1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux LTS 19 release. This RCPL provides fixes for known problems. For information on updating your projects, see the Product Updates section of the Wind River Linux Getting Started guide. https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/tfk1473951651031.html The update procedure involves updating your projectDir/wrlinux-x repository, and then re-running the setup.sh program with the original arguments. The procedure for upgrading your project is shown in the Updating Wind River Linux section of that guide: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html 2.0 RCPL Update Implementation The distribution is a set of git repositories that are used to generate project directories at setup time. An RCPL appends new fixes to these repositories. As a result, the git repositories can grow with each new RCPL. The product name branches include two specific branch names. The first is a continuous integration branch. The continuous integration branch tracks the latest RCPL version release by Wind River, and does not include an RCPL number. For example: * WRLINUX_10_19_BASE * WRLINUX_10_19_LTS These branches will always match the latest released RCPL. The second branch name is RCPL-specific, with a reference to a specific RCPL, such as: * WRLINUX_10_19_BASE_UPDATE0001 * WRLINUX_10_19_LTS_RCPL0002 To identify which branch you are on, run the following commands: $ cd projectDir/wrlinux-x $ git branch 3.0 Selecting a specific RCPL Follow the procedure as indicated in the Updating Wind River Linux section of the Wind River Linux Getting Started guide located at: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html In step 3, of the procedure you will use the branchName of the RCPL that you wish to use. For example: $ git checkout WRLINUX_10_19_LTS_RCPL0002 4.0 Change Log The following is a summary of the changes made in each RCPL version. The initial product distribution occurred with RCPL0001. Defect List: ======================= 10.19.45.18 =============================== LIN1019-5486: Security Advisory - linux - CVE-2020-26541 LIN1019-6272: Security Advisory - samba - CVE-2020-27840 LIN1019-6327: Security Advisory - ruby - CVE-2021-28965 LIN1019-6632: Security Advisory - linux - CVE-2020-26145 LIN1019-6631: Security Advisory - linux - CVE-2020-26141 LIN1019-6629: Security Advisory - ffmpeg - CVE-2020-22034 LIN1019-6627: Security Advisory - ffmpeg - CVE-2020-22032 LIN1019-6615: Security Advisory - linux - CVE-2021-22543 LIN1019-6612: Security Advisory - dhcp - CVE-2021-25217 LIN1019-6611: Security Advisory - ffmpeg - CVE-2020-22026 LIN1019-6609: Security Advisory - ffmpeg - CVE-2020-22028 LIN1019-6608: Security Advisory - ffmpeg - CVE-2020-22024 LIN1019-6606: Security Advisory - ffmpeg - CVE-2020-22020 LIN1019-6605: Security Advisory - ffmpeg - CVE-2020-22019 LIN1019-6603: Security Advisory - ffmpeg - CVE-2020-20451 LIN1019-6640: Security Advisory - libgcrypt - CVE-2021-33560 LIN1019-6645: Security Advisory - linux - CVE-2020-26558 LIN1019-6659: Security Advisory - ffmpeg - CVE-2020-22044 LIN1019-6658: Security Advisory - ffmpeg - CVE-2020-22043 LIN1019-6656: Security Advisory - ffmpeg - CVE-2020-22041 LIN1019-6655: Security Advisory - ffmpeg - CVE-2020-22040 LIN1019-6654: Security Advisory - ffmpeg - CVE-2020-22039 LIN1019-6651: Security Advisory - ffmpeg - CVE-2020-22036 LIN1019-6650: Security Advisory - ffmpeg - CVE-2020-22035 LIN1019-6619: Security Advisory - ffmpeg - CVE-2020-22016 LIN1019-6626: Security Advisory - ffmpeg - CVE-2020-22031 LIN1019-6625: Security Advisory - ffmpeg - CVE-2020-22030 LIN1019-6624: Security Advisory - ffmpeg - CVE-2020-22029 LIN1019-6623: Security Advisory - ffmpeg - CVE-2020-22027 LIN1019-6622: Security Advisory - ffmpeg - CVE-2020-22023 LIN1019-6621: Security Advisory - ffmpeg - CVE-2020-22022 LIN1019-6620: Security Advisory - ffmpeg - CVE-2020-22017 LIN1019-6530: Security Advisory - ceph - CVE-2021-3524 LIN1019-6526: Security Advisory - thunar - CVE-2021-32563 LIN1019-6525: Security Advisory - linux - CVE-2021-32399 LIN1019-6513: Security Advisory - postgresql - CVE-2021-32027 LIN1019-6512: Security Advisory - postgresql - CVE-2021-32028 LIN1019-6510: Security Advisory - kubernetes - CVE-2021-20206 LIN1019-6501: Security Advisory - qemu - CVE-2021-3527 LIN1019-6490: Security Advisory - python3-django - CVE-2021-31542 LIN1019-6487: Security Advisory - python3-django - CVE-2021-32052 LIN1019-6552: Security Advisory - linux - CVE-2021-33034 LIN1019-6551: Security Advisory - linux - CVE-2021-33033 LIN1019-6549: Security Advisory - linux - CVE-2020-27830 LIN1019-6543: Security Advisory - postgresql - CVE-2021-32029 LIN1019-6542: Security Advisory - libxml2 - CVE-2021-3541 LIN1019-6582: Security Advisory - go - CVE-2021-33197 LIN1019-6618: Security Advisory - linux - CVE-2021-33200 LIN1019-6562: Security Advisory - libsolv - CVE-2021-3200 LIN1019-6559: Security Advisory - kubernetes - CVE-2021-25737 LIN1019-6558: Security Advisory - libx11 - CVE-2021-31535 LIN1019-6568: Security Advisory - go - CVE-2021-33195 LIN1019-6409: Security Advisory - mariadb - CVE-2021-2166 LIN1019-6406: Security Advisory - mariadb - CVE-2021-2154 LIN1019-6649: Security Advisory - python3-pygments - CVE-2021-27291 LIN1019-6598: Security Advisory - curl - CVE-2021-22897 LIN1019-6596: Security Advisory - nginx - CVE-2021-23017 LIN1019-6594: Security Advisory - linux - CVE-2021-3564 LIN1019-6589: Security Advisory - ffmpeg - CVE-2020-20448 LIN1019-6588: Security Advisory - ffmpeg - CVE-2020-20446 LIN1019-6587: Security Advisory - ffmpeg - CVE-2020-20445 LIN1019-6599: Security Advisory - curl - CVE-2021-22898 LIN1019-6537: Security Advisory - linux - CVE-2020-26147 LIN1019-6535: Security Advisory - linux - CVE-2020-26139 LIN1019-6534: Security Advisory - linux - CVE-2020-24588 LIN1019-6533: Security Advisory - linux - CVE-2020-24587 LIN1019-6532: Security Advisory - linux - CVE-2020-24586 LIN1019-6554: Security Advisory - ceph - CVE-2021-3531 LIN1019-6553: Security Advisory - ceph - CVE-2021-3509 LIN1019-6375: Security Advisory - linux - CVE-2021-29155 LIN1019-6355: Security Advisory - kubernetes - CVE-2021-25735 LIN1019-6813: Security Advisory - linux - CVE-2021-35039 LIN1019-6779: Security Advisory - glibc - CVE-2021-35942 LIN1019-6766: Security Advisory - linux - CVE-2020-28097 LIN1019-6816: Security Advisory - ruby - CVE-2021-32066 LIN1019-6815: Security Advisory - ruby - CVE-2021-31810 LIN1019-6795: Security Advisory - libsepol - CVE-2021-36086 LIN1019-6794: Security Advisory - libsepol - CVE-2021-36085 LIN1019-6793: Security Advisory - libsepol - CVE-2021-36084 LIN1019-6731: Security Advisory - linux - CVE-2021-34693 LIN1019-6730: Security Advisory - qemu - CVE-2021-3595 LIN1019-6745: Security Advisory - linux - CVE-2021-32078 LIN1019-6723: Security Advisory - bluez - CVE-2021-0129 LIN1019-6703: Security Advisory - python3-pygments - CVE-2021-20270 LIN1019-6701: Security Advisory - linux - CVE-2021-0512 LIN1019-6700: Security Advisory - linux - CVE-2021-0605 LIN1019-6697: Security Advisory - linux - CVE-2020-36385 LIN1019-6708: Security Advisory - linux - CVE-2021-3587 LIN1019-6707: Security Advisory - linux - CVE-2021-3573 LIN1019-6705: Security Advisory - linux - CVE-2021-0129 LIN1019-6712: Security Advisory - nettle - CVE-2021-3580 LIN1019-6711: Security Advisory - connman - CVE-2021-33833 LIN1019-6710: Security Advisory - python3-pip - CVE-2021-3572 LIN1019-6728: Security Advisory - qemu - CVE-2021-3593 LIN1019-6727: Security Advisory - qemu - CVE-2021-3592 LIN1019-6729: Security Advisory - qemu - CVE-2021-3594 LIN1019-6680: Security Advisory - apache2 - CVE-2020-35452 LIN1019-6679: Security Advisory - apache2 - CVE-2020-13950 LIN1019-6685: Security Advisory - polkit - CVE-2021-3560 LIN1019-6683: Security Advisory - apache2 - CVE-2021-30641 LIN1019-6682: Security Advisory - apache2 - CVE-2021-26691 LIN1019-6681: Security Advisory - apache2 - CVE-2021-26690 LIN1019-6670: Security Advisory - ffmpeg - CVE-2020-22056 LIN1019-6669: Security Advisory - ffmpeg - CVE-2020-22054 LIN1019-6668: Security Advisory - ffmpeg - CVE-2020-22051 LIN1019-6667: Security Advisory - ffmpeg - CVE-2020-22049 LIN1019-6666: Security Advisory - ffmpeg - CVE-2020-22048 LIN1019-6665: Security Advisory - ffmpeg - CVE-2020-22046 LIN1019-6260: Security Advisory - python-lxml - CVE-2021-28957 LIN1019-6660: Security Advisory - libjpeg-turbo - CVE-2020-17541 LIN1019-6565: Security Advisory - rxvt-unicode - CVE-2021-33477 LIN1019-6706: Security Advisory - intel-microcode - CVE-2021-24489 LIN1019-6718: Security Advisory - intel-microcode - CVE-2020-24513 LIN1019-6717: Security Advisory - intel-microcode - CVE-2020-24512 LIN1019-6716: Security Advisory - intel-microcode - CVE-2020-24511 LIN1019-6715: Security Advisory - intel-microcode - CVE-2020-24489 