<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Simonew</id>
	<title>Yocto Project - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Simonew"/>
	<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/Special:Contributions/Simonew"/>
	<updated>2026-04-07T02:59:59Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.5</generator>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86263</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86263"/>
		<updated>2024-03-10T11:29:39Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2024-0684 (coreutils) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream, disputed by maintainer see https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25739 CVE-2024-25739] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25740 CVE-2024-25740] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86262</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86262"/>
		<updated>2024-03-10T11:29:15Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-6780 (glibc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream, disputed by maintainer see https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25739 CVE-2024-25739] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25740 CVE-2024-25740] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86261</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86261"/>
		<updated>2024-03-10T11:28:31Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-6683 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream, disputed by maintainer see https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25739 CVE-2024-25739] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25740 CVE-2024-25740] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86256</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86256"/>
		<updated>2024-03-03T11:52:41Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-7216 (cpio) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] is merged to master&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream, disputed by maintainer see https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25739 CVE-2024-25739] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25740 CVE-2024-25740] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86255</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86255"/>
		<updated>2024-03-03T11:51:55Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2024-24860 (linux-yocto) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] is merged to master&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25739 CVE-2024-25739] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25740 CVE-2024-25740] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86246</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86246"/>
		<updated>2024-02-25T12:55:53Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2021-3864 (linux-yocto) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] is merged to master&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86245</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86245"/>
		<updated>2024-02-25T12:54:07Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-3180 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] is merged to master&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86244</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86244"/>
		<updated>2024-02-25T12:52:04Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-6683 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] is merged to master&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86243</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86243"/>
		<updated>2024-02-25T12:35:26Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-6693 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86242</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86242"/>
		<updated>2024-02-25T12:35:04Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-5088 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86241</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86241"/>
		<updated>2024-02-25T12:34:43Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-4693 (grub:grub-efi:grub-native) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86240</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86240"/>
		<updated>2024-02-25T12:34:32Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-4692 (grub) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86239</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86239"/>
		<updated>2024-02-25T12:34:16Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-38559 (ghostscript) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86238</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86238"/>
		<updated>2024-02-25T12:33:56Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-3164 (tiff) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86237</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86237"/>
		<updated>2024-02-25T12:33:34Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-3019 (qemu) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86236</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86236"/>
		<updated>2024-02-25T12:33:12Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-25584 (binutils) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024. NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=User:Simonew&amp;diff=86222</id>
		<title>User:Simonew</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=User:Simonew&amp;diff=86222"/>
		<updated>2024-02-20T13:46:30Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When I find stuff missing/outdated here -  I try to add it directly.&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Patchtest&amp;diff=86221</id>
		<title>Patchtest</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Patchtest&amp;diff=86221"/>
		<updated>2024-02-20T13:45:12Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Patchtest ==&lt;br /&gt;
&lt;br /&gt;
Patchtest is a tool designed for improving the quality of Yocto Project and OpenEmbedded contributors&#039; patch submissions, while simultaneously reducing the level of review effort required from project maintainers. It does this by providing a set of scripts that users can test their patches with prior to submission (&amp;quot;host&amp;quot; mode), and which can be used as part of an automated service that provides periodic feedback for patches received by Patchwork (&amp;quot;guest&amp;quot; mode).&lt;br /&gt;
&lt;br /&gt;
=== Using Patchtest ===&lt;br /&gt;
&lt;br /&gt;
See the [https://git.yoctoproject.org/poky/tree/scripts/patchtest.README patchtest README] for instructions on how to use patchtest in your local workspace, and the [https://git.yoctoproject.org/meta-patchtest/tree/README.md meta-patchtest README] for details on automated/guest mode setup.&lt;br /&gt;
&lt;br /&gt;
=== Patchtest &amp;quot;FAIL:&amp;quot; Descriptions ===&lt;br /&gt;
&lt;br /&gt;
The patchtest feedback email is designed to provide concise instructions when one or more of the tests has failed, but additional information on specific failures is provided below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Testcase !! Details !! Further information&lt;br /&gt;
|-&lt;br /&gt;
| test_upstream_status_presence_format || This testcase checks if newly introduced *.patch files contain a valid upstream status, if not included the testcase fails || https://docs.yoctoproject.org/dev/contributor-guide/recipe-style-guide.html?highlight=upstream+status#patch-upstream-status &lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || This testcase checks if newly introduced *.patch files contain a Signed-off-by, if not included the testcase fails  || https://docs.yoctoproject.org/dev/contributor-guide/recipe-style-guide.html?highlight=signed+off#patch-upstream-status&lt;br /&gt;
|-&lt;br /&gt;
| test_cve_tag_format ||  Whenever a submission adds a CVE patch, patchtest will check both the patch &#039;&#039;&#039;and the parent mbox&#039;s commit message&#039;&#039;&#039; for a &amp;quot;CVE: CVE-YYYY-XXXX&amp;quot; tag. While this has historically not been required, including the tag in both locations aids review and maintenance. || https://docs.yoctoproject.org/dev/contributor-guide/recipe-style-guide.html?highlight=signed+off#cve-patches&lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || This testcase checks if the tested patch contains a valid Signed-off-by || If it fails you can add it manually or with &amp;quot;git commit --amend -s&amp;quot;, See also https://docs.yoctoproject.org/dev/contributor-guide/submit-changes.html#implement-and-commit-changes&lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_format || This testcases checks the format of the shortlog (header line in the commit message). The expected format is: &amp;lt;target&amp;gt;: &amp;lt;summary&amp;gt;, where component is a recipe name or the short form path to the file being changed || https://docs.yoctoproject.org/dev/contributor-guide/submit-changes.html#implement-and-commit-changes&lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_length || This failure indicates that the shortlog (i.e. the subject line) for the patch is so long that it may not be easily readable on some mail clients. Some subject prefixes (e.g. the branch name when submitting a patch for an older release) may unavoidably inflate the length, but the shortlog should be kept as short and concise as possible so that it is clear what the patch does and what it changes. Extra information can always be provided in the commit message. || https://docs.yoctoproject.org/dev/contributor-guide/submit-changes.html#implement-and-commit-changes&lt;br /&gt;
|-&lt;br /&gt;
| test_series_merge_on_head || Checks if series applies on top of target branch. Temporary disabled, but ensure your series applies cleanly || https://docs.yoctoproject.org/overview-manual/development-environment.html?highlight=git#git&lt;br /&gt;
|-&lt;br /&gt;
| test_target_mailing_list || Checks if series is sent to the correct mailing list for all files in the series. Poky is a combo layer combining bitbake, openembedded-core, meta-yocto and yocto-docs. Please create and submit patches against the individual components. || https://docs.yoctoproject.org/contributor-guide/identify-component.html&lt;br /&gt;
|-&lt;br /&gt;
| test_mbox_format || Checks if the patch has no malformed diff lines and can be applied cleanly. ||  Create the series again using git-format-patch and ensure it applies using git am. See also: https://docs.yoctoproject.org/overview-manual/development-environment.html?highlight=git#git&lt;br /&gt;
|-&lt;br /&gt;
| test_commit_message_presence || This testcases fails if a submission has an empty commit message. Provide for example detailed information on what you changed and why, how you tested it.  || https://docs.yoctoproject.org/dev/contributor-guide/submit-changes.html#implement-and-commit-changes&lt;br /&gt;
|-&lt;br /&gt;
| test_bugzilla_entry_format || Checks that the Bugzilla issue ID, if mentioned in the commit message, is correctly formatted. Format is: &amp;quot;[YOCTO #&amp;lt;bugzilla ID&amp;gt;]. || https://docs.yoctoproject.org/dev/contributor-guide/submit-changes.html#implement-and-commit-changes  &lt;br /&gt;
|-&lt;br /&gt;
| test_author_valid || A patch authored by an invalid author was detected. || You can amend the author via git commit --amend&lt;br /&gt;
|-&lt;br /&gt;
| test_non_auh_upgrade || A patch authored by the Auto-Upgrade Helper (AUH) was detected. These patches are meant to provide maintainers with a sanity check for recipe upgrades and a starting point for testing them, so patches submitted with that authorship are marked as failures to indicate that they have not been fully validated. || For a overview of AUH see also: https://docs.yoctoproject.org/dev/dev-manual/upgrading-recipes.html#using-the-auto-upgrade-helper-auh &lt;br /&gt;
|-&lt;br /&gt;
| test_pylint || Fails if patch contains .py files and pylint detected new issues if the patch is applied || Check changes with pylint and amend patch &lt;br /&gt;
|-&lt;br /&gt;
| test_license_presence || Checks to ensure that LICENSE is set for a newly added recipe. || https://docs.yoctoproject.org/dev/ref-manual/variables.html#term-LICENSE &lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_presence || Checks to ensure that LIC_FILES_CHKSUM is present, if not then this test will fail. || https://docs.yoctoproject.org/dev/dev-manual/licenses.html#tracking-license-changes&lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_modified_not_mentioned || Checks to ensure that any changes made to LIC_FILES_CHKSUM lines (including checksums for new files) are accounted for in the commit message with at least one &amp;quot;License-Update: &amp;lt;reason&amp;gt;&amp;quot; tag. If this is not present, then this test will fail. ||  https://docs.yoctoproject.org/dev/contributor-guide/recipe-style-guide.html?highlight=license+update#license-updates&lt;br /&gt;
|-&lt;br /&gt;
| test_max_line_length || Checks if any line in the meta-data changed in series contains no lines that are longer that 200 characters. || Please ensure that lines do not exceed this length and amend your patch  &lt;br /&gt;
|-&lt;br /&gt;
| test_src_uri_left_files || Checks if all files removed from SRC_URI are also removed from the tree. || Please remove files that are not included in the SRC_URI from the tree as wll, e.g. with git rm &amp;lt;file&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| test_summary_presence || Checks if SUMMARY is set for newly added recipes. Should be set to a short description of the package created by the recipe. || https://docs.yoctoproject.org/dev/ref-manual/variables.html#term-SUMMARY  &lt;br /&gt;
|-&lt;br /&gt;
| test_cve_check_ignore || Fails if the deprecated CVE_CHECK_INGNORE is used instead of CVE_STATUS. || https://docs.yoctoproject.org/dev/ref-manual/variables.html#term-CVE_STATUS &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Tests failed for the patch, but the results log could not be processed due to excessive result line length. ====&lt;br /&gt;
&lt;br /&gt;
The patchtest-send-results script checks the test results&#039; maximum line length to help ensure that no unintended and/or malicious code is sent to the mailing list with the results. If this message is present, the user should re-test their patch(es) locally using the &#039;&#039;&#039;patchtest&#039;&#039;&#039; script in openembedded-core/scripts before further escalation. If the issue persists after re-testing and re-submission it should be reported on the Yocto Project [https://bugzilla.yoctoproject.org/ Bugzilla] under the &amp;quot;Yocto Project Subprojects&amp;quot; -&amp;gt; &amp;quot;Patchtest&amp;quot; category with a &amp;quot;Major&amp;quot; priority (include the patch file as an attachment).&lt;br /&gt;
&lt;br /&gt;
=== Submitting Bug Reports ===&lt;br /&gt;
&lt;br /&gt;
If you suspect there is an issue with the patchtest feedback emails, the service itself, or any of the documentation, please submit an issue on the Yocto Project Bugzilla [https://bugzilla.yoctoproject.org/ Bugzilla] under the &amp;quot;Yocto Project Subprojects&amp;quot; -&amp;gt; &amp;quot;Patchtest&amp;quot; category.&lt;br /&gt;
&lt;br /&gt;
=== Patchtest Architecture Notes ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:align-left&amp;quot;&lt;br /&gt;
|+ Test Suite Details&lt;br /&gt;
|-&lt;br /&gt;
! Test Name !! Category !! Uses Tinfoil !! Notes&lt;br /&gt;
|-&lt;br /&gt;
| test_upstream_status_presence_format || TestPatch || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || TestPatch || No || Same test name as similar test in TestMbox&lt;br /&gt;
|-&lt;br /&gt;
| test_cve_tag_format || TestPatch || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || TestMbox || No || Same test name as similar test in TestPatch&lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_length || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_series_merge_on_head || TestMbox || No || Temporarily disabled&lt;br /&gt;
|-&lt;br /&gt;
| test_target_mailing_list || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_mbox_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_commit_message_presence || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_bugzilla_entry_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_author_valid || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_non_auh_upgrade || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_pylint || PyLint || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_license_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_modified_not_mentioned || TestMetadata || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_max_line_length || TestMetadata || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_src_uri_left_files || TestMetadata || Yes || Has a linked pretest: pretest_src_uri_left_files&lt;br /&gt;
|-&lt;br /&gt;
| test_summary_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_cve_check_ignore || TestMetadata || Yes || &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86219</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86219"/>
		<updated>2024-02-18T22:38:43Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* CVE-2023-7216 (cpio) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024. NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
Open upstream&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86218</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86218"/>
		<updated>2024-02-18T22:38:09Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024. NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86217</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86217"/>
		<updated>2024-02-18T21:27:12Z</updated>

		<summary type="html">&lt;p&gt;Simonew: triage 18-feb-2024&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024. NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6240 CVE-2023-6240] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6356 CVE-2023-6356] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6535 CVE-2023-6535] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6536 CVE-2023-6536] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-7216 CVE-2023-7216] (cpio) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-0684 CVE-2024-0684] (coreutils) ===&lt;br /&gt;
Fix available, but not in any release yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24860 CVE-2024-24860] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Setting_up_a_production_instance_of_Toaster&amp;diff=86216</id>
		<title>Setting up a production instance of Toaster</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Setting_up_a_production_instance_of_Toaster&amp;diff=86216"/>
		<updated>2024-02-18T00:42:24Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Toaster]]&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;color:black; background-color:#ffffcc&amp;quot; width=&amp;quot;100%&amp;quot; cellpadding=&amp;quot;10&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|This page is the development version of the documentation to provide the latest information, if you&#039;re using a release please refer to [https://docs.yoctoproject.org/toaster-manual/index.html the published manual]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
A production instance of Toaster is one in which you wish to share the Toaster instance with remote and multiple users. It is also the setup which can cope with heavier loads on the web service. These instructions setup toaster in Build mode where builds and projects are run, viewed and defined by the Toaster web interface.&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
* [http://www.yoctoproject.org/docs/2.0/yocto-project-qs/yocto-project-qs.html#packages Build requirements]&lt;br /&gt;
* Apache webserver&lt;br /&gt;
* mod-wsgi for Apache webserver&lt;br /&gt;
* Mysql database server&lt;br /&gt;
&lt;br /&gt;
Ubuntu 14.04.3:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
    $ sudo apt-get install apache2 libapache2-mod-wsgi mysql-server python-virtualenv libmysqlclient-dev python-dev python-mysqldb&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Fedora 22/RH:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
    $ sudo dnf install httpd mod_wsgi python-virtualenv gcc mysql-devel&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Checkout a copy of Poky into the web server directory. We&#039;re going to be using /var/www/toaster.&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
  $ mkdir -p /var/www/toaster&lt;br /&gt;
  $ cd /var/www/toaster/&lt;br /&gt;
  $ git clone git://git.yoctoproject.org/poky&lt;br /&gt;
  $ cd poky&lt;br /&gt;
  $ git checkout jethro # change for any release name required&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Initialise a virtualenv and install Toaster dependencies. (Use virtualenv to keep the python packages isolated from your system provided packages - not required but recommended, alternative use your OS&#039;s package manager to install the packages)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
   $ cd /var/www/toaster/&lt;br /&gt;
   $ virtualenv venv&lt;br /&gt;
