<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Yoann+Congal</id>
	<title>Yocto Project - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Yoann+Congal"/>
	<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/Special:Contributions/Yoann_Congal"/>
	<updated>2026-04-21T15:08:47Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.5</generator>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86788</id>
		<title>Stable Release and LTS</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86788"/>
		<updated>2026-03-16T16:44:27Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Normal process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Yocto Project Stable Branch Maintenance and Long Term Support (LTS) =&lt;br /&gt;
&lt;br /&gt;
Background on how the project&#039;s LTS plans came about can be found [[LTS_Background | here]]. The document below details the current project release lifecycle and LTS plans. The aim is to have a stable series maintenance policy which allows for different stages of maintenance including standard &amp;quot;stable&amp;quot; series, LTS series and community support.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Releases|Current Maintainers list]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Release Lifecycle ==&lt;br /&gt;
The project releases every six months in April and October (spring and fall). This is necessary to bring development together to a focus point and provide points of increased testing and focus on stability. There are two possible lifecycles a release may follow:&lt;br /&gt;
&lt;br /&gt;
Initial Release -&amp;gt; Stable -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
:: or&lt;br /&gt;
Initial Release -&amp;gt; LTS -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
&lt;br /&gt;
The change in status of a given release series should be announced in the weekly status report and reflected on the “Releases” wiki page.&lt;br /&gt;
&lt;br /&gt;
The stages have the following properties:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS common properties:&#039;&#039;&#039;&lt;br /&gt;
* Has point release tarballs created&lt;br /&gt;
* Has release artefacts&lt;br /&gt;
* Patches merged to the main repository branch&lt;br /&gt;
* Requires autobuilder testing&lt;br /&gt;
* The project will appoint someone to act as the maintainer to coordinate and handle patch testing and merging&lt;br /&gt;
* Strict “backport only”, master first policy&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS differences:&#039;&#039;&#039;&lt;br /&gt;
* Stable releases are maintained for seven months&lt;br /&gt;
* LTS releases are maintained for four years (as of June 2023, [https://lists.yoctoproject.org/g/yocto/message/60459 announced here])&lt;br /&gt;
* LTS releases are preannounced and known to be LTS in advance (usually every two years)&lt;br /&gt;
* LTS tested only on a subset of supported native build platforms (announced at time of LTS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Community status properties:&#039;&#039;&#039;&lt;br /&gt;
* A branch transitions to community support after the last stable dot release identified by the stable/LTS maintainer.&lt;br /&gt;
* A call for a community support maintainer is sent to the mailing lists.&lt;br /&gt;
** A six (6) week waiting period. &lt;br /&gt;
** if there is no new maintainer, then the branch goes to into EOL status&lt;br /&gt;
* Branches only have community support status if there is an active community member willing to step into the maintainer role for that series&lt;br /&gt;
* All the same repos are covered as in Stable&lt;br /&gt;
* Follows the same the Stable processes, except;&lt;br /&gt;
** Patches merge to the main repository but in a community/XXX namespace&lt;br /&gt;
** Automated testing is on a best effort basis, some autobuilder cycles may be available but not guaranteed.&lt;br /&gt;
** The maintainer is required to publish a testing plan to show what testing will be made for patches to merge to the community branch.&lt;br /&gt;
** No point releases version and no release artifacts&lt;br /&gt;
* Master first policy recommended&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EOL (End of life):&#039;&#039;&#039;&lt;br /&gt;
* No community support maintainer after the six (6) week waiting period&lt;br /&gt;
* When there is no longer any active community maintainer, branches become EOL&lt;br /&gt;
** No new changes for 2 months&lt;br /&gt;
* Artifacts will be removed for EOL older than????&lt;br /&gt;
** process under development&lt;br /&gt;
&lt;br /&gt;
== LTS “Mixin” repositories ==&lt;br /&gt;
We realise that a given LTS may need other versions of some components within its lifetime as no “one size” fits everyone’s needs. Rather than adding potentially invasive changes to older releases (such as new gcc versions), the project proposes the use of “mixin” layers (see https://docs.yoctoproject.org/dev//ref-manual/release-process.html#stable-release-process).&lt;br /&gt;
&lt;br /&gt;
The structure would be to create them in the repository meta-lts-mixins with the branch naming scheme &amp;lt;releaseseries&amp;gt;/&amp;lt;mixin name&amp;gt;. We expect this may be used for gcc and possibly for rapidly changing languages like go/nodejs/rust. Policies on testing these layers will depend on how widespread their usage is and determined on a case by case basis. There may be other &#039;mixin&#039; layers within the wider community too. Access to the repository branches can be granted by the Yocto Project TSC upon application.&lt;br /&gt;
&lt;br /&gt;
The layers should have a single purpose and be Yocto Project Compatible (passing the test script) allowing them to be selected by users as needed. The maintainer should be listed in the README and note when the layer is no longer maintained.&lt;br /&gt;
&lt;br /&gt;
== Stable/LTS Patch Acceptance Policies ==&lt;br /&gt;
All changes must have already been accepted into the current master release and any other release still within its “stable” seven month support window.&lt;br /&gt;
&lt;br /&gt;
Patches must pass testing on the project’s automated test infrastructure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Security and CVE fixes&lt;br /&gt;
* Fixes for bugs&lt;br /&gt;
* Changes to follow an upstream stable series or LTS that aligns with the original release (based on compatibility)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Potentially Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Fixes so codebase works with newly released distros (only in the first six months after a given release series first releases)&lt;br /&gt;
* Bug fix only version upgrades for upstreams with a good stable process&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unacceptable:&#039;&#039;&#039;&lt;br /&gt;
* General version upgrades&lt;br /&gt;
* New features&lt;br /&gt;
* ABI/API breakage&lt;br /&gt;
&lt;br /&gt;
== Components (layers) to be covered ==&lt;br /&gt;
&lt;br /&gt;
The project LTS covers:&lt;br /&gt;
* Bitbake&lt;br /&gt;
* OE-Core&lt;br /&gt;
* Meta-yocto&lt;br /&gt;
* yocto-docs&lt;br /&gt;
&lt;br /&gt;
The project LTS does not cover:&lt;br /&gt;
* meta-mingw&lt;br /&gt;
* meta-gplv2&lt;br /&gt;
* vendor layers&lt;br /&gt;
&lt;br /&gt;
Other layers can and will have their own LTS processes.&lt;br /&gt;
&lt;br /&gt;
== Testing ==&lt;br /&gt;
The project releases are only tested using the automated testing based on virtual environments. The build host OSes used to run these tests are determined at the initial release time. For LTS releases only some subset of native OSes maybe supported, particularly where the lifetime of the OS would be shorter than the LTS.&lt;br /&gt;
&lt;br /&gt;
Further testing of releases, e.g. on real hardware platforms is encouraged and there is a process to allow these results to be merged into the release test results but the process for making the release no longer depends upon this happening.&lt;br /&gt;
&lt;br /&gt;
== Process ( TOC)==&lt;br /&gt;
* Need to document the following processes:&lt;br /&gt;
** How maintainer is selected&lt;br /&gt;
** How are patches proposed - Done&lt;br /&gt;
** How are patches queued/tested/reviewed/merged - Done&lt;br /&gt;
** When are point releases made? - Done&lt;br /&gt;
** How to trigger and run a point release - Done&lt;br /&gt;
** Release process itself &lt;br /&gt;
** Transferring stable/LTS release to community/EOL status - YP TSC&lt;br /&gt;
** New maintainer training - TBD&lt;br /&gt;
&lt;br /&gt;
== Requesting a fix in a stable branch ==&lt;br /&gt;
&lt;br /&gt;
With reference to the above policies, if you would like to request a backport of a commit in a newer release, you can either (a) do the backport yourself and send the patch marked with &amp;lt;tt&amp;gt;[branchname]&amp;lt;/tt&amp;gt; to the appropriate mailing list; or alternatively (b) you can send a simple request giving commit hashes / URLs that you would like to be backported. In both cases it helps to CC the maintainer - refer to the [[Stable branch maintenance|stable release table]].&lt;br /&gt;
&lt;br /&gt;
For information on which mailing list you should send these to see the README file in [https://git.openembedded.org/openembedded-core/tree/README.OE-Core.md OE-Core], [https://git.openembedded.org/bitbake/tree/README bitbake], [https://git.yoctoproject.org/meta-yocto/tree/meta-poky/README.poky.md meta-yocto], [https://git.yoctoproject.org/yocto-docs/tree/documentation/README yocto-docs]. Each repository should contain a README file at the root.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Maintainer Procedures&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Normal process ===&lt;br /&gt;
&lt;br /&gt;
When there are enough changes (or a few critical ones), the stable/LTS maintainer should follow this procedure:&lt;br /&gt;
&lt;br /&gt;
# Look out for patches on the mailing list marked with the appropriate branch name in the subject&lt;br /&gt;
# Look through recently merged patches in master that are suitable for backporting&lt;br /&gt;
# Collect patches together on a branch&lt;br /&gt;
#* If a submitted patch is a backport from master, rather than taking the patch as submitted, it is preferable to backport the patch from master so that the original commit message is preserved.&lt;br /&gt;
#* If you do the backporting from poky you will get the original commit ID in the commit message which is useful for reference.&lt;br /&gt;
#* It is beneficial to change the original commit ID line to say &amp;quot;OE-Core master rev&amp;quot; instead of &amp;quot;OE-Core rev&amp;quot; to distinguish it from the OE-Core  branch revision that will be added when the commit is merged&lt;br /&gt;
# Run a local build or two to pick up any obvious problems&lt;br /&gt;
# Bitbake change should be in the bitbake-contrib repo&lt;br /&gt;
## https://git.openembedded.org/bitbake-contrib stable/{branch}-nut&lt;br /&gt;
# Openembedded-core changes should be be in the openembedded-core-contrib stable/{branch}-nut &lt;br /&gt;
## https://git.openembedded.org/openembedded-core-contrib&lt;br /&gt;
# Meta-yocto changes should be in meta-yocto-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/meta-yocto-contrib&lt;br /&gt;
# yocto-docs changes should be in yocto-docs contrib/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/yocto-docs&lt;br /&gt;
# For stable branches using a assembled poky repository (i.e. before whinlatter), now create your Poky distro for testing.&lt;br /&gt;
## The Autobuilder requires changes to reside in poky, bitbake and openembedded-core&lt;br /&gt;
## Combine bitabke, core, meta-yocto and yocto-docs changes into one repo.&lt;br /&gt;
## Push the changes to poky-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# Test the changes on the autobuilder (see [[The_Yocto_Autobuilder#Starting_Builds]])&lt;br /&gt;
#* Make sure you check directly for the results of the build as these won&#039;t be reported to the yocto-builds mailing list.&lt;br /&gt;
## For any build failure, Defects should be opened&lt;br /&gt;
## Address any build failures, update repo&#039;s accordingly and rebuild&lt;br /&gt;
&lt;br /&gt;
There will very likely be a number of these cycles during the lifetime of the stable branch.&lt;br /&gt;
&lt;br /&gt;
=== Patch review ===&lt;br /&gt;
# When collating patches for review, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Patch review&amp;quot;&lt;br /&gt;
## Provide a deadline for any comments included in the body of the email&lt;br /&gt;
## Standard to date is 2 days.&lt;br /&gt;
###Exception is if the changes are patches sent to the appropriate mailing list.&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-request -p &amp;quot;{branch}&amp;quot; ...{etc}&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Wait for any feedback&lt;br /&gt;
## If there are changes make any necessary adjustments&lt;br /&gt;
### rebuild if necessary&lt;br /&gt;
# Push any changes to the appropriate repos and branches.&lt;br /&gt;
&lt;br /&gt;
=== Merge request===&lt;br /&gt;
# Push affected repos and branches to stable/{branch}-next branch&lt;br /&gt;
# When preparing patches for merge, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Merge Request&amp;quot;&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-requests -p&amp;quot;{branch}&amp;quot;&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# When the patches are merged, mark any bugs specific to the stable branch as resolved as appropriate&lt;br /&gt;
&lt;br /&gt;
=== Point release ===&lt;br /&gt;
&lt;br /&gt;
Normally point releases are scheduled in advance as appropriate - contact Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and CC: Ricard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt; about scheduling point releases.&lt;br /&gt;
&lt;br /&gt;
# Update yocto-docs with release information.&lt;br /&gt;
## Send a patch to docs@lists.yoctoproject.org&lt;br /&gt;
# Once all dot release changes are merged, ask Richard to run the release candidate build&lt;br /&gt;
#* The stable branch or LTS maintainer should monitor the build and follow up on any failures&lt;br /&gt;
# When the release candidate build completes successfully, The stable branch or LTS maintainer should notify the QA team to start the release QA process.&lt;br /&gt;
# Gather together changes in the form needed for a release notes and send them Yocto Project TSC, Branch or LTS maintainer for review and approval.&lt;br /&gt;
## If acceptable the changes will be incorporated into the final release notes and to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; so he can have them in preparation for the release meeting.&lt;br /&gt;
# Send a patch to update the stable version in meta-yocto/conf/distro/poky.conf for the release&lt;br /&gt;
&lt;br /&gt;
=== Other ===&lt;br /&gt;
&lt;br /&gt;
* It is useful to provide status updates on the Yocto Project technical call, particularly coming up to a stable release. If you&#039;re not able to be on the call, send the status update information to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and he will present it.&lt;br /&gt;
&lt;br /&gt;
=== Releases ===&lt;br /&gt;
[[Releases|Yocto Project releases]]&lt;br /&gt;
&lt;br /&gt;
=== Kernel LTS ===&lt;br /&gt;
[[Linux Yocto#Release_Cadence|Kernel cadence]]&lt;br /&gt;
&lt;br /&gt;
=== New Releases process ===&lt;br /&gt;
[[Yocto Project Release Process|Standard release process]]&lt;br /&gt;
&lt;br /&gt;
== Decision Makers==&lt;br /&gt;
Decisions are expected to be handled by the maintainers. The TSC holds the ultimate decision making authority in case of disagreement. The TSC makes the final release go/nogo decisions.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86787</id>
		<title>Stable Release and LTS</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86787"/>
		<updated>2026-03-16T16:42:24Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Normal process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Yocto Project Stable Branch Maintenance and Long Term Support (LTS) =&lt;br /&gt;
&lt;br /&gt;
Background on how the project&#039;s LTS plans came about can be found [[LTS_Background | here]]. The document below details the current project release lifecycle and LTS plans. The aim is to have a stable series maintenance policy which allows for different stages of maintenance including standard &amp;quot;stable&amp;quot; series, LTS series and community support.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Releases|Current Maintainers list]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Release Lifecycle ==&lt;br /&gt;
The project releases every six months in April and October (spring and fall). This is necessary to bring development together to a focus point and provide points of increased testing and focus on stability. There are two possible lifecycles a release may follow:&lt;br /&gt;
&lt;br /&gt;
Initial Release -&amp;gt; Stable -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
:: or&lt;br /&gt;
Initial Release -&amp;gt; LTS -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
&lt;br /&gt;
The change in status of a given release series should be announced in the weekly status report and reflected on the “Releases” wiki page.&lt;br /&gt;
&lt;br /&gt;
The stages have the following properties:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS common properties:&#039;&#039;&#039;&lt;br /&gt;
* Has point release tarballs created&lt;br /&gt;
* Has release artefacts&lt;br /&gt;
* Patches merged to the main repository branch&lt;br /&gt;
* Requires autobuilder testing&lt;br /&gt;
* The project will appoint someone to act as the maintainer to coordinate and handle patch testing and merging&lt;br /&gt;
* Strict “backport only”, master first policy&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS differences:&#039;&#039;&#039;&lt;br /&gt;
* Stable releases are maintained for seven months&lt;br /&gt;
* LTS releases are maintained for four years (as of June 2023, [https://lists.yoctoproject.org/g/yocto/message/60459 announced here])&lt;br /&gt;
* LTS releases are preannounced and known to be LTS in advance (usually every two years)&lt;br /&gt;
* LTS tested only on a subset of supported native build platforms (announced at time of LTS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Community status properties:&#039;&#039;&#039;&lt;br /&gt;
* A branch transitions to community support after the last stable dot release identified by the stable/LTS maintainer.&lt;br /&gt;
* A call for a community support maintainer is sent to the mailing lists.&lt;br /&gt;
** A six (6) week waiting period. &lt;br /&gt;
** if there is no new maintainer, then the branch goes to into EOL status&lt;br /&gt;
* Branches only have community support status if there is an active community member willing to step into the maintainer role for that series&lt;br /&gt;
* All the same repos are covered as in Stable&lt;br /&gt;
* Follows the same the Stable processes, except;&lt;br /&gt;
** Patches merge to the main repository but in a community/XXX namespace&lt;br /&gt;
** Automated testing is on a best effort basis, some autobuilder cycles may be available but not guaranteed.&lt;br /&gt;
** The maintainer is required to publish a testing plan to show what testing will be made for patches to merge to the community branch.&lt;br /&gt;
** No point releases version and no release artifacts&lt;br /&gt;
* Master first policy recommended&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EOL (End of life):&#039;&#039;&#039;&lt;br /&gt;
* No community support maintainer after the six (6) week waiting period&lt;br /&gt;
* When there is no longer any active community maintainer, branches become EOL&lt;br /&gt;
** No new changes for 2 months&lt;br /&gt;
* Artifacts will be removed for EOL older than????&lt;br /&gt;
** process under development&lt;br /&gt;
&lt;br /&gt;
== LTS “Mixin” repositories ==&lt;br /&gt;
We realise that a given LTS may need other versions of some components within its lifetime as no “one size” fits everyone’s needs. Rather than adding potentially invasive changes to older releases (such as new gcc versions), the project proposes the use of “mixin” layers (see https://docs.yoctoproject.org/dev//ref-manual/release-process.html#stable-release-process).&lt;br /&gt;
&lt;br /&gt;
The structure would be to create them in the repository meta-lts-mixins with the branch naming scheme &amp;lt;releaseseries&amp;gt;/&amp;lt;mixin name&amp;gt;. We expect this may be used for gcc and possibly for rapidly changing languages like go/nodejs/rust. Policies on testing these layers will depend on how widespread their usage is and determined on a case by case basis. There may be other &#039;mixin&#039; layers within the wider community too. Access to the repository branches can be granted by the Yocto Project TSC upon application.&lt;br /&gt;
&lt;br /&gt;
The layers should have a single purpose and be Yocto Project Compatible (passing the test script) allowing them to be selected by users as needed. The maintainer should be listed in the README and note when the layer is no longer maintained.&lt;br /&gt;
&lt;br /&gt;
== Stable/LTS Patch Acceptance Policies ==&lt;br /&gt;
All changes must have already been accepted into the current master release and any other release still within its “stable” seven month support window.&lt;br /&gt;
&lt;br /&gt;
Patches must pass testing on the project’s automated test infrastructure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Security and CVE fixes&lt;br /&gt;
* Fixes for bugs&lt;br /&gt;
* Changes to follow an upstream stable series or LTS that aligns with the original release (based on compatibility)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Potentially Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Fixes so codebase works with newly released distros (only in the first six months after a given release series first releases)&lt;br /&gt;
* Bug fix only version upgrades for upstreams with a good stable process&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unacceptable:&#039;&#039;&#039;&lt;br /&gt;
* General version upgrades&lt;br /&gt;
* New features&lt;br /&gt;
* ABI/API breakage&lt;br /&gt;
&lt;br /&gt;
== Components (layers) to be covered ==&lt;br /&gt;
&lt;br /&gt;
The project LTS covers:&lt;br /&gt;
* Bitbake&lt;br /&gt;
* OE-Core&lt;br /&gt;
* Meta-yocto&lt;br /&gt;
* yocto-docs&lt;br /&gt;
&lt;br /&gt;
The project LTS does not cover:&lt;br /&gt;
* meta-mingw&lt;br /&gt;
* meta-gplv2&lt;br /&gt;
* vendor layers&lt;br /&gt;
&lt;br /&gt;
Other layers can and will have their own LTS processes.&lt;br /&gt;
&lt;br /&gt;
== Testing ==&lt;br /&gt;
The project releases are only tested using the automated testing based on virtual environments. The build host OSes used to run these tests are determined at the initial release time. For LTS releases only some subset of native OSes maybe supported, particularly where the lifetime of the OS would be shorter than the LTS.&lt;br /&gt;
&lt;br /&gt;
Further testing of releases, e.g. on real hardware platforms is encouraged and there is a process to allow these results to be merged into the release test results but the process for making the release no longer depends upon this happening.&lt;br /&gt;
&lt;br /&gt;
== Process ( TOC)==&lt;br /&gt;
* Need to document the following processes:&lt;br /&gt;
** How maintainer is selected&lt;br /&gt;
** How are patches proposed - Done&lt;br /&gt;
** How are patches queued/tested/reviewed/merged - Done&lt;br /&gt;
** When are point releases made? - Done&lt;br /&gt;
** How to trigger and run a point release - Done&lt;br /&gt;
** Release process itself &lt;br /&gt;
** Transferring stable/LTS release to community/EOL status - YP TSC&lt;br /&gt;
** New maintainer training - TBD&lt;br /&gt;
&lt;br /&gt;
== Requesting a fix in a stable branch ==&lt;br /&gt;
&lt;br /&gt;
With reference to the above policies, if you would like to request a backport of a commit in a newer release, you can either (a) do the backport yourself and send the patch marked with &amp;lt;tt&amp;gt;[branchname]&amp;lt;/tt&amp;gt; to the appropriate mailing list; or alternatively (b) you can send a simple request giving commit hashes / URLs that you would like to be backported. In both cases it helps to CC the maintainer - refer to the [[Stable branch maintenance|stable release table]].&lt;br /&gt;
&lt;br /&gt;
For information on which mailing list you should send these to see the README file in [https://git.openembedded.org/openembedded-core/tree/README.OE-Core.md OE-Core], [https://git.openembedded.org/bitbake/tree/README bitbake], [https://git.yoctoproject.org/meta-yocto/tree/meta-poky/README.poky.md meta-yocto], [https://git.yoctoproject.org/yocto-docs/tree/documentation/README yocto-docs]. Each repository should contain a README file at the root.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Maintainer Procedures&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Normal process ===&lt;br /&gt;
&lt;br /&gt;
When there are enough changes (or a few critical ones), the stable/LTS maintainer should follow this procedure:&lt;br /&gt;
&lt;br /&gt;