LIN1019-6714: Security Advisory - intel-microcode - CVE-2020-0549 LIN1019-6713: Security Advisory - intel-microcode - CVE-2020-0548 LIN1019-4053: Security Advisory - u-boot - CVE-2020-8432 LIN1019-6675: Security Advisory - gst-plugins-base - CVE-2021-3522 LIN1019-6485: [Target Installer] Installer can't install a bootable image LIN1019-6759: bpf: verifier: 32 FAILED selftests LIN1019-6722: general protection fault in nfs_mount LIN1019-6662: Broken monotonic timeouts ======================= 10.19.45.17 =============================== LIN1019-5140: Security Advisory - grub - CVE-2020-14311 LIN1019-5139: Security Advisory - grub - CVE-2020-14310 LIN1019-5138: Security Advisory - grub - CVE-2020-14309 LIN1019-5137: Security Advisory - grub - CVE-2020-10713 LIN1019-5134: Security Advisory - grub - CVE-2020-15705 LIN1019-5133: Security Advisory - grub - CVE-2020-14308 LIN1019-5132: Security Advisory - grub - CVE-2020-15706 LIN1019-5131: Security Advisory - grub - CVE-2020-15707 LIN1019-5458: Security Advisory - tigervnc - CVE-2020-26117 LIN1019-5637: Security Advisory - linux - CVE-2020-25671 LIN1019-5636: Security Advisory - linux - CVE-2020-25670 LIN1019-6275: Security Advisory - openssl - CVE-2021-3449 LIN1019-6276: Security Advisory - openssl - CVE-2021-3450 LIN1019-6269: Security Advisory - linux - CVE-2021-3444 LIN1019-6314: Security Advisory - redis - CVE-2021-3470 LIN1019-6311: Security Advisory - samba - CVE-2021-20277 LIN1019-6312: Security Advisory - curl - CVE-2021-22876 LIN1019-6308: Security Advisory - linux - CVE-2021-29650 LIN1019-6305: Security Advisory - linux - CVE-2021-29647 LIN1019-6290: Security Advisory - rpm - CVE-2021-20271 LIN1019-6289: Security Advisory - rpm - CVE-2021-3421 LIN1019-6287: Security Advisory - linux - CVE-2021-29265 LIN1019-6286: Security Advisory - linux - CVE-2021-29264 LIN1019-6346: Security Advisory - binutils - CVE-2021-3487 LIN1019-6347: Security Advisory - linux - CVE-2021-29154 LIN1019-6348: Security Advisory - python3-django - CVE-2021-28658 LIN1019-6336: Security Advisory - linux - CVE-2021-3483 LIN1019-6334: Security Advisory - linux - CVE-2020-36312 LIN1019-6333: Security Advisory - linux - CVE-2020-36311 LIN1019-6332: Security Advisory - linux - CVE-2020-36310 LIN1019-6326: Security Advisory - linux - CVE-2021-30002 LIN1019-6262: Security Advisory - linux - CVE-2021-28971 LIN1019-6261: Security Advisory - linux - CVE-2021-28964 LIN1019-6263: Security Advisory - linux - CVE-2021-28972 LIN1019-6255: Security Advisory - libdnf - CVE-2021-3445 LIN1019-6258: Security Advisory - cairo - CVE-2020-35492 LIN1019-6256: Security Advisory - mariadb - CVE-2021-27928 LIN1019-6254: Security Advisory - busybox - CVE-2021-28831 LIN1019-6251: Security Advisory - linux - CVE-2020-27170 LIN1019-6252: Security Advisory - linux - CVE-2020-27171 LIN1019-6241: Security Advisory - linux - CVE-2020-35519 LIN1019-6243: Security Advisory - linux - CVE-2021-28660 LIN1019-6240: Security Advisory - dnsmasq - CVE-2021-3448 LIN1019-6242: Security Advisory - linux - CVE-2021-3428 LIN1019-6233: Security Advisory - linux - CVE-2021-28375 LIN1019-6506: Security Advisory - libxml2 - CVE-2021-3537 LIN1019-6502: Security Advisory - linux - CVE-2021-23134 LIN1019-6488: Security Advisory - linux - CVE-2021-31829 LIN1019-6486: Security Advisory - linux - CVE-2021-31916 LIN1019-6322: Security Advisory - nettle - CVE-2021-20305 LIN1019-6466: Security Advisory - bind - CVE-2021-25215 LIN1019-6465: Security Advisory - bind - CVE-2021-25214 LIN1019-6464: Security Advisory - libxml2 - CVE-2021-3518 LIN1019-6463: Security Advisory - libxml2 - CVE-2021-3517 LIN1019-6462: Security Advisory - libxml2 - CVE-2021-3516 LIN1019-6469: Security Advisory - lz4 - CVE-2021-3520 LIN1019-6033: Security Advisory - qemu - CVE-2021-3392 LIN1019-6078: Security Advisory - openssl - CVE-2021-23839 LIN1019-6080: Security Advisory - openssl - CVE-2021-23841 LIN1019-6079: Security Advisory - openssl - CVE-2021-23840 LIN1019-6052: Security Advisory - docker - CVE-2020-15257 LIN1019-6097: Security Advisory - binutils - CVE-2021-20197 LIN1019-6091: Security Advisory - subversion - CVE-2020-17525 LIN1019-6090: Security Advisory - qemu - CVE-2021-3409 LIN1019-6223: Security Advisory - glib-2.0 - CVE-2021-27219 LIN1019-6222: Security Advisory - glib-2.0 - CVE-2021-27218 LIN1019-6216: Security Advisory - glib-2.0 - CVE-2021-28153 LIN1019-6208: Security Advisory - go - CVE-2021-27918 LIN1019-6200: Security Advisory - git - CVE-2021-21300 LIN1019-6202: Security Advisory - tiff - CVE-2020-35522 LIN1019-6201: Security Advisory - tiff - CVE-2020-35521 LIN1019-6191: Security Advisory - linux - CVE-2021-27363 LIN1019-6183: Security Advisory - linux - CVE-2021-28038 LIN1019-6182: Security Advisory - linux - CVE-2021-27365 LIN1019-6181: Security Advisory - linux - CVE-2021-27364 LIN1019-6186: Security Advisory - linux - CVE-2020-25639 LIN1019-6206: Security Advisory - python - CVE-2021-3426 LIN1019-6205: Security Advisory - gnutls - CVE-2021-20232 LIN1019-6194: Security Advisory - docker - CVE-2020-13401 LIN1019-6160: Security Advisory - grub - CVE-2020-25632 LIN1019-6159: Security Advisory - grub - CVE-2020-14372 LIN1019-6164: Security Advisory - grub - CVE-2021-3418 LIN1019-6163: Security Advisory - grub - CVE-2020-27779 LIN1019-6162: Security Advisory - grub - CVE-2020-27749 LIN1019-6161: Security Advisory - grub - CVE-2020-25647 LIN1019-6166: Security Advisory - grub - CVE-2021-20233 LIN1019-6165: Security Advisory - grub - CVE-2021-20225 LIN1019-6153: Security Advisory - tiff - CVE-2020-35524 LIN1019-6152: Security Advisory - tiff - CVE-2020-35523 LIN1019-6138: Security Advisory - qemu - CVE-2021-3416 LIN1019-6130: Security Advisory - glibc - CVE-2021-27645 LIN1019-6380: Security Advisory - linux - CVE-2021-3506 LIN1019-6004: Security Advisory - qemu - CVE-2021-20203 LIN1019-6617: Security Advisory - python-urllib3 - CVE-2021-33503 LIN1019-6371: Security Advisory - qemu - CVE-2020-35504 LIN1019-6372: Security Advisory - qemu - CVE-2020-35505 LIN1019-6360: Security Advisory - linux - CVE-2020-36322 LIN1019-6357: Security Advisory - ceph - CVE-2021-20288 LIN1019-5854: Security Advisory - binutils - CVE-2020-35494 LIN1019-6765: Security Advisory - linux - CVE-2021-3600 LIN1019-6353: Security Advisory - xserver-xorg - CVE-2021-3472 LIN1019-6325: Security Advisory - hostapd&wpa-supplicant - CVE-2021-30004 LIN1019-6379: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3498 LIN1019-6378: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3497 LIN1019-6300: Centos 7: grub-efi-native: failed (do_compile) LIN1019-6299: ldconfig missing from distribution features LIN1019-6484: [Warning] xmlsec1-1.2.28-r0 do_fetch failed. LIN1019-6195: do_populate_sdk silent gcc errors LIN1019-6154: [Warning] A few do_fetch warnings. LIN1019-6369: libssh2 fails with feature/openssl-no-weak-ciphers ======================= 10.19.45.16 =============================== LIN1019-5621: Security Advisory - glibc - CVE-2020-27618 LIN1019-5750: Security Advisory - qemu - CVE-2020-27821 LIN1019-5648: Security Advisory - go - CVE-2020-28367 LIN1019-5747: Security Advisory - curl - CVE-2020-8284 LIN1019-5748: Security Advisory - curl - CVE-2020-8285 LIN1019-5749: Security Advisory - curl - CVE-2020-8286 LIN1019-5705: Security Advisory - linux - CVE-2020-27815 LIN1019-5727: Security Advisory - glibc - CVE-2020-29573 LIN1019-5728: Security Advisory - glibc - CVE-2020-29562 LIN1019-5782: Security Advisory - binutils - CVE-2020-16592 LIN1019-5612: Security Advisory - linux - CVE-2020-25656 LIN1019-5487: Security Advisory - libproxy - CVE-2020-26154 LIN1019-4592: Security Advisory - libcroco - CVE-2020-12825 LIN1019-6121: Security Advisory - libexif - CVE-2020-0182 LIN1019-6108: Security Advisory - linux - CVE-2020-35508 LIN1019-6066: Security Advisory - screen - CVE-2021-26937 LIN1019-6065: Security Advisory - openldap - CVE-2021-27212 LIN1019-6032: Security Advisory - php - CVE-2021-21702 LIN1019-6039: Security Advisory - tar - CVE-2021-20193 LIN1019-6034: Security Advisory - qemu - CVE-2021-20221 LIN1019-6009: Security Advisory - python3-django - CVE-2021-3281 LIN1019-6082: Security Advisory - linux - CVE-2021-26931 LIN1019-6081: Security Advisory - linux - CVE-2021-26930 LIN1019-6083: Security Advisory - linux - CVE-2021-26932 LIN1019-6070: Security Advisory - bind - CVE-2020-8625 LIN1019-6068: Security Advisory - openvswitch - CVE-2020-35498 LIN1019-6087: Security Advisory - python - CVE-2021-23336 LIN1019-6088: Security Advisory - postgresql - CVE-2021-3393 LIN1019-6022: Security Advisory - docker - CVE-2021-3121 LIN1019-6018: Security Advisory - docker - CVE-2021-21285 LIN1019-6017: Security Advisory - docker - CVE-2021-21284 LIN1019-6021: Security Advisory - docker - CVE-2020-9283 LIN1019-6010: Security Advisory - phpmyadmin - CVE-2021-21252 