   $ source ./venv/bin/activate&lt;br /&gt;
   $ pip install -r ./poky/bitbake/toaster-requirements.txt&lt;br /&gt;
   $ pip install mysqlclient&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3.&#039;&#039;&#039; Configure toaster edit /var/www/toaster/poky/bitbake/lib/toaster/toastermain/settings.py&lt;br /&gt;
&lt;br /&gt;
Edit the DATABASE settings:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 DATABASES = {&lt;br /&gt;
     &#039;default&#039;: {&lt;br /&gt;
         &#039;ENGINE&#039;: &#039;django.db.backends.mysql&#039;, &lt;br /&gt;
         &#039;NAME&#039;: &#039;toaster_data&#039;,                     &lt;br /&gt;
         &#039;USER&#039;: &#039;toaster&#039;,&lt;br /&gt;
         &#039;PASSWORD&#039;: &#039;yourpasswordhere&#039;,&lt;br /&gt;
         &#039;HOST&#039;: &#039;localhost&#039;,                 &lt;br /&gt;
         &#039;PORT&#039;: &#039;3306&#039;,                      &lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Edit the [https://docs.djangoproject.com/en/1.8/howto/deployment/checklist/#secret-key SECRET_KEY]:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 SECRET_KEY = &#039;YOUR SECRET RANDOM KEY HERE&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Edit the STATIC_ROOT:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 STATIC_ROOT = &#039;/var/www/toaster/static_files/&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4.&#039;&#039;&#039;&#039; Now add the database and user to your mysql server that we just defined&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 $ mysql -u root -p&lt;br /&gt;
 mysql&amp;gt; CREATE DATABASE toaster_data;&lt;br /&gt;
 mysql&amp;gt; CREATE USER &#039;toaster&#039;@&#039;localhost&#039; identified by &#039;yourpasswordhere&#039;;&lt;br /&gt;
 mysql&amp;gt; GRANT all on toaster_data.* to &#039;toaster&#039;@&#039;localhost&#039;;&lt;br /&gt;
 mysql&amp;gt; quit&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
n.b. You may want to decide on fewer [https://dev.mysql.com/doc/refman/5.1/en/grant.html privileges] to the toaster user. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5.&#039;&#039;&#039; Get toaster to create the database schema, default data, update the TOASTER_DIR which is the build work dir and collect up the statically served files&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 $ cd  /var/www/toaster/poky/&lt;br /&gt;
 $ ./bitbake/lib/toaster/manage.py migrate&lt;br /&gt;
 $ ./bitbake/lib/toaster/manage.py loadconf ./meta-yocto/conf/toasterconf.json&lt;br /&gt;
 $ TOASTER_DIR=/var/www/toaster/poky/ ./bitbake/lib/toaster/manage.py checksettings&lt;br /&gt;
 $ ./bitbake/lib/toaster/manage.py lsupdates&lt;br /&gt;
 $ ./bitbake/lib/toaster/manage.py collectstatic&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6.&#039;&#039;&#039; Add a config file for Toaster to your Apache web server&#039;s configurations available directory.&lt;br /&gt;
&lt;br /&gt;
Ubuntu/Debian put it here: /etc/apache2/conf-available/toaster.conf&lt;br /&gt;
Fedora/RH usually here: /etc/httpd/conf.d/toaster.conf&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Alias /static /var/www/toaster/static_files&lt;br /&gt;
 &amp;lt;Directory /var/www/toaster/static_files&amp;gt;&lt;br /&gt;
 	Order allow,deny&lt;br /&gt;
 	Allow from all&lt;br /&gt;
 	Require all granted&lt;br /&gt;
 &amp;lt;/Directory&amp;gt;&lt;br /&gt;
 WSGIDaemonProcess toaster_wsgi python-path=/var/www/toaster/poky/bitbake/lib/toaster:/var/www/toaster/venv/lib/python2.7/site-packages&lt;br /&gt;
 WSGIScriptAlias / &amp;quot;/var/www/toaster/poky/bitbake/lib/toaster/toastermain/wsgi.py&amp;quot;&lt;br /&gt;
 &amp;lt;Location /&amp;gt;&lt;br /&gt;
     WSGIProcessGroup toaster_wsgi&lt;br /&gt;
 &amp;lt;/Location&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In Ubuntu/Debain you will need to enable the config and module in Apache webserver&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
   $ sudo a2enmod wsgi&lt;br /&gt;
   $ sudo a2enconf toaster&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Restart Apache web server to make sure all new configuration is loaded&lt;br /&gt;
&lt;br /&gt;
Ubuntu/Debian:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
   $ sudo service apache2 restart&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Fedora/RH:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
   $ sudo service httpd restart&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7.&#039;&#039;&#039; Install the build runner service&lt;br /&gt;
&lt;br /&gt;
This service needs to be running in order to dispatch builds the command that needs to be run is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 $ source oe-init-build-env&lt;br /&gt;
 $ source toaster start noweb&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example upstart service /etc/init/toaster-buildservice.conf :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 author &amp;quot;Michael W&amp;quot;&lt;br /&gt;
 description &amp;quot;start and stop toaster build service&amp;quot;&lt;br /&gt;
 version &amp;quot;1.0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 start on started networking&lt;br /&gt;
 stop on runlevel [!2345]&lt;br /&gt;
&lt;br /&gt;
 respawn&lt;br /&gt;
&lt;br /&gt;
 script&lt;br /&gt;
   exec su toasterbuilder -c &amp;quot;cd /var/www/toaster/poky &amp;amp;&amp;amp; source oe-init-build-env &amp;amp;&amp;amp; source toaster start noweb&amp;quot;&lt;br /&gt;
 end script&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example systemd service usually in /lib/systemd/system/toaster.service:&lt;br /&gt;
&amp;lt;pre&amp;gt; &lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Toaster runbuilds&lt;br /&gt;
 &lt;br /&gt;
[Service]&lt;br /&gt;
Type=forking&lt;br /&gt;
User=toaster&lt;br /&gt;
ExecStart=/var/www/toaster/toaster-service.sh start&lt;br /&gt;
ExecStop=/var/www/toaster/toaster-service.sh stop&lt;br /&gt;
 &lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=multi-user.target&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
script /var/www/toaster/toaster-service.sh:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
 &lt;br /&gt;
cd /var/www/toaster/poky/&lt;br /&gt;
 &lt;br /&gt;
source oe-init-build-env&lt;br /&gt;
if [ &amp;quot;$1&amp;quot; == &#039;start&#039; ]; then&lt;br /&gt;
  source ../bitbake/bin/toaster start noweb&lt;br /&gt;
fi&lt;br /&gt;
 &lt;br /&gt;
if [ &amp;quot;$1&amp;quot; == &#039;stop&#039; ]; then&lt;br /&gt;
  source ../bitbake/bin/toaster stop&lt;br /&gt;
fi&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
N.b. You may wish to add a service entry to your OS&#039;s init system so that it starts up on start up as well as adding a dedicated user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now open up a browser and you can start using Toaster!&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86210</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86210"/>
		<updated>2024-02-12T17:45:10Z</updated>

		<summary type="html">&lt;p&gt;Simonew: mentioned when NVD was pinged 12/02/2024.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024. NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe.  NVD pinged 12/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86209</id>
		<title>CVE Status</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=CVE_Status&amp;diff=86209"/>
		<updated>2024-02-11T17:26:29Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Update with new/removed CVEs cw 06/24&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of CVEs which are currently being reported as open, and the current state.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 CVE-2019-14899] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Claims to be about breaking into VPN tunnels. OpenVPN dispute, Red Hat think it might actually have a larger scope but also the paper is misleading.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3714 CVE-2021-3714] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Flaw in kernel memory de-duplication. Still an issue, albeit minor.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3864 CVE-2021-3864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Issue with suid binaries and coredumps. Last known progress on mitigating was [https://lore.kernel.org/lkml/CAAq0SUmw3fGtwDifbBMrD7jgPBGQb7uC0K9hJetVTRQO7boPtA@mail.gmail.com/t/#u this thread].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3219 CVE-2022-3219] (gnupg) ===&lt;br /&gt;
&lt;br /&gt;
Hypothetical DoS. A patch [https://dev.gnupg.org/D556 was proposed] but hasn&#039;t been reviewed or merged.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0400 CVE-2022-0400] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Out-of-bounds read in the SMC stack. Details are still embargoed so can&#039;t tell what this actually impacts.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1247 CVE-2022-1247] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Race in the X.25 AF_ROSE implementation, so only an issue if &amp;lt;tt&amp;gt;CONFIG_ROSE&amp;lt;/tt&amp;gt; is enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4543 CVE-2022-4543] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
aka EntryBleed. Vulnerable on x86-64 systems.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38096 CVE-2022-38096] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Bug in vmwgfx driver, still open. Mitigated if CONFIG_DRM_VMWGFX is not enabled.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 CVE-2022-46456] (nasm) ===&lt;br /&gt;
&lt;br /&gt;
Buffer overflow, [https://bugzilla.nasm.us/show_bug.cgi?id=3392814 still open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0687 CVE-2023-0687] (glibc) ===&lt;br /&gt;
&lt;br /&gt;
Bad CPE, should be marked as fixed in 2.38. Emailed NIST, data not updated yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1386 CVE-2023-1386] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Still [https://github.com/v9fs/linux/issues/29 open upstream].&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3019 CVE-2023-3019] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fixed in 8.2.0 with 9050f976e447444ea6ee2ba12c9f77e4b0dc54bc. NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 CVE-2023-3164] (tiff) ===&lt;br /&gt;
&lt;br /&gt;
Upstream issue https://gitlab.com/libtiff/libtiff/-/issues/542 closed as &amp;quot;wontfix-unmaintained&amp;quot;&lt;br /&gt;
Only affect the tiffcrop tool not compiled by default since 4.6.0 (OE-Core = 4.6.0).&lt;br /&gt;
NVD pinged 06/02/2024.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3180 CVE-2023-3180] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 CVE-2023-3354] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3640 CVE-2023-3640] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
CPU-level address leak specific to x86, still an issue.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3772 CVE-2023-3772] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 00374d9b6d9f932802b55181be9831aa948e5b7c, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3773 CVE-2023-3773] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 5e2424708da7207087934c5c75211e8584d553a0, needs backport.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4010 CVE-2023-4010] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Hang in USB subsystem. No fix yet.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4128 CVE-2023-4128] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Merged in 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81, needs backporting.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4135 CVE-2023-4135] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37769 CVE-2023-37769] (pixman) ===&lt;br /&gt;
&lt;br /&gt;
Appears to be a floating point exception in a test, should verify that the crash is in the test code and not the library. [https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 This ticket] has the details.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40360 CVE-2023-40360] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.com/qemu-project/qemu/-/commit/6c8f8456cb0b239812dee5211881426496da7b98 Fixed] in 8.1.0.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4569 CVE-2023-4569] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/346.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611 CVE-2023-4611] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
Fixed upstream. LKC https://github.com/nluedtke/linux_kernel_cves/issues/347.&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088 CVE-2023-5088] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Fix merged https://github.com/qemu/qemu/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e &lt;br /&gt;
Present in &amp;gt;=8.2.0 (OE-core qemu = 8.2.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4692 CVE-2023-4692] (grub) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4693 CVE-2023-4693] (grub:grub-efi:grub-native) ===&lt;br /&gt;
&lt;br /&gt;
(in NTFS support) : Fix merged : e58b870ff926415e23fc386af41ff81b2f588763 + 6 parents , released in 2.12&lt;br /&gt;
OE-Core grub = 2.12&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6683 CVE-2023-6683] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Patch posted : [https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html ui/clipboard: avoid crash upon request when clipboard peer is no] not merged yet&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6693 CVE-2023-6693] (qemu) ===&lt;br /&gt;
&lt;br /&gt;
Backported upstream 939a09575fff7048446e36ce438fa7be6e251d41 in v8.2.1. CPE change request sent to NVD 07/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25584 CVE-2023-25584] (binutils) ===&lt;br /&gt;
&lt;br /&gt;
Merged fix in https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44. Present in binutils &amp;gt;=2.40&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38559 CVE-2023-38559] (ghostscript) ===&lt;br /&gt;
&lt;br /&gt;
Fix https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1&lt;br /&gt;
Present in &amp;gt;= 10.02.0 (OE-core ghostscript = 10.02.1)&lt;br /&gt;
NVD pinged 06/02/2024&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42363 CVE-2023-42363] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15865&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42364 CVE-2023-42364] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15868&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42365 CVE-2023-42365] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Upstream bug still open https://bugs.busybox.net/show_bug.cgi?id=15871 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42366 CVE-2023-42366] (busybox) ===&lt;br /&gt;
&lt;br /&gt;
Patch available (not merged yet) : [https://bugs.busybox.net/attachment.cgi?id=9697&amp;amp;action=edit Attachment 9697 Details for Bug 15874 – PATCH awk.c: fix CVE-2023-42366 (bug #15874)]&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48795 CVE-2023-48795] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51384 CVE-2023-51384] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51385 CVE-2023-51385] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
Fix WIP : https://lists.openembedded.org/g/openembedded-core/topic/103546397#193372&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51767 CVE-2023-51767] (openssh) ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;openssh: authentication bypass via row hammer attack&amp;quot;&lt;br /&gt;
Upstream bug : https://bugzilla.mindrot.org/show_bug.cgi?id=3656 (still open, no patch)&lt;br /&gt;
Real-world impacts seem quite low&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6780 CVE-2023-6780] (glibc) ===&lt;br /&gt;
Fixed in 2.39 already wrong cpe&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21803 CVE-2023-21803] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24857 CVE-2023-24857] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24858 CVE-2023-24858] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24859 CVE-2023-24859] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24861 CVE-2023-24861] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24864 CVE-2023-25864] (linux-yocto) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Header template:&lt;br /&gt;
&lt;br /&gt;
=== [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE CVE] (RECIPE) ===&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Main_Page&amp;diff=86175</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Main_Page&amp;diff=86175"/>
		<updated>2024-01-26T21:02:37Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Yocto Project Wiki! ==&lt;br /&gt;
The [http://yoctoproject.org Yocto Project] is an open-source project that delivers a set of tools that create operating system images for embedded Linux systems. The Yocto Project tools are based on the [http://www.openembedded.org/wiki/Main_Page OpenEmbedded] (OE) project, which uses the BitBake build tool, to construct complete Linux images. BitBake and OE are combined to form a reference build host known as Poky which includes the following [[Core Components|core components]]. This [https://www.youtube.com/watch?v=utZpKM7i5Z4 video] will help explain what it&#039;s all about.&lt;br /&gt;
&lt;br /&gt;
===Where to Start?===&lt;br /&gt;
If you&#039;re new to Yocto take a look at the &#039;&#039;&#039;[[Glossary]]&#039;&#039;&#039; so you&#039;re familiar with the terms used in this wiki and the project documentation. Then take a look at the [https://docs.yoctoproject.org/brief-yoctoprojectqs/index.html &#039;&#039;&#039;Quick Start Guide&#039;&#039;&#039;]. You can follow the steps in this document to clone the poky repository, quickly configure your build environment, and then try a build. Corporate firewalls can be problematic so network proxy configurations are detailed on the &#039;&#039;&#039;[[Working Behind a Network Proxy]]&#039;&#039;&#039; page. We advise you go straight for the [[Working_Behind_a_Network_Proxy#Option_2:_Chameleonsocks| Chameleonsocks option]].&lt;br /&gt;
&lt;br /&gt;
===Where to Next?===&lt;br /&gt;
Thanks to the quick start guide, it&#039;s pretty easy to get your first Linux image build and running. Here are some places to look for help when improving your Yocto skills.&lt;br /&gt;
* The [https://linuxfoundation.org Linux Foundation] have some great [https://docs.google.com/presentation/d/1LmI3mHoD_Dzl8wplIYcUBrFF8BzDb_EadTvfbnpSK7Q/edit training slides]. There is also an [https://docs.google.com/presentation/d/1HoDtyN5SzlmuTN47ab4Y7w_i6c_VEW6EBUD944ntf38/edit#slide advanced slide deck] for more experienced users. &lt;br /&gt;
* The first tool you&#039;ll need to get familiar with is &#039;&#039;&#039;bitbake&#039;&#039;&#039;, so reading through the [[https://docs.yoctoproject.org/dev/bitbake.htmluser manual] is recommended. You don&#039;t need to understand it all right now, but bookmark this page for reference. Implementation of bitake is covered in the [[Bitbake Internals Primer]] &lt;br /&gt;
* Once you start adding packages and configuring your image to create your own distribution, things can go wrong and it can hard to track down the root cause. There is no shortage of Yocto documentation resource, but if you&#039;re not exactly sure what you&#039;re looking for this &#039;&#039;&#039;[[Documentation Decoder]]&#039;&#039;&#039; will help you out. Also take a look at the [https://wiki.yoctoproject.org/wiki/Cookbook &#039;&#039;&#039;Cookbook&#039;&#039;&#039;] and [https://wiki.yoctoproject.org/wiki/Technical_FAQ troubleshooting guide]. Also [https://www.yoctoproject.org/community/learn/#books these books] are helpful. &lt;br /&gt;
* Some new tools such as [https://docs.yoctoproject.org/dev/toaster-manual/index.html Toaster], [[Extensible SDK]] and [https://github.com/crops CROPS] are making it easier to get the best out of Yocto on Windows and Mac OS X. Take a look at the new workflow in [[Developer Workflow Improvements]].&lt;br /&gt;
* There is also a [https://wiki.yoctoproject.org/wiki/TipsAndTricks &#039;&#039;&#039;Tips and Tricks&#039;&#039;&#039;] section where more experienced developers contribute to articles that will help those new to Yocto Project.&lt;br /&gt;
* You can also read and participate on the [https://lists.yoctoproject.org mailing lists] - start with the [https://lists.yoctoproject.org/g/yocto main list] first - and the IRC channel. More information about the Yocto Project mailing lists, IRC and Matrix channels can be found [https://www.yoctoproject.org/community/mailing-lists/ here].&lt;br /&gt;
&lt;br /&gt;
== Project planning ==&lt;br /&gt;
&lt;br /&gt;
=== Project Status and Schedule ===&lt;br /&gt;
* [[Weekly_Status]]&lt;br /&gt;
* Testresults - https://git.yoctoproject.org/cgit/cgit.cgi/yocto-testresults-contrib/log/?h=intel-yocto-testresults&lt;br /&gt;
&lt;br /&gt;
=== Future Directions ===&lt;br /&gt;
* [[Future_Directions]]&lt;br /&gt;
&lt;br /&gt;
=== Outdated Project planning pages ===&lt;br /&gt;
The following pages contain outdated Project planning information:&lt;br /&gt;
&lt;br /&gt;
* [[Yocto Feature Summary]] (Current and Next)&lt;br /&gt;
* [[Planning]]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
* [[Documentation Decoder]]&lt;br /&gt;
&lt;br /&gt;
=== Improvement ideas ===&lt;br /&gt;
