1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux LTS 18 release. This RCPL provides fixes for known problems. For information on updating your projects, see the Product Updates section of the Wind River Linux Getting Started guide. https://knowledge.windriver.com/en-us/000_Products/000/010/060/000/000/000_Wind_River_Linux_Getting_Started%2C_LTS The update procedure involves updating your projectDir/wrlinux-x repository, and then re-running the setup.sh program with the original arguments. The procedure for upgrading your project is shown in the Updating Wind River Linux section of that guide: https://knowledge.windriver.com/en-us/000_Products/000/010/060/000/000/000_Wind_River_Linux_Getting_Started%2C_LTS/030/020 2.0 RCPL Update Implementation The distribution is a set of git repositories that are used to generate project directories at setup time. An RCPL appends new fixes to these repositories. As a result, the git repositories can grow with each new RCPL. The product name branches include two specific branch names. The first is a continuous integration branch. The continuous integration branch tracks the latest RCPL version release by Wind River, and does not include an RCPL number. For example: * WRLINUX_10_18_BASE * WRLINUX_10_18_LTS These branches will always match the latest released RCPL. The second branch name is RCPL-specific, with a reference to a specific RCPL, such as: * WRLINUX_10_18_BASE_UPDATE0001 * WRLINUX_10_18_LTS_RCPL0002 To identify which branch you are on, run the following commands: $ cd projectDir/wrlinux-x $ git branch 3.0 Selecting a specific RCPL Follow the procedure as indicated in the Updating Wind River Linux section of the Wind River Linux Getting Started guide located at: https://knowledge.windriver.com/en-us/000_Products/000/010/060/000/000/000_Wind_River_Linux_Getting_Started%2C_LTS/030/020 In step 3, of the procedure you will use the branchName of the RCPL that you wish to use. For example: $ git checkout WRLINUX_10_18_LTS_RCPL0002 4.0 Change Log The following is a summary of the changes made in each RCPL version. The initial product distribution occurred with RCPL0001. Defect List: ======================= 10.18.44.25 =============================== LIN1018-8446: Security Advisory - linux - CVE-2021-4002 LIN1018-8441: Security Advisory - libvirt - CVE-2021-3975 LIN1018-8436: Security Advisory - vim - CVE-2021-3974 LIN1018-8435: Security Advisory - vim - CVE-2021-3973 LIN1018-8433: Security Advisory - php - CVE-2021-21707 LIN1018-8342: Security Advisory - php - CVE-2021-21703 LIN1018-8273: Security Advisory - vim - CVE-2021-3875 LIN1018-8421: Security Advisory - linux - CVE-2021-43975 LIN1018-8347: Security Advisory - vim - CVE-2021-3903 LIN1018-8346: Security Advisory - linux - CVE-2021-3760 LIN1018-8247: Security Advisory - rpm - CVE-2021-3521 LIN1018-8413: Security Advisory - gmp - CVE-2021-43618 LIN1018-8411: Security Advisory - bluez5 - CVE-2021-41229 LIN1018-8386: Security Advisory - samba - CVE-2020-25722 LIN1018-8379: Security Advisory - speex - CVE-2020-23903 LIN1018-8390: Security Advisory - busybox - CVE-2021-42374 LIN1018-8312: Security Advisory - linux - CVE-2021-42739 LIN1018-8345: Security Advisory - udisks2 - CVE-2021-3802 LIN1018-8373: Security Advisory - qemu - CVE-2021-3930 LIN1018-8372: Security Advisory - vim - CVE-2021-3928 LIN1018-8371: Security Advisory - vim - CVE-2021-3927 LIN1018-8361: Security Advisory - linux - CVE-2021-34981 LIN1018-8370: Security Advisory - bluez5 - CVE-2021-43400 LIN1018-8369: Security Advisory - glibc - CVE-2021-43396 LIN1018-8367: Security Advisory - linux - CVE-2021-0920 LIN1018-8280: Security Advisory - vim - CVE-2021-3872 LIN1018-8279: Security Advisory - linux - CVE-2021-20322 LIN1018-8376: Security Advisory - postgresql - CVE-2021-23222 LIN1018-8375: Security Advisory - postgresql - CVE-2021-23214 LIN1018-8266: Security Advisory - linux - CVE-2021-20320 LIN1018-8492: Security Advisory - linux - CVE-2021-45095 LIN1018-8490: Security Advisory - linux - CVE-2021-39685 LIN1018-8489: Security Advisory - binutils - CVE-2021-45078 LIN1018-8487: Security Advisory - linux - CVE-2021-4083 LIN1018-8581: Security Advisory - lighttpd - CVE-2022-22707 LIN1018-8580: Security Advisory - expat - CVE-2021-46143 LIN1018-8559: Security Advisory - expat - CVE-2021-45960 LIN1018-8514: Security Advisory - ruby - CVE-2021-41817 LIN1018-8511: Security Advisory - apache2 - CVE-2021-44790 LIN1018-8510: Security Advisory - apache2 - CVE-2021-44224 LIN1018-8469: Security Advisory - go - CVE-2021-44716 LIN1018-8468: Security Advisory - linux - CVE-2021-39657 LIN1018-8466: Security Advisory - linux - CVE-2021-39648 LIN1018-8460: Security Advisory - vim - CVE-2021-4069 LIN1018-8449: Security Advisory - bluez5 - CVE-2019-8922 LIN1018-8448: Security Advisory - bluez5 - CVE-2019-8921 LIN1018-8455: Security Advisory - nss - CVE-2021-43527 LIN1018-8454: Security Advisory - vim - CVE-2021-4019 LIN1018-8453: Security Advisory - vim - CVE-2021-3984 LIN1018-8452: Security Advisory - linux - CVE-2021-33098 LIN1018-8522: Security Advisory - linux - CVE-2021-4149 LIN1018-8525: Security Advisory - libsndfile1 - CVE-2021-4156 LIN1018-8503: Security Advisory - libarchive - CVE-2021-31566 LIN1018-8502: Security Advisory - libarchive - CVE-2021-23177 LIN1018-8584: Security Advisory - expat - CVE-2022-22823 LIN1018-8583: Security Advisory - expat - CVE-2022-22822 LIN1018-8588: Security Advisory - expat - CVE-2022-22827 LIN1018-8587: Security Advisory - expat - CVE-2022-22826 LIN1018-8586: Security Advisory - expat - CVE-2022-22825 LIN1018-8585: Security Advisory - expat - CVE-2022-22824 LIN1018-8537: Security Advisory - linux - CVE-2021-45485 LIN1018-8536: Security Advisory - linux - CVE-2021-45486 LIN1018-8529: Security Advisory - linux - CVE-2021-4157 LIN1018-8516: Security Advisory - ruby - CVE-2021-41819 LIN1018-8482: Security Advisory - xserver-xorg - CVE-2021-4010 LIN1018-8481: Security Advisory - xserver-xorg - CVE-2021-4009 LIN1018-8480: Security Advisory - xserver-xorg - CVE-2021-4008 LIN1018-8483: Security Advisory - xserver-xorg - CVE-2021-4011 LIN1018-8477: Security Advisory - python-lxml - CVE-2021-43818 LIN1018-8349: apache2: failed to start service LIN1018-8471: cpio regression due to CVE-2021-38185 ======================= 10.18.44.24 =============================== LIN1018-8129: Security Advisory - linux - CVE-2021-3753 LIN1018-8142: Security Advisory - inetutils - CVE-2021-40491 LIN1018-8141: Security Advisory - linux - CVE-2021-40490 LIN1018-8135: Security Advisory - samba - CVE-2021-3671 LIN1018-8229: Security Advisory - openssh - CVE-2021-41617 LIN1018-8228: Security Advisory - linux - CVE-2021-20317 LIN1018-8154: Security Advisory - tiff - CVE-2020-19144 LIN1018-8151: Security Advisory - gd - CVE-2021-40812 LIN1018-8271: Security Advisory - linux - CVE-2021-20321 LIN1018-8146: Security Advisory - libgcrypt - CVE-2021-40528 LIN1018-8149: Security Advisory - linux - CVE-2021-3715 LIN1018-8148: Security Advisory - tiff - CVE-2020-19131 LIN1018-8145: Security Advisory - vim - CVE-2021-3770 LIN1018-8177: Security Advisory - linux - CVE-2021-38300 LIN1018-8172: Security Advisory - vim - CVE-2021-3796 LIN1018-8171: Security Advisory - vim - CVE-2021-3778 LIN1018-8104: Security Advisory - linux - CVE-2021-3743 LIN1018-8223: Security Advisory - ncurses - CVE-2021-39537 LIN1018-8125: Security Advisory - git - CVE-2021-40330 LIN1018-8262: Security Advisory - linux - CVE-2021-42252 LIN1018-8194: Security Advisory - apache2 - CVE-2021-40438 LIN1018-8193: Security Advisory - apache2 - CVE-2021-39275 LIN1018-8192: Security Advisory - apache2 - CVE-2021-36160 LIN1018-8191: Security Advisory - apache2 - CVE-2021-34798 LIN1018-8170: Security Advisory - linux - CVE-2021-3764 LIN1018-8169: Security Advisory - linux - CVE-2021-3744 LIN1018-8348: Security Advisory - bind - CVE-2021-25219 LIN1018-8353: Security Advisory - go - CVE-2021-41771 LIN1018-8252: Security Advisory - linux - CVE-2021-42008 LIN1018-8251: Security Advisory - linux - CVE-2021-41864 LIN1018-8250: Security Advisory - docker - CVE-2021-41092 LIN1018-8248: Security Advisory - go - CVE-2021-38297 LIN1018-8258: Security Advisory - docker - CVE-2021-41091 LIN1018-8257: Security Advisory - docker - CVE-2021-41089 LIN1018-8167: Security Advisory - curl - CVE-2021-22947 LIN1018-8166: Security Advisory - curl - CVE-2021-22946 LIN1018-6894: Security Advisory - linux - CVE-2020-25673 LIN1018-6893: Security Advisory - linux - CVE-2020-25672 LIN1018-2555: Security Advisory - bind - CVE-2018-5741 LIN1018-3324: Security Advisory - binutils - CVE-2018-20623 LIN1018-5891: Security Advisory - patch - CVE-2019-20633 LIN1018-5247: Security Advisory - dpdk - CVE-2019-14818 LIN1018-7944: Security Advisory - systemd - CVE-2021-33910 LIN1018-7943: Security Advisory - linux - CVE-2021-33909 LIN1018-7941: Security Advisory - openvswitch - CVE-2021-36980 LIN1018-7939: Security Advisory - libsndfile - CVE-2021-3246 LIN1018-7981: Security Advisory - linux - CVE-2021-37159 LIN1018-7985: Security Advisory - linux - CVE-2021-3655 LIN1018-7896: Security Advisory - linux - CVE-2021-35039 LIN1018-7879: Security Advisory - libvirt - CVE-2021-3631 LIN1018-7914: Security Advisory - go - CVE-2021-34558 LIN1018-7990: Security Advisory - curl - CVE-2021-22925 LIN1018-7989: Security Advisory - curl - CVE-2021-22924 LIN1018-7861: Security Advisory - linux - CVE-2021-33624 LIN1018-7867: Security Advisory - linux - CVE-2021-3600 LIN1018-7920: Security Advisory - linux - CVE-2021-21781 LIN1018-8021: Security Advisory - linux - CVE-2021-3669 LIN1018-8020: Security Advisory - gd - CVE-2021-38115 LIN1018-8014: Security Advisory - ruby - CVE-2021-31799 LIN1018-8013: Security Advisory - go - CVE-2021-36221 LIN1018-8024: Security Advisory - qemu - CVE-2021-3682 LIN1018-8086: Security Advisory - python - CVE-2021-3733 LIN1018-8004: Security Advisory - libvirt - CVE-2021-3667 LIN1018-8100: Security Advisory - gd - CVE-2021-40145 LIN1018-8022: Security Advisory - linux - CVE-2021-3679 LIN1018-7999: Security Advisory - linux - CVE-2021-37576 LIN1018-8058: Security Advisory - apache2 - CVE-2021-33193 LIN1018-8075: Security Advisory - krb5 - CVE-2021-37750 LIN1018-8074: Security Advisory - go - CVE-2021-39293 LIN1018-8065: Security Advisory - sssd - CVE-2021-3621 LIN1018-8064: Security Advisory - linux - CVE-2021-3656 LIN1018-8063: Security Advisory - linux - CVE-2021-3653 LIN1018-8016: Security Advisory - linux - CVE-2021-35477 LIN1018-8015: Security Advisory - linux - CVE-2021-34556 LIN1018-8091: Security Advisory - linux - CVE-2021-3732 LIN1018-8090: Security Advisory - openssl - CVE-2021-3711 LIN1018-8088: Security Advisory - sqlite3 - CVE-2021-36690 LIN1018-8046: Security Advisory - linux - CVE-2021-3635 LIN1018-8041: Security Advisory - linux - CVE-2021-38209 LIN1018-8037: Security Advisory - linux - CVE-2021-38205 LIN1018-8036: Security Advisory - linux - CVE-2021-38204 LIN1018-8031: Security Advisory - linux - CVE-2021-38199 LIN1018-8030: Security Advisory - linux - CVE-2021-38198 LIN1018-8029: Security Advisory - cpio - CVE-2021-38185 LIN1018-8025: Security Advisory - linux - CVE-2021-38160 LIN1018-7329: Security Advisory - qemu - CVE-2021-20257 LIN1018-8343: Security Advisory - linux - CVE-2021-3896 LIN1018-8276: Security Advisory - strongswan - CVE-2021-41991 LIN1018-8275: Security Advisory - strongswan - CVE-2021-41990 LIN1018-8368: Security Advisory - linux - CVE-2021-43389 LIN1018-7732: Security Advisory - linux - CVE-2021-22543 LIN1018-7716: Security Advisory - glibc - CVE-2021-33574 LIN1018-3393: Security Advisory - binutils - CVE-2018-20673 LIN1018-4477: Security Advisory - binutils - CVE-2019-1010204 LIN1018-7610: Security Advisory - samba - CVE-2021-20254 LIN1018-7526: Security Advisory - linux - CVE-2021-23133 LIN1018-7438: Security Advisory - linux - CVE-2021-3444 LIN1018-8168: Security Advisory - squashfs-tools - CVE-2021-41072 LIN1018-8101: Security Advisory - squashfs-tools - CVE-2021-40153 LIN1018-7946: Security Advisory - containerd-opencontainers - CVE-2021-32760 LIN1018-8005: Security Advisory - util-linux - CVE-2021-37600 LIN1018-8054: Security Advisory - c-ares - CVE-2021-3672 LIN1018-8140: yocto/wic: ioctl IOerror exception LIN1018-8234: CLONE - LTS18: icmpv6 Packet Too Big not working LIN1018-8350: CLONE - systemd_service: check docker.service.rpm service failed LIN1018-7903: 3 patches needed for perf intel processor tracing (intel_pt) to work on G3/G3.1 LIN1018-8078: BIND race condition in timer creation LIN1018-8044: grpc-native: Ubuntu 20.04: error - ambiguating new declaration of long int gettid() ======================= 10.18.44.23 =============================== LIN1018-6892: Security Advisory - linux - CVE-2020-25671 LIN1018-6891: Security Advisory - linux - CVE-2020-25670 LIN1018-7386: Security Advisory - python - CVE-2021-3426 LIN1018-7849: Security Advisory - linux - CVE-2021-32078 LIN1018-7870: Security Advisory - linux - CVE-2020-28097 LIN1018-7899: Security Advisory - ruby - CVE-2021-32066 LIN1018-7898: Security Advisory - ruby - CVE-2021-31810 LIN1018-7897: Security Advisory - linux - CVE-2021-22555 LIN1018-7878: Security Advisory - glibc - CVE-2021-35942 LIN1018-7880: Security Advisory - go - CVE-2020-29509 LIN1018-7913: Security Advisory - krb5 - CVE-2021-36222 LIN1018-7891: Security Advisory - libsepol - CVE-2021-36086 LIN1018-7890: Security Advisory - libsepol - CVE-2021-36085 LIN1018-7889: Security Advisory - libsepol - CVE-2021-36084 LIN1018-7886: Security Advisory - php - CVE-2021-21705 LIN1018-7882: Security Advisory - go - CVE-2020-29510 LIN1018-7881: Security Advisory - go - CVE-2020-29511 LIN1018-7856: Security Advisory - linux - CVE-2021-3609 LIN1018-7839: Security Advisory - bluez - CVE-2021-0129 LIN1018-6510: Security Advisory - grub - CVE-2020-14308 LIN1018-6509: Security Advisory - grub - CVE-2020-15706 LIN1018-6511: Security Advisory - grub - CVE-2020-15705 LIN1018-6586: Security Advisory - postgresql - CVE-2020-14350 LIN1018-6517: Security Advisory - grub - CVE-2020-14311 LIN1018-6514: Security Advisory - grub - CVE-2020-10713 LIN1018-6515: Security Advisory - grub - CVE-2020-14309 LIN1018-6516: Security