3341: xilinx-zynq: dio in LTP failed dio to kworker/u5:8: page allocation failure LIN1019-3334: nodistro project for ti-am335x compiled failed LIN1019-2706: mkswap01_sh in LTP failed on xilinx-zynq/xilinx-zynqmp/intel-x86-64 LIN1019-2202: It fails to create folder/document/properties on Xfce4 desktop after kill process Thunar LIN1019-2711: feature/run-container: many build warnings LIN1019-3628: Incorrect path for container multiconfigs LIN1019-3624: syslog-ng bug when including both 64- and 32-bits to SDK LIN1019-2078: blueman-manager: unexpected log msg LIN1019-2094: rmmod wmi_bmof print calltrace ======================= 10.19.45.1 =============================== LIN1019-2993: Security Advisory - linux - CVE-2019-17666 LIN1019-2762: Security Advisory - linux - CVE-2019-17133 LIN1019-3669: Security Advisory - linux - CVE-2018-12207 LIN1019-230: Security Advisory - tcpdump - CVE-2017-16808 LIN1019-3481: Security Advisory - linux - CVE-2019-19080 LIN1019-3480: Security Advisory - linux - CVE-2019-19081 LIN1019-1513: Security Advisory - linux - CVE-2019-12456 LIN1019-1398: Security Advisory - linux - CVE-2019-12455 LIN1019-1399: Security Advisory - linux - CVE-2019-12454 LIN1019-3067: It should remove description of 'oeqa' in README file of template feature/run-container.