# Look out for patches on the mailing list marked with the appropriate branch name in the subject&lt;br /&gt;
# Look through recently merged patches in master that are suitable for backporting&lt;br /&gt;
# Collect patches together on a branch&lt;br /&gt;
#* If a submitted patch is a backport from master, rather than taking the patch as submitted, it is preferable to backport the patch from master so that the original commit message is preserved.&lt;br /&gt;
#* If you do the backporting from poky you will get the original commit ID in the commit message which is useful for reference.&lt;br /&gt;
#* It is beneficial to change the original commit ID line to say &amp;quot;OE-Core master rev&amp;quot; instead of &amp;quot;OE-Core rev&amp;quot; to distinguish it from the OE-Core  branch revision that will be added when the commit is merged&lt;br /&gt;
# Run a local build or two to pick up any obvious problems&lt;br /&gt;
# Bitbake change should be in the bitbake-contrib repo&lt;br /&gt;
## https://git.openembedded.org/bitbake-contrib stable/{branch}-nut&lt;br /&gt;
# Openembedded-core changes should be be in the openembedded-core-contrib stable/{branch}-nut &lt;br /&gt;
## https://git.openembedded.org/openembedded-core-contrib&lt;br /&gt;
# Meta-yocto changes should be in meta-yocto-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/meta-yocto-contrib&lt;br /&gt;
# yocto-docs changes should be in yocto-docs contrib/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/yocto-docs&lt;br /&gt;
# For stable branches using a assembled poky repository (i.e. before whinlatter), now create your Poky distro for testing.&lt;br /&gt;
## The Autobuilder requires changes to reside in poky, bitbake and openembedded-core&lt;br /&gt;
## Combine bitabke, core, meta-yocto and yocto-docs changes into one repo.&lt;br /&gt;
## Push the changes to poky-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# Test the changes on the autobuilder (see [[How to start a build on the Autobuilder]])&lt;br /&gt;
#* Make sure you check directly for the results of the build as these won&#039;t be reported to the yocto-builds mailing list.&lt;br /&gt;
## For any build failure, Defects should be opened&lt;br /&gt;
## Address any build failures, update repo&#039;s accordingly and rebuild&lt;br /&gt;
&lt;br /&gt;
There will very likely be a number of these cycles during the lifetime of the stable branch.&lt;br /&gt;
&lt;br /&gt;
=== Patch review ===&lt;br /&gt;
# When collating patches for review, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Patch review&amp;quot;&lt;br /&gt;
## Provide a deadline for any comments included in the body of the email&lt;br /&gt;
## Standard to date is 2 days.&lt;br /&gt;
###Exception is if the changes are patches sent to the appropriate mailing list.&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-request -p &amp;quot;{branch}&amp;quot; ...{etc}&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Wait for any feedback&lt;br /&gt;
## If there are changes make any necessary adjustments&lt;br /&gt;
### rebuild if necessary&lt;br /&gt;
# Push any changes to the appropriate repos and branches.&lt;br /&gt;
&lt;br /&gt;
=== Merge request===&lt;br /&gt;
# Push affected repos and branches to stable/{branch}-next branch&lt;br /&gt;
# When preparing patches for merge, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Merge Request&amp;quot;&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-requests -p&amp;quot;{branch}&amp;quot;&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# When the patches are merged, mark any bugs specific to the stable branch as resolved as appropriate&lt;br /&gt;
&lt;br /&gt;
=== Point release ===&lt;br /&gt;
&lt;br /&gt;
Normally point releases are scheduled in advance as appropriate - contact Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and CC: Ricard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt; about scheduling point releases.&lt;br /&gt;
&lt;br /&gt;
# Update yocto-docs with release information.&lt;br /&gt;
## Send a patch to docs@lists.yoctoproject.org&lt;br /&gt;
# Once all dot release changes are merged, ask Richard to run the release candidate build&lt;br /&gt;
#* The stable branch or LTS maintainer should monitor the build and follow up on any failures&lt;br /&gt;
# When the release candidate build completes successfully, The stable branch or LTS maintainer should notify the QA team to start the release QA process.&lt;br /&gt;
# Gather together changes in the form needed for a release notes and send them Yocto Project TSC, Branch or LTS maintainer for review and approval.&lt;br /&gt;
## If acceptable the changes will be incorporated into the final release notes and to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; so he can have them in preparation for the release meeting.&lt;br /&gt;
# Send a patch to update the stable version in meta-yocto/conf/distro/poky.conf for the release&lt;br /&gt;
&lt;br /&gt;
=== Other ===&lt;br /&gt;
&lt;br /&gt;
* It is useful to provide status updates on the Yocto Project technical call, particularly coming up to a stable release. If you&#039;re not able to be on the call, send the status update information to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and he will present it.&lt;br /&gt;
&lt;br /&gt;
=== Releases ===&lt;br /&gt;
[[Releases|Yocto Project releases]]&lt;br /&gt;
&lt;br /&gt;
=== Kernel LTS ===&lt;br /&gt;
[[Linux Yocto#Release_Cadence|Kernel cadence]]&lt;br /&gt;
&lt;br /&gt;
=== New Releases process ===&lt;br /&gt;
[[Yocto Project Release Process|Standard release process]]&lt;br /&gt;
&lt;br /&gt;
== Decision Makers==&lt;br /&gt;
Decisions are expected to be handled by the maintainers. The TSC holds the ultimate decision making authority in case of disagreement. The TSC makes the final release go/nogo decisions.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86786</id>
		<title>Stable Release and LTS</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86786"/>
		<updated>2026-03-16T16:41:14Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Normal process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Yocto Project Stable Branch Maintenance and Long Term Support (LTS) =&lt;br /&gt;
&lt;br /&gt;
Background on how the project&#039;s LTS plans came about can be found [[LTS_Background | here]]. The document below details the current project release lifecycle and LTS plans. The aim is to have a stable series maintenance policy which allows for different stages of maintenance including standard &amp;quot;stable&amp;quot; series, LTS series and community support.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Releases|Current Maintainers list]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Release Lifecycle ==&lt;br /&gt;
The project releases every six months in April and October (spring and fall). This is necessary to bring development together to a focus point and provide points of increased testing and focus on stability. There are two possible lifecycles a release may follow:&lt;br /&gt;
&lt;br /&gt;
Initial Release -&amp;gt; Stable -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
:: or&lt;br /&gt;
Initial Release -&amp;gt; LTS -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
&lt;br /&gt;
The change in status of a given release series should be announced in the weekly status report and reflected on the “Releases” wiki page.&lt;br /&gt;
&lt;br /&gt;
The stages have the following properties:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS common properties:&#039;&#039;&#039;&lt;br /&gt;
* Has point release tarballs created&lt;br /&gt;
* Has release artefacts&lt;br /&gt;
* Patches merged to the main repository branch&lt;br /&gt;
* Requires autobuilder testing&lt;br /&gt;
* The project will appoint someone to act as the maintainer to coordinate and handle patch testing and merging&lt;br /&gt;
* Strict “backport only”, master first policy&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS differences:&#039;&#039;&#039;&lt;br /&gt;
* Stable releases are maintained for seven months&lt;br /&gt;
* LTS releases are maintained for four years (as of June 2023, [https://lists.yoctoproject.org/g/yocto/message/60459 announced here])&lt;br /&gt;
* LTS releases are preannounced and known to be LTS in advance (usually every two years)&lt;br /&gt;
* LTS tested only on a subset of supported native build platforms (announced at time of LTS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Community status properties:&#039;&#039;&#039;&lt;br /&gt;
* A branch transitions to community support after the last stable dot release identified by the stable/LTS maintainer.&lt;br /&gt;
* A call for a community support maintainer is sent to the mailing lists.&lt;br /&gt;
** A six (6) week waiting period. &lt;br /&gt;
** if there is no new maintainer, then the branch goes to into EOL status&lt;br /&gt;
* Branches only have community support status if there is an active community member willing to step into the maintainer role for that series&lt;br /&gt;
* All the same repos are covered as in Stable&lt;br /&gt;
* Follows the same the Stable processes, except;&lt;br /&gt;
** Patches merge to the main repository but in a community/XXX namespace&lt;br /&gt;
** Automated testing is on a best effort basis, some autobuilder cycles may be available but not guaranteed.&lt;br /&gt;
** The maintainer is required to publish a testing plan to show what testing will be made for patches to merge to the community branch.&lt;br /&gt;
** No point releases version and no release artifacts&lt;br /&gt;
* Master first policy recommended&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EOL (End of life):&#039;&#039;&#039;&lt;br /&gt;
* No community support maintainer after the six (6) week waiting period&lt;br /&gt;
* When there is no longer any active community maintainer, branches become EOL&lt;br /&gt;
** No new changes for 2 months&lt;br /&gt;
* Artifacts will be removed for EOL older than????&lt;br /&gt;
** process under development&lt;br /&gt;
&lt;br /&gt;
== LTS “Mixin” repositories ==&lt;br /&gt;
We realise that a given LTS may need other versions of some components within its lifetime as no “one size” fits everyone’s needs. Rather than adding potentially invasive changes to older releases (such as new gcc versions), the project proposes the use of “mixin” layers (see https://docs.yoctoproject.org/dev//ref-manual/release-process.html#stable-release-process).&lt;br /&gt;
&lt;br /&gt;
The structure would be to create them in the repository meta-lts-mixins with the branch naming scheme &amp;lt;releaseseries&amp;gt;/&amp;lt;mixin name&amp;gt;. We expect this may be used for gcc and possibly for rapidly changing languages like go/nodejs/rust. Policies on testing these layers will depend on how widespread their usage is and determined on a case by case basis. There may be other &#039;mixin&#039; layers within the wider community too. Access to the repository branches can be granted by the Yocto Project TSC upon application.&lt;br /&gt;
&lt;br /&gt;
The layers should have a single purpose and be Yocto Project Compatible (passing the test script) allowing them to be selected by users as needed. The maintainer should be listed in the README and note when the layer is no longer maintained.&lt;br /&gt;
&lt;br /&gt;
== Stable/LTS Patch Acceptance Policies ==&lt;br /&gt;
All changes must have already been accepted into the current master release and any other release still within its “stable” seven month support window.&lt;br /&gt;
&lt;br /&gt;
Patches must pass testing on the project’s automated test infrastructure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Security and CVE fixes&lt;br /&gt;
* Fixes for bugs&lt;br /&gt;
* Changes to follow an upstream stable series or LTS that aligns with the original release (based on compatibility)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Potentially Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Fixes so codebase works with newly released distros (only in the first six months after a given release series first releases)&lt;br /&gt;
* Bug fix only version upgrades for upstreams with a good stable process&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unacceptable:&#039;&#039;&#039;&lt;br /&gt;
* General version upgrades&lt;br /&gt;
* New features&lt;br /&gt;
* ABI/API breakage&lt;br /&gt;
&lt;br /&gt;
== Components (layers) to be covered ==&lt;br /&gt;
&lt;br /&gt;
The project LTS covers:&lt;br /&gt;
* Bitbake&lt;br /&gt;
* OE-Core&lt;br /&gt;
* Meta-yocto&lt;br /&gt;
* yocto-docs&lt;br /&gt;
&lt;br /&gt;
The project LTS does not cover:&lt;br /&gt;
* meta-mingw&lt;br /&gt;
* meta-gplv2&lt;br /&gt;
* vendor layers&lt;br /&gt;
&lt;br /&gt;
Other layers can and will have their own LTS processes.&lt;br /&gt;
&lt;br /&gt;
== Testing ==&lt;br /&gt;
The project releases are only tested using the automated testing based on virtual environments. The build host OSes used to run these tests are determined at the initial release time. For LTS releases only some subset of native OSes maybe supported, particularly where the lifetime of the OS would be shorter than the LTS.&lt;br /&gt;
&lt;br /&gt;
Further testing of releases, e.g. on real hardware platforms is encouraged and there is a process to allow these results to be merged into the release test results but the process for making the release no longer depends upon this happening.&lt;br /&gt;
&lt;br /&gt;
== Process ( TOC)==&lt;br /&gt;
* Need to document the following processes:&lt;br /&gt;
** How maintainer is selected&lt;br /&gt;
** How are patches proposed - Done&lt;br /&gt;
** How are patches queued/tested/reviewed/merged - Done&lt;br /&gt;
** When are point releases made? - Done&lt;br /&gt;
** How to trigger and run a point release - Done&lt;br /&gt;
** Release process itself &lt;br /&gt;
** Transferring stable/LTS release to community/EOL status - YP TSC&lt;br /&gt;
** New maintainer training - TBD&lt;br /&gt;
&lt;br /&gt;
== Requesting a fix in a stable branch ==&lt;br /&gt;
&lt;br /&gt;
With reference to the above policies, if you would like to request a backport of a commit in a newer release, you can either (a) do the backport yourself and send the patch marked with &amp;lt;tt&amp;gt;[branchname]&amp;lt;/tt&amp;gt; to the appropriate mailing list; or alternatively (b) you can send a simple request giving commit hashes / URLs that you would like to be backported. In both cases it helps to CC the maintainer - refer to the [[Stable branch maintenance|stable release table]].&lt;br /&gt;
&lt;br /&gt;
For information on which mailing list you should send these to see the README file in [https://git.openembedded.org/openembedded-core/tree/README.OE-Core.md OE-Core], [https://git.openembedded.org/bitbake/tree/README bitbake], [https://git.yoctoproject.org/meta-yocto/tree/meta-poky/README.poky.md meta-yocto], [https://git.yoctoproject.org/yocto-docs/tree/documentation/README yocto-docs]. Each repository should contain a README file at the root.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Maintainer Procedures&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Normal process ===&lt;br /&gt;
&lt;br /&gt;
When there are enough changes (or a few critical ones), the stable/LTS maintainer should follow this procedure:&lt;br /&gt;
&lt;br /&gt;
# Look out for patches on the mailing list marked with the appropriate branch name in the subject&lt;br /&gt;
# Look through recently merged patches in master that are suitable for backporting&lt;br /&gt;
# Collect patches together on a branch&lt;br /&gt;
#* If a submitted patch is a backport from master, rather than taking the patch as submitted, it is preferable to backport the patch from master so that the original commit message is preserved.&lt;br /&gt;
#* If you do the backporting from poky you will get the original commit ID in the commit message which is useful for reference.&lt;br /&gt;
#* It is beneficial to change the original commit ID line to say &amp;quot;OE-Core master rev&amp;quot; instead of &amp;quot;OE-Core rev&amp;quot; to distinguish it from the OE-Core  branch revision that will be added when the commit is merged&lt;br /&gt;
# Run a local build or two to pick up any obvious problems&lt;br /&gt;
# Bitbake change should be in the bitbake-contrib repo&lt;br /&gt;
## https://git.openembedded.org/bitbake-contrib stable/{branch}-nut&lt;br /&gt;
# Openembedded-core changes should be be in the openembedded-core-contrib stable/{branch}-nut &lt;br /&gt;
## https://git.openembedded.org/openembedded-core-contrib&lt;br /&gt;
# Meta-yocto changes should be in meta-yocto-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/meta-yocto-contrib&lt;br /&gt;
# yocto-docs changes should be in yocto-docs contrib/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/yocto-docs&lt;br /&gt;
#Now create your Poky distro for testing.&lt;br /&gt;
## The Autobuilder requires changes to reside in poky, bitbake and openembedded-core&lt;br /&gt;
## Combine bitabke, core, meta-yocto and yocto-docs changes into one repo.&lt;br /&gt;
## Push the changes to poky-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# Test the changes on the autobuilder (see [[How to start a build on the Autobuilder]])&lt;br /&gt;
#* Make sure you check directly for the results of the build as these won&#039;t be reported to the yocto-builds mailing list.&lt;br /&gt;
## For any build failure, Defects should be opened&lt;br /&gt;
## Address any build failures, update repo&#039;s accordingly and rebuild&lt;br /&gt;
&lt;br /&gt;
There will very likely be a number of these cycles during the lifetime of the stable branch.&lt;br /&gt;
&lt;br /&gt;
=== Patch review ===&lt;br /&gt;
# When collating patches for review, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Patch review&amp;quot;&lt;br /&gt;
## Provide a deadline for any comments included in the body of the email&lt;br /&gt;
## Standard to date is 2 days.&lt;br /&gt;
###Exception is if the changes are patches sent to the appropriate mailing list.&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-request -p &amp;quot;{branch}&amp;quot; ...{etc}&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Wait for any feedback&lt;br /&gt;
## If there are changes make any necessary adjustments&lt;br /&gt;
### rebuild if necessary&lt;br /&gt;
# Push any changes to the appropriate repos and branches.&lt;br /&gt;
&lt;br /&gt;
=== Merge request===&lt;br /&gt;
# Push affected repos and branches to stable/{branch}-next branch&lt;br /&gt;
# When preparing patches for merge, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Merge Request&amp;quot;&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-requests -p&amp;quot;{branch}&amp;quot;&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# When the patches are merged, mark any bugs specific to the stable branch as resolved as appropriate&lt;br /&gt;
&lt;br /&gt;
=== Point release ===&lt;br /&gt;
&lt;br /&gt;
Normally point releases are scheduled in advance as appropriate - contact Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and CC: Ricard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt; about scheduling point releases.&lt;br /&gt;
&lt;br /&gt;
# Update yocto-docs with release information.&lt;br /&gt;
## Send a patch to docs@lists.yoctoproject.org&lt;br /&gt;
# Once all dot release changes are merged, ask Richard to run the release candidate build&lt;br /&gt;
#* The stable branch or LTS maintainer should monitor the build and follow up on any failures&lt;br /&gt;
# When the release candidate build completes successfully, The stable branch or LTS maintainer should notify the QA team to start the release QA process.&lt;br /&gt;
# Gather together changes in the form needed for a release notes and send them Yocto Project TSC, Branch or LTS maintainer for review and approval.&lt;br /&gt;
## If acceptable the changes will be incorporated into the final release notes and to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; so he can have them in preparation for the release meeting.&lt;br /&gt;
# Send a patch to update the stable version in meta-yocto/conf/distro/poky.conf for the release&lt;br /&gt;
&lt;br /&gt;
=== Other ===&lt;br /&gt;
&lt;br /&gt;
* It is useful to provide status updates on the Yocto Project technical call, particularly coming up to a stable release. If you&#039;re not able to be on the call, send the status update information to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and he will present it.&lt;br /&gt;
&lt;br /&gt;
=== Releases ===&lt;br /&gt;
[[Releases|Yocto Project releases]]&lt;br /&gt;
&lt;br /&gt;
=== Kernel LTS ===&lt;br /&gt;
[[Linux Yocto#Release_Cadence|Kernel cadence]]&lt;br /&gt;
&lt;br /&gt;
=== New Releases process ===&lt;br /&gt;
[[Yocto Project Release Process|Standard release process]]&lt;br /&gt;
&lt;br /&gt;
== Decision Makers==&lt;br /&gt;
Decisions are expected to be handled by the maintainers. The TSC holds the ultimate decision making authority in case of disagreement. The TSC makes the final release go/nogo decisions.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86785</id>
		<title>Stable Release and LTS</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=86785"/>
		<updated>2026-03-16T16:37:14Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Requesting a fix in a stable branch */ replace a dead poky link with individual repos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Yocto Project Stable Branch Maintenance and Long Term Support (LTS) =&lt;br /&gt;
&lt;br /&gt;
Background on how the project&#039;s LTS plans came about can be found [[LTS_Background | here]]. The document below details the current project release lifecycle and LTS plans. The aim is to have a stable series maintenance policy which allows for different stages of maintenance including standard &amp;quot;stable&amp;quot; series, LTS series and community support.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Releases|Current Maintainers list]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Release Lifecycle ==&lt;br /&gt;
The project releases every six months in April and October (spring and fall). This is necessary to bring development together to a focus point and provide points of increased testing and focus on stability. There are two possible lifecycles a release may follow:&lt;br /&gt;
&lt;br /&gt;
Initial Release -&amp;gt; Stable -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
:: or&lt;br /&gt;
Initial Release -&amp;gt; LTS -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
&lt;br /&gt;
The change in status of a given release series should be announced in the weekly status report and reflected on the “Releases” wiki page.&lt;br /&gt;
&lt;br /&gt;
The stages have the following properties:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS common properties:&#039;&#039;&#039;&lt;br /&gt;
* Has point release tarballs created&lt;br /&gt;
* Has release artefacts&lt;br /&gt;
* Patches merged to the main repository branch&lt;br /&gt;
* Requires autobuilder testing&lt;br /&gt;
* The project will appoint someone to act as the maintainer to coordinate and handle patch testing and merging&lt;br /&gt;
* Strict “backport only”, master first policy&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS differences:&#039;&#039;&#039;&lt;br /&gt;
* Stable releases are maintained for seven months&lt;br /&gt;
* LTS releases are maintained for four years (as of June 2023, [https://lists.yoctoproject.org/g/yocto/message/60459 announced here])&lt;br /&gt;
* LTS releases are preannounced and known to be LTS in advance (usually every two years)&lt;br /&gt;
* LTS tested only on a subset of supported native build platforms (announced at time of LTS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Community status properties:&#039;&#039;&#039;&lt;br /&gt;
* A branch transitions to community support after the last stable dot release identified by the stable/LTS maintainer.&lt;br /&gt;
* A call for a community support maintainer is sent to the mailing lists.&lt;br /&gt;
** A six (6) week waiting period. &lt;br /&gt;
** if there is no new maintainer, then the branch goes to into EOL status&lt;br /&gt;
* Branches only have community support status if there is an active community member willing to step into the maintainer role for that series&lt;br /&gt;
* All the same repos are covered as in Stable&lt;br /&gt;
* Follows the same the Stable processes, except;&lt;br /&gt;
** Patches merge to the main repository but in a community/XXX namespace&lt;br /&gt;
** Automated testing is on a best effort basis, some autobuilder cycles may be available but not guaranteed.&lt;br /&gt;
** The maintainer is required to publish a testing plan to show what testing will be made for patches to merge to the community branch.&lt;br /&gt;
** No point releases version and no release artifacts&lt;br /&gt;
* Master first policy recommended&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EOL (End of life):&#039;&#039;&#039;&lt;br /&gt;
* No community support maintainer after the six (6) week waiting period&lt;br /&gt;
* When there is no longer any active community maintainer, branches become EOL&lt;br /&gt;
** No new changes for 2 months&lt;br /&gt;
* Artifacts will be removed for EOL older than????&lt;br /&gt;