Advisory - grub - CVE-2020-14310 LIN1018-6508: Security Advisory - grub - CVE-2020-15707 LIN1018-7294: Security Advisory - binutils - CVE-2021-20197 LIN1018-7230: Security Advisory - qemu - CVE-2021-3392 LIN1018-7331: Security Advisory - qemu - CVE-2021-3416 LIN1018-7825: Security Advisory - linux - CVE-2021-3587 LIN1018-7824: Security Advisory - linux - CVE-2021-3573 LIN1018-7750: Security Advisory - linux - CVE-2020-26145 LIN1018-7749: Security Advisory - linux - CVE-2020-26141 LIN1018-7736: Security Advisory - linux - CVE-2021-33200 LIN1018-7688: Security Advisory - go - CVE-2021-33196 LIN1018-7687: Security Advisory - go - CVE-2021-33195 LIN1018-7698: Security Advisory - libwebp - CVE-2020-36330 LIN1018-7697: Security Advisory - libwebp - CVE-2020-36329 LIN1018-7696: Security Advisory - libwebp - CVE-2020-36328 LIN1018-7695: Security Advisory - libwebp - CVE-2018-25014 LIN1018-7694: Security Advisory - libwebp - CVE-2018-25013 LIN1018-7693: Security Advisory - libwebp - CVE-2018-25012 LIN1018-7692: Security Advisory - libwebp - CVE-2018-25011 LIN1018-7691: Security Advisory - libwebp - CVE-2018-25010 LIN1018-7690: Security Advisory - libwebp - CVE-2018-25009 LIN1018-7701: Security Advisory - go - CVE-2021-33197 LIN1018-7700: Security Advisory - libwebp - CVE-2020-36332 LIN1018-7699: Security Advisory - libwebp - CVE-2020-36331 LIN1018-7844: Security Advisory - linux - CVE-2021-34693 LIN1018-7843: Security Advisory - qemu - CVE-2021-3595 LIN1018-7842: Security Advisory - qemu - CVE-2021-3594 LIN1018-7841: Security Advisory - qemu - CVE-2021-3593 LIN1018-7840: Security Advisory - qemu - CVE-2021-3592 LIN1018-7800: Security Advisory - polkit - CVE-2021-3560 LIN1018-7797: Security Advisory - apache2 - CVE-2021-26691 LIN1018-7796: Security Advisory - apache2 - CVE-2021-26690 LIN1018-7795: Security Advisory - apache2 - CVE-2020-35452 LIN1018-7798: Security Advisory - apache2 - CVE-2021-30641 LIN1018-7794: Security Advisory - apache2 - CVE-2020-13950 LIN1018-7729: Security Advisory - dhcp - CVE-2021-25217 LIN1018-7822: Security Advisory - linux - CVE-2021-0129 LIN1018-7677: Security Advisory - libx11 - CVE-2021-31535 LIN1018-7819: Security Advisory - linux - CVE-2021-0512 LIN1018-7818: Security Advisory - linux - CVE-2021-0605 LIN1018-7816: Security Advisory - linux - CVE-2020-36386 LIN1018-7815: Security Advisory - linux - CVE-2020-36385 LIN1018-7718: Security Advisory - curl - CVE-2021-22898 LIN1018-7717: Security Advisory - curl - CVE-2021-22897 LIN1018-7715: Security Advisory - nginx - CVE-2021-23017 LIN1018-7713: Security Advisory - linux - CVE-2021-3564 LIN1018-7673: Security Advisory - ceph - CVE-2021-3531 LIN1018-7670: Security Advisory - linux - CVE-2021-33033 LIN1018-7668: Security Advisory - linux - CVE-2020-27830 LIN1018-7671: Security Advisory - linux - CVE-2021-33034 LIN1018-7660: Security Advisory - linux - CVE-2020-24588 LIN1018-7659: Security Advisory - linux - CVE-2020-24587 LIN1018-7658: Security Advisory - linux - CVE-2020-24586 LIN1018-7662: Security Advisory - linux - CVE-2020-26147 LIN1018-7661: Security Advisory - linux - CVE-2020-26139 LIN1018-7640: Security Advisory - postgresql - CVE-2021-32028 LIN1018-7641: Security Advisory - postgresql - CVE-2021-32027 LIN1018-7634: Security Advisory - libxml2 - CVE-2021-3537 LIN1018-7631: Security Advisory - linux - CVE-2021-23134 LIN1018-7630: Security Advisory - qemu - CVE-2021-3527 LIN1018-7664: Security Advisory - libxml2 - CVE-2021-3541 LIN1018-7653: Security Advisory - thunar - CVE-2021-32563 LIN1018-7652: Security Advisory - linux - CVE-2021-32399 LIN1018-7657: Security Advisory - ceph - CVE-2021-3524 LIN1018-7616: Security Advisory - python3-django - CVE-2021-32052 LIN1018-7615: Security Advisory - linux - CVE-2021-31916 LIN1018-7617: Security Advisory - linux - CVE-2021-31829 LIN1018-7619: Security Advisory - python3-django - CVE-2021-31542 LIN1018-7602: Security Advisory - libxml2 - CVE-2021-3517 LIN1018-7601: Security Advisory - libxml2 - CVE-2021-3516 LIN1018-7605: Security Advisory - bind - CVE-2021-25215 LIN1018-7604: Security Advisory - bind - CVE-2021-25214 LIN1018-7603: Security Advisory - libxml2 - CVE-2021-3518 LIN1018-7532: Security Advisory - linux - CVE-2021-3506 LIN1018-7501: Security Advisory - python3-django - CVE-2021-28658 LIN1018-7500: Security Advisory - linux - CVE-2021-29154 LIN1018-7499: Security Advisory - binutils - CVE-2021-3487 LIN1018-7527: Security Advisory - linux - CVE-2021-29155 LIN1018-7524: Security Advisory - qemu - CVE-2020-35505 LIN1018-7523: Security Advisory - qemu - CVE-2020-35504 LIN1018-7829: Security Advisory - nettle - CVE-2021-3580 LIN1018-7828: Security Advisory - connman - CVE-2021-33833 LIN1018-7827: Security Advisory - python3-pip - CVE-2021-3572 LIN1018-7758: Security Advisory - libgcrypt - CVE-2021-33560 LIN1018-7763: Security Advisory - linux - CVE-2020-26558 LIN1018-7681: Security Advisory - libsolv - CVE-2021-3200 LIN1018-7488: Security Advisory - linux - CVE-2021-3483 LIN1018-7486: Security Advisory - linux - CVE-2020-36312 LIN1018-7485: Security Advisory - linux - CVE-2020-36311 LIN1018-7484: Security Advisory - linux - CVE-2020-36310 LIN1018-7481: Security Advisory - ruby - CVE-2021-28965 LIN1018-7480: Security Advisory - linux - CVE-2021-30002 LIN1018-7476: Security Advisory - nettle - CVE-2021-20305 LIN1018-7472: Security Advisory - curl - CVE-2021-22876 LIN1018-7471: Security Advisory - samba - CVE-2021-20277 LIN1018-7470: Security Advisory - linux - CVE-2021-29650 LIN1018-7467: Security Advisory - linux - CVE-2021-29647 LIN1018-7440: Security Advisory - samba - CVE-2020-27840 LIN1018-7458: Security Advisory - rpm - CVE-2021-20271 LIN1018-7457: Security Advisory - rpm - CVE-2021-3421 LIN1018-7422: Security Advisory - linux - CVE-2021-20292 LIN1018-7351: Security Advisory - grub - CVE-2021-20233 LIN1018-7350: Security Advisory - grub - CVE-2021-20225 LIN1018-7349: Security Advisory - grub - CVE-2021-3418 LIN1018-7348: Security Advisory - grub - CVE-2020-27779 LIN1018-7347: Security Advisory - grub - CVE-2020-27749 LIN1018-7346: Security Advisory - grub - CVE-2020-25647 LIN1018-7345: Security Advisory - grub - CVE-2020-25632 LIN1018-7344: Security Advisory - grub - CVE-2020-14372 LIN1018-7287: Security Advisory - qemu - CVE-2021-3409 LIN1018-6927: Security Advisory - linux - CVE-2020-29374 LIN1018-8277: Security Advisory - cluster-glue - CVE-2010-2496 LIN1018-7823: Security Advisory - intel-microcode - CVE-2021-24489 LIN1018-7684: Security Advisory - rxvt-unicode - CVE-2021-33477 LIN1018-7835: Security Advisory - intel-microcode - CVE-2020-24513 LIN1018-7834: Security Advisory - intel-microcode - CVE-2020-24512 LIN1018-7833: Security Advisory - intel-microcode - CVE-2020-24511 LIN1018-7832: Security Advisory - intel-microcode - CVE-2020-24489 LIN1018-7831: Security Advisory - intel-microcode - CVE-2020-0549 LIN1018-7778: Security Advisory - libjpeg-turbo - CVE-2020-17541 LIN1018-5737: Security Advisory - u-boot - CVE-2020-8432 LIN1018-7531: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3498 LIN1018-7530: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3497 LIN1018-7504: Security Advisory - xserver-xorg - CVE-2021-3472 LIN1018-7830: Security Advisory - intel-microcode - CVE-2020-0548 LIN1018-7479: Security Advisory - hostapd&wpa-supplicant - CVE-2021-30004 LIN1018-7790: Security Advisory - gst-plugins-base - CVE-2021-3522 LIN1018-7803: bpf selftests: test_verifier: invalid opcode: 0000 LIN1018-7589: create-user-key-store.sh: Can't open /opt/windriver/wrlinux-small/10.18.44/sysroots/x86_64-wrlinuxsdk-linux/usr/lib/ssl-1.1/openssl.cnf LIN1018-7591: failed to load kernel modules for lttng LIN1018-7517: wraxl: feature/ima: base-files do_package_write_rpm fails ======================= 10.18.44.22 =============================== LIN1018-7140: Security Advisory - dnsmasq - CVE-2020-25687 LIN1018-7139: Security Advisory - dnsmasq - CVE-2020-25686 LIN1018-7137: Security Advisory - dnsmasq - CVE-2020-25684 LIN1018-7138: Security Advisory - dnsmasq - CVE-2020-25685 LIN1018-7076: Security Advisory - qemu - CVE-2020-11947 LIN1018-7074: Security Advisory - dropbear - CVE-2019-12953 LIN1018-7092: Security Advisory - linux - CVE-2020-36158 LIN1018-7088: Security Advisory - binutils - CVE-2020-35494 LIN1018-7087: Security Advisory - binutils - CVE-2020-35493 LIN1018-7081: Security Advisory - ffmpeg - CVE-2020-35965 LIN1018-7084: Security Advisory - glibc - CVE-2019-25013 LIN1018-6877: Security Advisory - glibc - CVE-2020-27618 LIN1018-6760: Security Advisory - ruby - CVE-2020-25613 LIN1018-6736: Security Advisory - tigervnc - CVE-2020-26117 LIN1018-6870: Security Advisory - linux - CVE-2020-25656 LIN1018-6904: Security Advisory - go - CVE-2020-28367 LIN1018-7414: Security Advisory - linux - CVE-2021-28660 LIN1018-7412: Security Advisory - linux - CVE-2020-35519 LIN1018-7411: Security Advisory - dnsmasq - CVE-2021-3448 LIN1018-7401: Security Advisory - glib-2.0 - CVE-2021-27218 LIN1018-7402: Security Advisory - glib-2.0 - CVE-2021-27219 LIN1018-7395: Security Advisory - glib-2.0 - CVE-2021-28153 LIN1018-7388: Security Advisory - go - CVE-2021-27918 LIN1018-7385: Security Advisory - gnutls - CVE-2021-20232 LIN1018-6754: Security Advisory - libproxy - CVE-2020-26154 LIN1018-6169: Security Advisory - linux - CVE-2020-12888 LIN1018-6152: Security Advisory - libcroco - CVE-2020-12825 LIN1018-7135: Security Advisory - dnsmasq - CVE-2020-25682 LIN1018-7134: Security Advisory - dnsmasq - CVE-2020-25681 LIN1018-7128: Security Advisory - php - CVE-2020-7071 LIN1018-7127: Security Advisory - qemu - CVE-2021-20181 LIN1018-7126: Security Advisory - qemu - CVE-2020-29443 LIN1018-7104: Security Advisory - dbus - CVE-2020-35512 LIN1018-5370: Security Advisory - linux - CVE-2018-12207 LIN1018-5311: Security Advisory - linux - CVE-2019-19036 LIN1018-7375: Security Advisory - docker - CVE-2020-13401 LIN1018-7226: Security Advisory - docker - CVE-2021-3121 LIN1018-7225: Security Advisory - docker - CVE-2020-9283 LIN1018-7222: Security Advisory - docker - CVE-2021-21285 LIN1018-7186: Security Advisory - go - CVE-2021-3114 LIN1018-7340: Security Advisory - tiff - CVE-2020-35524 LIN1018-7339: Security Advisory - tiff - CVE-2020-35523 LIN1018-7231: Security Advisory - qemu - CVE-2021-20221 LIN1018-7236: Security Advisory - tar - CVE-2021-20193 LIN1018-7197: Security Advisory - sudo - CVE-2021-3156 LIN1018-7330: Security Advisory - dropbear - CVE-2020-36254 LIN1018-7229: Security Advisory - php - CVE-2021-21702 LIN1018-7362: Security Advisory - linux - CVE-2021-28038 LIN1018-7361: Security Advisory - linux - CVE-2021-27365 LIN1018-7360: Security Advisory - linux - CVE-2021-27364 LIN1018-7219: Security Advisory - phpmyadmin - CVE-2021-21252 LIN1018-7218: Security Advisory - python3-django - CVE-2021-3281 LIN1018-7217: Security Advisory - linux - CVE-2021-3348 LIN1018-7221: Security Advisory - docker - CVE-2021-21284 LIN1018-7210: Security Advisory - glibc - CVE-2021-3326 LIN1018-7326: Security Advisory - glibc - CVE-2021-27645 LIN1018-7320: Security Advisory - linux - CVE-2020-0433 LIN1018-7319: Security Advisory - linux - CVE-2020-0444 LIN1018-7318: Security Advisory - libexif - CVE-2020-0182 LIN1018-7309: Security Advisory - linux - CVE-2020-0404 LIN1018-7306: Security Advisory - linux - CVE-2020-35508 LIN1018-7214: Security Advisory - linux - CVE-2021-3347 LIN1018-7213: Security Advisory - qemu - CVE-2021-20203 LIN1018-7145: Security Advisory - libsdl2 - CVE-2020-14410 LIN1018-7144: Security Advisory - libsdl2 - CVE-2020-14409 LIN1018-7143: Security Advisory - linux - CVE-2021-3178 LIN1018-7142: Security Advisory - python - CVE-2021-3177 LIN1018-6426: Security Advisory - linux - CVE-2019-19338 LIN1018-4452: Security Advisory - libsdl2 - CVE-2019-13626 LIN1018-7262: Security Advisory - openldap - CVE-2021-27212 LIN1018-7265: Security Advisory - openvswitch - CVE-2020-35498 LIN1018-7267: Security Advisory - bind - CVE-2020-8625 LIN1018-7263: Security Advisory - screen - CVE-2021-26937 LIN1018-7250: Security Advisory - docker - CVE-2020-15257 LIN1018-7248: Security Advisory - connman - CVE-2021-26676 LIN1018-7240: Security Advisory - linux - CVE-2021-0342 LIN1018-7247: Security Advisory - connman - CVE-2021-26675 LIN1018-7242: Security Advisory - linux - CVE-2020-0067 LIN1018-7241: Security Advisory - linux - CVE-2020-0305 LIN1018-7107: Security Advisory - ceph - CVE-2020-25678 LIN1018-7114: Security Advisory - openldap - CVE-2020-25709 LIN1018-7111: Security Advisory - linux - CVE-2020-28374 LIN1018-7119: Security Advisory - sudo - CVE-2021-23240 LIN1018-7118: Security Advisory - sudo - CVE-2021-23239 LIN1018-7117: Security Advisory - php - CVE-2019-13224 LIN1018-7115: Security Advisory - openldap - CVE-2020-25710 LIN1018-7024: Security Advisory - binutils - CVE-2020-16592 LIN1018-7444: Security Advisory - openssl - CVE-2021-3450 LIN1018-7443: Security Advisory - openssl - CVE-2021-3449 LIN1018-7455: Security Advisory - linux - CVE-2021-29265 LIN1018-7454: Security Advisory - linux - CVE-2021-29264 LIN1018-7432: Security Advisory - linux - CVE-2021-28972 LIN1018-7431: Security Advisory - linux - CVE-2021-28971 LIN1018-7430: Security Advisory - linux - CVE-2021-28964 LIN1018-7423: Security Advisory - busybox - CVE-2021-28831 LIN1018-7421: Security Advisory - linux - CVE-2020-27171 LIN1018-7420: Security Advisory - linux - CVE-2020-27170 LIN1018-7427: Security Advisory - cairo - CVE-2020-35492 LIN1018-7279: Security Advisory - linux - CVE-2021-26931 LIN1018-7278: Security Advisory - linux - CVE-2021-26930 LIN1018-7277: Security Advisory - openssl - CVE-2021-23841 LIN1018-7280: Security Advisory - linux - CVE-2021-26932 LIN1018-7276: Security Advisory - openssl - CVE-2021-23840 LIN1018-7275: Security Advisory - openssl - CVE-2021-23839 LIN1018-7288: Security Advisory - subversion - CVE-2020-17525 LIN1018-7284: Security Advisory - python - CVE-2021-23336 LIN1018-7372: Security Advisory - linux - CVE-2021-27363 LIN1018-7383: Security Advisory - tiff - CVE-2020-35522 LIN1018-7382: Security Advisory - tiff - CVE-2020-35521 LIN1018-7381: Security Advisory - git - CVE-2021-21300 LIN1018-7207: Security Advisory - openldap - CVE-2020-36230 LIN1018-7206: