1.0 ROLLING CUMULATIVE PATCH LAYER OVERVIEW This is a Rolling Cumulative Patch Layer for the base Wind River Linux LTS 19 release. This RCPL provides fixes for known problems. For information on updating your projects, see the Product Updates section of the Wind River Linux Getting Started guide. https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/tfk1473951651031.html The update procedure involves updating your projectDir/wrlinux-x repository, and then re-running the setup.sh program with the original arguments. The procedure for upgrading your project is shown in the Updating Wind River Linux section of that guide: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html 2.0 RCPL Update Implementation The distribution is a set of git repositories that are used to generate project directories at setup time. An RCPL appends new fixes to these repositories. As a result, the git repositories can grow with each new RCPL. The product name branches include two specific branch names. The first is a continuous integration branch. The continuous integration branch tracks the latest RCPL version release by Wind River, and does not include an RCPL number. For example: * WRLINUX_10_19_BASE * WRLINUX_10_19_LTS These branches will always match the latest released RCPL. The second branch name is RCPL-specific, with a reference to a specific RCPL, such as: * WRLINUX_10_19_BASE_UPDATE0001 * WRLINUX_10_19_LTS_RCPL0002 To identify which branch you are on, run the following commands: $ cd projectDir/wrlinux-x $ git branch 3.0 Selecting a specific RCPL Follow the procedure as indicated in the Updating Wind River Linux section of the Wind River Linux Getting Started guide located at: https://docs.windriver.com/bundle/Wind_River_Linux_Getting_Started_LTS_19/page/mmo1403548753903.html In step 3, of the procedure you will use the branchName of the RCPL that you wish to use. For example: $ git checkout WRLINUX_10_19_LTS_RCPL0002 4.0 Change Log The following is a summary of the changes made in each RCPL version. The initial product distribution occurred with RCPL0001. Defect List: ======================= 10.19.45.25 =============================== LIN1019-8738: Security Advisory - binutils - CVE-2022-38533 LIN1019-8737: Security Advisory - poppler - CVE-2021-30860 LIN1019-8724: Security Advisory - python - CVE-2021-28861 LIN1019-8696: Security Advisory - linux - CVE-2022-2503 LIN1019-8694: Security Advisory - intel-microcode - CVE-2022-21233 LIN1019-8690: Security Advisory - linux - CVE-2022-2588 LIN1019-8686: Security Advisory - ffmpeg - CVE-2022-1475 LIN1019-8685: Security Advisory - linux - CVE-2021-4135 LIN1019-8684: Security Advisory - postgresql - CVE-2022-2625 LIN1019-8680: Security Advisory - zlib - CVE-2022-37434 LIN1019-8679: Security Advisory - linux - CVE-2022-2639 LIN1019-8675: Security Advisory - linux - CVE-2022-20369 LIN1019-8674: Security Advisory - linux - CVE-2022-20368 LIN1019-8673: Security Advisory - rsync - CVE-2022-29154 LIN1019-8668: Security Advisory - go - CVE-2022-32189 LIN1019-8658: Security Advisory - libxml2 - CVE-2016-3709 LIN1019-8642: Security Advisory - linux - CVE-2022-36946 LIN1019-8641: Security Advisory - linux - CVE-2022-36879 LIN1019-8622: Security Advisory - vim - CVE-2022-2522 LIN1019-8607: Security Advisory - libtirpc - CVE-2021-46828 LIN1019-8577: Security Advisory - linux - CVE-2021-33656 LIN1019-8576: Security Advisory - linux - CVE-2021-33655 LIN1019-8569: Security Advisory - xserver-xorg - CVE-2022-2320 LIN1019-8568: Security Advisory - xserver-xorg - CVE-2022-2319 LIN1019-8564: Security Advisory - linux - CVE-2022-2380 LIN1019-8550: Security Advisory - vim - CVE-2022-2345 LIN1019-8549: Security Advisory - vim - CVE-2022-2344 LIN1019-8548: Security Advisory - vim - CVE-2022-2343 LIN1019-8542: Security Advisory - linux - CVE-2022-2318 LIN1019-8537: Security Advisory - vim - CVE-2022-2304 LIN1019-8536: Security Advisory - openssl - CVE-2022-2097 LIN1019-8534: Security Advisory - python-django - CVE-2022-34265 LIN1019-8517: Security Advisory - vim - CVE-2022-2289 LIN1019-8516: Security Advisory - vim - CVE-2022-2288 LIN1019-8515: Security Advisory - vim - CVE-2022-2287 LIN1019-8514: Security Advisory - vim - CVE-2022-2286 LIN1019-8513: Security Advisory - vim - CVE-2022-2285 LIN1019-8512: Security Advisory - vim - CVE-2022-2284 LIN1019-8511: Security Advisory - vim - CVE-2022-2264 LIN1019-8510: Security Advisory - vim - CVE-2022-2257 LIN1019-8507: Security Advisory - go - CVE-2022-32148 LIN1019-8506: Security Advisory - go - CVE-2022-30635 LIN1019-8504: Security Advisory - go - CVE-2022-28131 LIN1019-8487: Security Advisory - vim - CVE-2022-2206 LIN1019-8478: Security Advisory - vim - CVE-2022-2175 LIN1019-8461: Security Advisory - vim - CVE-2022-2125 LIN1019-8431: Security Advisory - vim - CVE-2022-2000 LIN1019-8399: Security Advisory - vim - CVE-2022-1968 LIN1019-8394: Security Advisory - go - CVE-2022-30631 LIN1019-8379: Security Advisory - vim - CVE-2022-1898 LIN1019-8378: Security Advisory - vim - CVE-2022-1897 LIN1019-8355: Security Advisory - vim - CVE-2022-1851 LIN1019-8346: Security Advisory - linux - CVE-2022-1729 LIN1019-8343: Security Advisory - vim - CVE-2022-1796 LIN1019-8342: Security Advisory - vim - CVE-2022-1785 LIN1019-8340: Security Advisory - busybox - CVE-2022-30065 LIN1019-8339: Security Advisory - vim - CVE-2022-1771 LIN1019-8329: Security Advisory - vim - CVE-2022-1735 LIN1019-8328: Security Advisory - vim - CVE-2022-1733 LIN1019-8326: Security Advisory - vim - CVE-2022-1720 LIN1019-7803: Security Advisory - vim - CVE-2022-0351 LIN1019-7674: Security Advisory - cryptsetup - CVE-2021-4122 LIN1019-7558: Security Advisory - vim - CVE-2021-4166 LIN1019-6394: Security Advisory - qemu - CVE-2021-3507 LIN1019-5901: Security Advisory - linux - CVE-2020-16119 LIN1019-8089: sd_journal_next returns one entry per journal file after sd_journal_seek_tail ======================= 10.19.45.24 =============================== LIN1019-8532: Security Advisory - gnupg - CVE-2022-34903 LIN1019-8530: Security Advisory - lua - CVE-2022-33099 LIN1019-8508: Security Advisory - u-boot - CVE-2022-34835 LIN1019-8501: Security Advisory - tiff - CVE-2022-2058 LIN1019-8500: Security Advisory - tiff - CVE-2022-2057 LIN1019-8499: Security Advisory - tiff - CVE-2022-2056 LIN1019-8483: Security Advisory - harfbuzz - CVE-2022-33068 LIN1019-8476: Security Advisory - linux - CVE-2022-2153 LIN1019-8474: Security Advisory - openssl - CVE-2022-2068 LIN1019-8470: Security Advisory - python-ldap - CVE-2021-46823 LIN1019-8466: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-2122 LIN1019-8457: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1925 LIN1019-8456: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1924 LIN1019-8455: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1923 LIN1019-8454: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1922 LIN1019-8453: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1921 LIN1019-8452: Security Advisory - gstreamer1.0-plugins-good - CVE-2022-1920 LIN1019-8450: Security Advisory - intel-microcode - CVE-2022-21166 LIN1019-8449: Security Advisory - intel-microcode - CVE-2022-21127 LIN1019-8448: Security Advisory - intel-microcode - CVE-2022-21125 LIN1019-8447: Security Advisory - intel-microcode - CVE-2022-21123 LIN1019-8443: Security Advisory - exo - CVE-2022-32278 LIN1019-8439: Security Advisory - linux - CVE-2022-32981 LIN1019-8436: Security Advisory - php - CVE-2022-31626 LIN1019-8435: Security Advisory - php - CVE-2022-31625 LIN1019-8434: Security Advisory - u-boot - CVE-2022-30790 LIN1019-8433: Security Advisory - u-boot - CVE-2022-30552 LIN1019-8432: Security Advisory - shim - CVE-2022-28737 LIN1019-8425: Security Advisory - grub - CVE-2022-28735 LIN1019-8424: Security Advisory - grub - CVE-2022-28734 LIN1019-8423: Security Advisory - grub - CVE-2022-28733 LIN1019-8422: Security Advisory - grub - CVE-2021-3697 LIN1019-8421: Security Advisory - grub - CVE-2021-3696 LIN1019-8420: Security Advisory - grub - CVE-2021-3695 LIN1019-8419: Security Advisory - apache2 - CVE-2022-31813 LIN1019-8418: Security Advisory - apache2 - CVE-2022-30556 LIN1019-8417: Security Advisory - apache2 - CVE-2022-30522 LIN1019-8416: Security Advisory - apache2 - CVE-2022-29404 LIN1019-8415: Security Advisory - apache2 - CVE-2022-28615 LIN1019-8414: Security Advisory - apache2 - CVE-2022-28614 LIN1019-8412: Security Advisory - apache2 - CVE-2022-26377 LIN1019-8410: Security Advisory - containerd-opencontainers - CVE-2022-31030 LIN1019-8404: Security Advisory - linux - CVE-2022-32296 LIN1019-8403: Security Advisory - linux - CVE-2022-1975 LIN1019-8402: Security Advisory - linux - CVE-2022-1974 LIN1019-8396: Security Advisory - linux - CVE-2022-1966 LIN1019-8377: Security Advisory - cups - CVE-2022-26691 LIN1019-8376: Security Advisory - dpkg - CVE-2022-1664 LIN1019-8371: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30789 LIN1019-8370: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30788 LIN1019-8369: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30787 LIN1019-8368: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30786 LIN1019-8367: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30785 LIN1019-8366: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30784 LIN1019-8365: Security Advisory - ntfs-3g-ntfsprogs - CVE-2022-30783 LIN1019-8349: Security Advisory - linux - CVE-2022-1836 LIN1019-8333: Security Advisory - linux - CVE-2022-29581 LIN1019-8332: Security Advisory - linux - CVE-2022-1734 LIN1019-8325: Security Advisory - u-boot - CVE-2022-30767 LIN1019-8319: Security Advisory - runc-docker - CVE-2022-29162 LIN1019-8318: Security Advisory - intel-microcode - CVE-2022-21151 LIN1019-8317: Security Advisory - intel-microcode - CVE-2021-33117 LIN1019-8316: Security Advisory - vim - CVE-2022-1674 LIN1019-8315: Security Advisory - linux - CVE-2022-30594 LIN1019-8312: Security Advisory - linux - CVE-2021-26401 LIN1019-8311: Security Advisory - postgresql - CVE-2022-1552 LIN1019-8310: Security Advisory - go - CVE-2022-29526 LIN1019-8309: Security Advisory - curl - CVE-2022-27782 LIN1019-8308: Security Advisory - linux - CVE-2022-1652 LIN1019-8306: Security Advisory - linux - CVE-2022-1012 LIN1019-8304: Security Advisory - curl - CVE-2022-27781 LIN1019-8297: Security Advisory - vim - CVE-2022-1629 LIN1019-8296: Security Advisory - vim - CVE-2022-1621 LIN1019-8288: Security Advisory - vim - CVE-2022-1620 LIN1019-8287: Security Advisory - vim - CVE-2022-1619 LIN1019-8286: Security Advisory - vim - CVE-2022-1616 LIN1019-8282: Security Advisory - pcre2 - CVE-2022-1586 LIN1019-8280: Security Advisory - poppler - CVE-2022-27337 LIN1019-8279: Security Advisory - rsyslog - CVE-2022-24903 LIN1019-8250: Security Advisory - redis - CVE-2022-24736 LIN1019-8249: Security Advisory - redis - CVE-2022-24735 LIN1019-8248: Security Advisory - curl - CVE-2022-27776 LIN1019-8247: Security Advisory - curl - CVE-2022-27775 LIN1019-8246: Security Advisory - curl - CVE-2022-27774 LIN1019-8226: Security Advisory - linux - CVE-2022-1184 LIN1019-8221: Security Advisory - mariadb - CVE-2022-21427 LIN1019-8182: Security Advisory - mariadb - CVE-2022-27458 LIN1019-8180: Security Advisory - mariadb - CVE-2022-27456 LIN1019-8178: Security Advisory - mariadb - CVE-2022-27452 LIN1019-8176: Security Advisory - mariadb - CVE-2022-27449 LIN1019-8175: Security Advisory - mariadb - CVE-2022-27448 LIN1019-8174: Security Advisory - mariadb - CVE-2022-27447 LIN1019-8172: Security Advisory - mariadb - CVE-2022-27445 LIN1019-8170: Security Advisory - python - CVE-2015-20107 LIN1019-8161: Security Advisory - subversion - CVE-2021-28544 LIN1019-8160: Security Advisory - mariadb - CVE-2022-27387 LIN1019-8159: Security Advisory - mariadb - CVE-2022-27386 LIN1019-8157: Security Advisory - mariadb - CVE-2022-27384 LIN1019-8156: Security Advisory - mariadb - CVE-2022-27383 LIN1019-8154: Security Advisory - mariadb - CVE-2022-27381 LIN1019-8153: Security Advisory - mariadb - CVE-2022-27380 LIN1019-8152: Security Advisory - mariadb - CVE-2022-27379 LIN1019-8151: Security Advisory - mariadb - CVE-2022-27378 LIN1019-8150: Security Advisory - mariadb - CVE-2022-27377 LIN1019-8149: Security Advisory - mariadb - CVE-2022-27376 LIN1019-8148: Security Advisory - ruby - CVE-2022-28739 LIN1019-8144: Security Advisory - e2fsprogs - CVE-2022-1304 LIN1019-8120: Security Advisory - linux - CVE-2022-1158 LIN1019-8106: Security Advisory - linux - CVE-2022-28390 LIN1019-8105: Security Advisory - linux - CVE-2022-28389 LIN1019-8093: Security Advisory - go - CVE-2022-28327 LIN1019-8091: Security Advisory - go - CVE-2022-24675 LIN1019-8077: Security Advisory - linux - CVE-2022-1055 LIN1019-8062: Security Advisory - linux - CVE-2022-1048 LIN1019-8045: Security Advisory - linux - CVE-2022-0494 LIN1019-8043: Security Advisory - linux - CVE-2022-0854 LIN1019-7990: Security Advisory - linux - CVE-2022-0002 LIN1019-7988: Security Advisory - linux - CVE-2022-0001 LIN1019-7856: Security Advisory - virglrenderer - CVE-2022-0135 LIN1019-7847: Security Advisory - mariadb - CVE-2021-46669 LIN1019-7807: Security Advisory - virglrenderer - CVE-2022-0175 LIN1019-6869: Security Advisory - nginx - CVE-2021-3618 LIN1019-6192: Security Advisory - libconvert-asn1-perl - CVE-2013-7488 LIN1019-8535: dpkg: install package failed ======================= 10.19.45.23 =============================== LIN1019-8276: Security Advisory - openldap - CVE-2022-29155 LIN1019-8262: Security Advisory - openssl - CVE-2022-1292 LIN1019-8261: Security Advisory - libxml2 - CVE-2022-29824 LIN1019-8256: Security Advisory - linux - CVE-2022-1516 LIN1019-8245: Security Advisory - curl - CVE-2022-22576 LIN1019-8239: Security Advisory - freetype - CVE-2022-27406 LIN1019-8238: Security Advisory - freetype - CVE-2022-27405 LIN1019-8237: Security Advisory - freetype - CVE-2022-27404 