** process under development&lt;br /&gt;
&lt;br /&gt;
== LTS “Mixin” repositories ==&lt;br /&gt;
We realise that a given LTS may need other versions of some components within its lifetime as no “one size” fits everyone’s needs. Rather than adding potentially invasive changes to older releases (such as new gcc versions), the project proposes the use of “mixin” layers (see https://docs.yoctoproject.org/dev//ref-manual/release-process.html#stable-release-process).&lt;br /&gt;
&lt;br /&gt;
The structure would be to create them in the repository meta-lts-mixins with the branch naming scheme &amp;lt;releaseseries&amp;gt;/&amp;lt;mixin name&amp;gt;. We expect this may be used for gcc and possibly for rapidly changing languages like go/nodejs/rust. Policies on testing these layers will depend on how widespread their usage is and determined on a case by case basis. There may be other &#039;mixin&#039; layers within the wider community too. Access to the repository branches can be granted by the Yocto Project TSC upon application.&lt;br /&gt;
&lt;br /&gt;
The layers should have a single purpose and be Yocto Project Compatible (passing the test script) allowing them to be selected by users as needed. The maintainer should be listed in the README and note when the layer is no longer maintained.&lt;br /&gt;
&lt;br /&gt;
== Stable/LTS Patch Acceptance Policies ==&lt;br /&gt;
All changes must have already been accepted into the current master release and any other release still within its “stable” seven month support window.&lt;br /&gt;
&lt;br /&gt;
Patches must pass testing on the project’s automated test infrastructure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Security and CVE fixes&lt;br /&gt;
* Fixes for bugs&lt;br /&gt;
* Changes to follow an upstream stable series or LTS that aligns with the original release (based on compatibility)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Potentially Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Fixes so codebase works with newly released distros (only in the first six months after a given release series first releases)&lt;br /&gt;
* Bug fix only version upgrades for upstreams with a good stable process&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unacceptable:&#039;&#039;&#039;&lt;br /&gt;
* General version upgrades&lt;br /&gt;
* New features&lt;br /&gt;
* ABI/API breakage&lt;br /&gt;
&lt;br /&gt;
== Components (layers) to be covered ==&lt;br /&gt;
&lt;br /&gt;
The project LTS covers:&lt;br /&gt;
* Bitbake&lt;br /&gt;
* OE-Core&lt;br /&gt;
* Meta-yocto&lt;br /&gt;
* yocto-docs&lt;br /&gt;
&lt;br /&gt;
The project LTS does not cover:&lt;br /&gt;
* meta-mingw&lt;br /&gt;
* meta-gplv2&lt;br /&gt;
* vendor layers&lt;br /&gt;
&lt;br /&gt;
Other layers can and will have their own LTS processes.&lt;br /&gt;
&lt;br /&gt;
== Testing ==&lt;br /&gt;
The project releases are only tested using the automated testing based on virtual environments. The build host OSes used to run these tests are determined at the initial release time. For LTS releases only some subset of native OSes maybe supported, particularly where the lifetime of the OS would be shorter than the LTS.&lt;br /&gt;
&lt;br /&gt;
Further testing of releases, e.g. on real hardware platforms is encouraged and there is a process to allow these results to be merged into the release test results but the process for making the release no longer depends upon this happening.&lt;br /&gt;
&lt;br /&gt;
== Process ( TOC)==&lt;br /&gt;
* Need to document the following processes:&lt;br /&gt;
** How maintainer is selected&lt;br /&gt;
** How are patches proposed - Done&lt;br /&gt;
** How are patches queued/tested/reviewed/merged - Done&lt;br /&gt;
** When are point releases made? - Done&lt;br /&gt;
** How to trigger and run a point release - Done&lt;br /&gt;
** Release process itself &lt;br /&gt;
** Transferring stable/LTS release to community/EOL status - YP TSC&lt;br /&gt;
** New maintainer training - TBD&lt;br /&gt;
&lt;br /&gt;
== Requesting a fix in a stable branch ==&lt;br /&gt;
&lt;br /&gt;
With reference to the above policies, if you would like to request a backport of a commit in a newer release, you can either (a) do the backport yourself and send the patch marked with &amp;lt;tt&amp;gt;[branchname]&amp;lt;/tt&amp;gt; to the appropriate mailing list; or alternatively (b) you can send a simple request giving commit hashes / URLs that you would like to be backported. In both cases it helps to CC the maintainer - refer to the [[Stable branch maintenance|stable release table]].&lt;br /&gt;
&lt;br /&gt;
For information on which mailing list you should send these to see the README file in [https://git.openembedded.org/openembedded-core/tree/README.OE-Core.md OE-Core], [https://git.openembedded.org/bitbake/tree/README bitbake], [https://git.yoctoproject.org/meta-yocto/tree/meta-poky/README.poky.md meta-yocto], [https://git.yoctoproject.org/yocto-docs/tree/documentation/README yocto-docs]. Each repository should contain a README file at the root.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Maintainer Procedures&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Normal process ===&lt;br /&gt;
&lt;br /&gt;
When there are enough changes (or a few critical ones), the stable/LTS maintainer should follow this procedure:&lt;br /&gt;
&lt;br /&gt;
# Look out for patches on the mailing list marked with the appropriate branch name in the subject&lt;br /&gt;
# Look through recently merged patches in master that are suitable for backporting&lt;br /&gt;
# Collect patches together on a branch&lt;br /&gt;
#* If a submitted patch is a backport from master, rather than taking the patch as submitted, it is preferable to backport the patch from master so that the original commit message is preserved.&lt;br /&gt;
#* If you do the backporting from poky you will get the original commit ID in the commit message which is useful for reference.&lt;br /&gt;
#* It is beneficial to change the original commit ID line to say &amp;quot;OE-Core master rev&amp;quot; instead of &amp;quot;OE-Core rev&amp;quot; to distinguish it from the OE-Core  branch revision that will be added when the commit is merged&lt;br /&gt;
# Run a local build or two to pick up any obvious problems&lt;br /&gt;
# Bitbake change should be in the bitbake-contrib repo&lt;br /&gt;
## https://git.openembedded.org/bitbake-contrib stable/{branch}-nut&lt;br /&gt;
# Openembedded-core changes should be be in the openembedded-core-contrib stable/{branch}-nut &lt;br /&gt;
## https://git.openembedded.org/openembedded-core-contrib&lt;br /&gt;
# Meta-yocto changes should be in poky-contrib meta-yocto/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# yocto-docs changes should be in poky-contrib yocto-docs/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
#Now create your Poky distro for testing.&lt;br /&gt;
## The Autobuilder requires changes to reside in poky, bitbake and openembedded-core&lt;br /&gt;
## Combine bitabke, core, meta-yocto and yocto-docs changes into one repo.&lt;br /&gt;
## Push the changes to poky-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# Test the changes on the autobuilder (see [[How to start a build on the Autobuilder]])&lt;br /&gt;
#* Make sure you check directly for the results of the build as these won&#039;t be reported to the yocto-builds mailing list.&lt;br /&gt;
## For any build failure, Defects should be opened&lt;br /&gt;
## Address any build failures, update repo&#039;s accordingly and rebuild&lt;br /&gt;
&lt;br /&gt;
There will very likely be a number of these cycles during the lifetime of the stable branch.&lt;br /&gt;
&lt;br /&gt;
=== Patch review ===&lt;br /&gt;
# When collating patches for review, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Patch review&amp;quot;&lt;br /&gt;
## Provide a deadline for any comments included in the body of the email&lt;br /&gt;
## Standard to date is 2 days.&lt;br /&gt;
###Exception is if the changes are patches sent to the appropriate mailing list.&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-request -p &amp;quot;{branch}&amp;quot; ...{etc}&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Wait for any feedback&lt;br /&gt;
## If there are changes make any necessary adjustments&lt;br /&gt;
### rebuild if necessary&lt;br /&gt;
# Push any changes to the appropriate repos and branches.&lt;br /&gt;
&lt;br /&gt;
=== Merge request===&lt;br /&gt;
# Push affected repos and branches to stable/{branch}-next branch&lt;br /&gt;
# When preparing patches for merge, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Merge Request&amp;quot;&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-requests -p&amp;quot;{branch}&amp;quot;&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# When the patches are merged, mark any bugs specific to the stable branch as resolved as appropriate&lt;br /&gt;
&lt;br /&gt;
=== Point release ===&lt;br /&gt;
&lt;br /&gt;
Normally point releases are scheduled in advance as appropriate - contact Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and CC: Ricard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt; about scheduling point releases.&lt;br /&gt;
&lt;br /&gt;
# Update yocto-docs with release information.&lt;br /&gt;
## Send a patch to docs@lists.yoctoproject.org&lt;br /&gt;
# Once all dot release changes are merged, ask Richard to run the release candidate build&lt;br /&gt;
#* The stable branch or LTS maintainer should monitor the build and follow up on any failures&lt;br /&gt;
# When the release candidate build completes successfully, The stable branch or LTS maintainer should notify the QA team to start the release QA process.&lt;br /&gt;
# Gather together changes in the form needed for a release notes and send them Yocto Project TSC, Branch or LTS maintainer for review and approval.&lt;br /&gt;
## If acceptable the changes will be incorporated into the final release notes and to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; so he can have them in preparation for the release meeting.&lt;br /&gt;
# Send a patch to update the stable version in meta-yocto/conf/distro/poky.conf for the release&lt;br /&gt;
&lt;br /&gt;
=== Other ===&lt;br /&gt;
&lt;br /&gt;
* It is useful to provide status updates on the Yocto Project technical call, particularly coming up to a stable release. If you&#039;re not able to be on the call, send the status update information to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and he will present it.&lt;br /&gt;
&lt;br /&gt;
=== Releases ===&lt;br /&gt;
[[Releases|Yocto Project releases]]&lt;br /&gt;
&lt;br /&gt;
=== Kernel LTS ===&lt;br /&gt;
[[Linux Yocto#Release_Cadence|Kernel cadence]]&lt;br /&gt;
&lt;br /&gt;
=== New Releases process ===&lt;br /&gt;
[[Yocto Project Release Process|Standard release process]]&lt;br /&gt;
&lt;br /&gt;
== Decision Makers==&lt;br /&gt;
Decisions are expected to be handled by the maintainers. The TSC holds the ultimate decision making authority in case of disagreement. The TSC makes the final release go/nogo decisions.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Weekly_Status&amp;diff=86779</id>
		<title>Weekly Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Weekly_Status&amp;diff=86779"/>
		<updated>2026-03-09T07:42:21Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Typo dashbard -&amp;gt; dashboard&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Yocto Project Status 3 March 2026 ==&lt;br /&gt;
Current Dev Position: YP 6.0 M3&amp;lt;br/&amp;gt;&lt;br /&gt;
Next Deadline: YP 6.0 M3 Build Date 2026-03-09&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Next Team Meetings:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*Bug Triage meeting - Thursday 5th Mar. 7:30am PDT (https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09)&lt;br /&gt;
*Weekly Project Engineering Sync  - Tuesday 3rd Mar. 8am PDT (https://zoom.us/j/990892712?pwd=cHU1MjhoM2x6ck81bkcrYjRrcmJsUT09)&lt;br /&gt;
*Yocto Project Patch Review - Thursday 5th Mar. 10am GMT and Monday 9th Mar. 9am PDT (https://zoom.us/j/97762397148?pwd=1xk0iC9hp9SjEonaTaONwTb6iWry4Eb.1)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project data dashboard: https://dashboard.yoctoproject.org/&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Status/Updates:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 4.0.33 has been released&lt;br /&gt;
*YP 5.0.16 is in TSC review&lt;br /&gt;
*YP 6.0 M2, 5.3.2, &amp;amp; 4.0.34 are in QA.&lt;br /&gt;
**We are aware of changes in QA timelines and are discussing how to address them.&lt;br /&gt;
*We have issues which need further work that will block M3: &lt;br /&gt;
**x86 kvm seemingly broken with certain CPU features (#16074)&lt;br /&gt;
**AB-INT: opkg-build segmentation fault (memory corruption in pseudo?) (#16078)&lt;br /&gt;
**Failure to generate regression reports in release builds &lt;br /&gt;
*We also have issues we need to resolve before release:&lt;br /&gt;
**Allowing non-destructive git fetcher updates for bitbake-setup.&lt;br /&gt;
**Splitting wic into an external tool.&lt;br /&gt;
**Kernel rust support.&lt;br /&gt;
**Switching to pkg-config.&lt;br /&gt;
**Deprecation of ltp (upstream dropped runltp and mandate kirk)&lt;br /&gt;
**How to improve DEBUG_BUILD?&lt;br /&gt;
**DISTRO_FEATURES defaults improvements.&lt;br /&gt;
**SBOM/cve-check changes.&lt;br /&gt;
**Reconcile poky and OE-Core defaults templates.&lt;br /&gt;
*OE-Core switched to enabling a hash equivalence server by default.&lt;br /&gt;
*We’re working through the backlog of patches and the high number of intermittent build failures is still problematic. We continue to struggle for bandwidth for changes needing in depth review/feedback. This could impact features making it into the LTS.&lt;br /&gt;
*The project has a booth at Embedded World next week, feel free to come and say Hi if you’re there!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ways to contribute:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*We have several open issues for pseudo and limited maintainer time to work on them. Help from someone familiar with systems programming in C would be greatly appreciated. https://bugzilla.yoctoproject.org/buglist.cgi?list_id=661406&amp;amp;priority=High&amp;amp;priority=Medium%2B&amp;amp;product=Pseudo&amp;amp;query_format=advanced&amp;amp;resolution=---&lt;br /&gt;
*There are a large number of intermittent failures on our autobuilder, any help with investigating, reproducing or solving these issues would be welcome! https://valkyrie.yocto.io/pub/non-release/abint/&lt;br /&gt;
*Many recipes in openembedded-core would benefit from a new recipe maintainer. Please look at https://git.openembedded.org/openembedded-core/tree/meta/conf/distro/include/maintainers.inc and see if you can adopt any of the unassigned recipes.&lt;br /&gt;
*For more ways to contribute, see https://docs.google.com/document/d/18oxKWxLorfF813h82mK6yKTIHeBp_-9owFuCWbzgjOk/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;New to the project?&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*We have a list of issues we think are good places to start contributing: https://bugzilla.yoctoproject.org/buglist.cgi?quicksearch=NEWCOMER&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tracking Metrics:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*WDD 2908 (last week 2893) (https://wiki.yoctoproject.org/charts/combo.html)&lt;br /&gt;
*OE-Core/Poky Patch Metrics&lt;br /&gt;
**Total patches found: 11063 (last week 1107)&lt;br /&gt;
**Patches in the Pending State: 151 (14%) [last week 151 (14%)]&lt;br /&gt;
**https://valkyrie.yocto.io/pub/non-release/patchmetrics/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;YP 6.0 Milestone Dates:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 6.0 M2 is in QA.&lt;br /&gt;
*YP 6.0 M3 Build Date 2026-03-09&lt;br /&gt;
*YP 6.0 M3 Release Date 2026-03-20&lt;br /&gt;
*YP 6.0 M4 Build Date 2026-03-30&lt;br /&gt;
*YP 6.0 M4 Release Date 2026-04-26&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upcoming dot releases:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 5.0.16 is in review.&lt;br /&gt;
*YP 5.3.2 is in QA.&lt;br /&gt;
*YP 4.0.34 is in QA.&lt;br /&gt;
*YP 5.3.3 Build Date 2026-03-09&lt;br /&gt;
*YP 5.3.3 Release Date 2026-03-20&lt;br /&gt;
*YP 5.0.17 Build Date 2026-03-16&lt;br /&gt;
*YP 5.0.17 Release Date 2026-03-23&lt;br /&gt;
*YP 4.0.35 Build Date 2026-04-06&lt;br /&gt;
*YP 4.0.35 Release Date 2026-04-17&lt;br /&gt;
*YP 5.3.4 Build Date 2026-04-13&lt;br /&gt;
*YP 5.3.4 Release Date 2026-04-24&lt;br /&gt;
*YP 5.0.18 Build Date 2026-04-20&lt;br /&gt;
*YP 5.0.18 Release Date 2026-05-01&lt;br /&gt;
*YP 5.0.19 Build Date 2026-05-26&lt;br /&gt;
*YP 5.0.19 Release Date 2026-06-05&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Yocto Project’s technical governance is through its Technical Steering Committee, more information is available at:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
https://wiki.yoctoproject.org/wiki/TSC&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Archives ==&lt;br /&gt;
*[[2026 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2025 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2024 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2023 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2022 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2021 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2020 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2019 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2018 Yocto Project Weekly Status Archive]]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Weekly_Status&amp;diff=86774</id>
		<title>Weekly Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Weekly_Status&amp;diff=86774"/>
		<updated>2026-02-24T16:03:31Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: 5.2.3 -&amp;gt; 5.3.2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Yocto Project Status 24 February 2026 ==&lt;br /&gt;
Current Dev Position: YP 6.0 M2&amp;lt;br/&amp;gt;&lt;br /&gt;
Next Deadline: YP 6.0 M2 Build Date 2026-02-16&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Next Team Meetings:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*Bug Triage meeting - Thursday 26th Feb. 7:30am PDT (https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09)&lt;br /&gt;
*Weekly Project Engineering Sync  - Tuesday 24th Feb. 8am PDT (https://zoom.us/j/990892712?pwd=cHU1MjhoM2x6ck81bkcrYjRrcmJsUT09)&lt;br /&gt;
*Yocto Project Patch Review - Thursday 26th Feb. 10am GMT and Monday 2nd Mar. 9am PDT (https://zoom.us/j/97762397148?pwd=1xk0iC9hp9SjEonaTaONwTb6iWry4Eb.1)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project data dashboard: https://dashboard.yoctoproject.org/&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Status/Updates:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 4.0.33 is due for release&lt;br /&gt;
*YP 5.0.16 is in QA&lt;br /&gt;
*YP 5.3.2 is queued for QA&lt;br /&gt;
*YP 6.0 M2 is due to build when we have patches merged&lt;br /&gt;
*We have two open high issues which need further work that will block M3: &lt;br /&gt;
**x86 kvm broken on Fedora 43 (cpu features issue?) (#16074)&lt;br /&gt;
**AB-INT: opkg-build segmentation fault (memory corruption in pseudo?) (#16078)&lt;br /&gt;
*We also have issues we need to resolve before release:&lt;br /&gt;
**Allowing non-destructive git fetcher updates for bitbake-setup&lt;br /&gt;
**Splitting wic into an external tool&lt;br /&gt;
**Kernel rust support&lt;br /&gt;
**Switching to pkg-config&lt;br /&gt;
**Deprecation of ltp (upstream dropped runltp and mandate kirk)&lt;br /&gt;
**How to improve DEBUG_BUILD?&lt;br /&gt;
**DISTRO_FEATURES changes to ‘nodistro’ in OE-Core&lt;br /&gt;
**SBOM/cve-check changes&lt;br /&gt;
*We updated “nodistro” to use 3 of the include files poky was already using:&lt;br /&gt;
**Space optimization to reduce build footprint and sstate object size&lt;br /&gt;
**Disabling most static libraries by default (build size/speed wins)&lt;br /&gt;
**Enabling security flags by default&lt;br /&gt;
*“nodistro” now also enables uninative by default to allow for better CDN sstate reuse&lt;br /&gt;
*Distros now need to use INIT_MANAGER to select their preferred init system with the default being systemd for “nodistro”. Poky’s defaults remain unchanged and we don’t have plans to change this at this time due to the work involved and impact (e.g test result comparisons).&lt;br /&gt;
*The number of intermittent failures affecting builds, both stable and development, continues to be problematic - we continue to prioritise addressing these since any given build is now statistically likely to hit one or more of them.&lt;br /&gt;
*Patches are merging but there is a backlog and we’ve had to prioritize simpler changes. We continue to struggle for bandwidth for changes needing in depth review/feedback. This could impact features making it into the LTS.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ways to contribute:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*We have several open issues for pseudo and limited maintainer time to work on them. Help from someone familiar with systems programming in C would be greatly appreciated. https://bugzilla.yoctoproject.org/buglist.cgi?list_id=661406&amp;amp;priority=High&amp;amp;priority=Medium%2B&amp;amp;product=Pseudo&amp;amp;query_format=advanced&amp;amp;resolution=---&lt;br /&gt;
*There are a large number of intermittent failures on our autobuilder, any help with investigating, reproducing or solving these issues would be welcome! https://valkyrie.yocto.io/pub/non-release/abint/&lt;br /&gt;
*Many recipes in openembedded-core would benefit from a new recipe maintainer. Please look at https://git.openembedded.org/openembedded-core/tree/meta/conf/distro/include/maintainers.inc and see if you can adopt any of the unassigned recipes.&lt;br /&gt;
*For more ways to contribute, see https://docs.google.com/document/d/18oxKWxLorfF813h82mK6yKTIHeBp_-9owFuCWbzgjOk/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;New to the project?&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*We have a list of issues we think are good places to start contributing: https://bugzilla.yoctoproject.org/buglist.cgi?quicksearch=NEWCOMER&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tracking Metrics:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*WDD 2893 (last week 2941) (https://wiki.yoctoproject.org/charts/combo.html)&lt;br /&gt;
*OE-Core/Poky Patch Metrics&lt;br /&gt;
**Total patches found: 1107 (last week 1108)&lt;br /&gt;
**Patches in the Pending State: 151 (14%) [last week 151 (14%)]&lt;br /&gt;
**https://valkyrie.yocto.io/pub/non-release/patchmetrics/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;YP 6.0 Milestone Dates:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 6.0 M2 Build Date 2026-02-16&lt;br /&gt;
*YP 6.0 M2 Release Date 2026-02-27&lt;br /&gt;
*YP 6.0 M3 Build Date 2026-03-09&lt;br /&gt;
*YP 6.0 M3 Release Date 2026-03-20&lt;br /&gt;
*YP 6.0 M4 Build Date 2026-03-30&lt;br /&gt;
*YP 6.0 M4 Release Date 2026-04-26&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upcoming dot releases:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
*YP 5.0.16 Release Date 2026-02-20&lt;br /&gt;
*YP 5.3.2 Release Date 2026-02-27&lt;br /&gt;
*YP 4.0.34 Build Date 2026-02-23&lt;br /&gt;
*YP 4.0.34 Release Date 2026-03-06&lt;br /&gt;
*YP 5.3.3 Build Date 2026-03-09&lt;br /&gt;
*YP 5.3.3 Release Date 2026-03-20&lt;br /&gt;
*YP 5.0.17 Build Date 2026-03-16&lt;br /&gt;
*YP 5.0.17 Release Date 2026-03-23&lt;br /&gt;
*YP 4.0.35 Build Date 2026-04-06&lt;br /&gt;
*YP 4.0.35 Release Date 2026-04-17&lt;br /&gt;
*YP 5.3.4 Build Date 2026-04-13&lt;br /&gt;
*YP 5.3.4 Release Date 2026-04-24&lt;br /&gt;
*YP 5.0.18 Build Date 2026-04-20&lt;br /&gt;
*YP 5.0.18 Release Date 2026-05-01&lt;br /&gt;
*YP 5.0.19 Build Date 2026-05-26&lt;br /&gt;
*YP 5.0.19 Release Date 2026-06-05&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Yocto Project’s technical governance is through its Technical Steering Committee, more information is available at:&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
https://wiki.yoctoproject.org/wiki/TSC&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Archives ==&lt;br /&gt;
*[[2026 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2025 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2024 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2023 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2022 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2021 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2020 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2019 Yocto Project Weekly Status Archive]]&lt;br /&gt;
*[[2018 Yocto Project Weekly Status Archive]]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86750</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86750"/>