LIN1019-6050: Security Advisory - connman - CVE-2021-26676 LIN1019-6049: Security Advisory - connman - CVE-2021-26675 LIN1019-6042: Security Advisory - linux - CVE-2021-0342 LIN1019-6146: Security Advisory - redis - CVE-2021-21309 LIN1019-6137: Security Advisory - dropbear - CVE-2020-36254 LIN1019-6005: Security Advisory - linux - CVE-2021-3347 LIN1019-5912: Security Advisory - openjpeg - CVE-2020-27823 LIN1019-5913: Security Advisory - openjpeg - CVE-2020-27824 LIN1019-5911: Security Advisory - openjpeg - CVE-2020-27814 LIN1019-5910: Security Advisory - php - CVE-2020-7071 LIN1019-5908: Security Advisory - qemu - CVE-2020-29443 LIN1019-5924: Security Advisory - python - CVE-2021-3177 LIN1019-5926: Security Advisory - libsdl2 - CVE-2020-14409 LIN1019-5925: Security Advisory - linux - CVE-2021-3178 LIN1019-5927: Security Advisory - libsdl2 - CVE-2020-14410 LIN1019-5909: Security Advisory - qemu - CVE-2021-20181 LIN1019-5993: Security Advisory - openldap - CVE-2020-36226 LIN1019-5992: Security Advisory - openldap - CVE-2020-36225 LIN1019-5991: Security Advisory - openldap - CVE-2020-36224 LIN1019-5990: Security Advisory - openldap - CVE-2020-36223 LIN1019-5989: Security Advisory - openldap - CVE-2020-36222 LIN1019-5988: Security Advisory - openldap - CVE-2020-36221 LIN1019-5997: Security Advisory - openldap - CVE-2020-36230 LIN1019-5996: Security Advisory - openldap - CVE-2020-36229 LIN1019-5994: Security Advisory - openldap - CVE-2020-36227 LIN1019-5995: Security Advisory - openldap - CVE-2020-36228 LIN1019-5984: Security Advisory - sudo - CVE-2021-3156 LIN1019-5970: Security Advisory - go - CVE-2021-3114 LIN1019-5920: Security Advisory - dnsmasq - CVE-2020-25685 LIN1019-5919: Security Advisory - dnsmasq - CVE-2020-25684 LIN1019-5921: Security Advisory - dnsmasq - CVE-2020-25686 LIN1019-5922: Security Advisory - dnsmasq - CVE-2020-25687 LIN1019-5893: Security Advisory - openldap - CVE-2020-25710 LIN1019-5892: Security Advisory - openldap - CVE-2020-25709 LIN1019-5883: Security Advisory - ceph - CVE-2020-25678 LIN1019-6002: Security Advisory - glibc - CVE-2021-3326 LIN1019-5916: Security Advisory - dnsmasq - CVE-2020-25681 LIN1019-5918: Security Advisory - dnsmasq - CVE-2020-25683 LIN1019-5896: Security Advisory - sudo - CVE-2021-23239 LIN1019-5897: Security Advisory - sudo - CVE-2021-23240 LIN1019-5891: Security Advisory - linux - CVE-2021-20177 LIN1019-5889: Security Advisory - linux - CVE-2020-28374 LIN1019-5858: Security Advisory - linux - CVE-2020-36158 LIN1019-5855: Security Advisory - binutils - CVE-2020-35495 LIN1019-5850: Security Advisory - glibc - CVE-2019-25013 LIN1019-5853: Security Advisory - binutils - CVE-2020-35493 LIN1019-5631: Security Advisory - python-cryptography - CVE-2020-25659 LIN1019-5503: Security Advisory - glibc - CVE-2016-10228 LIN1019-6036: Security Advisory - hostapd&wpa-supplicant - CVE-2021-0326 LIN1019-6147: Security Advisory - hostapd&wpa-supplicant - CVE-2021-27803 LIN1019-5894: Security Advisory - python-py - CVE-2020-29651 LIN1019-5928: Security Advisory - gst-plugins-bad - CVE-2021-3185 LIN1019-5453: openssl-disable-weak-ciphers: ecdh and ecdsa not in openssl disabled list LIN1019-5628: WARNING: python3-requests-toolbelt-0.9.1-r0 do_fetch: python3-requests-toolbelt is not supported by Wind River Linux. LIN1019-6095: Adding gpio-xilinx patch LIN1019-6057: fix libpcap 1.0.9 bug LIN1019-5987: Disables IMAGE_ROOTFS_EXTRA_SPACE for wic images LIN1019-5978: Libvirtd crash LIN1019-5980: DHCP - dhcrelay not always able to detect BOOTP replies LIN1019-5799: Call Trace : WARNING: CPU: 1 PID: 136 at fs/eventfd.c:73 eventfd_signal+0x85/0xa0 ======================= 10.19.45.15 =============================== LIN1019-5785: Security Advisory - linux - CVE-2020-29661 LIN1019-5665: Security Advisory - linux - CVE-2020-28915 LIN1019-5667: Security Advisory - linux - CVE-2020-28941 LIN1019-5642: Security Advisory - linux - CVE-2020-8694 LIN1019-5635: Security Advisory - linux - CVE-2020-25668 LIN1019-5634: Security Advisory - linux - CVE-2020-25704 LIN1019-5626: Security Advisory - krb5 - CVE-2020-28196 LIN1019-5768: Security Advisory - openssl - CVE-2020-1971 LIN1019-5744: Security Advisory - openldap - CVE-2020-25692 LIN1019-5701: Security Advisory - qemu - CVE-2020-25624 LIN1019-5684: Security Advisory - linux - CVE-2020-27777 LIN1019-5683: Security Advisory - linux - CVE-2020-25669 LIN1019-5723: Security Advisory - linux - CVE-2020-14351 LIN1019-5729: Security Advisory - qemu - CVE-2020-28916 LIN1019-5689: Security Advisory - qemu - CVE-2020-29130 LIN1019-5688: Security Advisory - qemu - CVE-2020-29129 LIN1019-5786: Security Advisory - linux - CVE-2020-29660 LIN1019-5541: Security Advisory - python3 - CVE-2020-27619 LIN1019-5693: Security Advisory - linux - CVE-2020-29371 LIN1019-5493: Security Advisory - ruby - CVE-2020-25613 LIN1019-5838: Security Advisory - qemu - CVE-2020-11947 LIN1019-5837: Security Advisory - qemu - CVE-2019-20808 LIN1019-5879: Security Advisory - dbus - CVE-2020-35512 LIN1019-5864: Security Advisory - openjpeg - CVE-2020-27841 LIN1019-5866: Security Advisory - openjpeg - CVE-2020-27843 LIN1019-5868: Security Advisory - openjpeg - CVE-2020-27845 LIN1019-5865: Security Advisory - openjpeg - CVE-2020-27842 LIN1019-5846: Security Advisory - ffmpeg - CVE-2020-35965 LIN1019-5845: Security Advisory - ffmpeg - CVE-2020-35964 LIN1019-5809: Security Advisory - p11-kit - CVE-2020-29361 LIN1019-5806: Security Advisory - ceph - CVE-2020-27781 LIN1019-5807: Security Advisory - p11-kit - CVE-2020-29362 LIN1019-5808: Security Advisory - p11-kit - CVE-2020-29363 LIN1019-5798: Security Advisory - linux - CVE-2020-29569 LIN1019-5703: Security Advisory - xserver-xorg - CVE-2020-14360 LIN1019-5704: Security Advisory - xserver-xorg - CVE-2020-25712 LIN1019-5615: net-snmp: heap area of snmpd gets corrupted when running customer's sub agent LIN1019-5654: make modules_prepare: openssl/bio.h: No such file or directory LIN1019-5726: qemu-system-native failed when we build with qemuppc project LIN1019-5711: python3-native build failed with qemuppc project LIN1019-5699: Memory leak within ptpd2 daemon LIN1019-5860: [wraxl] tclap_1.2.2 failed (do_fetch) of wrlinux-std-sato_qemuarm_world_bp_predefined_19. LIN1019-5861: bison-native missing in syslog-ng’s recipe LIN1019-5823: [Warning] A few do_fetch warnings. LIN1019-5821: [tz-announce] 2020e release of tz code and data available LIN1019-5886: wlwifi-Qu-c0-hr from linux-firmware breaks opkg LIN1019-5881: [wraxl] celt051_git failed (do_fetch) of wrlinux_qemuppc_std_faw_alldistro_predefined_19-lts. LIN1019-5844: [tz-announce] 2020f release of tz code and data available LIN1019-5813: qemuarm: [Kernel warning] sch_generic.h:483:23: warning: unused variable 'qcb' [-Wunused-variable] LIN1019-994: Sometimes failed to build kernel script and kernel modules on sdk LIN1019-3977: bitbake nativesdk-openssl breaks when mingw layer is enabled ======================= 10.19.45.14 =============================== LIN1019-5253: Security Advisory - postgresql - CVE-2020-14350 LIN1019-5620: Security Advisory - libexif - CVE-2020-0452 LIN1019-5616: Security Advisory - tcpdump - CVE-2020-8037 LIN1019-5619: Security Advisory - mariadb - CVE-2020-15180 LIN1019-5660: Security Advisory - linux - CVE-2020-25705 LIN1019-5647: Security Advisory - go - CVE-2020-28366 LIN1019-5645: Security Advisory - postgresql - CVE-2020-25696 LIN1019-5644: Security Advisory - postgresql - CVE-2020-25695 LIN1019-5643: Security Advisory - postgresql - CVE-2020-25694 LIN1019-5633: Security Advisory - freetype - CVE-2020-15999 LIN1019-5632: Security Advisory - pacemaker - CVE-2020-25654 LIN1019-5625: Security Advisory - qemu - CVE-2020-27616 LIN1019-5624: Security Advisory - qemu - CVE-2020-27617 LIN1019-5591: Security Advisory - mariadb - CVE-2020-14765 LIN1019-5586: Security Advisory - mariadb - CVE-2020-14776 LIN1019-5582: Security Advisory - mariadb - CVE-2020-14789 LIN1019-5573: Security Advisory - mariadb - CVE-2020-14812 LIN1019-5724: Security Advisory - linux - CVE-2020-14381 LIN1019-5740: Security Advisory - linux - CVE-2020-27786 LIN1019-5674: Security Advisory - linux - CVE-2020-28974 LIN1019-5540: Security Advisory - linux - CVE-2020-27673 LIN1019-5539: Security Advisory - linux - CVE-2020-27675 LIN1019-5695: Security Advisory - linux - CVE-2020-29369 LIN1019-5694: Security Advisory - linux - CVE-2020-29370 LIN1019-5696: Security Advisory - linux - CVE-2020-29368 LIN1019-5448: Security Advisory - qemu - CVE-2020-25085 LIN1019-5492: Security Advisory - linux - CVE-2020-25641 LIN1019-5422: Security Advisory - libdbi-perl - CVE-2014-10402 LIN1019-3465: Security Advisory - intel-microcode - CVE-2019-11135 LIN1019-5680: python3-pysensors : import error. LIN1019-5623: ERROR: lvm2-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5622: ERROR: libdevmapper-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5630: do_patch error of u-boot-socfpga_v2019.04.bb with a lib32 image LIN1019-5629: WARNING: libssh2-1.9.0-r0 do_fetch: libssh2 is not supported by Wind River Linux. LIN1019-5650: lz4_1.9.2 failed (do_fetch) of wrlinux_qemux86-64_wrlinux_faw_alldistro_debug_predefined_19. LIN1019-5657: ERROR: lib32-python3-pysensors-0.0.4-r0 do_configure() failed ======================= 10.19.45.13 =============================== LIN1019-5480: Security Advisory - phpmyadmin - CVE-2020-26934 LIN1019-5479: Security Advisory - phpmyadmin - CVE-2020-26935 LIN1019-5518: Security Advisory - bluez5 - CVE-2020-27153 LIN1019-5512: Security Advisory - libarchive - CVE-2020-21674 LIN1019-5460: Security Advisory - dpdk - CVE-2020-14374 LIN1019-5464: Security Advisory - dpdk - CVE-2020-14378 LIN1019-5463: Security Advisory - dpdk - CVE-2020-14377 LIN1019-5462: Security Advisory - dpdk - CVE-2020-14376 LIN1019-5461: Security Advisory - dpdk - CVE-2020-14375 LIN1019-5537: Security Advisory - nss - CVE-2020-25648 LIN1019-5609: Security Advisory - samba - CVE-2020-14383 LIN1019-5608: Security Advisory - samba - CVE-2020-14323 LIN1019-5607: Security Advisory - samba - CVE-2020-14318 LIN1019-5505: Security Advisory - linux - CVE-2020-25645 LIN1019-5449: Security Advisory - qemu - CVE-2020-25084 LIN1019-5447: Security Advisory - qemu - CVE-2020-25625 LIN1019-5520: Security Advisory - linux - CVE-2020-12352 LIN1019-5521: Security Advisory - linux - CVE-2020-24490 LIN1019-5519: Security Advisory - linux - CVE-2020-12351 LIN1019-5499: Security Advisory - php - CVE-2020-7069 LIN1019-5498: Security Advisory - php - CVE-2020-7070 LIN1019-5494: Security Advisory - libvirt - CVE-2020-25637 LIN1019-5485: Security Advisory - python-urllib3 - CVE-2020-26137 LIN1019-5491: Security Advisory - linux - CVE-2020-25643 LIN1019-5472: intel-socfpga-64: ERROR: u-boot-socfpga-v2019.04+gitAUTOINC+8c4cd804d6-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5502: ERROR: intel-microcode-20190918 do_fetch() failed LIN1019-5527: Can't change rootfs size with IMAGE_ROOTFS_SIZE LIN1019-5469: ERROR: grpc-1.24.1-r0 do_package: QA Issue: grpc: Files/directories were installed but not shipped in any package: LIN1019-5468: ls1046a doesn't link up 10Gbps on 10G Copper Ethernet LIN1019-5593: [tz-announce] 2020d release of tz code and data available LIN1019-5523: SDK build issues LIN1019-5442: gdbm-native-1.18.1-r0 do_compile failed LIN1019-5432: kernel crash on cn96xx with RCPL0011 LIN1019-5500: [tz-announce] 2020c release of tz code and data available LIN1019-4059: Intermittent/random build failures when building with feature/ima ======================= 10.19.45.12 =============================== LIN1019-5305: Security Advisory - ceph - CVE-2020-1700 LIN1019-5286: Security Advisory - nss - CVE-2020-12403 LIN1019-5273: Security Advisory - bind - CVE-2020-8624 LIN1019-5272: Security Advisory - bind - CVE-2020-8623 LIN1019-5271: Security Advisory - bind - CVE-2020-8622 LIN1019-5284: Security Advisory - nss - CVE-2020-12401 LIN1019-5279: Security Advisory - nss - CVE-2020-12400 LIN1019-5314: Security Advisory - nss - CVE-2019-11756 LIN1019-5313: Security Advisory - nss - CVE-2019-11745 LIN1019-5310: Security Advisory - nss - CVE-2020-6829 LIN1019-5309: Security Advisory - nss - CVE-2019-17006 LIN1019-5308: Security Advisory - nss - CVE-2019-17023 LIN1019-5264: Security Advisory - qemu - CVE-2020-12829 LIN1019-5259: Security Advisory - linux - CVE-2020-14331 LIN1019-5243: Security Advisory - lua - CVE-2020-24371 LIN1019-5438: Security Advisory - samba - CVE-2020-1472 LIN1019-5385: Security Advisory - linux - CVE-2020-25220 LIN1019-5433: Security Advisory - linux - CVE-2020-14390 LIN1019-5402: Security Advisory - cups - CVE-2020-3898 LIN1019-5401: Security Advisory - cups - CVE-2019-8842 LIN1019-5376: Security Advisory - linux - CVE-2020-14386 LIN1019-5373: Security Advisory - php - CVE-2020-7068 LIN1019-5371: Security Advisory - libproxy - CVE-2020-25219 LIN1019-5414: Security Advisory - linux - CVE-2020-14385 LIN1019-5421: Security Advisory - cryptsetup - CVE-2020-14382 LIN1019-5415: Security Advisory - linux - CVE-2020-14314 LIN1019-5398: Security Advisory - cups - CVE-2019-2228 LIN1019-5457: Security Advisory - python - CVE-2020-26116 LIN1019-5329: Security Advisory - python3-django - CVE-2020-24583 LIN1019-5328: Security Advisory - python3-django - CVE-2020-24584 LIN1019-5324: Security Advisory - qemu - CVE-2020-14364 LIN1019-4842: Security Advisory - gcc - CVE-2020-13844 LIN1019-5357: Security Advisory - nasm - CVE-2020-24978 LIN1019-5356: Security Advisory - gnutls - CVE-2020-24659 LIN1019-5355: Security Advisory - libxml2 - CVE-2020-24977 LIN1019-5446: Security Advisory - linux - CVE-2020-26088 LIN1019-5390: Security Advisory - linux - CVE-2020-25284 LIN1019-5391: Security Advisory - linux - CVE-2020-25285 LIN1019-5339: Security Advisory - go - CVE-2020-24553 LIN1019-5292: Security Advisory - bison - CVE-2020-24240 LIN1019-5315: Security Advisory - librepo - CVE-2020-14352 LIN1019-5285: Security Advisory - nss - CVE-2020-12402 LIN1019-3049: Security Advisory - libssh2 - CVE-2019-17498 LIN1019-4216: Security Advisory - glibc - CVE-2020-6096 LIN1019-5255: Security Advisory - net-snmp - CVE-2020-15862 LIN1019-5254: Security Advisory - net-snmp - CVE-2020-15861 LIN1019-5413: Security Advisory - libdbi-perl - CVE-2020-14392 LIN1019-5412: Security Advisory - libdbi-perl - CVE-2020-14393 LIN1019-5430: Security Advisory - libdbi-perl - CVE-2019-20919 LIN1019-5326: Security Advisory - hostapd & wpa-supplicant - CVE-2020-12695 LIN1019-5059: SEC.1.3 Process Containment Using MAC-based Mechanism failed LIN1019-5021: fetch error of package ucarp LIN1019-5323: WARNING: libsign-native is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information. LIN1019-5473: ERROR: thin-provisioning-tools-0.8.5-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5477: ERROR: intel-microcode-20200609-r0 do_fetch() failed LIN1019-5471: initramfs-framework recipe contains bashism LIN1019-5383: ERROR: intel-pcm-2.3a-r0 do_fetch() failed LIN1019-5388: top crashing in WRL8 - cores found by QA LIN1019-5408: Request to backport patch from upstream: xfs: Fix tail rounding in xfs_alloc_file_space() LIN1019-5367: json-c only reads 11 objects LIN1019-5459: [WARNING] do_fetch warning "python-setuptools-scm-native is not supported by Wind River Linux" LIN1019-5409: Unable to run setup.sh for the xilinx-zynqmp BSP LIN1019-5351: [WARNING] linux-yocto-tiny-5.2.54 do_fetch: linux-yocto-tiny is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information LIN1019-5346: ERROR: ucarp-1.5.2-r0 do_fetch() failed without --dl-layers LIN1019-5426: spi-nor driver not working properly with Cypress flash s25fl064l - marvell-cn96xx LIN1019-5333: Manpage generation for sssd LIN1019-5345: [WARNING] compiling warning "WARNING: unmet direct dependencies detected for PINCTRL_IMX_SCU" of nxp-imx8 LIN1019-5332: [kernel rebase]"mmc1: unspecified timeout for CMD6 - use generic" logs are frequently displayed LIN1019-4366: Stratix10 FPGA reload fails on Linux kernel 5.2 ======================= 10.19.45.11 =============================== LIN1019-5295: Security Advisory - libx11 - CVE-2020-14363 LIN1019-5294: Security Advisory - libexif - CVE-2020-0198 LIN1019-5234: Security Advisory - ghostscript - CVE-2020-17538 LIN1019-5232: Security Advisory - ghostscript - CVE-2020-16310 LIN1019-5231: Security Advisory - ghostscript - CVE-2020-16309 LIN1019-5230: Security Advisory - ghostscript - CVE-2020-16308 LIN1019-5229: Security Advisory - ghostscript - CVE-2020-16307 LIN1019-5205: Security Advisory - trousers - CVE-2020-24330 LIN1019-5213: Security Advisory - ghostscript - CVE-2020-16291 LIN1019-5212: Security Advisory - ghostscript - CVE-2020-16290 LIN1019-5211: Security Advisory - ghostscript - CVE-2020-16289 LIN1019-5210: Security Advisory - ghostscript - CVE-2020-16288 LIN1019-5209: Security Advisory - ghostscript - CVE-2020-16287 LIN1019-5207: Security Advisory - trousers - CVE-2020-24332 LIN1019-5206: Security Advisory - trousers - CVE-2020-24331 LIN1019-5219: Security Advisory - ghostscript - CVE-2020-16297 LIN1019-5218: Security Advisory - ghostscript - CVE-2020-16296 LIN1019-5217: Security Advisory - ghostscript - CVE-2020-16295 LIN1019-5216: Security Advisory - ghostscript - CVE-2020-16294 LIN1019-5215: Security Advisory - ghostscript - CVE-2020-16293 LIN1019-5214: Security Advisory - ghostscript - CVE-2020-16292 LIN1019-5223: Security Advisory - ghostscript - CVE-2020-16301 LIN1019-5222: Security Advisory - ghostscript - CVE-2020-16300 LIN1019-5221: Security Advisory - ghostscript - CVE-2020-16299 LIN1019-5220: Security Advisory - ghostscript - CVE-2020-16298 LIN1019-5227: Security Advisory - ghostscript - CVE-2020-16305 LIN1019-5226: Security Advisory - ghostscript - CVE-2020-16304 LIN1019-5225: Security Advisory - ghostscript - CVE-2020-16303 LIN1019-5224: Security Advisory - ghostscript - CVE-2020-16302 LIN1019-5228: Security Advisory - ghostscript - CVE-2020-16306 LIN1019-5188: Security Advisory - apache2 - CVE-2020-11993 LIN1019-5186: Security Advisory - apache2 - CVE-2020-11984 LIN1019-5185: Security Advisory - apache2 - CVE-2020-9490 LIN1019-5158: Security Advisory - libx11 - CVE-2020-14344 LIN1019-5097: Security Advisory - kubernetes - CVE-2020-8559 LIN1019-5095: Security Advisory - lua - CVE-2020-15888 LIN1019-5268: Security Advisory - curl - CVE-2020-8231 LIN1019-5144: Security Advisory - linux - CVE-2020-16166 LIN1019-5192: Security Advisory - qemu - CVE-2020-16092 LIN1019-5100: Security Advisory - kubernetes - CVE-2020-8557 LIN1019-5076: Security Advisory - go - CVE-2020-15586 LIN1019-4997: Security Advisory - qemu - CVE-2020-10756 LIN1019-5252: Security Advisory - postgresql - CVE-2020-14349 LIN1019-5265: Security Advisory - libexif - CVE-2020-0093 LIN1019-5263: Security Advisory - sqlite3 - CVE-2020-6405 LIN1019-5261: Security Advisory - linux - CVE-2020-24394 LIN1019-5260: Security Advisory - linux - CVE-2020-14356 LIN1019-5113: Security Advisory - kubernetes - CVE-2020-8558 LIN1019-5110: Security Advisory - lua - CVE-2020-15945 LIN1019-5120: Security Advisory - qemu - CVE-2020-15863 LIN1019-5010: Security Advisory - linux - CVE-2019-19338 LIN1019-5416: Security Advisory - linux - CVE-2020-10781 LIN1019-5289: Security Advisory - nasm - CVE-2020-24241 LIN1019-5301: Security Advisory - libexif - CVE-2019-9278 LIN1019-5171: Security Advisory - go - CVE-2020-16845 LIN1019-4445: Security Advisory - glibc - CVE-2020-1752 LIN1019-3774: Security Advisory - linux - CVE-2019-19770 LIN1019-4352: Security Advisory - glibc - CVE-2020-1751 LIN1019-5159: Security Advisory - xserver-xorg - CVE-2020-14347 LIN1019-5299: Security Advisory - xserver-xorg - CVE-2020-14362 LIN1019-5298: Security Advisory - xserver-xorg - CVE-2020-14361 LIN1019-5297: Security Advisory - xserver-xorg - CVE-2020-14346 LIN1019-5296: Security Advisory - xserver-xorg - CVE-2020-14345 LIN1019-5287: OV: ovp-kvm kernel image boot failed LIN1019-5274: create-user-key-store.sh uses "weak" des3 cipher for private keys LIN1019-5235: nfs: Fix getxattr kernel panic and memory overflow LIN1019-5198: Feature 'features/sysrq.scc' not found LIN1019-5150: [WARNING] do_kernel_configcheck warnings of nxp-ls1046 LIN1019-5240: Can not build nginx_1.17.8 LIN1019-5193: dpdk_git failed (do_fetch) of wrlinux-std-sato_intel-x86-64_world_9-lts-cve. LIN1019-5194: x-session-manager has multiple providers with the same priority LIN1019-5105: libpam password change error log LIN1019-5108: xilinx-zynqmp : issue with flash partition getting erased and jffs2 file system access from uboot LIN1019-5288: cpuid.c:423:11: warning: unused variable f_pku LIN1019-5182: [nss] nss regression test fail, 9 sub cases fail LIN1019-4441: do_patch error with file bash-CVE-2019-18276.patch in a reconfigured build ======================= 10.19.45.10 =============================== LIN1019-4996: Security Advisory - nss - CVE-2020-12399 LIN1019-5258: Security Advisory - linux - CVE-2020-2732 LIN1019-5071: Security Advisory - curl - CVE-2020-8177 LIN1019-5070: Security Advisory - curl - CVE-2020-8169 LIN1019-5011: Security Advisory - python - CVE-2019-20907 LIN1019-5420: Security Advisory - linux - CVE-2020-10766 LIN1019-5418: Security Advisory - linux - CVE-2020-10767 LIN1019-5417: Security Advisory - linux - CVE-2020-10768 LIN1019-4983: Security Advisory - samba - CVE-2020-10760 LIN1019-4982: Security Advisory - samba - CVE-2020-14303 LIN1019-4988: Security Advisory - samba - CVE-2020-10730 LIN1019-4987: Security Advisory - samba - CVE-2020-10745 LIN1019-4885: Security Advisory - python3 - CVE-2020-14422 LIN1019-4831: Security Advisory - linux - CVE-2020-13974 LIN1019-4936: Security Advisory - sqlite3 - CVE-2020-15358 LIN1019-4935: Security Advisory - ntp - CVE-2020-15025 LIN1019-4938: Security Advisory - ceph - CVE-2020-10753 LIN1019-4957: Security Advisory - openjpeg - CVE-2020-15389 LIN1019-4953: Security Advisory - linux - CVE-2020-15393 LIN1019-4812: Security Advisory - perl - CVE-2020-10543 LIN1019-4811: Security Advisory - perl - CVE-2020-10878 LIN1019-4810: Security Advisory - perl - CVE-2020-12723 LIN1019-4808: Security Advisory - qemu - CVE-2020-13791 LIN1019-5348: Security Advisory - linux - CVE-2020-10720 LIN1019-4727: Security Advisory - qemu - CVE-2020-13362 LIN1019-4729: Security Advisory - qemu - CVE-2020-13253 LIN1019-4499: Security Advisory - linux - CVE-2020-12656 LIN1019-4500: Security Advisory - linux - CVE-2020-12655 LIN1019-4546: Security Advisory - linux - CVE-2020-12771 LIN1019-4940: Security Advisory - net-snmp - CVE-2019-20892 LIN1019-4951: ERROR: waffle-1.6.0-r0 do_configure: meson failed LIN1019-4972: iso-codes_4.3 failed (do_fetch) of wrlinux_qemuarm64_std-sato_faw_alldistro_predefined_19-lts. LIN1019-4932: NXP LS1028 BSP : error message "Can't get dma-channels." when booting the target LIN1019-4966: freediameter-ptest 2/12 failed LIN1019-4684: ERROR: qemu-native-2.7.0-r1 do_compile() failed LIN1019-3419: intel-x86-64: Failed to run sleepgraph in rt kernel on NUC7i5DNKE LIN1019-3248: OverC cube-server startup warnings ======================= 10.19.45.9 =============================== LIN1019-4900: Security Advisory - nginx - CVE-2019-9511 LIN1019-4904: Security Advisory - nginx - CVE-2019-9513 LIN1019-4841: Security Advisory - linux - CVE-2020-10732 LIN1019-4817: Security Advisory - kubernetes - CVE-2020-8555 LIN1019-4849: Security Advisory - libpcre - CVE-2020-14155 LIN1019-4844: Security Advisory - qemu - CVE-2020-1983 LIN1019-4832: Security Advisory - linux - CVE-2020-10757 LIN1019-4839: Security Advisory - qemu - CVE-2020-10761 LIN1019-4809: Security Advisory - qemu - CVE-2020-13765 LIN1019-4807: Security Advisory - qemu - CVE-2020-13800 LIN1019-4805: Security Advisory - sqlite3 - CVE-2020-13871 LIN1019-4816: Security Advisory - dbus - CVE-2020-12049 LIN1019-4815: Security Advisory - qemu - CVE-2020-10702 LIN1019-4658: Security Advisory - bind - CVE-2020-8617 LIN1019-4657: Security Advisory - bind - CVE-2020-8616 LIN1019-4788: Security Advisory - python3-django - CVE-2020-13596 LIN1019-4787: Security Advisory - python3-django - CVE-2020-9402 LIN1019-4784: Security Advisory - python3-django - CVE-2019-19118 LIN1019-4786: Security Advisory - python3-django - CVE-2020-7471 LIN1019-4785: Security Advisory - python3-django - CVE-2019-19844 LIN1019-4777: Security Advisory - openssh - CVE-2020-12062 LIN1019-4679: Security Advisory - linux - CVE-2020-10711 LIN1019-4814: Security Advisory - ffmpeg - CVE-2020-13904 LIN1019-4774: Security Advisory - gnutls - CVE-2020-13777 LIN1019-4770: Security Advisory - libvirt - CVE-2020-10703 LIN1019-4768: Security Advisory - systemd - CVE-2020-13776 LIN1019-4767: Security Advisory - qemu - CVE-2020-13659 LIN1019-4765: Security Advisory - linux - CVE-2019-20810 LIN1019-4766: Security Advisory - qemu - CVE-2020-13754 LIN1019-4726: Security Advisory - sqlite3 - CVE-2020-13630 LIN1019-4725: Security Advisory - sqlite3 - CVE-2020-13631 LIN1019-4724: Security Advisory - sqlite3 - CVE-2020-13632 LIN1019-4731: Security Advisory - linux - CVE-2020-10751 LIN1019-4498: Security Advisory - linux - CVE-2020-12657 LIN1019-4497: Security Advisory - linux - CVE-2020-12659 LIN1019-4776: Security Advisory - python3-django - CVE-2020-13254 LIN1019-4624: Security Advisory - linux - CVE-2020-12888 LIN1019-4418: Security Advisory - ffmpeg - CVE-2020-12284 LIN1019-3700: Security Advisory - linux - CVE-2019-19462 LIN1019-3379: Security Advisory - linux - CVE-2019-18814 LIN1019-4220: Security Advisory - kubernetes - CVE-2019-11254 LIN1019-4237: Security Advisory - gnutls - CVE-2020-11501 LIN1019-4245: Security Advisory - linux - CVE-2020-11565 LIN1019-4853: Security Advisory - nfs-utils - CVE-2019-3689 LIN1019-4829: Security Advisory - intel SRBDS - CVE-2020-0543 LIN1019-4773: Security Advisory - libjpeg-turbo - CVE-2020-13790 LIN1019-4899: Many BSPs failed to build: libmodulemd_git failed (do_fetch) LIN1019-4848: Request to backport upstream patch to fix lack of entropy LIN1019-4840: toolchain-shar-extract: ignore timestamp on decompress LIN1019-4827: Wrong permissions on module.tgz file. LIN1019-4834: "wrl-small" rootfs has 435MB directory with firmware LIN1019-4742: [WARNING] do_kernel_configcheck warnings in builds of nxp-ls1028 LIN1019-4615: Error doing "make scripts" in SDK ======================= 10.19.45.8 =============================== LIN1019-4881: Security Advisory - linux - CVE-2020-14416 LIN1019-4695: Security Advisory - sqlite3 - CVE-2020-13434 LIN1019-4694: Security Advisory - sqlite3 - CVE-2020-13435 LIN1019-4655: Security Advisory - php - CVE-2019-11048 