($INBOX_DIR/description missing)
 help / color / mirror / Atom feed
From: "Lee, Chee Yang" <chee.yang.lee@intel.com>
To: "yocto-announce@lists.yoctoproject.org"
	<yocto-announce@lists.yoctoproject.org>,
	"yocto@lists.yoctoproject.org" <yocto@lists.yoctoproject.org>
Subject: [ANNOUNCEMENT] Yocto Project 3.1.33 (dunfell-23.0.33) is Released
Date: Sat, 4 May 2024 03:31:05 +0000	[thread overview]
Message-ID: <CH3PR11MB8093635A85BCE9B2A0196A6FB91E2@CH3PR11MB8093.namprd11.prod.outlook.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 12891 bytes --]

Hi

We are pleased to announce the Yocto Project 3.1.33 (dunfell-23.0.33) Release is now available for download.

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/poky-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/poky-dunfell-23.0.33.tar.bz2

A gpg signed version of these release notes is available at:

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/RELEASENOTES

Full Test Report:

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/testreport.txt

Please note that this is the last planned release for the 3.1.X dunfell series as our 4 year LTS period has come to an end.



Thanks to everyone who contributed!

Chee Yang
chee.yang.lee@intel.com<mailto:chee.yang.lee@intel.com>
Yocto Project Build and Release


- --------------------------
yocto-3.1.33 Release Notes
- --------------------------


- --------------------------
Repositories/Downloads
- --------------------------

Repository Name: poky
Repository Location: https://git.yoctoproject.org/git/poky
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: 63d05fc061006bf1a88630d6d91cdc76ea33fbf2
Release Artefact: poky-dunfell-23.0.33
sha: 6188ab6242f67bb13cd752bf83b9e290d19bcda1618d11b6e322870b3fe9cd61
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/poky-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/poky-dunfell-23.0.33.tar.bz2

Repository Name: openembedded-core
Repository Location: https://git.openembedded.org/openembedded-core
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: c4fb7d1f0f157ffafd9f907f49ea74b93b2c1d40
Release Artefact: oecore-dunfell-23.0.33
sha: 6999d67afc4cf1ea38b553d637cf601f1f2b222041a00d206283ce6edd989186
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/oecore-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/oecore-dunfell-23.0.33.tar.bz2

Repository Name: meta-mingw
Repository Location: https://git.yoctoproject.org/git/meta-mingw
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: 7bdc58e6c5d1054b1b6ad5c4e480a95e995ccbae
Release Artefact: meta-mingw-dunfell-23.0.33
sha: 9dcf2a7f41c7a7a99fde84f36bae31d40faa5e8b4332a9054250c51ba61e2f16
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/meta-mingw-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/meta-mingw-dunfell-23.0.33.tar.bz2

Repository Name: meta-gplv2
Repository Location: https://git.yoctoproject.org/git/meta-gplv2
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: 60b251c25ba87e946a0ca4cdc8d17b1cb09292ac
Release Artefact: meta-gplv2-dunfell-23.0.33
sha: dd13e9fa101e9881bb6a88593fa7f3c08a3914ba7323a02dc129bd5b51df225c
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/meta-gplv2-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/meta-gplv2-dunfell-23.0.33.tar.bz2

Repository Name: bitbake
Repository Location: https://git.openembedded.org/bitbake
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: 7ce4107bf824b3e115b40558336de25f99af31f8
Release Artefact: bitbake-dunfell-23.0.33
sha: 612458f4bf07a29aa25a68799e8da72ebecbe975a11a6f71900cf170e0aaff2b
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.33/bitbake-dunfell-23.0.33.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.33/bitbake-dunfell-23.0.33.tar.bz2

Repository Name: yocto-docs
Repository Location: https://git.yoctoproject.org/git/yocto-docs
Branch: dunfell
Tag: yocto-3.1.33
Git Revision: 9d29887d17ddae6b4f33f8d0c45e49dd101524d9