&lt;br /&gt;
* [[Documentation Production Workflow]]&lt;br /&gt;
&lt;br /&gt;
== Release Engineering ==&lt;br /&gt;
&lt;br /&gt;
* [[Yocto Release Engineering | Yocto Project Release Engineering]]&lt;br /&gt;
* [[Yocto Release Engineering | Release Activity (with status, version info, QA links, etc)]]&lt;br /&gt;
&lt;br /&gt;
== QA &amp;amp; Automation ==&lt;br /&gt;
&lt;br /&gt;
* [[The_Yocto_Autobuilder| The Yocto Project Autobuilder]]&lt;br /&gt;
* [[QA| Yocto Project QA Main Page]]&lt;br /&gt;
* [[QA/Archive| Yocto Project QA Test Report Archive ]]&lt;br /&gt;
&lt;br /&gt;
== Quick guide for newcomers ==&lt;br /&gt;
&lt;br /&gt;
If you are new to the project and are willing to contribute, please refer to our [[Newcomers|guide for newcomers]].&lt;br /&gt;
&lt;br /&gt;
== TSC ==&lt;br /&gt;
* Yocto Project Technical Steering Committee [[TSC]] &lt;br /&gt;
&lt;br /&gt;
== Wiki reference sitemap ==&lt;br /&gt;
* [[Glossary]]&lt;br /&gt;
* [[Working Behind a Network Proxy]]&lt;br /&gt;
* [[FAQ]] and [[Technical FAQ]]. These need to be unified.&lt;br /&gt;
* [[Cookbook]] and [[TipsAndTricks | Tips and Tricks]]. Need clear messaging on how these should be differentiated.&lt;br /&gt;
* [[Developer Workflow Improvements]], including [[Nodejs Workflow Improvements]]&lt;br /&gt;
* [[Bug_Triage | Bug Triage Reference ]]&lt;br /&gt;
* [[Planning and Governance]]&lt;br /&gt;
* [[Community Guidelines]]&lt;br /&gt;
* [[Yocto Release Engineering | Yocto Project Release Engineering]]&lt;br /&gt;
* [[License Infrastructure Interest Group | License Infrastructure]]&lt;br /&gt;
* [[Processes and Activities]]&lt;br /&gt;
* [[Member Technical Contacts]]&lt;br /&gt;
* [[Projects]]&lt;br /&gt;
* [[Security]] - find out what we do about CVEs and security&lt;br /&gt;
* [[Yocto Interest Groups]]&lt;br /&gt;
* [[Toaster]] - the web interface &lt;br /&gt;
* [[YoctoProjectEvents]] - links to YoctoProject/OpenEmbedded related conferences and events&lt;br /&gt;
* [[Archive]] - Graveyard for out of date articles.&lt;br /&gt;
&lt;br /&gt;
== Other resources ==&lt;br /&gt;
* [http://yoctoproject.org Yocto Project Front Page]&lt;br /&gt;
* [http://git.yoctoproject.org/ Yocto Project Git Source Repos]&lt;br /&gt;
* [https://docs.yoctoproject.org/ Yocto Project Documentation]&lt;br /&gt;
* [https://bugzilla.yoctoproject.org/ Yocto Project Bugzilla]&lt;br /&gt;
* [https://www.yoctoproject.org/tools-resources/community/mailing-lists Yocto Project Mailing Lists]&lt;br /&gt;
* [http://recipes.yoctoproject.org/rrs Yocto Project Recipe Reporting System]&lt;br /&gt;
* [https://autobuilder.yoctoproject.org/typhoon Yocto Project Autobuilder]&lt;br /&gt;
* [http://downloads.yoctoproject.org/releases/yocto/ Yocto Project Releases Downloads]&lt;br /&gt;
* [http://autobuilder.yoctoproject.org/pub/nightly/ Yocto Project Nightly Build Images]&lt;br /&gt;
* [http://downloads.yoctoproject.org/mirror/sources/ Upstream Sources Mirror]&lt;br /&gt;
* [http://www.openembedded.org/wiki/Main_Page OpenEmbedded Wiki]&lt;br /&gt;
* [http://cgit.openembedded.org/ OpenEmbedded Git Repos]&lt;br /&gt;
* [http://layers.openembedded.org/ OpenEmbedded Community Layers] &lt;br /&gt;
* [http://patchwork.openembedded.org/ OpenEmbedded Patch Tracking System]&lt;br /&gt;
* &#039;&#039;&#039;IRC&#039;&#039;&#039;: [https://libera.chat/ irc.libera.chat]&lt;br /&gt;
:* #yocto - Public discussions on the Yocto Project.&lt;br /&gt;
:* #oe - Public discussions on OpenEmbedded Core.&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Patchtest&amp;diff=86155</id>
		<title>Patchtest</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Patchtest&amp;diff=86155"/>
		<updated>2024-01-14T11:05:33Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Patchtest Architecture Notes: Add test_cve_check_ignore&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Patchtest ==&lt;br /&gt;
&lt;br /&gt;
Patchtest is a tool designed for improving the quality of Yocto Project and OpenEmbedded contributors&#039; patch submissions, while simultaneously reducing the level of review effort required from project maintainers. It does this by providing a set of scripts that users can test their patches with prior to submission (&amp;quot;host&amp;quot; mode), and which can be used as part of an automated service that provides periodic feedback for patches received by Patchwork (&amp;quot;guest&amp;quot; mode).&lt;br /&gt;
&lt;br /&gt;
=== Using Patchtest ===&lt;br /&gt;
&lt;br /&gt;
See the [https://git.yoctoproject.org/poky/tree/scripts/patchtest.README patchtest README] for instructions on how to use patchtest in your local workspace, and the [https://git.yoctoproject.org/meta-patchtest/tree/README.md meta-patchtest README] for details on automated/guest mode setup.&lt;br /&gt;
&lt;br /&gt;
=== Patchtest &amp;quot;FAIL:&amp;quot; Descriptions ===&lt;br /&gt;
&lt;br /&gt;
The patchtest feedback email is designed to provide concise instructions when one or more of the tests has failed, but additional information on specific failures is provided below:&lt;br /&gt;
&lt;br /&gt;
==== LIC_FILES_CHKSUM changed without &amp;quot;License-Update:&amp;quot; tag and description in commit message ====&lt;br /&gt;
&lt;br /&gt;
Patchtest checks to ensure that any changes made to LIC_FILES_CHKSUM lines (including checksums for new files) are accounted for in the commit message with at least one &amp;quot;License-Update: &amp;lt;reason&amp;gt;&amp;quot; tag. If this is not present, then this test will fail.&lt;br /&gt;
&lt;br /&gt;
==== A CVE tag should be provided in the commit message with format: &amp;quot;CVE: CVE-YYYY-XXXX&amp;quot; ====&lt;br /&gt;
&lt;br /&gt;
Whenever a submission adds a CVE patch, patchtest will check both the patch &#039;&#039;&#039;and the parent mbox&#039;s commit message&#039;&#039;&#039; for a &amp;quot;CVE: CVE-YYYY-XXXX&amp;quot; tag. While this has historically not been required, including the tag in both locations aids review and maintenance.&lt;br /&gt;
&lt;br /&gt;
==== Please include a commit message on your patch explaining the change ====&lt;br /&gt;
&lt;br /&gt;
This response is received whenever a submission has an empty commit message.&lt;br /&gt;
&lt;br /&gt;
==== Edit shortlog so that it is 90 characters or less (currently X characters) ====&lt;br /&gt;
&lt;br /&gt;
This failure indicates that the shortlog (i.e. the subject line) for the patch is so long that it may not be easily readable on some mail clients. Some subject prefixes (e.g. the branch name when submitting a patch for an older release) may unavoidably inflate the length, but the shortlog should be kept as short and concise as possible so that it is clear what the patch does and what it changes. Extra information can always be provided in the commit message.&lt;br /&gt;
&lt;br /&gt;
==== Invalid author auh@auh.yoctoproject.org. Resend the series with a valid patch author ====&lt;br /&gt;
&lt;br /&gt;
A patch authored by the Auto-Upgrade Helper (AUH) was detected. These patches are meant to provide maintainers with a sanity check for recipe upgrades and a starting point for testing them, so patches submitted with that authorship are marked as failures to indicate that they have not been fully validated.&lt;br /&gt;
&lt;br /&gt;
==== Tests failed for the patch, but the results log could not be processed due to excessive result line length. ====&lt;br /&gt;
&lt;br /&gt;
The patchtest-send-results script checks the test results&#039; maximum line length to help ensure that no unintended and/or malicious code is sent to the mailing list with the results. If this message is present, the user should re-test their patch(es) locally using the &#039;&#039;&#039;patchtest&#039;&#039;&#039; script in openembedded-core/scripts before further escalation. If the issue persists after re-testing and re-submission it should be reported on the Yocto Project [https://bugzilla.yoctoproject.org/ Bugzilla] under the &amp;quot;Yocto Project Subprojects&amp;quot; -&amp;gt; &amp;quot;Patchtest&amp;quot; category with a &amp;quot;Major&amp;quot; priority (include the patch file as an attachment).&lt;br /&gt;
&lt;br /&gt;
=== Submitting Bug Reports ===&lt;br /&gt;
&lt;br /&gt;
If you suspect there is an issue with the patchtest feedback emails, the service itself, or any of the documentation, please submit an issue on the Yocto Project Bugzilla [https://bugzilla.yoctoproject.org/ Bugzilla] under the &amp;quot;Yocto Project Subprojects&amp;quot; -&amp;gt; &amp;quot;Patchtest&amp;quot; category.&lt;br /&gt;
&lt;br /&gt;
=== Patchtest Architecture Notes ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:align-left&amp;quot;&lt;br /&gt;
|+ Test Suite Details&lt;br /&gt;
|-&lt;br /&gt;
! Test Name !! Category !! Uses Tinfoil !! Notes&lt;br /&gt;
|-&lt;br /&gt;
| test_upstream_status_presence_format || TestPatch || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || TestPatch || No || Same test name as similar test in TestMbox&lt;br /&gt;
|-&lt;br /&gt;
| test_cve_tag_format || TestPatch || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_signed_off_by_presence || TestMbox || No || Same test name as similar test in TestPatch&lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_shortlog_length || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_series_merge_on_head || TestMbox || No || Temporarily disabled&lt;br /&gt;
|-&lt;br /&gt;
| test_target_mailing_list || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_mbox_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_commit_message_presence || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_bugzilla_entry_format || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_author_valid || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_non_auh_upgrade || TestMbox || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_pylint || PyLint || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_license_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_lic_files_chksum_modified_not_mentioned || TestMetadata || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_max_line_length || TestMetadata || No || &lt;br /&gt;
|-&lt;br /&gt;
| test_src_uri_left_files || TestMetadata || Yes || Has a linked pretest: pretest_src_uri_left_files&lt;br /&gt;
|-&lt;br /&gt;
| test_summary_presence || TestMetadata || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| test_cve_check_ignore || TestMetadata || Yes || &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86150</id>
		<title>How do I</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86150"/>
		<updated>2023-12-27T18:34:30Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix syntax&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Q: How do get the package manager binaries on my target rootfs? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Make sure your image has IMAGE_FEATURES += &amp;quot;package-management&amp;quot; included.&lt;br /&gt;
&lt;br /&gt;
== Q: How do I create my own source download mirror ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &lt;br /&gt;
Make a complete build with these variables set in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
&lt;br /&gt;
After a complete build, copy all *files* (not symlinks) in your download directory to the desired source mirror directory. Test by setting the variables below in &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
  &lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
  BB_NO_NETWORK = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you are building with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; and using external layers that are not part of the base Yocto distribution, be aware that recipes which:&lt;br /&gt;
&lt;br /&gt;
# Specify a Git repo as the source, and,&lt;br /&gt;
# Specify the revision to be built using a tag name&lt;br /&gt;
&lt;br /&gt;
will cause your build to abort when Bitbake tries to run &amp;lt;code&amp;gt;git ls-remote&amp;lt;/code&amp;gt; to resolve the tag name and is unable to access the network. So don&#039;t specify &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git;tag=v${PV}&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Instead, use:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 SRCREV = &amp;quot;8885ced062131214448fae056ef453f094303805&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Before putting together your pre-mirror, this command can be used from&lt;br /&gt;
your top-level source directory to identify recipes that might be&lt;br /&gt;
problematic with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; enabled:&lt;br /&gt;
&lt;br /&gt;
 find -name &amp;quot;*.inc&amp;quot; -o -name &amp;quot;*.bb&amp;quot; | xargs grep -li &amp;quot;git;tag=&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put Yocto on a hard drive? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; bitbake core-image-sato or core-image-sato-sdk&lt;br /&gt;
&lt;br /&gt;
# have a suitable partition on the disk - say partition #3&lt;br /&gt;
# this partition will show up as sde3 on my host machine and sda3 on the atom&lt;br /&gt;
# mkfs.ext3 /dev/sde3&lt;br /&gt;
# mount /dev/sde3 /mnt/target&lt;br /&gt;
# mount -o loop tmp/deploy/images/core-image-sato-sdk.ext3 /mnt/target-ext3&lt;br /&gt;
# cp -a /mnt/target-ext3/* /mnt/target&lt;br /&gt;
# grub-install --recheck --root-directory=/mnt/target /dev/sde&lt;br /&gt;
&lt;br /&gt;
If grub install passed, copy the following to /mnt/target/boot/grub/grub.cfg&lt;br /&gt;
&lt;br /&gt;
 set default=&amp;quot;0&amp;quot;&lt;br /&gt;
 set timeout=&amp;quot;30&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 menuentry &#039;Yocto SDK&#039; {&lt;br /&gt;
       insmod part_msdos&lt;br /&gt;
       insmod ext2&lt;br /&gt;
       set root=&#039;(hd0,msdos3)&#039;&lt;br /&gt;
       linux /boot/bzImage root=/dev/sda3&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thats it - this should boot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put my recipe into Yocto? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Let&#039;s use the Hello World example from Section 3.1.2 of the Yocto Project Reference Manual and expand on it.&lt;br /&gt;
&lt;br /&gt;
* In this example, I&#039;ll start with a new meta layer named &amp;quot;meta-jfa&amp;quot; in the Yocto Project files directory, which is named &amp;quot;poky&amp;quot;.  Then, I will add the new recipe and build the image, which is named &amp;quot;core-image-minimal&amp;quot;.  I will build it using the autotooled package option.  Once built, the image will have the “hello” application.&lt;br /&gt;
&lt;br /&gt;
;Step One&lt;br /&gt;
:Create the following directory structure in the ~/poky directory. I&#039;ll use my initials to denote the layer and recipe name:&lt;br /&gt;
 &lt;br /&gt;
 mkdir meta-jfa&lt;br /&gt;
 mkdir meta-jfa/conf&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa/hello&lt;br /&gt;
&lt;br /&gt;
;Step Two&lt;br /&gt;
:Next, to make sure the recipe gets searched and located, I&#039;ll create the layer.conf file in the meta-jfa/conf directory as follows:&lt;br /&gt;
&lt;br /&gt;
 # We have a conf and classes directory, add to BBPATH &lt;br /&gt;
 BBPATH := &amp;quot;${BBPATH}:${LAYERDIR}&amp;quot; &lt;br /&gt;
 # We have a packages directory, add to BBFILES &lt;br /&gt;
 BBFILES := &amp;quot;${BBFILES} ${LAYERDIR}/recipes-*/*/*.bb \ &lt;br /&gt;
            ${LAYERDIR}/recipes-*/*/*.bbappend&amp;quot; &lt;br /&gt;
 BBFILE_COLLECTIONS += &amp;quot;jfa&amp;quot; &lt;br /&gt;
 BBFILE_PATTERN_jfa := &amp;quot;^${LAYERDIR}/&amp;quot; &lt;br /&gt;
 BBFILE_PRIORITY_jfa := &amp;quot;5&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Three&lt;br /&gt;
:Now I need to put the recipe (.bb) file into the right directory.  So, I will put the file hello_2.7.bb into the meta-jfa/recipes-jfa/hello directory. I picked version 2.7 of the hello program by going to the gnu site for the application (ftp://ftp.gnu.org/gnu/hello/) and downloading it to checkout the version I wanted to include. hello-2.7.tar.gz is the most current. I downloaded it locally and expanded it to look at the license information.  The hello_2.7.bb file contains the following:&lt;br /&gt;
&lt;br /&gt;
 DESCRIPTION = &amp;quot;GNU Helloworld application&amp;quot; &lt;br /&gt;
 SECTION = &amp;quot;examples&amp;quot; &lt;br /&gt;
 LICENSE = &amp;quot;GPLv3+&amp;quot; &lt;br /&gt;
 LIC_FILES_CHKSUM = &amp;quot;file://COPYING;md5=d32239bcb673463ab874e80d47fae504&amp;quot; &lt;br /&gt;
 PR = &amp;quot;r0&amp;quot; &lt;br /&gt;
 SRC_URI = &amp;quot;${GNU_MIRROR}/hello/hello-${PV}.tar.gz&amp;quot; &lt;br /&gt;
 inherit autotools gettext &lt;br /&gt;
:Here is some explanation for a few of the recipe statements:&lt;br /&gt;
:* LIC_FILES_CHKSUM =  is required and, using file location defaults, points to the COPYING file that is part of the tarball that is downloaded from the SRC_URI address. The md5= part of the statement is generated by running “md5sum COPYING” against the COPYING file I downloaded to examine.&lt;br /&gt;
:* ${PV} in the SRC_URI statement is picked up from the part of the recipe file name after the “_”. In this case PV =2.7.&lt;br /&gt;
&lt;br /&gt;
;Step Four&lt;br /&gt;
:The recipe is built, so now I can run it:&lt;br /&gt;
&lt;br /&gt;
 cd ~/poky&lt;br /&gt;
 source oe-init-build-env build-hello.  &lt;br /&gt;
&lt;br /&gt;
;Step Five&lt;br /&gt;
:Before I can use BitBake I need to edit two files.  Sourcing the oe-init-build-env file above leaves me in the build-hello directory.  Before issuing the bitbake command I need to edit the files conf/local.conf and conf/bblayers.conf in that build-hello directory.  The bblayers.conf needs to have the one line added to include the layer you created.&lt;br /&gt;
&lt;br /&gt;
 # LAYER_CONF_VERSION is increased each time build/conf/bblayers.conf &lt;br /&gt;
 # changes incompatibly &lt;br /&gt;
 LCONF_VERSION = &amp;quot;4&amp;quot; &lt;br /&gt;
 BBFILES ?= &amp;quot;&amp;quot; &lt;br /&gt;
 BBLAYERS = &amp;quot; \ &lt;br /&gt;
   /home/jim/poky/meta \ &lt;br /&gt;
   /home/jim/poky/meta-yocto \ &lt;br /&gt;
   /home/jim/poky/meta-jfa \&lt;br /&gt;
 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Six&lt;br /&gt;
:The conf/local.conf file needs to have the parallel processing lines edited to speed up the baking on multicore systems.  I can do that by uncommenting the BB_NUMBER_THREADS and PARALLEL_MAKE variables.  Generally, I would set them equal to twice the number of cores used by my host machine.  By default, the MACHINE variable is set to qemux86 and for this example is fine.  I need to add a line to include the hello package I am building into the image by adding the following line:&lt;br /&gt;
&lt;br /&gt;
 IMAGE_INSTALL:append = &amp;quot; hello&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Seven&lt;br /&gt;
:Now I can bake it with this command:&lt;br /&gt;
 bitbake core-image-minimal&lt;br /&gt;
;Step Eight&lt;br /&gt;
:Once the image is built, I can test it by starting the QEMU emulator:&lt;br /&gt;
&lt;br /&gt;
 runqemu qemux86&lt;br /&gt;
&lt;br /&gt;
;Step Nine&lt;br /&gt;
:Once the emulator comes up, login as root with no password.  Then, at the prompt, enter &amp;quot;hello&amp;quot; to run your application.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I setup Intel&amp;amp;reg; Atom&amp;amp;trade; Processor E6xx based system for media playback? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; To playback media files on an Atom E6xx processor, you need to have the EMGD GFX driver installed.  There is a README on this installation in the meta-crownbay directory. However, the official support for EMGD with accelerated 3D and media decode is scheduled for release 1.2, but is in the git repository now, so you need to start with branch, &amp;quot;master&amp;quot; of both the poky and meta-intel repository. And you will need the Intel Crownbay reference platform for the Atom E6xx processor or similar hardware.&lt;br /&gt;
&lt;br /&gt;
; Step 1&lt;br /&gt;
Follow the Appendix A example in the Yocto Project Development Manual, but instead of editing out the crownbay references and using the crownbay-noemgd, you do the opposite.&lt;br /&gt;
&lt;br /&gt;
One edit you need to add to the Appendix A instructions is for the file ~/poky/meta-intel/meta-mymachine/conf/mymachine.conf.  You need to add the following statement to include audio features needed for the audio part of the videos:&lt;br /&gt;
 MACHINE_FEATURES += &amp;quot;alsa&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; Step 2&lt;br /&gt;
In the Appendix A example a couple of changes are needed to the conf/local.conf and conf/bblayers.conf file edits from the standard example. The bblayers.conf file BBLAYERS statement should look like below, except correct the absolute path to match your system:&lt;br /&gt;
 BBLAYERS ?= &amp;quot; \&lt;br /&gt;
  /home/jim/poky/meta \&lt;br /&gt;
  /home/jim/poky/meta-yocto \&lt;br /&gt;
  /home/jim/poky/meta-intel \&lt;br /&gt;
  /home/jim/poky/meta-intel/meta-mymachine \&lt;br /&gt;
  &amp;quot;&lt;br /&gt;
The local.conf file should have some statements in addition to what the Appendix A used:&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST = &amp;quot;license_emgd-driver-bin_1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # The 2 statements below allow the playing of MP3 files. &lt;br /&gt;
