1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux LTS 19 release. This RCPL provides fixes for known problems. For information on updating your projects, see the Product Updates section of the Wind River Linux Getting Started guide. https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/tfk1473951651031.html The update procedure involves updating your projectDir/wrlinux-x repository, and then re-running the setup.sh program with the original arguments. The procedure for upgrading your project is shown in the Updating Wind River Linux section of that guide: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html 2.0 RCPL Update Implementation The distribution is a set of git repositories that are used to generate project directories at setup time. An RCPL appends new fixes to these repositories. As a result, the git repositories can grow with each new RCPL. The product name branches include two specific branch names. The first is a continuous integration branch. The continuous integration branch tracks the latest RCPL version release by Wind River, and does not include an RCPL number. For example: * WRLINUX_10_19_BASE * WRLINUX_10_19_LTS These branches will always match the latest released RCPL. The second branch name is RCPL-specific, with a reference to a specific RCPL, such as: * WRLINUX_10_19_BASE_UPDATE0001 * WRLINUX_10_19_LTS_RCPL0002 To identify which branch you are on, run the following commands: $ cd projectDir/wrlinux-x $ git branch 3.0 Selecting a specific RCPL Follow the procedure as indicated in the Updating Wind River Linux section of the Wind River Linux Getting Started guide located at: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html In step 3, of the procedure you will use the branchName of the RCPL that you wish to use. For example: $ git checkout WRLINUX_10_19_LTS_RCPL0002 4.0 Change Log The following is a summary of the changes made in each RCPL version. The initial product distribution occurred with RCPL0001. Defect List: ======================= 10.19.45.14 =============================== LIN1019-5625: Security Advisory - qemu - CVE-2020-27616 LIN1019-5448: Security Advisory - qemu - CVE-2020-25085 LIN1019-5624: Security Advisory - qemu - CVE-2020-27617 LIN1019-5616: Security Advisory - tcpdump - CVE-2020-8037 LIN1019-5619: Security Advisory - mariadb - CVE-2020-15180 LIN1019-5644: Security Advisory - postgresql - CVE-2020-25695 LIN1019-5643: Security Advisory - postgresql - CVE-2020-25694 LIN1019-5647: Security Advisory - go - CVE-2020-28366 LIN1019-5740: Security Advisory - linux - CVE-2020-27786 LIN1019-5696: Security Advisory - linux - CVE-2020-29368 LIN1019-5694: Security Advisory - linux - CVE-2020-29370 LIN1019-5695: Security Advisory - linux - CVE-2020-29369 LIN1019-5632: Security Advisory - pacemaker - CVE-2020-25654 LIN1019-5633: Security Advisory - freetype - CVE-2020-15999 LIN1019-5620: Security Advisory - libexif - CVE-2020-0452 LIN1019-5540: Security Advisory - linux - CVE-2020-27673 LIN1019-5539: Security Advisory - linux - CVE-2020-27675 LIN1019-5573: Security Advisory - mariadb - CVE-2020-14812 LIN1019-5586: Security Advisory - mariadb - CVE-2020-14776 LIN1019-5591: Security Advisory - mariadb - CVE-2020-14765 LIN1019-5582: Security Advisory - mariadb - CVE-2020-14789 LIN1019-5492: Security Advisory - linux - CVE-2020-25641 LIN1019-5253: Security Advisory - postgresql - CVE-2020-14350 LIN1019-5724: Security Advisory - linux - CVE-2020-14381 LIN1019-5645: Security Advisory - postgresql - CVE-2020-25696 LIN1019-5660: Security Advisory - linux - CVE-2020-25705 LIN1019-5674: Security Advisory - linux - CVE-2020-28974 LIN1019-5422: Security Advisory - libdbi-perl - CVE-2014-10402 LIN1019-3465: Security Advisory - intel-microcode - CVE-2019-11135 LIN1019-5629: WARNING: libssh2-1.9.0-r0 do_fetch: libssh2 is not supported by Wind River Linux. LIN1019-5630: do_patch error of u-boot-socfpga_v2019.04.bb with a lib32 image LIN1019-5650: lz4_1.9.2 failed (do_fetch) of wrlinux_qemux86-64_wrlinux_faw_alldistro_debug_predefined_19. LIN1019-5657: ERROR: lib32-python3-pysensors-0.0.4-r0 do_configure() failed LIN1019-5623: ERROR: lvm2-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5622: ERROR: libdevmapper-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5680: python3-pysensors : import error. ======================= 10.19.45.13 =============================== LIN1019-5537: Security Advisory - nss - CVE-2020-25648 LIN1019-5505: Security Advisory - linux - CVE-2020-25645 LIN1019-5464: Security Advisory - dpdk - CVE-2020-14378 LIN1019-5463: Security Advisory - dpdk - CVE-2020-14377 LIN1019-5462: Security Advisory - dpdk - CVE-2020-14376 LIN1019-5461: Security Advisory - dpdk - CVE-2020-14375 LIN1019-5460: Security Advisory - dpdk - CVE-2020-14374 LIN1019-5449: Security Advisory - qemu - CVE-2020-25084 LIN1019-5447: Security Advisory - qemu - CVE-2020-25625 LIN1019-5521: Security Advisory - linux - CVE-2020-24490 LIN1019-5520: Security Advisory - linux - CVE-2020-12352 LIN1019-5519: Security Advisory - linux - CVE-2020-12351 LIN1019-5512: Security Advisory - libarchive - CVE-2020-21674 LIN1019-5518: Security Advisory - bluez5 - CVE-2020-27153 LIN1019-5609: Security Advisory - samba - CVE-2020-14383 LIN1019-5608: Security Advisory - samba - CVE-2020-14323 LIN1019-5607: Security Advisory - samba - CVE-2020-14318 LIN1019-5499: Security Advisory - php - CVE-2020-7069 LIN1019-5498: Security Advisory - php - CVE-2020-7070 LIN1019-5479: Security Advisory - phpmyadmin - CVE-2020-26935 LIN1019-5494: Security Advisory - libvirt - CVE-2020-25637 LIN1019-5491: Security Advisory - linux - CVE-2020-25643 LIN1019-5485: Security Advisory - python-urllib3 - CVE-2020-26137 LIN1019-5480: Security Advisory - phpmyadmin - CVE-2020-26934 LIN1019-5502: ERROR: intel-microcode-20190918 do_fetch() failed LIN1019-5472: intel-socfpga-64: ERROR: u-boot-socfpga-v2019.04+gitAUTOINC+8c4cd804d6-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5469: ERROR: grpc-1.24.1-r0 do_package: QA Issue: grpc: Files/directories were installed but not shipped in any package: LIN1019-5468: ls1046a doesn't link up 10Gbps on 10G Copper Ethernet LIN1019-5442: gdbm-native-1.18.1-r0 do_compile failed LIN1019-5593: [tz-announce] 2020d release of tz code and data available LIN1019-5523: SDK build issues LIN1019-5527: Can't change rootfs size with IMAGE_ROOTFS_SIZE LIN1019-5500: [tz-announce] 2020c release of tz code and data available LIN1019-5432: kernel crash on cn96xx with RCPL0011 LIN1019-4059: Intermittent/random build failures when building with feature/ima ======================= 10.19.45.12 =============================== LIN1019-5446: Security Advisory - linux - CVE-2020-26088 LIN1019-5457: Security Advisory - python - CVE-2020-26116 LIN1019-5433: Security Advisory - linux - CVE-2020-14390 LIN1019-5402: Security Advisory - cups - CVE-2020-3898 LIN1019-5401: Security Advisory - cups - CVE-2019-8842 LIN1019-5398: Security Advisory - cups - CVE-2019-2228 LIN1019-5373: Security Advisory - php - CVE-2020-7068 LIN1019-5371: Security Advisory - libproxy - CVE-2020-25219 LIN1019-5376: Security Advisory - linux - CVE-2020-14386 LIN1019-5329: Security Advisory - python3-django - CVE-2020-24583 LIN1019-5328: Security Advisory - python3-django - CVE-2020-24584 LIN1019-5339: Security Advisory - go - CVE-2020-24553 LIN1019-5415: Security Advisory - linux - CVE-2020-14314 LIN1019-5414: Security Advisory - linux - CVE-2020-14385 LIN1019-5421: Security Advisory - cryptsetup - CVE-2020-14382 LIN1019-5385: Security Advisory - linux - CVE-2020-25220 LIN1019-5391: Security Advisory - linux - CVE-2020-25285 LIN1019-5390: Security Advisory - linux - CVE-2020-25284 LIN1019-5355: Security Advisory - libxml2 - CVE-2020-24977 LIN1019-5324: Security Advisory - qemu - CVE-2020-14364 LIN1019-5279: Security Advisory - nss - CVE-2020-12400 LIN1019-4842: Security Advisory - gcc - CVE-2020-13844 LIN1019-5305: Security Advisory - ceph - CVE-2020-1700 LIN1019-5315: Security Advisory - librepo - CVE-2020-14352 LIN1019-5286: Security Advisory - nss - CVE-2020-12403 LIN1019-5285: Security Advisory - nss - CVE-2020-12402 LIN1019-5284: Security Advisory - nss - CVE-2020-12401 LIN1019-5292: Security Advisory - bison - CVE-2020-24240 LIN1019-5314: Security Advisory - nss - CVE-2019-11756 LIN1019-5313: Security Advisory - nss - CVE-2019-11745 LIN1019-5273: Security Advisory - bind - CVE-2020-8624 LIN1019-5272: Security Advisory - bind - CVE-2020-8623 LIN1019-5271: Security Advisory - bind - CVE-2020-8622 LIN1019-5264: Security Advisory - qemu - CVE-2020-12829 LIN1019-5259: Security Advisory - linux - CVE-2020-14331 LIN1019-5438: Security Advisory - samba - CVE-2020-1472 LIN1019-5356: Security Advisory - gnutls - CVE-2020-24659 LIN1019-5357: Security Advisory - nasm - CVE-2020-24978 LIN1019-5310: Security Advisory - nss - CVE-2020-6829 LIN1019-5309: Security Advisory - nss - CVE-2019-17006 LIN1019-5308: Security Advisory - nss - CVE-2019-17023 LIN1019-5243: Security Advisory - lua - CVE-2020-24371 LIN1019-4216: Security Advisory - glibc - CVE-2020-6096 LIN1019-5413: Security Advisory - libdbi-perl - CVE-2020-14392 LIN1019-5412: Security Advisory - libdbi-perl - CVE-2020-14393 LIN1019-5255: Security Advisory - net-snmp - CVE-2020-15862 LIN1019-5254: Security Advisory - net-snmp - CVE-2020-15861 LIN1019-5430: Security Advisory - libdbi-perl - CVE-2019-20919 LIN1019-5326: Security Advisory - hostapd & wpa-supplicant - CVE-2020-12695 LIN1019-5473: ERROR: thin-provisioning-tools-0.8.5-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5471: initramfs-framework recipe contains bashism LIN1019-5459: [WARNING] do_fetch warning "python-setuptools-scm-native is not supported by Wind River Linux" LIN1019-5477: ERROR: intel-microcode-20200609-r0 do_fetch() failed LIN1019-5409: Unable to run setup.sh for the xilinx-zynqmp BSP LIN1019-5408: Request to backport patch from upstream: xfs: Fix tail rounding in xfs_alloc_file_space() LIN1019-5367: json-c only reads 11 objects LIN1019-5351: [WARNING] linux-yocto-tiny-5.2.54 do_fetch: linux-yocto-tiny is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information LIN1019-5333: Manpage generation for sssd LIN1019-5332: [kernel rebase]"mmc1: unspecified timeout for CMD6 - use generic" logs are frequently displayed LIN1019-5426: spi-nor driver not working properly with Cypress flash s25fl064l - marvell-cn96xx LIN1019-5388: top crashing in WRL8 - cores found by QA LIN1019-5345: [WARNING] compiling warning "WARNING: unmet direct dependencies detected for PINCTRL_IMX_SCU" of nxp-imx8 LIN1019-5346: ERROR: ucarp-1.5.2-r0 do_fetch() failed without --dl-layers LIN1019-5021: fetch error of package ucarp LIN1019-5059: SEC.1.3 Process Containment Using MAC-based Mechanism failed LIN1019-5383: ERROR: intel-pcm-2.3a-r0 do_fetch() failed LIN1019-5323: WARNING: libsign-native is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information. LIN1019-4366: Stratix10 FPGA reload fails on Linux kernel 5.2 ======================= 10.19.45.11 =============================== LIN1019-5416: Security Advisory - linux - CVE-2020-10781 LIN1019-4997: Security Advisory - qemu - CVE-2020-10756 LIN1019-5301: Security Advisory - libexif - CVE-2019-9278 LIN1019-5171: Security Advisory - go - CVE-2020-16845 LIN1019-5097: Security Advisory - kubernetes - CVE-2020-8559 LIN1019-5095: Security Advisory - lua - CVE-2020-15888 LIN1019-5010: Security Advisory - linux - CVE-2019-19338 LIN1019-5252: Security Advisory - postgresql - CVE-2020-14349 LIN1019-5192: Security Advisory - qemu - CVE-2020-16092 LIN1019-5144: Security Advisory - linux - CVE-2020-16166 LIN1019-5210: Security Advisory - ghostscript - CVE-2020-16288 LIN1019-5209: Security Advisory - ghostscript - CVE-2020-16287 LIN1019-5207: Security Advisory - trousers - CVE-2020-24332 LIN1019-5206: Security Advisory - trousers - CVE-2020-24331 LIN1019-5205: Security Advisory - trousers - CVE-2020-24330 LIN1019-5188: Security