- ---------------
Known Issues
- ---------------
N/A


- ---------------
Security Fixes
- ---------------
curl: Fix CVE-2024-2398
go: Fix CVE-2023-45289 CVE-2023-45290 CVE-2024-24784 CVE-2024-24785
linux-yocto/5.4: Fix CVE-2023-6270 CVE-2023-7042 CVE-2023-52435 CVE-2023-52486 CVE-2023-52504 CVE-2023-52583 CVE-2023-52587 CVE-2023-52594 CVE-2023-52595 CVE-2023-52597 CVE-2023-52598 CVE-2023-52599 CVE-2023-52600 CVE-2023-52601 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 CVE-2023-52606 CVE-2023-52607 CVE-2023-52615 CVE-2023-52617 CVE-2023-52619 CVE-2023-52622 CVE-2023-52623 CVE-2023-52637 CVE-2024-0340 CVE-2024-0607 CVE-2024-0841 CVE-2024-1086 CVE-2024-22099 CVE-2024-23849 CVE-2024-26593 CVE-2024-26598 CVE-2024-26600 CVE-2024-26602 CVE-2024-26606 CVE-2024-26615 CVE-2024-26625 CVE-2024-26635 CVE-2024-26636 CVE-2024-26645 CVE-2024-26651 CVE-2024-26663 CVE-2024-26664 CVE-2024-26671 CVE-2024-26673 CVE-2024-26675 CVE-2024-26679 CVE-2024-26684 CVE-2024-26685 CVE-2024-26688 CVE-2024-26696 CVE-2024-26697 CVE-2024-26702 CVE-2024-26704 CVE-2024-26720 CVE-2024-26735 CVE-2024-26736 CVE-2024-26748 CVE-2024-26749 CVE-2024-26751 CVE-2024-26752 CVE-2024-26754 CVE-2024-26763 CVE-2024-26764 CVE-2024-26766 CVE-2024-26772 CVE-2024-26773 CVE-2024-26777 CVE-2024-26778 CVE-2024-26779 CVE-2024-26788 CVE-2024-26790 CVE-2024-26791 CVE-2024-26793 CVE-2024-26801 CVE-2024-26804 CVE-2024-26805
linux-yocto/5.4: Ignore CVE-2019-25160 CVE-2019-25162 CVE-2020-36775 CVE-2020-36776 CVE-2020-36777 CVE-2020-36778 CVE-2020-36779 CVE-2020-36780 CVE-2020-36782 CVE-2020-36783 CVE-2020-36785 CVE-2020-36786 CVE-2020-36787 CVE-2021-46904 CVE-2021-46905 CVE-2021-46906 CVE-2021-46909 CVE-2021-46910 CVE-2021-46911 CVE-2021-46912 CVE-2021-46913 CVE-2021-46914 CVE-2021-46915 CVE-2021-46916 CVE-2021-46917 CVE-2021-46918 CVE-2021-46919 CVE-2021-46920 CVE-2021-46921 CVE-2021-46922 CVE-2021-46923 CVE-2021-46924 CVE-2021-46927 CVE-2021-46929 CVE-2021-46930 CVE-2021-46931 CVE-2021-46932 CVE-2021-46933 CVE-2021-46934 CVE-2021-46935 CVE-2021-46936 CVE-2021-46937 CVE-2021-46938 CVE-2021-46939 CVE-2021-46940 CVE-2021-46942 CVE-2021-46943 CVE-2021-46944 CVE-2021-46945 CVE-2021-46947 CVE-2021-46948 CVE-2021-46949 CVE-2021-46950 CVE-2021-46951 CVE-2021-46953 CVE-2021-46954 CVE-2021-46955 CVE-2021-46956 CVE-2021-46957 CVE-2021-46958 CVE-2021-46960 CVE-2021-46961 CVE-2021-46962 CVE-2021-46963 CVE-2021-46964 CVE-2021-46966 CVE-2021-46967 CVE-2021-46968 CVE-2021-46971 CVE-2021-46972 CVE-2021-46973 CVE-2021-46974 CVE-2021-46976 CVE-2021-46977 CVE-2021-46978 CVE-2021-46979 CVE-2021-46980 CVE-2021-46981 CVE-2021-46983 CVE-2021-46984 CVE-2021-46985 CVE-2021-46986 CVE-2021-46987 CVE-2021-46988 CVE-2021-46989 CVE-2021-46990 CVE-2021-46991 CVE-2021-46992 CVE-2021-46993 CVE-2021-46994 CVE-2021-46995 CVE-2021-46996 CVE-2021-46997 CVE-2021-46998 CVE-2021-46999 CVE-2021-47000 CVE-2021-47001 CVE-2021-47002 CVE-2021-47003 CVE-2021-47006 CVE-2021-47007 CVE-2021-47008 CVE-2021-47009 CVE-2021-47010 CVE-2021-47011 CVE-2021-47012 CVE-2021-47013 CVE-2021-47014 CVE-2021-47015 CVE-2021-47016 CVE-2021-47017 CVE-2021-47018 CVE-2021-47019 CVE-2021-47020 CVE-2021-47021 CVE-2021-47022 CVE-2021-47023 CVE-2021-47025 CVE-2021-47026 CVE-2021-47027 CVE-2021-47029 CVE-2021-47030 CVE-2021-47031 CVE-2021-47032 CVE-2021-47033 CVE-2021-47034 CVE-2021-47035 CVE-2021-47036 CVE-2021-47037 CVE-2021-47038 CVE-2021-47039 CVE-2021-47040 CVE-2021-47041 CVE-2021-47042 CVE-2021-47043 CVE-2021-47044 CVE-2021-47045 CVE-2021-47047 CVE-2021-47048 CVE-2021-47050 CVE-2021-47051 CVE-2021-47053 CVE-2021-47054 CVE-2021-47055 CVE-2021-47056 CVE-2021-47057 CVE-2021-47058 CVE-2021-47060 CVE-2021-47061 CVE-2021-47062 CVE-2021-47064 CVE-2021-47065 CVE-2021-47066 CVE-2021-47067 CVE-2021-47068 CVE-2021-47069 CVE-2021-47071 CVE-2021-47072 CVE-2021-47073 CVE-2021-47078 CVE-2021-47079 CVE-2021-47080 CVE-2021-47081 CVE-2021-47082 CVE-2021-47083 CVE-2021-47086 CVE-2021-47087 CVE-2021-47088 CVE-2021-47089 CVE-2021-47090 CVE-2021-47091 CVE-2021-47092 CVE-2021-47093 CVE-2021-47094 CVE-2021-47095 CVE-2021-47096 CVE-2021-47097 CVE-2021-47098 CVE-2021-47099 CVE-2021-47100 