LIN1019-8235: Security Advisory - tiff - CVE-2022-1355 LIN1019-8227: Security Advisory - libinput - CVE-2022-1215 LIN1019-8190: Security Advisory - ncurses - CVE-2022-29458 LIN1019-8189: Security Advisory - linux - CVE-2022-1353 LIN1019-8162: Security Advisory - subversion - CVE-2022-24070 LIN1019-8142: Security Advisory - xz - CVE-2022-1271 LIN1019-8141: Security Advisory - gzip - CVE-2022-1271 LIN1019-8140: Security Advisory - gnutls - CVE-2021-4209 LIN1019-8139: Security Advisory - linux - CVE-2022-28893 LIN1019-8138: Security Advisory - python-django - CVE-2022-28347 LIN1019-8137: Security Advisory - python-django - CVE-2022-28346 LIN1019-8108: Security Advisory - qemu - CVE-2021-4207 LIN1019-8107: Security Advisory - qemu - CVE-2021-4206 LIN1019-8104: Security Advisory - linux - CVE-2022-28388 LIN1019-8103: Security Advisory - linux - CVE-2022-28356 LIN1019-8102: Security Advisory - linux - CVE-2022-1205 LIN1019-8101: Security Advisory - linux - CVE-2022-1204 LIN1019-8100: Security Advisory - linux - CVE-2022-1199 LIN1019-8099: Security Advisory - linux - CVE-2022-1198 LIN1019-8098: Security Advisory - linux - CVE-2022-1195 LIN1019-8095: Security Advisory - libsdl2 - CVE-2021-33657 LIN1019-8094: Security Advisory - dnsmasq - CVE-2022-0934 LIN1019-8085: Security Advisory - vim - CVE-2022-1154 LIN1019-8076: Security Advisory - linux - CVE-2022-1016 LIN1019-8074: Security Advisory - libarchive - CVE-2022-26280 LIN1019-8067: Security Advisory - zlib - CVE-2018-25032 LIN1019-8065: Security Advisory - fribidi - CVE-2022-25310 LIN1019-8064: Security Advisory - fribidi - CVE-2022-25309 LIN1019-8063: Security Advisory - fribidi - CVE-2022-25308 LIN1019-8049: Security Advisory - linux - CVE-2022-27666 LIN1019-8039: Security Advisory - linux - CVE-2021-45868 LIN1019-8037: Security Advisory - libvirt - CVE-2022-0897 LIN1019-8033: Security Advisory - linux - CVE-2022-27223 LIN1019-8026: Security Advisory - openssl - CVE-2022-0778 LIN1019-8021: Security Advisory - apache2 - CVE-2022-23943 LIN1019-8020: Security Advisory - apache2 - CVE-2022-22721 LIN1019-8019: Security Advisory - apache2 - CVE-2022-22720 LIN1019-8018: Security Advisory - apache2 - CVE-2022-22719 LIN1019-8016: Security Advisory - vim - CVE-2022-0943 LIN1019-8011: Security Advisory - linux - CVE-2022-26966 LIN1019-8009: Security Advisory - tiff - CVE-2022-0924 LIN1019-8008: Security Advisory - tiff - CVE-2022-0909 LIN1019-8007: Security Advisory - tiff - CVE-2022-0908 LIN1019-8006: Security Advisory - tiff - CVE-2022-0907 LIN1019-8005: Security Advisory - linux - CVE-2022-23042 LIN1019-8004: Security Advisory - linux - CVE-2022-23041 LIN1019-8003: Security Advisory - linux - CVE-2022-23040 LIN1019-8002: Security Advisory - linux - CVE-2022-23039 LIN1019-8001: Security Advisory - linux - CVE-2022-23038 LIN1019-8000: Security Advisory - linux - CVE-2022-23037 LIN1019-7999: Security Advisory - linux - CVE-2022-23036 LIN1019-7991: Security Advisory - linux - CVE-2022-23960 LIN1019-7987: Security Advisory - tiff - CVE-2022-0891 LIN1019-7982: Security Advisory - tiff - CVE-2022-0865 LIN1019-7979: Security Advisory - go - CVE-2022-24921 LIN1019-7960: Security Advisory - vim - CVE-2022-0729 LIN1019-7958: Security Advisory - vim - CVE-2022-0714 LIN1019-7957: Security Advisory - vim - CVE-2022-0696 LIN1019-7937: Security Advisory - vim - CVE-2022-0685 LIN1019-7927: Security Advisory - vim - CVE-2022-0629 LIN1019-7919: Security Advisory - linux - CVE-2022-25258 LIN1019-7918: Security Advisory - linux - CVE-2022-0617 LIN1019-7899: Security Advisory - linux - CVE-2021-44879 LIN1019-7896: Security Advisory - linux - CVE-2022-24958 LIN1019-7895: Security Advisory - linux - CVE-2022-24959 LIN1019-7887: Security Advisory - linux - CVE-2022-0435 LIN1019-7867: Security Advisory - linux - CVE-2022-24448 LIN1019-7820: Security Advisory - protobuf - CVE-2021-22570 LIN1019-7775: Security Advisory - go - CVE-2022-23772 LIN1019-7639: Security Advisory - linux - CVE-2021-4197 LIN1019-7512: Security Advisory - epiphany - CVE-2021-45088 LIN1019-7503: Security Advisory - linux - CVE-2021-39685 LIN1019-7390: Security Advisory - busybox - CVE-2021-42375 LIN1019-7129: Security Advisory - linux - CVE-2021-3772 LIN1019-4120: Security Advisory - netkit-telnet - CVE-2020-10188 LIN1019-8118: menuconfig fails ======================= 10.19.45.22 =============================== LIN1019-8236: Security Advisory - linux - CVE-2022-1419 LIN1019-8082: Security Advisory - openjpeg - CVE-2022-1122 LIN1019-8025: Security Advisory - zabbix - CVE-2022-24919 LIN1019-8024: Security Advisory - zabbix - CVE-2022-24918 LIN1019-8023: Security Advisory - zabbix - CVE-2022-24917 LIN1019-8022: Security Advisory - zabbix - CVE-2022-24349 LIN1019-8017: Security Advisory - qemu - CVE-2022-26353 LIN1019-7985: Security Advisory - linux - CVE-2022-0847 LIN1019-7978: Security Advisory - linux - CVE-2022-26490 LIN1019-7977: Security Advisory - linux - CVE-2022-0850 LIN1019-7972: Security Advisory - linux - CVE-2022-0812 LIN1019-7963: Security Advisory - flac - CVE-2021-0561 LIN1019-7961: Security Advisory - cyrus-sasl - CVE-2022-24407 LIN1019-7956: Security Advisory - samba - CVE-2021-44142 LIN1019-7941: Security Advisory - phoronix-test-suite - CVE-2022-0571 LIN1019-7938: Security Advisory - linux - CVE-2022-25375 LIN1019-7936: Security Advisory - polkit - CVE-2021-4115 LIN1019-7935: Security Advisory - libxml2 - CVE-2022-23308 LIN1019-7934: Security Advisory - expat - CVE-2022-25315 LIN1019-7933: Security Advisory - expat - CVE-2022-25314 LIN1019-7932: Security Advisory - expat - CVE-2022-25313 LIN1019-7925: Security Advisory - linux - CVE-2022-0644 LIN1019-7923: Security Advisory - expat - CVE-2022-25236 LIN1019-7922: Security Advisory - expat - CVE-2022-25235 LIN1019-7915: Security Advisory - util-linux - CVE-2022-0563 LIN1019-7914: Security Advisory - vim - CVE-2022-0572 LIN1019-7906: Security Advisory - intel-microcode - CVE-2021-0145 LIN1019-7905: Security Advisory - intel-microcode - CVE-2021-0127 LIN1019-7901: Security Advisory - tiff - CVE-2022-0562 LIN1019-7900: Security Advisory - tiff - CVE-2022-0561 LIN1019-7892: Security Advisory - python - CVE-2021-3737 LIN1019-7889: Security Advisory - python - CVE-2022-0391 LIN1019-7888: Security Advisory - vim - CVE-2022-0554 LIN1019-7886: Security Advisory - intel-microcode - CVE-2021-33120 LIN1019-7880: Security Advisory - mariadb - CVE-2022-24052 LIN1019-7879: Security Advisory - mariadb - CVE-2022-24051 LIN1019-7878: Security Advisory - mariadb - CVE-2022-24050 LIN1019-7877: Security Advisory - mariadb - CVE-2022-24048 LIN1019-7873: Security Advisory - go - CVE-2022-23806 LIN1019-7869: Security Advisory - linux - CVE-2022-0492 LIN1019-7868: Security Advisory - linux - CVE-2022-0487 LIN1019-7866: Security Advisory - vim - CVE-2022-0443 LIN1019-7855: Security Advisory - python-django - CVE-2022-23833 LIN1019-7854: Security Advisory - python-django - CVE-2022-22818 LIN1019-7853: Security Advisory - vim - CVE-2022-0417 LIN1019-7849: Security Advisory - xterm - CVE-2022-24130 LIN1019-7846: Security Advisory - mariadb - CVE-2021-46668 LIN1019-7845: Security Advisory - mariadb - CVE-2021-46667 LIN1019-7843: Security Advisory - mariadb - CVE-2021-46665 LIN1019-7842: Security Advisory - mariadb - CVE-2021-46664 LIN1019-7841: Security Advisory - mariadb - CVE-2021-46663 LIN1019-7840: Security Advisory - mariadb - CVE-2021-46662 LIN1019-7839: Security Advisory - mariadb - CVE-2021-46661 LIN1019-7835: Security Advisory - mariadb - CVE-2021-46659 LIN1019-7832: Security Advisory - vim - CVE-2022-0413 LIN1019-7831: Security Advisory - vim - CVE-2022-0408 LIN1019-7825: Security Advisory - linux - CVE-2022-22942 LIN1019-7822: Security Advisory - vim - CVE-2022-0392 LIN1019-7821: Security Advisory - openssl - CVE-2021-4160 LIN1019-7817: Security Advisory - polkit - CVE-2021-4034 LIN1019-7816: Security Advisory - expat - CVE-2022-23990 LIN1019-7814: Security Advisory - linux - CVE-2021-22600 LIN1019-7813: Security Advisory - vim - CVE-2022-0368 LIN1019-7812: Security Advisory - vim - CVE-2022-0361 LIN1019-7811: Security Advisory - vim - CVE-2022-0359 LIN1019-7806: Security Advisory - connman - CVE-2022-23098 LIN1019-7805: Security Advisory - connman - CVE-2022-23097 LIN1019-7804: Security Advisory - connman - CVE-2022-23096 LIN1019-7802: Security Advisory - python - CVE-2021-4189 LIN1019-7798: Security Advisory - python-numpy - CVE-2021-41496 LIN1019-7797: Security Advisory - util-linux - CVE-2021-3996 LIN1019-7796: Security Advisory - util-linux - CVE-2021-3995 LIN1019-7794: Security Advisory - expat - CVE-2022-23852 LIN1019-7783: Security Advisory - linux - CVE-2022-0322 LIN1019-7782: Security Advisory - vim - CVE-2022-0319 LIN1019-7781: Security Advisory - vim - CVE-2022-0318 LIN1019-7779: Security Advisory - phpmyadmin - CVE-2022-23807 LIN1019-7694: Security Advisory - linux - CVE-2022-0185 LIN1019-7688: Security Advisory - hostapd&wpa-supplicant - CVE-2022-23304 LIN1019-7687: Security Advisory - hostapd&wpa-supplicant - CVE-2022-23303 LIN1019-7684: Security Advisory - phoronix-test-suite - CVE-2022-0238 LIN1019-7683: Security Advisory - bluez5 - CVE-2022-0204 LIN1019-7682: Security Advisory - vim - CVE-2022-0213 LIN1019-7680: Security Advisory - glibc - CVE-2022-23219 LIN1019-7679: Security Advisory - glibc - CVE-2022-23218 LIN1019-7678: Security Advisory - nss - CVE-2022-22747 LIN1019-7677: Security Advisory - phoronix-test-suite - CVE-2022-0197 LIN1019-7676: Security Advisory - phoronix-test-suite - CVE-2022-0196 LIN1019-7665: Security Advisory - glibc - CVE-2021-3999 LIN1019-7655: Security Advisory - linux - CVE-2021-4203 LIN1019-7654: Security Advisory - linux - CVE-2021-4202 LIN1019-7649: Security Advisory - phoronix-test-suite - CVE-2022-0157 LIN1019-7647: Security Advisory - systemd - CVE-2021-3997 LIN1019-7643: Security Advisory - linux - CVE-2021-4155 LIN1019-7640: Security Advisory - tiff - CVE-2022-22844 LIN1019-7631: Security Advisory - expat - CVE-2022-22827 LIN1019-7630: Security Advisory - expat - CVE-2022-22826 LIN1019-7629: Security Advisory - expat - CVE-2022-22825 LIN1019-7628: Security Advisory - expat - CVE-2022-22824 LIN1019-7627: Security Advisory - expat - CVE-2022-22823 LIN1019-7626: Security Advisory - expat - CVE-2022-22822 LIN1019-7622: Security Advisory - expat - CVE-2021-46143 LIN1019-7621: Security Advisory - linux - CVE-2021-39634 LIN1019-7620: Security Advisory - linux - CVE-2021-39633 LIN1019-7619: Security Advisory - linux - CVE-2021-28715 LIN1019-7618: Security Advisory - linux - CVE-2021-28714 LIN1019-7615: Security Advisory - tcpslice - CVE-2021-41043 LIN1019-7603: Security Advisory - python-django - CVE-2021-45452 LIN1019-7602: Security Advisory - python-django - CVE-2021-45116 LIN1019-7601: Security Advisory - python-django - CVE-2021-45115 LIN1019-7586: Security Advisory - expat - CVE-2021-45960 LIN1019-7583: Security Advisory - ghostscript - CVE-2021-45949 LIN1019-7582: Security Advisory - ghostscript - CVE-2021-45944 LIN1019-7580: Security Advisory - vim - CVE-2021-4193 LIN1019-7579: Security Advisory - vim - CVE-2021-4192 LIN1019-7551: Security Advisory - linux - CVE-2021-45469 LIN1019-7527: Security Advisory - python-numpy - CVE-2021-41495 LIN1019-7504: Security Advisory - linux - CVE-2021-44733 LIN1019-7458: Security Advisory - linux - CVE-2021-4002 LIN1019-7421: Security Advisory - linux - CVE-2021-43976 LIN1019-7401: Security Advisory - busybox - CVE-2021-42386 LIN1019-7400: Security Advisory - busybox - CVE-2021-42385 LIN1019-7399: Security Advisory - busybox - CVE-2021-42384 LIN1019-7398: Security Advisory - busybox - CVE-2021-42383 LIN1019-7397: Security Advisory - busybox - CVE-2021-42382 LIN1019-7396: Security Advisory - busybox - CVE-2021-42381 LIN1019-7395: Security Advisory - busybox - CVE-2021-42380 LIN1019-7394: Security Advisory - busybox - CVE-2021-42379 LIN1019-7393: Security Advisory - busybox - CVE-2021-42378 LIN1019-7166: Security Advisory - linux - CVE-2021-3752 LIN1019-7074: Security Advisory - qemu - CVE-2021-3748 LIN1019-7017: Security Advisory - qemu - CVE-2021-3713 LIN1019-6919: Security Advisory - linux - CVE-2021-3640 LIN1019-6359: Security Advisory - openjpeg - CVE-2021-29338 LIN1019-6067: Security Advisory - xterm - CVE-2021-27135 LIN1019-6008: Security Advisory - linux - CVE-2021-3348 LIN1019-5977: Security Advisory - qemu - CVE-2021-20196 LIN1019-7944: util-linux-native uses host kernel header LIN1019-7692: Warning: unused variable 'vtc_node' [-Wunused-variable] LIN1019-7557: CLONE - cpio regression due to CVE-2021-38185 ======================= 10.19.45.21 =============================== LIN1019-7623: Security Advisory - lighttpd - CVE-2022-22707 LIN1019-7560: Security Advisory - linux - CVE-2021-45485 LIN1019-7559: Security Advisory - linux - CVE-2021-45486 LIN1019-7550: Security Advisory - linux - CVE-2021-4157 LIN1019-7549: Security Advisory - linux - CVE-2021-4154 LIN1019-7546: Security Advisory - libsndfile1 - CVE-2021-4156 LIN1019-7543: Security Advisory - linux - CVE-2021-4149 LIN1019-7536: Security Advisory - ruby - CVE-2021-41819 LIN1019-7533: Security Advisory - ruby - CVE-2021-41817 LIN1019-7530: Security Advisory - apache2 - CVE-2021-44790 LIN1019-7529: Security Advisory - apache2 - CVE-2021-44224 LIN1019-7525: Security Advisory - python-numpy - CVE-2021-33430 LIN1019-7522: Security Advisory - libarchive - CVE-2021-31566 LIN1019-7521: Security Advisory - libarchive - CVE-2021-23177 LIN1019-7517: Security Advisory - binutils - CVE-2021-42574 LIN1019-7505: Security Advisory - linux - CVE-2021-45095 LIN1019-7501: Security Advisory - binutils - CVE-2021-45078 LIN1019-7499: Security Advisory - linux - CVE-2021-4083 LIN1019-7497: Security Advisory - xserver-xorg - CVE-2021-4011 LIN1019-7496: Security Advisory - xserver-xorg - CVE-2021-4010 LIN1019-7495: Security Advisory - xserver-xorg - CVE-2021-4009 LIN1019-7494: