Files
tqma6-yocto-mirror/sources/poky/documentation/migration-guides/release-notes-4.2.4.rst

365 lines
68 KiB
ReStructuredText
Raw Normal View History

.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
Release notes for Yocto-4.2.4 (Mickledore)
------------------------------------------
Security Fixes in Yocto-4.2.4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- bind: Fix :cve_nist:`2023-3341` and :cve_nist:`2023-4236`
- binutils: Fix :cve_nist:`2023-39128`
- cups: fix :cve_nist:`2023-4504`
- curl: Fix :cve_nist:`2023-28320`, :cve_nist:`2023-32001`, :cve_nist:`2023-38039`, :cve_nist:`2023-38545` and :cve_nist:`2023-38546`
- dmidecode: fix for :cve_nist:`2023-30630`
- dropbear: fix :cve_nist:`2023-36328`
- ffmpeg: Ignore :cve_nist:`2023-39018`
- gcc: Fix :cve_nist:`2023-4039`
- gdb: Fix :cve_nist:`2023-39128`
- ghostscript: Fix :cve_nist:`2023-38559` and :cve_nist:`2023-43115`
- glibc: Fix :cve_nist:`2023-4527` and :cve_nist:`2023-4806`
- go: Fix :cve_nist:`2023-29409` and :cve_nist:`2023-39533`
- grub: Fix :cve_nist:`2023-4692` and :cve_nist:`2023-4693`
- gstreamer: Fix :cve_mitre:`2023-40474`, :cve_mitre:`2023-40475` and :cve_mitre:`2023-40476`
- inetutils: fix :cve_nist:`2023-40303`
- librsvg: Fix :cve_nist:`2023-38633`
- libssh2: Fix :cve_nist:`2020-22218`
- libwebp: Fix :cve_nist:`2023-4863` and :cve_nist:`2023-5129`
- libx11: Fix :cve_nist:`2023-43785`, :cve_nist:`2023-43786` and :cve_nist:`2023-43787`
- libxpm: Fix :cve_nist:`2023-43788` and :cve_nist:`2023-43789`
- linux-yocto/6.1: Ignore :cve_nist:`2003-1604`, :cve_nist:`2004-0230`, :cve_nist:`2006-3635`, :cve_nist:`2006-5331`, :cve_nist:`2006-6128`, :cve_nist:`2007-4774`, :cve_nist:`2007-6761`, :cve_nist:`2007-6762`, :cve_nist:`2008-7316`, :cve_nist:`2009-2692`, :cve_nist:`2010-0008`, :cve_nist:`2010-3432`, :cve_nist:`2010-4648`, :cve_nist:`2010-5313`, :cve_nist:`2010-5328`, :cve_nist:`2010-5329`, :cve_nist:`2010-5331`, :cve_nist:`2010-5332`, :cve_nist:`2011-4098`, :cve_nist:`2011-4131`, :cve_nist:`2011-4915`, :cve_nist:`2011-5321`, :cve_nist:`2011-5327`, :cve_nist:`2012-0957`, :cve_nist:`2012-2119`, :cve_nist:`2012-2136`, :cve_nist:`2012-2137`, :cve_nist:`2012-2313`, :cve_nist:`2012-2319`, :cve_nist:`2012-2372`, :cve_nist:`2012-2375`, :cve_nist:`2012-2390`, :cve_nist:`2012-2669`, :cve_nist:`2012-2744`, :cve_nist:`2012-2745`, :cve_nist:`2012-3364`, :cve_nist:`2012-3375`, :cve_nist:`2012-3400`, :cve_nist:`2012-3412`, :cve_nist:`2012-3430`, :cve_nist:`2012-3510`, :cve_nist:`2012-3511`, :cve_nist:`2012-3520`, :cve_nist:`2012-3552`, :cve_nist:`2012-4398`, :cve_nist:`2012-4444`, :cve_nist:`2012-4461`, :cve_nist:`2012-4467`, :cve_nist:`2012-4508`, :cve_nist:`2012-4530`, :cve_nist:`2012-4565`, :cve_nist:`2012-5374`, :cve_nist:`2012-5375`, :cve_nist:`2012-5517`, :cve_nist:`2012-6536`, :cve_nist:`2012-6537`, :cve_nist:`2012-6538`, :cve_nist:`2012-6539`, :cve_nist:`2012-6540`, :cve_nist:`2012-6541`, :cve_nist:`2012-6542`, :cve_nist:`2012-6543`, :cve_nist:`2012-6544`, :cve_nist:`2012-6545`, :cve_nist:`2012