		<updated>2026-01-09T11:27:03Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Set maintainer as myself for supported stable/LTS branches&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note that https://www.yoctoproject.org/development/releases/ is the preferred source of information.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This page remains as it currently contains more information.&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Wrynose &amp;lt;br/&amp;gt;(like &#039;rhinos&#039;)&lt;br /&gt;
|6.0&lt;br /&gt;
| April 2026&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.18&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Whinlatter &amp;lt;br/&amp;gt;(like &#039;win latter&#039;)&lt;br /&gt;
|5.3&lt;br /&gt;
| December 2025&lt;br /&gt;
|5.3 (December 2025)&lt;br /&gt;
|Support for 6 months (until May 2026)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.16&lt;br /&gt;
|Yoann Congal &amp;lt;yoann.congal@smile.fr&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Walnascar (aka Walna)&lt;br /&gt;
|5.2&lt;br /&gt;
| May 2025&lt;br /&gt;
|5.2.4 (October 2025)&lt;br /&gt;
|EOL since November 2025&lt;br /&gt;
|N/A&lt;br /&gt;
|2.12&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Styhead &amp;lt;br/&amp;gt;(like &#039;try head&#039;)&lt;br /&gt;
|5.1&lt;br /&gt;
| October 2024&lt;br /&gt;
|5.1.4 (April 2025)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.10&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
| 5.0.14 (December 2025)&lt;br /&gt;
|Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Yoann Congal &amp;lt;yoann.congal@smile.fr&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.4 (April 2024)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.32 (December 2025)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Yoann Congal &amp;lt;yoann.congal@smile.fr&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.33 (May 2024)&lt;br /&gt;
| EOL - LTS¹&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86749</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86749"/>
		<updated>2026-01-09T11:25:38Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Display  Walnascar as EOL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note that https://www.yoctoproject.org/development/releases/ is the preferred source of information.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This page remains as it currently contains more information.&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Wrynose &amp;lt;br/&amp;gt;(like &#039;rhinos&#039;)&lt;br /&gt;
|6.0&lt;br /&gt;
| April 2026&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.18&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Whinlatter &amp;lt;br/&amp;gt;(like &#039;win latter&#039;)&lt;br /&gt;
|5.3&lt;br /&gt;
| December 2025&lt;br /&gt;
|5.3 (December 2025)&lt;br /&gt;
|Support for 6 months (until May 2026)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.16&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Walnascar (aka Walna)&lt;br /&gt;
|5.2&lt;br /&gt;
| May 2025&lt;br /&gt;
|5.2.4 (October 2025)&lt;br /&gt;
|EOL since November 2025&lt;br /&gt;
|N/A&lt;br /&gt;
|2.12&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Styhead &amp;lt;br/&amp;gt;(like &#039;try head&#039;)&lt;br /&gt;
|5.1&lt;br /&gt;
| October 2024&lt;br /&gt;
|5.1.4 (April 2025)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.10&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
| 5.0.14 (December 2025)&lt;br /&gt;
|Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.4 (April 2024)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.32 (December 2025)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.33 (May 2024)&lt;br /&gt;
| EOL - LTS¹&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86736</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86736"/>
		<updated>2025-12-19T10:38:13Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Precise support dates for Whinlatter (6 months, dec 2025 -&amp;gt; may 2026)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note that https://www.yoctoproject.org/development/releases/ is the preferred source of information.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This page remains as it currently contains more information.&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Wrynose &amp;lt;br/&amp;gt;(like &#039;rhinos&#039;)&lt;br /&gt;
|6.0&lt;br /&gt;
| April 2026&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.18&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Whinlatter &amp;lt;br/&amp;gt;(like &#039;win latter&#039;)&lt;br /&gt;
|5.3&lt;br /&gt;
| December 2025&lt;br /&gt;
|5.3 (December 2025)&lt;br /&gt;
|Support for 6 months (until May 2026)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.16&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|Walnascar (aka Walna)&lt;br /&gt;
|5.2&lt;br /&gt;
| May 2025&lt;br /&gt;
|5.2.4 (October 2025)&lt;br /&gt;
|Support for 7 months (until November 2025)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.12&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Styhead &amp;lt;br/&amp;gt;(like &#039;try head&#039;)&lt;br /&gt;
|5.1&lt;br /&gt;
| October 2024&lt;br /&gt;
|5.1.4 (April 2025)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.10&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
| 5.0.14 (December 2025)&lt;br /&gt;
|Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.4 (April 2024)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.31 (November 2025)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.33 (May 2024)&lt;br /&gt;
| EOL - LTS¹&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86735</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86735"/>
		<updated>2025-12-19T10:35:58Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Missing space&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note that https://www.yoctoproject.org/development/releases/ is the preferred source of information.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This page remains as it currently contains more information.&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Wrynose &amp;lt;br/&amp;gt;(like &#039;rhinos&#039;)&lt;br /&gt;
|6.0&lt;br /&gt;
| April 2026&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.18&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Whinlatter &amp;lt;br/&amp;gt;(like &#039;win latter&#039;)&lt;br /&gt;
|5.3&lt;br /&gt;
| December 2025&lt;br /&gt;
|5.3 (December 2025)&lt;br /&gt;
|Support for 7 months (until April 2026)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.16&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|Walnascar (aka Walna)&lt;br /&gt;
|5.2&lt;br /&gt;
| May 2025&lt;br /&gt;
|5.2.4 (October 2025)&lt;br /&gt;
|Support for 7 months (until November 2025)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.12&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Styhead &amp;lt;br/&amp;gt;(like &#039;try head&#039;)&lt;br /&gt;
|5.1&lt;br /&gt;
| October 2024&lt;br /&gt;
|5.1.4 (April 2025)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.10&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
| 5.0.14 (December 2025)&lt;br /&gt;
|Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.4 (April 2024)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.31 (November 2025)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.33 (May 2024)&lt;br /&gt;
| EOL - LTS¹&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86704</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86704"/>
		<updated>2025-11-03T15:00:52Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Update Whinlatter release date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that https://www.yoctoproject.org/development/releases/ is the preferred source of information. This page remains as it currently contains more information.&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Wrynose&lt;br /&gt;
|6.0&lt;br /&gt;
| April 2026&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.16&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Whinlatter&lt;br /&gt;
|5.3&lt;br /&gt;
| End of November 2025&lt;br /&gt;
|&lt;br /&gt;
|Future&lt;br /&gt;
|N/A&lt;br /&gt;
|2.14&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|Walnascar (aka Walna)&lt;br /&gt;
|5.2&lt;br /&gt;
| May 2025&lt;br /&gt;
|5.2.4(October 2025)&lt;br /&gt;
|Support for 7 months (until November 2025)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.12&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Styhead &amp;lt;br/&amp;gt;(like &#039;try head&#039;)&lt;br /&gt;
|5.1&lt;br /&gt;
| October 2024&lt;br /&gt;
|5.1.4 (April 2025)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.10&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
| 5.0.12 (September 2025)&lt;br /&gt;
|Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.4 (April 2024)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.30 (October 2025)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.33 (May 2024)&lt;br /&gt;
| EOL - LTS¹&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86539</id>
		<title>Bug Triage</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86539"/>
		<updated>2025-01-23T15:53:16Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Bug Triage Order */ Update &amp;quot;graphical report&amp;quot; to valkyrie (previous was 403)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Goal =&lt;br /&gt;
The output of the bug triage meeting should be that all bugs have an owner, a target milestone, and a priority.&lt;br /&gt;
&lt;br /&gt;
Prior to the meeting, each Product Owner should review their Weekly New and High Bugs and be ready with any opens. An example open would be a bug that may need to change Products.&lt;br /&gt;
&lt;br /&gt;
= Roles =&lt;br /&gt;
* Call facilitator: Stephen Jolley (sjolley.yp.pm@gmail.com)&lt;br /&gt;
** Ensure we keep to the agenda, don&#039;t rathole on bug resolution, and stay within our time block.&lt;br /&gt;
* Team Leads should pre-triage bugs for their areas of responsibility. Some guidelines on what they should/shouldn&#039;t do are:&lt;br /&gt;
** a) Pre-triage should happen in the presence of the appropriate team lead,&lt;br /&gt;
** b) The bugs being pre-triaged should be the responsibility of the team in question.&lt;br /&gt;
** c) The pre-triage team should be confident when dis-positioning the bugs, taking into account the individual&#039;s workload.&lt;br /&gt;
** d) If the bug raises any doubt or needs information prior, defer it to the main bug triage team.&lt;br /&gt;
** e) To insure a bug is triaged by the main bug triage team; set its priority to Undecided.&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
* Thursdays at 07:30 Pacific Time (15:30 GMT)&lt;br /&gt;
* [https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09 Zoom Call Link]&lt;br /&gt;
* Review [https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade security issues]&lt;br /&gt;
&lt;br /&gt;
* Review Queries&lt;br /&gt;
** State number, title, and owner&lt;br /&gt;
** Owner makes any modifications&lt;br /&gt;
** Assign owner, target milestone, and priority.&lt;br /&gt;
* Opens&lt;br /&gt;
** Collect opens&lt;br /&gt;
** Discuss opens&lt;br /&gt;
&lt;br /&gt;
Note: for Minnowboard or MinnowBoard-MAX bugs go to: [[Minnow Bug Triage]]&lt;br /&gt;
&lt;br /&gt;
= Bug Triage Order =&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade Security Issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Non-Prioritized_Bugs Non-Prioritized Bugs  and Non Targeted Bugs]&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?columnlist=product%2Ccomponent%2Cassigned_to%2Cbug_status%2Cresolution%2Cshort_desc%2Ctarget_milestone%2Cchangeddate&amp;amp;list_id=657544&amp;amp;query_format=advanced&amp;amp;resolution=---&amp;amp;status_whiteboard=AB-INT&amp;amp;status_whiteboard_type=allwordssubstr Autobuilder issues] ([https://valkyrie.yocto.io/pub/non-release/abint/ graphical report (valkyrie)])&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#High_Enhancements.2FBugs High Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.2_Unassigned_Enhancements/Bugs Medium+ 5.2 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.99_Unassigned_Enhancements/Bugs Medium+ 5.99 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#NEEDINFO NEEDINFO]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Re-Opened Reopened]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Old_Milestone Old Milestone]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Future_.26_5.99_Milestones Future &amp;amp; 5.99 Milestones]&lt;br /&gt;
&lt;br /&gt;
* Note/Suggestion for the Weekly Triage Meeting: Open the first link in a new browser window and then each additional link in a new tab in that new window.  Close the new window when the triage meeting is done.&lt;br /&gt;
&lt;br /&gt;
= Bug Criteria =&lt;br /&gt;
* Priority-Severity&lt;br /&gt;
** High: Two Week - shouldn&#039;t slip to next milestone without review by Triage team.&lt;br /&gt;
** Medium+: Milestone Target Required&lt;br /&gt;
** Medium: Nice to have for milestone, should have for release&lt;br /&gt;
** Low: Nice to have, but no urgency&lt;br /&gt;
&lt;br /&gt;
* Future bugs and enhancements are a good idea to do, but not able in the near term to get fixed or done.  &lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* Special Case: Medium+ and Future Enhancement or Bug - These are a good idea and important to do, but not currently scheduled at this time.&lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* For more details see the wiki [[Bugzilla Configuration and Bug Tracking]]&lt;br /&gt;
&lt;br /&gt;
= Bug Status Dashboards =&lt;br /&gt;
&lt;br /&gt;
Weekly - https://wiki.yoctoproject.org/charts/combo.html&lt;br /&gt;
&lt;br /&gt;
Daily - https://wiki.yoctoproject.org/charts/daily/combo.html&lt;br /&gt;
&lt;br /&gt;
= Bug Product Searches =&lt;br /&gt;
&lt;br /&gt;
* [[Bug Product Triage]]&lt;br /&gt;
&lt;br /&gt;
= Yocto Bug Triage Searches =&lt;br /&gt;
== Newcomer Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |to=newcomer@yoctoproject.org, unassigned@yoctoproject.org&lt;br /&gt;
  |whiteboard=NEWCOMER&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority=!(Undecided)&lt;br /&gt;
  |columns=id,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found. Check for unassigned bugs.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Prioritized Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=Undecided&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Targeted Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |milestone=0.0.0&lt;br /&gt;
  |component=!(meta-cgl, meta-security, infrastructure-general, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== New This Week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |created=-1w&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=status,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary,estimated&lt;br /&gt;
}}&lt;br /&gt;
== Closed This week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |modified=-1w&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |columns=id,modified,summary,severity,priority,milestone,to,status,resolution&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== High Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=high&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.2 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=!(5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.99 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=5.99&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ Future Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=Future&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== NEEDINFO ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=NEEDINFO&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,modified,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
  |modifiedformat=date&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Re-Opened ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=REOPENED&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Old Milestone ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone= !(4.0.24, 4.0.25, 4.0.26, 4.0.27, 4.0.28, 5.0.7, 5.0.8, 5.0.9, 5.1.2, 5.1.3, 5.2, 5.2 M2, 5.2 M3, 5.2 M4, 5.3, 5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future Dot Releases==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone= 4.0.21, 5.0.2&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== YP Toaster Bugs==&lt;br /&gt;
Please refer to the [[Bug_Triage_Toaster]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== YP Archived Queries==&lt;br /&gt;
Please refer to the [[Bug_Triage_Archive]] Page&lt;br /&gt;
&lt;br /&gt;
== YP BSP Team Triage==&lt;br /&gt;
Please refer to the [[BSP Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
== YP Validation and Infrastructure Team Triage==&lt;br /&gt;
Please refer to the [[Validation and Infrastructure Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 5.99 Milestones ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99, 5.99&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority&lt;br /&gt;
  |sort=modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 3.99 Milestones Check ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99&lt;br /&gt;
  |whiteboard=REVIEW, QA, QA REVIEW, OB, OB REVIEW&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=whiteboard,modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quarterly Milestones==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone=Q1,Q2,Q3,Q4&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,modified,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86360</id>
		<title>Bug Triage</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86360"/>
		<updated>2024-06-13T14:46:21Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Bug Triage Order */ Add &amp;quot;Target milestone&amp;quot; column to the Autobuilder link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Goal =&lt;br /&gt;
The output of the bug triage meeting should be that all bugs have an owner, a target milestone, and a priority.&lt;br /&gt;
&lt;br /&gt;
Prior to the meeting, each Product Owner should review their Weekly New and High Bugs and be ready with any opens. An example open would be a bug that may need to change Products.&lt;br /&gt;
&lt;br /&gt;
= Roles =&lt;br /&gt;
* Call facilitator: Stephen Jolley (sjolley.yp.pm@gmail.com)&lt;br /&gt;
** Ensure we keep to the agenda, don&#039;t rathole on bug resolution, and stay within our time block.&lt;br /&gt;
* Team Leads should pre-triage bugs for their areas of responsibility. Some guidelines on what they should/shouldn&#039;t do are:&lt;br /&gt;
** a) Pre-triage should happen in the presence of the appropriate team lead,&lt;br /&gt;
** b) The bugs being pre-triaged should be the responsibility of the team in question.&lt;br /&gt;
** c) The pre-triage team should be confident when dis-positioning the bugs, taking into account the individual&#039;s workload.&lt;br /&gt;
** d) If the bug raises any doubt or needs information prior, defer it to the main bug triage team.&lt;br /&gt;
** e) To insure a bug is triaged by the main bug triage team; set its priority to Undecided.&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
* Thursdays at 07:30 Pacific Time (15:30 GMT)&lt;br /&gt;
* [https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09 Zoom Call Link]&lt;br /&gt;
* Review [https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade security issues]&lt;br /&gt;
&lt;br /&gt;
* Review Queries&lt;br /&gt;
** State number, title, and owner&lt;br /&gt;
** Owner makes any modifications&lt;br /&gt;
** Assign owner, target milestone, and priority.&lt;br /&gt;
* Opens&lt;br /&gt;
** Collect opens&lt;br /&gt;
** Discuss opens&lt;br /&gt;
&lt;br /&gt;
Note: for Minnowboard or MinnowBoard-MAX bugs go to: [[Minnow Bug Triage]]&lt;br /&gt;
&lt;br /&gt;
= Bug Triage Order =&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade Security Issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Non-Prioritized_Bugs Non-Prioritized Bugs  and Non Targeted Bugs]&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?columnlist=product%2Ccomponent%2Cassigned_to%2Cbug_status%2Cresolution%2Cshort_desc%2Ctarget_milestone%2Cchangeddate&amp;amp;list_id=657544&amp;amp;query_format=advanced&amp;amp;resolution=---&amp;amp;status_whiteboard=AB-INT&amp;amp;status_whiteboard_type=allwordssubstr Autobuilder issues] ([https://autobuilder.yocto.io/pub/non-release/abint/ graphical report])&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#High_Enhancements.2FBugs High Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.1_Unassigned_Enhancements/Bugs Medium+ 5.1 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.99_Unassigned_Enhancements/Bugs Medium+ 5.99 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#NEEDINFO NEEDINFO]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Re-Opened Reopened]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Old_Milestone Old Milestone]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Future_.26_5.99_Milestones Future &amp;amp; 5.99 Milestones]&lt;br /&gt;
&lt;br /&gt;
* Note/Suggestion for the Weekly Triage Meeting: Open the first link in a new browser window and then each additional link in a new tab in that new window.  Close the new window when the triage meeting is done.&lt;br /&gt;
&lt;br /&gt;
= Bug Criteria =&lt;br /&gt;
* Priority-Severity&lt;br /&gt;
** High: Two Week - shouldn&#039;t slip to next milestone without review by Triage team.&lt;br /&gt;
** Medium+: Milestone Target Required&lt;br /&gt;
** Medium: Nice to have for milestone, should have for release&lt;br /&gt;
** Low: Nice to have, but no urgency&lt;br /&gt;
&lt;br /&gt;
* Future bugs and enhancements are a good idea to do, but not able in the near term to get fixed or done.  &lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* Special Case: Medium+ and Future Enhancement or Bug - These are a good idea and important to do, but not currently scheduled at this time.&lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* For more details see the wiki [[Bugzilla Configuration and Bug Tracking]]&lt;br /&gt;
&lt;br /&gt;
= Bug Status Dashboards =&lt;br /&gt;
&lt;br /&gt;
Weekly - https://wiki.yoctoproject.org/charts/combo.html&lt;br /&gt;
&lt;br /&gt;
Daily - https://wiki.yoctoproject.org/charts/daily/combo.html&lt;br /&gt;
&lt;br /&gt;
= Bug Product Searches =&lt;br /&gt;
&lt;br /&gt;
* [[Bug Product Triage]]&lt;br /&gt;
&lt;br /&gt;
= Yocto Bug Triage Searches =&lt;br /&gt;
== Newcomer Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |to=newcomer@yoctoproject.org, unassigned@yoctoproject.org&lt;br /&gt;
  |whiteboard=NEWCOMER&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority=!(Undecided)&lt;br /&gt;
  |columns=id,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found. Check for unassigned bugs.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Prioritized Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=Undecided&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Targeted Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |milestone=0.0.0&lt;br /&gt;
  |component=!(meta-cgl, meta-security, infrastructure-general, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== New This Week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |created=-1w&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=status,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary,estimated&lt;br /&gt;
}}&lt;br /&gt;
== Closed This week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |modified=-1w&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |columns=id,modified,summary,severity,priority,milestone,to,status,resolution&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== High Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=high&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.1 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=!(5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.99 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=5.99&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ Future Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=Future&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== NEEDINFO ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=NEEDINFO&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,modified,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
  |modifiedformat=date&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Re-Opened ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=REOPENED&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Old Milestone ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone= !(3.1.34, 4.0.20,  4.0.21,  4.0.22, 5.0.2, 5.0.3, 5.0.4, 5.1, 5.1 M2, 5.1 M3, 5.1 M4, 5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future Dot Releases==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone= 3.1.27, 3.1.28, 3.1.29, 4.0.12, 4.0.13, 4.0.14, 4.2.3&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== YP Toaster Bugs==&lt;br /&gt;
Please refer to the [[Bug_Triage_Toaster]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== YP Archived Queries==&lt;br /&gt;
Please refer to the [[Bug_Triage_Archive]] Page&lt;br /&gt;
&lt;br /&gt;
== YP BSP Team Triage==&lt;br /&gt;
Please refer to the [[BSP Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