Advisory - apache2 - CVE-2020-11993 LIN1019-5186: Security Advisory - apache2 - CVE-2020-11984 LIN1019-5185: Security Advisory - apache2 - CVE-2020-9490 LIN1019-5158: Security Advisory - libx11 - CVE-2020-14344 LIN1019-5100: Security Advisory - kubernetes - CVE-2020-8557 LIN1019-5295: Security Advisory - libx11 - CVE-2020-14363 LIN1019-5294: Security Advisory - libexif - CVE-2020-0198 LIN1019-5289: Security Advisory - nasm - CVE-2020-24241 LIN1019-5268: Security Advisory - curl - CVE-2020-8231 LIN1019-5265: Security Advisory - libexif - CVE-2020-0093 LIN1019-5260: Security Advisory - linux - CVE-2020-14356 LIN1019-5263: Security Advisory - sqlite3 - CVE-2020-6405 LIN1019-5261: Security Advisory - linux - CVE-2020-24394 LIN1019-5231: Security Advisory - ghostscript - CVE-2020-16309 LIN1019-5230: Security Advisory - ghostscript - CVE-2020-16308 LIN1019-5229: Security Advisory - ghostscript - CVE-2020-16307 LIN1019-5228: Security Advisory - ghostscript - CVE-2020-16306 LIN1019-5227: Security Advisory - ghostscript - CVE-2020-16305 LIN1019-5226: Security Advisory - ghostscript - CVE-2020-16304 LIN1019-5225: Security Advisory - ghostscript - CVE-2020-16303 LIN1019-5224: Security Advisory - ghostscript - CVE-2020-16302 LIN1019-5223: Security Advisory - ghostscript - CVE-2020-16301 LIN1019-5222: Security Advisory - ghostscript - CVE-2020-16300 LIN1019-5221: Security Advisory - ghostscript - CVE-2020-16299 LIN1019-5220: Security Advisory - ghostscript - CVE-2020-16298 LIN1019-5219: Security Advisory - ghostscript - CVE-2020-16297 LIN1019-5218: Security Advisory - ghostscript - CVE-2020-16296 LIN1019-5217: Security Advisory - ghostscript - CVE-2020-16295 LIN1019-5216: Security Advisory - ghostscript - CVE-2020-16294 LIN1019-5215: Security Advisory - ghostscript - CVE-2020-16293 LIN1019-5214: Security Advisory - ghostscript - CVE-2020-16292 LIN1019-5213: Security Advisory - ghostscript - CVE-2020-16291 LIN1019-5212: Security Advisory - ghostscript - CVE-2020-16290 LIN1019-5211: Security Advisory - ghostscript - CVE-2020-16289 LIN1019-5234: Security Advisory - ghostscript - CVE-2020-17538 LIN1019-5232: Security Advisory - ghostscript - CVE-2020-16310 LIN1019-5110: Security Advisory - lua - CVE-2020-15945 LIN1019-5120: Security Advisory - qemu - CVE-2020-15863 LIN1019-5113: Security Advisory - kubernetes - CVE-2020-8558 LIN1019-4352: Security Advisory - glibc - CVE-2020-1751 LIN1019-4445: Security Advisory - glibc - CVE-2020-1752 LIN1019-3774: Security Advisory - linux - CVE-2019-19770 LIN1019-5299: Security Advisory - xserver-xorg - CVE-2020-14362 LIN1019-5298: Security Advisory - xserver-xorg - CVE-2020-14361 LIN1019-5159: Security Advisory - xserver-xorg - CVE-2020-14347 LIN1019-5297: Security Advisory - xserver-xorg - CVE-2020-14346 LIN1019-5296: Security Advisory - xserver-xorg - CVE-2020-14345 LIN1019-5182: [nss] nss regression test fail, 9 sub cases fail LIN1019-5150: [WARNING] do_kernel_configcheck warnings of nxp-ls1046 LIN1019-5287: OV: ovp-kvm kernel image boot failed LIN1019-5240: Can not build nginx_1.17.8 LIN1019-5235: nfs: Fix getxattr kernel panic and memory overflow LIN1019-5288: cpuid.c:423:11: warning: unused variable f_pku LIN1019-5274: create-user-key-store.sh uses "weak" des3 cipher for private keys LIN1019-5105: libpam password change error log LIN1019-5194: x-session-manager has multiple providers with the same priority LIN1019-5193: dpdk_git failed (do_fetch) of wrlinux-std-sato_intel-x86-64_world_9-lts-cve. LIN1019-5198: Feature 'features/sysrq.scc' not found LIN1019-5108: xilinx-zynqmp : issue with flash partition getting erased and jffs2 file system access from uboot LIN1019-4441: do_patch error with file bash-CVE-2019-18276.patch in a reconfigured build ======================= 10.19.45.10 =============================== LIN1019-5420: Security Advisory - linux - CVE-2020-10766 LIN1019-5418: Security Advisory - linux - CVE-2020-10767 LIN1019-5417: Security Advisory - linux - CVE-2020-10768 LIN1019-5348: Security Advisory - linux - CVE-2020-10720 LIN1019-4996: Security Advisory - nss - CVE-2020-12399 LIN1019-4953: Security Advisory - linux - CVE-2020-15393 LIN1019-4988: Security Advisory - samba - CVE-2020-10730 LIN1019-4987: Security Advisory - samba - CVE-2020-10745 LIN1019-4935: Security Advisory - ntp - CVE-2020-15025 LIN1019-5011: Security Advisory - python - CVE-2019-20907 LIN1019-4938: Security Advisory - ceph - CVE-2020-10753 LIN1019-4936: Security Advisory - sqlite3 - CVE-2020-15358 LIN1019-4983: Security Advisory - samba - CVE-2020-10760 LIN1019-4982: Security Advisory - samba - CVE-2020-14303 LIN1019-4957: Security Advisory - openjpeg - CVE-2020-15389 LIN1019-4885: Security Advisory - python3 - CVE-2020-14422 LIN1019-5258: Security Advisory - linux - CVE-2020-2732 LIN1019-5071: Security Advisory - curl - CVE-2020-8177 LIN1019-5070: Security Advisory - curl - CVE-2020-8169 LIN1019-4500: Security Advisory - linux - CVE-2020-12655 LIN1019-4499: Security Advisory - linux - CVE-2020-12656 LIN1019-4729: Security Advisory - qemu - CVE-2020-13253 LIN1019-4727: Security Advisory - qemu - CVE-2020-13362 LIN1019-4831: Security Advisory - linux - CVE-2020-13974 LIN1019-4810: Security Advisory - perl - CVE-2020-12723 LIN1019-4808: Security Advisory - qemu - CVE-2020-13791 LIN1019-4811: Security Advisory - perl - CVE-2020-10878 LIN1019-4812: Security Advisory - perl - CVE-2020-10543 LIN1019-4546: Security Advisory - linux - CVE-2020-12771 LIN1019-4940: Security Advisory - net-snmp - CVE-2019-20892 LIN1019-4951: ERROR: waffle-1.6.0-r0 do_configure: meson failed LIN1019-4966: freediameter-ptest 2/12 failed LIN1019-4972: iso-codes_4.3 failed (do_fetch) of wrlinux_qemuarm64_std-sato_faw_alldistro_predefined_19-lts. LIN1019-4932: NXP LS1028 BSP : error message "Can't get dma-channels." when booting the target LIN1019-3248: OverC cube-server startup warnings LIN1019-3419: intel-x86-64: Failed to run sleepgraph in rt kernel on NUC7i5DNKE LIN1019-4684: ERROR: qemu-native-2.7.0-r1 