-6546`, :cve_nist:`2012-6547`, :cve_nist:`2012-6548`, :cve_nist:`2012-6549`, :cve_nist:`2012-6638`, :cve_nist:`2012-6647`, :cve_nist:`2012-6657`, :cve_nist:`2012-6689`, :cve_nist:`2012-6701`, :cve_nist:`2012-6703`, :cve_nist:`2012-6704`, :cve_nist:`2012-6712`, :cve_nist:`2013-0160`, :cve_nist:`2013-0190`, :cve_nist:`2013-0216`, :cve_nist:`2013-0217`, :cve_nist:`2013-0228`, :cve_nist:`2013-0231`, :cve_nist:`2013-0268`, :cve_nist:`2013-0290`, :cve_nist:`2013-0309`, :cve_nist:`2013-0310`, :cve_nist:`2013-0311`, :cve_nist:`2013-0313`, :cve_nist:`2013-0343`, :cve_nist:`2013-0349`, :cve_nist:`2013-0871`, :cve_nist:`2013-0913`, :cve_nist:`2013-0914`, :cve_nist:`2013-1059`, :cve_nist:`2013-1763`, :cve_nist:`2013-1767`, :cve_nist:`2013-1772`, :cve_nist:`2013-1773`, :cve_nist:`2013-1774`, :cve_nist:`2013-1792`, :cve_nist:`2013-1796`, :cve_nist:`2013-1797`, :cve_nist:`2013-1798`, :cve_nist:`2013-1819`, :cve_nist:`2013-1826`, :cve_nist:`2013-1827`, :cve_nist:`2013-1828`, :cve_nist:`2013-1848`, :cve_nist:`2013-1858`, :cve_nist:`2013-1860`, :cve_nist:`2013-1928`, :cve_nist:`2013-1929`, :cve_nist:`2013-1943`, :cve_nist:`2013-1956`, :cve_nist:`2013-1957`, :cve_nist:`2013-1958`, :cve_nist:`2013-1959`, :cve_nist:`2013-1979`, :cve_nist:`2013-2015`, :cve_nist:`2013-2017`, :cve_nist:`2013-2058`, :cve_nist:`2013-2094`, :cve_nist:`2013-2128`, :cve_nist:`2013-2140`, :cve_nist:`2013-2141`, :cve_nist:`2013-2146`, :cve_nist:`2013-2147`, :cve_nist:`2013-2148`, :cve_nist:`2013-2164`, :cve_nist:`2013-2206`, :cve_nist:`2013-2232`, :cve_nist:`2013-2234`, :cve_nist:`2013-2237`, :cve_nist:`2013-2546`, :cve_nist:`2013-2547`, :cve_nist:`2013-2548`, :cve_nist:`2013-2596`, :cve_nist:`2013-2634`, :cve_nist:`2013-2635`, :cve_nist:`2013-2636`, :cve_nist:`2013-2850`, :cve_nist:`2013-2851`, :cve_nist:`2013-2852`, :cve_nist:`2013-2888`, :cve_nist:`2013-2889`, :cve_nist:`2013-2890`, :cve_nist:`2013-2891`, :cve_nist:`2013-2892`, :cve_nist:`2013-2893`, :cve_nist:`2013-2894`, :cve_nist:`2013-2895`, :cve_nist:`2013-2896`, :cve_nist:`2013-2897`, :cve_nist:`2013-2898`, :cve_nist:`2013-2899`, :cve_nist:`2013-2929`, :cve_nist:`2013-2930`, :cve_nist:`2013-3076`, :cve_nist:`2013-3222`, :cve_nist:`2013-3223`, :cve_nist:`2013-3224`, :cve_nist:`2013-3225`, :cve_nist:`2013-3226`, :cve_nist:`2013-3227`, :cve_nist:`2013-3228`, :cve_nist:`2013-3229`, :cve_nist:`2013-3230`, :cve_nist:`2013-3231`, :cve_nist:`2013-3232`, :cve_nist:`2013-3233`, :cve_nist:`2013-3234`, :cve_nist:`2013-3235`, :cve_nist:`2013-3236`, :cve_nist:`2013-3237`, :cve_nist:`2013-3301`, :cve_nist:`2013-3302`, :cve_nist:`2013-4125