== YP Validation and Infrastructure Team Triage==&lt;br /&gt;
Please refer to the [[Validation and Infrastructure Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 5.99 Milestones ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99, 5.99&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority&lt;br /&gt;
  |sort=modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 3.99 Milestones Check ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99&lt;br /&gt;
  |whiteboard=REVIEW, QA, QA REVIEW, OB, OB REVIEW&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=whiteboard,modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quarterly Milestones==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone=Q1,Q2,Q3,Q4&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,modified,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86295</id>
		<title>Bug Triage</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86295"/>
		<updated>2024-04-04T14:31:01Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Bug Triage Order */ &amp;quot;Medium+ 5.0/5.1 Unassigned Enhancements/Bugs&amp;quot; link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Goal =&lt;br /&gt;
The output of the bug triage meeting should be that all bugs have an owner, a target milestone, and a priority.&lt;br /&gt;
&lt;br /&gt;
Prior to the meeting, each Product Owner should review their Weekly New and High Bugs and be ready with any opens. An example open would be a bug that may need to change Products.&lt;br /&gt;
&lt;br /&gt;
= Roles =&lt;br /&gt;
* Call facilitator: Stephen Jolley (sjolley.yp.pm@gmail.com)&lt;br /&gt;
** Ensure we keep to the agenda, don&#039;t rathole on bug resolution, and stay within our time block.&lt;br /&gt;
* Team Leads should pre-triage bugs for their areas of responsibility. Some guidelines on what they should/shouldn&#039;t do are:&lt;br /&gt;
** a) Pre-triage should happen in the presence of the appropriate team lead,&lt;br /&gt;
** b) The bugs being pre-triaged should be the responsibility of the team in question.&lt;br /&gt;
** c) The pre-triage team should be confident when dis-positioning the bugs, taking into account the individual&#039;s workload.&lt;br /&gt;
** d) If the bug raises any doubt or needs information prior, defer it to the main bug triage team.&lt;br /&gt;
** e) To insure a bug is triaged by the main bug triage team; set its priority to Undecided.&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
* Thursdays at 07:30 Pacific Time (15:30 GMT)&lt;br /&gt;
* [https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09 Zoom Call Link]&lt;br /&gt;
* Review [https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade security issues]&lt;br /&gt;
&lt;br /&gt;
* Review Queries&lt;br /&gt;
** State number, title, and owner&lt;br /&gt;
** Owner makes any modifications&lt;br /&gt;
** Assign owner, target milestone, and priority.&lt;br /&gt;
* Opens&lt;br /&gt;
** Collect opens&lt;br /&gt;
** Discuss opens&lt;br /&gt;
&lt;br /&gt;
Note: for Minnowboard or MinnowBoard-MAX bugs go to: [[Minnow Bug Triage]]&lt;br /&gt;
&lt;br /&gt;
= Bug Triage Order =&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade Security Issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Non-Prioritized_Bugs Non-Prioritized Bugs  and Non Targeted Bugs]&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=652616&amp;amp;query_format=advanced&amp;amp;resolution=---&amp;amp;status_whiteboard=AB-INT&amp;amp;status_whiteboard_type=allwordssubstr Autobuilder issues] ([https://autobuilder.yocto.io/pub/non-release/abint/ graphical report])&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#High_Enhancements.2FBugs High Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.0/5.1_Unassigned_Enhancements/Bugs Medium+ 5.0/5.1 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.99_Unassigned_Enhancements/Bugs Medium+ 5.99 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#NEEDINFO NEEDINFO]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Re-Opened Reopened]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Old_Milestone Old Milestone]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Future_.26_5.99_Milestones Future &amp;amp; 5.99 Milestones]&lt;br /&gt;
&lt;br /&gt;
* Note/Suggestion for the Weekly Triage Meeting: Open the first link in a new browser window and then each additional link in a new tab in that new window.  Close the new window when the triage meeting is done.&lt;br /&gt;
&lt;br /&gt;
= Bug Criteria =&lt;br /&gt;
* Priority-Severity&lt;br /&gt;
** High: Two Week - shouldn&#039;t slip to next milestone without review by Triage team.&lt;br /&gt;
** Medium+: Milestone Target Required&lt;br /&gt;
** Medium: Nice to have for milestone, should have for release&lt;br /&gt;
** Low: Nice to have, but no urgency&lt;br /&gt;
&lt;br /&gt;
* Future bugs and enhancements are a good idea to do, but not able in the near term to get fixed or done.  &lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* Special Case: Medium+ and Future Enhancement or Bug - These are a good idea and important to do, but not currently scheduled at this time.&lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* For more details see the wiki [[Bugzilla Configuration and Bug Tracking]]&lt;br /&gt;
&lt;br /&gt;
= Bug Status Dashboards =&lt;br /&gt;
&lt;br /&gt;
Weekly - https://wiki.yoctoproject.org/charts/combo.html&lt;br /&gt;
&lt;br /&gt;
Daily - https://wiki.yoctoproject.org/charts/daily/combo.html&lt;br /&gt;
&lt;br /&gt;
= Bug Product Searches =&lt;br /&gt;
&lt;br /&gt;
* [[Bug Product Triage]]&lt;br /&gt;
&lt;br /&gt;
= Yocto Bug Triage Searches =&lt;br /&gt;
== Newcomer Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |to=newcomer@yoctoproject.org, unassigned@yoctoproject.org&lt;br /&gt;
  |whiteboard=NEWCOMER&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority=!(Undecided)&lt;br /&gt;
  |columns=id,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found. Check for unassigned bugs.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Prioritized Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=Undecided&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Targeted Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |milestone=0.0.0&lt;br /&gt;
  |component=!(meta-cgl, meta-security, infrastructure-general, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== New This Week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |created=-1w&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=status,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary,estimated&lt;br /&gt;
}}&lt;br /&gt;
== Closed This week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |modified=-1w&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |columns=id,modified,summary,severity,priority,milestone,to,status,resolution&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== High Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=high&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.0/5.1 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=!(5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.99 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=5.99&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ Future Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=Future&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== NEEDINFO ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=NEEDINFO&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,modified,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
  |modifiedformat=date&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Re-Opened ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=REOPENED&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Old Milestone ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone= !(3.1.33, 3.1.34, 4.0.17, 4.0.18, 4.0.19, 4.0.20, 5.0, 5.0 M4, 5.1, 5.1 M1, 5.1 M2, 5.1 M3, 5.1 M4, 5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future Dot Releases==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone= 3.1.27, 3.1.28, 3.1.29, 4.0.12, 4.0.13, 4.0.14, 4.2.3&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== YP Toaster Bugs==&lt;br /&gt;
Please refer to the [[Bug_Triage_Toaster]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== YP Archived Queries==&lt;br /&gt;
Please refer to the [[Bug_Triage_Archive]] Page&lt;br /&gt;
&lt;br /&gt;
== YP BSP Team Triage==&lt;br /&gt;
Please refer to the [[BSP Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
== YP Validation and Infrastructure Team Triage==&lt;br /&gt;
Please refer to the [[Validation and Infrastructure Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 5.99 Milestones ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99, 5.99&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority&lt;br /&gt;
  |sort=modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 3.99 Milestones Check ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99&lt;br /&gt;
  |whiteboard=REVIEW, QA, QA REVIEW, OB, OB REVIEW&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=whiteboard,modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quarterly Milestones==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone=Q1,Q2,Q3,Q4&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,modified,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=AutoBuilder_Cluster_Setup&amp;diff=86270</id>
		<title>AutoBuilder Cluster Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=AutoBuilder_Cluster_Setup&amp;diff=86270"/>
		<updated>2024-03-18T21:29:01Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* As root */ Fix QuickStart doc URL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;While the instructions below are targeted at setting up a new AutoBuilder cluster, they are equally valid for an single machine with combined controller and worker, except you probably won&#039;t use a NAS for storage. The controller portion requires only 2 GB of local disk space; the worker requires 2+ TB to hold all the build temp files and git repos. If build artifacts and a local sstate mirror are included, additional worker space is required.&lt;br /&gt;
&lt;br /&gt;
==As root==&lt;br /&gt;
* Install base OS with minimal target&lt;br /&gt;
* Install the requirements from https://docs.yoctoproject.org/brief-yoctoprojectqs/index.html#build-host-packages&lt;br /&gt;
** (Note: if you plan to build the poky-eclipse-neon plugin, openjdk-headless 1.8 is required.)&lt;br /&gt;
* If you plan to run the sanity tests (which is typical for an AB), the following additional packages need to be installed:&lt;br /&gt;
** GitPython for Python2 and Python3&lt;br /&gt;
** zstd &amp;amp; lz4 (or liblz4-tool)&lt;br /&gt;
** xsltproc&lt;br /&gt;
** gnupg&lt;br /&gt;
** vncserver (whichever one is provided by the distro is fine)&lt;br /&gt;
* Add pokybuild user (uid=6000, or for older clusters 1006)&lt;br /&gt;
* Add pokybuild user to &amp;quot;users&amp;quot; group (gid 100) (if &amp;quot;users&amp;quot; group does not exist, create it)&lt;br /&gt;
* Following the instructions from https://wiki.yoctoproject.org/wiki/How_to_enable_KVM_for_Poky_qemu, give /dev/kvm permissions to the pokybuild user.&lt;br /&gt;
* If a &amp;quot;kvm&amp;quot; group does not exist, add it to /etc/group and ensure /dev/kvm gid is set to &amp;quot;kvm&amp;quot; and is mode 660. Add pokybuild user to the &amp;quot;kvm&amp;quot; group.&lt;br /&gt;
* git clone --single-branch https://git.yoctoproject.org/git/poky /root/poky  (in /root for historical reasons, should change in the future)&lt;br /&gt;
* &#039;&#039;If adding tap devs for sanity testing.&#039;&#039; Install https://downloads.yoctoproject.org/releases/yocto/yocto-{latest_release}/toolchain/x86_64/poky-glibc-x86_64-core-image-sato-core2-64-toolchain-{relver}.sh to /opt/poky.&lt;br /&gt;
* Add startup scripts to create tap devs and start vncserver, in /etc/rc.local, /etc/init.d/boot.local, or as systemd unit files, which should perform the following:&lt;br /&gt;
** cd /root/poky/scripts/; ./runqemu-gen-tapdevs 6000 100 32 /opt/poky/sysroots/x86_64-pokysdk-linux/  &lt;br /&gt;
** /bin/su - pokybuild -c &amp;quot;/usr/bin/vncserver&amp;quot;&lt;br /&gt;
**Note that the location of the buildtools might actually be different than the example shown here, depending on the default path, etc. If you run into a tunctl error when generating the tapdevs, it&#039;s likely a path problem.&lt;br /&gt;
** You will need to run vncserver once as the pokybuild user, and set the password. The password of &amp;quot;builder&amp;quot; is generally used. Sanity tests require vncserver to listen on port 5901, the default.&lt;br /&gt;
* Disable or edit firewall rules to allow all connections to the tap devices. This allows sanity tests to connect to booted images.&lt;br /&gt;
* Install nfs-utils or nfs-common, add Domain to /etc/idmapd.conf, fstab entry, mount NAS under /srv/autobuilder.&lt;br /&gt;
* We use more watches then the defaults generally allow so, echo &amp;quot;fs.inotify.max_user_watches=65536&amp;quot; &amp;gt;&amp;gt; /etc/sysctl.conf&lt;br /&gt;
* We open more files than most distros allow so adjust ulimits. Add to /etc/security/limits.conf&lt;br /&gt;
** *            hard    nproc           515294&lt;br /&gt;
** *            soft    nproc           514543&lt;br /&gt;
** *            soft    nofile           131072&lt;br /&gt;
** *            hard    nofile           131072&lt;br /&gt;
** *            hard    memlock          16384&lt;br /&gt;
** *            soft    memlock          16384&lt;br /&gt;
&lt;br /&gt;
==As pokybuild==&lt;br /&gt;
&lt;br /&gt;
* Set up buildset-config, either:&lt;br /&gt;
** Add ssh key to clone production yocto-autobuilder&lt;br /&gt;
** git clone https://git.yoctoproject.org/git/yocto-autobuilder &amp;amp;&amp;amp; cd yocto-autobuilder &amp;amp;&amp;amp; git remote add prod git@git.yoctoproject.org:yocto-autobuilder-production &amp;amp;&amp;amp; git fetch prod &amp;amp;&amp;amp; git checkout -b yoctoio prod/yoctoio&lt;br /&gt;
* or:&lt;br /&gt;
** edit one of the several examples included in repo e.g. cp -r buildset-config.controller buildset-config&lt;br /&gt;
&lt;br /&gt;
* configure git&lt;br /&gt;
** git config --global gc.auto 0&lt;br /&gt;
** git config --global user.name pokybuild&lt;br /&gt;
** git config --global user.email pokybuild@$(hostname -f)&lt;br /&gt;
* update config/autobuilder.conf and yocto-worker/buildbot.tac&lt;br /&gt;
* Start the worker&lt;br /&gt;
** touch ~/yocto-autobuilder/.setupdone&lt;br /&gt;
** . yocto-autobuilder-setup &lt;br /&gt;
** ./yocto-start-autobuilder worker&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86206</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86206"/>
		<updated>2024-02-07T14:26:55Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-6693&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52355 CVE-2023-52355] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/621&lt;br /&gt;
Closed with a doc patch only&lt;br /&gt;
=&amp;gt; This one is here to stay? (Dev &amp;amp; security people don&#039;t seem to agree on what constitute a vulnerability)&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52356 CVE-2023-52356] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Simone Weiß sent a patch : https://lists.openembedded.org/g/openembedded-core/message/195011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86205</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86205"/>
		<updated>2024-02-07T14:24:00Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-6683&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52355 CVE-2023-52355] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/621&lt;br /&gt;
Closed with a doc patch only&lt;br /&gt;
=&amp;gt; This one is here to stay? (Dev &amp;amp; security people don&#039;t seem to agree on what constitute a vulnerability)&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52356 CVE-2023-52356] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Simone Weiß sent a patch : https://lists.openembedded.org/g/openembedded-core/message/195011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86204</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86204"/>
		<updated>2024-02-07T14:19:56Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-52356&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52355 CVE-2023-52355] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/621&lt;br /&gt;
Closed with a doc patch only&lt;br /&gt;
=&amp;gt; This one is here to stay? (Dev &amp;amp; security people don&#039;t seem to agree on what constitute a vulnerability)&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52356 CVE-2023-52356] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Simone Weiß sent a patch : https://lists.openembedded.org/g/openembedded-core/message/195011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86203</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86203"/>
		<updated>2024-02-07T14:17:13Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-52355 ordering&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52355 CVE-2023-52355] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/621&lt;br /&gt;
Closed with a doc patch only&lt;br /&gt;
=&amp;gt; This one is here to stay? (Dev &amp;amp; security people don&#039;t seem to agree on what constitute a vulnerability)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86202</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86202"/>
		<updated>2024-02-07T14:16:34Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-52355&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52355 CVE-2023-52355] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/621&lt;br /&gt;
Closed with a doc patch only&lt;br /&gt;
=&amp;gt; This one is here to stay? (Dev &amp;amp; security people don&#039;t seem to agree on what constitute a vulnerability)&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86201</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86201"/>
		<updated>2024-02-07T14:12:21Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-51767 ordering&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86200</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86200"/>
		<updated>2024-02-07T14:11:21Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-51767 (openssh) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86199</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86199"/>
		<updated>2024-02-07T14:09:07Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-5088&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86198</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86198"/>
		<updated>2024-02-07T14:07:02Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-48795 CVE-2023-51384 CVE-2023-51385&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86197</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86197"/>
		<updated>2024-02-07T14:02:57Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-4693&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86196</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86196"/>
		<updated>2024-02-07T14:01:21Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-4692&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86195</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86195"/>
		<updated>2024-02-07T13:53:10Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-42366 (busybox) */ syntax fix (again)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86194</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86194"/>
		<updated>2024-02-07T13:52:42Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-42366 (busybox) */ syntax fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – [PATCH] awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86193</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86193"/>
		<updated>2024-02-07T13:52:06Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-42363 CVE-2023-42364 CVE-2023-42365 CVE-2023-42366&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [Attachment 9697 Details for Bug 15874 – [PATCH] awk.c: fix CVE-2023-42366 (bug #15874) https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86192</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86192"/>
		<updated>2024-02-07T13:48:49Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-25584 (binutils) */ CVE-2023-38559&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86191</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86191"/>
		<updated>2024-02-07T13:46:50Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-3019 (qemu) */ CVE-2023-3164&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86190</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86190"/>
		<updated>2024-02-07T13:45:03Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* CVE-2023-3019 (qemu) */ NVD pinged 06/02/2024.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86189</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86189"/>
		<updated>2024-02-07T11:34:25Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: CVE-2023-25584&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36402 CVE-2022-36402] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86176</id>
		<title>Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Releases&amp;diff=86176"/>
		<updated>2024-01-26T21:24:13Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Added a Notes column to add Recipe_Versions link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- keywords: release names codenames versions version names numbers branches branchx --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Release Activity==&lt;br /&gt;
&lt;br /&gt;
See also [https://docs.yoctoproject.org/dev/_images/releases.svg a graphical release timeline].&lt;br /&gt;
&lt;br /&gt;
Releases can be downloaded at https://www.yoctoproject.org/software-overview/downloads/&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
!Codename&lt;br /&gt;
!Yocto Project Version&lt;br /&gt;
!Release Date&lt;br /&gt;
!Current Version&lt;br /&gt;
!Support Level&lt;br /&gt;
!Poky Version&lt;br /&gt;
!BitBake branch&lt;br /&gt;
! Maintainer&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Scarthgap&lt;br /&gt;
|5.0&lt;br /&gt;
| April 2024&lt;br /&gt;
|&lt;br /&gt;
|Future - Long Term Support (until April 2028)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.8&lt;br /&gt;
|Richard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt;&lt;br /&gt;
|[[Recipe_Versions|Recipe versions]]&lt;br /&gt;
|-&lt;br /&gt;
|Nanbield &amp;lt;br/&amp;gt;(like &#039;man field&#039;)&lt;br /&gt;
|4.3&lt;br /&gt;
| November 2023&lt;br /&gt;
| 4.3.2 (January 2024)&lt;br /&gt;
|Support for 7 months (until May 2024)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.6&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Mickledore&lt;br /&gt;
|4.2&lt;br /&gt;
| May 2023&lt;br /&gt;
| 4.2.4 (December 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.4&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Langdale&lt;br /&gt;
|4.1&lt;br /&gt;
| October 2022&lt;br /&gt;
| 4.1.4 (May 2023)&lt;br /&gt;
| EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|2.2&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Kirkstone &amp;lt;br/&amp;gt;(like &#039;kirk stun&#039;)&lt;br /&gt;
|4.0&lt;br /&gt;
|May 2022&lt;br /&gt;
|4.0.15 (December 2023)&lt;br /&gt;
|Long Term Support (Apr. 2026¹)&lt;br /&gt;
|N/A&lt;br /&gt;
|2.0&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Honister&lt;br /&gt;
|3.4&lt;br /&gt;
|October 2021&lt;br /&gt;
|3.4.4 (May 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.52&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Hardknott&lt;br /&gt;
|3.3&lt;br /&gt;
|April 2021&lt;br /&gt;
|3.3.6 (April 2022)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.50&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Gatesgarth&lt;br /&gt;
|3.2&lt;br /&gt;
|Oct 2020&lt;br /&gt;
|3.2.4 (May 2021)&lt;br /&gt;
|EOL&lt;br /&gt;
|N/A&lt;br /&gt;
|1.48&lt;br /&gt;
|Anuj Mittal &amp;lt;anuj.mittal@intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Dunfell&lt;br /&gt;
|3.1&lt;br /&gt;
|April 2020&lt;br /&gt;
|3.1.30 (December 2023)&lt;br /&gt;
|Long Term Support (until Apr. 2024¹)&lt;br /&gt;
|23.0&lt;br /&gt;
|1.46&lt;br /&gt;
|Steve Sakoman &amp;lt;steve@sakoman.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Zeus&lt;br /&gt;
|3.0&lt;br /&gt;
|October 2019&lt;br /&gt;
|3.0.4 (August 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|22.0.3&lt;br /&gt;
|1.44&lt;br /&gt;
| Anuj/Armin&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Warrior&lt;br /&gt;
|2.7&lt;br /&gt;
|April 2019&lt;br /&gt;
|2.7.4 (June 2020)&lt;br /&gt;
|EOL&lt;br /&gt;
|21.0&lt;br /&gt;
|1.42&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Thud&lt;br /&gt;
|2.6&lt;br /&gt;
|Nov 2018&lt;br /&gt;
|2.6.4 (October 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|20.0&lt;br /&gt;
|1.40&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Sumo&lt;br /&gt;
|2.5&lt;br /&gt;
|April 2018&lt;br /&gt;
|2.5.3 (April 2019)&lt;br /&gt;
|EOL&lt;br /&gt;
|19.0&lt;br /&gt;
|1.38&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Rocko&lt;br /&gt;