Security Advisory - openldap - CVE-2020-36229 LIN1018-7205: Security Advisory - openldap - CVE-2020-36228 LIN1018-7204: Security Advisory - openldap - CVE-2020-36227 LIN1018-7203: Security Advisory - openldap - CVE-2020-36226 LIN1018-7202: Security Advisory - openldap - CVE-2020-36225 LIN1018-7201: Security Advisory - openldap - CVE-2020-36224 LIN1018-7200: Security Advisory - openldap - CVE-2020-36223 LIN1018-7199: Security Advisory - openldap - CVE-2020-36222 LIN1018-7198: Security Advisory - openldap - CVE-2020-36221 LIN1018-6980: Security Advisory - qemu - CVE-2020-27821 LIN1018-6979: Security Advisory - curl - CVE-2020-8286 LIN1018-6978: Security Advisory - curl - CVE-2020-8285 LIN1018-6977: Security Advisory - curl - CVE-2020-8284 LIN1018-6959: Security Advisory - glibc - CVE-2020-29573 LIN1018-6960: Security Advisory - glibc - CVE-2020-29562 LIN1018-6941: Security Advisory - linux - CVE-2020-27815 LIN1018-6916: Security Advisory - linux - CVE-2020-4788 LIN1018-6886: Security Advisory - python-cryptography - CVE-2020-25659 LIN1018-5244: Security Advisory - intel-microcode - CVE-2019-11135 LIN1018-7334: Security Advisory - hostapd&wpa-supplicant - CVE-2021-27803 LIN1018-7233: Security Advisory - hostapd&wpa-supplicant - CVE-2021-0326 LIN1018-7116: Security Advisory - python-py - CVE-2020-29651 LIN1018-7072: bison-native missing in syslog-ng’s recipe LIN1018-7079: [tz-announce] 2020f release of tz code and data available LIN1018-2742: [WARNING] "WARNING: modpost: Found 1 section mismatch(es)" on BSPs qemumips, nxp-ls20xx, nxp-lx2xxx, qemumips64 and qemumips LIN1018-7103: IMAGE_ROOTFS_SIZE update is not working LIN1018-5909: [WARNING] kernel compiling warnings on nxp-t4xxx LIN1018-7292: python3 : pip3 ImportError: No module named '_ctypes' LIN1018-7253: kexec: fix oops after TLB are invalidated LIN1018-7252: dnf: librepo rcpl21 patch brakes dnf LIN1018-7192: [tz-announce] 2021a release of tz code and data available LIN1018-7106: libssh2 fails with feature/openssl-no-weak-ciphers LIN1018-7355: do_populate_sdk silent gcc errors ======================= 10.18.44.21 =============================== LIN1018-3763: Security Advisory - linux - CVE-2018-20669 LIN1018-7040: Security Advisory - linux - CVE-2020-29569 LIN1018-6807: Security Advisory - python3 - CVE-2020-27619 LIN1018-6730: Security Advisory - qemu - CVE-2020-25085 LIN1018-6912: Security Advisory - linux - CVE-2020-28941 LIN1018-6910: Security Advisory - linux - CVE-2020-28915 LIN1018-6908: Security Advisory - linux - CVE-2020-25705 LIN1018-6880: Security Advisory - qemu - CVE-2020-27617 LIN1018-6882: Security Advisory - krb5 - CVE-2020-28196 LIN1018-6890: Security Advisory - linux - CVE-2020-25668 LIN1018-6898: Security Advisory - linux - CVE-2020-8694 LIN1018-6903: Security Advisory - go - CVE-2020-28366 LIN1018-5920: Security Advisory - glibc - CVE-2020-6096 LIN1018-5153: Security Advisory - libssh2 - CVE-2019-17498 LIN1018-7049: Security Advisory - p11-kit - CVE-2020-29361 LIN1018-7048: Security Advisory - p11-kit - CVE-2020-29363 LIN1018-7047: Security Advisory - p11-kit - CVE-2020-29362 LIN1018-7046: Security Advisory - ceph - CVE-2020-27781 LIN1018-6998: Security Advisory - openssl - CVE-2020-1971 LIN1018-7028: Security Advisory - linux - CVE-2020-29660 LIN1018-7027: Security Advisory - linux - CVE-2020-29661 LIN1018-6974: Security Advisory - openldap - CVE-2020-25692 LIN1018-6933: Security Advisory - linux - CVE-2020-29368 LIN1018-6931: Security Advisory - linux - CVE-2020-29370 LIN1018-6930: Security Advisory - linux - CVE-2020-29371 LIN1018-6934: Security Advisory - linux - CVE-2019-20934 LIN1018-6926: Security Advisory - qemu - CVE-2020-29130 LIN1018-6925: Security Advisory - qemu - CVE-2020-29129 LIN1018-6922: Security Advisory - linux - CVE-2020-27777 LIN1018-6921: Security Advisory - linux - CVE-2020-25669 LIN1018-6961: Security Advisory - qemu - CVE-2020-28916 LIN1018-6972: Security Advisory - linux - CVE-2020-27786 LIN1018-6956: Security Advisory - linux - CVE-2020-14381 LIN1018-6955: Security Advisory - linux - CVE-2020-14351 LIN1018-6938: Security Advisory - qemu - CVE-2020-25624 LIN1018-6919: Security Advisory - linux - CVE-2020-15436 LIN1018-6918: Security Advisory - linux - CVE-2020-15437 LIN1018-6915: Security Advisory - linux - CVE-2020-28974 LIN1018-6771: CLONE - Security Advisory - glibc - CVE-2016-10228 LIN1018-6940: Security Advisory - xserver-xorg - CVE-2020-25712 LIN1018-6939: Security Advisory - xserver-xorg - CVE-2020-14360 LIN1018-6897: nxp-imx8: dtc receives segmentation fault LIN1018-6728: missing SECURITY_CFLAGS in SDK LIN1018-6482: GCC fails to perform byte swapping when compiling application with -O2 (works correctly for -O0 and -O1) LIN1018-7061: [tz-announce] 2020e release of tz code and data available LIN1018-6936: CLONE - Memory leak within ptpd2 daemon ======================= 10.18.44.20 =============================== LIN1018-6723: Security Advisory - samba - CVE-2020-1472 LIN1018-6806: Security Advisory - linux - CVE-2020-27673 LIN1018-6805: Security Advisory - linux - CVE-2020-27675 LIN1018-6808: Security Advisory - nss - CVE-2018-18508 LIN1018-6729: Security Advisory - qemu - CVE-2020-25625 LIN1018-6731: Security Advisory - qemu - CVE-2020-25084 LIN1018-6876: Security Advisory - libexif - CVE-2020-0452 LIN1018-6804: Security Advisory - nss - CVE-2020-25648 LIN1018-6761: Security Advisory - libvirt - CVE-2020-25637 LIN1018-6727: Security Advisory - linux - CVE-2020-26088 LIN1018-6722: Security Advisory - linux - CVE-2020-14390 LIN1018-6790: Security Advisory - linux - CVE-2020-12352 LIN1018-6775: Security Advisory - linux - CVE-2020-25645 LIN1018-6746: Security Advisory - phpmyadmin - CVE-2020-26935 LIN1018-6747: Security Advisory - phpmyadmin - CVE-2020-26934 LIN1018-6740: Security Advisory - dpdk - CVE-2020-14377 LIN1018-6741: Security Advisory - dpdk - CVE-2020-14378 LIN1018-6867: Security Advisory - samba - CVE-2020-14383 LIN1018-6866: Security Advisory - samba - CVE-2020-14323 LIN1018-6865: Security Advisory - samba - CVE-2020-14318 LIN1018-6764: Security Advisory - php - CVE-2020-7070 LIN1018-6765: Security Advisory - php - CVE-2020-7069 LIN1018-6735: Security Advisory - python - CVE-2020-26116 LIN1018-6889: Security Advisory - linux - CVE-2020-25704 LIN1018-6888: Security Advisory - freetype - CVE-2020-15999 LIN1018-6887: Security Advisory - pacemaker - CVE-2020-25654 LIN1018-6900: Security Advisory - postgresql - CVE-2020-25695 LIN1018-6899: Security Advisory - postgresql - CVE-2020-25694 LIN1018-6871: Security Advisory - tcpdump - CVE-2020-8037 LIN1018-6782: Security Advisory - libarchive - CVE-2020-21674 LIN1018-6788: Security Advisory - bluez5 - CVE-2020-27153 LIN1018-6789: Security Advisory - linux - CVE-2020-12351 LIN1018-6752: Security Advisory - python-urllib3 - CVE-2020-26137 LIN1018-6711: Security Advisory - linux - CVE-2020-10766 LIN1018-6707: Security Advisory - linux - CVE-2020-10781 LIN1018-6706: Security Advisory - linux - CVE-2020-14314 LIN1018-6705: Security Advisory - linux - CVE-2020-14385 LIN1018-6901: Security Advisory - postgresql - CVE-2020-25696 LIN1018-6759: Security Advisory - linux - CVE-2020-25641 LIN1018-6758: Security Advisory - linux - CVE-2020-25643 LIN1018-6737: Security Advisory - dpdk - CVE-2020-14374 LIN1018-6738: Security Advisory - dpdk - CVE-2020-14375 LIN1018-6739: Security Advisory - dpdk - CVE-2020-14376 LIN1018-6637: Security Advisory - nss - CVE-2019-11729 LIN1018-6636: Security Advisory - nss - CVE-2019-11727 LIN1018-6632: Security Advisory - nss - CVE-2019-11719 LIN1018-6595: Security Advisory - qemu - CVE-2020-12829 LIN1018-6713: Security Advisory - libdbi-perl - CVE-2014-10402 LIN1018-6773: Command du got SIGABRT LIN1018-6745: ERROR: thin-provisioning-tools-0.7.6-r0 do_fetch() failed LIN1018-6906: lz4_1.8.2 failed (do_fetch) of wrlinux-std-sato_qemuarma9_world_18-lts. LIN1018-6878: ERROR: libselinux-native-2.8-r0 do_compile: oe_runmake failed LIN1018-6793: ERROR: wrlinux-image-glibc-cgl-1.0-r5 do_rootfs: Postinstall scriptlets of ['inetutils-doc'] have failed. LIN1018-6884: CLONE - Kernel errors : power_meter ACPI000D:00: Ignoring unsafe software power cap! LIN1018-6766: CLONE - [tz-announce] 2020c release of tz code and data available LIN1018-6859: ERROR: lib32-gcc-sanitizers-8.2.0-r0 do_compile: oe_runmake failed LIN1018-6857: do_patch error of u-boot-socfpga_v2019.04.bb with a lib32 image LIN1018-6700: lts18: Kernel compiler warnings LIN1018-6770: ERROR: intel-microcode-20200609-r0 do_fetch() failed LIN1018-6497: i2c timeout issue LIN1018-6400: initramfs-framework recipe contains bashism ======================= 10.18.44.19 =============================== LIN1018-6692: Security Advisory - cups - CVE-2019-8696 LIN1018-6691: Security Advisory - cups - CVE-2019-8675 LIN1018-6690: Security Advisory - cups - CVE-2019-2228 LIN1018-6695: Security Advisory - expat - CVE-2019-15903 LIN1018-6694: Security Advisory - cups - CVE-2020-3898 LIN1018-6693: Security Advisory - cups - CVE-2019-8842 LIN1018-6686: Security Advisory - linux - CVE-2020-25285 LIN1018-6685: Security Advisory - linux - CVE-2020-25284 LIN1018-6661: Security Advisory - nasm - CVE-2020-24978 LIN1018-6660: Security Advisory - gnutls - CVE-2020-24659 LIN1018-6659: Security Advisory - libxml2 - CVE-2020-24977 LIN1018-6669: Security Advisory - linux - CVE-2020-25212 LIN1018-6678: Security Advisory - linux - CVE-2020-1749 LIN1018-6671: Security Advisory - libproxy - CVE-2020-25219 LIN1018-6673: Security Advisory - php - CVE-2020-7068 LIN1018-6676: Security Advisory - linux - CVE-2020-14386 LIN1018-6675: Security Advisory - nss - CVE-2019-17007 LIN1018-6658: Security Advisory - python3-pip - CVE-2019-20916 LIN1018-6681: Security Advisory - linux - CVE-2020-10773 LIN1018-6709: Security Advisory - linux - CVE-2020-10767 LIN1018-6708: Security Advisory - linux - CVE-2020-10768 LIN1018-5428: Security Advisory - linux - CVE-2019-19447 LIN1018-5427: Security Advisory - linux - CVE-2019-19448 LIN1018-5466: Security Advisory - linux - CVE-2019-19770 LIN1018-6589: Security Advisory - linux - CVE-2020-2732 LIN1018-6571: Security Advisory - ghostscript - CVE-2020-16305 LIN1018-6573: Security Advisory - ghostscript - CVE-2020-16307 LIN1018-6574: Security Advisory - ghostscript - CVE-2020-16308 LIN1018-6572: Security Advisory - ghostscript - CVE-2020-16306 LIN1018-6575: Security Advisory - ghostscript - CVE-2020-16309 LIN1018-6570: Security Advisory - ghostscript - CVE-2020-16304 LIN1018-6505: Security Advisory - qemu - CVE-2020-15863 LIN1018-6499: Security Advisory - lua - CVE-2020-15945 LIN1018-6634: Security Advisory - nss - CVE-2019-17006 LIN1018-6633: Security Advisory - nss - CVE-2019-17023 LIN1018-6635: Security Advisory - nss - CVE-2020-6829 LIN1018-6638: Security Advisory - nss - CVE-2019-11745 LIN1018-6592: Security Advisory - linux - CVE-2020-24394 LIN1018-6591: Security Advisory - linux - CVE-2020-14356 LIN1018-6596: Security Advisory - libexif - CVE-2020-0093 LIN1018-6590: Security Advisory - linux - CVE-2020-14331 LIN1018-6552: Security Advisory - trousers - CVE-2020-24332 LIN1018-6551: Security Advisory - trousers - CVE-2020-24331 LIN1018-6550: Security Advisory - trousers - CVE-2020-24330 LIN1018-6556: Security Advisory - ghostscript - CVE-2020-16290 LIN1018-6555: Security Advisory - ghostscript - CVE-2020-16289 LIN1018-6554: Security Advisory - ghostscript - CVE-2020-16288 LIN1018-6559: Security Advisory - ghostscript - CVE-2020-16293 LIN1018-6558: Security Advisory - ghostscript - CVE-2020-16292 LIN1018-6557: Security Advisory - ghostscript - CVE-2020-16291 LIN1018-6562: Security Advisory - ghostscript - CVE-2020-16296 LIN1018-6560: Security Advisory - ghostscript - CVE-2020-16294 LIN1018-6561: Security Advisory - ghostscript - CVE-2020-16295 LIN1018-6553: Security Advisory - ghostscript - CVE-2020-16287 LIN1018-6522: Security Advisory - libx11 - CVE-2020-14344 LIN1018-6518: Security Advisory - linux - CVE-2020-16166 LIN1018-6626: Security Advisory - libexif - CVE-2019-9278 LIN1018-6630: Security Advisory - ceph - CVE-2020-1700 LIN1018-6542: Security Advisory - qemu - CVE-2020-16092 LIN1018-6642: Security Advisory - qemu - CVE-2020-14364 LIN1018-6585: Security Advisory - postgresql - CVE-2020-14349 LIN1018-6578: Security Advisory - ghostscript - CVE-2020-17538 LIN1018-6576: Security Advisory - ghostscript - CVE-2020-16310 LIN1018-6563: Security Advisory - ghostscript - CVE-2020-16297 LIN1018-6565: Security Advisory - ghostscript - CVE-2020-16299 LIN1018-6566: Security Advisory - ghostscript - CVE-2020-16300 LIN1018-6569: Security Advisory - ghostscript - CVE-2020-16303 LIN1018-6564: Security Advisory - ghostscript - CVE-2020-16298 LIN1018-6567: Security Advisory - ghostscript - CVE-2020-16301 LIN1018-6568: Security Advisory - ghostscript - CVE-2020-16302 LIN1018-6529: Security Advisory - go - CVE-2020-16845 LIN1018-6652: Security Advisory - go - CVE-2020-24553 LIN1018-6639: Security Advisory - nss - CVE-2019-11756 LIN1018-6603: Security Advisory - bind - CVE-2020-8624 LIN1018-6602: Security Advisory - bind - CVE-2020-8623 LIN1018-6601: Security Advisory - bind - CVE-2020-8622 LIN1018-6598: Security Advisory - curl - CVE-2020-8231 LIN1018-6640: Security Advisory - librepo - CVE-2020-14352 LIN1018-6648: Security Advisory - python3-django - CVE-2020-24583 LIN1018-6647: Security Advisory - python3-django - CVE-2020-24584 LIN1018-6619: Security Advisory - libexif - CVE-2020-0198 LIN1018-6608: Security Advisory - nss - CVE-2020-12400 LIN1018-6613: Security Advisory - nss - CVE-2020-12403 LIN1018-6612: Security Advisory - nss - CVE-2020-12402 LIN1018-6611: Security Advisory - nss - CVE-2020-12401 LIN1018-6614: Security Advisory - nasm - CVE-2020-24241 LIN1018-6541: Security Advisory - apache2 - CVE-2020-11993 LIN1018-6539: Security Advisory - apache2 - CVE-2020-11984 LIN1018-6538: Security Advisory - apache2 - CVE-2020-9490 LIN1018-6425: Security Advisory - qemu - CVE-2020-10756 LIN1018-6620: Security Advisory - libx11 - CVE-2020-14363 LIN1018-6583: Security Advisory - lua - CVE-2020-24371 LIN1018-2195: Security Advisory - libtasn1 - CVE-2018-1000654 LIN1018-6721: Security Advisory - libdbi-perl - CVE-2019-20919 LIN1018-6704: Security Advisory - libdbi-perl - CVE-2020-14392 LIN1018-6703: Security Advisory - libdbi-perl - CVE-2020-14393 LIN1018-6523: Security Advisory - xserver-xorg - CVE-2020-14347 LIN1018-6587: Security Advisory - net-snmp - CVE-2020-15861 LIN1018-6588: Security Advisory - net-snmp - CVE-2020-15862 LIN1018-6624: Security Advisory - xserver-xorg - CVE-2020-14362 LIN1018-6623: Security Advisory - xserver-xorg - CVE-2020-14361 LIN1018-6622: Security Advisory - xserver-xorg - CVE-2020-14346 LIN1018-6621: Security Advisory - xserver-xorg - CVE-2020-14345 LIN1018-6644: Security Advisory - hostapd & wpa-supplicant - CVE-2020-12695 LIN1018-6666: fetch error of package ucarp LIN1018-6665: json-c only reads 11 objects LIN1018-6683: CLONE - top crashing in WRL8 - cores found by QA LIN1018-6720: u-boot-socfpga_2017.09 failed (do_fetch) LIN1018-5047: bitbake -c menuconfig linux-yocto fails on ubuntu 18.04 LIN1018-4068: nxp-ls20xx build warning: kernel-source/fs/ext4/super.c:349:2: warning: 'strncpy' specified bound 32 equals destination size LIN1018-6649: cryptsetup-native build failure (WRL18) LIN1018-6490: [nss] nss regression test fail, 15 sub cases fail LIN1018-6543: CLONE - [wraxl] dpdk_git failed (do_fetch) of wrlinux-std-sato_intel-x86-64_world_9-lts-cve. LIN1018-6579: attr(acl) build failure with new buildtools buildtools-standalone-10.18.44.18 LIN1018-6547: Feature 'features/sysrq.scc' not found LIN1018-6645: Manpage generation for sssd LIN1018-6434: CLONE - OV: radvd service failed due to '/etc/radvd.conf was not met' ======================= 10.18.44.18 =============================== LIN1018-6656: Security Advisory - linux - CVE-2020-10720 LIN1018-6340: Security Advisory - linux - CVE-2019-0136 LIN1018-6318: Security Advisory - qemu - CVE-2020-1983 LIN1018-6319: Security Advisory - qemu - CVE-2019-14378 LIN1018-6306: Security Advisory - linux - CVE-2020-13974 LIN1018-6272: Security Advisory - python3-django - CVE-2020-9402 LIN1018-6274: Security Advisory - python3-django - CVE-2018-14574 LIN1018-6271: Security Advisory - python3-django - CVE-2020-7471 LIN1018-6273: Security Advisory - python3-django - CVE-2020-13596 LIN1018-6201: Security Advisory - linux - CVE-2020-10711 LIN1018-6199: Security Advisory - libexif - CVE-2020-13113 LIN1018-6200: Security Advisory - libexif - CVE-2020-13112 LIN1018-6176: Security Advisory - linux - CVE-2020-13143 LIN1018-6280: Security Advisory - python3-django - CVE-2019-6975 LIN1018-6278: Security Advisory - python3-django - CVE-2019-3498 LIN1018-6185: Security Advisory - dpdk - CVE-2020-10723 LIN1018-6184: Security Advisory - dpdk - CVE-2020-10722 LIN1018-6183: Security Advisory - bind - CVE-2020-8617 LIN1018-6182: Security Advisory - bind - CVE-2020-8616 LIN1018-6181: Security Advisory - php - CVE-2019-11048 LIN1018-6346: Security Advisory - python3 - CVE-2020-14422 LIN1018-6262: Security Advisory - openssh - CVE-2020-12062 LIN1018-6263: Security Advisory - python3-django - CVE-2019-12308 LIN1018-6264: Security Advisory - python3-django - CVE-2019-12781 LIN1018-6206: Security Advisory - sqlite3 - CVE-2020-13434 LIN1018-6313: Security Advisory - qemu - CVE-2020-10761 LIN1018-6307: Security Advisory - linux - CVE-2020-10757 LIN1018-6295: Security Advisory - dbus - CVE-2020-12049 LIN1018-6261: Security Advisory - python3-django - CVE-2020-13254 LIN1018-6342: Security Advisory - linux - CVE-2019-9506 LIN1018-6320: Security Advisory - libpcre - CVE-2020-14155 LIN1018-6322: Security Advisory - libpcre - CVE-2019-20838 LIN1018-6315: Security Advisory - linux - CVE-2020-10732 LIN1018-6290: Security Advisory - perl - CVE-2020-10878 LIN1018-6291: Security Advisory - perl - CVE-2020-10543 LIN1018-6293: Security Advisory - ffmpeg - CVE-2020-13904 LIN1018-6250: Security Advisory - linux - CVE-2019-20812 LIN1018-6254: Security Advisory - qemu - CVE-2020-13659 LIN1018-6253: Security Advisory - qemu - CVE-2020-13754 LIN1018-6252: Security Advisory - linux - CVE-2019-20810 LIN1018-6257: Security Advisory - libvirt - CVE-2020-10703 LIN1018-6255: Security Advisory - systemd - CVE-2020-13776 LIN1018-6343: Security Advisory - linux - CVE-2020-14416 LIN1018-6289: Security Advisory - perl - CVE-2020-12723 LIN1018-6287: Security Advisory - qemu - CVE-2020-13791 LIN1018-6288: Security Advisory - qemu - CVE-2020-13765 LIN1018-6267: Security Advisory - python3-django - CVE-2019-14234 LIN1018-6266: Security Advisory - python3-django - CVE-2019-14233 LIN1018-6270: Security Advisory - python3-django - CVE-2019-19844 LIN1018-6265: Security Advisory - python3-django - CVE-2019-14232 LIN1018-6268: Security Advisory - python3-django - CVE-2019-14235 LIN1018-6259: Security Advisory - gnutls - CVE-2020-13777 LIN1018-6238: Security Advisory - linux - CVE-2020-10751 LIN1018-6237: Security Advisory - vim - CVE-2019-20807 LIN1018-6236: Security Advisory - qemu - CVE-2020-13253 LIN1018-6235: Security Advisory - qemu - CVE-2020-13361 LIN1018-6234: Security Advisory - qemu - CVE-2020-13362 LIN1018-6233: Security Advisory - sqlite3 - CVE-2020-13630 LIN1018-6231: Security Advisory - sqlite3 - CVE-2020-13632 LIN1018-6230: Security Advisory - linux - CVE-2019-20806 LIN1018-6198: Security Advisory - libexif - CVE-2020-13114 LIN1018-6128: Security Advisory - linux - CVE-2020-12768 LIN1018-6087: Security Advisory - samba - CVE-2020-10700 LIN1018-6079: Security Advisory - glibc - CVE-2020-1752 LIN1018-6006: Security Advisory - mariadb - CVE-2020-2812 LIN1018-5796: Security Advisory - glibc - CVE-2020-10029 LIN1018-5930: Security Advisory - gnutls - CVE-2020-11501 LIN1018-5209: Security Advisory - linux - CVE-2019-18814 LIN1018-5154: Security Advisory - libidn2 - CVE-2019-12290 LIN1018-5030: Security Advisory - linux - CVE-2019-16746 LIN1018-5159: Security Advisory - python - CVE-2019-18348 LIN1018-5401: Security Advisory - linux - CVE-2019-19462 LIN1018-6421: Security Advisory - samba - CVE-2020-10730 LIN1018-6420: Security Advisory - samba - CVE-2020-10745 LIN1018-6385: Security Advisory - ceph - CVE-2020-10753 LIN1018-6424: Security Advisory - nss - CVE-2020-12399 LIN1018-6393: Security Advisory - linux - CVE-2020-15393 LIN1018-6488: Security Advisory - lua - CVE-2020-15888 LIN1018-6427: Security Advisory - python - CVE-2019-20907 LIN1018-6479: Security Advisory - go - CVE-2020-15586 LIN1018-6413: Security Advisory - samba - CVE-2020-14303 LIN1018-6414: Security Advisory - samba - CVE-2020-10760 LIN1018-6383: Security Advisory - sqlite3 - CVE-2020-15358 LIN1018-6474: Security Advisory - curl - CVE-2020-8177 LIN1018-6382: Security Advisory - ntp - CVE-2020-15025 LIN1018-6352: Security Advisory - nginx - CVE-2019-9511 LIN1018-6356: Security Advisory - nginx - CVE-2019-9513 LIN1018-6100: Security Advisory - linux - CVE-2020-12653 LIN1018-6099: Security Advisory - linux - CVE-2020-12654 LIN1018-6097: Security Advisory - linux - CVE-2020-12656 LIN1018-6125: Security Advisory - linux - CVE-2020-12771 LIN1018-6033: Security Advisory - glibc - CVE-2020-1751 LIN1018-6028: Security Advisory - mariadb - CVE-2020-2752 LIN1018-5658: Security Advisory - python - CVE-2020-8492 LIN1018-6304: Security Advisory - intel SRBDS - CVE-2020-0543 LIN1018-6324: Security Advisory - nfs-utils - CVE-2019-3689 LIN1018-6258: Security Advisory - libjpeg-turbo - CVE-2020-13790 LIN1018-6239: Security Advisory - glib-networking - CVE-2020-13645 LIN1018-6387: Security Advisory - net-snmp - CVE-2019-20892 LIN1018-6310: toolchain-shar-extract: ignore timestamp on decompress LIN1018-6187: CLONE - ERROR: qemu-native-2.7.0-r1 do_compile() failed LIN1018-6204: CLONE - Wrong permissions on module.tgz file. LIN1018-6247: Backporting fix for clearcase fetcher LIN1018-6245: CONFIG_PPC_BOOK3S_64=y: error: implicit declaration of function 'ida_free' LIN1018-6160: Error 'raise InvalidURL(f"URL can't contain control characters. {!r} "' in builds with buildtools of buildtools-tarball LIN1018-6303: "wrl-small" rootfs has 435MB directory with firmware LIN1018-6086: Systemd doesnt support dots in usernames LIN1018-5812: openssh-ptest: openssh-ptest 1/44 failed LIN1018-6375: CLONE - dbus-ptest 1/15 failed LIN1018-6374: CLONE - freediameter-ptest 2/12 failed LIN1018-6435: CVE-2019-18348: Python3.5.6 uncompatible patch LIN1018-6409: CLONE - [wraxl] iso-codes_4.3 failed (do_fetch) of wrlinux_qemuarm64_std-sato_faw_alldistro_predefined_19-lts. LIN1018-6410: [microcode] Can't find /lib64/firmware/intel-ucode/microcode.bin LIN1018-6407: cgl: doc-pkgs: inetutils and netkit-rsh manpages conflicts LIN1018-6476: CLONE - libpam password change error log LIN1018-5720: menuconfig and devshell fail silently with shell /bin/csh ======================= 10.18.44.17 =============================== LIN1018-6285: Security Advisory - ntp - CVE-2020-13817 LIN1018-6170: Security Advisory - apt - CVE-2020-3810 LIN1018-6151: Security Advisory - linux - CVE-2020-12826 LIN1018-6129: Security Advisory - libexif - CVE-2020-12767 LIN1018-6127: Security Advisory - linux - CVE-2020-12769 LIN1018-6126: Security Advisory - linux - CVE-2020-12770 LIN1018-6077: Security Advisory - linux - CVE-2020-12464 LIN1018-6076: Security Advisory - linux - CVE-2020-12465 LIN1018-6078: Security Advisory - linux - CVE-2020-11884 LIN1018-5939: Security Advisory - sqlite3 - CVE-2020-11655 LIN1018-5934: Security Advisory - linux - CVE-2020-11609 LIN1018-5931: Security Advisory - linux - CVE-2020-11565 LIN1018-5921: Security Advisory - apache2 - CVE-2020-1934 LIN1018-5922: Security Advisory - apache2 - CVE-2020-1927 LIN1018-5916: Security Advisory - systemd - CVE-2020-1712 LIN1018-5935: Security Advisory - linux - CVE-2020-11608 LIN1018-5927: Security Advisory - linux - CVE-2020-11494 LIN1018-5248: Security Advisory - ceph - CVE-2019-10222 LIN1018-5514: Security Advisory - linux - CVE-2019-19922 LIN1018-5446: Security Advisory - git - CVE-2019-19604 LIN1018-5457: Security Advisory - git - CVE-2019-1351 LIN1018-5456: Security Advisory - git - CVE-2019-1350 LIN1018-5455: Security Advisory - git - CVE-2019-1349 LIN1018-5454: Security Advisory - git - CVE-2019-1348 LIN1018-5459: Security Advisory - git - CVE-2019-1353 LIN1018-5458: Security Advisory - git - CVE-2019-1352 LIN1018-5461: Security Advisory - git - CVE-2019-1387 LIN1018-5468: Security Advisory - linux - CVE-2019-19768 LIN1018-6084: Security Advisory - ruby - CVE-2020-10933 LIN1018-6083: Security Advisory - linux - CVE-2020-12114 LIN1018-6045: Security Advisory - git - CVE-2020-11008 LIN1018-6042: Security Advisory - openssl - CVE-2020-1967 LIN1018-5976: Security Advisory - linux - CVE-2020-11668 LIN1018-5974: Security Advisory - linux - CVE-2019-14615 LIN1018-6133: Security Advisory - linux - CVE-2019-14898 LIN1018-6131: Security Advisory - iproute2 - CVE-2019-20795 LIN1018-6061: Security Advisory - ceph - CVE-2020-1760 LIN1018-6145: Security Advisory - icu - CVE-2020-10531 LIN1018-6064: Security Advisory - php - CVE-2020-7067 LIN1018-5986: Security Advisory - git - CVE-2020-5260 LIN1018-6101: Security Advisory - linux - CVE-2020-12652 LIN1018-6098: Security Advisory - linux - CVE-2020-12655 LIN1018-6096: Security Advisory - linux - CVE-2020-12657 LIN1018-6095: Security Advisory - linux - CVE-2020-12659 LIN1018-6056: Security Advisory - ceph - CVE-2020-12059 LIN1018-6122: Security Advisory - linux - CVE-2020-10690 LIN1018-6072: Security Advisory - openldap - CVE-2020-12243 LIN1018-6031: Security Advisory - ntp - CVE-2020-11868 LIN1018-5940: Security Advisory - linux - CVE-2019-20636 LIN1018-6130: Security Advisory - json-c - CVE-2020-12762 LIN1018-6157: CLONE - OV: WARNING: Your host glibc verson (2.31) is newer than that in uninative (2.30) on Ubuntu 20.04 LIN1018-6143: grub-efi_2.02.bb:do_compile() failed on Ubuntu-20.04 LIN1018-5801: pulseaudio_12.2.bb:do_compile failed while building 32b userspace images on nxp-ls10x8 WRL-10.18.44.15 LIN1018-5937: SDK failed to reflect correct kernel version (UTS_RELEASE) LIN1018-5905: qemuarm: Internal error: Oops - BUG: 0 during boot LIN1018-5911: [WARNING] kernel do_kernel_configcheck warning of option CONFIG_IMX8QXP_ADC in builds of nxp-imx8 LIN1018-5908: [WARNING] kernel compiling warnings on nxp-imx8 LIN1018-5881: some packages conflict when enabling "doc-pkgs" LIN1018-5903: need update ntp package to version 4.2.8p14 LIN1018-5869: Backtraces based on perf LIN1018-6043: CLONE - Revert patch for glibc fork and dlopen collision LIN1018-6110: perf version with short argument gives seg fault LIN1018-6104: ERROR: go-pty-git-r0 do_fetch: Fetcher failure LIN1018-6103: gzclose hangs on NFS mount LIN1018-6049: make: occasional deadlock when using parallel build LIN1018-5943: CLONE - ERROR: msmtp-1.4.12-r1 do_fetch: Function failed: base_do_fetch LIN1018-6092: CLONE - do_fetch errors of dce and u-boot-imx from git.freescale.com LIN1018-6150: CLONE - qemu-native_4.1.0.bb:do_compile() failed on Ubuntu-20.04 LIN1018-6102: glib-networking_2.54.1 failed (do_populate_sysroot) on WRLINUX_10_18 LIN1018-6054: CLONE - do_fetch error of package xmlsec1 LIN1018-6057: CLONE - Uprev request of timezone: 2020a release of tz code and data available LIN1018-6119: libgpg-error_1.32.bb:do_compile() failed on Ubuntu-20.04 LIN1018-6124: postfix_3.3.1.bb:do_compile() failed on Ubuntu-20.04 LIN1018-6053: tun_attach issue in drivers/net/tun.c LIN1018-6052: Boost build issue in WRL18 LTS LIN1018-6030: CLONE - [WARNING] do_kernel_configcheck warnings on qemumips64 LIN1018-3634: [WARNING] do_kernel_configcheck warnings on xilinx-zynqmp ======================= 10.18.44.16 =============================== LIN1018-5862: Security Advisory - go - CVE-2020-7919 LIN1018-5872: Security Advisory - phpmyadmin - CVE-2020-10804 LIN1018-5875: Security Advisory - freeradius - CVE-2019-17185 LIN1018-5874: Security Advisory - gnupg - CVE-2019-14855 LIN1018-5912: Security Advisory - php - CVE-2020-7066 LIN1018-5914: Security Advisory - php - CVE-2020-7064 LIN1018-5885: Security Advisory - linux - CVE-2020-10942 LIN1018-5878: Security Advisory - phpmyadmin - CVE-2020-10802 LIN1018-5877: Security Advisory - phpmyadmin - CVE-2020-10803 LIN1018-5866: Security Advisory - postgresql - CVE-2020-1720 LIN1018-5845: Security Advisory - bluez5 - CVE-2020-0556 LIN1018-5576: Security Advisory - cpio - CVE-2019-14866 