- linux-yocto/6.1 (Continued): Ignore :cve_nist:`2019-0136`, :cve_nist:`2019-0145`, :cve_nist:`2019-0146`, :cve_nist:`2019-0147`, :cve_nist:`2019-0148`, :cve_nist:`2019-0149`, :cve_nist:`2019-0154`, :cve_nist:`2019-0155`, :cve_nist:`2019-10124`, :cve_nist:`2019-10125`, :cve_nist:`2019-10126`, :cve_nist:`2019-10142`, :cve_nist:`2019-10207`, :cve_nist:`2019-10220`, :cve_nist:`2019-10638`, :cve_nist:`2019-10639`, :cve_nist:`2019-11085`, :cve_nist:`2019-11091`, :cve_nist:`2019-11135`, :cve_nist:`2019-11190`, :cve_nist:`2019-11191`, :cve_nist:`2019-1125`, :cve_nist:`2019-11477`, :cve_nist:`2019-11478`, :cve_nist:`2019-11479`, :cve_nist:`2019-11486`, :cve_nist:`2019-11487`, :cve_nist:`2019-11599`, :cve_nist:`2019-11683`, :cve_nist:`2019-11810`, :cve_nist:`2019-11811`, :cve_nist:`2019-11815`, :cve_nist:`2019-11833`, :cve_nist:`2019-11884`, :cve_nist:`2019-12378`, :cve_nist:`2019-12379`, :cve_nist:`2019-12380`, :cve_nist:`2019-12381`, :cve_nist:`2019-12382`, :cve_nist:`2019-12454`, :cve_nist:`2019-12455`, :cve_nist:`2019-12614`, :cve_nist:`2019-12615`, :cve_nist:`2019-12817`, :cve_nist:`2019-12818`, :cve_nist:`2019-12819`, :cve_nist:`2019-12881`, :cve_nist:`2019-12984`, :cve_nist:`2019-13233`, :cve_nist:`2019-13272`, :cve_nist:`2019-13631`, :cve_nist:`2019-13648`, :cve_nist:`2019-14283`, :cve_nist:`2019-14284`, :cve_nist:`2019-14615`, :cve_nist:`2019-14763`, :cve_nist:`2019-14814`, :cve_nist:`2019-14815`, :cve_nist:`2019-14816`, :cve_nist:`2019-14821`, :cve_nist:`2019-14835`, :cve_nist:`2019-14895`, :cve_nist:`2019-14896`, :cve_nist:`2019-14897`, :cve_nist:`2019-14901`, :cve_nist:`2019-15030`, :cve_nist:`2019-15031`, :cve_nist:`2019-15090`, :cve_nist:`2019-15098`, :cve_nist:`2019-15099`, :cve_nist:`2019-15117`, :cve_nist:`2019-15118`, :cve_nist:`2019-15211`, :cve_nist:`2019-15212`, :cve_nist:`2019-15213`, :cve_nist:`2019-15214`, :cve_nist:`2019-15215`, :cve_nist:`2019-15216`, :cve_nist:`2019-15217`, :cve_nist:`2019-15218`, :cve_nist:`2019-15219`, :cve_nist:`2019-15220`, :cve_nist:`2019-15221`, :cve_nist:`2019-15222`, :cve_nist:`2019-15223`, :cve_nist:`2019-15291`, :cve_nist:`2019-15292`, :cve_nist:`2019-15504`, :cve_nist:`2019-15505`, :cve_nist:`2019-15538`, :cve_nist:`2019-15666`, :cve_nist:`2019-15794`, :cve_nist:`2019-15807`, :cve_nist:`2019-15916`, :cve_nist:`2019-15917`, :cve_nist:`2019-15918`, :cve_nist:`2019-15919`, :cve_nist:`2019-15920`, :cve_nist:`2019-15921`, :cve_nist:`2019-15922`, :cve_nist:`2019-15923`, :cve_nist:`2019-15924`, :cve_nist:`2019-15925`, :cve_nist:`2019-15926`, :cve_nist:`2019-15927`, :cve_nist:`2019-16229`, :cve_nist:`2019-16230`, :cve_nist:`2019-16231`, :cve_nist:`2019-16232`, :cve_nist:`2019-16233`, :cve_nist:`2019-16234`, :cve_nist:`2019-16413`, :cve_nist:`2019-16714`, :cve_nist:`2019-16746`, :cve_nist:`2019-16921`, :cve_nist:`2019-16994`, :cve_nist:`2019-16995`, :cve_nist:`2019-17052`, :cve_nist:`2019-17053`, :cve_nist:`2019-17054`, :cve_nist:`2019-17055`, :cve_nist:`2019-17056`, :cve_nist:`2019-17075`, :cve_nist:`2019-17133`, :cve_nist:`2019-17351`, :cve_nist:`2019-17666`, :cve_nist:`2019-18198`, :cve_nist:`2019-18282`, :cve_nist:`2019-18660`, :cve_nist:`2019-18675`, :cve_nist:`2019-18683`, :cve_nist:`2019-18786`, :cve_nist:`2019-18805`, :cve_nist:`2019-18806`, :cve_nist:`2019-18807`, :cve_nist:`2019-18808`, :cve_nist:`2019-18809`, :cve_nist:`2019-18810`, :cve_nist:`2019-18811`, :cve_nist:`2019-18812`, :cve_nist:`2019-18813`, :cve_nist:`2019-18814`, :cve_nist:`2019-18885`