|2.4&lt;br /&gt;
|Oct 2017&lt;br /&gt;
|2.4.4 (November 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|18.0&lt;br /&gt;
|1.36&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pyro&lt;br /&gt;
|2.3&lt;br /&gt;
|May 2017&lt;br /&gt;
|2.3.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|17.0&lt;br /&gt;
|1.34&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Morty&lt;br /&gt;
|2.2&lt;br /&gt;
|Nov 2016&lt;br /&gt;
|2.2.4 (July 2018)&lt;br /&gt;
|EOL&lt;br /&gt;
|16.0&lt;br /&gt;
|1.32&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Krogoth&lt;br /&gt;
|2.1&lt;br /&gt;
|Apr 2016&lt;br /&gt;
|2.1.3 (July 2017)&lt;br /&gt;
|EOL&lt;br /&gt;
|15.0&lt;br /&gt;
|1.30&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Jethro&lt;br /&gt;
|2.0&lt;br /&gt;
|Nov 2015&lt;br /&gt;
|2.0.3 (January 2016)&lt;br /&gt;
|EOL&lt;br /&gt;
|14.0&lt;br /&gt;
|1.28&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Fido&lt;br /&gt;
|1.8&lt;br /&gt;
|Apr 2015&lt;br /&gt;
|1.8.2&lt;br /&gt;
|EOL&lt;br /&gt;
|13.0&lt;br /&gt;
|1.26&lt;br /&gt;
|Joshua Lock &amp;lt;joshua.g.lock@intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dizzy&lt;br /&gt;
|1.7&lt;br /&gt;
|Oct 2014&lt;br /&gt;
|1.7.3&lt;br /&gt;
|EOL&lt;br /&gt;
|12.0&lt;br /&gt;
|1.24&lt;br /&gt;
| Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Daisy&lt;br /&gt;
|1.6&lt;br /&gt;
|Apr 2014&lt;br /&gt;
|1.6.3&lt;br /&gt;
|EOL&lt;br /&gt;
|11.0&lt;br /&gt;
|1.22&lt;br /&gt;
| Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dora&lt;br /&gt;
|1.5&lt;br /&gt;
|Oct 2013&lt;br /&gt;
|1.5.4&lt;br /&gt;
|EOL&lt;br /&gt;
|10.0&lt;br /&gt;
|1.20&lt;br /&gt;
| Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Dylan&lt;br /&gt;
|1.4&lt;br /&gt;
|Apr 2013&lt;br /&gt;
|1.4.3&lt;br /&gt;
|EOL&lt;br /&gt;
|9.0&lt;br /&gt;
|1.18&lt;br /&gt;
| Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Danny&lt;br /&gt;
|1.3&lt;br /&gt;
|Oct 2012&lt;br /&gt;
|1.3.2&lt;br /&gt;
|EOL&lt;br /&gt;
|8.0&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt; &lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Denzil&lt;br /&gt;
|1.2&lt;br /&gt;
|Apr 2012&lt;br /&gt;
|1.2.2&lt;br /&gt;
|EOL&lt;br /&gt;
|7.0&lt;br /&gt;
|1.15&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Edison&lt;br /&gt;
|1.1&lt;br /&gt;
|Oct 2011&lt;br /&gt;
|1.1.2&lt;br /&gt;
|EOL&lt;br /&gt;
|6.0&lt;br /&gt;
|1.13&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Bernard&lt;br /&gt;
|1.0&lt;br /&gt;
|Apr 2011&lt;br /&gt;
|1.0.2&lt;br /&gt;
|EOL&lt;br /&gt;
|5.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Laverne&lt;br /&gt;
|0.9&lt;br /&gt;
|Oct 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|4.0&lt;br /&gt;
|1.11&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Green&lt;br /&gt;
|N/A&lt;br /&gt;
|11 June 2010&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.3&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Purple&lt;br /&gt;
|N/A&lt;br /&gt;
|15 Dec 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.2&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Pinky&lt;br /&gt;
|N/A&lt;br /&gt;
|12 Nov 2009&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.1&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Blinky&lt;br /&gt;
|N/A&lt;br /&gt;
|1 Aug 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|3.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Clyde&lt;br /&gt;
|N/A&lt;br /&gt;
|19 Jan 2007&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|2.0&lt;br /&gt;
|&lt;br /&gt;
|-style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|Inky&lt;br /&gt;
|N/A&lt;br /&gt;
|10 Feb 2006&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|1.0&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; see also [[Stable Release and LTS]], [[Linux Yocto]], [[Planning]] and [[Release Feature Table]] pages. EOL means some community support on email lists but no commit updates in the repos. There is also OS Vendor support for some Yocto EOL releases.&lt;br /&gt;
&lt;br /&gt;
¹ The 3.1 series and 4.0 were originally planned for two years but extended to four. Future LTS releases are planned for 4 years.&lt;br /&gt;
&lt;br /&gt;
== Releases Links==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Yocto Project Release&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Code Name&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Poky version&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Maintainer&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Features&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Schedule&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Plan&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;QA Test Report&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Release notes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.4&lt;br /&gt;
| Honister&lt;br /&gt;
| 26.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.4_Features]]&lt;br /&gt;
| [[Yocto_3.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.4_Status]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan | Yocto_3.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.4_Release_Test_Plan#Execution_History | 3.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/229 3.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.3&lt;br /&gt;
| Hardknott&lt;br /&gt;
| 25.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.3_Features]]&lt;br /&gt;
| [[Yocto_3.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.3_Status]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan | Yocto_3.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.3_Release_Test_Plan#Execution_History | 3.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto-announce/message/215 3.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 3.2&lt;br /&gt;
| Gatesgarth&lt;br /&gt;
| 24.0&lt;br /&gt;
| Anuj Mittal&lt;br /&gt;
| [[Yocto_3.2_Features]]&lt;br /&gt;
| [[Yocto_3.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.2_Status]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan | Yocto_3.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.2_Release_Test_Plan#Execution_History | 3.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/51262 3.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.1&lt;br /&gt;
| Dunfell&lt;br /&gt;
| 23.0&lt;br /&gt;
| Steve Sakoman&lt;br /&gt;
| [[Yocto_3.1_Features]]&lt;br /&gt;
| [[Yocto_3.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v3.1_Status]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan | Yocto_3.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_3.1_Release_Test_Plan#Execution_History | 3.1 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/g/yocto/message/49201 3.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 3.0&lt;br /&gt;
| Zeus&lt;br /&gt;
| 22.0&lt;br /&gt;
| Armin Kuster/Anuj Mittal&lt;br /&gt;
| [[Yocto_2.8_Features]]&lt;br /&gt;
| [[Yocto_2.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.8_Status]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan | Yocto_2.8_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.8_Release_Test_Plan#Execution_History | 2.8 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-October/047111.html 3.0 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.7&lt;br /&gt;
| Warrior&lt;br /&gt;
| 21.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.7_Features]]&lt;br /&gt;
| [[Yocto_2.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.7_Status]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan | Yocto_2.7_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.7_Release_Test_Plan#Execution_History | 2.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto/2019-May/045028.html 2.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.6&lt;br /&gt;
| Thud&lt;br /&gt;
| 20.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.6_Features]]&lt;br /&gt;
| [[Yocto_2.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.6_Status]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan | Yocto_2.6_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.6_Release_Test_Plan#Execution_History | 2.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-November/000147.html 2.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.5&lt;br /&gt;
| Sumo&lt;br /&gt;
| 19.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.5_Features]]&lt;br /&gt;
| [[Yocto_2.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.5_Status]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan | Yocto_2.5_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.5_Release_Test_Plan#Execution_History | 2.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2018-May/000136.html 2.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.4&lt;br /&gt;
| Rocko&lt;br /&gt;
| 18.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.4_Features]]&lt;br /&gt;
| [[Yocto_2.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.4_Status]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan | Yocto_2.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.4_Release_Test_Plan#Execution_History | 2.4 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-October/000125.html 2.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.3&lt;br /&gt;
| Pyro&lt;br /&gt;
| 17.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.3_Features]]&lt;br /&gt;
| [[Yocto_2.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.3_Status]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan | Yocto_2.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.3_Release_Test_Plan#Execution_History | 2.3 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2017-May/000112.html 2.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.2&lt;br /&gt;
| Morty&lt;br /&gt;
| 16.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.2_Features]]&lt;br /&gt;
| [[Yocto_2.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.2_Status]]&lt;br /&gt;
| [[Yocto_2.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_Project_2.2_Release_Test_Plan#Execution_History | 2.2 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-November/000101.html 2.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.1&lt;br /&gt;
| Krogoth&lt;br /&gt;
| 15.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_2.1_Features]]&lt;br /&gt;
| [[Yocto_2.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v2.1_Status]]&lt;br /&gt;
| [[Yocto_2.1_Overall_Test_Plan]]&lt;br /&gt;
| [[2.1 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2016-May/000089.html 2.1 release notes]&lt;br /&gt;
|-&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 2.0&lt;br /&gt;
| Jethro&lt;br /&gt;
| 14.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.9_Features]]&lt;br /&gt;
| [[Yocto_1.9_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.9_Status]]&lt;br /&gt;
| &lt;br /&gt;
| [[1.9 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-November/000076.html 2.0 release notes]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| Yocto Project 1.8&lt;br /&gt;
| Fido&lt;br /&gt;
| 13.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.8_Features]]&lt;br /&gt;
| [[Yocto_1.8_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.8_Status]]&lt;br /&gt;
| [[Yocto_1.8_Overall_Test_Plan]]&lt;br /&gt;
| [[1.8 qa run history]] &lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2015-April/000062.html 1.8 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.7&lt;br /&gt;
| Dizzy&lt;br /&gt;
| 12.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.7_Features]]&lt;br /&gt;
| [[Yocto_1.7_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.7_Status]]&lt;br /&gt;
| [[Yocto_1.7_Overall_Test_Plan]]&lt;br /&gt;
| [[1.7 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-October/000053.html 1.7 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.6&lt;br /&gt;
| Daisy&lt;br /&gt;
| 11.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.6_Features]]&lt;br /&gt;
| [[Yocto_1.6_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.6_Status]]&lt;br /&gt;
| [[Yocto_1.6_Overall_Test_Plan]]&lt;br /&gt;
| [[1.6 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2014-April/000045.html 1.6 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.5&lt;br /&gt;
| Dora&lt;br /&gt;
| 10.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.5_Features]]&lt;br /&gt;
| [[Yocto_1.5_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.5_Status]]&lt;br /&gt;
| [[Yocto_1.5_Overall_Test_Plan]]&lt;br /&gt;
| [[1.5 qa run history]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-October/000037.html 1.5 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.4&lt;br /&gt;
| Dylan&lt;br /&gt;
| 9.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.4_Features]]&lt;br /&gt;
| [[Yocto_1.4_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.4_Status]]&lt;br /&gt;
| [[Yocto_1.4_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.4_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2013-April/000027.html 1.4 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.3&lt;br /&gt;
| Danny&lt;br /&gt;
| 8.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.3_Features]]&lt;br /&gt;
| [[Yocto_1.3_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.3_Status]]&lt;br /&gt;
| [[Yocto_1.3_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.3_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-October/000020.html 1.3 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.2&lt;br /&gt;
| Denzil&lt;br /&gt;
| 7.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.2_Features]]&lt;br /&gt;
| [[Yocto_1.2_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.2_Status]]&lt;br /&gt;
| [[Yocto_1.2_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.2_Milestone_Test_Report]]&lt;br /&gt;
| [https://lists.yoctoproject.org/pipermail/yocto-announce/2012-April/000009.html 1.2 release notes]&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.1&lt;br /&gt;
| Edison&lt;br /&gt;
| 6.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_1.1_Features]]&lt;br /&gt;
| [[Yocto_1.1_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.1_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.1_Overall_Test_Plan]]&lt;br /&gt;
| [[Yocto_1.1_Milestone_Test_Report]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Yocto Project 1.0&lt;br /&gt;
| Bernard&lt;br /&gt;
| 5.0&lt;br /&gt;
| Community&lt;br /&gt;
| [[Yocto_Features]]&lt;br /&gt;
| [[Yocto_1.0_Schedule]]&lt;br /&gt;
| [[Yocto_Project_v1.0_Release_Criteria]]&lt;br /&gt;
| [[Yocto_1.0_Overall_Test_Plan]]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86120</id>
		<title>Bug Triage</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=86120"/>
		<updated>2023-12-07T16:09:37Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Bug Triage Order */ Change links to 5.x releases&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Goal =&lt;br /&gt;
The output of the bug triage meeting should be that all bugs have an owner, a target milestone, and a priority.&lt;br /&gt;
&lt;br /&gt;
Prior to the meeting, each Product Owner should review their Weekly New and High Bugs and be ready with any opens. An example open would be a bug that may need to change Products.&lt;br /&gt;
&lt;br /&gt;
= Roles =&lt;br /&gt;
* Call facilitator: Stephen Jolley (sjolley.yp.pm@gmail.com)&lt;br /&gt;
** Ensure we keep to the agenda, don&#039;t rathole on bug resolution, and stay within our time block.&lt;br /&gt;
* Team Leads should pre-triage bugs for their areas of responsibility. Some guidelines on what they should/shouldn&#039;t do are:&lt;br /&gt;
** a) Pre-triage should happen in the presence of the appropriate team lead,&lt;br /&gt;
** b) The bugs being pre-triaged should be the responsibility of the team in question.&lt;br /&gt;
** c) The pre-triage team should be confident when dis-positioning the bugs, taking into account the individual&#039;s workload.&lt;br /&gt;
** d) If the bug raises any doubt or needs information prior, defer it to the main bug triage team.&lt;br /&gt;
** e) To insure a bug is triaged by the main bug triage team; set its priority to Undecided.&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
* Thursdays at 07:30 Pacific Time (15:30 GMT)&lt;br /&gt;
* [https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09 Zoom Call Link]&lt;br /&gt;
* Review [https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade security issues]&lt;br /&gt;
&lt;br /&gt;
* Review Queries&lt;br /&gt;
** State number, title, and owner&lt;br /&gt;
** Owner makes any modifications&lt;br /&gt;
** Assign owner, target milestone, and priority.&lt;br /&gt;
* Opens&lt;br /&gt;
** Collect opens&lt;br /&gt;
** Discuss opens&lt;br /&gt;
&lt;br /&gt;
Note: for Minnowboard or MinnowBoard-MAX bugs go to: [[Minnow Bug Triage]]&lt;br /&gt;
&lt;br /&gt;
= Bug Triage Order =&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade Security Issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Non-Prioritized_Bugs Non-Prioritized Bugs  and Non Targeted Bugs]&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=652616&amp;amp;query_format=advanced&amp;amp;resolution=---&amp;amp;status_whiteboard=AB-INT&amp;amp;status_whiteboard_type=allwordssubstr Autobuilder issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#High_Enhancements.2FBugs High Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.0_Unassigned_Enhancements/Bugs Medium+ 5.0 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium+_5.99_Unassigned_Enhancements/Bugs Medium+ 5.99 Unassigned Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#NEEDINFO NEEDINFO]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Re-Opened Reopened]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Old_Milestone Old Milestone]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Future_.26_5.99_Milestones Future &amp;amp; 5.99 Milestones]&lt;br /&gt;
&lt;br /&gt;
* Note/Suggestion for the Weekly Triage Meeting: Open the first link in a new browser window and then each additional link in a new tab in that new window.  Close the new window when the triage meeting is done.&lt;br /&gt;
&lt;br /&gt;
= Bug Criteria =&lt;br /&gt;
* Priority-Severity&lt;br /&gt;
** High: Two Week - shouldn&#039;t slip to next milestone without review by Triage team.&lt;br /&gt;
** Medium+: Milestone Target Required&lt;br /&gt;
** Medium: Nice to have for milestone, should have for release&lt;br /&gt;
** Low: Nice to have, but no urgency&lt;br /&gt;
&lt;br /&gt;
* Future bugs and enhancements are a good idea to do, but not able in the near term to get fixed or done.  &lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* Special Case: Medium+ and Future Enhancement or Bug - These are a good idea and important to do, but not currently scheduled at this time.&lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* For more details see the wiki [[Bugzilla Configuration and Bug Tracking]]&lt;br /&gt;
&lt;br /&gt;
= Bug Status Dashboards =&lt;br /&gt;
&lt;br /&gt;
Weekly - https://wiki.yoctoproject.org/charts/combo.html&lt;br /&gt;
&lt;br /&gt;
Daily - https://wiki.yoctoproject.org/charts/daily/combo.html&lt;br /&gt;
&lt;br /&gt;
= Bug Product Searches =&lt;br /&gt;
&lt;br /&gt;
* [[Bug Product Triage]]&lt;br /&gt;
&lt;br /&gt;
= Yocto Bug Triage Searches =&lt;br /&gt;
== Newcomer Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |to=newcomer@yoctoproject.org, unassigned@yoctoproject.org&lt;br /&gt;
  |whiteboard=NEWCOMER&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority=!(Undecided)&lt;br /&gt;
  |columns=id,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found. Check for unassigned bugs.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Prioritized Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=Undecided&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Targeted Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |milestone=0.0.0&lt;br /&gt;
  |component=!(meta-cgl, meta-security, infrastructure-general, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== New This Week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |created=-1w&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=status,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary,estimated&lt;br /&gt;
}}&lt;br /&gt;
== Closed This week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |modified=-1w&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |columns=id,modified,summary,severity,priority,milestone,to,status,resolution&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== High Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=high&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.0 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=!(4.3, 4.3 M1, 4.3 M2, 4.3 M3, 4.3 M4, 5.1, 5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 5.99 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=5.99&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ Future Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=Future&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== NEEDINFO ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=NEEDINFO&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,modified,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
  |modifiedformat=date&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Re-Opened ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=REOPENED&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Old Milestone ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone= !(3.1.30, 3.1.32, 3.1.33, 3.1.34, 4.0.15, 4.0.16, 4.0.17, 4.0.18, 4.0.19, 4.0.20,  5.0, 5.0 M1, 5.0 M2, 5.0 M3, 5.0 M4, 4.99, 5.1, 5.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future Dot Releases==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone= 3.1.27, 3.1.28, 3.1.29, 4.0.12, 4.0.13, 4.0.14, 4.2.3&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== YP Toaster Bugs==&lt;br /&gt;
Please refer to the [[Bug_Triage_Toaster]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== YP Archived Queries==&lt;br /&gt;
Please refer to the [[Bug_Triage_Archive]] Page&lt;br /&gt;
&lt;br /&gt;
== YP BSP Team Triage==&lt;br /&gt;
Please refer to the [[BSP Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
== YP Validation and Infrastructure Team Triage==&lt;br /&gt;
Please refer to the [[Validation and Infrastructure Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 5.99 Milestones ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99, 5.99&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority&lt;br /&gt;
  |sort=modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 3.99 Milestones Check ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99&lt;br /&gt;
  |whiteboard=REVIEW, QA, QA REVIEW, OB, OB REVIEW&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=whiteboard,modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quarterly Milestones==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone=Q1,Q2,Q3,Q4&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,modified,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=85927</id>
		<title>Bug Triage</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Bug_Triage&amp;diff=85927"/>
		<updated>2023-09-14T15:07:34Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Bug Triage Order */ Updated the &amp;quot;Future &amp;amp; 5.99 Milestones&amp;quot; link in the agenda&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Goal =&lt;br /&gt;
The output of the bug triage meeting should be that all bugs have an owner, a target milestone, and a priority.&lt;br /&gt;
&lt;br /&gt;
Prior to the meeting, each Product Owner should review their Weekly New and High Bugs and be ready with any opens. An example open would be a bug that may need to change Products.&lt;br /&gt;
&lt;br /&gt;
= Roles =&lt;br /&gt;
* Call facilitator: Stephen Jolley (sjolley.yp.pm@gmail.com)&lt;br /&gt;
** Ensure we keep to the agenda, don&#039;t rathole on bug resolution, and stay within our time block.&lt;br /&gt;
* Team Leads should pre-triage bugs for their areas of responsibility. Some guidelines on what they should/shouldn&#039;t do are:&lt;br /&gt;
** a) Pre-triage should happen in the presence of the appropriate team lead,&lt;br /&gt;
** b) The bugs being pre-triaged should be the responsibility of the team in question.&lt;br /&gt;
** c) The pre-triage team should be confident when dis-positioning the bugs, taking into account the individual&#039;s workload.&lt;br /&gt;
** d) If the bug raises any doubt or needs information prior, defer it to the main bug triage team.&lt;br /&gt;
** e) To insure a bug is triaged by the main bug triage team; set its priority to Undecided.&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
* [https://zoom.us/j/454367603?pwd=ZGxoa2ZXL3FkM3Y0bFd5aVpHVVZ6dz09 Zoom Call Link]&lt;br /&gt;
* Review [https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade security issues]&lt;br /&gt;
&lt;br /&gt;
* Review Queries&lt;br /&gt;
** State number, title, and owner&lt;br /&gt;
** Owner makes any modifications&lt;br /&gt;
** Assign owner, target milestone, and priority.&lt;br /&gt;
* Opens&lt;br /&gt;
** Collect opens&lt;br /&gt;
** Discuss opens&lt;br /&gt;
&lt;br /&gt;
Note: for Minnowboard or MinnowBoard-MAX bugs go to: [[Minnow Bug Triage]]&lt;br /&gt;