LIN1019-4661: Security Advisory - dpdk - CVE-2020-10724 LIN1019-4660: Security Advisory - dpdk - CVE-2020-10723 LIN1019-4659: Security Advisory - dpdk - CVE-2020-10722 LIN1019-4728: Security Advisory - qemu - CVE-2020-13361 LIN1019-4678: Security Advisory - libexif - CVE-2020-13112 LIN1019-4677: Security Advisory - libexif - CVE-2020-13113 LIN1019-4676: Security Advisory - libexif - CVE-2020-13114 LIN1019-4511: Security Advisory - samba - CVE-2020-10704 LIN1019-4503: Security Advisory - linux - CVE-2020-12652 LIN1019-4502: Security Advisory - linux - CVE-2020-12653 LIN1019-4501: Security Advisory - linux - CVE-2020-12654 LIN1019-4452: Security Advisory - samba - CVE-2020-10700 LIN1019-4448: Security Advisory - linux - CVE-2020-12114 LIN1019-4449: Security Advisory - ruby - CVE-2020-10933 LIN1019-4644: Security Advisory - linux - CVE-2020-13143 LIN1019-4444: Security Advisory - linux - CVE-2020-11884 LIN1019-4443: Security Advisory - linux - CVE-2020-12464 LIN1019-4442: Security Advisory - linux - CVE-2020-12465 LIN1019-4591: Security Advisory - linux - CVE-2020-12826 LIN1019-4542: Security Advisory - linux - CVE-2020-10690 LIN1019-4548: Security Advisory - linux - CVE-2020-12769 LIN1019-4547: Security Advisory - linux - CVE-2020-12770 LIN1019-4549: Security Advisory - linux - CVE-2020-12768 LIN1019-4625: Security Advisory - apt - CVE-2020-3810 LIN1019-4584: Security Advisory - icu - CVE-2020-10531 LIN1019-4550: Security Advisory - libexif - CVE-2020-12767 LIN1019-4530: Security Advisory - qemu - CVE-2020-7211 LIN1019-4417: Security Advisory - libvirt - CVE-2020-12430 LIN1019-4419: Security Advisory - openldap - CVE-2020-12243 LIN1019-3979: Security Advisory - python - CVE-2020-8492 LIN1019-3776: Security Advisory - linux - CVE-2019-19768 LIN1019-4218: Security Advisory - apache2 - CVE-2020-1927 LIN1019-4217: Security Advisory - apache2 - CVE-2020-1934 LIN1019-4342: Security Advisory - mariadb - CVE-2020-2752 LIN1019-4340: Security Advisory - mariadb - CVE-2020-2760 LIN1019-4269: Security Advisory - linux - CVE-2020-11668 LIN1019-4190: Security Advisory - kubernetes - CVE-2020-8551 LIN1019-4189: Security Advisory - kubernetes - CVE-2020-8552 LIN1019-4320: Security Advisory - mariadb - CVE-2020-2812 LIN1019-4319: Security Advisory - mariadb - CVE-2020-2814 LIN1019-4254: Security Advisory - linux - CVE-2020-11608 LIN1019-4253: Security Advisory - linux - CVE-2020-11609 LIN1019-4732: Security Advisory - glib-networking - CVE-2020-13645 LIN1019-4551: Security Advisory - json-c - CVE-2020-12762 LIN1019-4687: Overlay memory leak - request to backport patch from upstream LIN1019-4672: mariadb_10.3.23.bb:do_compile() failed on xilinx_zynqmp LIN1019-4517: qemuarm: Internal error: Oops - BUG: 0 during boot LIN1019-4507: do_fetch errors of dce and u-boot-imx from git.freescale.com LIN1019-4506: ERROR: go-pty-git-r0 do_fetch: Fetcher failure LIN1019-4627: Creating initramfs Images - Wrong initramfs-install feature README LIN1019-4579: lttng-tools-ptest : 1/4859 failed LIN1019-4536: qemu-native_4.1.0.bb:do_compile() failed on Ubuntu-20.04 LIN1019-4606: OV: WARNING: Your host glibc verson (2.31) is newer than that in uninative (2.30) LIN1019-4605: OV: WARNING: Host distribution "ubuntu-20.04" has not been validated with this version of the build system LIN1019-4598: [WARNING] arm64/kernel/perf_regs.c:37:20: warning: array subscript 32 is above array bounds of 'u64[31]' LIN1019-4585: LTTng: vmalloc_sync_all symbol lookup failed LIN1019-4405: perf script can not parser backtrace in 64bit kernel and 32bit system. LIN1019-3037: do_compile warings of linux-yocto-5.2.17 on qemuarm BSPs LIN1019-3036: [WARNING] do_kernel_configcheck warnings of qemumips64 both on standard and next configs LIN1019-4257: [WARNING] compiling error of kernel "arm64/kernel/perf_callchain.c warning: cast from pointer to integer of different size" ======================= 10.19.45.7 =============================== LIN1019-4806: Security Advisory - ntp - CVE-2020-13817 LIN1019-4763: Security Advisory - linux - CVE-2019-20812 LIN1019-4403: Security Advisory - qemu - CVE-2020-11869 LIN1019-4400: Security Advisory - php - CVE-2020-7067 LIN1019-4390: Security Advisory - ceph - CVE-2020-1760 LIN1019-4373: Security Advisory - git - CVE-2020-11008 LIN1019-3085: Security Advisory - python - CVE-2019-18348 LIN1019-4012: Security Advisory - linux - CVE-2020-8647 LIN1019-4011: Security Advisory - linux - CVE-2020-8648 LIN1019-4010: Security Advisory - linux - CVE-2020-8649 LIN1019-3978: Security Advisory - linux - CVE-2020-8428 LIN1019-3716: Security Advisory - phpmyadmin - CVE-2019-19617 LIN1019-3775: Security Advisory - linux - CVE-2019-19769 LIN1019-3581: Security Advisory - phpmyadmin - CVE-2019-18622 LIN1019-3227: Security Advisory - php - CVE-2019-11043 LIN1019-4291: Security Advisory - git - CVE-2020-5260 LIN1019-4346: Security Advisory - ntp - CVE-2020-11868 LIN1019-4212: Security Advisory - systemd - CVE-2020-1712 LIN1019-4210: Security Advisory - php - CVE-2020-7064 LIN1019-4209: Security Advisory - php - CVE-2020-7065 LIN1019-4208: Security Advisory - php - CVE-2020-7066 LIN1019-4176: Security Advisory - linux - CVE-2020-10942 LIN1019-4079: Security Advisory - linux - CVE-2020-9383 LIN1019-4284: Security Advisory - ceph - CVE-2020-1759 LIN1019-4230: Security Advisory - linux - CVE-2020-11494 LIN1019-4231: Security Advisory - linux - CVE-2020-8835 LIN1019-4061: Security Advisory - linux - CVE-2020-8992 LIN1019-4280: Security Advisory - openssl - CVE-2020-1967 LIN1019-4262: Security Advisory - sqlite3 - CVE-2020-11655 LIN1019-4261: Security Advisory - sqlite3 - CVE-2020-11656 LIN1019-4267: Security Advisory - linux - CVE-2019-14615 LIN1019-4156: Security Advisory - u-boot - CVE-2020-10648 LIN1019-4393: make: occasional deadlock when using parallel build LIN1019-4385: Uprev request of timezone: 2020a release of tz code and data available LIN1019-2430: LTTNG issue with epoch negative clock offset LIN1019-3031: CGL: 2 kernel warnings on qemuppc LIN1019-3044: OverC builds will fail when passing '--all-layers' to setup.sh LIN1019-4248: need update ntp package to version 4.2.8p14 LIN1019-4247: file-native: build fails on ubu-16.04 LIN1019-4123: rngd takes 100% CPU time on startup Stratix10 LIN1019-4112: perf call graphs lack symbols when running 32-bit applications on a 64-bit LIN1019-4299: Request to port fix for kernel hang when allocating huge page LIN1019-4359: [WARNING] do_kernel_configcheck warnings on qemumips64 LIN1019-4272: The rng-tools_6.7.bbappend from layers/intel-socfpga/recipes-support/rng-tools/ wil be included in non-x86 archs LIN1019-4102: "Creating a LUKS Partition on a Storage Device" page is missing some vital info LIN1019-4239: ERROR: mariadb-10.3.22-r0 do_package_qa: QA Issue: mariadb-dbg package is not obeying usrmerge distro feature. /lib should be relocated to /usr. [usrmerge] LIN1019-4235: [WARNING] kernel warnings "Section mismatch in reference from the variable __pci_fixup_malta_pcnet32_ioports_fixup163 to the function .init.text:malta_pcnet32_ioports_fixup()" on qemumips LIN1019-4244: [lib32] openssh-ptest: openssh-ptest 1/51 failed LIN1019-4204: Remove "_append_" for the PACKAGECONFIG of qemu ======================= 10.19.45.6 =============================== LIN1019-2547: Security Advisory - sqlite - CVE-2019-16168 LIN1019-2546: Security Advisory - sysstat - CVE-2019-16167 LIN1019-2830: libgcrypt - CVE-2019-13627 LIN1019-2826: Security Advisory - python - CVE-2019-16935 LIN1019-2524: Security Advisory - python - CVE-2019-16056 LIN1019-4048: Security Advisory - linux - CVE-2019-3016 LIN1019-3983: Security Advisory - aspell - CVE-2019-20433 LIN1019-3768: Security Advisory - git - CVE-2019-1387 LIN1019-3767: Security Advisory - git - CVE-2019-1354 LIN1019-3766: Security Advisory - git - CVE-2019-1353 LIN1019-3765: Security Advisory - git - CVE-2019-1352 LIN1019-3764: Security Advisory - git - CVE-2019-1351 LIN1019-3763: Security Advisory - git - CVE-2019-1350 LIN1019-3762: Security Advisory - git - CVE-2019-1349 LIN1019-3760: Security Advisory - git - CVE-2019-1348 LIN1019-3748: Security Advisory - git - CVE-2019-19604 LIN1019-3697: Security Advisory - linux - CVE-2019-19525 LIN1019-3897: Security Advisory - cpio - CVE-2019-14866 LIN1019-3910: Security Advisory - nginx - CVE-2019-20372 LIN1019-2812: Security Advisory - go - CVE-2019-16276 LIN1019-2995: Security Advisory - mysql - CVE-2019-2974 LIN1019-3006: Security Advisory - mysql - CVE-2019-2938 LIN1019-2905: binutils - CVE-2019-17450 LIN1019-2904: binutils - CVE-2019-17451 LIN1019-3886: Security Advisory - qemu - CVE-2019-20175 LIN1019-1896: Security Advisory - mysql - CVE-2019-2805 LIN1019-1924: Security Advisory - mysql - CVE-2019-2737 LIN1019-1921: Security Advisory - mysql - CVE-2019-2740 LIN1019-1922: Security Advisory - mysql - CVE-2019-2739 