, :cve_nist:`2019-19036`, :cve_nist:`2019-19037`, :cve_nist:`2019-19039`, :cve_nist:`2019-19043`, :cve_nist:`2019-19044`, :cve_nist:`2019-19045`, :cve_nist:`2019-19046`, :cve_nist:`2019-19047`, :cve_nist:`2019-19048`, :cve_nist:`2019-19049`, :cve_nist:`2019-19050`, :cve_nist:`2019-19051`, :cve_nist:`2019-19052`, :cve_nist:`2019-19053`, :cve_nist:`2019-19054`, :cve_nist:`2019-19055`, :cve_nist:`2019-19056`, :cve_nist:`2019-19057`, :cve_nist:`2019-19058`, :cve_nist:`2019-19059`, :cve_nist:`2019-19060`, :cve_nist:`2019-19061`, :cve_nist:`2019-19062`, :cve_nist:`2019-19063`, :cve_nist:`2019-19064`, :cve_nist:`2019-19065`, :cve_nist
- nghttp2: Fix :cve_nist:`2023-35945`
- openssl: Fix :cve_nist:`2023-2975`, :cve_nist:`2023-3446`, :cve_nist:`2023-3817`, :cve_nist:`2023-4807` and :cve_nist:`2023-5363`
- pixman: Ignore :cve_nist:`2023-37769`
- procps: Fix :cve_nist:`2023-4016`
- python3-git: Fix :cve_nist:`2023-40267`, :cve_nist:`2023-40590` and :cve_nist:`2023-41040`
- python3-pygments: Fix :cve_nist:`2022-40896`
- python3-urllib3: Fix :cve_nist:`2023-43804` and :cve_nist:`2023-45803`
- python3: Fix :cve_nist:`2023-24329` and :cve_nist:`2023-40217`
- qemu: Fix :cve_nist:`2023-3180`, :cve_nist:`2023-3354` and :cve_nist:`2023-42467`
- qemu: Ignore :cve_nist:`2023-2680`
- screen: Fix :cve_nist:`2023-24626`
- shadow: Fix :cve_mitre:`2023-4641`
- tiff: Fix :cve_nist:`2023-40745` and :cve_nist:`2023-41175`
- vim: Fix :cve_nist:`2023-3896`, :cve_nist:`2023-4733`, :cve_nist:`2023-4734`, :cve_nist:`2023-4735`, :cve_nist:`2023-4736`, :cve_nist:`2023-4738`, :cve_nist:`2023-4750`, :cve_nist:`2023-4752`, :cve_nist:`2023-4781`, :cve_nist:`2023-5441` and :cve_nist:`2023-5535`
- webkitgtk: Fix :cve_nist:`2023-32435` and :cve_nist:`2023-32439`
- xserver-xorg: Fix :cve_nist:`2023-5367` and :cve_nist:`2023-5380`
Fixes in Yocto-4.2.4
~~~~~~~~~~~~~~~~~~~~
- README: Update to point to new contributor guide
- README: fix mail address in git example command
- SECURITY.md: Add file
- avahi: handle invalid service types gracefully
- bind: upgrade to 9.18.19
- bitbake.conf: add bunzip2 in :term:`HOSTTOOLS`
- bitbake: Fix disk space monitoring on cephfs
- bitbake: SECURITY.md: add file
- brief-yoctoprojectqs: use new CDN mirror for sstate
- bsp-guide: bsp.rst: replace reference to wiki
- bsp-guide: bsp: skip Intel machines no longer supported in Poky
- build-appliance-image: Update to mickledore head revision
- build-sysroots: Add :term:`SUMMARY` field
- build-sysroots: Ensure dependency chains are minimal
- build-sysroots: target or native sysroot population need to be selected explicitly
- buildtools-tarball: Add libacl
- busybox: Set PATH in syslog initscript
- busybox: remove coreutils dependency in busybox-ptest
- cmake.bbclass: fix allarch override syntax
- cml1: Fix KCONFIG_CONFIG_COMMAND not conveyed fully in do_menuconfig
- contributor-guide/style-guide: Add a note about task idempotence
- contributor-guide/style-guide: Refer to recipes, not packages
- contributor-guide: deprecate "Accepted" patch status