CVE-2021-47102 CVE-2021-47103 CVE-2021-47104 CVE-2021-47105 CVE-2021-47106 CVE-2021-47107 CVE-2021-47108 CVE-2021-47109 CVE-2021-47110 CVE-2021-47111 CVE-2021-47112 CVE-2021-47114 CVE-2021-47117 CVE-2021-47118 CVE-2021-47120 CVE-2021-47121 CVE-2021-47122 CVE-2021-47123 CVE-2021-47126 CVE-2021-47127 CVE-2021-47129 CVE-2021-47130 CVE-2021-47132 CVE-2021-47134 CVE-2021-47137 CVE-2021-47138 CVE-2021-47139 CVE-2021-47141 CVE-2021-47142 CVE-2021-47144 CVE-2021-47145 CVE-2021-47146 CVE-2021-47148 CVE-2021-47149 CVE-2021-47150 CVE-2021-47152 CVE-2021-47153 CVE-2021-47159 CVE-2021-47160 CVE-2021-47161 CVE-2021-47162 CVE-2021-47163 CVE-2021-47164 CVE-2021-47165 CVE-2021-47166 CVE-2021-47167 CVE-2021-47168 CVE-2021-47169 CVE-2021-47170 CVE-2021-47171 CVE-2021-47172 CVE-2021-47173 CVE-2021-47174 CVE-2021-47176 CVE-2021-47177 CVE-2021-47178 CVE-2021-47179 CVE-2021-47180
linux-yocto/5.4 (cont.): Ignore CVE-2022-48626 CVE-2022-48629 CVE-2022-48630 CVE-2023-6356 CVE-2023-6536 CVE-2023-52433 CVE-2023-52436 CVE-2023-52438 CVE-2023-52439 CVE-2023-52440 CVE-2023-52441 CVE-2023-52443 CVE-2023-52444 CVE-2023-52445 CVE-2023-52446 CVE-2023-52447 CVE-2023-52448 CVE-2023-52449 CVE-2023-52450 CVE-2023-52451 CVE-2023-52452 CVE-2023-52453 CVE-2023-52454 CVE-2023-52455 CVE-2023-52456 CVE-2023-52457 CVE-2023-52459 CVE-2023-52460 CVE-2023-52461 CVE-2023-52462 CVE-2023-52463 CVE-2023-52464 CVE-2023-52465 CVE-2023-52467 CVE-2023-52468 CVE-2023-52469 CVE-2023-52470 CVE-2023-52471 CVE-2023-52472 CVE-2023-52473 CVE-2023-52475 CVE-2023-52477 CVE-2023-52478 CVE-2023-52483 CVE-2023-52487 CVE-2023-52490 CVE-2023-52492 CVE-2023-52493 CVE-2023-52494 CVE-2023-52495 CVE-2023-52499 CVE-2023-52502 CVE-2023-52503 CVE-2023-52505 CVE-2023-52507 CVE-2023-52509 CVE-2023-52510 CVE-2023-52512 CVE-2023-52513 CVE-2023-52518 CVE-2023-52520 CVE-2023-52522 CVE-2023-52523 CVE-2023-52524 CVE-2023-52525 CVE-2023-52526 CVE-2023-52527 CVE-2023-52528 CVE-2023-52529 CVE-2023-52560 CVE-2023-52562 CVE-2023-52564 CVE-2023-52566 CVE-2023-52567 CVE-2023-52570 CVE-2023-52573 CVE-2023-52574 CVE-2023-52575 CVE-2023-52576 CVE-2023-52577 CVE-2023-52578 CVE-2023-52580 CVE-2023-52581 CVE-2023-52582 CVE-2023-52608 CVE-2023-52609 CVE-2023-52611 CVE-2023-52612 CVE-2023-52613 CVE-2023-52616 CVE-2023-52626 CVE-2023-52627 CVE-2023-52630 CVE-2023-52631 CVE-2023-52636 CVE-2024-23196 CVE-2024-23850 CVE-2024-26581 CVE-2024-26582 CVE-2024-26583 CVE-2024-26587 CVE-2024-26588 CVE-2024-26590 CVE-2024-26591 CVE-2024-26596 CVE-2024-26597 CVE-2024-26599 CVE-2024-26601 CVE-2024-26603 CVE-2024-26604 CVE-2024-26605 CVE-2024-26608 CVE-2024-26610 CVE-2024-26611 CVE-2024-26612 CVE-2024-26616 CVE-2024-26617 CVE-2024-26618 CVE-2024-26619 CVE-2024-26620 CVE-2024-26621 CVE-2024-26626 CVE-2024-26629 CVE-2024-26630 CVE-2024-26631 CVE-2024-26632 CVE-2024-26633 CVE-2024-26634 CVE-2024-26637 CVE-2024-26638 CVE-2024-26639 CVE-2024-26643 CVE-2024-26649 CVE-2024-26652 CVE-2024-26653 CVE-2024-26657 CVE-2024-26660 CVE-2024-26661 CVE-2024-26662 CVE-2024-26665 CVE-2024-26666 CVE-2024-26667 CVE-2024-26670 CVE-2024-26674 CVE-2024-26678 CVE-2024-26680 CVE-2024-26681 CVE-2024-26682 CVE-2024-26683 CVE-2024-26690 CVE-2024-26692 CVE-2024-26693 CVE-2024-26694 CVE-2024-26695 CVE-2024-26698 CVE-2024-26703 CVE-2024-26705 CVE-2024-26707 CVE-2024-26708 CVE-2024-26709 CVE-2024-26710 CVE-2024-26711 CVE-2024-26714 CVE-2024-26716 CVE-2024-26717 CVE-2024-26718 CVE-2024-26721 CVE-2024-26722 CVE-2024-26723 CVE-2024-26724 CVE-2024-26725 CVE-2024-26727 CVE-2024-26728 CVE-2024-26729 CVE-2024-26730 CVE-2024-26731 CVE-2024-26732 CVE-2024-26734 CVE-2024-26737 CVE-2024-26741 CVE-2024-26742 CVE-2024-26746 CVE-2024-26750 CVE-2024-26753 CVE-2024-26755 CVE-2024-26760 CVE-2024-26761 CVE-2024-26762 CVE-2024-26780 CVE-2024-26781 CVE-2024-26782 CVE-2024-26783 CVE-2024-26785 CVE-2024-26786 CVE-2024-26792 CVE-2024-26794 CVE-2024-26796 CVE-2024-26799 CVE-2024-26800 CVE-2024-26807
libtiff: Fix CVE-2023-6277 CVE-2023-52356
libxml2: Fix CVE-2024-25062
ncurses: Fix CVE-2023-50495
openssl: Fix CVE-2024-0727
shadow: fix CVE-2023-4641
tar: Fix CVE-2023-39804
xserver-xorg: Fix CVE-2024-31080 CVE-2024-31081