LIN1018-5562: Security Advisory - qemu - CVE-2019-20175 LIN1018-5690: Security Advisory - ipmitool - CVE-2020-5208 LIN1018-5687: Security Advisory - linux - CVE-2020-8649 LIN1018-5689: Security Advisory - linux - CVE-2020-8647 LIN1018-5858: Security Advisory - nagios-nrpe - CVE-2020-6582 LIN1018-5863: Security Advisory - nagios-nrpe - CVE-2020-6581 LIN1018-5868: do_package_qa error of package crmsh with "QA Issue: /usr/share/crmsh/tests/cib-tests.sh contained in package crmsh requires /bin/bash, but no providers found in RDEPENDS_crmsh" LIN1018-5859: CPU: 1 PID: 1 Comm: swapper/0 Not tainted LIN1018-5829: Memory leak in ebtables kernel chain LIN1018-5906: [WARNING] QA Issue of grub-efi-2.02-r0 do_package_qa: grub-efi: /grub-efi/boot/efi/EFI/BOOT/grub.cfg.p7b is owned by uid xxxx LIN1018-5907: [WARNING] compiling error of kernel "arm64/kernel/perf_callchain.c warning: cast from pointer to integer of different size" LIN1018-5929: CLONE - DHCP build fails if DDNS is disabled LIN1018-5895: sysstat systemd LIN1018-5890: Request to backport BBCLASS extend native and nativesdk patch for python*-markupsafe recipe LIN1018-5826: [wraxl]grub-efi-native-2.04-r0 do_sign LIN1018-5821: [WARNING] kernel compiling warnings of file drivers/soc/fsl/rcpm.c on nxp-ls1043&nxp-ls10x8 LIN1018-5879: Request to backport BBCLASS extend native and nativesdk patch for python3-jinja2 recipe LIN1018-4745: pyshtables.py error when using read-only layers directory in do_image_wic LIN1018-5764: CLONE - WRL9 - Libvirtd crash LIN1018-5714: incorrect Makefile.build in LTS18 SDK LIN1018-5691: "Creating a Platform Project with IMA Support" : "Quick Start Overview." link broken LIN1018-5788: lttng-modules_2.10.7.bb:do_compile failed on nxp-t4xxx on WRL-10.18.44.15 LIN1018-5703: WARNING: CPU: 5 PID: 9119 at kernel/rcu/tree_plugin.h:309 rcu_note_context_switch+0x130/0x598 LIN1018-3650: selinux: change role failed after add user. ======================= 10.18.44.15 =============================== LIN1018-3799: Security Advisory - sssd - CVE-2018-16838 LIN1018-5647: Security Advisory - libxml2 - CVE-2019-20388 LIN1018-2370: Security Advisory - tiff - CVE-2018-17000 LIN1018-2973: Security Advisory - tiff - CVE-2018-19210 LIN1018-5805: Security Advisory - qemu - CVE-2019-20382 LIN1018-5836: Security Advisory - qemu - CVE-2019-15034 LIN1018-5839: Security Advisory - tcpdump - CVE-2019-15167 LIN1018-5588: Security Advisory - linux - CVE-2019-19332 LIN1018-5549: Security Advisory - linux - CVE-2019-20054 LIN1018-5366: Security Advisory - linux - CVE-2019-14896 LIN1018-5300: Security Advisory - glibc - CVE-2019-19126 LIN1018-4981: Security Advisory - tcpdump - CVE-2018-10105 LIN1018-4980: Security Advisory - tcpdump - CVE-2018-10103 LIN1018-5579: Security Advisory - libbsd - CVE-2019-20367 LIN1018-5589: Security Advisory - linux - CVE-2020-7053 LIN1018-5405: Security Advisory - linux - CVE-2019-14897 LIN1018-5404: Security Advisory - linux - CVE-2019-14901 LIN1018-5582: Security Advisory - nginx - CVE-2019-20372 LIN1018-5556: Security Advisory - linux - CVE-2019-5108 LIN1018-5624: Security Advisory - qemu - CVE-2020-7039 LIN1018-5621: Security Advisory - linux - CVE-2019-18282 LIN1018-5617: Security Advisory - mariadb - CVE-2020-2574 LIN1018-5469: Security Advisory - linux - CVE-2019-19767 LIN1018-5708: Security Advisory - php - CVE-2020-7060 LIN1018-5709: Security Advisory - php - CVE-2020-7059 LIN1018-5767: Security Advisory - linux - CVE-2020-9383 LIN1018-5759: Security Advisory - screen - CVE-2020-9366 LIN1018-5743: Security Advisory - pcre - CVE-2019-20454 LIN1018-5742: Security Advisory - lvm2 - CVE-2020-8991 LIN1018-5756: Security Advisory - sqlite3 - CVE-2020-9327 LIN1018-5732: Security Advisory - linux - CVE-2019-3016 LIN1018-5716: Security Advisory - qemu - CVE-2020-1711 LIN1018-5719: Security Advisory - gd - CVE-2018-14553 LIN1018-5781: Security Advisory - php - CVE-2020-7061 LIN1018-5780: Security Advisory - php - CVE-2020-7062 LIN1018-5779: Security Advisory - php - CVE-2020-7063 LIN1018-5786: Security Advisory - gd - CVE-2017-6363 LIN1018-5688: Security Advisory - linux - CVE-2020-8648 LIN1018-5680: Security Advisory - python - CVE-2019-9674 LIN1018-5663: Security Advisory - sudo - CVE-2019-18634 LIN1018-5660: Security Advisory - aspell - CVE-2019-20433 LIN1018-3417: Security Advisory - sssd - CVE-2019-3811 LIN1018-1822: Security Advisory - sssd - CVE-2017-12173 LIN1018-1593: Security Advisory - sssd - CVE-2018-10852 LIN1018-680: Security Advisory - tcpdump - CVE-2017-16808 LIN1018-5509: Security Advisory - cyrus-sasl - CVE-2019-19906 LIN1018-3098: ecryptfs-utils sometimes fails on do_install LIN1018-5800: CLONE - perf call graphs lack symbols when running 32-bit applications on a 64-bit LIN1018-5827: openssl recipe multilib files conflict LIN1018-5823: [WARNING] do_kernel_configcheck of "CONFIG_LS_SOC_DRIVERS CONFIG_FTM_ALARM" in builds of nxp-ls1043&nxp-ls10x8 LIN1018-5822: [WARNING] warning "No bb files matched BBFILE_PATTERN_wr-nxp-ls10x8" LIN1018-5587: OV: compile cross-localedef-native failed 'argp-help.c:(.text+0x2021): undefined reference to '_IO_fwide'' LIN1018-5640: Mismatch between glibc and linux kernel regarding AF_MAX and PF_MAX, missing AF_XDP, PF_XDP and SOL_XDP in glibc LIN1018-5628: [wraxl] glibc_2.28 failed (do_package_write_rpm) of wrlinux_intel-x86-64_std_security_alltemplate_predefined_18-lts. LIN1018-5626: gcov "'main' has arcs to entry block" bug in gcc 8.2 LIN1018-5326: failure to find gpg command LIN1018-5707: Process lttng-sessiond caused kernel NULL pointer dereference at virtual address 0000000000000080 LIN1018-5758: /initrd verification error with secure boot LIN1018-5762: FACE Conformance Tests instructions should describe host-side tests, not target-side tests LIN1018-5749: WRL8:Use-after-free reads in show_numa_stats() LIN1018-5723: CLONE - Bug in dhclient ! (Crashes on early SIGINT/SIGTERM) LIN1018-5706: libnl: issue with bridge handling LIN1018-5763: Cannot set system date past build date LIN1018-5757: openssl 1.1.1a in WRL LTS 18 and TLS 1.3 issues LIN1018-5787: Audit: do_fetch() failed ======================= 10.18.44.14 =============================== LIN1018-3790: Security Advisory - php - CVE-2019-9675 LIN1018-5650: Security Advisory - libsolv - CVE-2019-20387 LIN1018-5649: Security Advisory - systemd - CVE-2019-20386 LIN1018-5648: Security Advisory - libxml2 - CVE-2020-7595 LIN1018-5646: Security Advisory - samba - CVE-2019-19344 LIN1018-5645: Security Advisory - samba - CVE-2019-14907 LIN1018-5575: Security Advisory - dnsmasq - CVE-2019-14834 LIN1018-5542: Security Advisory - libxml2 - CVE-2019-19956 LIN1018-5546: Security Advisory - linux - CVE-2019-20096 LIN1018-5424: Security Advisory - linux - CVE-2019-19602 LIN1018-5423: Security Advisory - phpmyadmin - CVE-2019-19617 LIN1018-5431: Security Advisory - openssl - CVE-2019-1551 LIN1018-5437: Security Advisory - sqlite3 - CVE-2019-19646 LIN1018-5337: Security Advisory - linux - CVE-2019-10207 LIN1018-5367: Security Advisory - linux - CVE-2019-10220 LIN1018-5364: Security Advisory - ruby - CVE-2019-16201 LIN1018-5358: Security Advisory - ruby - CVE-2019-15845 LIN1018-5357: Security Advisory - ruby - CVE-2019-16254 LIN1018-5356: Security Advisory - ruby - CVE-2019-16255 LIN1018-5351: Security Advisory - linux - CVE-2019-18660 LIN1018-5246: Security Advisory - linux - CVE-2019-18885 LIN1018-5214: Security Advisory - linux - CVE-2019-18809 LIN1018-5215: Security Advisory - linux - CVE-2019-18808 LIN1018-5293: Security Advisory - linux - CVE-2019-19048 LIN1018-5296: Security Advisory - linux - CVE-2019-19045 LIN1018-5295: Security Advisory - linux - CVE-2019-19046 LIN1018-5275: Security Advisory - linux - CVE-2019-19066 LIN1018-5273: Security Advisory - linux - CVE-2019-19068 LIN1018-5278: Security Advisory - linux - CVE-2019-19063 LIN1018-5270: Security Advisory - linux - CVE-2019-19071 LIN1018-5194: Security Advisory - linux - CVE-2019-18786 LIN1018-5196: Security Advisory - linux - CVE-2019-18683 LIN1018-5287: Security Advisory - linux - CVE-2019-19054 LIN1018-5292: Security Advisory - linux - CVE-2019-19049 LIN1018-5285: Security Advisory - linux - CVE-2019-19056 LIN1018-5284: Security Advisory - linux - CVE-2019-19057 LIN1018-5263: Security Advisory - linux - CVE-2019-19078 LIN1018-5038: Security Advisory - linux - CVE-2019-17056 LIN1018-5515: Security Advisory - php - CVE-2019-11050 LIN1018-5513: Security Advisory - sqlite3 - CVE-2019-19926 LIN1018-5520: Security Advisory - php - CVE-2019-11044 LIN1018-5519: Security Advisory - php - CVE-2019-11045 LIN1018-5518: Security Advisory - php - CVE-2019-11046 LIN1018-5517: Security Advisory - php - CVE-2019-11047 LIN1018-5445: Security Advisory - samba - CVE-2019-14861 LIN1018-5444: Security Advisory - samba - CVE-2019-14870 LIN1018-5451: Security Advisory - freeradius - CVE-2019-13456 LIN1018-5443: Security Advisory - libxslt - CVE-2019-5815 LIN1018-5397: Security Advisory - linux - CVE-2019-19526 LIN1018-5396: Security Advisory - linux - CVE-2019-19527 LIN1018-5395: Security Advisory - linux - CVE-2019-19528 LIN1018-5394: Security Advisory - linux - CVE-2019-19529 LIN1018-5393: Security Advisory - linux - CVE-2019-19530 LIN1018-5392: Security Advisory - linux - CVE-2019-19531 LIN1018-5391: Security Advisory - linux - CVE-2019-19532 LIN1018-5390: Security Advisory - linux - CVE-2019-19533 LIN1018-5389: Security Advisory - linux - CVE-2019-19534 LIN1018-5388: Security Advisory - linux - CVE-2019-19535 LIN1018-5387: Security Advisory - linux - CVE-2019-19536 LIN1018-5386: Security Advisory - linux - CVE-2019-19537 LIN1018-5385: Security Advisory - linux - CVE-2019-19543 LIN1018-5407: Security Advisory - bash - CVE-2019-18276 LIN1018-5406: Security Advisory - linux - CVE-2019-14895 LIN1018-5400: Security Advisory - linux - CVE-2019-19523 LIN1018-5399: Security Advisory - linux - CVE-2019-19524 LIN1018-5398: Security Advisory - linux - CVE-2019-19525 LIN1018-5581: Security Advisory - phpmyadmin - CVE-2020-5504 LIN1018-5559: Security Advisory - sqlite3 - CVE-2019-19959 LIN1018-5558: Security Advisory - sqlite3 - CVE-2019-20218 LIN1018-5557: Security Advisory - linux - CVE-2019-19927 LIN1018-5644: Security Advisory - samba - CVE-2019-14902 LIN1018-5505: Security Advisory - sudo - CVE-2019-19234 LIN1018-5503: Security Advisory - shadow - CVE-2019-19882 LIN1018-5506: Security Advisory - sudo - CVE-2019-19232 LIN1018-5554: Security Advisory - tigervnc - CVE-2019-15691 LIN1018-5552: Security Advisory - tigervnc - CVE-2019-15693 LIN1018-5550: Security Advisory - tigervnc - CVE-2019-15695 LIN1018-5541: Security Advisory - sqlite3 - CVE-2019-19923 LIN1018-5540: Security Advisory - sqlite3 - CVE-2019-19924 LIN1018-5539: Security Advisory - sqlite3 - CVE-2019-19925 LIN1018-5535: Security Advisory - linux - CVE-2019-19965 LIN1018-5463: Security Advisory - sysstat - CVE-2019-19725 LIN1018-5376: Security Advisory - libcroco - CVE-2017-7961 LIN1018-5375: Security Advisory - python - CVE-2017-18207 LIN1018-5328: Security Advisory - linux - CVE-2019-19227 LIN1018-4767: Security Advisory - linux - CVE-2019-15505 LIN1018-4768: Security Advisory - linux - CVE-2019-15504 LIN1018-4689: Security Advisory - linux - CVE-2019-15099 LIN1018-4688: Security Advisory - linux - CVE-2019-15117 LIN1018-5676: Security Advisory - ppp - CVE-2020-8597 LIN1018-4924: Security Advisory - linux - CVE-2019-16229 LIN1018-4922: Security Advisory - linux - CVE-2019-16231 LIN1018-4921: Security Advisory - linux - CVE-2019-16232 LIN1018-4920: Security Advisory - linux - CVE-2019-16233 LIN1018-4164: Security Advisory - linux - CVE-2019-12380 LIN1018-5651: [wraxl] go-gpgme_git failed (do_fetch) of wrlinux_genericx86-64_overc_predefined_18. LIN1018-5591: OV: ERROR: wr-app-container-1.0-r0 do_image_wic LIN1018-5601: go : /usr/bin/go: broken symbolic link. LIN1018-5434: CLONE - MTD device writes unreliable from RCPL16 LIN1018-5339: syslog-ng bug when including both 64- and 32-bits to SDK LIN1018-5572: Configuring and Building an Image-based Install: add WRTEMPLATE = "" to installer image local.conf LIN1018-5348: exporting custom kernel header files with v4.1 results in error in two packages LIN1018-5304: Crash caused by wrong value from posix read() function LIN1018-4951: CLONE - Upgrade tzdata 2019c release LIN1018-5577: CLONE - rcp utility (Part of intetutils package) unable copy sub directory files. LIN1018-5583: The system build ntp_4.2.8p12 not ntp_4.2.8p13 LIN1018-5384: LTS18: miss nslookup(bind) command LIN1018-5381: gpio-line-names property in device tree LIN1018-5414: Request is to backport kernel patch to WRLinux LTS 18. LIN1018-5412: nxp-imx6: there is kernel warning in build LIN1018-5593: OV: ERROR: wr-systemd-container-1.0-r0 do_image_wic LIN1018-5453: meta-secure-core: rpm_%.bbappend overwrites PACKAGECONFIG LIN1018-5501: [WARNING] fetch warnings of package openl2tp LIN1018-5643: kernel panic with ima security feature in intel-x86-64 target LIN1018-4702: intel-x86-64: Target hangs and kernel BUG at kernel/locking/rtmutex.c:1345 on rt kernel for rb_futex testing LIN1018-5673: Observing QEMU crash with WRL9 LIN1018-5654: BSPs for NXP targets filter bb files - not possible to derive BSP ======================= 10.18.44.13 =============================== LIN1018-5281: Security Advisory - linux - CVE-2019-19060 LIN1018-5280: Security Advisory - linux - CVE-2019-19061 LIN1018-5276: Security Advisory - linux - CVE-2019-19065 LIN1018-5274: Security Advisory - linux - CVE-2019-19067 LIN1018-5269: Security Advisory - linux - CVE-2019-19072 LIN1018-5251: Security Advisory - ghostscript - CVE-2019-14869 LIN1018-5229: Security Advisory - fribidi - CVE-2019-18397 LIN1018-5321: Security Advisory - libarchive - CVE-2019-19221 LIN1018-5290: Security Advisory - linux - CVE-2019-19051 LIN1018-5289: Security Advisory - linux - CVE-2019-19052 LIN1018-5283: Security Advisory - linux - CVE-2019-19058 LIN1018-5217: Security Advisory - linux - CVE-2019-18806 LIN1018-5261: Security Advisory - linux - CVE-2019-19080 LIN1018-5260: Security Advisory - linux - CVE-2019-19081 LIN1018-5259: Security Advisory - linux - CVE-2019-19082 LIN1018-5258: Security Advisory - linux - CVE-2019-19083 LIN1018-5267: Security Advisory - linux - CVE-2019-19074 LIN1018-5266: Security Advisory - linux - CVE-2019-19075 LIN1018-5264: Security Advisory - linux - CVE-2019-19077 LIN1018-5268: Security Advisory - linux - CVE-2019-19073 LIN1018-5262: Security Advisory - linux - CVE-2019-19079 LIN1018-5113: Security Advisory - linux - CVE-2019-17666 LIN1018-5035: Security Advisory - linux - CVE-2019-17053 LIN1018-4978: Security Advisory - linux - CVE-2019-17133 LIN1018-5303: ostree_git failed (do_fetch) when build with branch WRLINUX_10_18_BASE LIN1018-5305: intel-socfpga-64: RSU: DTB: __symbols__ node not found LIN1018-5250: Xilinx Zynq GPIO axi driver not working in WRL LTS18 LIN1018-5252: mariadb_5.5.65.bb:do_fetch() failed without --dl-layeys LIN1018-5205: CLONE - OV: WARNING: python-native-2.7.14-r1.1 do_populate_sysroot: Skipping RPATH /usr/lib64 as is a standard search path for _bsddb.so ======================= 10.18.44.12 =============================== LIN1018-4415: Security Advisory - ffmpeg - CVE-2019-13390 LIN1018-4392: Security Advisory - unzip - CVE-2019-13232 LIN1018-4570: Security Advisory - postgresql - CVE-2019-10130 LIN1018-4541: Security Advisory - openldap - CVE-2019-13057 LIN1018-4540: Security Advisory - openldap - CVE-2019-13565 LIN1018-4526: Security Advisory - mysql - CVE-2019-2737 LIN1018-4524: Security Advisory - mysql - CVE-2019-2739 LIN1018-4523: Security Advisory - mysql - CVE-2019-2740 LIN1018-4448: Security Advisory - libsdl - CVE-2019-13616 LIN1018-5200: Security Advisory - samba - CVE-2019-10218 LIN1018-5199: Security Advisory - samba - CVE-2019-14833 LIN1018-5198: Security Advisory - samba - CVE-2019-14847 LIN1018-5176: Security Advisory - php - CVE-2019-11043 LIN1018-5185: Security Advisory - postgresql - CVE-2019-10208 LIN1018-5112: Security Advisory - linux - CVE-2019-18198 LIN1018-5111: Security Advisory - libxslt - CVE-2019-18197 LIN1018-5097: Security Advisory - ffmpeg - CVE-2019-17539 LIN1018-5096: Security Advisory - ffmpeg - CVE-2019-17542 LIN1018-4954: Security Advisory - linux - CVE-2019-14821 LIN1018-4953: Security Advisory - linux - CVE-2019-14835 LIN1018-5005: Security Advisory - subversion - CVE-2019-0203 LIN1018-5004: Security Advisory - subversion - CVE-2018-11782 LIN1018-5115: Security Advisory - mysql - CVE-2019-2974 LIN1018-5077: Security Advisory - bind - CVE-2019-6465 LIN1018-5074: Security Advisory - bind - CVE-2018-5743 LIN1018-5073: Security Advisory - bind - CVE-2018-5744 LIN1018-5071: Security Advisory - bind - CVE-2019-6471 LIN1018-5072: Security Advisory - bind - CVE-2018-5745 LIN1018-5034: Security Advisory - linux - CVE-2019-17052 LIN1018-5028: Security Advisory - go - CVE-2019-16276 LIN1018-5011: Security Advisory - apache2 - CVE-2019-10098 LIN1018-5010: Security Advisory - apache2 - CVE-2019-10097 LIN1018-5009: Security Advisory - apache2 - CVE-2019-10092 LIN1018-5036: Security Advisory - linux - CVE-2019-17054 LIN1018-5164: Security Advisory - go - CVE-2019-17596 LIN1018-5163: Security Advisory - libarchive - CVE-2019-18408 LIN1018-5099: Security Advisory - ncurses - CVE-2019-17594 LIN1018-5098: Security Advisory - ncurses - CVE-2019-17595 LIN1018-4936: Security Advisory - gdb - CVE-2017-9778 LIN1018-5152: Security Advisory - file - CVE-2019-18218 LIN1018-5151: Security Advisory - libidn2 - CVE-2019-18224 LIN1018-5081: Security Advisory - binutils - CVE-2019-17450 LIN1018-5080: Security Advisory - binutils - CVE-2019-17451 LIN1018-5042: Security Advisory - python - CVE-2019-16935 LIN1018-5037: Security Advisory - linux - CVE-2019-17055 LIN1018-5039: Security Advisory - linux - CVE-2019-17075 LIN1018-4004: Security Advisory - mariadb - CVE-2019-2614 LIN1018-4018: Security Advisory - mariadb - CVE-2019-2627 LIN1018-4690: Security Advisory - linux - CVE-2019-15098 LIN1018-4854: Security Advisory - systemd - CVE-2019-15718 LIN1018-4880: Security Advisory - sqlite - CVE-2019-16168 LIN1018-3515: Security Advisory - mysql - CVE-2019-2529 LIN1018-5105: Security Advisory - sudo - CVE-2019-14287 LIN1018-5048: Security Advisory - linux - CVE-2019-17351 LIN1018-4464: Security Advisory - pango - CVE-2019-1010238 LIN1018-4498: Security Advisory - mysql - CVE-2019-2805 LIN1018-4253: Security Advisory - ffmpeg - CVE-2019-12730 LIN1018-3687: [wraxl] oe-selftest wrlinux_qemux86-64_wrlinux_target-installer LIN1018-5190: libtirpc headers in SDK LIN1018-5204: sysstat fails because of chkconfig error LIN1018-5110: NFS daemon consumes 100% CPU LIN1018-5142: It's incomplete for the output of 'setup.sh --list-distros/--list-templates/--list-machines' LIN1018-5078: RCS: python3-config symlink is missing LIN1018-4939: Issue with gdb and unexpected SIGSTOP signals in preempt-rt kernel LIN1018-5157: minicoredumper can not find all thread stacks LIN1018-5156: CLONE - SEG fault in libc LIN1018-5161: nmbd[650]: Unable to setup corepath for nmbd: Permission denied for cgl rootfs LIN1018-5089: RCS G3: kernel build failures LIN1018-5108: WARNING: arch/arm64/mm/physaddr.c:15: virt_to_phys used for non-linear address LIN1018-5107: do_compile of u-boot-renesas on BSP renesas-rcar-h3 when building with wrlinux-cgl distro ======================= 10.18.44.11 =============================== LIN1018-4383: Security Advisory - qemu - CVE-2019-13164 LIN1018-4569: Security Advisory - binutils - CVE-2019-14444 LIN1018-4484: Security Advisory - binutils - CVE-2019-14250 LIN1018-4483: Security Advisory - gdb - CVE-2019-1010180 LIN1018-4347: Security Advisory - binutils - CVE-2019-12972 LIN1018-3051: Security Advisory - tcpdump - CVE-2018-19519 LIN1018-5092: Security Advisory - aspell - CVE-2019-17544 LIN1018-5091: Security Advisory - lz4 - CVE-2019-17543 LIN1018-5090: Security Advisory - libtiff - CVE-2019-17546 LIN1018-4992: Security Advisory - tcpdump - CVE-2018-14879 LIN1018-4991: Security Advisory - tcpdump - CVE-2018-14470 LIN1018-4995: Security Advisory - tcpdump - CVE-2018-14882 LIN1018-4993: Security Advisory - tcpdump - CVE-2018-14880 LIN1018-4994: Security Advisory - tcpdump - CVE-2018-14881 LIN1018-4956: Security Advisory - linux - CVE-2019-14814 LIN1018-4955: Security Advisory - linux - CVE-2019-14816 LIN1018-4952: Security Advisory - linux - CVE-2019-16413 LIN1018-5046: Security Advisory - libgcrypt - CVE-2019-13627 LIN1018-5002: Security Advisory - tcpdump - CVE-2018-16452 LIN1018-5001: Security Advisory - tcpdump - CVE-2018-16451 LIN1018-5000: Security Advisory - tcpdump - CVE-2018-16300 LIN1018-5006: Security Advisory - e2fsprogs - CVE-2019-5094 LIN1018-4999: Security Advisory - tcpdump - CVE-2018-16230 LIN1018-4998: Security Advisory - tcpdump - CVE-2018-16229 LIN1018-4997: Security Advisory - tcpdump - CVE-2018-16228 LIN1018-4996: Security Advisory - tcpdump - CVE-2018-16227 LIN1018-5018: Security Advisory - tcpdump - CVE-2019-15166 LIN1018-4985: Security Advisory - tcpdump - CVE-2018-14464 LIN1018-4984: Security Advisory - tcpdump - CVE-2018-14463 LIN1018-4983: Security Advisory - tcpdump - CVE-2018-14462 LIN1018-4982: Security Advisory - tcpdump - CVE-2018-14461 LIN1018-4989: Security Advisory - tcpdump - CVE-2018-14468 LIN1018-4988: Security Advisory - tcpdump - CVE-2018-14467 LIN1018-4987: Security Advisory - tcpdump - CVE-2018-14466 LIN1018-4986: Security Advisory - tcpdump - CVE-2018-14465 LIN1018-4990: Security Advisory - tcpdump - CVE-2018-14469 LIN1018-4938: Security Advisory - linux - CVE-2019-1125 LIN1018-5056: Security Advisory - curl - CVE-2019-5482 LIN1018-5057: Security Advisory - linux - CVE-2019-14815 LIN1018-5055: Security Advisory - curl - CVE-2019-5481 LIN1018-5087: Security Advisory - rsyslog - CVE-2019-17041 LIN1018-5045: Security Advisory - qemu - CVE-2019-12068 LIN1018-4903: Security Advisory - openssl - CVE-2019-1547 LIN1018-4902: Security Advisory - openssl - CVE-2019-1549 LIN1018-4901: Security Advisory - openssl - CVE-2019-1563 LIN1018-4138: Security Advisory - gcc - CVE-2018-12886 LIN1018-4183: Security Advisory - linux - CVE-2019-12455 LIN1018-4806: Security Advisory - nmap - CVE-2017-18594 LIN1018-4788: Security Advisory - linux - CVE-2019-15807 LIN1018-4865: Security Advisory - python - CVE-2019-16056 LIN1018-4864: Security Advisory - qemu - CVE-2019-15890 LIN1018-4766: Security Advisory - linux - CVE-2019-15538 LIN1018-4747: Security Advisory - linux - CVE-2019-15292 LIN1018-4691: Security Advisory - linux - CVE-2019-15090 LIN1018-4687: Security Advisory - linux - CVE-2019-15118 LIN1018-4833: Security Advisory - ghostscript - CVE-2019-14811 LIN1018-4832: Security Advisory - ghostscript - CVE-2019-14817 LIN1018-4853: Security Advisory - linux - CVE-2019-15927 LIN1018-4852: Security Advisory - linux - CVE-2019-15926 LIN1018-4851: Security Advisory - linux - CVE-2019-15925 LIN1018-4850: Security Advisory - linux - CVE-2019-15924 LIN1018-4847: Security Advisory - linux - CVE-2019-15921 LIN1018-4846: Security Advisory - linux - CVE-2019-15920 LIN1018-4845: Security Advisory - linux - CVE-2019-15919 LIN1018-4844: Security Advisory - linux - CVE-2019-15918 LIN1018-4843: Security Advisory - linux - CVE-2019-15917 LIN1018-4842: Security Advisory - linux - CVE-2019-15916 LIN1018-4841: Security Advisory - linux - CVE-2019-15902 LIN1018-4717: Security Advisory - linux - CVE-2019-15213 LIN1018-4716: Security Advisory - linux - CVE-2019-15212 LIN1018-4715: Security Advisory - linux - CVE-2019-15211 LIN1018-4719: Security Advisory - linux - CVE-2019-15215 LIN1018-4879: Security Advisory - sysstat - CVE-2019-16167 LIN1018-4725: Security Advisory - linux - CVE-2019-15221 LIN1018-4724: Security Advisory - linux - CVE-2019-15220 LIN1018-4723: Security Advisory - linux - CVE-2019-15219 LIN1018-4722: Security Advisory - linux - CVE-2019-15218 LIN1018-4721: Security Advisory - linux - CVE-2019-15217 LIN1018-4932: Security Advisory - phpmyadmin - CVE-2019-12922 LIN1018-4926: Security Advisory - linux - CVE-2019-15030 LIN1018-4925: Security Advisory - linux - CVE-2019-15031 LIN1018-4560: Security Advisory - tcpdump - CVE-2019-1010220 LIN1018-4166: Security Advisory - linux - CVE-2019-12382 LIN1018-4929: Security Advisory - hostapd&wpa-supplicant - CVE-2019-16275 LIN1018-4382: Unix time built by WindRiver Linux LTS18 does not start from 1970-01-01 LIN1018-3028: tipcTC 12 hang on preempt-rt kernel LIN1018-4962: u-boot-fw-utils_2018.07 failed for renesas-rcar-h3 LIN1018-4961: Backport several commits from meta-cloud-services upstream LIN1018-4960: Backport several commits from oe-core upstream LIN1018-4949: Tags up to and including 4.18.45 need to be merged. LIN1018-4947: lib32 libraries in self-hosted prevent proper locale loading LIN1018-4973: python3-docker-compose version incompatibility, error message : The 'docker<3.0,>=2.5.1' distribution was not found and is required by docker-compose LIN1018-4972: tcpdump filter errors (libpcap problem) LIN1018-4975: kea install task run with parallel jobs, but should not LIN1018-4969: Warnings on console when BB_NICE_VALUE is set for build LIN1018-4964: systemd-analyze: mcstrans service is abnormal LIN1018-4940: WRL LTS 18 shadow - relaxed usernames LIN1018-4935: Tags up to and including 4.18.43 need to be merged. LIN1018-4976: RCS: tracepath failure for IPv6 LIN1018-4907: No recipes available for wrlinux-image-initramfs.bbappend LIN1018-4906: [Taget Installer] fails to install boot loader onto an USB flash disk with uefi LIN1018-4905: Nothing PROVIDES package errors on meta-openembedded layer LIN1018-4811: [yocto_compliance] No recipes available for lmsensors_%.bbappend LIN1018-4825: systemd-sysctl[17566]: Couldn't write 'fq_codel' to 'net/core/default_qdisc', ignoring: No such file or directory LIN1018-4761: [WARNING] kernel warning "sysctl_net_core.c:285:1: warning: 'proc_dointvec_minmax_bpf_restricted' defined but not used" LIN1018-4682: intel-x86-64: board are hang in kernel test LIN1018-4868: [Target Installer] installer fails to configure the partitions while reinstall the system on a same disk under UEFI mode LIN1018-4862: [WARNING] kernel warning "pinctrl-imx.c:573:23: warning: unused variable 'config'" on nxp-imx6 LIN1018-4647: CLONE - mdadm: ptest out put format is not correct LIN1018-4240: wrlinux-distro layer fails when running the yocto-check-layer script LIN1018-4115: CLONE - sysstat sar command not displaying info ======================= 10.18.44.10 =============================== LIN1018-4389: Security Advisory - linux - CVE-2019-13233 LIN1018-4574: Security Advisory - openssl - CVE-2019-1552 LIN1018-4537: Security Advisory - linux - CVE-2019-14284 LIN1018-4539: Security Advisory - patch - CVE-2019-13638 LIN1018-4538: Security Advisory - linux - CVE-2019-14283 LIN1018-4458: Security Advisory - linux - CVE-2019-13631 LIN1018-4457: Security Advisory - patch - CVE-2019-13636 LIN1018-4443: Security Advisory - iptables - CVE-2019-11360 LIN1018-4246: Security Advisory - linux - CVE-2019-12614 LIN1018-4279: Security Advisory - linux - CVE-2019-12456 LIN1018-4697: Security Advisory - patch - CVE-2018-20969 LIN1018-4718: Security Advisory - linux - CVE-2019-15214 LIN1018-4720: Security Advisory - linux - CVE-2019-15216 LIN1018-4673: Security Advisory - libtiff - CVE-2019-14973 LIN1018-4639: Security Advisory - linux - CVE-2019-14763 LIN1018-4591: Security Advisory - libvirt - CVE-2019-10161 LIN1018-4596: Security Advisory - samba - CVE-2018-16860 LIN1018-4461: Security Advisory - linux - CVE-2019-13648 LIN1018-4450: Security Advisory - linux - CVE-2019-13272 LIN1018-4644: Security Advisory - php - CVE-2019-11041 LIN1018-4643: Security Advisory - php - CVE-2019-11042 LIN1018-4614: Security Advisory - libvirt - CVE-2019-10167 LIN1018-4613: Security Advisory - libvirt - CVE-2019-10166 LIN1018-4615: Security Advisory - libvirt - CVE-2019-10168 LIN1018-4388: a mismatch between size of a function stack and its name in axxiaarm64 LIN1018-4645: db_verify: BDB0571 library build did not include support for database verification LIN1018-4752: CLONE - Compliance errors on meta-cgl layer LIN1018-4672: "Image contains binaries from users build environment" occurs again LIN1018-4763: [WARNING] do_fetch warnings of ca-certificates and sudo LIN1018-4748: do_package_write_rpm error "rpm_keys/RPM-GPG-PRIVKEY-SecureCore: No such file or directory" LIN1018-4740: WRL8 CVE-2019-12900 