- contributor-guide: discourage marking patches as Inappropriate
- contributor-guide: recipe-style-guide: add Upstream-Status
- contributor-guide: recipe-style-guide: add more patch tagging examples
- contributor-guide: recipe-style-guide: add section about CVE patches
- contributor-guide: style-guide: discourage using Pending patch status
- core-image-ptest: Define a fallback for :term:`SUMMARY` field
- cve-check: add CVSS vector string to CVE database and reports
- cve-check: don't warn if a patch is remote
- cve-check: slightly more verbose warning when adding the same package twice
- cve-check: sort the package list in the JSON report
- cve-exclusion_6.1.inc: update for 6.1.57
- dbus: add additional entries to :term:`CVE_PRODUCT`
- dbus: upgrade to 1.14.10
- dev-manual: add security team processes
- dev-manual: disk-space: improve wording for obsolete sstate cache files
- dev-manual: disk-space: mention faster "find" command to trim sstate cache
- dev-manual: fix testimage usage instructions
- dev-manual: layers: Add notes about layer.conf
- dev-manual: licenses: mention :term:`SPDX` for license compliance
- dev-manual: new-recipe.rst fix inconsistency with contributor guide
- dev-manual: new-recipe.rst: add missing parenthesis to "Patching Code" section
- dev-manual: new-recipe.rst: replace reference to wiki
- dev-manual: remove unsupported :term: markup inside markup
- dev-manual: start.rst: remove obsolete reference
- ell: upgrade to 0.58
- externalsrc: fix dependency chain issues
- ffmpeg: upgrade to 5.1.3
- ffmpeg: avoid neon on unsupported machines
- file: fix call to localtime_r()
- file: upgrade to 5.45
- fontcache.bbclass: avoid native recipes depending on target fontconfig
- gcc-crosssdk: ignore MULTILIB_VARIANTS in signature computation
- gcc-runtime: remove bashism
- gcc: backport a fix for ICE caused by CVE-2023-4039.patch
- gcc: depend on zstd
- gdb: fix :term:`RDEPENDS` for PACKAGECONFIG[tui]
- glib-2.0: libelf has a configure option now, specify it
- glibc: stable 2.37 branch updates
- gnupg: Fix reproducibility failure
- gnupg: upgrade to 2.4.3
- go: upgrade to 1.20.7
- graphene: fix runtime detection of IEEE754 behaviour
- gstreamer: upgrade to 1.22.6
- gtk4: upgrade to 4.10.5
- gzip: upgrade to 1.13
- igt-gpu-tools: do not write shortened git commit hash into binaries
- inetutils: don't guess target paths
- inetutils: remove obsolete cruft from do_configure
- insane.bbclass: Count raw bytes in shebang-size
- kernel.bbclass: Add force flag to rm calls
- lib/package_manager: Improve repo artefact filtering
- libc-test: Run as non-root user
- libconvert-asn1-perl: upgrade to 0.34
- libevent: fix patch Upstream-Status
- libgudev: explicitly disable tests and vapi
- librepo: upgrade to 1.15.2
- librsvg: upgrade to 2.54.6
- libsndfile1: upgrade to 1.2.2
- libsoup-2.4: Only specify --cross-file when building for target
- libsoup-2.4: update :term:`PACKAGECONFIG`
- libx11: upgrade to 1.8.7
- libxkbcommon: add :term:`CVE_PRODUCT`