- ---------------
Fixes
- ---------------
build-appliance-image: Update to dunfell head revision
cve-update-nvd2-native: Add an age threshold for incremental update
cve-update-nvd2-native: Fix CVE configuration update
cve-update-nvd2-native: Fix typo in comment
cve-update-nvd2-native: Remove duplicated CVE_CHECK_DB_FILE definition
cve-update-nvd2-native: Remove rejected CVE from database
cve-update-nvd2-native: nvd_request_next: Improve comment
documentation: update for 3.1.33
licenses.conf: Add missing LGPLv2.0+ license
linux-firmware: Upgrade to 20240220
linux-yocto/5.4: Update to v5.4.273
linux-yocto/5.4: configuration warning fixes
perf: bump PR to deal with sstate corruption on autobuilder
poky.conf: bump version for 3.1.33
tar: bump PR to deal with sstate corruption on autobuilder
valgrind: skip intermittently failing ptest
wireless-regdb: Upgrade to 2024.01.23
yocto-uninative: Update to 4.4 for glibc 2.39


[-- Attachment #2: Type: text/html, Size: 20322 bytes --]

                 reply	other threads:[~2024-05-04  3:31 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CH3PR11MB8093635A85BCE9B2A0196A6FB91E2@CH3PR11MB8093.namprd11.prod.outlook.com \
    --to=chee.yang.lee@intel.com \
    --cc=yocto-announce@lists.yoctoproject.org \
    --cc=yocto@lists.yoctoproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).