do_compile() failed ======================= 10.19.45.9 =============================== LIN1019-4904: Security Advisory - nginx - CVE-2019-9513 LIN1019-4839: Security Advisory - qemu - CVE-2020-10761 LIN1019-4900: Security Advisory - nginx - CVE-2019-9511 LIN1019-4849: Security Advisory - libpcre - CVE-2020-14155 LIN1019-4844: Security Advisory - qemu - CVE-2020-1983 LIN1019-4841: Security Advisory - linux - CVE-2020-10732 LIN1019-4624: Security Advisory - linux - CVE-2020-12888 LIN1019-3700: Security Advisory - linux - CVE-2019-19462 LIN1019-3379: Security Advisory - linux - CVE-2019-18814 LIN1019-4245: Security Advisory - linux - CVE-2020-11565 LIN1019-4237: Security Advisory - gnutls - CVE-2020-11501 LIN1019-4498: Security Advisory - linux - CVE-2020-12657 LIN1019-4497: Security Advisory - linux - CVE-2020-12659 LIN1019-4418: Security Advisory - ffmpeg - CVE-2020-12284 LIN1019-4731: Security Advisory - linux - CVE-2020-10751 LIN1019-4726: Security Advisory - sqlite3 - CVE-2020-13630 LIN1019-4725: Security Advisory - sqlite3 - CVE-2020-13631 LIN1019-4724: Security Advisory - sqlite3 - CVE-2020-13632 LIN1019-4658: Security Advisory - bind - CVE-2020-8617 LIN1019-4657: Security Advisory - bind - CVE-2020-8616 LIN1019-4805: Security Advisory - sqlite3 - CVE-2020-13871 LIN1019-4832: Security Advisory - linux - CVE-2020-10757 LIN1019-4809: Security Advisory - qemu - CVE-2020-13765 LIN1019-4807: Security Advisory - qemu - CVE-2020-13800 LIN1019-4679: Security Advisory - linux - CVE-2020-10711 LIN1019-4817: Security Advisory - kubernetes - CVE-2020-8555 LIN1019-4816: Security Advisory - dbus - CVE-2020-12049 LIN1019-4815: Security Advisory - qemu - CVE-2020-10702 LIN1019-4814: Security Advisory - ffmpeg - CVE-2020-13904 LIN1019-4788: Security Advisory - python3-django - CVE-2020-13596 LIN1019-4787: Security Advisory - python3-django - CVE-2020-9402 LIN1019-4786: Security Advisory - python3-django - CVE-2020-7471 LIN1019-4785: Security Advisory - python3-django - CVE-2019-19844 LIN1019-4784: Security Advisory - python3-django - CVE-2019-19118 LIN1019-4777: Security Advisory - openssh - CVE-2020-12062 LIN1019-4776: Security Advisory - python3-django - CVE-2020-13254 LIN1019-4770: Security Advisory - libvirt - CVE-2020-10703 LIN1019-4768: Security Advisory - systemd - CVE-2020-13776 LIN1019-4767: Security Advisory - qemu - CVE-2020-13659 LIN1019-4766: Security Advisory - qemu - CVE-2020-13754 LIN1019-4765: Security Advisory - linux - CVE-2019-20810 LIN1019-4774: Security Advisory - gnutls - CVE-2020-13777 LIN1019-4220: Security Advisory - kubernetes - CVE-2019-11254 LIN1019-4853: Security Advisory - nfs-utils - CVE-2019-3689 LIN1019-4829: Security Advisory - intel SRBDS - CVE-2020-0543 LIN1019-4773: Security Advisory - libjpeg-turbo - CVE-2020-13790 LIN1019-4834: "wrl-small" rootfs has 435MB directory with firmware LIN1019-4840: toolchain-shar-extract: ignore timestamp on decompress LIN1019-4899: Many BSPs failed to build: libmodulemd_git failed (do_fetch) LIN1019-4848: Request to backport upstream patch to fix lack of entropy LIN1019-4615: Error doing "make scripts" in SDK LIN1019-4742: [WARNING] do_kernel_configcheck warnings in builds of nxp-ls1028 LIN1019-4827: Wrong permissions on module.tgz file. ======================= 10.19.45.8 =============================== LIN1019-4881: Security Advisory - linux - CVE-2020-14416 LIN1019-4591: Security Advisory - linux - CVE-2020-12826 LIN1019-4584: Security Advisory - icu - CVE-2020-10531 LIN1019-4530: Security Advisory - qemu - CVE-2020-7211 LIN1019-4511: Security Advisory - samba - CVE-2020-10704 LIN1019-4452: Security Advisory - samba - CVE-2020-10700 LIN1019-4320: Security Advisory - mariadb - CVE-2020-2812 LIN1019-4319: Security Advisory - mariadb - CVE-2020-2814 LIN1019-4342: Security Advisory - mariadb - CVE-2020-2752 LIN1019-4340: Security Advisory - mariadb - CVE-2020-2760 LIN1019-4269: Security Advisory - linux - CVE-2020-11668 LIN1019-4254: Security Advisory - linux - CVE-2020-11608 LIN1019-4253: Security Advisory - linux - CVE-2020-11609 LIN1019-4542: Security Advisory - linux - CVE-2020-10690 LIN1019-4547: Security Advisory - linux - CVE-2020-12770 LIN1019-4503: Security Advisory - linux - CVE-2020-12652 LIN1019-4502: Security Advisory - linux - CVE-2020-12653 LIN1019-4501: Security Advisory - linux - CVE-2020-12654 LIN1019-4419: Security Advisory - openldap - CVE-2020-12243 LIN1019-4417: Security Advisory - libvirt - CVE-2020-12430 LIN1019-4449: Security Advisory - ruby - CVE-2020-10933 LIN1019-4448: Security Advisory - linux - CVE-2020-12114 LIN1019-4444: Security Advisory - linux - CVE-2020-11884 LIN1019-4443: Security Advisory - linux - CVE-2020-12464 LIN1019-4442: Security Advisory - linux - CVE-2020-12465 LIN1019-4625: Security Advisory - apt - CVE-2020-3810 LIN1019-4728: Security Advisory - qemu - CVE-2020-13361 LIN1019-4659: Security Advisory - dpdk - CVE-2020-10722 LIN1019-4660: Security Advisory - dpdk - CVE-2020-10723 LIN1019-4661: Security Advisory - dpdk - CVE-2020-10724 LIN1019-4655: Security Advisory - php - CVE-2019-11048 LIN1019-4548: Security Advisory - linux - CVE-2020-12769 LIN1019-4550: Security Advisory - libexif - CVE-2020-12767 LIN1019-4549: Security Advisory - linux - CVE-2020-12768 LIN1019-4678: Security Advisory - libexif - CVE-2020-13112 LIN1019-4677: Security Advisory - libexif - CVE-2020-13113 LIN1019-4676: Security Advisory - libexif - CVE-2020-13114 LIN1019-4695: Security Advisory - sqlite3 - CVE-2020-13434 LIN1019-4694: Security Advisory - sqlite3 - CVE-2020-13435 LIN1019-4644: Security Advisory - linux - CVE-2020-13143 LIN1019-4190: Security Advisory - kubernetes - CVE-2020-8551 LIN1019-4189: Security Advisory - kubernetes - CVE-2020-8552 LIN1019-4218: Security Advisory - apache2 - CVE-2020-1927 LIN1019-4217: Security Advisory - apache2 - CVE-2020-1934 LIN1019-3979: Security Advisory - python - CVE-2020-8492 LIN1019-3776: Security Advisory - linux - CVE-2019-19768 LIN1019-4732: Security Advisory - glib-networking - CVE-2020-13645 LIN1019-4551: Security Advisory - json-c - CVE-2020-12762 LIN1019-4606: OV: WARNING: Your host glibc verson (2.31) is newer than that in uninative (2.30) LIN1019-4605: OV: WARNING: Host distribution "ubuntu-20.04" has not been validated with this version of the build system LIN1019-4536: qemu-native_4.1.0.bb:do_compile() failed on Ubuntu-20.04 LIN1019-4517: qemuarm: Internal error: Oops - BUG: 0 during boot LIN1019-4405: perf script can not parser backtrace in 64bit kernel and 32bit system. LIN1019-3037: do_compile warings of linux-yocto-5.2.17 on qemuarm BSPs LIN1019-3036: [WARNING] do_kernel_configcheck warnings of qemumips64 both on standard and next configs LIN1019-4257: [WARNING] compiling error of kernel "arm64/kernel/perf_callchain.c warning: cast from pointer to integer of different size" LIN1019-4506: ERROR: go-pty-git-r0 do_fetch: Fetcher failure LIN1019-4507: do_fetch errors of dce and u-boot-imx from git.freescale.com LIN1019-4627: Creating initramfs Images - Wrong initramfs-install feature README LIN1019-4598: [WARNING] arm64/kernel/perf_regs.c:37:20: warning: array subscript 32 is above array bounds of 'u64[31]' LIN1019-4585: LTTng: vmalloc_sync_all symbol lookup failed LIN1019-4579: lttng-tools-ptest : 1/4859 failed LIN1019-4672: mariadb_10.3.23.bb:do_compile() failed on xilinx_zynqmp LIN1019-4687: Overlay memory leak - request to backport patch from upstream ======================= 10.19.45.7 =============================== LIN1019-4403: Security Advisory - qemu - CVE-2020-11869 LIN1019-4400: Security Advisory - php - CVE-2020-7067 LIN1019-4390: Security Advisory - ceph - CVE-2020-1760 LIN1019-4079: Security Advisory - linux - CVE-2020-9383 LIN1019-4061: Security Advisory - linux - CVE-2020-8992 LIN1019-3716: Security Advisory - phpmyadmin - CVE-2019-19617 LIN1019-3581: Security Advisory - phpmyadmin - CVE-2019-18622 LIN1019-3085: Security Advisory - python - CVE-2019-18348 LIN1019-3227: Security Advisory - php - CVE-2019-11043 LIN1019-4291: Security Advisory - git - CVE-2020-5260 LIN1019-4267: Security Advisory - linux - CVE-2019-14615 LIN1019-4373: Security Advisory - git - CVE-2020-11008 LIN1019-4346: Security Advisory - ntp - CVE-2020-11868 LIN1019-4262: Security Advisory - sqlite3 - CVE-2020-11655 LIN1019-4284: Security Advisory - ceph - CVE-2020-1759 LIN1019-4280: Security Advisory - openssl - CVE-2020-1967 LIN1019-4261: Security Advisory - sqlite3 - CVE-2020-11656 LIN1019-4806: Security Advisory - ntp - CVE-2020-13817 LIN1019-4763: Security Advisory - linux - CVE-2019-20812 LIN1019-4212: Security Advisory - systemd - CVE-2020-1712 LIN1019-4210: Security Advisory - php - CVE-2020-7064 LIN1019-4209: Security Advisory - php - CVE-2020-7065 LIN1019-4208: Security Advisory - php - CVE-2020-7066 LIN1019-4176: Security Advisory - linux - CVE-2020-10942 LIN1019-4231: Security Advisory - linux - CVE-2020-8835 LIN1019-4230: Security Advisory - linux - CVE-2020-11494 LIN1019-3978: Security Advisory - linux - CVE-2020-8428 LIN1019-3775: Security Advisory - linux - CVE-2019-19769 LIN1019-4010: Security Advisory - linux - CVE-2020-8649 LIN1019-4012: Security Advisory - linux - CVE-2020-8647 LIN1019-4011: Security Advisory - linux - CVE-2020-8648 LIN1019-4156: Security Advisory - u-boot - CVE-2020-10648 LIN1019-4393: make: occasional deadlock when using parallel build LIN1019-4385: Uprev request of timezone: 2020a release of tz code and data available LIN1019-4102: "Creating a LUKS Partition on a Storage Device" page is missing some vital info LIN1019-2430: LTTNG issue with epoch negative clock offset LIN1019-3044: OverC builds will fail when passing '--all-layers' to setup.sh LIN1019-3031: CGL: 2 kernel warnings on qemuppc LIN1019-4272: The rng-tools_6.7.bbappend from layers/intel-socfpga/recipes-support/rng-tools/ wil be included in non-x86 archs LIN1019-4248: need update ntp package to version 4.2.8p14 LIN1019-4244: [lib32] openssh-ptest: openssh-ptest 1/51 failed LIN1019-4247: file-native: build fails on ubu-16.04 LIN1019-4299: Request to port fix for kernel hang when allocating huge page LIN1019-4235: [WARNING] kernel warnings "Section mismatch in reference from the variable __pci_fixup_malta_pcnet32_ioports_fixup163 to the function .init.text:malta_pcnet32_ioports_fixup()" on qemumips LIN1019-4239: ERROR: mariadb-10.3.22-r0 do_package_qa: QA Issue: mariadb-dbg package is not obeying usrmerge distro feature. /lib should be relocated to /usr. [usrmerge] LIN1019-4359: [WARNING] do_kernel_configcheck warnings on qemumips64 LIN1019-4204: Remove "_append_" for the PACKAGECONFIG of qemu LIN1019-4123: rngd takes 100% CPU time on startup Stratix10 LIN1019-4112: perf call graphs lack symbols when running 32-bit applications on a 64-bit ======================= 10.19.45.6 =============================== LIN1019-4095: Security Advisory - php - CVE-2020-7061 LIN1019-4094: Security Advisory - php - CVE-2020-7062 LIN1019-4093: Security Advisory - php - CVE-2020-7063 LIN1019-4048: Security Advisory - linux - CVE-2019-3016 LIN1019-4099: Security Advisory - gd - CVE-2017-6363 LIN1019-4072: Security Advisory - sqlite3 - CVE-2020-9327 LIN1019-4070: Security Advisory - libarchive - CVE-2020-9308 LIN1019-3748: Security Advisory - git - CVE-2019-19604 LIN1019-3697: Security Advisory - linux - CVE-2019-19525 LIN1019-3571: Security Advisory - linux - CVE-2019-19037 LIN1019-3566: Security Advisory - glibc - CVE-2019-19126 LIN1019-2524: Security Advisory - python - CVE-2019-16056 LIN1019-2812: Security Advisory - go - CVE-2019-16276 LIN1019-2547: Security Advisory - sqlite - CVE-2019-16168 LIN1019-2546: Security Advisory - sysstat - CVE-2019-16167 LIN1019-2995: Security Advisory - mysql - CVE-2019-2974 LIN1019-2830: libgcrypt - CVE-2019-13627 LIN1019-2826: Security Advisory - python - CVE-2019-16935 LIN1019-2905: binutils - CVE-2019-17450 LIN1019-2904: binutils - CVE-2019-17451 LIN1019-3006: Security Advisory - mysql - CVE-2019-2938 