- libxpm: upgrade to 3.5.17
- linux-firmware: add firmware files for NXP BT chipsets
- linux-firmware: package Dragonboard 845c sensors DSP firmware
- linux-firmware: package audio topology for Lenovo X13s
- linux-firmware: upgrade to 20230804
- linux-yocto/5.15: update to v5.15.133
- linux-yocto/6.1: fix CONFIG_F2FS_IO_TRACE configuration warning
- linux-yocto/6.1: fix IRQ-80 warnings
- linux-yocto/6.1: fix uninitialized read in nohz_full/isolcpus setup
- linux-yocto/6.1: tiny: fix arm 32 boot
- linux-yocto/6.1: update to v6.1.57
- linux-yocto: add script to generate kernel :term:`CVE_CHECK_IGNORE` entries
- linux-yocto: make sure the pahole-native available before do_kernel_configme
- linux/cve-exclusion: add generated CVE_CHECK_IGNOREs
- linux/generate-cve-exclusions: fix mishandling of boundary values
- linux/generate-cve-exclusions: print the generated time in UTC
- manuals: add new contributor guide
- manuals: correct "yocto-linux" by "linux-yocto"
- mdadm: Disable further tests due to intermittent failures
- mdadm: skip running 04update-uuid and 07revert-inplace testcases
- migration-guides: add release notes for 4.0.12
- migration-guides: add release notes for 4.0.13
- migration-guides: add release notes for 4.2.3
- mpfr: upgrade to 4.2.1
- multilib.conf: explicitly make MULTILIB_VARIANTS vardeps on MULTILIBS
- nativesdk-intercept: Fix bad intercept chgrp/chown logic
- nettle: avoid neon on unsupported machines
- oe-depends-dot: improve '-w' behavior
- oeqa dnf_runtime.py: fix HTTP server IP address and port
- oeqa selftest context.py: remove warning from missing meta-selftest
- oeqa selftest context.py: whitespace fix
- oeqa/concurrencytest: Remove invalid buffering option
- oeqa/selftest/context.py: check git command return values
- oeqa/selftest/wic: Improve assertTrue calls
- oeqa/selftest: Fix broken symlink removal handling
- oeqa/utils/gitarchive: Handle broken commit counts in results repo
- openssl: upgrade to 3.1.4
- openssl: build and install manpages only if they are enabled
- openssl: ensure all ptest fails are caught
- openssl: parallelize tests
- overview: Add note about non-reproducibility side effects
- packages.bbclass: Correct the check for conflicts with renamed packages
- pango: explictly enable/disable libthai
- patch.py: use --absolute-git-dir instead of --show-toplevel to retrieve gitdir
- pixman: Remove duplication of license MIT
- pixman: avoid neon on unsupported machines
- poky.conf: bump version for 4.2.4 release
- profile-manual: aesthetic cleanups
- pseudo: Fix to work with glibc 2.38
- ptest: report tests that were killed on timeout
- python3-git: upgrade to 3.1.37
- python3-urllib3: update to v1.26.18
- python3: upgrade to 3.11.5
- qemu: fix "Bad FPU state detected" fault on qemu-system-i386
- ref-manual: Fix :term:`PACKAGECONFIG` term and add an example
- ref-manual: Warn about :term:`COMPATIBLE_MACHINE` skipping native recipes
- ref-manual: point outdated link to the new location
- ref-manual: releases.svg: Scarthgap is now version 5.0