 # Not specific to videos, but usually included on media use systems.&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST += &amp;quot;commercial&amp;quot;&lt;br /&gt;
 POKY_EXTRA_INSTALL += &amp;quot;gst-fluendo-mp3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # add debug development tweaks and test applications, which include amixer, aplay, arecord, etc.&lt;br /&gt;
 EXTRA_IMAGE_FEATURES = &amp;quot;debug-tweaks tools-testapps&amp;quot;&lt;br /&gt;
; Step 3&lt;br /&gt;
After bitbaking the core-image-sato image, I put the .ext3 image on a hard drive per the above How Do I. I also added some h.264, mp4, m4a, and mp3 files to play with before moving the hard drive to the target hardware system.&lt;br /&gt;
&lt;br /&gt;
I used both the Sato GUI Music and Video players to play the files.&lt;br /&gt;
&lt;br /&gt;
That&#039;s all there is to it.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I tweak my build system and BitBake configuration for optimal build time as well as provide some guidance on how to collect build metrics and identify bottlenecks. ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; You should read the [https://wiki.yoctoproject.org/wiki/Build_Performance Build Performance] wiki page.  It provides general tips, a description of the bb-matrix script used for collecting relevant build metrics, a description of how to enable buildstats to generate build performance log data, and a description of how best to apply parallelism to the build.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get the networking to function on an Acer Aspire One n450 based netbook when using the meta-n450 BSP? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; While the n450 BSP will boot on the Acer AO532h netbook, the BSP does not enable the Atheros AR5B95 Wireless and AR8132 fast ethernet adapters. The Linux Yocto 3.2 kernel has these drivers, but they are not enabled. All you have to do is to create a Config Fragment file with a .cfg extension in a new directory called &#039;linux-yocto&#039; in the BSP recipes-kernel/linux directory. The new &#039;linux-yocto&#039; directory will be at the same level as the linux-yocto_3.2.bbappend file.  You will also need to add the following statement to the .bbappend file:&lt;br /&gt;
&lt;br /&gt;
SRC_URI += &amp;quot;file://myconfig.cfg&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The recipes-kernel/linux/linux-yocto/myconfig.cfg needs to contain the following 2 lines:&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATH9K_PCI=y&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATL1C=y&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build the build appliance? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Update the MACHINE variable to &amp;quot;qemux86-64&amp;quot; or &amp;quot;qemux86&amp;quot; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, run this command:&lt;br /&gt;
  # bitbake build-appliance-image&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.vmdk, *.vmx, *.vmxf) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder&lt;br /&gt;
ie: &lt;br /&gt;
&lt;br /&gt;
  # unzip Yocto_Build_Appliance.zip&lt;br /&gt;
  # cd Yocto_Build_Appliance&lt;br /&gt;
  # ls &lt;br /&gt;
    Yocto_Build_Appliance.vmdk  &lt;br /&gt;
    Yocto_Build_Appliance.vmx  &lt;br /&gt;
    Yocto_Build_Appliance.vmxf&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build an image without GPLv3 Licensed packages ? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Add the line &#039;INCOMPATIBLE_LICENSE = &amp;quot;GPLv3&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; and ensure you have the GPLv2 replacement libraries. (Caveat emptor; they are not as well maintained.) From the Yocto Mega-Manual 2.4;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If you use INCOMPATIBLE_LICENSE to exclude GPLv3 or set PREFERRED_VERSION to substitute a GPLv2 version of a GPLv3 recipe, then you must add the meta-gplv2 layer to your configuration.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then, build the image:&lt;br /&gt;
  # bitbake &amp;lt;image-name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Q: How do I ensure that I am using the latest upstream version of the package? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Add this line &#039;INHERIT += &amp;quot;distrodata&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
After that, run this command in the build directory:&lt;br /&gt;
  # bitbake -c checkpkg &amp;lt;package&amp;gt;&lt;br /&gt;
Then, check the &#039;Version&#039; and &#039;Upver&#039; fields in the below listed file: &lt;br /&gt;
  # gedit tmp/log/checkpkg.csv&lt;br /&gt;
&lt;br /&gt;
If those versions are same, then we have the latest upstream version of package&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get a list of CVEs patched? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  cve-check is available from 2.2 release (meta/recipes-core/meta/cve-update-nvd2-native.bb is used for acessing the new NVD database 2.0 API, meta/classes/cve-check.bbclass implements the check of recipes against CVEs).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To run it just inherit the class in conf/local.conf file:&lt;br /&gt;
&lt;br /&gt;
 # INHERIT += &amp;quot;cve-check&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
&lt;br /&gt;
1. To check for CVEs in openssl&lt;br /&gt;
 # bitbake -c cve_check openssl&lt;br /&gt;
&lt;br /&gt;
2. To check for all recipes build for core-image-sato&lt;br /&gt;
 # bitbake core-image-sato   &lt;br /&gt;
 # bitbake -k -c cve_check universe  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Log files are created under tmp/log/cve/&lt;br /&gt;
  ...&lt;br /&gt;
  libmicrohttpd_cve.json&lt;br /&gt;
  libmicrohttpd-native_cve.json&lt;br /&gt;
  libmnl_cve.json&lt;br /&gt;
  libmnl-native_cve.json&lt;br /&gt;
  libmodule-build-perl_cve.json&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Example of log file:&lt;br /&gt;
&lt;br /&gt;
  {&lt;br /&gt;
  &amp;quot;version&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
  &amp;quot;package&amp;quot;: [&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;name&amp;quot;: &amp;quot;zstd&amp;quot;,&lt;br /&gt;
      &amp;quot;layer&amp;quot;: &amp;quot;meta&amp;quot;,&lt;br /&gt;
      &amp;quot;version&amp;quot;: &amp;quot;1.5.5&amp;quot;,&lt;br /&gt;
      &amp;quot;products&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;product&amp;quot;: &amp;quot;zstandard&amp;quot;,&lt;br /&gt;
          &amp;quot;cvesInRecord&amp;quot;: &amp;quot;Yes&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;issue&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;id&amp;quot;: &amp;quot;CVE-2019-11922&amp;quot;,&lt;br /&gt;
          &amp;quot;summary&amp;quot;: &amp;quot;A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.&amp;quot;,&lt;br /&gt;
          &amp;quot;scorev2&amp;quot;: &amp;quot;6.8&amp;quot;,&lt;br /&gt;
          &amp;quot;scorev3&amp;quot;: &amp;quot;8.1&amp;quot;,&lt;br /&gt;
          &amp;quot;vector&amp;quot;: &amp;quot;NETWORK&amp;quot;,&lt;br /&gt;
          &amp;quot;vectorString&amp;quot;: &amp;quot;AV:N/AC:M/Au:N/C:P/I:P/A:P&amp;quot;,&lt;br /&gt;
          &amp;quot;status&amp;quot;: &amp;quot;Patched&amp;quot;,&lt;br /&gt;
          &amp;quot;link&amp;quot;: &amp;quot;https://nvd.nist.gov/vuln/detail/CVE-2019-11922&amp;quot;&lt;br /&gt;
        },&lt;br /&gt;
   ...&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build a wic image? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Append &amp;quot;wic&amp;quot; to IMAGE_FSTYPES  in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, build the target image type as usual:&lt;br /&gt;
  # bitbake &amp;lt;target-image-type&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.wic) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder. E.g. if you build for core-image-minimal for qemzx86-64 you should find a file like: core-image-minimal-qemux86-64.rootfs.wic&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86149</id>
		<title>How do I</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86149"/>
		<updated>2023-12-27T16:07:08Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Update fpr new cve check api&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Q: How do get the package manager binaries on my target rootfs? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Make sure your image has IMAGE_FEATURES += &amp;quot;package-management&amp;quot; included.&lt;br /&gt;
&lt;br /&gt;
== Q: How do I create my own source download mirror ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &lt;br /&gt;
Make a complete build with these variables set in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
&lt;br /&gt;
After a complete build, copy all *files* (not symlinks) in your download directory to the desired source mirror directory. Test by setting the variables below in &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
  &lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
  BB_NO_NETWORK = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you are building with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; and using external layers that are not part of the base Yocto distribution, be aware that recipes which:&lt;br /&gt;
&lt;br /&gt;
# Specify a Git repo as the source, and,&lt;br /&gt;
# Specify the revision to be built using a tag name&lt;br /&gt;
&lt;br /&gt;
will cause your build to abort when Bitbake tries to run &amp;lt;code&amp;gt;git ls-remote&amp;lt;/code&amp;gt; to resolve the tag name and is unable to access the network. So don&#039;t specify &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git;tag=v${PV}&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Instead, use:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 SRCREV = &amp;quot;8885ced062131214448fae056ef453f094303805&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Before putting together your pre-mirror, this command can be used from&lt;br /&gt;
your top-level source directory to identify recipes that might be&lt;br /&gt;
problematic with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; enabled:&lt;br /&gt;
&lt;br /&gt;
 find -name &amp;quot;*.inc&amp;quot; -o -name &amp;quot;*.bb&amp;quot; | xargs grep -li &amp;quot;git;tag=&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put Yocto on a hard drive? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; bitbake core-image-sato or core-image-sato-sdk&lt;br /&gt;
&lt;br /&gt;
# have a suitable partition on the disk - say partition #3&lt;br /&gt;
# this partition will show up as sde3 on my host machine and sda3 on the atom&lt;br /&gt;
# mkfs.ext3 /dev/sde3&lt;br /&gt;
# mount /dev/sde3 /mnt/target&lt;br /&gt;
# mount -o loop tmp/deploy/images/core-image-sato-sdk.ext3 /mnt/target-ext3&lt;br /&gt;
# cp -a /mnt/target-ext3/* /mnt/target&lt;br /&gt;
# grub-install --recheck --root-directory=/mnt/target /dev/sde&lt;br /&gt;
&lt;br /&gt;
If grub install passed, copy the following to /mnt/target/boot/grub/grub.cfg&lt;br /&gt;
&lt;br /&gt;
 set default=&amp;quot;0&amp;quot;&lt;br /&gt;
 set timeout=&amp;quot;30&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 menuentry &#039;Yocto SDK&#039; {&lt;br /&gt;
       insmod part_msdos&lt;br /&gt;
       insmod ext2&lt;br /&gt;
       set root=&#039;(hd0,msdos3)&#039;&lt;br /&gt;
       linux /boot/bzImage root=/dev/sda3&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thats it - this should boot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put my recipe into Yocto? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Let&#039;s use the Hello World example from Section 3.1.2 of the Yocto Project Reference Manual and expand on it.&lt;br /&gt;
&lt;br /&gt;
* In this example, I&#039;ll start with a new meta layer named &amp;quot;meta-jfa&amp;quot; in the Yocto Project files directory, which is named &amp;quot;poky&amp;quot;.  Then, I will add the new recipe and build the image, which is named &amp;quot;core-image-minimal&amp;quot;.  I will build it using the autotooled package option.  Once built, the image will have the “hello” application.&lt;br /&gt;
&lt;br /&gt;
;Step One&lt;br /&gt;
:Create the following directory structure in the ~/poky directory. I&#039;ll use my initials to denote the layer and recipe name:&lt;br /&gt;
 &lt;br /&gt;
 mkdir meta-jfa&lt;br /&gt;
 mkdir meta-jfa/conf&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa/hello&lt;br /&gt;
&lt;br /&gt;
;Step Two&lt;br /&gt;
:Next, to make sure the recipe gets searched and located, I&#039;ll create the layer.conf file in the meta-jfa/conf directory as follows:&lt;br /&gt;
&lt;br /&gt;
 # We have a conf and classes directory, add to BBPATH &lt;br /&gt;
 BBPATH := &amp;quot;${BBPATH}:${LAYERDIR}&amp;quot; &lt;br /&gt;
 # We have a packages directory, add to BBFILES &lt;br /&gt;
 BBFILES := &amp;quot;${BBFILES} ${LAYERDIR}/recipes-*/*/*.bb \ &lt;br /&gt;
            ${LAYERDIR}/recipes-*/*/*.bbappend&amp;quot; &lt;br /&gt;
 BBFILE_COLLECTIONS += &amp;quot;jfa&amp;quot; &lt;br /&gt;
 BBFILE_PATTERN_jfa := &amp;quot;^${LAYERDIR}/&amp;quot; &lt;br /&gt;
 BBFILE_PRIORITY_jfa := &amp;quot;5&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Three&lt;br /&gt;
:Now I need to put the recipe (.bb) file into the right directory.  So, I will put the file hello_2.7.bb into the meta-jfa/recipes-jfa/hello directory. I picked version 2.7 of the hello program by going to the gnu site for the application (ftp://ftp.gnu.org/gnu/hello/) and downloading it to checkout the version I wanted to include. hello-2.7.tar.gz is the most current. I downloaded it locally and expanded it to look at the license information.  The hello_2.7.bb file contains the following:&lt;br /&gt;
&lt;br /&gt;
 DESCRIPTION = &amp;quot;GNU Helloworld application&amp;quot; &lt;br /&gt;
 SECTION = &amp;quot;examples&amp;quot; &lt;br /&gt;
 LICENSE = &amp;quot;GPLv3+&amp;quot; &lt;br /&gt;
 LIC_FILES_CHKSUM = &amp;quot;file://COPYING;md5=d32239bcb673463ab874e80d47fae504&amp;quot; &lt;br /&gt;
 PR = &amp;quot;r0&amp;quot; &lt;br /&gt;
 SRC_URI = &amp;quot;${GNU_MIRROR}/hello/hello-${PV}.tar.gz&amp;quot; &lt;br /&gt;
 inherit autotools gettext &lt;br /&gt;
:Here is some explanation for a few of the recipe statements:&lt;br /&gt;
:* LIC_FILES_CHKSUM =  is required and, using file location defaults, points to the COPYING file that is part of the tarball that is downloaded from the SRC_URI address. The md5= part of the statement is generated by running “md5sum COPYING” against the COPYING file I downloaded to examine.&lt;br /&gt;
:* ${PV} in the SRC_URI statement is picked up from the part of the recipe file name after the “_”. In this case PV =2.7.&lt;br /&gt;
&lt;br /&gt;
;Step Four&lt;br /&gt;
:The recipe is built, so now I can run it:&lt;br /&gt;
&lt;br /&gt;
 cd ~/poky&lt;br /&gt;
 source oe-init-build-env build-hello.  &lt;br /&gt;
&lt;br /&gt;
;Step Five&lt;br /&gt;
:Before I can use BitBake I need to edit two files.  Sourcing the oe-init-build-env file above leaves me in the build-hello directory.  Before issuing the bitbake command I need to edit the files conf/local.conf and conf/bblayers.conf in that build-hello directory.  The bblayers.conf needs to have the one line added to include the layer you created.&lt;br /&gt;
&lt;br /&gt;
 # LAYER_CONF_VERSION is increased each time build/conf/bblayers.conf &lt;br /&gt;
 # changes incompatibly &lt;br /&gt;
 LCONF_VERSION = &amp;quot;4&amp;quot; &lt;br /&gt;
 BBFILES ?= &amp;quot;&amp;quot; &lt;br /&gt;
 BBLAYERS = &amp;quot; \ &lt;br /&gt;
   /home/jim/poky/meta \ &lt;br /&gt;
   /home/jim/poky/meta-yocto \ &lt;br /&gt;
   /home/jim/poky/meta-jfa \&lt;br /&gt;
 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Six&lt;br /&gt;
:The conf/local.conf file needs to have the parallel processing lines edited to speed up the baking on multicore systems.  I can do that by uncommenting the BB_NUMBER_THREADS and PARALLEL_MAKE variables.  Generally, I would set them equal to twice the number of cores used by my host machine.  By default, the MACHINE variable is set to qemux86 and for this example is fine.  I need to add a line to include the hello package I am building into the image by adding the following line:&lt;br /&gt;
&lt;br /&gt;
 IMAGE_INSTALL_append = &amp;quot; hello&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Seven&lt;br /&gt;
:Now I can bake it with this command:&lt;br /&gt;
 bitbake core-image-minimal&lt;br /&gt;
;Step Eight&lt;br /&gt;
:Once the image is built, I can test it by starting the QEMU emulator:&lt;br /&gt;
&lt;br /&gt;
 runqemu qemux86&lt;br /&gt;
&lt;br /&gt;
;Step Nine&lt;br /&gt;
:Once the emulator comes up, login as root with no password.  Then, at the prompt, enter &amp;quot;hello&amp;quot; to run your application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q: How do I setup Intel&amp;amp;reg; Atom&amp;amp;trade; Processor E6xx based system for media playback? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; To playback media files on an Atom E6xx processor, you need to have the EMGD GFX driver installed.  There is a README on this installation in the meta-crownbay directory. However, the official support for EMGD with accelerated 3D and media decode is scheduled for release 1.2, but is in the git repository now, so you need to start with branch, &amp;quot;master&amp;quot; of both the poky and meta-intel repository. And you will need the Intel Crownbay reference platform for the Atom E6xx processor or similar hardware.&lt;br /&gt;
&lt;br /&gt;
; Step 1&lt;br /&gt;
Follow the Appendix A example in the Yocto Project Development Manual, but instead of editing out the crownbay references and using the crownbay-noemgd, you do the opposite.&lt;br /&gt;
&lt;br /&gt;
One edit you need to add to the Appendix A instructions is for the file ~/poky/meta-intel/meta-mymachine/conf/mymachine.conf.  You need to add the following statement to include audio features needed for the audio part of the videos:&lt;br /&gt;
 MACHINE_FEATURES += &amp;quot;alsa&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; Step 2&lt;br /&gt;
In the Appendix A example a couple of changes are needed to the conf/local.conf and conf/bblayers.conf file edits from the standard example. The bblayers.conf file BBLAYERS statement should look like below, except correct the absolute path to match your system:&lt;br /&gt;
 BBLAYERS ?= &amp;quot; \&lt;br /&gt;
  /home/jim/poky/meta \&lt;br /&gt;
  /home/jim/poky/meta-yocto \&lt;br /&gt;
  /home/jim/poky/meta-intel \&lt;br /&gt;
  /home/jim/poky/meta-intel/meta-mymachine \&lt;br /&gt;
  &amp;quot;&lt;br /&gt;
The local.conf file should have some statements in addition to what the Appendix A used:&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST = &amp;quot;license_emgd-driver-bin_1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # The 2 statements below allow the playing of MP3 files. &lt;br /&gt;
 # Not specific to videos, but usually included on media use systems.&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST += &amp;quot;commercial&amp;quot;&lt;br /&gt;
 POKY_EXTRA_INSTALL += &amp;quot;gst-fluendo-mp3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # add debug development tweaks and test applications, which include amixer, aplay, arecord, etc.&lt;br /&gt;
 EXTRA_IMAGE_FEATURES = &amp;quot;debug-tweaks tools-testapps&amp;quot;&lt;br /&gt;
; Step 3&lt;br /&gt;
After bitbaking the core-image-sato image, I put the .ext3 image on a hard drive per the above How Do I. I also added some h.264, mp4, m4a, and mp3 files to play with before moving the hard drive to the target hardware system.&lt;br /&gt;
&lt;br /&gt;
I used both the Sato GUI Music and Video players to play the files.&lt;br /&gt;
&lt;br /&gt;
That&#039;s all there is to it.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I tweak my build system and BitBake configuration for optimal build time as well as provide some guidance on how to collect build metrics and identify bottlenecks. ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; You should read the [https://wiki.yoctoproject.org/wiki/Build_Performance Build Performance] wiki page.  It provides general tips, a description of the bb-matrix script used for collecting relevant build metrics, a description of how to enable buildstats to generate build performance log data, and a description of how best to apply parallelism to the build.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get the networking to function on an Acer Aspire One n450 based netbook when using the meta-n450 BSP? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; While the n450 BSP will boot on the Acer AO532h netbook, the BSP does not enable the Atheros AR5B95 Wireless and AR8132 fast ethernet adapters. The Linux Yocto 3.2 kernel has these drivers, but they are not enabled. All you have to do is to create a Config Fragment file with a .cfg extension in a new directory called &#039;linux-yocto&#039; in the BSP recipes-kernel/linux directory. The new &#039;linux-yocto&#039; directory will be at the same level as the linux-yocto_3.2.bbappend file.  You will also need to add the following statement to the .bbappend file:&lt;br /&gt;
&lt;br /&gt;