LIN1019-3571: Security Advisory - linux - CVE-2019-19037 LIN1019-3566: Security Advisory - glibc - CVE-2019-19126 LIN1019-1913: Security Advisory - mysql - CVE-2019-2758 LIN1019-4013: Security Advisory - ipmitool - CVE-2020-5208 LIN1019-3957: Security Advisory - qemu - CVE-2020-7039 LIN1019-3950: Security Advisory - mariadb - CVE-2020-2574 LIN1019-1563: Security Advisory - bzip2 - CVE-2019-12900 LIN1019-972: Security Advisory - sssd - CVE-2018-16838 LIN1019-4111: Security Advisory - webkitgtk - CVE-2020-10018 LIN1019-4110: Security Advisory - glib-2.0 - CVE-2020-6750 LIN1019-4109: Security Advisory - glibc - CVE-2020-10029 LIN1019-4147: Security Advisory - go - CVE-2020-7919 LIN1019-4135: Security Advisory - bluez5 - CVE-2020-0556 LIN1019-4152: Security Advisory - postgresql - CVE-2020-1720 LIN1019-4155: Security Advisory - libvirt - CVE-2019-20485 LIN1019-4121: Security Advisory - python-urllib3 - CVE-2020-7212 LIN1019-4099: Security Advisory - gd - CVE-2017-6363 LIN1019-4095: Security Advisory - php - CVE-2020-7061 LIN1019-4094: Security Advisory - php - CVE-2020-7062 LIN1019-4093: Security Advisory - php - CVE-2020-7063 LIN1019-4116: Security Advisory - qemu - CVE-2019-20382 LIN1019-4070: Security Advisory - libarchive - CVE-2020-9308 LIN1019-4072: Security Advisory - sqlite3 - CVE-2020-9327 LIN1019-4165: Security Advisory - phpmyadmin - CVE-2020-10802 LIN1019-4164: Security Advisory - phpmyadmin - CVE-2020-10803 LIN1019-4159: Security Advisory - gnupg - CVE-2019-14855 LIN1019-4157: Security Advisory - phpmyadmin - CVE-2020-10804 LIN1019-4160: Security Advisory - freeradius - CVE-2019-17185 LIN1019-4148: Security Advisory - nagios-nrpe - CVE-2020-6581 LIN1019-4144: Security Advisory - nagios-nrpe - CVE-2020-6582 LIN1019-4025: Hardware RNG Entropy Gatherer Daemon slow stop LIN1019-3975: stmmac kernel crash - request to integrate patch LIN1019-3615: sysstat fails because of chkconfig error LIN1019-3803: stmmac debugfs entry shows incorrect device name after rename LIN1019-3389: Recipe oprofile blacklisted is still in white list at the same time LIN1019-1666: [BTS]Failures found during xilinx-zynqmp BSP ZCU102 target booting up LIN1019-4113: WRL 19 SPI controller registration bug LIN1019-4107: Native sstate package list generation failure LIN1019-4183: Creating initramfs Images - initramfs bundled image isn't installed correctly LIN1019-4185: ERROR: freeradius-3.0.19-r0 do_unpack: Fetcher failure LIN1019-4082: [WARNING] fetch warnings of package openl2tp LIN1019-4081: [WARNING] "host/xhci-pci.c:522:13: warning: 'xhci_pci_shutdown' defined but not used" in build of qemumips&qemumips64 LIN1019-4150: libpam: pam_userdb.so is not built even though libdb(Berkeley DB) exist LIN1019-4058: IMA Denial testcases: "windriver" password not working LIN1019-4057: IMA Denial testcases: document GPG homedir path length limit(80 characters) ======================= 10.19.45.5 =============================== LIN1019-4035: Security Advisory - gd - CVE-2018-14553 LIN1019-4032: Security Advisory - qemu - CVE-2020-1711 LIN1019-4004: Security Advisory - python - CVE-2019-9674 LIN1019-4047: Security Advisory - kubernetes - CVE-2019-11251 LIN1019-4027: Security Advisory - php - CVE-2020-7059 LIN1019-3986: Security Advisory - sudo - CVE-2019-18634 LIN1019-3985: Security Advisory - openjpeg - CVE-2020-8112 LIN1019-3704: Security Advisory - linux - CVE-2019-14897 LIN1019-3703: Security Advisory - linux - CVE-2019-14901 LIN1019-3965: Security Advisory - libxml2 - CVE-2019-20388 LIN1019-3665: Security Advisory - linux - CVE-2019-14896 LIN1019-2634: Security Advisory - linux - CVE-2019-16232 LIN1019-3517: Security Advisory - linux - CVE-2019-19053 LIN1019-3922: Security Advisory - openjpeg - CVE-2020-6851 LIN1019-4073: Security Advisory - screen - CVE-2020-9366 LIN1019-4063: Security Advisory - pcre - CVE-2019-20454 LIN1019-3823: Security Advisory - cyrus-sasl - CVE-2019-19906 LIN1019-4055: Process lttng-sessiond caused kernel NULL pointer dereference at virtual address 0000000000000080 LIN1019-4000: Observing QEMU crash with WRL9 LIN1019-2986: file /usr/share/polkit-1/rules.d conflicts between attempted installs of gvfs-1.41.2-r0.core2_64 and polkit-0.116-r0.core2_64 LIN1019-1683: intel-x86-64_secure-boot: Failed to verify file /initrd (err:0x8000000000000002) LIN1019-3312: packagegroup-tpm2-initramfs-1.0-r0 do_package_write_rpm failed since long build path LIN1019-3249: OverC on qemuarm64 does not support the creation of snapshots LIN1019-4065: Bug in dhclient ! (Crashes on early SIGINT/SIGTERM) ======================= 10.19.45.4 =============================== LIN1019-2197: Security Advisory - patch - CVE-2018-20969 LIN1019-4002: Security Advisory - ppp - CVE-2020-8597 LIN1019-3982: Security Advisory - virglrenderer - CVE-2020-8002 LIN1019-3981: Security Advisory - virglrenderer - CVE-2020-8003 LIN1019-3789: Security Advisory - linux - CVE-2019-19807 LIN1019-3705: Security Advisory - linux - CVE-2019-14895 LIN1019-3966: Security Advisory - libxml2 - CVE-2020-7595 LIN1019-3964: Security Advisory - samba - CVE-2019-19344 LIN1019-3963: Security Advisory - samba - CVE-2019-14907 LIN1019-3962: Security Advisory - samba - CVE-2019-14902 LIN1019-3896: Security Advisory - dnsmasq - CVE-2019-14834 LIN1019-3909: Security Advisory - phpmyadmin - CVE-2020-5504 LIN1019-3851: Security Advisory - linux - CVE-2019-19965 LIN1019-3841: Security Advisory - linux - CVE-2019-19947 LIN1019-3920: Security Advisory - linux - CVE-2019-19332 LIN1019-3877: Security Advisory - tigervnc - CVE-2019-15691 LIN1019-3875: Security Advisory - tigervnc - CVE-2019-15693 LIN1019-3873: Security Advisory - tigervnc - CVE-2019-15695 LIN1019-3794: Intel RSU driver not loading correctly LIN1019-3900: Please prompt to install package rpcgen on Fedora31 LIN1019-3893: [WARNING] kernel warnings on intel-socfpga-64 LIN1019-3911: Nothing RPROVIDES 'cri-o' of wrlinux_qemumips_std-sato_faw_alldistro_ccache_predefined_20. LIN1019-3849: WARNING: No recipes available for wrlinux-kernel-dev linux-yocto_4.18.bbappend LIN1019-3824: meta-secure-core: rpm_%.bbappend overwrites PACKAGECONFIG LIN1019-3815: rpcbind.socket: systemd legacy directory notification LIN1019-3919: gpio: altera: Allocate irq_chip dynamically LIN1019-3932: OV: ERROR: wr-systemd-container-1.0-r0 do_image_wic LIN1019-3931: OV: ERROR: wr-app-container-1.0-r0 do_image_wic LIN1019-3926: kbd: enable vlock as configuration option but vlock not be compiled. LIN1019-3935: grub-efi-native-2.04-r0 do_sign LIN1019-3866: efitools_git failed (do_sign) LIN1019-3868: Premirror not used when parsing linux-yocto-rt ======================= 10.19.45.3 =============================== LIN1019-3769: Security Advisory - sysstat - CVE-2019-19725 LIN1019-3753: Security Advisory - freeradius - CVE-2019-13456 LIN1019-3747: Security Advisory - samba - CVE-2019-14861 LIN1019-3746: Security Advisory - samba - CVE-2019-14870 LIN1019-3745: Security Advisory - libxslt - CVE-2019-5815 LIN1019-3717: Security Advisory - linux - CVE-2019-19602 LIN1019-3698: Security Advisory - linux - CVE-2019-19524 LIN1019-3696: Security Advisory - linux - CVE-2019-19526 LIN1019-3693: Security Advisory - linux - CVE-2019-19529 LIN1019-3690: Security Advisory - linux - CVE-2019-19532 LIN1019-3688: Security Advisory - linux - CVE-2019-19534 LIN1019-3726: Security Advisory - openssl - CVE-2019-1551 LIN1019-3777: Security Advisory - linux - CVE-2019-19767 LIN1019-3737: Security Advisory - sqlite3 - CVE-2019-19603 LIN1019-3736: Security Advisory - sqlite3 - CVE-2019-19645 LIN1019-3735: Security Advisory - sqlite3 - CVE-2019-19646 LIN1019-3883: Security Advisory - sqlite3 - CVE-2019-19959 LIN1019-3882: Security Advisory - sqlite3 - CVE-2019-20218 LIN1019-3857: Security Advisory - sqlite3 - CVE-2019-19923 LIN1019-3856: Security Advisory - sqlite3 - CVE-2019-19924 LIN1019-3855: Security Advisory - sqlite3 - CVE-2019-19925 LIN1019-3845: Security Advisory - virglrenderer - CVE-2019-18388 LIN1019-3844: Security Advisory - virglrenderer - CVE-2019-18389 LIN1019-3843: Security Advisory - virglrenderer - CVE-2019-18390 LIN1019-3842: Security Advisory - virglrenderer - CVE-2019-18391 LIN1019-3832: Security Advisory - php - CVE-2019-11044 LIN1019-3831: Security Advisory - php - CVE-2019-11045 LIN1019-3830: Security Advisory - php - CVE-2019-11046 LIN1019-3829: Security Advisory - php - CVE-2019-11047 LIN1019-3828: Security Advisory - php - CVE-2019-11049 LIN1019-3827: Security Advisory - php - CVE-2019-11050 LIN1019-3826: Security Advisory - linux - CVE-2019-19922 LIN1019-3825: Security Advisory - sqlite3 - CVE-2019-19926 LIN1019-3801: Security Advisory - linux - CVE-2019-19241 LIN1019-3812: Security Advisory - sqlite3 - CVE-2019-19880 LIN1019-3811: Security Advisory - shadow - CVE-2019-19882 LIN1019-3817: Security Advisory - sudo - CVE-2019-19232 LIN1019-3816: Security Advisory - sudo - CVE-2019-19234 LIN1019-3515: Security Advisory - linux - CVE-2019-19054 LIN1019-3954: Security Advisory - linux - CVE-2019-18282 LIN1019-3862: Security Advisory - libxml2 - CVE-2019-19956 LIN1019-3782: Security Advisory - rabbitmq-c - CVE-2019-18609 LIN1019-2857: ostree not currently compatible with CGL LIN1019-3740: intel-x86-32 should be removed from README of anaconda LIN1019-3744: Host distribution "rhel-7.7" has been validated LIN1019-3729: MTD device erase block size incorrectly set to 256KiB in RCPL16 [Regression] LIN1019-3732: xhci_hcd 0001:00:0c.0: ERROR unknown event type 37 LIN1019-3617: CLONE - NFS daemon consumes 100% CPU LIN1019-2890: ostree: Corrupted file object for ostree fsck --repo=/sysroot/ostree/repo on cgl rootfs LIN1019-3837: setup.sh fails with updated Python v3 LIN1019-3836: stratix10: DesignWare SPI controller driver not enabled LIN1019-3835: libpython3-staticdev: Incorrect path for 64-bit libs LIN1019-3821: stmmac: UDP performance degraded in LTS 19 - Stratix10 LIN1019-3814: dbus.socket: systemd legacy directory notification LIN1019-3860: Invalid python interpreter 'python3/' in /usr/bin/samba_xxx script LIN1019-3333: kernel_configcheck warings with feature/host-rt-tune ======================= 10.19.45.2 =============================== LIN1019-2823: Security Advisory - linux - CVE-2019-17075 LIN1019-3699: Security Advisory - linux - CVE-2019-19523 LIN1019-3695: Security Advisory - linux - CVE-2019-19527 LIN1019-3694: Security Advisory - linux - CVE-2019-19528 LIN1019-3692: Security Advisory - linux - CVE-2019-19530 LIN1019-3689: Security Advisory - linux - CVE-2019-19533 LIN1019-3687: Security Advisory - linux - CVE-2019-19535 LIN1019-3686: Security Advisory - linux - CVE-2019-19536 LIN1019-3685: Security Advisory - linux - CVE-2019-19537 LIN1019-3684: Security Advisory - linux - CVE-2019-19543 LIN1019-3722: Security Advisory - linux - CVE-2019-19447 LIN1019-3691: Security Advisory - linux - CVE-2019-19531 LIN1019-3663: Security Advisory - ruby - CVE-2019-16201 LIN1019-3660: Security Advisory - sqlite3 - CVE-2019-19242 LIN1019-3657: Security Advisory - ruby - CVE-2019-15845 LIN1019-3656: Security Advisory - ruby - CVE-2019-16254 LIN1019-3655: Security Advisory - ruby - CVE-2019-16255 LIN1019-3650: Security Advisory - linux - CVE-2019-18660 LIN1019-3666: Security Advisory - linux - CVE-2019-10220 LIN1019-3602: Security Advisory - sqlite3 - CVE-2019-19244 LIN1019-3596: Security Advisory - linux - CVE-2019-19252 LIN1019-2886: Security Advisory - bind - CVE-2018-5743 LIN1019-1880: Security Advisory - gdb - CVE-2019-1010180 LIN1019-1882: Security Advisory - nasm - CVE-2019-14248 LIN1019-3578: Security Advisory - libarchive - CVE-2019-19221 LIN1019-3505: Security Advisory - linux - CVE-2019-19060 LIN1019-3504: Security Advisory - linux - CVE-2019-19061 LIN1019-3502: Security Advisory - linux - CVE-2019-19062 LIN1019-3501: Security Advisory - linux - CVE-2019-19063 LIN1019-3500: Security Advisory - linux - CVE-2019-19064 LIN1019-3498: Security Advisory - linux - CVE-2019-19065 LIN1019-3496: Security Advisory - linux - CVE-2019-19066 LIN1019-3495: Security Advisory - linux - CVE-2019-19067 LIN1019-3494: Security Advisory - linux - CVE-2019-19068 LIN1019-3493: Security Advisory - linux - CVE-2019-19069 LIN1019-3492: Security Advisory - linux - CVE-2019-19070 LIN1019-3491: Security Advisory - linux - CVE-2019-19071 LIN1019-3490: Security Advisory - linux - CVE-2019-19072 LIN1019-3489: Security Advisory - linux - CVE-2019-19073 LIN1019-3488: Security Advisory - linux - CVE-2019-19074 LIN1019-3486: Security Advisory - linux - CVE-2019-19075 LIN1019-3485: Security Advisory - linux - CVE-2019-19076 LIN1019-3484: Security Advisory - linux - CVE-2019-19077 LIN1019-3483: Security Advisory - linux - CVE-2019-19078 LIN1019-3482: Security Advisory - linux - CVE-2019-19079 LIN1019-3479: Security Advisory - linux - CVE-2019-19082 LIN1019-3478: Security Advisory - linux - CVE-2019-19083 LIN1019-3528: Security Advisory - linux - CVE-2019-19045 LIN1019-3527: Security Advisory - linux - CVE-2019-19046 LIN1019-3524: Security Advisory - linux - CVE-2019-19048 LIN1019-3523: Security Advisory - linux - CVE-2019-19049 LIN1019-3522: Security Advisory - linux - CVE-2019-19050 LIN1019-3519: Security Advisory - linux - CVE-2019-19051 LIN1019-3518: Security Advisory - linux - CVE-2019-19052 LIN1019-3514: Security Advisory - linux - CVE-2019-19055 LIN1019-3512: Security Advisory - linux - CVE-2019-19056 LIN1019-3511: Security Advisory - linux - CVE-2019-19057 LIN1019-3507: Security Advisory - linux - CVE-2019-19059 LIN1019-3509: Security Advisory - linux - CVE-2019-19058 LIN1019-3475: Security Advisory - ghostscript - CVE-2019-14869 LIN1019-3450: Security Advisory - fribidi - CVE-2019-18397 LIN1019-3386: Security Advisory - linux - CVE-2019-18807 LIN1019-3385: Security Advisory - linux - CVE-2019-18808 LIN1019-3384: Security Advisory - linux - CVE-2019-18809 LIN1019-3382: Security Advisory - linux - CVE-2019-18811 LIN1019-3380: Security Advisory - linux - CVE-2019-18813 LIN1019-3295: Security Advisory - samba - CVE-2019-14847 LIN1019-3297: Security Advisory - samba - CVE-2019-10218 LIN1019-3293: Security Advisory - linux - CVE-2019-18683 LIN1019-3296: Security Advisory - samba - CVE-2019-14833 LIN1019-3291: Security Advisory - linux - CVE-2019-18786 LIN1019-2642: Security Advisory - hostapd&wpa-supplicant - CVE-2019-16275 LIN1019-2202: It fails to create folder/document/properties on Xfce4 desktop after kill process Thunar LIN1019-2078: blueman-manager: unexpected log msg LIN1019-2094: rmmod wmi_bmof print calltrace LIN1019-3670: [DOC] issues in Wind River Linux Getting Started, LTS 19 LIN1019-3628: Incorrect path for container multiconfigs LIN1019-3646: ostree: Can not install one complete image into SD card which has been deployed one standard WIC image on xilinx-zynqmp target LIN1019-3644: [DOC] The kernel version (v4.18) should be updated in " Wind River Linux Kernel Development, LTS 19" LIN1019-3607: python3-config: No module named 'distutils' LIN1019-3624: syslog-ng bug when including both 64- and 32-bits to SDK LIN1019-3212: Kernel build warnings found on bcm-2xxx-rpi4 BSP LIN1019-3210: [BTS]"dma_kernel_test" test failed on bcm-2xxx-rpi4 BSP target LIN1019-2711: feature/run-container: many build warnings LIN1019-2868: ostree: error: Locking repo exclusive failed: Resource temporarily unavailable LIN1019-2706: mkswap01_sh in LTP failed on xilinx-zynq/xilinx-zynqmp/intel-x86-64 LIN1019-3200: "aplay -l" command return null device name on xilinx-zynqmp BSP LIN1019-3208: [BTS]Errors were found during bcm-2xxx-rpi4 BSP target boot up LIN1019-3042: intel-x86-64: There is one call trace for rt+cgl kernel on nuc7 target LIN1019-3580: u-boot-uenv_2.0 failed (do_deploy) of wrlinux_qemumips64_std-sato_faw_alldistro_debug_predefined_20 LIN1019-3565: Security: ERROR: shadow-securetty-4.6-r3 do_package_write_rpm: Failed to import gpg key LIN1019-3404: ostree: There is no boot.scr for multilib rootfs on xilinx-zynqmp bsp LIN1019-3369: OverC networking can fail at startup LIN1019-3334: nodistro project for ti-am335x compiled failed LIN1019-3341: xilinx-zynq: dio in LTP failed dio to kworker/u5:8: page allocation failure LIN1019-3314: OV: failed to run systemReport without lspci LIN1019-3307: ostree: There are some systemd service failed due to No such file or directory in /var on NoAB model LIN1019-3264: wrlinux-image-std do_image_ostree failed: gpg signing failed: No secret key LIN1019-3257: [KTS] create cgroup ("cgroup_ad-hoc") failed on bcm-2xxx-rpi4 BSP target LIN1019-3263: intel-x86-64: WARNING: do_kernel_configcheck: [kernel config]: specified values did not make it into the kernel's final configuration when with wifi-usb.scc LIN1019-3261: do_populate_sdk hang in build with feature feature/kernel-dev ======================= 10.19.45.1 =============================== LIN1019-2918: Security Advisory - rsyslog - CVE-2019-17041 LIN1019-2790: Security Advisory - e2fsprogs - CVE-2019-5094 LIN1019-2762: Security Advisory - linux - CVE-2019-17133 LIN1019-230: Security Advisory - tcpdump - CVE-2017-16808 LIN1019-3669: Security Advisory - linux - CVE-2018-12207 LIN1019-2993: Security Advisory - linux - CVE-2019-17666 LIN1019-3481: Security Advisory - linux - CVE-2019-19080 LIN1019-3480: Security Advisory - linux - CVE-2019-19081 LIN1019-1399: Security Advisory - linux - CVE-2019-12454 LIN1019-1398: Security Advisory - linux - CVE-2019-12455 LIN1019-1513: Security Advisory - linux - CVE-2019-12456 LIN1019-2237: a mismatch between size of a function stack and its name in aarch64 LIN1019-3067: It should remove description of 'oeqa' in README file of template feature/run-container. LIN1019-2113: intel-x86-64: There was one calltrace during running kprobes_kretprobe on NUC7i5DNK1E