LIN1019-1563: Security Advisory - bzip2 - CVE-2019-12900 LIN1019-1896: Security Advisory - mysql - CVE-2019-2805 LIN1019-1924: Security Advisory - mysql - CVE-2019-2737 LIN1019-1922: Security Advisory - mysql - CVE-2019-2739 LIN1019-1921: Security Advisory - mysql - CVE-2019-2740 LIN1019-1913: Security Advisory - mysql - CVE-2019-2758 LIN1019-972: Security Advisory - sssd - CVE-2018-16838 LIN1019-4135: Security Advisory - bluez5 - CVE-2020-0556 LIN1019-4164: Security Advisory - phpmyadmin - CVE-2020-10803 LIN1019-4165: Security Advisory - phpmyadmin - CVE-2020-10802 LIN1019-4160: Security Advisory - freeradius - CVE-2019-17185 LIN1019-4159: Security Advisory - gnupg - CVE-2019-14855 LIN1019-4157: Security Advisory - phpmyadmin - CVE-2020-10804 LIN1019-4155: Security Advisory - libvirt - CVE-2019-20485 LIN1019-4152: Security Advisory - postgresql - CVE-2020-1720 LIN1019-4147: Security Advisory - go - CVE-2020-7919 LIN1019-4121: Security Advisory - python-urllib3 - CVE-2020-7212 LIN1019-4116: Security Advisory - qemu - CVE-2019-20382 LIN1019-4110: Security Advisory - glib-2.0 - CVE-2020-6750 LIN1019-4111: Security Advisory - webkitgtk - CVE-2020-10018 LIN1019-4109: Security Advisory - glibc - CVE-2020-10029 LIN1019-3983: Security Advisory - aspell - CVE-2019-20433 LIN1019-3764: Security Advisory - git - CVE-2019-1351 LIN1019-3763: Security Advisory - git - CVE-2019-1350 LIN1019-3762: Security Advisory - git - CVE-2019-1349 LIN1019-3760: Security Advisory - git - CVE-2019-1348 LIN1019-3768: Security Advisory - git - CVE-2019-1387 LIN1019-3767: Security Advisory - git - CVE-2019-1354 LIN1019-3766: Security Advisory - git - CVE-2019-1353 LIN1019-3765: Security Advisory - git - CVE-2019-1352 LIN1019-4013: Security Advisory - ipmitool - CVE-2020-5208 LIN1019-3886: Security Advisory - qemu - CVE-2019-20175 LIN1019-3897: Security Advisory - cpio - CVE-2019-14866 LIN1019-3910: Security Advisory - nginx - CVE-2019-20372 LIN1019-3957: Security Advisory - qemu - CVE-2020-7039 LIN1019-3950: Security Advisory - mariadb - CVE-2020-2574 LIN1019-4148: Security Advisory - nagios-nrpe - CVE-2020-6581 LIN1019-4144: Security Advisory - nagios-nrpe - CVE-2020-6582 LIN1019-3975: stmmac kernel crash - request to integrate patch LIN1019-4107: Native sstate package list generation failure LIN1019-4082: [WARNING] fetch warnings of package openl2tp LIN1019-4081: [WARNING] "host/xhci-pci.c:522:13: warning: 'xhci_pci_shutdown' defined but not used" in build of qemumips&qemumips64 LIN1019-4058: IMA Denial testcases: "windriver" password not working LIN1019-4057: IMA Denial testcases: document GPG homedir path length limit(80 characters) LIN1019-4025: Hardware RNG Entropy Gatherer Daemon slow stop LIN1019-3615: sysstat fails because of chkconfig error LIN1019-3389: Recipe oprofile blacklisted is still in white list at the same time LIN1019-1666: [BTS]Failures found during xilinx-zynqmp BSP ZCU102 target booting up LIN1019-4150: libpam: pam_userdb.so is not built even though libdb(Berkeley DB) exist LIN1019-4185: ERROR: freeradius-3.0.19-r0 do_unpack: Fetcher failure LIN1019-4183: Creating initramfs Images - initramfs bundled image isn't installed correctly LIN1019-4113: WRL 19 SPI controller registration bug LIN1019-3803: stmmac debugfs entry shows incorrect device name after rename ======================= 10.19.45.5 =============================== LIN1019-3922: Security Advisory - openjpeg - CVE-2020-6851 LIN1019-3965: Security Advisory - libxml2 - CVE-2019-20388 LIN1019-4027: Security Advisory - php - CVE-2020-7059 LIN1019-4073: Security Advisory - screen - CVE-2020-9366 LIN1019-4063: Security Advisory - pcre - CVE-2019-20454 LIN1019-4047: Security Advisory - kubernetes - CVE-2019-11251 LIN1019-4035: Security Advisory - gd - CVE-2018-14553 LIN1019-4032: Security Advisory - qemu - CVE-2020-1711 LIN1019-3665: Security Advisory - linux - CVE-2019-14896 LIN1019-3704: Security Advisory - linux - CVE-2019-14897 LIN1019-3703: Security Advisory - linux - CVE-2019-14901 LIN1019-2634: Security Advisory - linux - CVE-2019-16232 LIN1019-3517: Security Advisory - linux - CVE-2019-19053 LIN1019-3986: Security Advisory - sudo - CVE-2019-18634 LIN1019-3985: Security Advisory - openjpeg - CVE-2020-8112 LIN1019-4004: Security Advisory - python - CVE-2019-9674 LIN1019-3823: Security Advisory - cyrus-sasl - CVE-2019-19906 LIN1019-4055: Process lttng-sessiond caused kernel NULL pointer dereference at virtual address 0000000000000080 LIN1019-4065: Bug in dhclient ! (Crashes on early SIGINT/SIGTERM) LIN1019-3312: packagegroup-tpm2-initramfs-1.0-r0 do_package_write_rpm failed since long build path LIN1019-3249: OverC on qemuarm64 does not support the creation of snapshots LIN1019-2986: file /usr/share/polkit-1/rules.d conflicts between attempted installs of gvfs-1.41.2-r0.core2_64 and polkit-0.116-r0.core2_64 LIN1019-1683: intel-x86-64_secure-boot: Failed to verify file /initrd (err:0x8000000000000002) LIN1019-4000: Observing QEMU crash with WRL9 ======================= 10.19.45.4 =============================== LIN1019-3920: Security Advisory - linux - CVE-2019-19332 LIN1019-3966: Security Advisory - libxml2 - CVE-2020-7595 LIN1019-3964: Security Advisory - samba - CVE-2019-19344 LIN1019-3963: Security Advisory - samba - CVE-2019-14907 LIN1019-3962: Security Advisory - samba - CVE-2019-14902 LIN1019-3873: Security Advisory - tigervnc - CVE-2019-15695 LIN1019-3877: Security Advisory - tigervnc - CVE-2019-15691 LIN1019-3875: Security Advisory - tigervnc - CVE-2019-15693 LIN1019-3851: Security Advisory - linux - CVE-2019-19965 LIN1019-3705: Security Advisory - linux - CVE-2019-14895 LIN1019-2197: Security Advisory - patch - CVE-2018-20969 LIN1019-3982: Security Advisory - virglrenderer - CVE-2020-8002 LIN1019-3981: Security Advisory - virglrenderer - CVE-2020-8003 LIN1019-3841: Security Advisory - linux - CVE-2019-19947 LIN1019-3789: Security Advisory - linux - CVE-2019-19807 LIN1019-4002: Security Advisory - ppp - CVE-2020-8597 