SRC_URI += &amp;quot;file://myconfig.cfg&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The recipes-kernel/linux/linux-yocto/myconfig.cfg needs to contain the following 2 lines:&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATH9K_PCI=y&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATL1C=y&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build the build appliance? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Update the MACHINE variable to &amp;quot;qemux86-64&amp;quot; or &amp;quot;qemux86&amp;quot; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, run this command:&lt;br /&gt;
  # bitbake build-appliance-image&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.vmdk, *.vmx, *.vmxf) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder&lt;br /&gt;
ie: &lt;br /&gt;
&lt;br /&gt;
  # unzip Yocto_Build_Appliance.zip&lt;br /&gt;
  # cd Yocto_Build_Appliance&lt;br /&gt;
  # ls &lt;br /&gt;
    Yocto_Build_Appliance.vmdk  &lt;br /&gt;
    Yocto_Build_Appliance.vmx  &lt;br /&gt;
    Yocto_Build_Appliance.vmxf&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build an image without GPLv3 Licensed packages ? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Add the line &#039;INCOMPATIBLE_LICENSE = &amp;quot;GPLv3&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; and ensure you have the GPLv2 replacement libraries. (Caveat emptor; they are not as well maintained.) From the Yocto Mega-Manual 2.4;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If you use INCOMPATIBLE_LICENSE to exclude GPLv3 or set PREFERRED_VERSION to substitute a GPLv2 version of a GPLv3 recipe, then you must add the meta-gplv2 layer to your configuration.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then, build the image:&lt;br /&gt;
  # bitbake &amp;lt;image-name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Q: How do I ensure that I am using the latest upstream version of the package? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Add this line &#039;INHERIT += &amp;quot;distrodata&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
After that, run this command in the build directory:&lt;br /&gt;
  # bitbake -c checkpkg &amp;lt;package&amp;gt;&lt;br /&gt;
Then, check the &#039;Version&#039; and &#039;Upver&#039; fields in the below listed file: &lt;br /&gt;
  # gedit tmp/log/checkpkg.csv&lt;br /&gt;
&lt;br /&gt;
If those versions are same, then we have the latest upstream version of package&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get a list of CVEs patched? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  cve-check is available from 2.2 release (meta/recipes-core/meta/cve-update-nvd2-native.bb is used for acessing the new NVD database 2.0 API, meta/classes/cve-check.bbclass implements the check of recipes against CVEs).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To run it just inherit the class in conf/local.conf file:&lt;br /&gt;
&lt;br /&gt;
 # INHERIT += &amp;quot;cve-check&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
&lt;br /&gt;
1. To check for CVEs in openssl&lt;br /&gt;
 # bitbake -c cve_check openssl&lt;br /&gt;
&lt;br /&gt;
2. To check for all recipes build for core-image-sato&lt;br /&gt;
 # bitbake core-image-sato   &lt;br /&gt;
 # bitbake -k -c cve_check universe  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Log files are created under tmp/log/cve/&lt;br /&gt;
  ...&lt;br /&gt;
  libmicrohttpd_cve.json&lt;br /&gt;
  libmicrohttpd-native_cve.json&lt;br /&gt;
  libmnl_cve.json&lt;br /&gt;
  libmnl-native_cve.json&lt;br /&gt;
  libmodule-build-perl_cve.json&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Example of log file:&lt;br /&gt;
&lt;br /&gt;
  {&lt;br /&gt;
  &amp;quot;version&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
  &amp;quot;package&amp;quot;: [&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;name&amp;quot;: &amp;quot;zstd&amp;quot;,&lt;br /&gt;
      &amp;quot;layer&amp;quot;: &amp;quot;meta&amp;quot;,&lt;br /&gt;
      &amp;quot;version&amp;quot;: &amp;quot;1.5.5&amp;quot;,&lt;br /&gt;
      &amp;quot;products&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;product&amp;quot;: &amp;quot;zstandard&amp;quot;,&lt;br /&gt;
          &amp;quot;cvesInRecord&amp;quot;: &amp;quot;Yes&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;issue&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;id&amp;quot;: &amp;quot;CVE-2019-11922&amp;quot;,&lt;br /&gt;
          &amp;quot;summary&amp;quot;: &amp;quot;A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.&amp;quot;,&lt;br /&gt;
          &amp;quot;scorev2&amp;quot;: &amp;quot;6.8&amp;quot;,&lt;br /&gt;
          &amp;quot;scorev3&amp;quot;: &amp;quot;8.1&amp;quot;,&lt;br /&gt;
          &amp;quot;vector&amp;quot;: &amp;quot;NETWORK&amp;quot;,&lt;br /&gt;
          &amp;quot;vectorString&amp;quot;: &amp;quot;AV:N/AC:M/Au:N/C:P/I:P/A:P&amp;quot;,&lt;br /&gt;
          &amp;quot;status&amp;quot;: &amp;quot;Patched&amp;quot;,&lt;br /&gt;
          &amp;quot;link&amp;quot;: &amp;quot;https://nvd.nist.gov/vuln/detail/CVE-2019-11922&amp;quot;&lt;br /&gt;
        },&lt;br /&gt;
   ...&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build a wic image? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Append &amp;quot;wic&amp;quot; to IMAGE_FSTYPES  in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, build the target image type as usual:&lt;br /&gt;
  # bitbake &amp;lt;target-image-type&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.wic) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder. E.g. if you build for core-image-minimal for qemzx86-64 you should find a file like: core-image-minimal-qemux86-64.rootfs.wic&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86148</id>
		<title>How do I</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=86148"/>
		<updated>2023-12-27T15:29:26Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* Q: How do I build a wic image? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Q: How do get the package manager binaries on my target rootfs? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Make sure your image has IMAGE_FEATURES += &amp;quot;package-management&amp;quot; included.&lt;br /&gt;
&lt;br /&gt;
== Q: How do I create my own source download mirror ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &lt;br /&gt;
Make a complete build with these variables set in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
&lt;br /&gt;
After a complete build, copy all *files* (not symlinks) in your download directory to the desired source mirror directory. Test by setting the variables below in &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
  &lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file:///source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
  BB_NO_NETWORK = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you are building with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; and using external layers that are not part of the base Yocto distribution, be aware that recipes which:&lt;br /&gt;
&lt;br /&gt;
# Specify a Git repo as the source, and,&lt;br /&gt;
# Specify the revision to be built using a tag name&lt;br /&gt;
&lt;br /&gt;
will cause your build to abort when Bitbake tries to run &amp;lt;code&amp;gt;git ls-remote&amp;lt;/code&amp;gt; to resolve the tag name and is unable to access the network. So don&#039;t specify &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git;tag=v${PV}&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Instead, use:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 SRCREV = &amp;quot;8885ced062131214448fae056ef453f094303805&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Before putting together your pre-mirror, this command can be used from&lt;br /&gt;
your top-level source directory to identify recipes that might be&lt;br /&gt;
problematic with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; enabled:&lt;br /&gt;
&lt;br /&gt;
 find -name &amp;quot;*.inc&amp;quot; -o -name &amp;quot;*.bb&amp;quot; | xargs grep -li &amp;quot;git;tag=&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put Yocto on a hard drive? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; bitbake core-image-sato or core-image-sato-sdk&lt;br /&gt;
&lt;br /&gt;
# have a suitable partition on the disk - say partition #3&lt;br /&gt;
# this partition will show up as sde3 on my host machine and sda3 on the atom&lt;br /&gt;
# mkfs.ext3 /dev/sde3&lt;br /&gt;
# mount /dev/sde3 /mnt/target&lt;br /&gt;
# mount -o loop tmp/deploy/images/core-image-sato-sdk.ext3 /mnt/target-ext3&lt;br /&gt;
# cp -a /mnt/target-ext3/* /mnt/target&lt;br /&gt;
# grub-install --recheck --root-directory=/mnt/target /dev/sde&lt;br /&gt;
&lt;br /&gt;
If grub install passed, copy the following to /mnt/target/boot/grub/grub.cfg&lt;br /&gt;
&lt;br /&gt;
 set default=&amp;quot;0&amp;quot;&lt;br /&gt;
 set timeout=&amp;quot;30&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 menuentry &#039;Yocto SDK&#039; {&lt;br /&gt;
       insmod part_msdos&lt;br /&gt;
       insmod ext2&lt;br /&gt;
       set root=&#039;(hd0,msdos3)&#039;&lt;br /&gt;
       linux /boot/bzImage root=/dev/sda3&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thats it - this should boot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put my recipe into Yocto? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Let&#039;s use the Hello World example from Section 3.1.2 of the Yocto Project Reference Manual and expand on it.&lt;br /&gt;
&lt;br /&gt;
* In this example, I&#039;ll start with a new meta layer named &amp;quot;meta-jfa&amp;quot; in the Yocto Project files directory, which is named &amp;quot;poky&amp;quot;.  Then, I will add the new recipe and build the image, which is named &amp;quot;core-image-minimal&amp;quot;.  I will build it using the autotooled package option.  Once built, the image will have the “hello” application.&lt;br /&gt;
&lt;br /&gt;
;Step One&lt;br /&gt;
:Create the following directory structure in the ~/poky directory. I&#039;ll use my initials to denote the layer and recipe name:&lt;br /&gt;
 &lt;br /&gt;
 mkdir meta-jfa&lt;br /&gt;
 mkdir meta-jfa/conf&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa/hello&lt;br /&gt;
&lt;br /&gt;
;Step Two&lt;br /&gt;
:Next, to make sure the recipe gets searched and located, I&#039;ll create the layer.conf file in the meta-jfa/conf directory as follows:&lt;br /&gt;
&lt;br /&gt;
 # We have a conf and classes directory, add to BBPATH &lt;br /&gt;
 BBPATH := &amp;quot;${BBPATH}:${LAYERDIR}&amp;quot; &lt;br /&gt;
 # We have a packages directory, add to BBFILES &lt;br /&gt;
 BBFILES := &amp;quot;${BBFILES} ${LAYERDIR}/recipes-*/*/*.bb \ &lt;br /&gt;
            ${LAYERDIR}/recipes-*/*/*.bbappend&amp;quot; &lt;br /&gt;
 BBFILE_COLLECTIONS += &amp;quot;jfa&amp;quot; &lt;br /&gt;
 BBFILE_PATTERN_jfa := &amp;quot;^${LAYERDIR}/&amp;quot; &lt;br /&gt;
 BBFILE_PRIORITY_jfa := &amp;quot;5&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Three&lt;br /&gt;
:Now I need to put the recipe (.bb) file into the right directory.  So, I will put the file hello_2.7.bb into the meta-jfa/recipes-jfa/hello directory. I picked version 2.7 of the hello program by going to the gnu site for the application (ftp://ftp.gnu.org/gnu/hello/) and downloading it to checkout the version I wanted to include. hello-2.7.tar.gz is the most current. I downloaded it locally and expanded it to look at the license information.  The hello_2.7.bb file contains the following:&lt;br /&gt;
&lt;br /&gt;
 DESCRIPTION = &amp;quot;GNU Helloworld application&amp;quot; &lt;br /&gt;
 SECTION = &amp;quot;examples&amp;quot; &lt;br /&gt;
 LICENSE = &amp;quot;GPLv3+&amp;quot; &lt;br /&gt;
 LIC_FILES_CHKSUM = &amp;quot;file://COPYING;md5=d32239bcb673463ab874e80d47fae504&amp;quot; &lt;br /&gt;
 PR = &amp;quot;r0&amp;quot; &lt;br /&gt;
 SRC_URI = &amp;quot;${GNU_MIRROR}/hello/hello-${PV}.tar.gz&amp;quot; &lt;br /&gt;
 inherit autotools gettext &lt;br /&gt;
:Here is some explanation for a few of the recipe statements:&lt;br /&gt;
:* LIC_FILES_CHKSUM =  is required and, using file location defaults, points to the COPYING file that is part of the tarball that is downloaded from the SRC_URI address. The md5= part of the statement is generated by running “md5sum COPYING” against the COPYING file I downloaded to examine.&lt;br /&gt;
:* ${PV} in the SRC_URI statement is picked up from the part of the recipe file name after the “_”. In this case PV =2.7.&lt;br /&gt;
&lt;br /&gt;
;Step Four&lt;br /&gt;
:The recipe is built, so now I can run it:&lt;br /&gt;
&lt;br /&gt;
 cd ~/poky&lt;br /&gt;
 source oe-init-build-env build-hello.  &lt;br /&gt;
&lt;br /&gt;
;Step Five&lt;br /&gt;
:Before I can use BitBake I need to edit two files.  Sourcing the oe-init-build-env file above leaves me in the build-hello directory.  Before issuing the bitbake command I need to edit the files conf/local.conf and conf/bblayers.conf in that build-hello directory.  The bblayers.conf needs to have the one line added to include the layer you created.&lt;br /&gt;
&lt;br /&gt;
 # LAYER_CONF_VERSION is increased each time build/conf/bblayers.conf &lt;br /&gt;
 # changes incompatibly &lt;br /&gt;
 LCONF_VERSION = &amp;quot;4&amp;quot; &lt;br /&gt;
 BBFILES ?= &amp;quot;&amp;quot; &lt;br /&gt;
 BBLAYERS = &amp;quot; \ &lt;br /&gt;
   /home/jim/poky/meta \ &lt;br /&gt;
   /home/jim/poky/meta-yocto \ &lt;br /&gt;
   /home/jim/poky/meta-jfa \&lt;br /&gt;
 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Six&lt;br /&gt;
:The conf/local.conf file needs to have the parallel processing lines edited to speed up the baking on multicore systems.  I can do that by uncommenting the BB_NUMBER_THREADS and PARALLEL_MAKE variables.  Generally, I would set them equal to twice the number of cores used by my host machine.  By default, the MACHINE variable is set to qemux86 and for this example is fine.  I need to add a line to include the hello package I am building into the image by adding the following line:&lt;br /&gt;
&lt;br /&gt;
 IMAGE_INSTALL_append = &amp;quot; hello&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Seven&lt;br /&gt;
:Now I can bake it with this command:&lt;br /&gt;
 bitbake core-image-minimal&lt;br /&gt;
;Step Eight&lt;br /&gt;
:Once the image is built, I can test it by starting the QEMU emulator:&lt;br /&gt;
&lt;br /&gt;
 runqemu qemux86&lt;br /&gt;
&lt;br /&gt;
;Step Nine&lt;br /&gt;
:Once the emulator comes up, login as root with no password.  Then, at the prompt, enter &amp;quot;hello&amp;quot; to run your application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q: How do I setup Intel&amp;amp;reg; Atom&amp;amp;trade; Processor E6xx based system for media playback? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; To playback media files on an Atom E6xx processor, you need to have the EMGD GFX driver installed.  There is a README on this installation in the meta-crownbay directory. However, the official support for EMGD with accelerated 3D and media decode is scheduled for release 1.2, but is in the git repository now, so you need to start with branch, &amp;quot;master&amp;quot; of both the poky and meta-intel repository. And you will need the Intel Crownbay reference platform for the Atom E6xx processor or similar hardware.&lt;br /&gt;
&lt;br /&gt;
; Step 1&lt;br /&gt;
Follow the Appendix A example in the Yocto Project Development Manual, but instead of editing out the crownbay references and using the crownbay-noemgd, you do the opposite.&lt;br /&gt;
&lt;br /&gt;
One edit you need to add to the Appendix A instructions is for the file ~/poky/meta-intel/meta-mymachine/conf/mymachine.conf.  You need to add the following statement to include audio features needed for the audio part of the videos:&lt;br /&gt;
 MACHINE_FEATURES += &amp;quot;alsa&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; Step 2&lt;br /&gt;
In the Appendix A example a couple of changes are needed to the conf/local.conf and conf/bblayers.conf file edits from the standard example. The bblayers.conf file BBLAYERS statement should look like below, except correct the absolute path to match your system:&lt;br /&gt;
 BBLAYERS ?= &amp;quot; \&lt;br /&gt;
  /home/jim/poky/meta \&lt;br /&gt;
  /home/jim/poky/meta-yocto \&lt;br /&gt;
  /home/jim/poky/meta-intel \&lt;br /&gt;
  /home/jim/poky/meta-intel/meta-mymachine \&lt;br /&gt;
  &amp;quot;&lt;br /&gt;
The local.conf file should have some statements in addition to what the Appendix A used:&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST = &amp;quot;license_emgd-driver-bin_1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # The 2 statements below allow the playing of MP3 files. &lt;br /&gt;
 # Not specific to videos, but usually included on media use systems.&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST += &amp;quot;commercial&amp;quot;&lt;br /&gt;
 POKY_EXTRA_INSTALL += &amp;quot;gst-fluendo-mp3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # add debug development tweaks and test applications, which include amixer, aplay, arecord, etc.&lt;br /&gt;
 EXTRA_IMAGE_FEATURES = &amp;quot;debug-tweaks tools-testapps&amp;quot;&lt;br /&gt;
; Step 3&lt;br /&gt;
After bitbaking the core-image-sato image, I put the .ext3 image on a hard drive per the above How Do I. I also added some h.264, mp4, m4a, and mp3 files to play with before moving the hard drive to the target hardware system.&lt;br /&gt;
&lt;br /&gt;
I used both the Sato GUI Music and Video players to play the files.&lt;br /&gt;
&lt;br /&gt;
That&#039;s all there is to it.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I tweak my build system and BitBake configuration for optimal build time as well as provide some guidance on how to collect build metrics and identify bottlenecks. ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; You should read the [https://wiki.yoctoproject.org/wiki/Build_Performance Build Performance] wiki page.  It provides general tips, a description of the bb-matrix script used for collecting relevant build metrics, a description of how to enable buildstats to generate build performance log data, and a description of how best to apply parallelism to the build.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get the networking to function on an Acer Aspire One n450 based netbook when using the meta-n450 BSP? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; While the n450 BSP will boot on the Acer AO532h netbook, the BSP does not enable the Atheros AR5B95 Wireless and AR8132 fast ethernet adapters. The Linux Yocto 3.2 kernel has these drivers, but they are not enabled. All you have to do is to create a Config Fragment file with a .cfg extension in a new directory called &#039;linux-yocto&#039; in the BSP recipes-kernel/linux directory. The new &#039;linux-yocto&#039; directory will be at the same level as the linux-yocto_3.2.bbappend file.  You will also need to add the following statement to the .bbappend file:&lt;br /&gt;
&lt;br /&gt;
SRC_URI += &amp;quot;file://myconfig.cfg&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The recipes-kernel/linux/linux-yocto/myconfig.cfg needs to contain the following 2 lines:&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATH9K_PCI=y&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATL1C=y&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build the build appliance? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Update the MACHINE variable to &amp;quot;qemux86-64&amp;quot; or &amp;quot;qemux86&amp;quot; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, run this command:&lt;br /&gt;
  # bitbake build-appliance-image&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.vmdk, *.vmx, *.vmxf) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder&lt;br /&gt;
ie: &lt;br /&gt;
&lt;br /&gt;
  # unzip Yocto_Build_Appliance.zip&lt;br /&gt;
  # cd Yocto_Build_Appliance&lt;br /&gt;
  # ls &lt;br /&gt;
    Yocto_Build_Appliance.vmdk  &lt;br /&gt;
    Yocto_Build_Appliance.vmx  &lt;br /&gt;
    Yocto_Build_Appliance.vmxf&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build an image without GPLv3 Licensed packages ? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Add the line &#039;INCOMPATIBLE_LICENSE = &amp;quot;GPLv3&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; and ensure you have the GPLv2 replacement libraries. (Caveat emptor; they are not as well maintained.) From the Yocto Mega-Manual 2.4;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If you use INCOMPATIBLE_LICENSE to exclude GPLv3 or set PREFERRED_VERSION to substitute a GPLv2 version of a GPLv3 recipe, then you must add the meta-gplv2 layer to your configuration.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then, build the image:&lt;br /&gt;
  # bitbake &amp;lt;image-name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Q: How do I ensure that I am using the latest upstream version of the package? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Add this line &#039;INHERIT += &amp;quot;distrodata&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
After that, run this command in the build directory:&lt;br /&gt;
  # bitbake -c checkpkg &amp;lt;package&amp;gt;&lt;br /&gt;
Then, check the &#039;Version&#039; and &#039;Upver&#039; fields in the below listed file: &lt;br /&gt;