Security Advisory - xserver-xorg - CVE-2021-4008 LIN1019-7491: Security Advisory - python-lxml - CVE-2021-43818 LIN1019-7484: Security Advisory - go - CVE-2021-44717 LIN1019-7483: Security Advisory - go - CVE-2021-44716 LIN1019-7480: Security Advisory - linux - CVE-2021-39657 LIN1019-7478: Security Advisory - linux - CVE-2021-39648 LIN1019-7476: Security Advisory - python-django - CVE-2021-44420 LIN1019-7472: Security Advisory - vim - CVE-2021-4069 LIN1019-7468: Security Advisory - nss - CVE-2021-43527 LIN1019-7467: Security Advisory - vim - CVE-2021-4019 LIN1019-7466: Security Advisory - vim - CVE-2021-3984 LIN1019-7464: Security Advisory - linux - CVE-2021-33098 LIN1019-7461: Security Advisory - bluez5 - CVE-2019-8922 LIN1019-7460: Security Advisory - bluez5 - CVE-2019-8921 LIN1019-7448: Security Advisory - libvirt - CVE-2021-3975 LIN1019-7437: Security Advisory - vim - CVE-2021-3974 LIN1019-7436: Security Advisory - vim - CVE-2021-3973 LIN1019-7431: Security Advisory - php - CVE-2021-21707 LIN1019-7420: Security Advisory - linux - CVE-2021-43975 LIN1019-7410: Security Advisory - gmp - CVE-2021-43618 LIN1019-7407: Security Advisory - bluez5 - CVE-2021-41229 LIN1019-7389: Security Advisory - busybox - CVE-2021-42374 LIN1019-7385: Security Advisory - samba - CVE-2020-25722 LIN1019-7384: Security Advisory - samba - CVE-2020-25721 LIN1019-7381: Security Advisory - samba - CVE-2020-25717 LIN1019-7378: Security Advisory - speex - CVE-2020-23903 LIN1019-7374: Security Advisory - postgresql - CVE-2021-23222 LIN1019-7373: Security Advisory - postgresql - CVE-2021-23214 LIN1019-7370: Security Advisory - qemu - CVE-2021-3930 LIN1019-7369: Security Advisory - vim - CVE-2021-3928 LIN1019-7368: Security Advisory - vim - CVE-2021-3927 LIN1019-7367: Security Advisory - bluez5 - CVE-2021-43400 LIN1019-7366: Security Advisory - glibc - CVE-2021-43396 LIN1019-7364: Security Advisory - linux - CVE-2021-0920 LIN1019-7360: Security Advisory - linux - CVE-2020-27820 LIN1019-7357: Security Advisory - linux - CVE-2021-34981 LIN1019-7355: Security Advisory - gcc - CVE-2021-42574 LIN1019-7352: Security Advisory - go - CVE-2021-41771 LIN1019-7350: Security Advisory - linux - CVE-2021-43056 LIN1019-7349: Security Advisory - bind - CVE-2021-25219 LIN1019-7347: Security Advisory - linux - CVE-2021-3760 LIN1019-7346: Security Advisory - udisks2 - CVE-2021-3802 LIN1019-7341: Security Advisory - php - CVE-2021-21703 LIN1019-7309: Security Advisory - linux - CVE-2021-42739 LIN1019-7274: Security Advisory - linux - CVE-2021-20322 LIN1019-7262: Security Advisory - linux - CVE-2021-20320 LIN1019-7244: Security Advisory - rpm - CVE-2021-3521 LIN1019-7104: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39262 LIN1019-7070: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39263 LIN1019-7069: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39261 LIN1019-7068: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39260 LIN1019-7067: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39259 LIN1019-7066: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39258 LIN1019-7065: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39257 LIN1019-7064: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39256 LIN1019-7063: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39255 LIN1019-7062: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39254 LIN1019-7061: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39253 LIN1019-7060: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39252 LIN1019-7059: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-39251 LIN1019-7058: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-35269 LIN1019-7057: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-35268 LIN1019-7056: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-35267 LIN1019-7055: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-35266 LIN1019-7054: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-33289 LIN1019-7053: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-33287 LIN1019-7052: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-33286 LIN1019-7051: Security Advisory - ntfs-3g-ntfsprogs - CVE-2021-33285 LIN1019-6673: Security Advisory - python-django - CVE-2021-33571 LIN1019-6672: Security Advisory - python-django - CVE-2021-33203 LIN1019-6591: Security Advisory - ffmpeg - CVE-2020-20453 LIN1019-6390: Security Advisory - consul - CVE-2020-25864 LIN1019-7447: memory leak in rxrpc_lookup_local LIN1019-7446: KASAN: null-ptr-deref Read in vhci_shutdown_connection LIN1019-7445: WARNING in sta_info_insert_rcu LIN1019-7444: task hung in hub_port_init LIN1019-7372: syslog-ng control socket not found ======================= 10.19.45.20 =============================== LIN1019-7365: Security Advisory - linux - CVE-2021-43389 LIN1019-7348: Security Advisory - vim - CVE-2021-3903 LIN1019-7342: Security Advisory - linux - CVE-2021-3896 LIN1019-7275: Security Advisory - vim - CVE-2021-3872 LIN1019-7271: Security Advisory - strongswan - CVE-2021-41990 LIN1019-7266: Security Advisory - vim - CVE-2021-3875 LIN1019-7264: Security Advisory - linux - CVE-2021-20321 LIN1019-7259: Security Advisory - linux - CVE-2021-42252 LIN1019-7255: Security Advisory - docker - CVE-2021-41091 LIN1019-7254: Security Advisory - docker - CVE-2021-41089 LIN1019-7252: Security Advisory - containerd-opencontainers - CVE-2021-41103 LIN1019-7249: Security Advisory - linux - CVE-2021-42008 LIN1019-7248: Security Advisory - linux - CVE-2021-41864 LIN1019-7247: Security Advisory - docker - CVE-2021-41092 LIN1019-7245: Security Advisory - go - CVE-2021-38297 LIN1019-7243: Security Advisory - redis - CVE-2021-41099 LIN1019-7242: Security Advisory - redis - CVE-2021-32762 LIN1019-7241: Security Advisory - redis - CVE-2021-32687 LIN1019-7240: Security Advisory - redis - CVE-2021-32675 LIN1019-7239: Security Advisory - redis - CVE-2021-32672 LIN1019-7238: Security Advisory - redis - CVE-2021-32628 LIN1019-7237: Security Advisory - redis - CVE-2021-32627 LIN1019-7236: Security Advisory - redis - CVE-2021-32626 LIN1019-7224: Security Advisory - openssh - CVE-2021-41617 LIN1019-7223: Security Advisory - linux - CVE-2021-20317 LIN1019-7214: Security Advisory - ncurses - CVE-2021-39537 LIN1019-7185: Security Advisory - apache2 - CVE-2021-40438 LIN1019-7184: Security Advisory - apache2 - CVE-2021-39275 LIN1019-7183: Security Advisory - apache2 - CVE-2021-36160 LIN1019-7182: Security Advisory - apache2 - CVE-2021-34798 LIN1019-7167: Security Advisory - linux - CVE-2021-38300 LIN1019-7162: Security Advisory - vim - CVE-2021-3796 LIN1019-7161: Security Advisory - vim - CVE-2021-3778 LIN1019-7156: Security Advisory - linux - CVE-2021-3764 LIN1019-7155: Security Advisory - linux - CVE-2021-3744 LIN1019-7154: Security Advisory - squashfs-tools - CVE-2021-41072 LIN1019-7149: Security Advisory - curl - CVE-2021-22947 LIN1019-7148: Security Advisory - curl - CVE-2021-22946 LIN1019-7127: Security Advisory - tiff - CVE-2020-19144 LIN1019-7126: Security Advisory - tiff - CVE-2020-19143 LIN1019-7123: Security Advisory - gd - CVE-2021-40812 LIN1019-7119: Security Advisory - tiff - CVE-2020-19131 LIN1019-7111: Security Advisory - libgcrypt - CVE-2021-40528 LIN1019-7110: Security Advisory - vim - CVE-2021-3770 LIN1019-7102: Security Advisory - inetutils - CVE-2021-40491 LIN1019-7101: Security Advisory - linux - CVE-2021-40490 LIN1019-7095: Security Advisory - samba - CVE-2021-3671 LIN1019-7088: Security Advisory - linux - CVE-2021-3753 LIN1019-7072: Security Advisory - git - CVE-2021-40330 LIN1019-7050: Security Advisory - linux - CVE-2021-3743 LIN1019-7048: Security Advisory - mc - CVE-2021-36370 LIN1019-7046: Security Advisory - squashfs-tools - CVE-2021-40153 LIN1019-7045: Security Advisory - gd - CVE-2021-40145 LIN1019-7041: Security Advisory - linux - CVE-2021-3739 LIN1019-7019: Security Advisory - ffmpeg - CVE-2021-38171 LIN1019-7014: Security Advisory - go - CVE-2021-39293 LIN1019-6954: Security Advisory - linux - CVE-2021-3669 LIN1019-6947: Security Advisory - linux - CVE-2021-35477 LIN1019-6946: Security Advisory - linux - CVE-2021-34556 LIN1019-6904: Security Advisory - linux - CVE-2021-37159 LIN1019-6886: Security Advisory - mariadb - CVE-2021-2389 LIN1019-6880: Security Advisory - mariadb - CVE-2021-2372 LIN1019-6597: Security Advisory - glibc - CVE-2021-33574 LIN1019-6524: Security Advisory - systemd - CVE-2020-13529 LIN1019-6471: Security Advisory - samba - CVE-2021-20254 LIN1019-6374: Security Advisory - linux - CVE-2021-23133 LIN1019-4331: Security Advisory - mariadb - CVE-2020-2780 LIN1019-3706: Security Advisory - bash - CVE-2019-18276 LIN1019-7153: INFO: trying to register non-static key in skb_dequeue LIN1019-7152: memory leak in __ieee80211_beacon_get LIN1019-7113: marvell-cn96xx(28581): Kernel panic with ltp fs testing. LIN1019-7037: BUG: sleeping function called from invalid context in lock_sock_nested (hci_sock_dev_event()) LIN1019-7036: KASAN: use-after-free Read in ieee802154_tx LIN1019-6949: ERROR: binutils-cross-canadian-aarch64-2.32.0-r0 do_compile: oe_runmake failed LIN1019-6763: CONFIG_ICE=y, CONFIG_XDP_SOCKETS=y: implicit declaration of function 'xsk_clear_rx_need_wakeup' LIN1019-6557: patchelf: --set-interpreter corrupts the binary ======================= 10.19.45.19 =============================== LIN1019-7273: Security Advisory - cluster-glue - CVE-2010-2496 LIN1019-7034: Security Advisory - linux - CVE-2021-3732 LIN1019-7033: Security Advisory - openssl - CVE-2021-3711 LIN1019-7031: Security Advisory - sqlite3 - CVE-2021-36690 LIN1019-7030: Security Advisory - openssl - CVE-2021-3712 LIN1019-7028: Security Advisory - python - CVE-2021-3733 LIN1019-7023: Security Advisory - apr - CVE-2021-35940 LIN1019-7015: Security Advisory - krb5 - CVE-2021-37750 LIN1019-7002: Security Advisory - sssd - CVE-2021-3621 LIN1019-7001: Security Advisory - linux - CVE-2021-3656 LIN1019-7000: Security Advisory - linux - CVE-2021-3653 LIN1019-6996: Security Advisory - ffmpeg - CVE-2021-38291 LIN1019-6994: Security Advisory - apache2 - CVE-2021-33193 LIN1019-6984: Security Advisory - c-ares - CVE-2021-3672 LIN1019-6980: Security Advisory - ffmpeg - CVE-2020-21697 LIN1019-6978: Security Advisory - ffmpeg - CVE-2020-21688 LIN1019-6974: Security Advisory - linux - CVE-2021-38209 LIN1019-6972: Security Advisory - linux - CVE-2021-38207 LIN1019-6970: Security Advisory - linux - CVE-2021-38205 LIN1019-6969: Security Advisory - linux - CVE-2021-38204 LIN1019-6964: Security Advisory - linux - CVE-2021-38199 LIN1019-6963: Security Advisory - linux - CVE-2021-38198 LIN1019-6962: Security Advisory - cpio - CVE-2021-38185 LIN1019-6958: Security Advisory - linux - CVE-2021-38160 LIN1019-6957: Security Advisory - qemu - CVE-2021-3682 LIN1019-6955: Security Advisory - linux - CVE-2021-3679 LIN1019-6953: Security Advisory - gd - CVE-2021-38115 LIN1019-6952: Security Advisory - ffmpeg - CVE-2021-38114 LIN1019-6945: Security Advisory - ruby - CVE-2021-31799 LIN1019-6944: Security Advisory - go - CVE-2021-36221 LIN1019-6935: Security Advisory - util-linux - CVE-2021-37600 LIN1019-6934: Security Advisory - libvirt - CVE-2021-3667 LIN1019-6928: Security Advisory - linux - CVE-2021-37576 LIN1019-6913: Security Advisory - curl - CVE-2021-22925 LIN1019-6912: Security Advisory - curl - CVE-2021-22924 LIN1019-6908: Security Advisory - linux - CVE-2021-3655 LIN1019-6868: Security Advisory - containerd-opencontainers - CVE-2021-32760 LIN1019-6866: Security Advisory - vsftpd - CVE-2021-3618 LIN1019-6865: Security Advisory - systemd - CVE-2021-33910 LIN1019-6864: Security Advisory - linux - CVE-2021-33909 LIN1019-6862: Security Advisory - openvswitch - CVE-2021-36980 LIN1019-6860: Security Advisory - libsndfile - CVE-2021-3246 LIN1019-6837: Security Advisory - linux - CVE-2021-21781 LIN1019-6830: Security Advisory - go - CVE-2021-34558 LIN1019-6829: Security Advisory - krb5 - CVE-2021-36222 LIN1019-6814: Security Advisory - linux - CVE-2021-22555 LIN1019-6789: Security Advisory - php - CVE-2021-21705 LIN1019-6783: Security Advisory - go - CVE-2020-29510 LIN1019-6782: Security Advisory - go - CVE-2020-29511 LIN1019-6781: Security Advisory - go - CVE-2020-29509 LIN1019-6780: Security Advisory - libvirt - CVE-2021-3631 LIN1019-6757: Security Advisory - linux - CVE-2021-33624 LIN1019-6751: Security Advisory - linux - CVE-2021-3609 LIN1019-6657: Security Advisory - ffmpeg - CVE-2020-22042 LIN1019-6653: Security Advisory - ffmpeg - CVE-2020-22038 LIN1019-6628: Security Advisory - ffmpeg - CVE-2020-22033 LIN1019-6607: Security Advisory - ffmpeg - CVE-2020-22021 LIN1019-6604: Security Advisory - ffmpeg - CVE-2020-22015 LIN1019-6590: Security Advisory - ffmpeg - CVE-2020-20450 LIN1019-6584: Security Advisory - ffmpeg - CVE-2020-21041 LIN1019-6522: Security Advisory - qemu - CVE-2021-3546 LIN1019-6521: Security Advisory - qemu - CVE-2021-3545 LIN1019-6520: Security Advisory - qemu - CVE-2021-3544 LIN1019-6391: Security Advisory - consul - CVE-2020-28053 LIN1019-6388: Security Advisory - consul - CVE-2020-13250 LIN1019-6387: Security Advisory - consul - CVE-2020-13170 LIN1019-6386: Security Advisory - consul - CVE-2020-12797 LIN1019-6385: Security Advisory - consul - CVE-2020-12758 LIN1019-6384: Security Advisory - consul - CVE-2020-7955 LIN1019-6383: Security Advisory - consul - CVE-2020-7219 LIN1019-6313: Security Advisory - curl - CVE-2021-22890 LIN1019-6136: Security Advisory - qemu - CVE-2021-20257 LIN1019-5690: Security Advisory - linux - CVE-2020-29374 LIN1019-5639: Security Advisory - linux - CVE-2020-25673 LIN1019-5638: Security Advisory - linux - CVE-2020-25672 LIN1019-6931: SELinux refpolicy-standard warning LIN1019-6832: rsyslog-ptest : 4/380 failed LIN1019-6785: OpenSCAP Compliance Testing: Package Install Checks Rule Fails LIN1019-6774: OpenSCAP Compliance Testing: Single User Mode Authentication Rule Fails LIN1019-6633: ARM64 IOMMU errors can starve the system ======================= 10.19.45.18 =============================== LIN1019-6816: Security Advisory - ruby - CVE-2021-32066 LIN1019-6815: Security Advisory - ruby - CVE-2021-31810 LIN1019-6813: Security Advisory - linux - CVE-2021-35039 LIN1019-6795: Security Advisory - libsepol - CVE-2021-36086 LIN1019-6794: Security Advisory - libsepol - CVE-2021-36085 LIN1019-6793: Security Advisory - libsepol - CVE-2021-36084 LIN1019-6779: Security Advisory - glibc - CVE-2021-35942 LIN1019-6766: Security Advisory - linux - CVE-2020-28097 LIN1019-6745: Security Advisory - linux - CVE-2021-32078 LIN1019-6731: Security Advisory - linux - CVE-2021-34693 LIN1019-6730: Security Advisory - qemu - CVE-2021-3595 LIN1019-6729: Security Advisory - qemu - CVE-2021-3594 LIN1019-6728: Security Advisory - qemu - CVE-2021-3593 LIN1019-6727: Security Advisory - qemu - CVE-2021-3592 LIN1019-6723: Security Advisory - bluez - CVE-2021-0129 LIN1019-6718: Security Advisory - intel-microcode - CVE-2020-24513 LIN1019-6717: Security Advisory - intel-microcode - CVE-2020-24512 LIN1019-6716: Security Advisory - intel-microcode - CVE-2020-24511 LIN1019-6715: Security Advisory - intel-microcode - CVE-2020-24489 LIN1019-6714: Security Advisory - intel-microcode - CVE-2020-0549 LIN1019-6713: Security Advisory - intel-microcode - CVE-2020-0548 LIN1019-6712: Security Advisory - nettle - CVE-2021-3580 LIN1019-6711: Security Advisory - connman - CVE-2021-33833 LIN1019-6710: Security Advisory - python3-pip - CVE-2021-3572 LIN1019-6708: Security Advisory - linux - CVE-2021-3587 LIN1019-6707: Security Advisory - linux - CVE-2021-3573 LIN1019-6706: Security Advisory - intel-microcode - CVE-2021-24489 LIN1019-6705: Security Advisory - linux - CVE-2021-0129 LIN1019-6703: Security Advisory - python3-pygments - CVE-2021-20270 LIN1019-6701: Security Advisory - linux - CVE-2021-0512 LIN1019-6700: Security Advisory - linux - CVE-2021-0605 LIN1019-6697: Security Advisory - linux - CVE-2020-36385 LIN1019-6685: Security Advisory - polkit - CVE-2021-3560 LIN1019-6683: Security Advisory - apache2 - CVE-2021-30641 LIN1019-6682: Security Advisory - apache2 - CVE-2021-26691 LIN1019-6681: Security Advisory - apache2 - CVE-2021-26690 LIN1019-6680: Security Advisory - apache2 - CVE-2020-35452 LIN1019-6679: Security Advisory - apache2 - CVE-2020-13950 LIN1019-6675: Security Advisory - gst-plugins-base - CVE-2021-3522 LIN1019-6670: Security Advisory - ffmpeg - CVE-2020-22056 LIN1019-6669: Security Advisory - ffmpeg - CVE-2020-22054 LIN1019-6668: Security Advisory - ffmpeg - CVE-2020-22051 LIN1019-6667: Security Advisory - ffmpeg - CVE-2020-22049 LIN1019-6666: Security Advisory - ffmpeg - CVE-2020-22048 LIN1019-6665: Security Advisory - ffmpeg - CVE-2020-22046 LIN1019-6660: Security Advisory - libjpeg-turbo - CVE-2020-17541 LIN1019-6659: Security Advisory - ffmpeg - CVE-2020-22044 LIN1019-6658: Security Advisory - ffmpeg - CVE-2020-22043 LIN1019-6656: Security Advisory - ffmpeg - CVE-2020-22041 LIN1019-6655: Security Advisory - ffmpeg - CVE-2020-22040 LIN1019-6654: Security Advisory - ffmpeg - CVE-2020-22039 LIN1019-6651: Security Advisory - ffmpeg - CVE-2020-22036 LIN1019-6650: Security Advisory - ffmpeg - CVE-2020-22035 LIN1019-6649: Security Advisory - python3-pygments - CVE-2021-27291 LIN1019-6645: Security Advisory - linux - CVE-2020-26558 LIN1019-6642: Security Advisory - linux - CVE-2020-26555 LIN1019-6640: Security Advisory - libgcrypt - CVE-2021-33560 LIN1019-6632: Security Advisory - linux - CVE-2020-26145 LIN1019-6631: Security Advisory - linux - CVE-2020-26141 LIN1019-6629: Security Advisory - ffmpeg - CVE-2020-22034 LIN1019-6627: Security Advisory - ffmpeg - CVE-2020-22032 LIN1019-6626: Security Advisory - ffmpeg - CVE-2020-22031 LIN1019-6625: Security Advisory - ffmpeg - CVE-2020-22030 LIN1019-6624: Security Advisory - ffmpeg - CVE-2020-22029 LIN1019-6623: Security Advisory - ffmpeg - CVE-2020-22027 LIN1019-6622: Security Advisory - ffmpeg - CVE-2020-22023 LIN1019-6621: Security Advisory - ffmpeg - CVE-2020-22022 LIN1019-6620: Security Advisory - ffmpeg - CVE-2020-22017 LIN1019-6619: Security Advisory - ffmpeg - CVE-2020-22016 LIN1019-6618: Security Advisory - linux - CVE-2021-33200 LIN1019-6615: Security Advisory - linux - CVE-2021-22543 LIN1019-6612: Security Advisory - dhcp - CVE-2021-25217 LIN1019-6611: Security Advisory - ffmpeg - CVE-2020-22026 LIN1019-6609: Security Advisory - ffmpeg - CVE-2020-22028 LIN1019-6608: Security Advisory - ffmpeg - CVE-2020-22024 LIN1019-6606: Security Advisory - ffmpeg - CVE-2020-22020 LIN1019-6605: Security Advisory - ffmpeg - CVE-2020-22019 LIN1019-6603: Security Advisory - ffmpeg - CVE-2020-20451 LIN1019-6599: Security Advisory - curl - CVE-2021-22898 LIN1019-6598: Security Advisory - curl - CVE-2021-22897 LIN1019-6596: Security Advisory - nginx - CVE-2021-23017 LIN1019-6594: Security Advisory - linux - CVE-2021-3564 LIN1019-6589: Security Advisory - ffmpeg - CVE-2020-20448 LIN1019-6588: Security Advisory - ffmpeg - CVE-2020-20446 LIN1019-6587: Security Advisory - ffmpeg - CVE-2020-20445 LIN1019-6582: Security Advisory - go - CVE-2021-33197 LIN1019-6568: Security Advisory - go - CVE-2021-33195 LIN1019-6565: Security Advisory - rxvt-unicode - CVE-2021-33477 LIN1019-6562: Security Advisory - libsolv - CVE-2021-3200 LIN1019-6559: Security Advisory - kubernetes - CVE-2021-25737 LIN1019-6558: Security Advisory - libx11 - CVE-2021-31535 LIN1019-6554: Security Advisory - ceph - CVE-2021-3531 LIN1019-6553: Security Advisory - ceph - CVE-2021-3509 LIN1019-6552: Security Advisory - linux - CVE-2021-33034 LIN1019-6551: Security Advisory - linux - CVE-2021-33033 LIN1019-6549: Security Advisory - linux - CVE-2020-27830 LIN1019-6543: Security Advisory - postgresql - CVE-2021-32029 LIN1019-6542: Security Advisory - libxml2 - CVE-2021-3541 LIN1019-6537: Security Advisory - linux - CVE-2020-26147 LIN1019-6535: Security Advisory - linux - CVE-2020-26139 LIN1019-6534: Security Advisory - linux - CVE-2020-24588 LIN1019-6533: Security Advisory - linux - CVE-2020-24587 LIN1019-6532: Security Advisory - linux - CVE-2020-24586 LIN1019-6530: Security Advisory - ceph - CVE-2021-3524 LIN1019-6526: Security Advisory - thunar - CVE-2021-32563 LIN1019-6525: Security Advisory - linux - CVE-2021-32399 LIN1019-6513: Security Advisory - postgresql - CVE-2021-32027 LIN1019-6512: Security Advisory - postgresql - CVE-2021-32028 LIN1019-6510: Security Advisory - kubernetes - CVE-2021-20206 LIN1019-6501: Security Advisory - qemu - CVE-2021-3527 LIN1019-6490: Security Advisory - python3-django - CVE-2021-31542 LIN1019-6487: Security Advisory - python3-django - CVE-2021-32052 LIN1019-6409: Security Advisory - mariadb - CVE-2021-2166 LIN1019-6406: Security Advisory - mariadb - CVE-2021-2154 LIN1019-6375: Security Advisory - linux - CVE-2021-29155 LIN1019-6355: Security Advisory - kubernetes - CVE-2021-25735 LIN1019-6327: Security Advisory - ruby - CVE-2021-28965 LIN1019-6272: Security Advisory - samba - CVE-2020-27840 LIN1019-6260: Security Advisory - python-lxml - CVE-2021-28957 LIN1019-5486: Security Advisory - linux - CVE-2020-26541 LIN1019-4053: Security Advisory - u-boot - CVE-2020-8432 LIN1019-6759: bpf: verifier: 32 FAILED selftests LIN1019-6722: general protection fault in nfs_mount LIN1019-6662: Broken monotonic timeouts LIN1019-6485: [Target Installer] Installer can't install a bootable image ======================= 10.19.45.17 =============================== LIN1019-6765: Security Advisory - linux - CVE-2021-3600 LIN1019-6617: Security Advisory - python-urllib3 - CVE-2021-33503 LIN1019-6506: Security Advisory - libxml2 - CVE-2021-3537 LIN1019-6502: Security Advisory - linux - CVE-2021-23134 LIN1019-6488: Security Advisory - linux - CVE-2021-31829 LIN1019-6486: Security Advisory - linux - CVE-2021-31916 LIN1019-6469: Security Advisory - lz4 - CVE-2021-3520 LIN1019-6466: Security Advisory - bind - CVE-2021-25215 LIN1019-6465: Security Advisory - bind - CVE-2021-25214 LIN1019-6464: Security Advisory - libxml2 - CVE-2021-3518 LIN1019-6463: Security Advisory - libxml2 - CVE-2021-3517 LIN1019-6462: Security Advisory - libxml2 - CVE-2021-3516 LIN1019-6380: Security Advisory - linux - CVE-2021-3506 LIN1019-6379: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3498 LIN1019-6378: Security Advisory - gstreamer1.0-plugins-good - CVE-2021-3497 LIN1019-6372: Security Advisory - qemu - CVE-2020-35505 LIN1019-6371: Security Advisory - qemu - CVE-2020-35504 LIN1019-6360: Security Advisory - linux - CVE-2020-36322 LIN1019-6357: Security Advisory - ceph - CVE-2021-20288 LIN1019-6353: Security Advisory - xserver-xorg - CVE-2021-3472 LIN1019-6348: Security Advisory - python3-django - CVE-2021-28658 LIN1019-6347: Security Advisory - linux - CVE-2021-29154 LIN1019-6346: Security Advisory - binutils - CVE-2021-3487 LIN1019-6336: Security Advisory - linux - CVE-2021-3483 LIN1019-6334: Security Advisory - linux - CVE-2020-36312 LIN1019-6333: Security Advisory - linux - CVE-2020-36311 LIN1019-6332: Security Advisory - linux - CVE-2020-36310 LIN1019-6326: Security Advisory - linux - CVE-2021-30002 LIN1019-6325: Security Advisory - hostapd&wpa-supplicant - CVE-2021-30004 LIN1019-6322: Security Advisory - nettle - CVE-2021-20305 LIN1019-6314: Security Advisory - redis - CVE-2021-3470 LIN1019-6312: Security Advisory - curl - CVE-2021-22876 LIN1019-6311: Security Advisory - samba - CVE-2021-20277 LIN1019-6308: Security Advisory - linux - CVE-2021-29650 LIN1019-6305: Security Advisory - linux - CVE-2021-29647 LIN1019-6290: Security Advisory - rpm - CVE-2021-20271 LIN1019-6289: Security Advisory - rpm - CVE-2021-3421 LIN1019-6287: Security Advisory - linux - CVE-2021-29265 LIN1019-6286: Security Advisory - linux - CVE-2021-29264 LIN1019-6276: Security Advisory - openssl - CVE-2021-3450 LIN1019-6275: Security Advisory - openssl - CVE-2021-3449 LIN1019-6269: Security Advisory - linux - CVE-2021-3444 LIN1019-6263: Security Advisory - linux - CVE-2021-28972 LIN1019-6262: Security Advisory - linux - CVE-2021-28971 LIN1019-6261: Security Advisory - linux - CVE-2021-28964 LIN1019-6258: Security Advisory - cairo - CVE-2020-35492 LIN1019-6256: Security Advisory - mariadb - CVE-2021-27928 LIN1019-6255: Security Advisory - libdnf - CVE-2021-3445 LIN1019-6254: Security Advisory - busybox - CVE-2021-28831 LIN1019-6252: Security Advisory - linux - CVE-2020-27171 LIN1019-6251: Security Advisory - linux - CVE-2020-27170 LIN1019-6243: Security Advisory - linux - CVE-2021-28660 LIN1019-6242: Security Advisory - linux - CVE-2021-3428 LIN1019-6241: Security Advisory - linux - CVE-2020-35519 LIN1019-6240: Security Advisory - dnsmasq - CVE-2021-3448 LIN1019-6233: Security Advisory - linux - CVE-2021-28375 LIN1019-6223: Security Advisory - glib-2.0 - CVE-2021-27219 LIN1019-6222: Security Advisory - glib-2.0 - CVE-2021-27218 LIN1019-6216: Security Advisory - glib-2.0 - CVE-2021-28153 LIN1019-6208: Security Advisory - go - CVE-2021-27918 LIN1019-6206: Security Advisory - python - CVE-2021-3426 LIN1019-6205: Security Advisory - gnutls - CVE-2021-20232 LIN1019-6202: Security Advisory - tiff - CVE-2020-35522 LIN1019-6201: Security Advisory - tiff - CVE-2020-35521 LIN1019-6200: Security Advisory - git - CVE-2021-21300 LIN1019-6194: Security Advisory - docker - CVE-2020-13401 LIN1019-6191: Security Advisory - linux - CVE-2021-27363 LIN1019-6186: Security Advisory - linux - CVE-2020-25639 LIN1019-6183: Security Advisory - linux - CVE-2021-28038 LIN1019-6182: Security Advisory - linux - CVE-2021-27365 LIN1019-6181: Security Advisory - linux - CVE-2021-27364 LIN1019-6166: Security Advisory - grub - CVE-2021-20233 LIN1019-6165: Security Advisory - grub - CVE-2021-20225 LIN1019-6164: Security Advisory - grub - CVE-2021-3418 LIN1019-6163: Security Advisory - grub - CVE-2020-27779 LIN1019-6162: Security Advisory - grub - CVE-2020-27749 LIN1019-6161: Security Advisory - grub - CVE-2020-25647 LIN1019-6160: Security Advisory - grub - CVE-2020-25632 LIN1019-6159: Security Advisory - grub - CVE-2020-14372 LIN1019-6153: Security Advisory - tiff - CVE-2020-35524 LIN1019-6152: Security Advisory - tiff - CVE-2020-35523 LIN1019-6138: Security Advisory - qemu - CVE-2021-3416 LIN1019-6130: Security Advisory - glibc - CVE-2021-27645 LIN1019-6097: Security Advisory - binutils - CVE-2021-20197 LIN1019-6091: Security Advisory - subversion - CVE-2020-17525 LIN1019-6090: Security Advisory - qemu - CVE-2021-3409 LIN1019-6080: Security Advisory - openssl - CVE-2021-23841 LIN1019-6079: Security Advisory - openssl - CVE-2021-23840 LIN1019-6078: Security Advisory - openssl - CVE-2021-23839 LIN1019-6052: Security Advisory - docker - CVE-2020-15257 LIN1019-6033: Security Advisory - qemu - CVE-2021-3392 LIN1019-6004: Security Advisory - qemu - CVE-2021-20203 LIN1019-5854: Security Advisory - binutils - CVE-2020-35494 LIN1019-5637: Security Advisory - linux - CVE-2020-25671 LIN1019-5636: Security Advisory - linux - CVE-2020-25670 LIN1019-5458: Security Advisory - tigervnc - CVE-2020-26117 LIN1019-5140: Security Advisory - grub - CVE-2020-14311 LIN1019-5139: Security Advisory - grub - CVE-2020-14310 LIN1019-5138: Security Advisory - grub - CVE-2020-14309 LIN1019-5137: Security Advisory - grub - CVE-2020-10713 LIN1019-5134: Security Advisory - grub - CVE-2020-15705 LIN1019-5133: Security Advisory - grub - CVE-2020-14308 LIN1019-5132: Security Advisory - grub - CVE-2020-15706 LIN1019-5131: Security Advisory - grub - CVE-2020-15707 LIN1019-6484: [Warning] xmlsec1-1.2.28-r0 do_fetch failed. LIN1019-6369: libssh2 fails with feature/openssl-no-weak-ciphers LIN1019-6300: Centos 7: grub-efi-native: failed (do_compile) of wrlinux-std-sato_qemuarma9_world_19-lts. LIN1019-6299: ldconfig missing from distribution features LIN1019-6195: do_populate_sdk silent gcc errors LIN1019-6154: [Warning] A few do_fetch warnings. ======================= 