- ref-manual: system-requirements: update supported distros
- ref-manual: variables: add :term:`RECIPE_SYSROOT` and :term:`RECIPE_SYSROOT_NATIVE`
- ref-manual: variables: add :term:`TOOLCHAIN_OPTIONS` variable
- ref-manual: variables: add example for :term:`SYSROOT_DIRS` variable
- ref-manual: variables: provide no-match example for :term:`COMPATIBLE_MACHINE`
- resulttool/report: Avoid divide by zero
- runqemu: check permissions of available render nodes as well as their presence
- screen: upgrade to 4.9.1
- scripts/create-pull-request: update URLs to git repositories
- sdk-manual: appendix-obtain: improve and update descriptions
- sdk-manual: extensible.rst: fix multiple formatting issues
- shadow: fix patch Upstream-Status
- strace: parallelize ptest
- sudo: upgrade to 1.9.15p2
- systemd-bootchart: musl fixes have been rejected upstream
- systemd: backport patch to fix warning in systemd-vconsole-setup
- tar: upgrade to 1.35
- tcl: Add a way to skip ptests
- tcl: prevent installing another copy of tzdata
- template: fix typo in section header
- test-manual: reproducible-builds: stop mentioning LTO bug
- uboot-extlinux-config.bbclass: fix missed override syntax migration
- vim: upgrade to 9.0.2048
- vim: update obsolete comment
- wayland-utils: add libdrm :term:`PACKAGECONFIG`
- weston-init: fix init code indentation
- weston-init: remove misleading comment about udev rule
- wic: bootimg-partition: Fix file name in debug message
- wic: fix wrong attempt to create file system in upartitioned regions
- wireless-regdb: upgrade to 2023.09.01
- xz: upgrade to 5.4.4
- yocto-uninative: Update to 4.2 for glibc 2.38
- yocto-uninative: Update to 4.3
Known Issues in Yocto-4.2.4
~~~~~~~~~~~~~~~~~~~~~~~~~~~
- N/A
Contributors to Yocto-4.2.4
~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Alberto Planas
- Alexander Kanavin
- Alexis Lothoré
- Antoine Lubineau
- Anuj Mittal
- Archana Polampalli
- Arne Schwerdt
- BELHADJ SALEM Talel
- Benjamin Bara
- Bruce Ashfield
- Chen Qi
- Colin McAllister
- Daniel Semkowicz
- Dmitry Baryshkov
- Eilís 'pidge' Ní Fhlannagáin
- Emil Kronborg Andersen
- Etienne Cordonnier
- Jaeyoon Jung
- Jan Garcia
- Joe Slater
- Joshua Watt
- Julien Stephan
- Kai Kang
- Khem Raj
- Lee Chee Yang
- Markus Niebel
- Markus Volk
- Marta Rybczynska
- Martijn de Gouw
- Martin Jansa
- Michael Halstead
- Michael Opdenacker
- Mikko Rapeli
- Mingli Yu
- Narpat Mali
- Otavio Salvador
- Ovidiu Panait
- Peter Kjellerstedt
- Peter Marko
- Peter Suti
- Poonam Jadhav
- Quentin Schulz
- Richard Purdie
- Robert P. J. Day
- Roland Hieber
- Ross Burton
- Ryan Eatmon
- Sakib Sajal
- Samantha Jalabert
- Sanjana
- Sanjay Chitroda
- Sean Nyekjaer
- Siddharth Doshi
- Soumya Sambu
- Stefan Tauner
- Steve Sakoman
- Tan Wen Yan
- Tom Hochstein
- Trevor Gamblin
- Vijay Anusuri
- Wang Mingyu
- Xiangyu Chen
- Yash Shinde
- Yoann Congal
- Yogita Urade
- Yuta Hayama
Repositories / Downloads for Yocto-4.2.4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
poky
- Repository Location: :yocto_git:`/poky`