  # gedit tmp/log/checkpkg.csv&lt;br /&gt;
&lt;br /&gt;
If those versions are same, then we have the latest upstream version of package&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get a list of CVEs patched? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  cve-check tool is available from 2.2 release (poky/meta/recipes-devtools/cve-check-tool)&lt;br /&gt;
&lt;br /&gt;
To run it just inherit the class in conf/local.conf file:&lt;br /&gt;
&lt;br /&gt;
 # INHERIT += &amp;quot;cve-check&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source and run:&lt;br /&gt;
 # bitbake -c cve_check openssl   &lt;br /&gt;
 # bitbake core-image-sato   &lt;br /&gt;
 # bitbake -k -c cve_check universe  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Log files are created under &lt;br /&gt;
  unzip/1_6.0-r5/cve/cve.log&lt;br /&gt;
  gnutls/3.5.3-r0/cve/cve.log&lt;br /&gt;
  glibc/2.24-r0/cve/cve.log&lt;br /&gt;
  glibc-initial/2.24-r0/cve/cve.log&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Example of log file:&lt;br /&gt;
  PACKAGE NAME: perl&lt;br /&gt;
  PACKAGE VERSION: 5.22.1&lt;br /&gt;
  CVE: CVE-2016-1238&lt;br /&gt;
  CVE STATUS: Patched&lt;br /&gt;
  CVE SUMMARY:  ....&lt;br /&gt;
  ....&lt;br /&gt;
  CVSS v2 BASE SCORE: 7.2&lt;br /&gt;
  VECTOR: LOCAL&lt;br /&gt;
  MORE INFORMATION: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1238&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build a wic image? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Append &amp;quot;wic&amp;quot; to IMAGE_FSTYPES  in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, build the target image type as usual:&lt;br /&gt;
  # bitbake &amp;lt;target-image-type&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.wic) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder. E.g. if you build for core-image-minimal for qemzx86-64 you should find a file like: core-image-minimal-qemux86-64.rootfs.wic&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Ptest&amp;diff=86147</id>
		<title>Ptest</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Ptest&amp;diff=86147"/>
		<updated>2023-12-25T14:36:52Z</updated>

		<summary type="html">&lt;p&gt;Simonew: /* General recipe preparations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
Ptest (&#039;&#039;package test&#039;&#039;) is a concept for building, installing and running the test suites that are included in many upstream packages, and producing a consistent output format for the results.&lt;br /&gt;
&lt;br /&gt;
=Adding ptest to your build=&lt;br /&gt;
&lt;br /&gt;
To add package testing to your build, set the &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;EXTRA_IMAGE_FEATURES&amp;lt;/code&amp;gt; variables in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; file, which is found in the Build Directory:&lt;br /&gt;
&lt;br /&gt;
 DISTRO_FEATURES:append = &amp;quot; ptest&amp;quot;&lt;br /&gt;
 or&lt;br /&gt;
 DISTRO_FEATURES_append = &amp;quot; ptest&amp;quot;&lt;br /&gt;
 # Adding &amp;quot;ptest&amp;quot; to your DISTRO_FEATURES variable causes -ptest packages to be built.&lt;br /&gt;
&lt;br /&gt;
 EXTRA_IMAGE_FEATURES += &amp;quot;ptest-pkgs&amp;quot;&lt;br /&gt;
 # Adding &amp;quot;ptest-pkgs&amp;quot; to IMAGE_FEATURES variable causes all -ptest packages corresponding with other packages installed in your image to be additionally installed.&lt;br /&gt;
&lt;br /&gt;
As an alternative to the &amp;lt;code&amp;gt;ptest-pkgs&amp;lt;/code&amp;gt; image feature, if you want to be more selective about which tests to include, you can install them individually e.g. to install the tests for e2fsprogs and zlib you would do something like this:&lt;br /&gt;
&lt;br /&gt;
 CORE_IMAGE_EXTRA_INSTALL += &amp;quot;e2fsprogs-ptest zlib-ptest&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This is of course just one way to add packages to an image, see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#usingpoky-extend-customimage Customizing images] section of the Yocto Project development manual for more information.&lt;br /&gt;
&lt;br /&gt;
All ptest files are installed in &amp;lt;code&amp;gt;/usr/lib/&amp;lt;package&amp;gt;/ptest&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=Running ptest=&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;ptest-runner&amp;quot; package installs a &amp;quot;ptest-runner&amp;quot; which loops through all installed ptest test suites and runs them in sequence. You may therefore want to add &amp;quot;ptest-runner&amp;quot; to your image.&lt;br /&gt;
&lt;br /&gt;
==ptest-runner Usage==&lt;br /&gt;
&lt;br /&gt;
The usage for the ptest-runner is as follows:&lt;br /&gt;
&lt;br /&gt;
 Usage: ptest-runner [-d directory] [-l list] [-t timeout] [-h] [ptest1 ptest2 ...]&lt;br /&gt;
&lt;br /&gt;
==Executing ptest-runner==&lt;br /&gt;
&lt;br /&gt;
To execute a full ptest run you can do the following command line anywhere in the target:&lt;br /&gt;
&lt;br /&gt;
 $ ptest-runner&lt;br /&gt;
&lt;br /&gt;
Remember to redirect to a file if you want to have a log&lt;br /&gt;
&lt;br /&gt;
=Implementing ptest in a package recipe=&lt;br /&gt;
&lt;br /&gt;
==What constitutes a ptest?==&lt;br /&gt;
&lt;br /&gt;
A ptest must at minimum contain two things: &amp;lt;code&amp;gt;run-ptest&amp;lt;/code&amp;gt; and the actual test.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;run-ptest&amp;lt;/code&amp;gt; is a minimal shell script that &#039;&#039;starts&#039;&#039; the test suite. Note: It must not &#039;&#039;contain&#039;&#039; the test suite, only start it!&lt;br /&gt;
&lt;br /&gt;
The test can be anything, from a simple shell script running a binary and checking its output to an elaborate system of test binaries and data files.&lt;br /&gt;
&lt;br /&gt;
One major point of ptest is to consolidate the output format of all tests into a single common format. The format selected is the automake &amp;quot;simple test&amp;quot; format:&lt;br /&gt;
&lt;br /&gt;
 result: testname&lt;br /&gt;
&lt;br /&gt;
Where &amp;quot;result&amp;quot; is one of PASS, FAIL or SKIP and &amp;quot;testname&amp;quot; can be any identifying string (the same format [http://www.gnu.org/software/automake/manual/automake.html#Simple-Tests used by Automake].)&lt;br /&gt;
&lt;br /&gt;
==General recipe preparations==&lt;br /&gt;
&lt;br /&gt;
First, add &amp;lt;code&amp;gt;ptest&amp;lt;/code&amp;gt; to the &amp;lt;code&amp;gt;inherit&amp;lt;/code&amp;gt; line in the recipe.&lt;br /&gt;
&lt;br /&gt;
If a test adds build-time or run-time dependencies to the package which are not there normally (such as requiring &amp;quot;make&amp;quot; to run the test suite), add those with a -ptest suffix, like this:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS:${PN}-ptest += &amp;quot;make&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Building the test suite==&lt;br /&gt;
&lt;br /&gt;
Few packages support cross-compiling their test suites, so this is something we typically have to add.&lt;br /&gt;
&lt;br /&gt;
Many automake-based packages compile and run the test suite in a single command: &amp;quot;make check&amp;quot;. This doesn&#039;t work when cross-compiling, since we need to build on host and run on target. So we need to split that into two targets: One for building the test and one for running it. Our build of automake comes with a [http://git.yoctoproject.org/cgit/cgit.cgi/poky/tree/meta/recipes-devtools/automake/automake/buildtest.patch patch] which does this automatically, so packages using the plain &amp;quot;make check&amp;quot; arrangement from automake get this automatically.&lt;br /&gt;
&lt;br /&gt;
Now add a do_compile_ptest function to build the test suite:&lt;br /&gt;
&lt;br /&gt;
 do_compile_ptest() {&lt;br /&gt;
     oe_runmake buildtest-TESTS&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
If the package requires special configuration actions prior to compiling the test code, create a do_configure_ptest function to do that.&lt;br /&gt;
&lt;br /&gt;
Note that buildtest-TESTS requires [https://www.gnu.org/software/automake/manual/html_node/Serial-Test-Harness.html  serial-tests], but usually parallel tests are enabled by default.&lt;br /&gt;
In this case, you may have to modify the configure.ac script by adding serial-tests to AM_INIT_AUTOMAKE:&lt;br /&gt;
&lt;br /&gt;
 AM_INIT_AUTOMAKE([serial-tests])&lt;br /&gt;
&lt;br /&gt;
Recursive targets may not work out of the box either, in that case also try adding the following into configure.ac:&lt;br /&gt;
&lt;br /&gt;
 AM_EXTRA_RECURSIVE_TARGETS([buildtest-TESTS])&lt;br /&gt;
&lt;br /&gt;
==Installing the test suite==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;ptest&amp;lt;/code&amp;gt; class will automatically copy the required &amp;lt;code&amp;gt;run-ptest&amp;lt;/code&amp;gt; file and run &amp;lt;code&amp;gt;make install-ptest&amp;lt;/code&amp;gt; if there is such a target in the top-level &amp;lt;code&amp;gt;Makefile&amp;lt;/code&amp;gt;. For packages where this is enough, you don&#039;t need to do anything else.&lt;br /&gt;
&lt;br /&gt;
If you need to do something more than the automatic &amp;lt;code&amp;gt;make install-ptest&amp;lt;/code&amp;gt;, create a &amp;lt;code&amp;gt;do_install_ptest&amp;lt;/code&amp;gt; function within the recipe and put the required actions there. This function will be called after &amp;lt;code&amp;gt;make install-ptest&amp;lt;/code&amp;gt; has completed.&lt;br /&gt;
&lt;br /&gt;
==Recipes with ptest Enabled==&lt;br /&gt;
&lt;br /&gt;
You can use the layer index search function to find out which recipes have ptest enabled by searching for recipes that inherit the &amp;lt;code&amp;gt;ptest&amp;lt;/code&amp;gt; class:&lt;br /&gt;
&lt;br /&gt;
http://layers.openembedded.org/layerindex/branch/master/recipes/?q=inherits%3Aptest&lt;br /&gt;
&lt;br /&gt;
Specifically for OE-Core:&lt;br /&gt;
&lt;br /&gt;
http://layers.openembedded.org/layerindex/branch/master/recipes/?q=inherits%3Aptest+layer%3Aopenembedded-core&lt;br /&gt;
&lt;br /&gt;
Please consider when updating a recipe whether you can also incorporate a ptest package to it as well.&lt;br /&gt;
&lt;br /&gt;
= QA = &lt;br /&gt;
&lt;br /&gt;
For every Milestone of the release, QA team should execute pTest on real HW and compare the results with his previous corresponding execution (example 2.3 M2 should be compared with 2.3 M1 results) to track better all the releases ans execution an [[ Ptest/archive | archive ]] page was created to track all the executions and check what are the previous results available to compare.&lt;br /&gt;
&lt;br /&gt;
* To check the process used to execute Ptest during QA cycles go to [[BSP_Test_Plan#pTest|pTest process]]&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Poky&amp;diff=86146</id>
		<title>Poky</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Poky&amp;diff=86146"/>
		<updated>2023-12-23T20:50:44Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;See the https://docs.yoctoproject.org/ref-manual/terms.html#term-Poky page for information on this project.&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86145</id>
		<title>Technical FAQ</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86145"/>
		<updated>2023-12-23T20:31:25Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix syntax&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;color:black; background-color:#ffffcc&amp;quot; width=&amp;quot;100%&amp;quot; cellpadding=&amp;quot;10&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| &#039;&#039;&#039;NOTE:&#039;&#039;&#039; This is currently a draft. Not sure where this should end up but I&#039;ve been gathering these based on my interactions with people on IRC and email over the years. - [[User:PaulEggleton|PaulEggleton]] ([[User talk:PaulEggleton|talk]]) 21:13, 27 June 2016 (PDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Basics ==&lt;br /&gt;
&lt;br /&gt;
=== How do I figure out which version/codename/bitbake version matches up with which? ===&lt;br /&gt;
&lt;br /&gt;
There is a table in the [http://wiki.yoctoproject.org/wiki/Releases Releases page] on the Yocto Project wiki.&lt;br /&gt;
&lt;br /&gt;
=== How do I control what&#039;s in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Each image is defined by its own recipe, and that recipe specifies a list of packages that the image should contain. See [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#usingpoky-extend-customimage Customising Images] within the Yocto Project development manual for further details.&lt;br /&gt;
&lt;br /&gt;
Note: if you&#039;re doing anything more than basic experimentation / testing then you almost certainly should create your own image recipe rather than using one of the example images e.g. core-image-minimal - though you can certainly start by copying one of the example images. This way you have easier control over what goes into the image.&lt;br /&gt;
&lt;br /&gt;
=== Where do I find build logs? ===&lt;br /&gt;
&lt;br /&gt;
For the overall build, the output of bitbake gets logged to tmp/log/cooker/&amp;lt;machine&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
For each individual recipe, there is a &amp;quot;temp&amp;quot; directory under the work directory for the recipe that contains log.&amp;amp;lt;taskname&amp;amp;gt; and run.&amp;amp;lt;taskname&amp;amp;gt; files - the logs and the runfiles respectively. Within the build system this directory is pointed to by the T variable, so if you need to you can find it by using &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^T=&lt;br /&gt;
&lt;br /&gt;
=== How do I add a patch to a recipe? ===&lt;br /&gt;
&lt;br /&gt;
There are two concerns - how the recipe can fetch the patch and how it can be applied. For fetching, patch files are usually placed in a subdirectory next to the recipe; by default this directory should be named &amp;quot;files&amp;quot; or the the recipe name without any class prefix or suffix (for example for both &amp;quot;xyz&amp;quot; and &amp;quot;xyz-native&amp;quot; the subdirectory would be &amp;quot;xyz&amp;quot;). A pointer to it then needs to be added to &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; within the recipe, which usually takes the form &amp;lt;code&amp;gt;file://&amp;amp;lt;patchname&amp;amp;gt;.patch&amp;lt;/code&amp;gt; - i.e. just the filename, no path. If more than one subdirectory needs to be stripped off the paths in the patch (i.e. you need more than the equivalent of the -p1 option to the patch command) then you can add &amp;lt;code&amp;gt;;striplevel=&amp;amp;lt;number&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of the patch entry in SRC_URI (without any spaces).&lt;br /&gt;
&lt;br /&gt;
As with any modification, if the patch you are applying is a customisation that you do not intend to send to be incorporated in the layer you are modifying, then instead of adding the patch to the recipe directly then you should consider applying it in a bbappend within your own custom layer. This makes things easier if you later want to update the layer in question and the recipe has been modified upstream - you avoid effectively forking the layer.&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;devtool&amp;lt;/code&amp;gt; utility can help you modify the sources for a recipe and create a patch - basically &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt;, edit the sources, commit the changes with &amp;lt;code&amp;gt;git commit&amp;lt;/code&amp;gt;, then &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;devtool update-recipe&amp;lt;/code&amp;gt; in versions older than 2.2). Since &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt; gives you a git tree to work with, you can of course use something like &amp;lt;code&amp;gt;git am&amp;lt;/code&amp;gt; to apply existing patches this way. For more details see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#devtool-use-devtool-modify-to-enable-work-on-code-associated-with-an-existing-recipe Use devtool modify to Enable Work on Code Associated with an Existing Recipe] within the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;native&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;native&amp;quot; suffix identifies recipes (and variants of recipes) that produce files intended for the build host, as opposed to the target machine. This is usually for tools that are needed during the build process (such as automake).&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;nativesdk&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;nativesdk&amp;quot; prefix identifies recipes (and variants of recipes) that produce files intended for the host portion of the standard SDK, or for things which are constructed like an SDK such as buildtools-tarball. These are built for SDKMACHINE which may or may not be the same architecture as the build host.&lt;br /&gt;
&lt;br /&gt;
=== I have two recipes and one needs to access files provided by another - how can that work? ===&lt;br /&gt;
&lt;br /&gt;
Instead of providing direct access from a recipe to another&#039;s build tree (which wouldn&#039;t be practical with OpenEmbedded since the build tree (or &amp;quot;workdir&amp;quot;) is temporary), we create a &amp;quot;sysroot&amp;quot; where files that are intended to be shared between recipes get copied. The sysroot is managed by the build system and you should not copy files in there directly - instead, you install files under ${D} as normal during do_install and then the build system will copy a subset of those to the sysroot. There is a seperate sysroot for each machine being built for. In a recipe you can get the path of the sysroot and various standard directories under it using the STAGING_* variables.&lt;br /&gt;
&lt;br /&gt;
Often, for commonly-used build systems such as autotools and cmake you don&#039;t need to worry about these details - those systems and the environment that OpenEmbedded sets up for them will ensure that files get installed and picked up in the correct locations. However if the software your recipe is building has custom build scripts / makefiles and it takes shortcuts that don&#039;t account for cross-compilation or the use of a sysroot, then you will need to make appropriate adjustments.&lt;br /&gt;
&lt;br /&gt;
=== How do I enable package management in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Add &amp;lt;code&amp;gt;package-management&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;IMAGE_FEATURES&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;EXTRA_IMAGE_FEATURES&amp;lt;/code&amp;gt;). You should then be able to use dnf/rpm, opkg, or apt-get/dpkg from the running system depending on the packaging format you have selected through PACKAGE_CLASSES. For more information see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#using-runtime-package-management Using Runtime Package Management] in the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What do ?=, ??=, := etc. do within a recipe/config file? ===&lt;br /&gt;
&lt;br /&gt;
See the [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#basic-syntax Basic Syntax section of the BitBake manual] for details.&lt;br /&gt;
&lt;br /&gt;
== Layers ==&lt;br /&gt;
&lt;br /&gt;
See http://www.openembedded.org/Layers_FAQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a recipe but it&#039;s not showing up in my image, what&#039;s going on? ===&lt;br /&gt;
&lt;br /&gt;
Creating a recipe (or adding a layer to your configuration with a desired recipe in it) only makes it available to the build system, it doesn&#039;t change what goes into the image. For that, see [[#How do I control what&#039;s in the final image?|How do I control what&#039;s in the final image?]] above.&lt;br /&gt;
&lt;br /&gt;
=== I set a variable but it doesn&#039;t seem to be having an effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
First, double-check that you haven&#039;t misspelled the variable name.&lt;br /&gt;
&lt;br /&gt;
The main tool to help troubleshoot any variable-related issue is &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; - this lists all the variables and the complete history of how each one has been set (use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; if you&#039;re dealing with issues in a variable value within a recipe as opposed to the global level). Usually it&#039;s best to pipe this through &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; so you can easily see the history - within less you can press / to search for the variable name. Often you will be dealing with the behaviour of a variable within the context of a specific recipe, so specify that recipe on the &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; command line to get the variables as set within the context of the recipe rather than the global context.&lt;br /&gt;
&lt;br /&gt;
If you&#039;re setting a variable in a bbappend, double-check that the bbappend is actually being applied - see the next question.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a bbappend for a recipe but what I&#039;m setting there isn&#039;t having any effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Here are some things to check:&lt;br /&gt;
&lt;br /&gt;