&lt;br /&gt;
= Bug Triage Order =&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=604307&amp;amp;resolution=---&amp;amp;query_format=advanced&amp;amp;bug_status=UNCONFIRMED&amp;amp;bug_status=NEW&amp;amp;bug_status=ACCEPTED&amp;amp;bug_status=IN%20PROGRESS%20DESIGN&amp;amp;bug_status=IN%20PROGRESS%20DESIGN%20COMPLETE&amp;amp;bug_status=IN%20PROGRESS%20IMPLEMENTATION&amp;amp;bug_status=IN%20PROGRESS%20REVIEW&amp;amp;bug_status=REOPENED&amp;amp;bug_status=NEEDINFO&amp;amp;product=Security&amp;amp;product=Security%20-%20Recipe%20Upgrade Security Issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Non-Prioritized_Bugs Non-Prioritized Bugs  and Non Targeted Bugs]&lt;br /&gt;
*[https://bugzilla.yoctoproject.org/buglist.cgi?list_id=652616&amp;amp;query_format=advanced&amp;amp;resolution=---&amp;amp;status_whiteboard=AB-INT&amp;amp;status_whiteboard_type=allwordssubstr Autobuilder issues]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#High_Enhancements.2FBugs High Enhancements/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium.2B_4.3_Unassigned_Enhancements.2FBugs Medium+ 4.3 Unassigned Enhancement/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Medium.2B_4.99_Unassigned_Enhancements.2FBugs Medium+ 4.99 Unassigned Enhancement/Bugs]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#NEEDINFO NEEDINFO]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Re-Opened Reopened]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Old_Milestone Old Milestone]&lt;br /&gt;
*[https://wiki.yoctoproject.org/wiki/Bug_Triage#Future_.26_5.99_Milestones Future &amp;amp; 5.99 Milestones]&lt;br /&gt;
&lt;br /&gt;
* Note/Suggestion for the Weekly Triage Meeting: Open the first link in a new browser window and then each additional link in a new tab in that new window.  Close the new window when the triage meeting is done.&lt;br /&gt;
&lt;br /&gt;
= Bug Criteria =&lt;br /&gt;
* Priority-Severity&lt;br /&gt;
** High: Two Week - shouldn&#039;t slip to next milestone without review by Triage team.&lt;br /&gt;
** Medium+: Milestone Target Required&lt;br /&gt;
** Medium: Nice to have for milestone, should have for release&lt;br /&gt;
** Low: Nice to have, but no urgency&lt;br /&gt;
&lt;br /&gt;
* Future bugs and enhancements are a good idea to do, but not able in the near term to get fixed or done.  &lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* Special Case: Medium+ and Future Enhancement or Bug - These are a good idea and important to do, but not currently scheduled at this time.&lt;br /&gt;
** If you want to work on them, please talk first to the existing owner or change the ownership to yourself if unassigned or newcomer.&lt;br /&gt;
*** Note: we have a special owner - newcomer@yoctoproject.org - which we think would be great opportunities for a newcomer to open source to start learning on. &lt;br /&gt;
&lt;br /&gt;
* For more details see the wiki [[Bugzilla Configuration and Bug Tracking]]&lt;br /&gt;
&lt;br /&gt;
= Bug Status Dashboards =&lt;br /&gt;
&lt;br /&gt;
Weekly - https://wiki.yoctoproject.org/charts/combo.html&lt;br /&gt;
&lt;br /&gt;
Daily - https://wiki.yoctoproject.org/charts/daily/combo.html&lt;br /&gt;
&lt;br /&gt;
= Bug Product Searches =&lt;br /&gt;
&lt;br /&gt;
* [[Bug Product Triage]]&lt;br /&gt;
&lt;br /&gt;
= Yocto Bug Triage Searches =&lt;br /&gt;
== Newcomer Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |to=newcomer@yoctoproject.org, unassigned@yoctoproject.org&lt;br /&gt;
  |whiteboard=NEWCOMER&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority=!(Undecided)&lt;br /&gt;
  |columns=id,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found. Check for unassigned bugs.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Prioritized Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=Undecided&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Non-Targeted Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit, Toaster, Security Response Tool)&lt;br /&gt;
  |milestone=0.0.0&lt;br /&gt;
  |component=!(meta-cgl, meta-security, infrastructure-general, bsps-meta-ti)&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== New This Week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |created=-1w&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=status,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary,estimated&lt;br /&gt;
}}&lt;br /&gt;
== Closed This week ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |modified=-1w&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |columns=id,modified,summary,severity,priority,milestone,to,status,resolution&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== High Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=high&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 4.3 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=!(4.09, 4.2, 4.2 M1, 4.2 M2, 4.2 M3, 4.2 M4, 4.4, 4.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ 4.99 Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=4.99, 5.99&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Medium+ Future Unassigned Enhancements/Bugs ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |priority=!(Undecided,Medium,Low,High)&lt;br /&gt;
  |milestone=Future&lt;br /&gt;
  |to=unassigned@yoctoproject.org&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |columns=id,summary,severity,priority,milestone,to,status,whiteboard,estimated&lt;br /&gt;
  |sort=milestone,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== NEEDINFO ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=NEEDINFO&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,modified,whiteboard&lt;br /&gt;
  |sort=id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
  |modifiedformat=date&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Re-Opened ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=REOPENED&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Old Milestone ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone= !(3.1.27, 3.1.28, 3.1.29, 4.0.13, 4.0.14, 4.2.3, 4.3, 4.3 M4, 4.4, 4.99, Q1, Q2, Q3, Q4, future)&lt;br /&gt;
  |product=!(opkg, IoT Reference OS Kit)&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |component=!(meta-cgl, meta-security)&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone,priority,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future Dot Releases==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone= 3.1.27, 3.1.28, 3.1.29, 4.0.12, 4.0.13, 4.0.14, 4.2.3&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== YP Toaster Bugs==&lt;br /&gt;
Please refer to the [[Bug_Triage_Toaster]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== YP Archived Queries==&lt;br /&gt;
Please refer to the [[Bug_Triage_Archive]] Page&lt;br /&gt;
&lt;br /&gt;
== YP BSP Team Triage==&lt;br /&gt;
Please refer to the [[BSP Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
== YP Validation and Infrastructure Team Triage==&lt;br /&gt;
Please refer to the [[Validation and Infrastructure Team Bug Triage]] Page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 5.99 Milestones ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99, 5.99&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority&lt;br /&gt;
  |sort=modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Future &amp;amp; 3.99 Milestones Check ==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |product=!opkg&lt;br /&gt;
  |milestone=Future, 4.99&lt;br /&gt;
  |whiteboard=REVIEW, QA, QA REVIEW, OB, OB REVIEW&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !(Undecided)&lt;br /&gt;
  |columns=id,modified,summary,to,status,milestone,severity,priority,whiteboard&lt;br /&gt;
  |sort=whiteboard,modified,id&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quarterly Milestones==&lt;br /&gt;
{{#bugzilla:&lt;br /&gt;
  |status=!(RESOLVED,VERIFIED,CLOSED)&lt;br /&gt;
  |milestone=Q1,Q2,Q3,Q4&lt;br /&gt;
  |severity=!janitors&lt;br /&gt;
  |priority= !Undecided&lt;br /&gt;
  |columns=id,modified,summary,to,status,severity,priority,milestone,whiteboard&lt;br /&gt;
  |sort=milestone&lt;br /&gt;
  |noresultsmessage=&amp;quot;No matching bugs found.&amp;quot;&lt;br /&gt;
  |total=summary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85901</id>
		<title>Contributors Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85901"/>
		<updated>2023-08-31T12:28:56Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Point to &amp;quot;Yocto Project and OpenEmbedded Contributor Guide&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Note: The [https://docs.yoctoproject.org/dev/contributor-guide/index.html Yocto Project and OpenEmbedded Contributor Guide] should be the place to store this information.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Plans for a hypothetical Maintainers Manual (which doubles as a Contributor manual).&lt;br /&gt;
&lt;br /&gt;
* Patch guidelines (style guide (code and patch description), patch tags)&lt;br /&gt;
** What to look for before sending? (No warning added, tests to do)&lt;br /&gt;
** A checklist&lt;br /&gt;
* Patch submission process (git-send-email, lore, master-then-branches)&lt;br /&gt;
** What does it mean to review a patch? (kernel doc &amp;quot;Submitting patches&amp;quot; has an example of this)&lt;br /&gt;
* [[CVE Triage]] process&lt;br /&gt;
* Autobuilder&lt;br /&gt;
&lt;br /&gt;
Some related sparse info elsewhere :&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/ref-manual/resources.html Yocto docs: Contributions and Additional Information]&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/dev-manual/changes.html Yocto docs: Making Changes to the Yocto Project]&lt;br /&gt;
* [[Newcomers]]&lt;br /&gt;
* [[Community_Guidelines]]&lt;br /&gt;
* [[Poky_Contributions]]&lt;br /&gt;
* [https://kernel.org/doc/html/latest/process/submitting-patches.html Submitting patches: the essential guide to getting your code into the kernel]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Member_Technical_Contacts&amp;diff=85818</id>
		<title>Member Technical Contacts</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Member_Technical_Contacts&amp;diff=85818"/>
		<updated>2023-06-12T15:33:26Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page tracks the official technical contributors to the YP core from each of the Yocto Project&#039;s member organizations. Note that many organizations provide more resources than just one, particularly in terms of hardware or specific feature support, which is why the Yocto Project is a de facto standard for building Linux for embedded systems.&lt;br /&gt;
&lt;br /&gt;
Platinum Members&lt;br /&gt;
* Amazon: Richard Elberger &amp;lt;elberger@amazon.com&amp;gt;, Megan Knight &amp;lt;megankn@amazon.com&amp;gt;&lt;br /&gt;
* Arm: Ross Burton &amp;lt;ross.burton@arm.com&amp;gt;, Akanksha Jain &amp;lt;akanksha.jain2@arm.com&amp;gt;, Ellie Stanford-Reed &amp;lt;ellie.stanford-reed@arm.com&amp;gt;&lt;br /&gt;
* BMW: Mario Goulart &amp;lt;mario.goulart@bmw.de&amp;gt;, Nisha Parrakat &amp;lt;nisha.m.parrakat@bmw.de&amp;gt;&lt;br /&gt;
* Cisco: Taras Kondratiuk &amp;lt;takondra@cisco.com&amp;gt;&lt;br /&gt;
* Comcast: Raj, Khem &amp;lt;Khem_Raj@comcast.com&amp;gt;&lt;br /&gt;
* Exein: Giovanni Alberto Falcione &amp;lt;giovanni@exein.io&amp;gt;&lt;br /&gt;
* Intel: apoorv sangal &amp;lt;apoorvsangal@gmail.com&amp;gt;&lt;br /&gt;
* Meta: DJ (Dharmesh Jani) &amp;lt;janidb@fb.com&amp;gt;&lt;br /&gt;
* Microsoft: Paul Eggleton &amp;lt;paul.eggleton@microsoft.com&amp;gt;&lt;br /&gt;
* Wind River: Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;; Saul Wold &amp;lt;Saul.Wold@windriver.com&amp;gt;&lt;br /&gt;
* AMD/Xilinx: Mark Hatle &amp;lt;mhatle@xilinx.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gold Members&lt;br /&gt;
* AGL: Jan-Simon Moeller &amp;lt;jsmoeller@linuxfoundation.org&amp;gt;, Walt Miner &amp;lt;wminer@linuxfoundation.org&amp;gt;&lt;br /&gt;
* Huawei: Davide Ricci &amp;lt;davide.ricci@huawei.com&amp;gt;&lt;br /&gt;
* Renesas: Mr. Takamitsu Honda &amp;lt;takamitsu.honda.pv@renesas.com&amp;gt;&lt;br /&gt;
* Siemens: Chris Larson &amp;lt;chris_larson@mentor.com&amp;gt;, Wade Farnsworth &amp;lt;wade_farnsworth@mentor.com&amp;gt;&lt;br /&gt;
* Texas Instruments: Praneeth Bajjuri &amp;lt;praneeth@ti.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Silver Members&lt;br /&gt;
* Axis: Hakan Rick &amp;lt;hakan.rick@axis.com&amp;gt;, Peter Kjellerstedt &amp;lt;peter.kjellerstedt@axis.com&amp;gt;&lt;br /&gt;
* Bootlin: Alexandre Belloni &amp;lt;alexandre.belloni@bootlin.com&amp;gt;&lt;br /&gt;
* Dell: Michael Brown &amp;lt;michael.e.brown@dell.com&amp;gt;&lt;br /&gt;
* Founderiesio: Ricardo Salveti  &amp;lt;ricardo@foundries.io&amp;gt;&lt;br /&gt;
* LG: Kyunglik Min &amp;lt;dp.min@lge.com&amp;gt;&lt;br /&gt;
* Linaro: Nicolas Dechesne &amp;lt;nicolas.dechesne@linaro.org&amp;gt;&lt;br /&gt;
* Lineo Solutions: Masahiro Miyake &amp;lt;miya@lineo.co.jp&amp;gt;&lt;br /&gt;
* Roku: Cameron Esfahani &amp;lt;cesfahani@roku.com&amp;gt;&lt;br /&gt;
* Smile: Yoann Congal &amp;lt;yoann.congal@smile.fr&amp;gt;&lt;br /&gt;
* MontaVista: Armin Kuster &amp;lt;akuster@mvista.com&amp;gt;&lt;br /&gt;
* NXP: Lauren Post &amp;lt;lauren.post@nxp.com&amp;gt;, Tom Hochstein &amp;lt;tom.hochstein@nxp.com&amp;gt;&lt;br /&gt;
* Savoir-faire Linux: Christophe Villemer &amp;lt;christophe.villemer@savoirfairelinux.com&amp;gt;, Eloi Bail &amp;lt;eloi.bail@saviorfairelinux.com&amp;gt;, Jerome Oufella &amp;lt;jerome.oufella@saviorfairelinux.com&amp;gt;&lt;br /&gt;
* ST: Christophe Priouzeau &amp;lt;christophe.priouzeau@foss.st.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Technical Partners&lt;br /&gt;
* OpenEmbedded: Philip Balister &amp;lt;philip@balister.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note&#039;&#039;&#039;: a &#039;&#039;private&#039;&#039; mailing list exists with all individuals listed here, mainly to facilitate the communication and the organization of meetings. All technical discussions are encouraged to be made on the existing, open, project mailing lists. If you believe you need to be added to the private list, please reach out to the Yocto Project Community Manager.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=85774</id>
		<title>Stable Release and LTS</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Stable_Release_and_LTS&amp;diff=85774"/>
		<updated>2023-05-07T23:03:03Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Yocto Project Stable Branch Maintenance and Long Term Support (LTS) */ Shortcut the &amp;quot;Current Maintainers list&amp;quot; to the Release page to avoid a redirection.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Yocto Project Stable Branch Maintenance and Long Term Support (LTS) =&lt;br /&gt;
&lt;br /&gt;
Background on how the project&#039;s LTS plans came about can be found [[LTS_Background | here]]. The document below details the current project release lifecycle and LTS plans. The aim is to have a stable series maintenance policy which allows for different stages of maintenance including standard &amp;quot;stable&amp;quot; series, LTS series and community support.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Releases|Current Maintainers list]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Release Lifecycle ==&lt;br /&gt;
The project releases every six months in April and October (spring and fall). This is necessary to bring development together to a focus point and provide points of increased testing and focus on stability. There are two possible lifecycles a release may follow:&lt;br /&gt;
&lt;br /&gt;
Initial Release -&amp;gt; Stable -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
:: or&lt;br /&gt;
Initial Release -&amp;gt; LTS -&amp;gt; Community -&amp;gt; EOL&lt;br /&gt;
&lt;br /&gt;
The change in status of a given release series should be announced in the weekly status report and reflected on the “Releases” wiki page.&lt;br /&gt;
&lt;br /&gt;
The stages have the following properties:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS common properties:&#039;&#039;&#039;&lt;br /&gt;
* Has point release tarballs created&lt;br /&gt;
* Has release artefacts&lt;br /&gt;
* Patches merged to the main repository branch&lt;br /&gt;
* Requires autobuilder testing&lt;br /&gt;
* The project will appoint someone to act as the maintainer to coordinate and handle patch testing and merging&lt;br /&gt;
* Strict “backport only”, master first policy&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stable/LTS differences:&#039;&#039;&#039;&lt;br /&gt;
* Stable releases are maintained for seven months&lt;br /&gt;
* LTS releases are maintained initially for two years&lt;br /&gt;
* LTS releases are preannounced and known to be LTS in advance (usually every two years)&lt;br /&gt;
* LTS tested only on a subset of supported native build platforms (announced at time of LTS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Community status properties:&#039;&#039;&#039;&lt;br /&gt;
* A branch transitions to community support after the last stable dot release identified by the stable/LTS maintainer.&lt;br /&gt;
* A call for a community support maintainer is sent to the mailing lists.&lt;br /&gt;
** A six (6) week waiting period. &lt;br /&gt;
** if there is no new maintainer, then the branch goes to into EOL status&lt;br /&gt;
* Branches only have community support status if there is an active community member willing to step into the maintainer role for that series&lt;br /&gt;
* All the same repos are covered as in Stable&lt;br /&gt;
* Follows the same the Stable processes, except;&lt;br /&gt;
** Patches merge to the main repository but in a community/XXX namespace&lt;br /&gt;
** Automated testing is on a best effort basis, some autobuilder cycles may be available but not guaranteed.&lt;br /&gt;
** The maintainer is required to publish a testing plan to show what testing will be made for patches to merge to the community branch.&lt;br /&gt;
** No point releases version and no release artifacts&lt;br /&gt;
* Master first policy recommended&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EOL (End of life):&#039;&#039;&#039;&lt;br /&gt;
* No community support maintainer after the six (6) week waiting period&lt;br /&gt;
* When there is no longer any active community maintainer, branches become EOL&lt;br /&gt;
** No new changes for 2 months&lt;br /&gt;
* Artifacts will be removed for EOL older than????&lt;br /&gt;
** process under development&lt;br /&gt;
&lt;br /&gt;
== LTS “Mixin” repositories ==&lt;br /&gt;
We realise that a given LTS may need other versions of some components within its lifetime as no “one size” fits everyone’s needs. Rather than adding potentially invasive changes to older releases (such as new gcc versions), the project proposes the use of “mixin” layers (see https://docs.yoctoproject.org/dev//ref-manual/release-process.html#stable-release-process).&lt;br /&gt;
&lt;br /&gt;
The structure would be to create them in the repository meta-lts-mixins with the branch naming scheme &amp;lt;releaseseries&amp;gt;/&amp;lt;mixin name&amp;gt;. We expect this may be used for gcc and possibly for rapidly changing languages like go/nodejs/rust. Policies on testing these layers will depend on how widespread their usage is and determined on a case by case basis. There may be other &#039;mixin&#039; layers within the wider community too.&lt;br /&gt;
&lt;br /&gt;
The layers should have a single purpose and be Yocto Project Compatible (passing the test script) allowing them to be selected by users as needed. The maintainer should be listed in the README and note when the layer is no longer maintained.&lt;br /&gt;
&lt;br /&gt;
== Stable/LTS Patch Acceptance Policies ==&lt;br /&gt;
All changes must have already been accepted into the current master release and any other release still within its “stable” seven month support window.&lt;br /&gt;
&lt;br /&gt;
Patches must pass testing on the project’s automated test infrastructure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Security and CVE fixes&lt;br /&gt;
* Fixes for bugs&lt;br /&gt;
* Changes to follow an upstream stable series or LTS that aligns with the original release (based on compatibility)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Potentially Acceptable:&#039;&#039;&#039;&lt;br /&gt;
* Fixes so codebase works with newly released distros (only in the first six months after a given release series first releases)&lt;br /&gt;
* Bug fix only version upgrades for upstreams with a good stable process&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unacceptable:&#039;&#039;&#039;&lt;br /&gt;
* General version upgrades&lt;br /&gt;
* New features&lt;br /&gt;
* ABI/API breakage&lt;br /&gt;
&lt;br /&gt;
== Components (layers) to be covered ==&lt;br /&gt;
&lt;br /&gt;
The project LTS covers:&lt;br /&gt;
* Bitbake&lt;br /&gt;
* OE-Core&lt;br /&gt;
* Meta-yocto&lt;br /&gt;
* yocto-docs&lt;br /&gt;
&lt;br /&gt;
The project LTS does not cover:&lt;br /&gt;
* meta-mingw&lt;br /&gt;
* meta-gplv2&lt;br /&gt;
* vendor layers&lt;br /&gt;
&lt;br /&gt;
Other layers can and will have their own LTS processes.&lt;br /&gt;
&lt;br /&gt;
== Testing ==&lt;br /&gt;
The project releases are only tested using the automated testing based on virtual environments. The build host OSes used to run these tests are determined at the initial release time. For LTS releases only some subset of native OSes maybe supported, particularly where the lifetime of the OS would be shorter than the LTS.&lt;br /&gt;
&lt;br /&gt;
Further testing of releases, e.g. on real hardware platforms is encouraged and there is a process to allow these results to be merged into the release test results but the process for making the release no longer depends upon this happening.&lt;br /&gt;
&lt;br /&gt;
== Process ( TOC)==&lt;br /&gt;
* Need to document the following processes:&lt;br /&gt;
** How maintainer is selected&lt;br /&gt;
** How are patches proposed - Done&lt;br /&gt;
** How are patches queued/tested/reviewed/merged - Done&lt;br /&gt;
** When are point releases made? - Done&lt;br /&gt;
** How to trigger and run a point release - Done&lt;br /&gt;
** Release process itself &lt;br /&gt;
** Transferring stable/LTS release to community/EOL status - YP TSC&lt;br /&gt;
** New maintainer training - TBD&lt;br /&gt;
&lt;br /&gt;
== Requesting a fix in a stable branch ==&lt;br /&gt;
&lt;br /&gt;
With reference to the above policies, if you would like to request a backport of a commit in a newer release, you can either (a) do the backport yourself and send the patch marked with &amp;lt;tt&amp;gt;[branchname]&amp;lt;/tt&amp;gt; to the appropriate mailing list; or alternatively (b) you can send a simple request giving commit hashes / URLs that you would like to be backported. In both cases it helps to CC the maintainer - refer to the [[Stable branch maintenance|stable release table]].&lt;br /&gt;
&lt;br /&gt;
For information on which mailing list you should send these to see the [http://git.yoctoproject.org/cgit/cgit.cgi/poky/tree/README README file] in the Poky repository.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Maintainer Procedures&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Normal process ===&lt;br /&gt;
&lt;br /&gt;
When there are enough changes (or a few critical ones), the stable/LTS maintainer should follow this procedure:&lt;br /&gt;
&lt;br /&gt;
# Look out for patches on the mailing list marked with the appropriate branch name in the subject&lt;br /&gt;
# Look through recently merged patches in master that are suitable for backporting&lt;br /&gt;
# Collect patches together on a branch&lt;br /&gt;
#* If a submitted patch is a backport from master, rather than taking the patch as submitted, it is preferable to backport the patch from master so that the original commit message is preserved.&lt;br /&gt;
#* If you do the backporting from poky you will get the original commit ID in the commit message which is useful for reference.&lt;br /&gt;
#* It is beneficial to change the original commit ID line to say &amp;quot;OE-Core master rev&amp;quot; instead of &amp;quot;OE-Core rev&amp;quot; to distinguish it from the OE-Core  branch revision that will be added when the commit is merged&lt;br /&gt;
# Run a local build or two to pick up any obvious problems&lt;br /&gt;
# Bitbake change should be in the bitbake-contrib repo&lt;br /&gt;
## https://git.openembedded.org/bitbake-contrib stable/{branch}-nut&lt;br /&gt;
# Openembedded-core changes should be be in the openembedded-core-contrib stable/{branch}-nut &lt;br /&gt;
## https://git.openembedded.org/openembedded-core-contrib&lt;br /&gt;
# Meta-yocto changes should be in poky-contrib meta-yocto/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# yocto-docs changes should be in poky-contrib yocto-docs/stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
#Now create your Poky distro for testing.&lt;br /&gt;
## The Autobuilder requires changes to reside in poky, bitbake and openembedded-core&lt;br /&gt;
## Combine bitabke, core, meta-yocto and yocto-docs changes into one repo.&lt;br /&gt;
## Push the changes to poky-contrib stable/{branch}-nut&lt;br /&gt;
## git://git.yoctoproject.org/poky-contrib&lt;br /&gt;
# Test the changes on the autobuilder (see [[How to start a build on the Autobuilder]])&lt;br /&gt;
#* Make sure you check directly for the results of the build as these won&#039;t be reported to the yocto-builds mailing list.&lt;br /&gt;