LIN1019-3896: Security Advisory - dnsmasq - CVE-2019-14834 LIN1019-3909: Security Advisory - phpmyadmin - CVE-2020-5504 LIN1019-3919: gpio: altera: Allocate irq_chip dynamically LIN1019-3893: [WARNING] kernel warnings on intel-socfpga-64 LIN1019-3868: Premirror not used when parsing linux-yocto-rt LIN1019-3932: OV: ERROR: wr-systemd-container-1.0-r0 do_image_wic LIN1019-3931: OV: ERROR: wr-app-container-1.0-r0 do_image_wic LIN1019-3926: kbd: enable vlock as configuration option but vlock not be compiled. LIN1019-3824: meta-secure-core: rpm_%.bbappend overwrites PACKAGECONFIG LIN1019-3849: WARNING: No recipes available for wrlinux-kernel-dev linux-yocto_4.18.bbappend LIN1019-3815: rpcbind.socket: systemd legacy directory notification LIN1019-3794: Intel RSU driver not loading correctly LIN1019-3900: Please prompt to install package rpcgen on Fedora31 LIN1019-3911: Nothing RPROVIDES 'cri-o' of wrlinux_qemumips_std-sato_faw_alldistro_ccache_predefined_20. LIN1019-3935: grub-efi-native-2.04-r0 do_sign LIN1019-3866: efitools_git failed (do_sign) ======================= 10.19.45.3 =============================== LIN1019-3857: Security Advisory - sqlite3 - CVE-2019-19923 LIN1019-3856: Security Advisory - sqlite3 - CVE-2019-19924 LIN1019-3855: Security Advisory - sqlite3 - CVE-2019-19925 LIN1019-3747: Security Advisory - samba - CVE-2019-14861 LIN1019-3746: Security Advisory - samba - CVE-2019-14870 LIN1019-3753: Security Advisory - freeradius - CVE-2019-13456 LIN1019-3745: Security Advisory - libxslt - CVE-2019-5815 LIN1019-3737: Security Advisory - sqlite3 - CVE-2019-19603 LIN1019-3736: Security Advisory - sqlite3 - CVE-2019-19645 LIN1019-3735: Security Advisory - sqlite3 - CVE-2019-19646 LIN1019-3717: Security Advisory - linux - CVE-2019-19602 LIN1019-3726: Security Advisory - openssl - CVE-2019-1551 LIN1019-3698: Security Advisory - linux - CVE-2019-19524 LIN1019-3690: Security Advisory - linux - CVE-2019-19532 LIN1019-3688: Security Advisory - linux - CVE-2019-19534 LIN1019-3693: Security Advisory - linux - CVE-2019-19529 LIN1019-3696: Security Advisory - linux - CVE-2019-19526 LIN1019-3515: Security Advisory - linux - CVE-2019-19054 LIN1019-3845: Security Advisory - virglrenderer - CVE-2019-18388 LIN1019-3844: Security Advisory - virglrenderer - CVE-2019-18389 LIN1019-3843: Security Advisory - virglrenderer - CVE-2019-18390 LIN1019-3812: Security Advisory - sqlite3 - CVE-2019-19880 LIN1019-3842: Security Advisory - virglrenderer - CVE-2019-18391 LIN1019-3777: Security Advisory - linux - CVE-2019-19767 LIN1019-3832: Security Advisory - php - CVE-2019-11044 LIN1019-3831: Security Advisory - php - CVE-2019-11045 LIN1019-3830: Security Advisory - php - CVE-2019-11046 LIN1019-3829: Security Advisory - php - CVE-2019-11047 LIN1019-3828: Security Advisory - php - CVE-2019-11049 LIN1019-3827: Security Advisory - php - CVE-2019-11050 LIN1019-3826: Security Advisory - linux - CVE-2019-19922 LIN1019-3825: Security Advisory - sqlite3 - CVE-2019-19926 LIN1019-3817: Security Advisory - sudo - CVE-2019-19232 LIN1019-3816: Security Advisory - sudo - CVE-2019-19234 LIN1019-3811: Security Advisory - shadow - CVE-2019-19882 LIN1019-3801: Security Advisory - linux - CVE-2019-19241 LIN1019-3769: Security Advisory - sysstat - CVE-2019-19725 LIN1019-3883: Security Advisory - sqlite3 - CVE-2019-19959 LIN1019-3882: Security Advisory - sqlite3 - CVE-2019-20218 LIN1019-3954: Security Advisory - linux - CVE-2019-18282 LIN1019-3862: Security Advisory - libxml2 - CVE-2019-19956 LIN1019-3782: Security Advisory - rabbitmq-c - CVE-2019-18609 LIN1019-3744: Host distribution "rhel-7.7" has been validated LIN1019-3729: MTD device erase block size incorrectly set to 256KiB in RCPL16 [Regression] LIN1019-3732: xhci_hcd 0001:00:0c.0: ERROR unknown event type 37 LIN1019-3740: intel-x86-32 should be removed from README of anaconda LIN1019-3617: CLONE - NFS daemon consumes 100% CPU LIN1019-2857: ostree not currently compatible with CGL LIN1019-3333: kernel_configcheck warings with feature/host-rt-tune LIN1019-2890: ostree: Corrupted file object for ostree fsck --repo=/sysroot/ostree/repo on cgl rootfs LIN1019-3814: dbus.socket: systemd legacy directory notification LIN1019-3821: stmmac: UDP performance degraded in LTS 19 - Stratix10 LIN1019-3837: setup.sh fails with updated Python v3 LIN1019-3836: stratix10: DesignWare SPI controller driver not enabled LIN1019-3835: libpython3-staticdev: Incorrect path for 64-bit libs LIN1019-3860: Invalid python interpreter 'python3/' in /usr/bin/samba_xxx script ======================= 10.19.45.2 =============================== LIN1019-3666: Security Advisory - linux - CVE-2019-10220 LIN1019-3578: Security Advisory - libarchive - CVE-2019-19221 LIN1019-3722: Security Advisory - linux - CVE-2019-19447 LIN1019-3687: Security Advisory - linux - CVE-2019-19535 LIN1019-3686: Security Advisory - linux - CVE-2019-19536 LIN1019-3685: Security Advisory - linux - CVE-2019-19537 LIN1019-3684: Security Advisory - linux - CVE-2019-19543 LIN1019-3699: Security Advisory - linux - CVE-2019-19523 LIN1019-3692: Security Advisory - linux - CVE-2019-19530 LIN1019-3691: Security Advisory - linux - CVE-2019-19531 LIN1019-3689: Security Advisory - linux - CVE-2019-19533 LIN1019-3694: Security Advisory - linux - CVE-2019-19528 LIN1019-3695: Security Advisory - linux - CVE-2019-19527 LIN1019-3657: Security Advisory - ruby - CVE-2019-15845 LIN1019-3656: Security Advisory - ruby - CVE-2019-16254 LIN1019-3655: Security Advisory - ruby - CVE-2019-16255 LIN1019-3650: Security Advisory - linux - CVE-2019-18660 LIN1019-3663: Security Advisory - ruby - CVE-2019-16201 LIN1019-3660: Security Advisory - sqlite3 - CVE-2019-19242 LIN1019-3602: Security Advisory - sqlite3 - CVE-2019-19244 LIN1019-3596: Security Advisory - linux - CVE-2019-19252 LIN1019-3479: Security Advisory - linux - CVE-2019-19082 LIN1019-3478: Security Advisory - linux - CVE-2019-19083 LIN1019-2823: Security Advisory - linux - CVE-2019-17075 