# Check if the layer the bbappend is in is listed in &amp;lt;code&amp;gt;bitbake-layers show-layers&amp;lt;/code&amp;gt;. If it isn&#039;t, you need to edit your bblayers.conf and ensure the path to the layer is included in the BBLAYERS value&lt;br /&gt;
# Check that the bbappend is being picked up by running &amp;lt;code&amp;gt;bitbake-layers show-appends&amp;lt;/code&amp;gt; - if your bbappend file isn&#039;t listed, it could be named incorrectly (such that it doesn&#039;t match the recipe name) or it may be that the BBFILES value in the conf/layer.conf for the layer containing the bbappend file doesn&#039;t include an expression that will match the bbappend files.&lt;br /&gt;
# If there are multiple versions of the recipe you have bbappended, it could be that the actual recipe being built is a different version than the one you have bbappended. &amp;lt;code&amp;gt;bitbake-layers show-recipes &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; will list all the versions, with the first one listed being the one that will be built. If this is the case there are several different solutions to this - (a) Rename your bbappend to match the version being built, (b) use a % wildcard in your bbappend so it will apply to any version, (c) set &amp;lt;code&amp;gt;PREFERRED_VERSION_&amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; in the configuration to select a the version you want to be built.&lt;br /&gt;
# Finally, as with any other issue with setting variables, use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | less&amp;lt;/code&amp;gt; and search with &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt; to see the history of how the variable has been set - you may find that the value you&#039;re trying set is being overridden.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m getting warnings that a recipe is tainted - what does this mean? ===&lt;br /&gt;
&lt;br /&gt;
Usually this happens because you have used I used bitbake&#039;s &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; option to force a task to re-execute. The assumption is that if you forced a task, it is possible that a rebuild from scratch would not include whatever changes you made that necessitated forcing (e.g. if you modified the source in the work directory for the recipe and then ran &amp;lt;code&amp;gt;bitbake -c compile -f&amp;lt;/code&amp;gt;). Generally, forcing a task should be reserved for situations where the build system has failed to detect a change you made rather than for everyday usage - if you&#039;re finding yourself needing to do it regularly then either there&#039;s a bug, you&#039;re doing something wrong, or perhaps you&#039;re using &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; when it&#039;s not really needed. Running &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the recipe will get rid of the taint flag.&lt;br /&gt;
&lt;br /&gt;
There is one other situation where we apply a taint, and that is &amp;lt;code&amp;gt;bitbake -c menuconfig&amp;lt;/code&amp;gt; on the kernel (or some other kconfig-using recipe). In this case, the configuration has been saved into the work directory for the kernel, but that is temporary - any rebuild from scratch will use the default configuration, so it is a reminder that you need to take the configuration and apply it back to the metadata and then run &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the kernel recipe.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m fetching from a git repository over ssh / http / https but it&#039;s not fetching properly, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake expects the prefix of entries in SRC_URI to specify the fetcher to be used, not the actual protocol. Thus, instead of:&lt;br /&gt;
&lt;br /&gt;
 # This will NOT work&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;https://git.example.com/repository&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
You should specify:&lt;br /&gt;
&lt;br /&gt;
 # This is better&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;git://git.example.com/repository;protocol=https&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The same applies for ssh and of course http.&lt;br /&gt;
&lt;br /&gt;
=== I tried bitbake &amp;lt;some target package name&amp;gt; that I know exists and it told me that nothing PROVIDES this...? ===&lt;br /&gt;
&lt;br /&gt;
There are two namespaces that bitbake concerns itself with - recipe names (a.k.a. build time targets) and package names (a.k.a. runtime targets). You can specify a build time target on the bitbake command line, but not a runtime target; you need to find the recipe that provides the package you are trying to build and build that instead (or simply add that package to your image and build the image). In current versions bitbake will at least tell you which recipes have matching or similar-sounding runtime provides (RPROVIDES) so that you&#039;ll usually get a hint on which recipe you need to build.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve included a package in my image but files I expect to be there are missing, what&#039;s the issue? ===&lt;br /&gt;
&lt;br /&gt;
Check the simple stuff: verify that the package is really in the image - look at the manifest file next to the image to ensure the package is listed. Also if you&#039;re flashing the image, double-check that you did indeed flash the right image and if there are multiple partitions / storage devices on your board or device that you&#039;re booting the one that you think you are.&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re sure of the above, it may be a matter of the package splitting - a lot of recipes split less commonly used components out to separate packages, so it&#039;s possible that the files you are looking for are in a different package. You can look at the recipe for this (look for PACKAGES and FILES statements) or assuming the recipe has been built, you can use &amp;lt;code&amp;gt;oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;oe-pkgdata-util list-pkg-files&amp;lt;/code&amp;gt; to inspect the packages provided by the recipe and the files they contain. Once you find the right package you can add it to your image.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m required to set LIC_FILES_CHKSUM but the software I&#039;m building doesn&#039;t have a license statement, what do I do? ===&lt;br /&gt;
&lt;br /&gt;
Ideally, all software should come with some kind of license statement so that the terms of distribution are clearly stated (especially if its source code is made publicly available); if not a text file describing the license then at the very least a line or two in the accompanying documentation, README file or source header comments. Assuming there is a license statement somewhere but not in a form you can point to with LIC_FILES_CHKSUM as part of the source tree, you can point LIC_FILES_CHKSUM to one of the generic license files in ${COMMON_LICENSE_DIR} (meta/files/common-licenses/), or alternatively you can include a file containing the license statement in a &amp;quot;files&amp;quot; subdirectory next to the recipe (or subdirectory named the same as the recipe - see how such files are handled in other recipes), point to it in SRC_URI using file://, then add it to LIC_FILES_CHKSUM. It is worth noting however that LIC_FILES_CHKSUM is intended to give you a warning if upstream changes its license terms when you do an upgrade of the recipe, and by pointing it to this common license file that is part of the metadata, that mechanism will not function. You may wish to consider encouraging the upstream provider of the software your recipe is building to follow best practices and include a proper license statement, so that you can point to it in a future version. At minimum if you do use such workarounds, you will need to take extra care when upgrading the recipe in future in case the upstream provider changes the license terms.&lt;br /&gt;
&lt;br /&gt;
If there really is no license stated at all anywhere for the software (and this is unfortunately not uncommon on github, for example) then you should really contact upstream - if there&#039;s no license, then technically you really shouldn&#039;t be distributing it until that&#039;s clarified with the original author(s).&lt;br /&gt;
&lt;br /&gt;
=== I am getting a package QA error / warning when building a recipe, how do I solve it? ===&lt;br /&gt;
&lt;br /&gt;
There are some general and specific recommendations in the [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#qa-errors-and-warnings QA Errors and Warnings] section of the Yocto Project Reference Manual.&lt;br /&gt;
&lt;br /&gt;
=== I am getting &amp;quot;taskhash mismatch&amp;quot; errors, what does this mean and how do I fix it? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake parses the metadata (recipes, classes and configuration) repeatedly during its operation, and this error means that the result of parsing changed between one parse and the next. Two situations that can cause this:&lt;br /&gt;
# One of the parsed files changed in between e.g. you edited a recipe or performed a git operation (e.g. git checkout) during the build. &#039;&#039;&#039;Do not make changes to the metadata while a build is running.&#039;&#039;&#039; If you run the build again the error should not recur.&lt;br /&gt;
# Alternatively, there is something in the metadata that results in a variable expanding to a different value each time it is parsed. This is often something time-related e.g. a timestamp which is calculated every time an expression is expanded. The solution is to ensure the value is calculated once per build and then the expression expands to the same value for the duration of the build.&lt;br /&gt;
&lt;br /&gt;
=== Building on a system with a GRSec kernel doesn&#039;t work well, is that supported? ===&lt;br /&gt;
&lt;br /&gt;
No, grsec isn&#039;t really supported. The list of distros that are supported (tested) is in the Yocto mega manual for each release.&lt;br /&gt;
You can refer to the work-around given in this defect: https://bugzilla.yoctoproject.org/show_bug.cgi?id=10885&lt;br /&gt;
&lt;br /&gt;
=== Working around Firejail ===&lt;br /&gt;
For users of Parrot OS and other secured Linux distros, you will find that your bitbake fetch commands refuse to work, yet you can manually run wget and retrieve the packages with no problem.  This is due to Poky creating links to all the tools it requires, in particular &#039;wget&#039;, &#039;ssh&#039; and &#039;strings&#039;, using the links to these tools in the /usr/local/bin/ directory which all redirect to firejail.  To fix the problem you can cd into &amp;lt;your Yocto install directory&amp;gt;/poky/build/tmp/hosttools directory and replace these links with ones redirecting to the actual executables under the /usr/bin directory.&lt;br /&gt;
&lt;br /&gt;
== Dependencies ==&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is being built? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;bitbake -g &amp;amp;lt;recipe&amp;amp;gt;&amp;lt;/code&amp;gt; will produce some .dot files that allow you to see the dependency relationships - usually pn-depends.dot holds the answers although sometimes you may need to look at task-depends.dot if the dependency is only in the form of a task dependency. Note that these graphs are much too large for most graphviz visualisation tools to process, so you&#039;ll probably find it&#039;s easiest to view them with &amp;quot;less&amp;quot; or a text editor and search for the item you&#039;re looking for.&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is in my image? ===&lt;br /&gt;
&lt;br /&gt;
Enable the buildhistory class and build the image again, and it will write out a depends.dot file containing the relationships between packages in the final image. If the package name isn&#039;t mentioned it is probably explicitly mentioned in IMAGE_INSTALL or being brought in via IMAGE_FEATURES.&lt;br /&gt;
&lt;br /&gt;
See [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] in the Yocto Project Reference manual which covers how to enable buildhistory and the output it produces.&lt;br /&gt;
&lt;br /&gt;
=== How do I view the .dot files produced by bitbake -g or buildhistory? ===&lt;br /&gt;
&lt;br /&gt;
The size of some of these .dot graphs (particularly those produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt;) is a little large for most viewers / processing tools, and unfortunately this isn&#039;t something that can be fixed - it&#039;s just the nature of the dependency relationships between targets and tasks within OpenEmbedded. Usually if you&#039;re just after answering a simple dependency question you can figure it out by viewing it with &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; and using its built-in search function (or alternatively your favourite text editor).&lt;br /&gt;
&lt;br /&gt;
You can try [http://github.com/jrfonseca/xdot.py xdot] which will work well for some of the graphs, but the task graph produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt; for something like an image in particular is likely to be too large to view within it.&lt;br /&gt;
&lt;br /&gt;
=== Why are all of these -native items being built when my host distro has some of these available? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s complicated. In some cases the software in question isn&#039;t widely packaged by common Linux distributions. In other cases we need to apply patches to the software, use a more up-to-date version than commonly packaged or build it with a particular configuration. In general it just helps us isolate ourselves from potential problems caused by differences in host Linux distributions. For the most part the time spent building the native tools that are definitely provided by the host distro are dwarfed by the time spent building things that definitely aren&#039;t provided, such as the C library for the target and the cross-compiling toolchain.&lt;br /&gt;
&lt;br /&gt;
=== I disabled runtime package management and yet it still seems to be building rpm/opkg, why? ===&lt;br /&gt;
&lt;br /&gt;
The build system always uses a package manager on the host to assemble images, because it is usually the best tool for this job. This is completely independent of whether the package manager is available in the target image - &amp;quot;package-management&amp;quot; being in IMAGE_FEATURES (possibly indirectly via EXTRA_IMAGE_FEATURES) controls whether the package manager is used at runtime i.e. whether it (and its associated package database) will be present in the target image.&lt;br /&gt;
&lt;br /&gt;
=== Why is opkg-native / opkg-utils being built when I don&#039;t have ipk packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
opkg-utils provides update-alternatives which is the default tool used to manage the alternatives system (for selecting between multiple providers of the same file, e.g. busybox and bash both provide /bin/sh).&lt;br /&gt;
&lt;br /&gt;
=== Why is rpm-native being built when I don&#039;t have rpm packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
rpm-native is needed for two things in the generic packaging code implemented in the package class: &lt;br /&gt;
&lt;br /&gt;
# Debug symbol splitting - rpm-native provides the debugedit tool which this code uses&lt;br /&gt;
# Per-file dependencies - although this was originally just feeding into rpm when rpm was being used, it also now gets verified by QA checks regardless of which packaging backend is in use.&lt;br /&gt;
&lt;br /&gt;
=== I see a recipe built, but building an image containing the corresponding package fails at do_rootfs because it can&#039;t find the package. How does this happen? ===&lt;br /&gt;
&lt;br /&gt;
(For ipk, the error is &amp;quot;Couldn&#039;t find anything to satisfy &#039;&amp;lt;package&amp;gt;&#039;&amp;quot;; for rpm it is &amp;quot;&amp;lt;package&amp;gt; not found in the base feeds (&amp;lt;architecture list&amp;gt;)&amp;quot;.)&lt;br /&gt;
&lt;br /&gt;
Usually this is because the recipe claimed to provide the specified package (via PACKAGES or PACKAGES_DYNAMIC) but it wasn&#039;t actually produced, possibly because it ended up empty (since by default empty packages aren&#039;t produced), but the image or some other package still has a dependency that pulls in the specified package. If this is a recipe you are writing yourself the probable cause is your recipe isn&#039;t installing any files and thus the main package for the recipe is empty. Fix do_install (or what do_install is already running, e.g. make install) such that files are installed into the correct location such that they can then subsequently be packaged, and then all should be well.&lt;br /&gt;
&lt;br /&gt;
In other situations the reference to the package in question is spurious and either it should be removed entirely or there&#039;s another package that should be used instead. For example, the avahi and dhcp recipes both have an empty main package since the client and server are split out into their own packages, and those are the ones you should be using instead (avahi-daemon, avahi-utils, dhcp-server, dhcp-client - there are other packages as well, please see [[#How_do_I_find_out_what_packages_are_produced_by_a_recipe.3F|How do I find out what packages are produced by a recipe?]].) You could argue that these recipes shouldn&#039;t claim to provide the main package, or they should have a main package that depends on all the other packages (as some other recipes do).&lt;br /&gt;
&lt;br /&gt;
=== X11 and various other items are being built but I&#039;m only building core-image-minimal that doesn&#039;t have X11 in it - why? ===&lt;br /&gt;
&lt;br /&gt;
This is where it helps to understand the difference between build-time dependencies and runtime dependencies - often, a recipe will require things at build time (for example tools that help the build process, or to satisfy optional dependencies) that it doesn&#039;t necessarily need at runtime. The default configuration includes &amp;quot;&amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt;&amp;quot; in &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt;, and thus anything that can optionally support X11 will have its X11 support enabled; however when it comes to actually producing the image there won&#039;t be any X11 packages included as long as there are no hard dependencies and there aren&#039;t any X11 packages explicitly requested. &lt;br /&gt;
&lt;br /&gt;
If you never intend to use X11, you can set your own &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt; value that excludes &amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt; (note lower case, as with all feature names) and then X11 support will be disabled at build time and these items won&#039;t even be built.&lt;br /&gt;
&lt;br /&gt;
=== How do I avoid the kernel itself being pulled into my image when installing kernel modules? ===&lt;br /&gt;
&lt;br /&gt;
By default, the kernel class sets a dependency on the kernel-base package (which kernel modules always depend on) onto kernel-image, which contains the actual kernel binary. If you don&#039;t want this, set the following either in your kernel recipe or at the configuration level:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_${KERNEL_PACKAGE_NAME}-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Note: for older releases (pre-2.5) do this instead:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_kernel-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Misc ==&lt;br /&gt;
&lt;br /&gt;
=== How do I remove a value from a list variable? ===&lt;br /&gt;
&lt;br /&gt;
For variables that are expected to contain a space-separated list of items, BitBake supports a :remove operator to remove items from it. See [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#removing-override-style-syntax Removal (override style syntax)] in the BitBake user manual.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; the :remove operation is final - you cannot &amp;quot;undo&amp;quot; it with other operations elsewhere, thus you should really only make use of it in your distro / local configuration and not in layers that you expect others to re-use for different purposes (and therefore they may need to undo your changes). An alternative way to effectively remove an item is to set the list outright to include all the items minus the one you want to remove.&lt;br /&gt;
&lt;br /&gt;
=== How do I change how my recipe is built depending on what image I&#039;m building? ===&lt;br /&gt;
&lt;br /&gt;
The short answer is you cannot - the reason is that OpenEmbedded builds packages based on the overall configuration, and then the image only selects which of these packages should go into the final image. However, there are some solutions that do allow you to achieve the desired result:&lt;br /&gt;
&lt;br /&gt;