10.19.45.16 =============================== LIN1019-6147: Security Advisory - hostapd&wpa-supplicant - CVE-2021-27803 LIN1019-6146: Security Advisory - redis - CVE-2021-21309 LIN1019-6137: Security Advisory - dropbear - CVE-2020-36254 LIN1019-6121: Security Advisory - libexif - CVE-2020-0182 LIN1019-6108: Security Advisory - linux - CVE-2020-35508 LIN1019-6088: Security Advisory - postgresql - CVE-2021-3393 LIN1019-6087: Security Advisory - python - CVE-2021-23336 LIN1019-6083: Security Advisory - linux - CVE-2021-26932 LIN1019-6082: Security Advisory - linux - CVE-2021-26931 LIN1019-6081: Security Advisory - linux - CVE-2021-26930 LIN1019-6070: Security Advisory - bind - CVE-2020-8625 LIN1019-6068: Security Advisory - openvswitch - CVE-2020-35498 LIN1019-6066: Security Advisory - screen - CVE-2021-26937 LIN1019-6065: Security Advisory - openldap - CVE-2021-27212 LIN1019-6050: Security Advisory - connman - CVE-2021-26676 LIN1019-6049: Security Advisory - connman - CVE-2021-26675 LIN1019-6042: Security Advisory - linux - CVE-2021-0342 LIN1019-6039: Security Advisory - tar - CVE-2021-20193 LIN1019-6036: Security Advisory - hostapd&wpa-supplicant - CVE-2021-0326 LIN1019-6034: Security Advisory - qemu - CVE-2021-20221 LIN1019-6032: Security Advisory - php - CVE-2021-21702 LIN1019-6022: Security Advisory - docker - CVE-2021-3121 LIN1019-6021: Security Advisory - docker - CVE-2020-9283 LIN1019-6018: Security Advisory - docker - CVE-2021-21285 LIN1019-6017: Security Advisory - docker - CVE-2021-21284 LIN1019-6010: Security Advisory - phpmyadmin - CVE-2021-21252 LIN1019-6009: Security Advisory - python3-django - CVE-2021-3281 LIN1019-6005: Security Advisory - linux - CVE-2021-3347 LIN1019-6002: Security Advisory - glibc - CVE-2021-3326 LIN1019-5997: Security Advisory - openldap - CVE-2020-36230 LIN1019-5996: Security Advisory - openldap - CVE-2020-36229 LIN1019-5995: Security Advisory - openldap - CVE-2020-36228 LIN1019-5994: Security Advisory - openldap - CVE-2020-36227 LIN1019-5993: Security Advisory - openldap - CVE-2020-36226 LIN1019-5992: Security Advisory - openldap - CVE-2020-36225 LIN1019-5991: Security Advisory - openldap - CVE-2020-36224 LIN1019-5990: Security Advisory - openldap - CVE-2020-36223 LIN1019-5989: Security Advisory - openldap - CVE-2020-36222 LIN1019-5988: Security Advisory - openldap - CVE-2020-36221 LIN1019-5984: Security Advisory - sudo - CVE-2021-3156 LIN1019-5970: Security Advisory - go - CVE-2021-3114 LIN1019-5928: Security Advisory - gst-plugins-bad - CVE-2021-3185 LIN1019-5927: Security Advisory - libsdl2 - CVE-2020-14410 LIN1019-5926: Security Advisory - libsdl2 - CVE-2020-14409 LIN1019-5925: Security Advisory - linux - CVE-2021-3178 LIN1019-5924: Security Advisory - python - CVE-2021-3177 LIN1019-5922: Security Advisory - dnsmasq - CVE-2020-25687 LIN1019-5921: Security Advisory - dnsmasq - CVE-2020-25686 LIN1019-5920: Security Advisory - dnsmasq - CVE-2020-25685 LIN1019-5919: Security Advisory - dnsmasq - CVE-2020-25684 LIN1019-5918: Security Advisory - dnsmasq - CVE-2020-25683 LIN1019-5916: Security Advisory - dnsmasq - CVE-2020-25681 LIN1019-5913: Security Advisory - openjpeg - CVE-2020-27824 LIN1019-5912: Security Advisory - openjpeg - CVE-2020-27823 LIN1019-5911: Security Advisory - openjpeg - CVE-2020-27814 LIN1019-5910: Security Advisory - php - CVE-2020-7071 LIN1019-5909: Security Advisory - qemu - CVE-2021-20181 LIN1019-5908: Security Advisory - qemu - CVE-2020-29443 LIN1019-5897: Security Advisory - sudo - CVE-2021-23240 LIN1019-5896: Security Advisory - sudo - CVE-2021-23239 LIN1019-5894: Security Advisory - python-py - CVE-2020-29651 LIN1019-5893: Security Advisory - openldap - CVE-2020-25710 LIN1019-5892: Security Advisory - openldap - CVE-2020-25709 LIN1019-5891: Security Advisory - linux - CVE-2021-20177 LIN1019-5889: Security Advisory - linux - CVE-2020-28374 LIN1019-5883: Security Advisory - ceph - CVE-2020-25678 LIN1019-5858: Security Advisory - linux - CVE-2020-36158 LIN1019-5855: Security Advisory - binutils - CVE-2020-35495 LIN1019-5853: Security Advisory - binutils - CVE-2020-35493 LIN1019-5850: Security Advisory - glibc - CVE-2019-25013 LIN1019-5782: Security Advisory - binutils - CVE-2020-16592 LIN1019-5750: Security Advisory - qemu - CVE-2020-27821 LIN1019-5749: Security Advisory - curl - CVE-2020-8286 LIN1019-5748: Security Advisory - curl - CVE-2020-8285 LIN1019-5747: Security Advisory - curl - CVE-2020-8284 LIN1019-5728: Security Advisory - glibc - CVE-2020-29562 LIN1019-5727: Security Advisory - glibc - CVE-2020-29573 LIN1019-5705: Security Advisory - linux - CVE-2020-27815 LIN1019-5648: Security Advisory - go - CVE-2020-28367 LIN1019-5631: Security Advisory - python-cryptography - CVE-2020-25659 LIN1019-5621: Security Advisory - glibc - CVE-2020-27618 LIN1019-5612: Security Advisory - linux - CVE-2020-25656 LIN1019-5487: Security Advisory - libproxy - CVE-2020-26154 LIN1019-4592: Security Advisory - libcroco - CVE-2020-12825 LIN1019-6095: Missing gpio-xilinx patch LIN1019-6057: fix libpcap 1.0.9 bug LIN1019-5987: LIN1019-3108 disables IMAGE_ROOTFS_EXTRA_SPACE for wic images LIN1019-5980: DHCP - dhcrelay not always able to detect BOOTP replies LIN1019-5978: LTS19 - Libvirtd crash LIN1019-5799: Call Trace : WARNING: CPU: 1 PID: 136 at fs/eventfd.c:73 eventfd_signal+0x85/0xa0 LIN1019-5628: WARNING: python3-requests-toolbelt-0.9.1-r0 do_fetch: python3-requests-toolbelt is not supported by Wind River Linux. LIN1019-5503: CLONE - Security Advisory - glibc - CVE-2016-10228 LIN1019-5453: openssl-disable-weak-ciphers: ecdh and ecdsa not in openssl disabled list ======================= 10.19.45.15 =============================== LIN1019-5879: Security Advisory - dbus - CVE-2020-35512 LIN1019-5868: Security Advisory - openjpeg - CVE-2020-27845 LIN1019-5866: Security Advisory - openjpeg - CVE-2020-27843 LIN1019-5865: Security Advisory - openjpeg - CVE-2020-27842 LIN1019-5864: Security Advisory - openjpeg - CVE-2020-27841 LIN1019-5846: Security Advisory - ffmpeg - CVE-2020-35965 LIN1019-5845: Security Advisory - ffmpeg - CVE-2020-35964 LIN1019-5838: Security Advisory - qemu - CVE-2020-11947 LIN1019-5837: Security Advisory - qemu - CVE-2019-20808 LIN1019-5809: Security Advisory - p11-kit - CVE-2020-29361 LIN1019-5808: Security Advisory - p11-kit - CVE-2020-29363 LIN1019-5807: Security Advisory - p11-kit - CVE-2020-29362 LIN1019-5806: Security Advisory - ceph - CVE-2020-27781 LIN1019-5798: Security Advisory - linux - CVE-2020-29569 LIN1019-5786: Security Advisory - linux - CVE-2020-29660 LIN1019-5785: Security Advisory - linux - CVE-2020-29661 LIN1019-5768: Security Advisory - openssl - CVE-2020-1971 LIN1019-5744: Security Advisory - openldap - CVE-2020-25692 LIN1019-5729: Security Advisory - qemu - CVE-2020-28916 LIN1019-5723: Security Advisory - linux - CVE-2020-14351 LIN1019-5704: Security Advisory - xserver-xorg - CVE-2020-25712 LIN1019-5703: Security Advisory - xserver-xorg - CVE-2020-14360 LIN1019-5701: Security Advisory - qemu - CVE-2020-25624 LIN1019-5693: Security Advisory - linux - CVE-2020-29371 LIN1019-5689: Security Advisory - qemu - CVE-2020-29130 LIN1019-5688: Security Advisory - qemu - CVE-2020-29129 LIN1019-5684: Security Advisory - linux - CVE-2020-27777 LIN1019-5683: Security Advisory - linux - CVE-2020-25669 LIN1019-5667: Security Advisory - linux - CVE-2020-28941 LIN1019-5665: Security Advisory - linux - CVE-2020-28915 LIN1019-5642: Security Advisory - linux - CVE-2020-8694 LIN1019-5635: Security Advisory - linux - CVE-2020-25668 LIN1019-5634: Security Advisory - linux - CVE-2020-25704 LIN1019-5626: Security Advisory - krb5 - CVE-2020-28196 LIN1019-5541: Security Advisory - python3 - CVE-2020-27619 LIN1019-5493: Security Advisory - ruby - CVE-2020-25613 LIN1019-5886: wlwifi-Qu-c0-hr from linux-firmware breaks opkg LIN1019-5881: [wraxl] celt051_git failed (do_fetch) of wrlinux_qemuppc_std_faw_alldistro_predefined_19-lts. LIN1019-5861: bison-native missing in syslog-ng’s recipe LIN1019-5860: [wraxl] tclap_1.2.2 failed (do_fetch) of wrlinux-std-sato_qemuarm_world_bp_predefined_19. LIN1019-5844: [tz-announce] 2020f release of tz code and data available LIN1019-5823: [Warning] A few do_fetch warnings. LIN1019-5821: [tz-announce] 2020e release of tz code and data available LIN1019-5813: qemuarm: [Kernel warning] sch_generic.h:483:23: warning: unused variable 'qcb' [-Wunused-variable] LIN1019-5726: qemu-system-native failed when we build with qemuppc project LIN1019-5711: python3-native build failed with qemuppc project LIN1019-5699: CLONE - Memory leak within ptpd2 daemon LIN1019-5654: make modules_prepare: openssl/bio.h: No such file or directory LIN1019-5615: net-snmp: heap area of snmpd gets corrupted when running a customer's sub agent LIN1019-3977: bitbake nativesdk-openssl breaks when mingw layer is enabled LIN1019-994: Failed to build kernel script and kernel modules on sdk ======================= 10.19.45.14 =============================== LIN1019-5740: Security Advisory - linux - CVE-2020-27786 LIN1019-5724: Security Advisory - linux - CVE-2020-14381 LIN1019-5696: Security Advisory - linux - CVE-2020-29368 LIN1019-5695: Security Advisory - linux - CVE-2020-29369 LIN1019-5694: Security Advisory - linux - CVE-2020-29370 LIN1019-5674: Security Advisory - linux - CVE-2020-28974 LIN1019-5660: Security Advisory - linux - CVE-2020-25705 LIN1019-5647: Security Advisory - go - CVE-2020-28366 LIN1019-5645: Security Advisory - postgresql - CVE-2020-25696 LIN1019-5644: Security Advisory - postgresql - CVE-2020-25695 LIN1019-5643: Security Advisory - postgresql - CVE-2020-25694 LIN1019-5633: Security Advisory - freetype - CVE-2020-15999 LIN1019-5632: Security Advisory - pacemaker - CVE-2020-25654 LIN1019-5625: Security Advisory - qemu - CVE-2020-27616 LIN1019-5624: Security Advisory - qemu - CVE-2020-27617 LIN1019-5620: Security Advisory - libexif - CVE-2020-0452 LIN1019-5619: Security Advisory - mariadb - CVE-2020-15180 LIN1019-5616: Security Advisory - tcpdump - CVE-2020-8037 LIN1019-5591: Security Advisory - mariadb - CVE-2020-14765 LIN1019-5586: Security Advisory - mariadb - CVE-2020-14776 LIN1019-5582: Security Advisory - mariadb - CVE-2020-14789 LIN1019-5573: Security Advisory - mariadb - CVE-2020-14812 LIN1019-5540: Security Advisory - linux - CVE-2020-27673 LIN1019-5539: Security Advisory - linux - CVE-2020-27675 LIN1019-5492: Security Advisory - linux - CVE-2020-25641 LIN1019-5448: Security Advisory - qemu - CVE-2020-25085 LIN1019-5422: Security Advisory - libdbi-perl - CVE-2014-10402 LIN1019-5253: Security Advisory - postgresql - CVE-2020-14350 LIN1019-3465: Security Advisory - intel-microcode - CVE-2019-11135 LIN1019-5680: python3-pysensors : import error. LIN1019-5657: ERROR: lib32-python3-pysensors-0.0.4-r0 do_configure() failed LIN1019-5650: lz4_1.9.2 failed (do_fetch) of wrlinux_qemux86-64_wrlinux_faw_alldistro_debug_predefined_19. LIN1019-5630: do_patch error of u-boot-socfpga_v2019.04.bb with a lib32 image LIN1019-5629: WARNING: libssh2-1.9.0-r0 do_fetch: libssh2 is not supported by Wind River Linux. LIN1019-5623: ERROR: lvm2-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5622: ERROR: libdevmapper-2.03.05-r0 do_fetch: Network access disabled through BB_NO_NETWORK ======================= 10.19.45.13 =============================== LIN1019-5609: Security Advisory - samba - CVE-2020-14383 LIN1019-5608: Security Advisory - samba - CVE-2020-14323 LIN1019-5607: Security Advisory - samba - CVE-2020-14318 LIN1019-5537: Security Advisory - nss - CVE-2020-25648 LIN1019-5521: Security Advisory - linux - CVE-2020-24490 LIN1019-5520: Security Advisory - linux - CVE-2020-12352 LIN1019-5519: Security Advisory - linux - CVE-2020-12351 LIN1019-5518: Security Advisory - bluez5 - CVE-2020-27153 LIN1019-5512: Security Advisory - libarchive - CVE-2020-21674 LIN1019-5505: Security Advisory - linux - CVE-2020-25645 LIN1019-5499: Security Advisory - php - CVE-2020-7069 LIN1019-5498: Security Advisory - php - CVE-2020-7070 LIN1019-5494: Security Advisory - libvirt - CVE-2020-25637 LIN1019-5491: Security Advisory - linux - CVE-2020-25643 LIN1019-5485: Security Advisory - python-urllib3 - CVE-2020-26137 LIN1019-5480: Security Advisory - phpmyadmin - CVE-2020-26934 LIN1019-5479: Security Advisory - phpmyadmin - CVE-2020-26935 LIN1019-5464: Security Advisory - dpdk - CVE-2020-14378 LIN1019-5463: Security Advisory - dpdk - CVE-2020-14377 LIN1019-5462: Security Advisory - dpdk - CVE-2020-14376 LIN1019-5461: Security Advisory - dpdk - CVE-2020-14375 LIN1019-5460: Security Advisory - dpdk - CVE-2020-14374 LIN1019-5449: Security Advisory - qemu - CVE-2020-25084 LIN1019-5447: Security Advisory - qemu - CVE-2020-25625 LIN1019-5593: [tz-announce] 2020d release of tz code and data available LIN1019-5527: Can't change rootfs size with IMAGE_ROOTFS_SIZE LIN1019-5523: SDK build issues LIN1019-5502: ERROR: intel-microcode-20190918 do_fetch() failed (WRLINUX_10_19_BASE) LIN1019-5500: CLONE - [tz-announce] 2020c release of tz code and data available LIN1019-5472: intel-socfpga-64: ERROR: u-boot-socfpga-v2019.04+gitAUTOINC+8c4cd804d6-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5469: ERROR: grpc-1.24.1-r0 do_package: QA Issue: grpc: Files/directories were installed but not shipped in any package: LIN1019-5468: ls1046a doesn't link up 10Gbps on 10G Copper Ethernet LIN1019-5442: gdbm-native-1.18.1-r0 do_compile failed LIN1019-5432: kernel crash on cn96xx with RCPL0011 LIN1019-4059: Intermittent/random build failures when building with feature/ima ======================= 10.19.45.12 =============================== LIN1019-5457: Security Advisory - python - CVE-2020-26116 LIN1019-5446: Security Advisory - linux - CVE-2020-26088 LIN1019-5438: Security Advisory - samba - CVE-2020-1472 LIN1019-5433: Security Advisory - linux - CVE-2020-14390 LIN1019-5430: Security Advisory - libdbi-perl - CVE-2019-20919 LIN1019-5421: Security Advisory - cryptsetup - CVE-2020-14382 LIN1019-5415: Security Advisory - linux - CVE-2020-14314 LIN1019-5414: Security Advisory - linux - CVE-2020-14385 LIN1019-5413: Security Advisory - libdbi-perl - CVE-2020-14392 LIN1019-5412: Security Advisory - libdbi-perl - CVE-2020-14393 LIN1019-5402: Security Advisory - cups - CVE-2020-3898 LIN1019-5401: Security Advisory - cups - CVE-2019-8842 LIN1019-5398: Security Advisory - cups - CVE-2019-2228 LIN1019-5391: Security Advisory - linux - CVE-2020-25285 LIN1019-5390: Security Advisory - linux - CVE-2020-25284 LIN1019-5385: Security Advisory - linux - CVE-2020-25220 LIN1019-5376: Security Advisory - linux - CVE-2020-14386 LIN1019-5373: Security Advisory - php - CVE-2020-7068 LIN1019-5371: Security Advisory - libproxy - CVE-2020-25219 LIN1019-5357: Security Advisory - nasm - CVE-2020-24978 LIN1019-5356: Security Advisory - gnutls - CVE-2020-24659 LIN1019-5355: Security Advisory - libxml2 - CVE-2020-24977 LIN1019-5339: Security Advisory - go - CVE-2020-24553 LIN1019-5329: Security Advisory - python3-django - CVE-2020-24583 LIN1019-5328: Security Advisory - python3-django - CVE-2020-24584 LIN1019-5326: Security Advisory - hostapd & wpa-supplicant - CVE-2020-12695 LIN1019-5324: Security Advisory - qemu - CVE-2020-14364 LIN1019-5315: Security Advisory - librepo - CVE-2020-14352 LIN1019-5314: Security Advisory - nss - CVE-2019-11756 LIN1019-5313: Security Advisory - nss - CVE-2019-11745 LIN1019-5310: Security Advisory - nss - CVE-2020-6829 LIN1019-5309: Security Advisory - nss - CVE-2019-17006 LIN1019-5308: Security Advisory - nss - CVE-2019-17023 LIN1019-5305: Security Advisory - ceph - CVE-2020-1700 LIN1019-5292: Security Advisory - bison - CVE-2020-24240 LIN1019-5286: Security Advisory - nss - CVE-2020-12403 LIN1019-5285: Security Advisory - nss - CVE-2020-12402 LIN1019-5284: Security Advisory - nss - CVE-2020-12401 LIN1019-5279: Security Advisory - nss - CVE-2020-12400 LIN1019-5273: Security Advisory - bind - CVE-2020-8624 LIN1019-5272: Security Advisory - bind - CVE-2020-8623 LIN1019-5271: Security Advisory - bind - CVE-2020-8622 LIN1019-5264: Security Advisory - qemu - CVE-2020-12829 LIN1019-5259: Security Advisory - linux - CVE-2020-14331 LIN1019-5255: Security Advisory - net-snmp - CVE-2020-15862 LIN1019-5254: Security Advisory - net-snmp - CVE-2020-15861 LIN1019-5243: Security Advisory - lua - CVE-2020-24371 LIN1019-4842: Security Advisory - gcc - CVE-2020-13844 LIN1019-4216: Security Advisory - glibc - CVE-2020-6096 LIN1019-3049: Security Advisory - libssh2 - CVE-2019-17498 LIN1019-5477: ERROR: intel-microcode-20200609-r0 do_fetch() failed LIN1019-5473: ERROR: thin-provisioning-tools-0.8.5-r0 do_fetch: Network access disabled through BB_NO_NETWORK LIN1019-5471: initramfs-framework recipe contains bashism LIN1019-5459: [WARNING] do_fetch warning "python-setuptools-scm-native is not supported by Wind River Linux" LIN1019-5426: spi-nor driver not working properly with Cypress flash s25fl064l - marvell-cn96xx LIN1019-5409: Unable to run setup.sh for the xilinx-zynqmp BSP on Windriver-Labs LIN1019-5408: Request to backport patch from upstream: xfs: Fix tail rounding in xfs_alloc_file_space() LIN1019-5388: CLONE - top crashing in WRL8 - cores found by QA LIN1019-5383: ERROR: intel-pcm-2.3a-r0 do_fetch() failed LIN1019-5367: CLONE - json-c only reads 11 objects LIN1019-5351: [WARNING] linux-yocto-tiny-5.2.54 do_fetch: linux-yocto-tiny is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information LIN1019-5346: ERROR: ucarp-1.5.2-r0 do_fetch() failed without --dl-layers LIN1019-5345: [WARNING] compiling warning "WARNING: unmet direct dependencies detected for PINCTRL_IMX_SCU" of nxp-imx8 LIN1019-5333: CLONE - Manpage generation for sssd LIN1019-5332: [kernel rebase]"mmc1: unspecified timeout for CMD6 - use generic" logs are frequently displayed LIN1019-5323: WARNING: libsign-native is not supported by Wind River. Check 'Externally downloadable 3rd party components' in EULA for more information. LIN1019-5059: [CUT] SEC.1.3 Process Containment Using MAC-based Mechanism failed LIN1019-5021: fetch error of package ucarp LIN1019-4366: Stratix10 FPGA reload fails on Linux kernel 5.2 ======================= 10.19.45.11 =============================== LIN1019-5416: Security Advisory - linux - CVE-2020-10781 LIN1019-5301: Security Advisory - libexif - CVE-2019-9278 LIN1019-5299: Security Advisory - xserver-xorg - CVE-2020-14362 LIN1019-5298: Security Advisory - xserver-xorg - CVE-2020-14361 LIN1019-5297: Security Advisory - xserver-xorg - CVE-2020-14346 LIN1019-5296: Security Advisory - xserver-xorg - CVE-2020-14345 LIN1019-5295: Security Advisory - libx11 - CVE-2020-14363 LIN1019-5294: Security Advisory - libexif - CVE-2020-0198 LIN1019-5289: Security Advisory - nasm - CVE-2020-24241 LIN1019-5268: Security Advisory - curl - CVE-2020-8231 LIN1019-5265: Security Advisory - libexif - CVE-2020-0093 LIN1019-5263: Security Advisory - sqlite3 - CVE-2020-6405 LIN1019-5261: Security Advisory - linux - CVE-2020-24394 LIN1019-5260: Security Advisory - linux - CVE-2020-14356 LIN1019-5252: Security Advisory - postgresql - CVE-2020-14349 LIN1019-5234: Security Advisory - ghostscript - CVE-2020-17538 LIN1019-5232: Security Advisory - ghostscript - CVE-2020-16310 LIN1019-5231: Security Advisory - ghostscript - CVE-2020-16309 LIN1019-5230: Security Advisory - ghostscript - CVE-2020-16308 LIN1019-5229: Security Advisory - ghostscript - CVE-2020-16307 LIN1019-5228: Security Advisory - ghostscript - CVE-2020-16306 LIN1019-5227: Security Advisory - ghostscript - CVE-2020-16305 LIN1019-5226: Security Advisory - ghostscript - CVE-2020-16304 LIN1019-5225: Security Advisory - ghostscript - CVE-2020-16303 LIN1019-5224: Security Advisory - ghostscript - CVE-2020-16302 LIN1019-5223: Security Advisory - ghostscript - CVE-2020-16301 LIN1019-5222: Security Advisory - ghostscript - CVE-2020-16300 LIN1019-5221: Security Advisory - ghostscript - CVE-2020-16299 LIN1019-5220: Security Advisory - ghostscript - CVE-2020-16298 LIN1019-5219: Security Advisory - ghostscript - CVE-2020-16297 LIN1019-5218: Security Advisory - ghostscript - CVE-2020-16296 LIN1019-5217: Security Advisory - ghostscript - CVE-2020-16295 LIN1019-5216: Security Advisory - ghostscript - CVE-2020-16294 LIN1019-5215: Security Advisory - ghostscript - CVE-2020-16293 LIN1019-5214: Security Advisory - ghostscript - CVE-2020-16292 LIN1019-5213: Security Advisory - ghostscript - CVE-2020-16291 LIN1019-5212: Security Advisory - ghostscript - CVE-2020-16290 LIN1019-5211: Security Advisory - ghostscript - CVE-2020-16289 LIN1019-5210: Security Advisory - ghostscript - CVE-2020-16288 LIN1019-5209: Security Advisory - ghostscript - CVE-2020-16287 LIN1019-5207: Security Advisory - trousers - CVE-2020-24332 LIN1019-5206: Security Advisory - trousers - CVE-2020-24331 LIN1019-5205: Security Advisory - trousers - CVE-2020-24330 LIN1019-5192: Security Advisory - qemu - CVE-2020-16092 LIN1019-5188: Security Advisory - apache2 - CVE-2020-11993 LIN1019-5186: Security Advisory - apache2 - CVE-2020-11984 LIN1019-5185: Security Advisory - apache2 - CVE-2020-9490 LIN1019-5171: Security Advisory - go - CVE-2020-16845 LIN1019-5159: Security Advisory - xserver-xorg - CVE-2020-14347 LIN1019-5158: Security Advisory - libx11 - CVE-2020-14344 LIN1019-5144: Security Advisory - linux - CVE-2020-16166 LIN1019-5120: Security Advisory - qemu - CVE-2020-15863 LIN1019-5113: Security Advisory - kubernetes - CVE-2020-8558 LIN1019-5110: Security Advisory - lua - CVE-2020-15945 LIN1019-5100: Security Advisory - kubernetes - CVE-2020-8557 LIN1019-5097: Security Advisory - kubernetes - CVE-2020-8559 LIN1019-5095: Security Advisory - lua - CVE-2020-15888 LIN1019-5076: Security Advisory - go - CVE-2020-15586 LIN1019-5010: Security Advisory - linux - CVE-2019-19338 LIN1019-4997: Security Advisory - qemu - CVE-2020-10756 LIN1019-4445: Security Advisory - glibc - CVE-2020-1752 LIN1019-4352: Security Advisory - glibc - CVE-2020-1751 LIN1019-3774: Security Advisory - linux - CVE-2019-19770 LIN1019-5288: [kernel rebase]cpuid.c:423:11: warning: unused variable f_pku LIN1019-5287: [kernel rebase]OV: ovp-kvm kernel image boot failed LIN1019-5274: create-user-key-store.sh uses "weak" des3 cipher for private keys LIN1019-5240: Can not build nginx_1.17.8 LIN1019-5235: nfs: Fix getxattr kernel panic and memory overflow LIN1019-5198: Feature 'features/sysrq.scc' not found LIN1019-5194: x-session-manager has multiple providers with the same priority LIN1019-5193: CLONE - [wraxl] dpdk_git failed (do_fetch) of wrlinux-std-sato_intel-x86-64_world_9-lts-cve. LIN1019-5182: [nss] nss regression test fail, 9 sub cases fail LIN1019-5150: [WARNING] do_kernel_configcheck warnings of nxp-ls1046 LIN1019-5108: xilinx-zynqmp : issue with flash partition getting erased and jffs2 file system access from uboot LIN1019-5105: CLONE - libpam password change error log LIN1019-4441: do_patch error with file bash-CVE-2019-18276.patch in a reconfigured build ======================= 10.19.45.10 =============================== LIN1019-5420: Security Advisory - linux - CVE-2020-10766 LIN1019-5418: Security Advisory - linux - CVE-2020-10767 LIN1019-5417: Security Advisory - linux - CVE-2020-10768 LIN1019-5348: Security Advisory - linux - CVE-2020-10720 LIN1019-5258: Security Advisory - linux - CVE-2020-2732 LIN1019-5071: Security Advisory - curl - CVE-2020-8177 LIN1019-5070: Security Advisory - curl - CVE-2020-8169 LIN1019-5011: Security Advisory - python - CVE-2019-20907 LIN1019-4996: Security Advisory - nss - CVE-2020-12399 LIN1019-4988: Security Advisory - samba - CVE-2020-10730 LIN1019-4987: Security Advisory - samba - CVE-2020-10745 LIN1019-4983: Security Advisory - samba - CVE-2020-10760 LIN1019-4982: Security Advisory - samba - CVE-2020-14303 LIN1019-4957: Security Advisory - openjpeg - CVE-2020-15389 LIN1019-4953: Security Advisory - linux - CVE-2020-15393 LIN1019-4940: Security Advisory - net-snmp - CVE-2019-20892 LIN1019-4938: Security Advisory - ceph - CVE-2020-10753 LIN1019-4936: Security Advisory - sqlite3 - CVE-2020-15358 LIN1019-4935: Security Advisory - ntp - CVE-2020-15025 LIN1019-4885: Security Advisory - python3 - CVE-2020-14422 LIN1019-4831: Security Advisory - linux - CVE-2020-13974 LIN1019-4812: Security Advisory - perl - CVE-2020-10543 LIN1019-4811: Security Advisory - perl - CVE-2020-10878 LIN1019-4810: Security Advisory - perl - CVE-2020-12723 LIN1019-4808: Security Advisory - qemu - CVE-2020-13791 LIN1019-4729: Security Advisory - qemu - CVE-2020-13253 LIN1019-4727: Security Advisory - qemu - CVE-2020-13362 LIN1019-4546: Security Advisory - linux - CVE-2020-12771 LIN1019-4500: Security Advisory - linux - CVE-2020-12655 LIN1019-4499: Security Advisory - linux - CVE-2020-12656 LIN1019-4972: [wraxl] iso-codes_4.3 failed (do_fetch) of wrlinux_qemuarm64_std-sato_faw_alldistro_predefined_19-lts. LIN1019-4966: CLONE - freediameter-ptest 2/12 failed LIN1019-4951: ERROR: waffle-1.6.0-r0 do_configure: meson failed LIN1019-4932: NXP LS1028 BSP : error message "Can't get dma-channels." when booting the target LIN1019-4684: CLONE - ERROR: qemu-native-2.7.0-r1 do_compile() failed LIN1019-3419: intel-x86-64: Failed to run sleepgraph in rt kernel LIN1019-3248: Warnings appear when booting the cube-server on qemuarm64. ======================= 10.19.45.9 =============================== LIN1019-4904: Security Advisory - nginx - CVE-2019-9513 LIN1019-4900: Security Advisory - nginx - CVE-2019-9511 LIN1019-4853: Security Advisory - nfs-utils - CVE-2019-3689 LIN1019-4849: Security Advisory - libpcre - CVE-2020-14155 LIN1019-4844: Security Advisory - qemu - CVE-2020-1983 LIN1019-4841: Security Advisory - linux - CVE-2020-10732 LIN1019-4839: Security Advisory - qemu - CVE-2020-10761 LIN1019-4832: Security Advisory - linux - CVE-2020-10757 LIN1019-4829: Security Advisory - intel SRBDS - CVE-2020-0543 LIN1019-4817: Security Advisory - kubernetes - CVE-2020-8555 LIN1019-4816: Security Advisory - dbus - CVE-2020-12049 LIN1019-4815: Security Advisory - qemu - CVE-2020-10702 LIN1019-4814: Security Advisory - ffmpeg - CVE-2020-13904 LIN1019-4809: Security Advisory - qemu - CVE-2020-13765 LIN1019-4807: Security Advisory - qemu - CVE-2020-13800 LIN1019-4805: Security Advisory - sqlite3 - CVE-2020-13871 LIN1019-4788: Security Advisory - python3-django - CVE-2020-13596 LIN1019-4787: Security Advisory - python3-django - CVE-2020-9402 LIN1019-4786: Security Advisory - python3-django - CVE-2020-7471 LIN1019-4785: Security Advisory - python3-django - CVE-2019-19844 LIN1019-4784: Security Advisory - python3-django - CVE-2019-19118 LIN1019-4777: Security Advisory - openssh - CVE-2020-12062 LIN1019-4776: Security Advisory - python3-django - CVE-2020-13254 LIN1019-4774: Security Advisory - gnutls - CVE-2020-13777 LIN1019-4773: Security Advisory - libjpeg-turbo - CVE-2020-13790 LIN1019-4770: Security Advisory - libvirt - CVE-2020-10703 LIN1019-4768: Security Advisory - systemd - CVE-2020-13776 LIN1019-4767: Security Advisory - qemu - CVE-2020-13659 LIN1019-4766: Security Advisory - qemu - CVE-2020-13754 LIN1019-4765: Security Advisory - linux - CVE-2019-20810 LIN1019-4731: Security Advisory - linux - CVE-2020-10751 LIN1019-4726: Security Advisory - sqlite3 - CVE-2020-13630 LIN1019-4725: Security Advisory - sqlite3 - CVE-2020-13631 LIN1019-4724: Security Advisory - sqlite3 - CVE-2020-13632 LIN1019-4679: Security Advisory - linux - CVE-2020-10711 LIN1019-4658: Security Advisory - bind - CVE-2020-8617 LIN1019-4657: Security Advisory - bind - CVE-2020-8616 LIN1019-4624: Security Advisory - linux - CVE-2020-12888 LIN1019-4498: Security Advisory - linux - CVE-2020-12657 LIN1019-4497: Security Advisory - linux - CVE-2020-12659 LIN1019-4418: Security Advisory - ffmpeg - CVE-2020-12284 LIN1019-4245: Security Advisory - linux - CVE-2020-11565 LIN1019-4237: Security Advisory - gnutls - CVE-2020-11501 LIN1019-4220: Security Advisory - kubernetes - CVE-2019-11254 LIN1019-3700: Security Advisory - linux - CVE-2019-19462 LIN1019-3379: Security Advisory - linux - CVE-2019-18814 LIN1019-4899: CLONE - Many BSPs failed to build: libmodulemd_git failed (do_fetch) LIN1019-4848: Request to backport upstream patch to fix lack of entropy LIN1019-4840: CLONE - toolchain-shar-extract: ignore timestamp on decompress LIN1019-4834: "wrl-small" rootfs has 435MB directory with firmware LIN1019-4827: CLONE - Wrong permissions on module.tgz file. LIN1019-4742: [WARNING] do_kernel_configcheck warnings in builds of nxp-ls1028 LIN1019-4615: Error doing "make scripts" in SDK ======================= 10.19.45.8 =============================== LIN1019-4881: Security Advisory - linux - CVE-2020-14416 LIN1019-4732: Security Advisory - glib-networking - CVE-2020-13645 LIN1019-4728: Security Advisory - qemu - CVE-2020-13361 LIN1019-4695: Security Advisory - sqlite3 - CVE-2020-13434 LIN1019-4694: Security Advisory - sqlite3 - CVE-2020-13435 LIN1019-4678: Security Advisory - libexif - CVE-2020-13112 LIN1019-4677: Security Advisory - libexif - CVE-2020-13113 LIN1019-4676: Security Advisory - libexif - CVE-2020-13114 LIN1019-4661: Security Advisory - dpdk - CVE-2020-10724 LIN1019-4660: Security Advisory - dpdk - CVE-2020-10723 LIN1019-4659: Security Advisory - dpdk - CVE-2020-10722 LIN1019-4655: Security Advisory - php - CVE-2019-11048 LIN1019-4644: Security Advisory - linux - CVE-2020-13143 LIN1019-4625: Security Advisory - apt - CVE-2020-3810 LIN1019-4591: Security Advisory - linux - CVE-2020-12826 LIN1019-4584: Security Advisory - icu - CVE-2020-10531 LIN1019-4551: Security Advisory - json-c - CVE-2020-12762 LIN1019-4550: Security Advisory - libexif - CVE-2020-12767 LIN1019-4549: Security Advisory - linux - CVE-2020-12768 LIN1019-4548: Security Advisory - linux - CVE-2020-12769 LIN1019-4547: Security Advisory - linux - CVE-2020-12770 LIN1019-4542: Security Advisory - linux - CVE-2020-10690 LIN1019-4530: Security Advisory - qemu - CVE-2020-7211 LIN1019-4511: Security Advisory - samba - CVE-2020-10704 LIN1019-4503: Security Advisory - linux - CVE-2020-12652 LIN1019-4502: Security Advisory - linux - CVE-2020-12653 LIN1019-4501: Security Advisory - linux - CVE-2020-12654 LIN1019-4452: Security Advisory - samba - CVE-2020-10700 LIN1019-4449: Security Advisory - ruby - CVE-2020-10933 LIN1019-4448: Security Advisory - linux - CVE-2020-12114 LIN1019-4444: Security Advisory - linux - CVE-2020-11884 LIN1019-4443: Security Advisory - linux - CVE-2020-12464 LIN1019-4442: Security Advisory - linux - CVE-2020-12465 LIN1019-4419: Security Advisory - openldap - CVE-2020-12243 LIN1019-4417: Security Advisory - libvirt - CVE-2020-12430 LIN1019-4342: Security Advisory - mariadb - CVE-2020-2752 LIN1019-4340: Security Advisory - mariadb - CVE-2020-2760 LIN1019-4320: Security Advisory - mariadb - CVE-2020-2812 LIN1019-4319: Security Advisory - mariadb - CVE-2020-2814 LIN1019-4269: Security Advisory - linux - CVE-2020-11668 LIN1019-4254: Security Advisory - linux - CVE-2020-11608 LIN1019-4253: Security Advisory - linux - CVE-2020-11609 LIN1019-4218: Security Advisory - apache2 - CVE-2020-1927 LIN1019-4217: Security Advisory - apache2 - CVE-2020-1934 LIN1019-4190: Security Advisory - kubernetes - CVE-2020-8551 LIN1019-4189: Security Advisory - kubernetes - CVE-2020-8552 LIN1019-3979: Security Advisory - python - CVE-2020-8492 LIN1019-3776: Security Advisory - linux - CVE-2019-19768 LIN1019-4687: DT overlay memory leak - request to backport patch from upstream LIN1019-4672: mariadb_10.3.23.bb:do_compile() failed on xilinx_zynqmp LIN1019-4627: Creating initramfs Images - Wrong initramfs-install feature README LIN1019-4606: OV: WARNING: Your host glibc verson (2.31) is newer than that in uninative (2.30) LIN1019-4605: OV: WARNING: Host distribution "ubuntu-20.04" has not been validated with this version of the build system LIN1019-4598: [WARNING] arm64/kernel/perf_regs.c:37:20: warning: array subscript 32 is above array bounds of 'u64[31]' LIN1019-4585: LTTng: vmalloc_sync_all symbol lookup failed LIN1019-4579: [lib32] lttng-tools-ptest : 1/4859 failed LIN1019-4536: qemu-native_4.1.0.bb:do_compile() failed on Ubuntu-20.04 LIN1019-4517: CLONE - qemuarm: Internal error: Oops - BUG: 0 during boot LIN1019-4507: CLONE - do_fetch errors of dce and u-boot-imx from git.freescale.com LIN1019-4506: ERROR: go-pty-git-r0 do_fetch: Fetcher failure LIN1019-4405: perf script can not parser backtrace in 64bit kernel and 32bit system. LIN1019-4257: [WARNING] compiling error of kernel "arm64/kernel/perf_callchain.c warning: cast from pointer to integer of different size" LIN1019-3037: [WARNING] do_compile&kernel_configcheck warings of linux-yocto-5.2.17 on qemuarm BSPs LIN1019-3036: [WARNING] do_kernel_configcheck warnings of qemumips64 both on standard and next configs ======================= 10.19.45.7 =============================== LIN1019-4806: Security Advisory - ntp - CVE-2020-13817 LIN1019-4763: Security Advisory - linux - CVE-2019-20812 LIN1019-4403: Security Advisory - qemu - CVE-2020-11869 LIN1019-4400: Security Advisory - php - CVE-2020-7067 LIN1019-4390: Security Advisory - ceph - CVE-2020-1760 LIN1019-4373: Security Advisory - git - CVE-2020-11008 LIN1019-4346: Security Advisory - ntp - CVE-2020-11868 LIN1019-4291: Security Advisory - git - CVE-2020-5260 LIN1019-4284: Security Advisory - ceph - CVE-2020-1759 LIN1019-4280: Security Advisory - openssl - CVE-2020-1967 LIN1019-4267: Security Advisory - linux - CVE-2019-14615 LIN1019-4262: Security Advisory - sqlite3 - CVE-2020-11655 LIN1019-4261: Security Advisory - sqlite3 - CVE-2020-11656 LIN1019-4231: Security Advisory - linux - CVE-2020-8835 LIN1019-4230: Security Advisory - linux - CVE-2020-11494 LIN1019-4212: Security Advisory - systemd - CVE-2020-1712 LIN1019-4210: Security Advisory - php - CVE-2020-7064 LIN1019-4209: Security Advisory - php - CVE-2020-7065 LIN1019-4208: Security Advisory - php - CVE-2020-7066 LIN1019-4176: Security Advisory - linux - CVE-2020-10942 LIN1019-4156: Security Advisory - u-boot - CVE-2020-10648 LIN1019-4079: Security Advisory - linux - CVE-2020-9383 LIN1019-4061: Security Advisory - linux - CVE-2020-8992 LIN1019-4012: Security Advisory - linux - CVE-2020-8647 LIN1019-4011: Security Advisory - linux - CVE-2020-8648 LIN1019-4010: Security Advisory - linux - CVE-2020-8649 LIN1019-3978: Security Advisory - linux - CVE-2020-8428 LIN1019-3775: Security Advisory - linux - CVE-2019-19769 LIN1019-3716: Security Advisory - phpmyadmin - CVE-2019-19617 LIN1019-3581: Security Advisory - phpmyadmin - CVE-2019-18622 LIN1019-3227: Security Advisory - php - CVE-2019-11043 LIN1019-3085: Security Advisory - python - CVE-2019-18348 LIN1019-4393: CLONE - make: occasional deadlock when using parallel build LIN1019-4385: Uprev request of timezone: 2020a release of tz code and data available LIN1019-4359: CLONE - [WARNING] do_kernel_configcheck warnings on qemumips64 LIN1019-4299: Request to port fix for kernel hang when allocating huge page LIN1019-4272: The rng-tools_6.7.bbappend from layers/intel-socfpga/recipes-support/rng-tools/ wil be included in non-x86 archs LIN1019-4248: need update ntp package to version 4.2.8p14 LIN1019-4247: CLONE - file-native: build fails on ubu-16.04 LIN1019-4244: [lib32] openssh-ptest: openssh-ptest 1/51 failed LIN1019-4239: ERROR: mariadb-10.3.22-r0 do_package_qa: QA Issue: mariadb-dbg package is not obeying usrmerge distro feature. /lib should be relocated to /usr. [usrmerge] LIN1019-4235: [WARNING] kernel warnings "Section mismatch in reference from the variable __pci_fixup_malta_pcnet32_ioports_fixup163 to the function .init.text:malta_pcnet32_ioports_fixup()" on qemumips LIN1019-4204: Remove "_append_" for the PACKAGECONFIG of qemu LIN1019-4123: rngd takes 100% CPU time on startup Stratix10 LIN1019-4112: CLONE - perf call graphs lack symbols when running 32-bit applications on a 64-bit LIN1019-4102: "Creating a LUKS Partition on a Storage Device" page is missing some vital info LIN1019-3044: OverC: build fails with several python3 packages, such as django, not being whitelisted LIN1019-3031: warning: 'proc_dointvec_minmax_bpf_restricted' defined but not used LIN1019-2430: WRL-LTS19- LTTNG issue with epoch negative clock offset ======================= 10.19.45.6 =============================== LIN1019-4165: Security Advisory - phpmyadmin - CVE-2020-10802 LIN1019-4164: Security Advisory - phpmyadmin - CVE-2020-10803 LIN1019-4160: Security Advisory - freeradius - CVE-2019-17185 LIN1019-4159: Security Advisory - gnupg - CVE-2019-14855 LIN1019-4157: Security Advisory - phpmyadmin - CVE-2020-10804 LIN1019-4155: Security Advisory - libvirt - CVE-2019-20485 LIN1019-4152: Security Advisory - postgresql - CVE-2020-1720 LIN1019-4148: Security Advisory - nagios-nrpe - CVE-2020-6581 LIN1019-4147: Security Advisory - go - CVE-2020-7919 LIN1019-4144: Security Advisory - nagios-nrpe - CVE-2020-6582 LIN1019-4135: Security Advisory - bluez5 - CVE-2020-0556 LIN1019-4121: Security Advisory - python-urllib3 - CVE-2020-7212 LIN1019-4116: Security Advisory - qemu - CVE-2019-20382 LIN1019-4111: Security Advisory - webkitgtk - CVE-2020-10018 LIN1019-4110: Security Advisory - glib-2.0 - CVE-2020-6750 LIN1019-4109: Security Advisory - glibc - CVE-2020-10029 LIN1019-4099: Security Advisory - gd - CVE-2017-6363 LIN1019-4095: Security Advisory - php - CVE-2020-7061 LIN1019-4094: Security Advisory - php - CVE-2020-7062 LIN1019-4093: Security Advisory - php - CVE-2020-7063 LIN1019-4072: Security Advisory - sqlite3 - CVE-2020-9327 LIN1019-4070: Security Advisory - libarchive - CVE-2020-9308 LIN1019-4048: Security Advisory - linux - CVE-2019-3016 LIN1019-4013: Security Advisory - ipmitool - CVE-2020-5208 LIN1019-3983: Security Advisory - aspell - CVE-2019-20433 LIN1019-3957: Security Advisory - qemu - CVE-2020-7039 LIN1019-3950: Security Advisory - mariadb - CVE-2020-2574 LIN1019-3910: Security Advisory - nginx - CVE-2019-20372 LIN1019-3897: Security Advisory - cpio - CVE-2019-14866 LIN1019-3886: Security Advisory - qemu - CVE-2019-20175 LIN1019-3768: Security Advisory - git - CVE-2019-1387 LIN1019-3767: Security Advisory - git - CVE-2019-1354 LIN1019-3766: Security Advisory - git - CVE-2019-1353 LIN1019-3765: Security Advisory - git - CVE-2019-1352 LIN1019-3764: Security Advisory - git - CVE-2019-1351 LIN1019-3763: Security Advisory - git - CVE-2019-1350 LIN1019-3762: Security Advisory - git - CVE-2019-1349 LIN1019-3760: Security Advisory - git - CVE-2019-1348 LIN1019-3748: Security Advisory - git - CVE-2019-19604 LIN1019-3697: Security Advisory - linux - CVE-2019-19525 LIN1019-3571: Security Advisory - linux - CVE-2019-19037 LIN1019-3566: Security Advisory - glibc - CVE-2019-19126 LIN1019-3006: Security Advisory - mysql - CVE-2019-2938 LIN1019-2995: Security Advisory - mysql - CVE-2019-2974 LIN1019-2905: Security Advisory - binutils - CVE-2019-17450 LIN1019-2904: Security Advisory - binutils - CVE-2019-17451 LIN1019-2830: Security Advisory - libgcrypt - CVE-2019-13627 LIN1019-2826: Security Advisory - python - CVE-2019-16935 LIN1019-2812: Security Advisory - go - CVE-2019-16276 LIN1019-2547: Security Advisory - sqlite - CVE-2019-16168 LIN1019-2546: Security Advisory - sysstat - CVE-2019-16167 LIN1019-2524: Security Advisory - python - CVE-2019-16056 LIN1019-1924: Security Advisory - mysql - CVE-2019-2737 LIN1019-1922: Security Advisory - mysql - CVE-2019-2739 LIN1019-1921: Security Advisory - mysql - CVE-2019-2740 LIN1019-1913: Security Advisory - mysql - CVE-2019-2758 LIN1019-1896: Security Advisory - mysql - CVE-2019-2805 LIN1019-1563: Security Advisory - bzip2 - CVE-2019-12900 LIN1019-972: Security Advisory - sssd - CVE-2018-16838 LIN1019-4185: ERROR: freeradius-3.0.19-r0 do_unpack: Fetcher failure LIN1019-4183: Creating initramfs Images - initramfs bundled image isn't installed correctly LIN1019-4150: libpam: pam_userdb.so is not built even though libdb(Berkeley DB) exist LIN1019-4113: WRL 19 SPI controller registration bug LIN1019-4107: Native sstate package list generation failure LIN1019-4082: [WARNING] fetch warnings of package openl2tp in builds without --dl-layers LIN1019-4081: [WARNING] "host/xhci-pci.c:522:13: warning: 'xhci_pci_shutdown' defined but not used" in build of qemumips&qemumips64 LIN1019-4058: IMA Denial testcases: "windriver" password not working LIN1019-4057: IMA Denial testcases: document GPG homedir path length limit(80 characters) LIN1019-4025: Hardware RNG Entropy Gatherer Daemon slow stop LIN1019-3975: stmmac kernel crash - request to integrate patch LIN1019-3803: stmmac debugfs entry shows incorrect device name after rename LIN1019-3615: CLONE - sysstat fails because of chkconfig error LIN1019-3389: Recipe oprofile blacklisted is still in white list at the same time LIN1019-1666: [BTS]Failures found during xilinx-zynqmp BSP ZCU102 target booting up ======================= 10.19.45.5 =============================== LIN1019-4073: Security Advisory - screen - CVE-2020-9366 LIN1019-4063: Security Advisory - pcre - CVE-2019-20454 LIN1019-4047: Security Advisory - kubernetes - CVE-2019-11251 LIN1019-4035: Security Advisory - gd - CVE-2018-14553 LIN1019-4032: Security Advisory - qemu - CVE-2020-1711 LIN1019-4027: Security Advisory - php - CVE-2020-7059 LIN1019-4004: Security Advisory - python - CVE-2019-9674 LIN1019-3986: Security Advisory - sudo - CVE-2019-18634 LIN1019-3985: Security Advisory - openjpeg - CVE-2020-8112 LIN1019-3965: Security Advisory - libxml2 - CVE-2019-20388 LIN1019-3922: Security Advisory - openjpeg - CVE-2020-6851 LIN1019-3823: Security Advisory - cyrus-sasl - CVE-2019-19906 LIN1019-3704: Security Advisory - linux - CVE-2019-14897 LIN1019-3703: Security Advisory - linux - CVE-2019-14901 LIN1019-3665: Security Advisory - linux - CVE-2019-14896 LIN1019-3517: Security Advisory - linux - CVE-2019-19053 LIN1019-2634: Security Advisory - linux - CVE-2019-16232 LIN1019-4065: CLONE - Bug in dhclient ! (Crashes on early SIGINT/SIGTERM) LIN1019-4055: CLONE - Process lttng-sessiond caused kernel NULL pointer dereference at virtual address 0000000000000080 LIN1019-4000: CLONE - Observing QEMU crash with WRL9 LIN1019-3312: [wraxl]packagegroup-tpm2-initramfs-1.0-r0 do_package_write_rpm LIN1019-3249: Failed to create a snapshot for cube-server on qemuarm64 and xilinx-zynqmp LIN1019-2986: file /usr/share/polkit-1/rules.d conflicts between attempted installs of gvfs-1.41.2-r0.core2_64 and polkit-0.116-r0.core2_64 LIN1019-1683: intel-x86-64_secure-boot: Failed to verify file /initrd (err:0x8000000000000002) ======================= 10.19.45.4 =============================== LIN1019-4002: Security Advisory - ppp - CVE-2020-8597 LIN1019-3982: Security Advisory - virglrenderer - CVE-2020-8002 LIN1019-3981: Security Advisory - virglrenderer - CVE-2020-8003 LIN1019-3966: Security Advisory - libxml2 - CVE-2020-7595 LIN1019-3964: Security Advisory - samba - CVE-2019-19344 LIN1019-3963: Security Advisory - samba - CVE-2019-14907 LIN1019-3962: Security Advisory - samba - CVE-2019-14902 LIN1019-3920: Security Advisory - linux - CVE-2019-19332 LIN1019-3909: Security Advisory - phpmyadmin - CVE-2020-5504 LIN1019-3896: Security Advisory - dnsmasq - CVE-2019-14834 LIN1019-3877: Security Advisory - tigervnc - CVE-2019-15691 LIN1019-3875: Security Advisory - tigervnc - CVE-2019-15693 LIN1019-3873: Security Advisory - tigervnc - CVE-2019-15695 LIN1019-3851: Security Advisory - linux - CVE-2019-19965 LIN1019-3841: Security Advisory - linux - CVE-2019-19947 LIN1019-3789: Security Advisory - linux - CVE-2019-19807 LIN1019-3705: Security Advisory - linux - CVE-2019-14895 LIN1019-2197: Security Advisory - patch - CVE-2018-20969 LIN1019-3935: [wraxl]grub-efi-native-2.04-r0 do_sign LIN1019-3932: OV: ERROR: wr-systemd-container-1.0-r0 do_image_wic LIN1019-3931: OV: ERROR: wr-app-container-1.0-r0 do_image_wic LIN1019-3926: kbd: enable vlock as configuration option but vlock not be compiled. LIN1019-3919: gpio: altera: Allocate irq_chip dynamically LIN1019-3911: CLONE - [wraxl] Nothing RPROVIDES 'cri-o' of wrlinux_qemumips_std-sato_faw_alldistro_ccache_predefined_20. LIN1019-3900: Please prompt to install package rpcgen on Fedora31 LIN1019-3893: [WARNING] kernel warnings on intel-socfpga-64 LIN1019-3868: Premirror not used when parsing linux-yocto-rt LIN1019-3866: efitools_git failed (do_sign) LIN1019-3849: WARNING: No recipes available for wrlinux-kernel-dev linux-yocto_4.18.bbappend LIN1019-3824: meta-secure-core: rpm_%.bbappend overwrites PACKAGECONFIG LIN1019-3815: rpcbind.socket: systemd legacy directory notification LIN1019-3794: Intel RSU driver not loading correctly ======================= 10.19.45.3 =============================== LIN1019-3954: Security Advisory - linux - CVE-2019-18282 LIN1019-3883: Security Advisory - sqlite3 - CVE-2019-19959 LIN1019-3882: Security Advisory - sqlite3 - CVE-2019-20218 LIN1019-3862: Security Advisory - libxml2 - CVE-2019-19956 LIN1019-3857: Security Advisory - sqlite3 - CVE-2019-19923 LIN1019-3856: Security Advisory - sqlite3 - CVE-2019-19924 LIN1019-3855: Security Advisory - sqlite3 - CVE-2019-19925 LIN1019-3845: Security Advisory - virglrenderer - CVE-2019-18388 LIN1019-3844: Security Advisory - virglrenderer - CVE-2019-18389 LIN1019-3843: Security Advisory - virglrenderer - CVE-2019-18390 LIN1019-3842: Security Advisory - virglrenderer - CVE-2019-18391 LIN1019-3832: Security Advisory - php - CVE-2019-11044 LIN1019-3831: Security Advisory - php - CVE-2019-11045 LIN1019-3830: Security Advisory - php - CVE-2019-11046 LIN1019-3829: Security Advisory - php - CVE-2019-11047 LIN1019-3828: Security Advisory - php - CVE-2019-11049 LIN1019-3827: Security Advisory - php - CVE-2019-11050 LIN1019-3826: Security Advisory - linux - CVE-2019-19922 LIN1019-3825: Security Advisory - sqlite3 - CVE-2019-19926 LIN1019-3817: Security Advisory - sudo - CVE-2019-19232 LIN1019-3816: Security Advisory - sudo - CVE-2019-19234 LIN1019-3812: Security Advisory - sqlite3 - CVE-2019-19880 LIN1019-3811: Security Advisory - shadow - CVE-2019-19882 LIN1019-3801: Security Advisory - linux - CVE-2019-19241 LIN1019-3782: Security Advisory - rabbitmq-c - CVE-2019-18609 LIN1019-3777: Security Advisory - linux - CVE-2019-19767 LIN1019-3769: Security Advisory - sysstat - CVE-2019-19725 LIN1019-3753: Security Advisory - freeradius - CVE-2019-13456 LIN1019-3747: Security Advisory - samba - CVE-2019-14861 LIN1019-3746: Security Advisory - samba - CVE-2019-14870 LIN1019-3745: Security Advisory - libxslt - CVE-2019-5815 LIN1019-3737: Security Advisory - sqlite3 - CVE-2019-19603 LIN1019-3736: Security Advisory - sqlite3 - CVE-2019-19645 LIN1019-3735: Security Advisory - sqlite3 - CVE-2019-19646 LIN1019-3726: Security Advisory - openssl - CVE-2019-1551 LIN1019-3717: Security Advisory - linux - CVE-2019-19602 LIN1019-3698: Security Advisory - linux - CVE-2019-19524 LIN1019-3696: Security Advisory - linux - CVE-2019-19526 LIN1019-3693: Security Advisory - linux - CVE-2019-19529 LIN1019-3690: Security Advisory - linux - CVE-2019-19532 LIN1019-3688: Security Advisory - linux - CVE-2019-19534 LIN1019-3515: Security Advisory - linux - CVE-2019-19054 LIN1019-3860: Invalid python interpreter 'python3/' in /usr/bin/samba_xxx script LIN1019-3837: setup.sh fails with updated Python v3 LIN1019-3836: stratix10: DesignWare SPI controller driver not enabled LIN1019-3835: libpython3-staticdev: Incorrect path for 64-bit libs LIN1019-3821: stmmac: UDP performance degraded in LTS 19 - Stratix10 LIN1019-3814: dbus.socket: systemd legacy directory notification LIN1019-3744: Please remove warning: WARNING: Host distribution "rhel-7.7" has not been validated with this version of the build system LIN1019-3740: intel-x86-32 should be removed from README of anaconda LIN1019-3732: xhci_hcd 0001:00:0c.0: ERROR unknown event type 37 LIN1019-3729: CLONE - MTD device writes unreliable from RCPL16 [Regression] LIN1019-3617: CLONE - NFS daemon consumes 100% CPU LIN1019-3333: kernel_configcheck warnings with feature/host-rt-tune LIN1019-2890: ostree: Corrupted file object for ostree fsck --repo=/sysroot/ostree/repo on cgl rootfs LIN1019-2857: ostree: Can not login with cgl rootfs if selinux is in enforcing mode ======================= 10.19.45.2 =============================== LIN1019-3722: Security Advisory - linux - CVE-2019-19447 LIN1019-3699: Security Advisory - linux - CVE-2019-19523 LIN1019-3695: Security Advisory - linux - CVE-2019-19527 LIN1019-3694: Security Advisory - linux - CVE-2019-19528 LIN1019-3692: Security Advisory - linux - CVE-2019-19530 LIN1019-3691: Security Advisory - linux - CVE-2019-19531 LIN1019-3689: Security Advisory - linux - CVE-2019-19533 LIN1019-3687: Security Advisory - linux - CVE-2019-19535 LIN1019-3686: Security Advisory - linux - CVE-2019-19536 LIN1019-3685: Security Advisory - linux - CVE-2019-19537 LIN1019-3684: Security Advisory - linux - CVE-2019-19543 LIN1019-3666: Security Advisory - linux - CVE-2019-10220 LIN1019-3663: Security Advisory - ruby - CVE-2019-16201 LIN1019-3660: Security Advisory - sqlite3 - CVE-2019-19242 LIN1019-3657: Security Advisory - ruby - CVE-2019-15845 LIN1019-3656: Security Advisory - ruby - CVE-2019-16254 LIN1019-3655: Security Advisory - ruby - CVE-2019-16255 LIN1019-3650: Security Advisory - linux - CVE-2019-18660 LIN1019-3602: Security Advisory - sqlite3 - CVE-2019-19244 LIN1019-3596: Security Advisory - linux - CVE-2019-19252 LIN1019-3578: Security Advisory - libarchive - CVE-2019-19221 LIN1019-3528: Security Advisory - linux - CVE-2019-19045 LIN1019-3527: Security Advisory - linux - CVE-2019-19046 LIN1019-3524: Security Advisory - linux - CVE-2019-19048 LIN1019-3523: Security Advisory - linux - CVE-2019-19049 LIN1019-3522: Security Advisory - linux - CVE-2019-19050 LIN1019-3519: Security Advisory - linux - CVE-2019-19051 LIN1019-3518: Security Advisory - linux - CVE-2019-19052 LIN1019-3514: Security Advisory - linux - CVE-2019-19055 LIN1019-3512: Security Advisory - linux - CVE-2019-19056 LIN1019-3511: Security Advisory - linux - CVE-2019-19057 LIN1019-3509: Security Advisory - linux - CVE-2019-19058 LIN1019-3507: Security Advisory - linux - CVE-2019-19059 LIN1019-3505: Security Advisory - linux - CVE-2019-19060 LIN1019-3504: Security Advisory - linux - CVE-2019-19061 LIN1019-3502: Security Advisory - linux - CVE-2019-19062 LIN1019-3501: Security Advisory - linux - CVE-2019-19063 LIN1019-3500: Security Advisory - linux - CVE-2019-19064 LIN1019-3498: Security Advisory - linux - CVE-2019-19065 LIN1019-3496: Security Advisory - linux - CVE-2019-19066 LIN1019-3495: Security Advisory - linux - CVE-2019-19067 LIN1019-3494: Security Advisory - linux - CVE-2019-19068 LIN1019-3493: Security Advisory - linux - CVE-2019-19069 LIN1019-3492: Security Advisory - linux - CVE-2019-19070 LIN1019-3491: Security Advisory - linux - CVE-2019-19071 LIN1019-3490: Security Advisory - linux - CVE-2019-19072 LIN1019-3489: Security Advisory - linux - CVE-2019-19073 LIN1019-3488: Security Advisory - linux - CVE-2019-19074 LIN1019-3486: Security Advisory - linux - CVE-2019-19075 LIN1019-3485: Security Advisory - linux - CVE-2019-19076 LIN1019-3484: Security Advisory - linux - CVE-2019-19077 LIN1019-3483: Security Advisory - linux - CVE-2019-19078 LIN1019-3482: Security Advisory - linux - CVE-2019-19079 LIN1019-3479: Security Advisory - linux - CVE-2019-19082 LIN1019-3478: Security Advisory - linux - CVE-2019-19083 LIN1019-3475: Security Advisory - ghostscript - CVE-2019-14869 LIN1019-3450: Security Advisory - fribidi - CVE-2019-18397 LIN1019-3386: Security Advisory - linux - CVE-2019-18807 LIN1019-3385: Security Advisory - linux - CVE-2019-18808 LIN1019-3384: Security Advisory - linux - CVE-2019-18809 LIN1019-3382: Security Advisory - linux - CVE-2019-18811 LIN1019-3380: Security Advisory - linux - CVE-2019-18813 LIN1019-3297: Security Advisory - samba - CVE-2019-10218 LIN1019-3296: Security Advisory - samba - CVE-2019-14833 LIN1019-3295: Security Advisory - samba - CVE-2019-14847 LIN1019-3293: Security Advisory - linux - CVE-2019-18683 LIN1019-3291: Security Advisory - linux - CVE-2019-18786 LIN1019-2886: Security Advisory - bind - CVE-2018-5743 LIN1019-2823: Security Advisory - linux - CVE-2019-17075 LIN1019-2642: Security Advisory - hostapd&wpa-supplicant - CVE-2019-16275 LIN1019-1882: Security Advisory - nasm - CVE-2019-14248 LIN1019-1880: Security Advisory - gdb - CVE-2019-1010180 LIN1019-3670: [DOC] issues in Wind River Linux Getting Started, LTS 19 LIN1019-3646: ostree: Can not install one complete image into SD card which has been deployed one standard WIC image on xilinx-zynqmp target LIN1019-3644: [Document] The kernel version (v4.18) should be updated in " Wind River Linux Kernel Development, LTS 19" LIN1019-3628: Incorrect path for container multiconfigs LIN1019-3624: syslog-ng bug when including both 64- and 32-bits to SDK LIN1019-3607: python3-config: No module named 'distutils' LIN1019-3580: CLONE - [wraxl] u-boot-uenv_2.0 failed (do_deploy) of wrlinux_qemumips64_std-sato_faw_alldistro_debug_predefined_20. LIN1019-3565: Security: ERROR: shadow-securetty-4.6-r3 do_package_write_rpm: Failed to import gpg key LIN1019-3404: ostree: There is no boot.scr for multilib rootfs on xilinx-zynqmp bsp LIN1019-3369: 'c3 add docker://debian' failed on qemux86-64 OverC image. LIN1019-3334: nodistro project for ti-am335x compiled failed on WRL-10_19_LTS RCPL0000 LX03 LIN1019-3314: OV: caught exceptions while run systemReport with its parameters LIN1019-3307: ostree: There are some systemd service failed due to No such file or directory in /var on NoAB model LIN1019-3264: ostree: ERROR: lib32-wrlinux-image-std-1.0-r5 do_image_ostree because gpg: signing failed: No secret key LIN1019-3263: intel-x86-64: WARNING: do_kernel_configcheck: [kernel config]: specified values did not make it into the kernel's final configuration when with wifi-usb.scc LIN1019-3261: encountered do_populate_sdk hang in build with feature feature/kernel-dev LIN1019-3257: [KTS] create cgroup ("cgroup_ad-hoc") failed on bcm-2xxx-rpi4 BSP target LIN1019-3212: Kernel build warnings found on bcm-2xxx-rpi4 BSP LIN1019-3210: [BTS]"dma_kernel_test" test failed on bcm-2xxx-rpi4 BSP target LIN1019-3208: [BTS]Errors were found during bcm-2xxx-rpi4 BSP target boot up LIN1019-3200: "aplay -l" command return null device name on xilinx-zynqmp BSP LIN1019-3042: intel-x86-64: There is one call trace for rt+cgl kernel on nuc7 target LIN1019-2868: ostree: error: Locking repo exclusive failed: Resource temporarily unavailable LIN1019-2711: feature/run-container: many build warnings LIN1019-2706: mkswap01_sh in LTP failed on xilinx-zynq/xilinx-zynqmp/intel-x86-64 LIN1019-2202: [xfce] desktop menu create folder/document/properties does not work LIN1019-2094: rmmod wmi_bmof print calltrace LIN1019-2078: blueman-manager: unexpected log msg ======================= 10.19.45.1 =============================== LIN1019-3669: Security Advisory - linux - CVE-2018-12207 LIN1019-3481: Security Advisory - linux - CVE-2019-19080 LIN1019-3480: Security Advisory - linux - CVE-2019-19081 LIN1019-2993: Security Advisory - linux - CVE-2019-17666 LIN1019-2918: Security Advisory - rsyslog - CVE-2019-17041 LIN1019-2790: Security Advisory - e2fsprogs - CVE-2019-5094 LIN1019-2762: Security Advisory - linux - CVE-2019-17133 LIN1019-1513: Security Advisory - linux - CVE-2019-12456 LIN1019-1399: Security Advisory - linux - CVE-2019-12454 LIN1019-1398: Security Advisory - linux - CVE-2019-12455 LIN1019-230: Security Advisory - tcpdump - CVE-2017-16808 LIN1019-3067: feature/run-container: REAME, description of 'oeqa' need to be removed