LIN1019-3528: Security Advisory - linux - CVE-2019-19045 LIN1019-3527: Security Advisory - linux - CVE-2019-19046 LIN1019-3524: Security Advisory - linux - CVE-2019-19048 LIN1019-3523: Security Advisory - linux - CVE-2019-19049 LIN1019-3522: Security Advisory - linux - CVE-2019-19050 LIN1019-3484: Security Advisory - linux - CVE-2019-19077 LIN1019-3483: Security Advisory - linux - CVE-2019-19078 LIN1019-3482: Security Advisory - linux - CVE-2019-19079 LIN1019-3297: Security Advisory - samba - CVE-2019-10218 LIN1019-3296: Security Advisory - samba - CVE-2019-14833 LIN1019-3295: Security Advisory - samba - CVE-2019-14847 LIN1019-3500: Security Advisory - linux - CVE-2019-19064 LIN1019-3498: Security Advisory - linux - CVE-2019-19065 LIN1019-3496: Security Advisory - linux - CVE-2019-19066 LIN1019-3495: Security Advisory - linux - CVE-2019-19067 LIN1019-3494: Security Advisory - linux - CVE-2019-19068 LIN1019-3493: Security Advisory - linux - CVE-2019-19069 LIN1019-3491: Security Advisory - linux - CVE-2019-19071 LIN1019-3490: Security Advisory - linux - CVE-2019-19072 LIN1019-3489: Security Advisory - linux - CVE-2019-19073 LIN1019-3488: Security Advisory - linux - CVE-2019-19074 LIN1019-3486: Security Advisory - linux - CVE-2019-19075 LIN1019-3485: Security Advisory - linux - CVE-2019-19076 LIN1019-3507: Security Advisory - linux - CVE-2019-19059 LIN1019-3505: Security Advisory - linux - CVE-2019-19060 LIN1019-3501: Security Advisory - linux - CVE-2019-19063 LIN1019-3502: Security Advisory - linux - CVE-2019-19062 LIN1019-3492: Security Advisory - linux - CVE-2019-19070 LIN1019-3504: Security Advisory - linux - CVE-2019-19061 LIN1019-3386: Security Advisory - linux - CVE-2019-18807 LIN1019-3380: Security Advisory - linux - CVE-2019-18813 LIN1019-3293: Security Advisory - linux - CVE-2019-18683 LIN1019-2886: Security Advisory - bind - CVE-2018-5743 LIN1019-3450: Security Advisory - fribidi - CVE-2019-18397 LIN1019-3475: Security Advisory - ghostscript - CVE-2019-14869 LIN1019-3384: Security Advisory - linux - CVE-2019-18809 LIN1019-3382: Security Advisory - linux - CVE-2019-18811 LIN1019-3385: Security Advisory - linux - CVE-2019-18808 LIN1019-3291: Security Advisory - linux - CVE-2019-18786 LIN1019-3514: Security Advisory - linux - CVE-2019-19055 LIN1019-3512: Security Advisory - linux - CVE-2019-19056 LIN1019-3511: Security Advisory - linux - CVE-2019-19057 LIN1019-3519: Security Advisory - linux - CVE-2019-19051 LIN1019-3518: Security Advisory - linux - CVE-2019-19052 LIN1019-3509: Security Advisory - linux - CVE-2019-19058 LIN1019-1882: Security Advisory - nasm - CVE-2019-14248 LIN1019-1880: Security Advisory - gdb - CVE-2019-1010180 LIN1019-2642: Security Advisory - hostapd&wpa-supplicant - CVE-2019-16275 LIN1019-3670: [DOC] issues in Wind River Linux Getting Started, LTS 19 LIN1019-3624: syslog-ng bug when including both 64- and 32-bits to SDK LIN1019-3580: u-boot-uenv_2.0 failed (do_deploy) of wrlinux_qemumips64_std-sato_faw_alldistro_debug_predefined_20 LIN1019-3646: ostree: Can not install one complete image into SD card which has been deployed one standard WIC image on xilinx-zynqmp target LIN1019-3644: [DOC] The kernel version (v4.18) should be updated in " Wind River Linux Kernel Development, LTS 19" LIN1019-3628: Incorrect path for container multiconfigs LIN1019-3607: python3-config: No module named 'distutils' LIN1019-3565: Security: ERROR: shadow-securetty-4.6-r3 do_package_write_rpm: Failed to import gpg key LIN1019-2868: ostree: error: Locking repo exclusive failed: Resource temporarily unavailable LIN1019-2711: feature/run-container: many build warnings LIN1019-2706: mkswap01_sh in LTP failed on xilinx-zynq/xilinx-zynqmp/intel-x86-64 LIN1019-3307: ostree: There are some systemd service failed due to No such file or directory in /var on NoAB model LIN1019-3314: OV: failed to run systemReport without lspci LIN1019-3263: intel-x86-64: WARNING: do_kernel_configcheck: [kernel config]: specified values did not make it into the kernel's final configuration when with wifi-usb.scc LIN1019-3261: do_populate_sdk hang in build with feature feature/kernel-dev LIN1019-3208: [BTS]Errors were found during bcm-2xxx-rpi4 BSP target boot up LIN1019-3210: [BTS]"dma_kernel_test" test failed on bcm-2xxx-rpi4 BSP target LIN1019-3212: Kernel build warnings found on bcm-2xxx-rpi4 BSP LIN1019-3404: ostree: There is no boot.scr for multilib rootfs on xilinx-zynqmp bsp LIN1019-3341: xilinx-zynq: dio in LTP failed dio to kworker/u5:8: page allocation failure LIN1019-3334: nodistro project for ti-am335x compiled failed LIN1019-3264: wrlinux-image-std do_image_ostree failed: gpg signing failed: No secret key LIN1019-3042: intel-x86-64: There is one call trace for rt+cgl kernel on nuc7 target LIN1019-3200: "aplay -l" command return null device name on xilinx-zynqmp BSP LIN1019-3369: OverC networking can fail at startup LIN1019-3257: [KTS] create cgroup ("cgroup_ad-hoc") failed on bcm-2xxx-rpi4 BSP target LIN1019-2094: rmmod wmi_bmof print calltrace LIN1019-2202: It fails to create folder/document/properties on Xfce4 desktop after kill process Thunar LIN1019-2078: blueman-manager: unexpected log msg ======================= 10.19.45.1 =============================== LIN1019-3669: Security Advisory - linux - CVE-2018-12207 LIN1019-2762: Security Advisory - linux - CVE-2019-17133 LIN1019-2790: Security Advisory - e2fsprogs - CVE-2019-5094 LIN1019-3480: Security Advisory - linux - CVE-2019-19081 LIN1019-2993: Security Advisory - linux - CVE-2019-17666 LIN1019-3481: Security Advisory - linux - CVE-2019-19080 LIN1019-2918: Security Advisory - rsyslog - CVE-2019-17041 LIN1019-1399: Security Advisory - linux - CVE-2019-12454 LIN1019-1398: Security Advisory - linux - CVE-2019-12455 LIN1019-1513: Security Advisory - linux - CVE-2019-12456 LIN1019-230: Security Advisory - tcpdump - CVE-2017-16808 LIN1019-3067: It should remove description of 'oeqa' in README file of template feature/run-container.