- Branch: :yocto_git:`mickledore </poky/log/?h=mickledore>`
- Tag: :yocto_git:`yocto-4.2.4 </poky/log/?h=yocto-4.2.4>`
- Git Revision: :yocto_git:`7235399a86b134e57d5eb783d7f1f57ca0439ae5 </poky/commit/?id=7235399a86b134e57d5eb783d7f1f57ca0439ae5>`
- Release Artefact: poky-7235399a86b134e57d5eb783d7f1f57ca0439ae5
- sha: 3d56bb4232ab29ae18249529856f0e638c50c764fc495d6beb1ecd295fa5e5e3
- Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-4.2.4/poky-7235399a86b134e57d5eb783d7f1f57ca0439ae5.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-4.2.4/poky-7235399a86b134e57d5eb783d7f1f57ca0439ae5.tar.bz2
openembedded-core
- Repository Location: :oe_git:`/openembedded-core`
- Branch: :oe_git:`mickledore </openembedded-core/log/?h=mickledore>`
- Tag: :oe_git:`yocto-4.2.4 </openembedded-core/log/?h=yocto-4.2.4>`
- Git Revision: :oe_git:`23b5141400b2c676c806df3308f023f7c04e34e0 </openembedded-core/commit/?id=23b5141400b2c676c806df3308f023f7c04e34e0>`
- Release Artefact: oecore-23b5141400b2c676c806df3308f023f7c04e34e0
- sha: 152f4ee3cdd2e159f6bd34b01d517de44dfe670d35a5e3c84cc32ee7842d9741
- Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-4.2.4/oecore-23b5141400b2c676c806df3308f023f7c04e34e0.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-4.2.4/oecore-23b5141400b2c676c806df3308f023f7c04e34e0.tar.bz2
meta-mingw
- Repository Location: :yocto_git:`/meta-mingw`
- Branch: :yocto_git:`mickledore </meta-mingw/log/?h=mickledore>`
- Tag: :yocto_git:`yocto-4.2.4 </meta-mingw/log/?h=yocto-4.2.4>`
- Git Revision: :yocto_git:`d87d4f00b9c6068fff03929a4b0f231a942d3873 </meta-mingw/commit/?id=d87d4f00b9c6068fff03929a4b0f231a942d3873>`
- Release Artefact: meta-mingw-d87d4f00b9c6068fff03929a4b0f231a942d3873
- sha: 8036847cf5bf3da9db4bad13aac9080d559848679f0ae03694d55a576bcaf75f
- Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-4.2.4/meta-mingw-d87d4f00b9c6068fff03929a4b0f231a942d3873.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-4.2.4/meta-mingw-d87d4f00b9c6068fff03929a4b0f231a942d3873.tar.bz2
bitbake
- Repository Location: :oe_git:`/bitbake`
- Branch: :oe_git:`2.4 </bitbake/log/?h=2.4>`
- Tag: :oe_git:`yocto-4.2.4 </bitbake/log/?h=yocto-4.2.4>`
- Git Revision: :oe_git:`c7e094ec3beccef0bbbf67c100147c449d9c6836 </bitbake/commit/?id=c7e094ec3beccef0bbbf67c100147c449d9c6836>`
- Release Artefact: bitbake-c7e094ec3beccef0bbbf67c100147c449d9c6836
- sha: 6a35a62bee3446cd0f9e0ec1de9b8f60fc396109075b37d7c4a1f2e6d63271c6
- Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-4.2.4/bitbake-c7e094ec3beccef0bbbf67c100147c449d9c6836.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-4.2.4/bitbake-c7e094ec3beccef0bbbf67c100147c449d9c6836.tar.bz2
yocto-docs
- Repository Location: :yocto_git:`/yocto-docs`
- Branch: :yocto_git:`mickledore </yocto-docs/log/?h=mickledore>`
- Tag: :yocto_git:`yocto-4.2.4 </yocto-docs/log/?h=yocto-4.2.4>`
- Git Revision: :yocto_git:`91a29ca94314c87fd3dc68601cd4932bdfffde35 </yocto-docs/commit/?id=91a29ca94314c87fd3dc68601cd4932bdfffde35>`