bzip2 BZ2_decompress Out-of-Bounds Write Vulnerability LIN1018-4684: u-boot-imx_2016.03 failed (do_compile) of wrlinux_qemux86_std-sato_faw_alldistro_predefined_18-lts. LIN1018-4646: postfix-native fails on Ubuntu 18.04 LTS3 LIN1018-4514: when using installer to install to a nvme hard disk , there will be a error LIN1018-4651: sota-tools fetch fails LIN1018-4536: LTTNG issue with epoch negative clock offset LIN1018-4632: Tags up to and including 4.18.41 need to be merged. LIN1018-4531: CLONE - IPIC - fix status get and status clear ======================= 10.18.44.9 =============================== LIN1018-3719: Security Advisory - python - CVE-2019-9740 LIN1018-3718: Security Advisory - python - CVE-2019-9947 LIN1018-3720: Security Advisory - python - CVE-2019-9636 LIN1018-4368: Security Advisory - glib-2.0 - CVE-2019-13012 LIN1018-4287: Security Advisory - linux - CVE-2019-10126 LIN1018-4284: Security Advisory - linux - CVE-2019-12819 LIN1018-4317: Security Advisory - libgcrypt - CVE-2019-12904 LIN1018-4316: Security Advisory - bzip2 - CVE-2019-12900 LIN1018-4412: Security Advisory - linux - CVE-2019-10638 LIN1018-4380: Security Advisory - libxslt - CVE-2019-13117 LIN1018-4379: Security Advisory - libxslt - CVE-2019-13118 LIN1018-4365: Security Advisory - expat - CVE-2018-20843 LIN1018-4363: Security Advisory - postgresql - CVE-2019-10164 LIN1018-4343: Security Advisory - linux - CVE-2019-12817 LIN1018-2648: Security Advisory - python - CVE-2018-14647 LIN1018-2354: Security Advisory - linux - CVE-2018-14625 LIN1018-4247: Security Advisory - python - CVE-2019-10160 LIN1018-4245: Security Advisory - linux - CVE-2019-12615 LIN1018-4041: Security Advisory - linux - CVE-2019-3900 LIN1018-4427: Security Advisory - python - CVE-2018-20852 LIN1018-4251: Security Advisory - linux - CVE-2019-3846 LIN1018-4162: Security Advisory - linux - CVE-2019-12378 LIN1018-4165: Security Advisory - linux - CVE-2019-12381 LIN1018-4372: vim-tiny: alternative target (/usr/bin/xxd or /usr/bin/xxd.vim-tiny) does not exist, skipping... LIN1018-4338: [wraxl] Nothing RPROVIDES 'gperftools-dev' (qemuppc) LIN1018-4336: WARNING: No bb files matched BBFILE_PATTERN_wr-nxp-ls1028 LIN1018-4326: lmsensors not recognized as recipe in LTS18 LIN1018-4327: dc exits with wrong exit code LIN1018-4364: can't fetch package cluster-glue on build without --dl-layers LIN1018-4345: NET_9P is not enabled by default LIN1018-4048: Intel-socfpga-64, EDAC/altera - Request to backport ECC patches from upstream LIN1018-3948: systemd graphical.target option is overwritten by wr-installer (to default multi-user.target) LIN1018-4472: CLONE - Port tz code release 2019b to WRL8 ======================= 10.18.44.8 =============================== LIN1018-4330: Security Advisory - linux - CVE-2019-11085 LIN1018-4303: Security Advisory - php - CVE-2019-11040 LIN1018-4302: Security Advisory - php - CVE-2019-11038 LIN1018-4301: Security Advisory - php - CVE-2019-11039 LIN1018-4296: Security Advisory - Linux - CVE-2019-11479 LIN1018-4295: Security Advisory - Linux - CVE-2019-11478 LIN1018-4294: Security Advisory - Linux - CVE-2019-11477 LIN1018-3580: Security Advisory - libsdl - CVE-2019-7576 LIN1018-4250: Security Advisory - qemu - CVE-2018-20815 LIN1018-4249: Security Advisory - sqlite3 - CVE-2019-8457 LIN1018-4248: Security Advisory - qemu - CVE-2019-9824 LIN1018-4244: Security Advisory - phpmyadmin - CVE-2019-11768 LIN1018-4159: Security Advisory - freeradius - CVE-2019-10143 LIN1018-4140: Security Advisory - libvirt - CVE-2019-10132 LIN1018-4080: Security Advisory - linux - CVE-2019-11833 LIN1018-4045: Security Advisory - linux - CVE-2019-11487 LIN1018-4043: Security Advisory - linux - CVE-2018-20836 LIN1018-4042: Security Advisory - linux - CVE-2019-3882 LIN1018-4180: Security Advisory - linux - CVE-2019-3887 LIN1018-4188: Security Advisory - glib-2.0 - CVE-2019-12450 LIN1018-4187: Security Advisory - gvfs - CVE-2019-12447 LIN1018-4186: Security Advisory - gvfs - CVE-2019-12448 LIN1018-4185: Security Advisory - gvfs - CVE-2019-12449 LIN1018-4097: Security Advisory - ghostscript - CVE-2019-3839 LIN1018-4095: Security Advisory - ntp - CVE-2019-8936 LIN1018-4094: Security Advisory - wget - CVE-2019-5953 LIN1018-3955: Security Advisory - linux - CVE-2019-11599 LIN1018-3916: Security Advisory - ffmpeg - CVE-2019-11338 LIN1018-3915: Security Advisory - ffmpeg - CVE-2019-11339 LIN1018-3523: Security Advisory - libsdl - CVE-2019-7577 LIN1018-3543: Security Advisory - libsdl - CVE-2019-7574 LIN1018-3538: Security Advisory - libsdl - CVE-2019-7572 LIN1018-3505: Security Advisory - libsdl - CVE-2019-7575 LIN1018-3507: Security Advisory - libsdl - CVE-2019-7573 LIN1018-3517: Security Advisory - libsdl - CVE-2019-7578 LIN1018-1710: Security Advisory - libpng - CVE-2018-14048 LIN1018-4266: Security Advisory - gvfs - CVE-2019-12795 LIN1018-4265: Security Advisory - dbus - CVE-2019-12749 LIN1018-4264: Security Advisory - apache - CVE-2019-0220 LIN1018-4263: Security Advisory - apache - CVE-2019-0197 LIN1018-4262: Security Advisory - apache - CVE-2019-0196 LIN1018-4150: Security Advisory - qemu - CVE-2019-12155 LIN1018-4243: Security Advisory - phpmyadmin - CVE-2019-12616 LIN1018-4242: Security Advisory - vim - CVE-2019-12735 LIN1018-4252: Security Advisory - libqb - CVE-2019-12779 LIN1018-4171: Security Advisory - curl - CVE-2019-5436 LIN1018-4176: Security Advisory - libpng - CVE-2018-14550 LIN1018-3874: Security Advisory - apache2 - CVE-2019-0211 LIN1018-4062: Security Advisory - u-boot - CVE-2019-11059 LIN1018-3964: Security Advisory - u-boot - CVE-2019-11690 LIN1018-4289: Template processing misses updates to image.inc file LIN1018-4275: CLONE - inetutils: rcp directory copy is not working LIN1018-3616: DPDK development package does not include .mk files LIN1018-4226: CLONE - The original fix of CVE-2019-9948 introduces regressions LIN1018-4235: xilinx-zynq: CONFIG_MTD_NAND=y: error: 'struct nand_chip' has no member named 'onfi_params' LIN1018-4196: [tz-announce] 2019a release of tz code and data available LIN1018-4206: gperftools has limitations on PPC via libunwind, set arch limitation LIN1018-4203: Installation with Anaconda fails loading fonts and drops to debug shell LIN1018-4254: CLONE - Error while building out of tree kernel module after recompiling the kernel LIN1018-4211: wrlinux-image-installer: intel-x86-32: xfsprogs: error: line 175: %package -n libhandle1: package libhandle1 already exists LIN1018-4223: CLONE - QA warning WRL8 host-user-contaminated LIN1018-4216: OpenSSH sshd crashes during login LIN1018-4170: Incomplete fix of CVE-2018-18309 ======================= 10.18.44.7 =============================== LIN1018-3717: Security Advisory - python - CVE-2019-9948 LIN1018-3387: Security Advisory - linux - CVE-2019-3460 LIN1018-3400: Security Advisory - linux - CVE-2019-3459 LIN1018-4023: Security Advisory - gstreamer - CVE-2019-9928 LIN1018-3978: Security Advisory - php - CVE-2019-11034 LIN1018-3977: Security Advisory - php - CVE-2019-11035 LIN1018-3976: Security Advisory - php - CVE-2019-11036 LIN1018-3974: Security Advisory - freeradius - CVE-2019-11234 LIN1018-3973: Security Advisory - freeradius - CVE-2019-11235 LIN1018-4061: Security Advisory - linux - CVE-2019-11884 LIN1018-4038: Security Advisory - linux - CVE-2019-11810 LIN1018-4037: Security Advisory - linux - CVE-2019-11811 LIN1018-4051: Security Advisory - linux - CVE-2019-11815 LIN1018-3972: Security Advisory - python-urllib3 - CVE-2019-11324 LIN1018-3929: Security Advisory - qemu - CVE-2019-5008 LIN1018-3545: Security Advisory - linux - CVE-2019-7308 LIN1018-3885: Security Advisory - systemd - CVE-2019-3842 LIN1018-4078: Security Advisory - linux - CVE-2019-11091 MDSUM LIN1018-4077: Security Advisory - linux - CVE-2018-12130 MFBDS LIN1018-4076: Security Advisory - linux - CVE-2018-12127 MLPDS LIN1018-4075: Security Advisory - linux - CVE-2018-12126 MSBDS LIN1018-4088: " xf86-video-armsoc-2_1.4.1-r0 do_fetch: Network access disabled through BB_NO_NETWORK" occured during glibc-std-sato compiling LIN1018-3952: dhclient does not get SIGTERM and SIGINT LIN1018-3906: kernel warning: kdb_io.c:449:3: warning: 'strncpy' specified bound 256 equals destination size LIN1018-4116: CLONE - [Target Installer] installer can't install bootloader on UEFI firmware ======================= 10.18.44.6 =============================== LIN1018-3810: Security Advisory - libvirt - CVE-2019-3840 LIN1018-3809: Security Advisory - gnutls - CVE-2019-3829 LIN1018-3808: Security Advisory - libcomps - CVE-2019-3817 LIN1018-3807: Security Advisory - ceph - CVE-2019-3821 LIN1018-3805: Security Advisory - linux - CVE-2019-10124 LIN1018-3802: Security Advisory - vim - CVE-2018-20786 LIN1018-3782: Security Advisory - systemd - CVE-2019-6454 LIN1018-3781: Security Advisory - openssl - CVE-2019-1543 LIN1018-3780: Security Advisory - samba - CVE-2019-3824 LIN1018-3779: Security Advisory - qemu - CVE-2019-8934 LIN1018-3778: Security Advisory - glibc - CVE-2019-9169 LIN1018-3792: Security Advisory - gvfs - CVE-2019-3827 LIN1018-3789: Security Advisory - libexif - CVE-2018-20030 LIN1018-3758: Security Advisory - linux - CVE-2019-9213 LIN1018-3751: Security Advisory - ghostscript - CVE-2019-3835 LIN1018-3750: Security Advisory - ghostscript - CVE-2019-3838 LIN1018-3716: Security Advisory - tar - CVE-2019-9923 LIN1018-3714: Security Advisory - sqlite3 - CVE-2019-9936 LIN1018-3713: Security Advisory - sqlite3 - CVE-2019-9937 LIN1018-3712: Security Advisory - php - CVE-2019-9637 LIN1018-3768: Security Advisory - ffmpeg - CVE-2019-9721 LIN1018-3761: Security Advisory - linux - CVE-2019-8980 LIN1018-3736: Security Advisory - file - CVE-2019-8904 LIN1018-3735: Security Advisory - file - CVE-2019-8905 LIN1018-3734: Security Advisory - file - CVE-2019-8906 LIN1018-3733: Security Advisory - file - CVE-2019-8907 LIN1018-3732: Security Advisory - php - CVE-2019-9024 LIN1018-3731: Security Advisory - binutils - CVE-2019-9070 LIN1018-3730: Security Advisory - binutils - CVE-2019-9071 LIN1018-3728: Security Advisory - binutils - CVE-2019-9073 LIN1018-3727: Security Advisory - binutils - CVE-2019-9074 LIN1018-3726: Security Advisory - binutils - CVE-2019-9075 LIN1018-3724: Security Advisory - binutils - CVE-2019-9077 LIN1018-3769: Security Advisory - ffmpeg - CVE-2019-9718 LIN1018-3707: Security Advisory - php - CVE-2019-9023 LIN1018-3705: Security Advisory - php - CVE-2019-9022 LIN1018-3710: Security Advisory - php - CVE-2019-9639 LIN1018-3709: Security Advisory - php - CVE-2018-20783 LIN1018-3692: Security Advisory - php - CVE-2019-9020 LIN1018-3691: Security Advisory - php - CVE-2019-9021 LIN1018-3690: Security Advisory - php - CVE-2019-9025 LIN1018-3676: Security Advisory - php - CVE-2019-9640 LIN1018-3679: Security Advisory - php - CVE-2019-9638 LIN1018-3558: Security Advisory - libpng - CVE-2019-7317 LIN1018-3534: Security Advisory - glibc - CVE-2019-7309 LIN1018-3495: Security Advisory - glibc - CVE-2019-6488 LIN1018-3494: Security Advisory - glibc - CVE-2016-10739 LIN1018-1583: Security Advisory - tiff - CVE-2018-12900 LIN1018-3846: Security Advisory - gnutls - CVE-2019-3836 LIN1018-3843: Security Advisory - sqlite - CVE-2018-20505 LIN1018-3842: Security Advisory - sqlite - CVE-2018-20506 LIN1018-3900: Security Advisory - lighttpd - CVE-2019-11072 LIN1018-3899: Security Advisory - libxslt - CVE-2019-11068 LIN1018-3886: Security Advisory - samba - CVE-2019-3880 LIN1018-3880: Security Advisory - cups - CVE-2018-4300 LIN1018-3708: CLONE - compilation fails when using ccache LIN1018-3693: [WARNING] kernel warning "task_mmu.c:763:7: warning: 'last_vma' may be used uninitialized" LIN1018-3685: [Target Installer] Anaconda error "X startup failed, falling back to text mode" under UEFI mode LIN1018-3683: CLONE - dhclient-script does not support default routes in DHCP option 121 LIN1018-3673: [Target Installer] glibc-core image which installed by target installer hangs at bootup LIN1018-3665: [Target Installer] the creation of disk partitions by BLIVET crashes the installer LIN1018-3663: intel-skylake-avx512-64: WARNING: CPU: 99 PID: 7550 at kernel/sched/deadline.c:254 task_non_contending+0x38e/0x480 LIN1018-3088: CLONE - sensord filling up log files with Error updating RRD LIN1018-3904: Without upstream commit b77fa6, enable CONFIG_PSTORE_CONSOLE may cause build error. LIN1018-3905: CLONE - Building bjam-native locks up build if an NFS dir is part of $PATH and NFS server is unavailable LIN1018-3896: CLONE - samba recipe should add PACKAGECONFIG[libunwind] for libunwind LIN1018-3884: CLONE - short hostname no longer works LIN1018-3832: Missing commit: fs/pstore: use raw_spin_lock in pstore_dump to make it irq safe LIN1018-3828: poweroff error ======================= 10.18.44.5 =============================== LIN1018-3759: Security Advisory - linux - CVE-2019-9162 LIN1018-3715: Security Advisory - linux - CVE-2018-20784 LIN1018-3760: Security Advisory - linux - CVE-2019-9003 LIN1018-3578: Security Advisory - libsndfile - CVE-2019-3832 LIN1018-3576: Security Advisory - linux - CVE-2019-7221 LIN1018-3570: Security Advisory - gd - CVE-2019-6978 LIN1018-3598: Security Advisory - go - CVE-2019-6486 LIN1018-3597: Security Advisory - runc - CVE-2019-5736 LIN1018-3585: Security Advisory - linux - CVE-2019-6974 LIN1018-3584: Security Advisory - apt - CVE-2019-3462 LIN1018-3594: Security Advisory - phpmyadmin - CVE-2019-6798 LIN1018-3031: Security Advisory - linux - CVE-2018-16862 LIN1018-2918: Security Advisory - nasm - CVE-2018-16999 LIN1018-3322: Security Advisory - linux - CVE-2018-19985 LIN1018-3237: Security Advisory - libsndfile1 - CVE-2018-19758 LIN1018-2952: Security Advisory - nasm - CVE-2018-19214 LIN1018-3226: Security Advisory - linux - CVE-2018-16884 LIN1018-3206: Security Advisory - perl - CVE-2018-18312 LIN1018-2974: Security Advisory - nasm - CVE-2018-19215 LIN1018-3653: Security Advisory - openssl - CVE-2019-1559 LIN1018-3394: Security Advisory - openssh - CVE-2019-6111 LIN1018-3392: Security Advisory - openssh - CVE-2019-6109 LIN1018-3567: Security Advisory - spice - CVE-2019-3813 LIN1018-3562: Security Advisory - php - CVE-2019-6977 LIN1018-3553: Security Advisory - linux - CVE-2019-7222 LIN1018-3550: Security Advisory - apache - CVE-2018-17189 LIN1018-3525: Security Advisory - linux - CVE-2018-16880 LIN1018-3519: Security Advisory - linux - CVE-2019-3819 LIN1018-3518: Security Advisory - phpmyadmin - CVE-2019-6799 LIN1018-3651: Security advisory - QEMU - CVE-2019-3812 LIN1018-3502: Security Advisory - python - CVE-2019-5010 LIN1018-3491: Security Advisory - krb5 - CVE-2018-20217 LIN1018-551: Security Advisory - nasm - CVE-2018-10254 LIN1018-3211: Security Advisory - nagios-core - CVE-2018-18245 LIN1018-3541: Security Advisory - netkit-rsh - CVE-2019-7283 LIN1018-3510: Security Advisory - netkit-rsh - CVE-2019-7282 LIN1018-3680: OV: powertop test failed due to 'failed to mmap with 12 (Cannot allocate memory)' LIN1018-3469: lvm2: lvmdiskscan always check hdc. LIN1018-3603: [WARNING] fetch warnings of 3 alsa packages LIN1018-3644: wrlinux-image-ovp: templates do not take effect LIN1018-3643: nxp-ls1046:There is some build warning in kernel's log.do_compile LIN1018-3281: intel-skylake-avx512-64:Call Trace are found on glibc-std-sato and preempt-rt LIN1018-3658: CLONE - Failure of packages crash in managed build which upgraded from RCPL0016 to RCPL0017 LIN1018-3618: FileExistsError in extend_recipe_sysroot when build wrlinux-image-glibc-std with scp feature LIN1018-3362: linux-yocto-rt: CONFIG_DEBUG_VM: VM_WARN_ON_ONCE(preemptible()) triggered during boot LIN1018-3669: arm/arm64:There is no "/usr/bin/makedumpfile" file which kdump service need it LIN1018-3638: CLONE - [LIN1017] net-snmp ptest file is not installed ======================= 10.18.44.4 =============================== LIN1018-2780: Security Advisory - elfutils - CVE-2018-18310 LIN1018-2851: Security Advisory - ghostscript - CVE-2018-18284 LIN1018-2795: Security Advisory - ghostscript - CVE-2018-17961 LIN1018-2813: Security Advisory - elfutils - CVE-2018-18521 LIN1018-2804: Security Advisory - elfutils - CVE-2018-18520 LIN1018-2817: Security Advisory - ghostscript - CVE-2018-18073 LIN1018-3596: Security Advisory - curl - CVE-2019-3822 LIN1018-3589: Security Advisory - libsdl - CVE-2019-7638 LIN1018-3376: Security Advisory - ceph - CVE-2018-16889 LIN1018-3379: Security Advisory - systemd - CVE-2018-16865 LIN1018-3386: Security Advisory - docker - CVE-2018-20699 LIN1018-3385: Security Advisory - ceph - CVE-2018-16846 LIN1018-3045: Security Advisory - ghostscript - CVE-2018-19477 LIN1018-3046: Security Advisory - ghostscript - CVE-2018-19409 LIN1018-3029: Security Advisory - ghostscript - CVE-2018-19476 LIN1018-2983: Security Advisory - glusterfs - CVE-2018-14654 LIN1018-2982: Security Advisory - glusterfs - CVE-2018-14653 LIN1018-2984: Security Advisory - glusterfs - CVE-2018-14659 LIN1018-3408: Security Advisory - systemd - CVE-2018-16866 LIN1018-3402: Security Advisory - binutils - CVE-2018-20671 LIN1018-3404: Security Advisory - systemd - CVE-2018-16864 LIN1018-2960: Security Advisory - glusterfs - CVE-2018-14651 LIN1018-3323: Security Advisory - qemu - CVE-2018-20216 LIN1018-3291: Security Advisory - qemu - CVE-2018-20124 LIN1018-2957: Security Advisory - ruby - CVE-2018-16395 LIN1018-2954: Security Advisory - ruby - CVE-2018-16396 LIN1018-3313: Security Advisory - qemu - CVE-2018-20126 LIN1018-3312: Security Advisory - qemu - CVE-2018-20191 LIN1018-2978: Security Advisory - glusterfs - CVE-2018-14661 LIN1018-3034: Security Advisory - ghostscript - CVE-2018-19475 LIN1018-2941: Security Advisory - glusterfs - CVE-2018-14660 LIN1018-3412: Security Advisory - openssh - CVE-2018-20685 LIN1018-3374: Security Advisory - busybox - CVE-2019-5747 LIN1018-3373: Security Advisory - busybox - CVE-2018-20679 LIN1018-3390: Security Advisory - linux - CVE-2018-16882 LIN1018-3395: Security Advisory - polkit - CVE-2019-6133 LIN1018-3399: Security Advisory - linux - CVE-2019-3701 LIN1018-3398: Security Advisory - ceph - CVE-2018-14662 LIN1018-3397: Security Advisory - tiff - CVE-2019-6128 LIN1018-3563: Security Advisory - elfutils - CVE-2019-7149 LIN1018-3561: Security Advisory - curl - CVE-2018-16890 LIN1018-3560: Security Advisory - libarchive - CVE-2019-1000020 LIN1018-3559: Security Advisory - ghostscript - CVE-2019-6116 LIN1018-3555: Security Advisory - qemu - CVE-2019-6778 LIN1018-3552: Security Advisory - curl - CVE-2019-3823 LIN1018-3548: Security Advisory - elfutils - CVE-2019-7150 LIN1018-3531: Security Advisory - libarchive - CVE-2019-1000019 LIN1018-3530: Security Advisory - kea - CVE-2018-5739 LIN1018-3527: Security Advisory - lua - CVE-2019-6706 LIN1018-3526: Security Advisory - qemu - CVE-2019-6501 LIN1018-3522: Security Advisory - libsdl - CVE-2019-7636 LIN1018-3501: Security Advisory - tiff - CVE-2019-7663 LIN1018-3496: Security Advisory - elfutils - CVE-2019-7148 LIN1018-3513: Security Advisory - apache - CVE-2018-17199 LIN1018-3512: Security Advisory - elfutils - CVE-2019-7665 LIN1018-3346: Security Advisory - qemu - CVE-2018-20125 LIN1018-1754: Security Advisory - linux - CVE-2018-3693 LIN1018-639: Security Advisory - libsndfile - CVE-2017-17457 LIN1018-627: Security Advisory - libsndfile - CVE-2017-17456 LIN1018-3582: Security Advisory - subversion(apache) - CVE-2018-11803 LIN1018-3022: Security Advisory - u-boot - CVE-2018-18439 LIN1018-3021: Security Advisory - u-boot - CVE-2018-18440 LIN1018-1351: Security Advisory - linux - CVE-2018-3639 Speculative Store Bypass LIN1018-3470: [Userspace]'makedumpfile' is incompatible with host aarch64-wrs-linux LIN1018-3601: CLONE - Sato image with graphical desktop : many applications fail to start LIN1018-3440: CLONE - Application reports pthread_cancel issue with libgcc_s.so.1 LIN1018-3353: ptest-runner could not find ptests of each package. LIN1018-3085: CLONE - [KTS]"cipher-gcm" failed in preempt-rt kernel on xilinx-zynqmp target LIN1018-3488: [Userspace] "makedumpfile" command does not support kernel (4.18 aarch64) on xilinx-zynqmp BSP LIN1018-3484: dpdk: do_compile fails with feature/dpdk LIN1018-3428: xilinx-zynq* BSP README : the command for generating the dtb is not 'complete' LIN1018-3366: kern-tools-native: do_configure fails on rebuild LIN1018-3283: kernel warnings LIN1018-3614: WARNING: gnutls-3.6.4-r0 do_patch: Applying patch CVE-2018-16868.patch Hunk #1 succeeded at 126 (offset 49 lines). LIN1018-3613: wrlinux-image-glibc-std do_bootimg() failed with scp feature: extend_recipe_sysroot LIN1018-3436: axxiaarm64: qemu-native-3.0.0-r0 do_compile failed LIN1018-3430: :1335:2: warning: #warning syscall rseq not implemented [-Wcpp] LIN1018-3371: CLONE - Stratix 10 - request to integrate upstream fix for pll clocks rate calculation LIN1018-3370: CLONE - Stratix 10 - request to integrate upstream fix for fixed-clocks naming conventions LIN1018-3368: CLONE - TIPC broadcast Name Discovery packets can be sent with excessive latency LIN1018-1353: [wraxl] wrlinux-image-glibc-small failed (do_populate_sdk_ext) of qemux86_glibc-small_testsdkext. ======================= 10.18.44.3 =============================== LIN1018-2862: Security Advisory - systemd - CVE-2018-15687 LIN1018-2858: Security Advisory - binutils - CVE-2018-18309 LIN1018-2857: Security Advisory - mysql - CVE-2018-3133 LIN1018-2856: Security Advisory - unzip - CVE-2018-18384 LIN1018-2849: Security Advisory - tiff - CVE-2018-18557 LIN1018-2802: Security Advisory - binutils - CVE-2018-18606 LIN1018-2798: Security Advisory - curl - CVE-2018-16842 LIN1018-2796: Security Advisory - mysql - CVE-2018-3282 LIN1018-2794: Security Advisory - qemu - CVE-2018-10839 LIN1018-2812: Security Advisory - curl - CVE-2018-16839 LIN1018-2806: Security Advisory - binutils - CVE-2018-18605 LIN1018-2805: Security Advisory - systemd - CVE-2018-15686 LIN1018-2410: Security Advisory - tiff - CVE-2018-17101 LIN1018-2845: Security Advisory - mysql - CVE-2018-3174 LIN1018-2843: Security Advisory - binutils - CVE-2018-18700 LIN1018-2840: Security Advisory - binutils - CVE-2018-18701 LIN1018-2838: Security Advisory - openssl - CVE-2018-0735 LIN1018-2835: Security Advisory - binutils - CVE-2018-18607 LIN1018-2892: Security Advisory - openssl - CVE-2018-5407 LIN1018-2630: Security Advisory - binutils - CVE-2018-17794 LIN1018-2635: Security Advisory - binutils - CVE-2018-17985 LIN1018-2372: Security Advisory - tiff - CVE-2018-17100 LIN1018-2358: Security Advisory - tiff - CVE-2018-16335 LIN1018-2832: Security Advisory - systemd - CVE-2018-15688 LIN1018-2821: Security Advisory - openssl - CVE-2018-0734 LIN1018-2818: Security Advisory - curl - CVE-2018-16840 LIN1018-2823: Security Advisory - binutils - CVE-2018-18484 LIN1018-2822: Security Advisory - tiff - CVE-2018-18661 LIN1018-3047: Security Advisory - qemu - CVE-2018-19489 LIN1018-3049: Security Advisory - sysstat - CVE-2018-19517 LIN1018-3033: Security Advisory - php - CVE-2018-19518 LIN1018-3330: Security Advisory - binutils - CVE-2018-1000876 LIN1018-3325: Security Advisory - libsolv - CVE-2018-20533 LIN1018-3333: Security Advisory - nss - CVE-2018-12404 LIN1018-3340: Security Advisory - gnupg - CVE-2018-1000858 LIN1018-3318: Security Advisory - ghostscript - CVE-2018-19134 LIN1018-3316: Security Advisory - libsolv - CVE-2018-20532 LIN1018-3307: Security Advisory - libarchive - CVE-2018-1000880 LIN1018-3304: Security Advisory - libarchive - CVE-2018-1000877 LIN1018-3303: Security Advisory - cups - CVE-2018-4700 LIN1018-3341: Security Advisory - avahi - CVE-2018-1000845 LIN1018-3296: Security Advisory - tar - CVE-2018-20482 LIN1018-3299: Security Advisory - sqlite - CVE-2018-20346 LIN1018-3298: Security Advisory - python - CVE-2018-20406 LIN1018-3297: Security Advisory - libarchive - CVE-2018-1000878 LIN1018-3301: Security Advisory - libsolv - CVE-2018-20534 LIN1018-3276: Security Advisory - samba - CVE-2018-14629 LIN1018-3250: Security Advisory - glibc - CVE-2018-19591 LIN1018-3249: Security Advisory - go - CVE-2018-16873 LIN1018-3248: Security Advisory - perl - CVE-2018-18313 LIN1018-3247: Security Advisory - linux - CVE-2018-19824 LIN1018-3245: Security Advisory - samba - CVE-2018-16851 LIN1018-3244: Security Advisory - samba - CVE-2018-16853 LIN1018-3261: Security Advisory - samba - CVE-2018-16841 LIN1018-3260: Security Advisory - binutils - CVE-2018-19932 LIN1018-3242: Security Advisory - qemu - CVE-2018-16872 LIN1018-3240: Security Advisory - linux - CVE-2018-18397 LIN1018-3239: Security Advisory - binutils - CVE-2018-19931 LIN1018-3255: Security Advisory - php - CVE-2018-19935 LIN1018-3251: Security Advisory - perl - CVE-2018-18311 LIN1018-3257: Security Advisory - qemu - CVE-2018-16867 LIN1018-3258: Security Advisory - libsndfile1 - CVE-2018-19662 LIN1018-3196: Security Advisory - qemu - CVE-2018-19665 LIN1018-3197: Security Advisory - nettle - CVE-2018-16869 LIN1018-2953: Security Advisory - qemu - CVE-2018-18954 LIN1018-2950: Security Advisory - qemu - CVE-2018-16847 LIN1018-3329: Security Advisory - libarchive - CVE-2018-1000879 LIN1018-3308: Security Advisory - ghostscript - CVE-2018-19478 LIN1018-3315: Security Advisory - wget - CVE-2018-20483 LIN1018-3227: Security Advisory - linux - CVE-2018-20169 LIN1018-3215: Security Advisory - libsndfile1 - CVE-2018-19661 LIN1018-3230: Security Advisory - go - CVE-2018-16875 LIN1018-3219: Security Advisory - phpmyadmin - CVE-2018-19970 LIN1018-3232: Security Advisory - perl - CVE-2018-18314 LIN1018-3233: Security Advisory - qemu - CVE-2018-20123 LIN1018-3208: Security Advisory - binutils - CVE-2018-20002 LIN1018-3200: Security Advisory - gnutls - CVE-2018-16868 LIN1018-3205: Security Advisory - phpmyadmin - CVE-2018-19968 LIN1018-3201: Security Advisory - go - CVE-2018-16874 LIN1018-3212: Security Advisory - nasm - CVE-2018-19755 LIN1018-3052: Security Advisory - libsndfile1 - CVE-2018-19432 LIN1018-2972: Security Advisory - postgresql - CVE-2018-16850 LIN1018-3035: Security Advisory - sysstat - CVE-2018-19416 LIN1018-3041: Security Advisory - git - CVE-2018-19486 LIN1018-3042: Security Advisory - nss - CVE-2018-12384 LIN1018-3027: Security Advisory - linux - CVE-2018-19407 LIN1018-2996: Security Advisory - qemu - CVE-2018-19364 LIN1018-2942: Security Advisory - qemu - CVE-2018-18849 LIN1018-3347: Security Advisory - binutils - CVE-2018-20651 LIN1018-2020: Security Advisory - tiff - CVE-2018-15209 LIN1018-1624: Security Advisory - binutils - CVE-2018-12698 LIN1018-1565: Security Advisory - binutils - CVE-2018-12641 LIN1018-1590: Security Advisory - binutils - CVE-2018-12697 LIN1018-1587: Security Advisory - binutils - CVE-2018-12700 LIN1018-2847: Security Advisory - xserver-xorg - CVE-2018-14665 LIN1018-3310: Security Advisory - libjpeg-turbo - CVE-2018-20330 LIN1018-3224: Security Advisory - libjpeg-turbo - CVE-2018-19664 LIN1018-3290: CLONE - [tz-announce] 2018i release of tz code and data available LIN1018-3119: CLONE - ptpd2 daemon takes 100% CPU LIN1018-3090: CLONE - File property changed after copied from yaffs2 file system on nand flash (on TI-AM335x-EVM target) LIN1018-3007: xfce: xserver stopped without display manager while booting from iso image LIN1018-3264: iw version 4.14, wep connect caught 'command failed: Invalid argument (-22)' LIN1018-3122: ovs-vsctl : db_ctl_base|ERR|external-ids:hostname=: argument does not end in "=" followed by a value. LIN1018-3077: glibc-std-sato: preempt-rt: i915 crashed with CONFIG_DEBUG_ATOMIC_SLEEP=y LIN1018-3055: OV: ssh to guest failed LIN1018-3287: CLONE - running "chkconfig iptables on" messes up the startup levels of os services LIN1018-3363: CLONE - target build fails because sstate-build-populate_lic file is not available ======================= 10.18.44.2 =============================== LIN1018-2619: Security Advisory - binutils - CVE-2018-17360 LIN1018-2617: Security Advisory - binutils - CVE-2018-17358 LIN1018-2861: Security Advisory - gettext - CVE-2018-18751 LIN1018-2650: Security Advisory - binutils - CVE-2018-17359 LIN1018-2643: Security Advisory - tiff - CVE-2018-17795 LIN1018-3082: CLONE - Image contains binaries from users build environment LIN1018-3059: thin-provisioning-tools do_install(): bin/txt2man: 2: exec: ksh: not found LIN1018-3076: cc1: error: SSE instruction set disabled, using 387 arithmetics [-Werror] LIN1018-3018: vsftpd: 500 OOPS: priv_sock_get_cmd LIN1018-1659: python tkinter is not working