## For any build failure, Defects should be opened&lt;br /&gt;
## Address any build failures, update repo&#039;s accordingly and rebuild&lt;br /&gt;
&lt;br /&gt;
There will very likely be a number of these cycles during the lifetime of the stable branch.&lt;br /&gt;
&lt;br /&gt;
=== Patch review ===&lt;br /&gt;
# When collating patches for review, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Patch review&amp;quot;&lt;br /&gt;
## Provide a deadline for any comments included in the body of the email&lt;br /&gt;
## Standard to date is 2 days.&lt;br /&gt;
###Exception is if the changes are patches sent to the appropriate mailing list.&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-request -p &amp;quot;{branch}&amp;quot; ...{etc}&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Wait for any feedback&lt;br /&gt;
## If there are changes make any necessary adjustments&lt;br /&gt;
### rebuild if necessary&lt;br /&gt;
# Push any changes to the appropriate repos and branches.&lt;br /&gt;
&lt;br /&gt;
=== Merge request===&lt;br /&gt;
# Push affected repos and branches to stable/{branch}-next branch&lt;br /&gt;
# When preparing patches for merge, Make sure of the following:&lt;br /&gt;
## Subject indicates &amp;quot;Merge Request&amp;quot;&lt;br /&gt;
## Use the appropriate branch reference.&lt;br /&gt;
## Use create-pull-requests -p&amp;quot;{branch}&amp;quot;&lt;br /&gt;
# Send any bitbake changes bitbake-devel mailing list &lt;br /&gt;
# Send any OE-Core changes openembedded-core mailing list.&lt;br /&gt;
# Send any meta-yocto changes to the poky@lists.yoctoproject.org mailing list.&lt;br /&gt;
# Send any yocto-docs changes the docs@lists.yoctoproject.org mailing list.&lt;br /&gt;
# When the patches are merged, mark any bugs specific to the stable branch as resolved as appropriate&lt;br /&gt;
&lt;br /&gt;
=== Point release ===&lt;br /&gt;
&lt;br /&gt;
Normally point releases are scheduled in advance as appropriate - contact Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and CC: Ricard Purdie &amp;lt;richard.purdie@linuxfoundation.org&amp;gt; about scheduling point releases.&lt;br /&gt;
&lt;br /&gt;
# Update yocto-docs with release information.&lt;br /&gt;
## Send a patch to docs@lists.yoctoproject.org&lt;br /&gt;
# Once all dot release changes are merged, ask Richard to run the release candidate build&lt;br /&gt;
#* The stable branch or LTS maintainer should monitor the build and follow up on any failures&lt;br /&gt;
# When the release candidate build completes successfully, The stable branch or LTS maintainer should notify the QA team to start the release QA process.&lt;br /&gt;
# Gather together changes in the form needed for a release notes and send them Yocto Project TSC, Branch or LTS maintainer for review and approval.&lt;br /&gt;
## If acceptable the changes will be incorporated into the final release notes and to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; so he can have them in preparation for the release meeting.&lt;br /&gt;
# Send a patch to update the stable version in meta-yocto/conf/distro/poky.conf for the release&lt;br /&gt;
&lt;br /&gt;
=== Other ===&lt;br /&gt;
&lt;br /&gt;
* It is useful to provide status updates on the Yocto Project technical call, particularly coming up to a stable release. If you&#039;re not able to be on the call, send the status update information to Stephen Jolley &amp;lt;sjolley.yp.pm@gmail.com&amp;gt; and he will present it.&lt;br /&gt;
&lt;br /&gt;
=== Releases ===&lt;br /&gt;
[[Releases|Yocto Project releases]]&lt;br /&gt;
&lt;br /&gt;
=== Kernel LTS ===&lt;br /&gt;
[[Linux Yocto#Release_Cadence|Kernel cadence]]&lt;br /&gt;
&lt;br /&gt;
=== New Releases process ===&lt;br /&gt;
[[Yocto Project Release Process|Standard release process]]&lt;br /&gt;
&lt;br /&gt;
== Decision Makers==&lt;br /&gt;
Decisions are expected to be handled by the maintainers. The TSC holds the ultimate decision making authority in case of disagreement. The TSC makes the final release go/nogo decisions.&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85649</id>
		<title>Contributors Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85649"/>
		<updated>2023-02-14T09:38:45Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Plans for a hypothetical Maintainers Manual (which doubles as a Contributor manual).&lt;br /&gt;
&lt;br /&gt;
* Patch guidelines (style guide (code and patch description), patch tags)&lt;br /&gt;
** What to look for before sending? (No warning added, tests to do)&lt;br /&gt;
** A checklist&lt;br /&gt;
* Patch submission process (git-send-email, lore, master-then-branches)&lt;br /&gt;
** What does it mean to review a patch? (kernel doc &amp;quot;Submitting patches&amp;quot; has an example of this)&lt;br /&gt;
* [[CVE Triage]] process&lt;br /&gt;
* Autobuilder&lt;br /&gt;
&lt;br /&gt;
Some related sparse info elsewhere :&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/ref-manual/resources.html Yocto docs: Contributions and Additional Information]&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/dev-manual/changes.html Yocto docs: Making Changes to the Yocto Project]&lt;br /&gt;
* [[Newcomers]]&lt;br /&gt;
* [[Community_Guidelines]]&lt;br /&gt;
* [[Poky_Contributions]]&lt;br /&gt;
* [https://kernel.org/doc/html/latest/process/submitting-patches.html Submitting patches: the essential guide to getting your code into the kernel]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Developer_Workflow_Improvements&amp;diff=85621</id>
		<title>Developer Workflow Improvements</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Developer_Workflow_Improvements&amp;diff=85621"/>
		<updated>2023-01-24T19:52:51Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Configure */ small typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to Yocto Project [[Main Page]]&lt;br /&gt;
= Introduction =&lt;br /&gt;
The page describes how new tools such as [https://www.gitbook.com/book/dnplas/yocto-project-crops/details Cross Platform Support] (CROPS), [http://www.yoctoproject.org/docs/current/sdk-manual/sdk-manual.html#sdk-extensible-sdk-intro Extensible SDK] (eSDK), [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#dev-modifying-source-code devtool] and [https://www.yoctoproject.org/docs/current/toaster-manual/toaster-manual.html#toaster-manual-intro Toaster] make it easier to get the best out of Yocto. To benefit from this article the reader must be comfortable with the basics of the Yocto Project (i.e. has gone through [http://www.yoctoproject.org/docs/current/yocto-project-qs/yocto-project-qs.html Quick Start Guide] and knows how to add packages to an image).&lt;br /&gt;
&lt;br /&gt;
We envisage two distinct workflows, layer maintenance and application development.&lt;br /&gt;
&lt;br /&gt;
== Layer Maintenance ==&lt;br /&gt;
* This workflow is mainly bug fixing recipes and upgrading to never versions. Updated recipes are then submitted to layer maintainers. It also includes building images that exercise the recipes under test. &lt;br /&gt;
* Typically this is done in the distro maintainer (i.e. bitbake) environment, but the extensible SDK can be a better option as it enables an easy to configure common development environment.&lt;br /&gt;
&lt;br /&gt;
== Application Development ==&lt;br /&gt;
* Poky or Toaster is used to generate a minimal eSDK installer. &lt;br /&gt;
* A developer uses resulting eSDK to create/modify an application by using devtool (iterative process). &lt;br /&gt;
* Once application is complete its recipe is added to a layer and Toaster is used to build an image that includes it&lt;br /&gt;
&lt;br /&gt;
= Workflow Vision =&lt;br /&gt;
This section calls out the workflows in more detail, describing specific use of tools in each step.&lt;br /&gt;
&lt;br /&gt;
The [[Developer Workflow Improvements#Instructions for Workflow in Current Form | set-up instructions]] at the end of this page represent the &amp;quot;what can currently be done&amp;quot; version of the workflows.&lt;br /&gt;
&lt;br /&gt;
== Build OS Image ==&lt;br /&gt;
# On OS of your choice start containerized Poky or Toaster instance. &lt;br /&gt;
# If running Poky container on Windows or Mac you must also start the samba container so that host OS has access to files in the container.&lt;br /&gt;
# Add new layers and packages as required to create OS on which applications will run&lt;br /&gt;
# Build image and validate&lt;br /&gt;
&lt;br /&gt;
== Creating Extensible SDK ==&lt;br /&gt;
# Build image as above&lt;br /&gt;
# Then build Extensible SDK&lt;br /&gt;
# Publish components required for app development&lt;br /&gt;
## eSDK installer&lt;br /&gt;
## eSDK updater files&lt;br /&gt;
## shared state&lt;br /&gt;
&lt;br /&gt;
== Application Development ==&lt;br /&gt;
=== One time set-up on OS of your choice ===&lt;br /&gt;
# Create docker volume so that files fetched and created in the container are visible to host OS.&lt;br /&gt;
# Use extensible SDK container to install eSDK to volume.&lt;br /&gt;
# Development can also be done on the command line.&lt;br /&gt;
# Optionally install Eclipse and CROPS plug-in that&lt;br /&gt;
=== App development ===&lt;br /&gt;
# Start extensible SDK container so you can run devtool from command line or invoke it from Eclipse plug-in.&lt;br /&gt;
# Start samba container so that files are visible to host OS&lt;br /&gt;
# Use &#039;&#039;&#039;devtool&#039;&#039;&#039; to &#039;add&#039; application project from its URL. This pulls down source code, tries to work out dependent packages and generates a recipe&lt;br /&gt;
# Although generated recipe will likely build, it may need some tweaks to some of the tasks (e.g. configure, compile, install)&lt;br /&gt;
# Once app is building, iteratvely develop using devtool (or Eclipse) to deploy and test on target &lt;br /&gt;
# Build new image including new layer and recipe and validate&lt;br /&gt;
&lt;br /&gt;
== Layer Maintenance ==&lt;br /&gt;
# Build image as above&lt;br /&gt;
# Use &#039;&#039;&#039;devtool modify&#039;&#039;&#039; to update recipe&lt;br /&gt;
# Iterative development as per application development.&lt;br /&gt;
# Build image and validate&lt;br /&gt;
# Publish updated recipe&lt;br /&gt;
&lt;br /&gt;
= Instructions for Workflow in Current Form =&lt;br /&gt;
If you are inside a corporate firewall, install and configure the [https://github.com/crops/chameleonsocks Chameleonsocks] container based proxy solution. &lt;br /&gt;
&lt;br /&gt;
You have choice between using the Yocto Project tools on the command line with the Poky container or by using the Toaster web interface. Toaster is easier to get going but most needs more work to get the best of out interface (see section below), so these instructions will assume use of the command line.&lt;br /&gt;
&lt;br /&gt;
== Build OS image ==&lt;br /&gt;
We recommend that you first [https://github.com/crops/docker-win-mac-docs/wiki install docker] on your OS of choice and then follow instructions to set up [https://github.com/crops/poky-container/blob/master/README.md Poky] or [https://github.com/crops/toaster-container/blob/master/README.md Toaster] containers. However, these instructions will work for Poky or Toaster on Linux directly but you&#039;re on your own for installation and configuration.&lt;br /&gt;
&lt;br /&gt;
Now add layers and configure so you can build your image.&lt;br /&gt;
&lt;br /&gt;
== Build and Publish eSDK ==&lt;br /&gt;
This section is not part of the developer workflow but documents how the SDK components are generated and published. &lt;br /&gt;
This step creates a small installer that is made available to the developer. You must have access to an http server so you can publish SDK update files. &amp;lt;br/&amp;gt;&lt;br /&gt;
Building and publishing the SDK takes a number of steps. &lt;br /&gt;
=== Configure ===&lt;br /&gt;
Set the following variables in local.conf &lt;br /&gt;
:&amp;lt;tt&amp;gt;SDK_EXT_TYPE = &amp;quot;minimal&amp;quot;&amp;lt;/tt&amp;gt; ensure a minimal SDK build. This produces a small installer and enable components to de downloaded as they are installed&lt;br /&gt;
: SDK_UPDATE_URL points eSDK to URL that contains updates&lt;br /&gt;
:Optionally set &amp;lt;tt&amp;gt;SDK_INCLUDE_PKGDATA = &amp;quot;1&amp;quot;&amp;lt;/tt&amp;gt; to help eSDK users by pre-building all packages in all layers (i.e. not just packages included in the image). The installer remains small as build data is made available via sstate mirror. Downside is that eSDK build will take much longer.&lt;br /&gt;
&lt;br /&gt;
Here are some example settings&lt;br /&gt;
 SDK_EXT_TYPE = &amp;quot;minimal&amp;quot;&lt;br /&gt;
 SDK_UPDATE_URL = &amp;quot;http://my.server.com/path/to/esdk-update&amp;quot;&lt;br /&gt;
 SDK_INCLUDE_PKGDATA = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The URL for the eSDK sstate mirror is not included in the above settings as it would conflict with the mirror used by the main build system. To handle this conflict, the value in put into a separate conf file &amp;lt;tt&amp;gt;conf/sdk-extra.conf&amp;lt;/tt&amp;gt;&lt;br /&gt;
 SSTATE_MIRRORS = &amp;quot;file://.* http://my.server.com/path/to/sstate-cache/PATH&amp;quot; &lt;br /&gt;
Note that if you are using Toaster, you don&#039;t have access to &amp;lt;tt&amp;gt;conf/sdk-extra.conf&amp;lt;/tt&amp;gt;, so you have to set variables via the U/I. This means that Toaster cannot have an sstate mirror for the OS build and set the eSDK&#039;s as follows:&lt;br /&gt;
 SDK_LOCAL_CONF_WHITELIST = &amp;quot;SSTATE_MIRRORS&amp;quot;&lt;br /&gt;
 SSTATE_MIRRORS = &amp;quot;file://.* http://my.server.com/path/to/sstate-cache/PATH&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Build ===&lt;br /&gt;
Assuming image name is my-image, build as follows from command line&lt;br /&gt;
 bitbake my-image -c populate_sdk_ext&lt;br /&gt;
If using Toaster, build &amp;lt;tt&amp;gt;my-image:populate_sdk_ext&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Publish SDK Updater ===&lt;br /&gt;
The eSDK allows web updates, so you have to ensure they appeat at the URK specified by SDK_UPDATE_URL. Assuming /var/www/html/path/to is served up as http://my.server.com/path/to, publish as follows&lt;br /&gt;
 oe-publish-sdk tmp/deploy/sdk/distro-image-toolchain-ext-ver.sh /var/www/html/path/to/esdk-update&lt;br /&gt;
&lt;br /&gt;
=== Publish SSTATE ===&lt;br /&gt;
 cp -r build/sstate-cache /var/www/html/path/to/sstate-cache&lt;br /&gt;
&lt;br /&gt;
=== Publish installer ===&lt;br /&gt;
Copy installer to web server and give this URL to your app developers. &lt;br /&gt;
 cp tmp/deploy/sdk/distro-image-toolchain-ext-ver.sh /var/www/html/path/to/sdk-installer.sh&lt;br /&gt;
&lt;br /&gt;
== Application Development ==&lt;br /&gt;
=== Install and Use eSDK ===&lt;br /&gt;
* This assumes you have docker already installed as per Toaster instructions. No other dependencies are required (that the beauty of containers).&lt;br /&gt;
* Create folder for esdk bind mount where output from container will appear, say /path/to/esdk/workdir&lt;br /&gt;
 mkdir /path/to/esdk/workdir&lt;br /&gt;
* Run container, pointing to URL of eSDK minimal installer. You must do this every time you want to use eSDK. In this example I&#039;m suing an eSDk installer I created that is available at  https://downloads.yoctoproject.org/tools/support/workflow/poky-glibc-x86_64-core-image-minimal-i586-toolchain-ext-2.2.sh&lt;br /&gt;
 docker run --rm -it -v /path/to/esdk-workdir:/workdir crops/extsdk-container --url https://downloads.yoctoproject.org/tools/support/workflow/poky-glibc-x86_64-core-image-minimal-i586-toolchain-ext-2.2.sh&lt;br /&gt;
If you see the error &#039;&#039;&#039;ERROR: The extensible sdk cannot be installed as root.&#039;&#039;&#039; it means that the folder /path/to/esdk-workdir does not exist&lt;br /&gt;
* You now be in the eSDK container shell. &lt;br /&gt;
** For more details on eSDK container see https://github.com/crops/extsdk-container.&lt;br /&gt;
* Now follow instructions from [https://wiki.yoctoproject.org/wiki/Cookbook:Example:Creating_and_updating_recipes_with_devtool Yocto Project cookbook] on building an app.&lt;br /&gt;
* Recipe will be available in /path/to/esdk/workdir/workspace/recipes/bbexample/&lt;br /&gt;
&lt;br /&gt;
= Missing Features =&lt;br /&gt;
These are the features currently missing from the above workflow vision. Think of these as stories in an Agile development environment, rather than bugs. Where possible these are linked to bugzilla entries.&lt;br /&gt;
* Toaster: Base configuration (e.g. define what was Ostro in single configuration file) [https://bugzilla.yoctoproject.org/show_bug.cgi?id=9588 [9588]]&lt;br /&gt;
* Toaster: Simple generation of eSDK installer in Toaster. [https://bugzilla.yoctoproject.org/show_bug.cgi?id=9297 [9297]]&lt;br /&gt;
* Toaster: Layer Maintenance workflow. Requires &amp;quot;local layers&amp;quot; re-design. No bugzilla entry, but see [https://www.youtube.com/watch?v=z5wVjBwJDzY design proposal video]&lt;br /&gt;
* Toaster: Publish layer to Layer Index from Toaster [https://bugzilla.yoctoproject.org/show_bug.cgi?id=9895 [9895]]&lt;br /&gt;
* CROPS: Application builder (but running eSDK in a container gets us close). [https://bugzilla.yoctoproject.org/show_bug.cgi?id=10119 [10119]] [https://bugzilla.yoctoproject.org/show_bug.cgi?id=4209 [4209]] &lt;br /&gt;
* CROPS: Eclipse integration. &#039;&#039;In progress. No bugzilla entry.&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85620</id>
		<title>Contributors Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85620"/>
		<updated>2023-01-24T16:57:44Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Plans for a hypothetical Maintainers Manual (which doubles as a Contributor manual).&lt;br /&gt;
&lt;br /&gt;
* Patch guidelines (style guide (code and patch description), patch tags)&lt;br /&gt;
** What to look for before sending? (No warning added, tests to do)&lt;br /&gt;
** A checklist&lt;br /&gt;
* Patch submission process (git-send-email, lore, master-then-branches)&lt;br /&gt;
** What does it mean to review a patch? (kernel doc &amp;quot;Submitting patches&amp;quot; has an example of this)&lt;br /&gt;
* [[CVE Triage]] process&lt;br /&gt;
* Autobuilder&lt;br /&gt;
&lt;br /&gt;
Some related sparse info elsewhere :&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/ref-manual/resources.html Contributions and Additional Information]&lt;br /&gt;
* [[Newcomers]]&lt;br /&gt;
* [[Community_Guidelines]]&lt;br /&gt;
* [[Poky_Contributions]]&lt;br /&gt;
* [https://kernel.org/doc/html/latest/process/submitting-patches.html Submitting patches: the essential guide to getting your code into the kernel]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85619</id>
		<title>Contributors Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85619"/>
		<updated>2023-01-24T16:52:43Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: Add references&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Plans for a hypothetical Maintainers Manual (which doubles as a Contributor manual).&lt;br /&gt;
&lt;br /&gt;
* Patch guidelines (style guide (code and patch description), patch tags)&lt;br /&gt;
** What to look for before sending? (No warning added, tests to do)&lt;br /&gt;
** A checklist&lt;br /&gt;
* Patch submission process (git-send-email, lore, master-then-branches)&lt;br /&gt;
* [[CVE Triage]] process&lt;br /&gt;
* Autobuilder&lt;br /&gt;
&lt;br /&gt;
Some related sparse info elsewhere :&lt;br /&gt;
* [https://docs.yoctoproject.org/dev/ref-manual/resources.html Contributions and Additional Information]&lt;br /&gt;
* [[Newcomers]]&lt;br /&gt;
* [[Community_Guidelines]]&lt;br /&gt;
* [[Poky_Contributions]]&lt;br /&gt;
* [https://kernel.org/doc/html/latest/process/submitting-patches.html Submitting patches: the essential guide to getting your code into the kernel]&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85618</id>
		<title>Contributors Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Contributors_Manual&amp;diff=85618"/>
		<updated>2023-01-24T16:45:06Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Plans for a hypothetical Maintainers Manual (which doubles as a Contributor manual).&lt;br /&gt;
&lt;br /&gt;
* Patch guidelines (style guide (code and patch description), patch tags)&lt;br /&gt;
** What to look for before sending? (No warning added, tests to do)&lt;br /&gt;
** A checklist&lt;br /&gt;
* Patch submission process (git-send-email, lore, master-then-branches)&lt;br /&gt;
* [[CVE Triage]] process&lt;br /&gt;
* Autobuilder&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=User:Yoann_Congal&amp;diff=85617</id>
		<title>User:Yoann Congal</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=User:Yoann_Congal&amp;diff=85617"/>
		<updated>2023-01-24T16:27:28Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Embedded software expert at [https://www.smile.eu/fr/offres/embarque-iot Smile ECS] (France)&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Project_Users&amp;diff=84768</id>
		<title>Project Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Project_Users&amp;diff=84768"/>
		<updated>2021-06-18T20:56:55Z</updated>

		<summary type="html">&lt;p&gt;Yoann Congal: /* Others */ Add URL for Smile ECS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It&#039;s hard to know which companies or projects use the Yocto Project since there is no requirement to tell us. This list is here to informally collate the companies, projects and products that use the Yocto Project in some way.&lt;br /&gt;
&lt;br /&gt;
= Companies using the Yocto Project =&lt;br /&gt;
&lt;br /&gt;
== Semiconductor Vendors ==&lt;br /&gt;
* AMD (Silver Member)&lt;br /&gt;
* ARM (Platinum Member)&lt;br /&gt;
* Intel (Platinum Member)&lt;br /&gt;
* Microchip&lt;br /&gt;
* NXP (Silver Member)&lt;br /&gt;
* Qualcomm&lt;br /&gt;
* Renesas (Gold Member)&lt;br /&gt;
* STMicroelectronics (Silver Member)&lt;br /&gt;
* Texas Instruments (Gold Member)&lt;br /&gt;
* Xilinx (Platinum Member)&lt;br /&gt;
&lt;br /&gt;
== Operating System Vendors ==&lt;br /&gt;
* ENEA (Silver Member)&lt;br /&gt;
* Linaro (Silver Member)&lt;br /&gt;
* Lineo (Silver Member)&lt;br /&gt;
* Mentor Graphics (Gold Member)&lt;br /&gt;
* Montavista (Silver Member)&lt;br /&gt;
* Wind River (Gold Member)&lt;br /&gt;
&lt;br /&gt;
== Others ==&lt;br /&gt;
* [https://alladin.at/ alladin-IT GmbH]&lt;br /&gt;
* Atlas Copco&lt;br /&gt;
* AWS (Platinum Member)&lt;br /&gt;
* Axis Communications&lt;br /&gt;
* [https://www.balena.io/ Balena]&lt;br /&gt;
* BMW&lt;br /&gt;
* BMW Car IT&lt;br /&gt;
* [https://bootlin.com/ Bootlin]&lt;br /&gt;
* Cisco (Platinum Member)&lt;br /&gt;
* Comcast (Platinum Member)&lt;br /&gt;
* [https://www.cytera.bio/ Cytera] (via Belena)&lt;br /&gt;
* Dell (Silver Member)&lt;br /&gt;
* Dynamic Devices&lt;br /&gt;
* Facebook (Platinum Member)&lt;br /&gt;
* Fujitsu&lt;br /&gt;
* [https://www.gardena.com/ GARDENA] (Husqvarna Group)&lt;br /&gt;
* [https://www.garmin.com/ Garmin]&lt;br /&gt;
* General Electric&lt;br /&gt;
* Juniper&lt;br /&gt;
* [https://koansoftware.com/ KOAN sas]&lt;br /&gt;
* Kodak&lt;br /&gt;
* Lexmark&lt;br /&gt;
* LG (Silver Member)&lt;br /&gt;
* Microsoft (Platinum Member)&lt;br /&gt;
* National Instruments&lt;br /&gt;
* [https://www.ovo.auto/ OVO Automotive]&lt;br /&gt;
* [https://www.smile.eu/en/offers/embedded-iot Smile ECS]&lt;br /&gt;
* StreamUnlimited Engineering GmbH&lt;br /&gt;
* [https://www.witekio.com/values-expertise/ Witekio]&lt;br /&gt;
&lt;br /&gt;
= Products that use the Yocto Project =&lt;br /&gt;
&lt;br /&gt;
* BMW cars&lt;br /&gt;
* Comcast set top boxes&lt;br /&gt;
* [https://www.gardena.com/int/products/smart/ GARDENA smart garden] (The smart garden gateway runs Yocto/OpenEmbedded. Open source parts can be found [https://github.com/husqvarnagroup/smart-garden-gateway-public on GitHub.])&lt;br /&gt;
* Some Garmin [https://www.garmin.com/marine/ Marine] Products&lt;br /&gt;
* Go Pro (https://gopro.com/content/dam/help/open-source/2020-09-28%20-%20HERO9%20Black%20-GoPro%20Open%20Source%20Software%20Notice.pdf)&lt;br /&gt;
* Lexmark Printers&lt;br /&gt;
* LG webOS TVs&lt;br /&gt;
* Mellanox Bluefield SmartNIC&lt;br /&gt;
* [https://www.streamunlimited.com/hardware-modules/ StreamUnlimited hardware modules for voice assistants and connected speakers]&lt;br /&gt;
* Vernier LabQuest&lt;br /&gt;
&lt;br /&gt;
= Projects that use the Yocto Project =&lt;br /&gt;
&lt;br /&gt;
* [https://www.automotivelinux.org/ Automotive Grade Linux (AGL)]&lt;br /&gt;
* [https://www.balena.io/ Balena]&lt;br /&gt;
* Comcast RDK&lt;br /&gt;
* Nvidia vibrante SDK [https://docs.nvidia.com/drive/archive/4.1.8.0L/nvoss_docs/index.html]&lt;br /&gt;
* OpenBMC&lt;br /&gt;
* [https://oryx-linux.org/ Oryx Linux]&lt;br /&gt;
* [https://www.streamunlimited.com/stream-sdk/ StreamSDK for voice assistants and connected speakers]&lt;br /&gt;
* Windows Subsystem Linux (v1+v2)&lt;br /&gt;
* webOS&lt;/div&gt;</summary>
		<author><name>Yoann Congal</name></author>
	</entry>
</feed>