# Have separate packages for the two different versions. This could take the form of different recipes or you could do it within the same recipe. The two packages do have to have different names however; this may create problems if you have other packages that depend on the package.&lt;br /&gt;
# Use a postprocessing function within the image(s) - within the image recipe, define a shell or python function that makes the desired changes to the files in the image and add a call to it to ROOTFS_POSTPROCESS_COMMAND within the image recipe. Note that this may not be appropriate if you have runtime package management enabled since the postprocessing will only happen at image creation time and not if the package is installed later on at runtime - you may need to use a postinstall script instead in this case.&lt;br /&gt;
# Use a postinstall script (pkg_postinst_&amp;lt;package&amp;gt; function) within the recipe. In order to work, the postinstall script will need to be able to determine what to do when it&#039;s run - this may not be practical depending on what you&#039;re trying to achieve.&lt;br /&gt;
&lt;br /&gt;
=== Can I use a toolchain built by OE as the external toolchain? ===&lt;br /&gt;
&lt;br /&gt;
In general, this is not recommended and not something that is tested or directly supported out of the box. If you are wanting to do this solely as a means of speeding up the build, it is strongly suggested that you use shared state instead.&lt;br /&gt;
&lt;br /&gt;
There is a [http://layers.openembedded.org/layerindex/branch/master/layer/meta-sourcery/ meta-sourcery layer] available to enable support for the CodeSourcery toolchain, you may be able to use this as a template for bringing in an external toolchain however there are no guarantees.&lt;br /&gt;
&lt;br /&gt;
=== Why can&#039;t I run bitbake as root? ===&lt;br /&gt;
&lt;br /&gt;
If you try to run bitbake as root you may have noticed you get a sanity check failure that prevents the build from continuing. The reason we have this check is that it is very risky to run builds as root; if any build script mistakenly tries to install files to the root path (/) instead of where it is supposed to, you want it to fail immediately and not (in the worst case) overwrite files critical to your Linux system&#039;s operation e.g. under /bin or /etc. Thus, we do not support running the build as root. The only time root access is needed is (completely outside of a build) where the runqemu script uses sudo to set up TAP devices for networking.&lt;br /&gt;
&lt;br /&gt;
=== When I run bitbake -c devshell it looks like it&#039;s running as root! How is that possible? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s not running as the actual root user, it&#039;s just pretending for the benefit of programs that run under it (including your shell) that it is, via pseudo. This is important, because you normally want any owner/group/permission values that you set on files to be reflected in files that the recipe installs and packages and thus reflected in the final image - without this mechanism the actual build would have to run as root which would be very risky (see above). There are no actual elevated privileges through this mechanism however, so you need not be worried.&lt;br /&gt;
&lt;br /&gt;
=== Why does OE use pseudo? Why not use fakeroot / fakechroot instead? ===&lt;br /&gt;
&lt;br /&gt;
Splitting this up into two questions - we use pseudo (not to be confused with sudo!) because we want to be able to create images containing files have the correct permissions and ownership, e.g. files owned by root, without the user running the build system having to have that privilege. By using LD_PRELOAD to intercept function calls, pseudo creates an environment for programs running underneath it where it appears as if the running user has those privileges (and the results of any operations persist within the pseudo environment, i.e. you can write a file as root and it will appear to be owned by root while still running under pseudo). This allows us to run builds entirely as a normal user without needing extra privileges. Without pseudo we would require running the build system under sudo or as root - which would be ill-advised for things such as &amp;quot;make install&amp;quot; in case it happened to be broken and tried to write to / instead of somewhere under the work directory for the recipe; a broken recipe could easily end up destroying your system in that case.&lt;br /&gt;
&lt;br /&gt;
To answer the second part, why we use pseudo instead of fakeroot / fakechroot, see [https://github.com/wrpseudo/pseudo/wiki/WhyNotFakeroot WhyNotFakeroot on the pseudo wiki].&lt;br /&gt;
&lt;br /&gt;
=== How do I find out what packages are produced by a recipe? ===&lt;br /&gt;
&lt;br /&gt;
The Toaster web UI provides easy ways to query this.&lt;br /&gt;
&lt;br /&gt;
In the 1.8 (fido) release and newer you can use the following command, assuming the recipe has already been built:&lt;br /&gt;
&lt;br /&gt;
 oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
Alternatively you can look in the &amp;quot;packages-split&amp;quot; subdirectory under the work directory for the recipe - each package produced by the recipe will have a subdirectory under that. If you&#039;re not sure how to find the work directory you can run the following command:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^WORKDIR=&lt;br /&gt;
&lt;br /&gt;
Before a recipe gets built it is a bit trickier, since the system often doesn&#039;t know exactly which packages will be produced until do_package time; this is particularly true for recipes that package plugins or modules (e.g. kernel modules). You can get a reasonable idea though by looking at the value of PACKAGES (and PACKAGES_DYNAMIC for recipes that produce plugins).&lt;br /&gt;
&lt;br /&gt;
=== How do I find out which package contains a particular file (or python module)? ===&lt;br /&gt;
&lt;br /&gt;
oe-pkgdata-util has a find-path subcommand that will tell you exactly this. For example:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path /etc/network/interfaces&lt;br /&gt;
 init-ifupdown: /etc/network/interfaces&lt;br /&gt;
&lt;br /&gt;
Wildcards are allowed anywhere in the path (but you should enclose such expressions in quotes to avoid the shell itself attempting to expand the wildcard):&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/fstrim&amp;quot;&lt;br /&gt;
 util-linux-bash-completion: /usr/share/bash-completion/completions/fstrim&lt;br /&gt;
 util-linux-ptest: /usr/lib/util-linux/ptest/fstrim&lt;br /&gt;
 util-linux-dbg: /sbin/.debug/fstrim&lt;br /&gt;
 util-linux-fstrim: /sbin/fstrim&lt;br /&gt;
&lt;br /&gt;
As a specific example of where this can be useful, our Python packaging is a bit more granular than most typical distributions, allowing you to tune the contents of your image to just what you need. However, that does mean you may have trouble figuring out which package provides a particular module. oe-pkgdata-util find-path can also be used for this. For example, to find the package containing the &amp;quot;shutil&amp;quot; module, run this:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/shutil.*&amp;quot;&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/shutil.py&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-2.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-1.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.pyc&lt;br /&gt;
&lt;br /&gt;
Thus the package you are looking for is python3-shell. (Note that you could use */shutil.py, but if the module you are looking for is written in C as some of them are, that won&#039;t match it.)&lt;br /&gt;
&lt;br /&gt;
=== I have a local source tree I want to build instead of the upstream source a recipe normally fetches, how do I do that? ===&lt;br /&gt;
&lt;br /&gt;
If it&#039;s for development purposes i.e. you have your own local source tree you want to work on and have built, then run:&lt;br /&gt;
&lt;br /&gt;
 devtool modify -n &amp;lt;recipename&amp;gt; path/to/sourcetree/&lt;br /&gt;
&lt;br /&gt;
Once you are done you can use &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;devtool reset&amp;lt;/code&amp;gt; (depending on the situation) to return to building the source specified in the recipe.&lt;br /&gt;
&lt;br /&gt;
Alternatively if it&#039;s more permanent, use the &amp;lt;code&amp;gt;externalsrc&amp;lt;/code&amp;gt; class - you can inherit this in the original recipe or a bbappend:&lt;br /&gt;
&lt;br /&gt;
 inherit externalsrc&lt;br /&gt;
 EXTERNALSRC = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you&#039;re going to use it across a number of recipes you can inherit it globally at the configuration level (perhaps via an inc file that you include/require there):&lt;br /&gt;
&lt;br /&gt;
 INHERIT += &amp;quot;externalsrc&amp;quot;&lt;br /&gt;
 EXTERNALSRC_pn-&amp;lt;recipename&amp;gt; = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I specify the default shell? (e.g. bash instead of busybox) ===&lt;br /&gt;
&lt;br /&gt;
It depends what you mean. As far as which provides /bin/sh, this is controlled through the alternatives system, and by default bash has a higher priority than busybox, so simply installing bash into your image will automatically have /bin/sh link to bash rather than busybox.&lt;br /&gt;
&lt;br /&gt;
If you mean you want a user&#039;s login shell to be a specific shell, you&#039;ll need to modify /etc/passwd. One fairly easy way to achieve this is to use the extrausers class in your image recipe:&lt;br /&gt;
&lt;br /&gt;
 inherit extrausers&lt;br /&gt;
 EXTRA_USERS_PARAMS = &amp;quot;usermod -s /bin/bash &amp;lt;username&amp;gt;; &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I get &amp;quot;full&amp;quot; versions of typical shell commands? ===&lt;br /&gt;
&lt;br /&gt;
Most of the shell commands in our images are provided by busybox by default, and are very much simplified compared to what you would have on a typical Linux system in order to save space. If you need the full versions, most of them are built and packaged by the coreutils recipe (for disk and other typical utilities) and procps (for ps, etc). You may also want to install bash for more typical shell built-in commands. There is also a core-image-full-cmdline image if you want a base image that is already set up to provide a more typical Linux command-line experience. (Note: these will of course use up more disk space and memory.)&lt;br /&gt;
&lt;br /&gt;
=== How do I allow a variable&#039;s value through from the external environment? ===&lt;br /&gt;
&lt;br /&gt;
Add the variable&#039;s name to the BB_ENV_EXTRAWHITE &#039;&#039;in the external environment&#039;&#039; before running bitbake. Note that the oe-init-build-env script sets a default for this which you will want to preserve, so add to the default value rather than overwriting it.&lt;br /&gt;
&lt;br /&gt;
Alternatively if you just want to get the external value of a variable from python code within the metadata, you can use the BB_ORIGENV variable which itself contains a datastore of the original environment. For example to get the value of the DISPLAY variable from the environment within a python function you would do this:&lt;br /&gt;
&lt;br /&gt;
 display = d.getVar(&amp;quot;BB_ORIGENV&amp;quot;, False).getVar(&amp;quot;DISPLAY&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Note that you must specify &amp;quot;false&amp;quot; for the expand parameter when getting the BB_ORIGENV variable, because it&#039;s not a string and therefore cannot be expanded in the normal manner.&lt;br /&gt;
&lt;br /&gt;
=== Why is bitbake showing &amp;quot;AUTOINC&amp;quot; in the version for some recipes? ===&lt;br /&gt;
&lt;br /&gt;
Recipes where you see AUTOINC within the version in the console output during a build will be those that set &amp;lt;code&amp;gt;PV&amp;lt;/code&amp;gt; to include &amp;lt;code&amp;gt;&amp;quot;${SRCPV}&amp;quot;&amp;lt;/code&amp;gt; to get the SCM revision (e.g. the git hash) in the package version. In order to have the version increment properly, there needs to be a number in front of the revision which automatically increments each time the revision changes (assuming you have a PR server enabled), which is where AUTOINC comes in. During the build, AUTOINC is a stand-in for this auto-incrementing number, and later during &amp;lt;code&amp;gt;do_package&amp;lt;/code&amp;gt; it gets replaced with the real number so that the packages produced at the end have the full version number.&lt;br /&gt;
&lt;br /&gt;
=== Why are .so files in the -dev package instead of the main package for a recipe? ===&lt;br /&gt;
&lt;br /&gt;
In standard Unix library packaging, non-versioned .so symlinks (e.g. /usr/lib/libgd.so) are intended for development purposes only. At runtime, binaries should be linked to the major-versioned .so file/symlink e.g. /usr/lib/libgd.so.3. This (theoretically) allows multiple major versions of the same library as well as binaries that depend upon each of them to coexist on the same system. If the library is versioned but you have a binary that links to the unversioned .so file, it has almost certainly been linked incorrectly.&lt;br /&gt;
&lt;br /&gt;
Non-symlink .so files on the other hand are sometimes produced and are entirely legal - however these will be picked up in the -dev package in OpenEmbedded simply by virtue of their name, which is almost always not what you want. In this case you can do one of two things:&lt;br /&gt;
&lt;br /&gt;
# Fix the build of the library so it gets versioned. This may not always be appropriate, especially not for things like plugins.&lt;br /&gt;
# Set FILES_${PN}-dev within the recipe so that it does not include ${FILES_SOLIBSDEV}. If the software the recipe is building also produces symlink .so files you&#039;ll need to set FILES_${PN}-dev such that those do still get packaged in the -dev package though, or you&#039;ll get a package QA warning.&lt;br /&gt;
&lt;br /&gt;
=== Can I disable shared state? ===&lt;br /&gt;
&lt;br /&gt;
You cannot, no. Shared state (sstate) is an intrinsic part of staging files into the sysroot. It is possible to construct a recipe that bypasses sstate for some tasks (the kernel does this), however this is quite difficult and if not done properly will lead to many other problems.&lt;br /&gt;
&lt;br /&gt;
Almost always when you are having a problem with shared state the issue is either (a) you&#039;re adding/changing files in the sysroot directly (i.e. outside sstate control), or (b) what is being placed into the sysroot isn&#039;t relocatable due to hardcoded paths. The solution for (a) is do not do that - files should always be installed under &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; within &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; and then a subset of those are staged into the sysroot automatically. For (b) you need to fix or adapt the hardcoded path(s) - if the program reads (or can be made to read) each path from an environment variable, then you can use the &amp;lt;code&amp;gt;create_wrapper&amp;lt;/code&amp;gt; utility function to create a wrapper script that will set the path appropriately. Run &amp;lt;code&amp;gt;git grep create_wrapper&amp;lt;/code&amp;gt; in the &amp;lt;code&amp;gt;meta&amp;lt;/code&amp;gt; subdirectory to see examples.&lt;br /&gt;
&lt;br /&gt;
=== Files I installed into /opt or some other path never make it into the sysroot but I need them - how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
OpenEmbedded only stages a subset of files that are installed into &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; by &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; so that the sysroot doesn&#039;t fill up with unneeded files. You have two choices in this situation:&lt;br /&gt;
# install the files into a more standard location which is part of the subset, or &lt;br /&gt;
# adjust the subset to include the paths you are installing to.&lt;br /&gt;
Usually option 1 is recommended. If you really do need to adjust the subset, you can append the path (more specifically, the part below &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt;) to &amp;lt;code&amp;gt;SYSROOT_DIRS&amp;lt;/code&amp;gt; within your recipe. For example:&lt;br /&gt;
&lt;br /&gt;
 SYSROOT_DIRS += &amp;quot;/opt&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== I have some software which needs to build a binary that it then runs as part of its own build process, how do I make this work? ===&lt;br /&gt;
&lt;br /&gt;
Whilst it is possible to do this within a single recipe building for the target, it is tricky to do so because in that context everything is set up for cross-compiling for the target, and you would have to undo all of that to build host tools. The standard and much easier way of handling this is to create a native variant of the recipe using BBCLASSEXTEND and have your host tools built within that, and then have the target variant depend on the native variant. For example, assume your recipe were called xyz (xyz_1.1.bb), then you would include something like this in the recipe:&lt;br /&gt;
&lt;br /&gt;
 DEPENDS:append_class-target = &amp;quot; xyz-native&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 ...&lt;br /&gt;
 &lt;br /&gt;
 BBCLASSEXTEND += &amp;quot;native&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The host tools will then be built and installed into the sysroot in the native variant ready for when the target variant starts building. If the software you are building didn&#039;t intend for those tools to be installed outside of the build tree then you may need to patch the build process (e.g. the makefile) in order to install them and possibly also for the target side to find them in the sysroot. Additionally, for performance since you only need the tools in the native variant, you may also choose to disable building everything except those tools there - e.g. by using _native overrides for variables such as EXTRA_OECONF or functions such as do_configure.&lt;br /&gt;
&lt;br /&gt;
=== How do I fetch from two git repositories in the same recipe? ===&lt;br /&gt;
&lt;br /&gt;
By default, sources fetched from git within a recipe are unpacked into ${WORKDIR}/git, however that only works for a single repository. If you want to fetch from more than one, you need to change the path each repository is unpacked to. This is easy to do, just add &amp;lt;code&amp;gt;;destsuffix=&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of each URL in SRC_URI (replacing &amp;lt;code&amp;gt;&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; with the name of the subdirectory). You may then need to change S to match whichever of these you want to be considered the root of the source tree - or alternatively you can specify destsuffix such that repositories beyond the first go into a subdirectory under the default &amp;quot;git&amp;quot; subdirectory. For example, from the gst-libav recipe:&lt;br /&gt;
&lt;br /&gt;
 ...&lt;br /&gt;
 SRC_URI = &amp;quot; \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/gst-libav;branch=1.8;name=base \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/common;destsuffix=git/common;name=common \&lt;br /&gt;
     ...&lt;br /&gt;
     &amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
 S = &amp;quot;${WORKDIR}/git&amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
(Here we&#039;re using the default of &amp;quot;git&amp;quot; for the first repository, so we don&#039;t need to specify &amp;lt;code&amp;gt;destsuffix&amp;lt;/code&amp;gt; for the first URL.)&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m building a native recipe and I notice that the install path has the full path to the root directory repeated - why? ===&lt;br /&gt;
&lt;br /&gt;
It does look a little odd, but the reason for doing this is that native targets are meant to run on the system they&#039;re built on and run in the location they&#039;re installed to. This means they install to a destination of &amp;quot;/&amp;quot; and PREFIX is inside the native sysroot directory. We install them to a DESTDIR to allow us to manipulate them before they then get moved to a final DESTDIR of &amp;quot;/&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Most Makefiles handle this correctly by doing:&lt;br /&gt;
&lt;br /&gt;
 DESTDIR ?= &amp;quot;&amp;quot;&lt;br /&gt;
 prefix ?= &amp;quot;/usr&amp;quot;&lt;br /&gt;
 bindir ?= &amp;quot;$(prefix)/bin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
and then, importantly, install in the form:&lt;br /&gt;
&lt;br /&gt;
 install -d $(DESTDIR)$(bindir)&lt;br /&gt;
&lt;br /&gt;
so both prefix and DESTDIR are used. Whilst this is a convention, its a widely adopted and followed one. You can call into a custom makefile and set the variables manually if the makefile doesn&#039;t follow the convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do I generate static libraries? ===&lt;br /&gt;
&lt;br /&gt;
Its possible you have conf/distro/include/no-static-libs.inc included in your build - poky does this by default. The include list at the top of the bitbake -e output will tell you for certain.&lt;br /&gt;
&lt;br /&gt;
If so, you can remove that or set:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
as it would currently be set to this if that include file is included:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot; --disable-static&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Poky disables building static libraries by default as for the most part they&#039;re a waste of space/time.&lt;br /&gt;
&lt;br /&gt;
=== Can I conditionally inherit a class in a recipe? ===&lt;br /&gt;
&lt;br /&gt;
Yes, you can. What makes this possible is that the &amp;lt;code&amp;gt;inherit&amp;lt;/code&amp;gt; keyword will not complain if what comes after it expands to being empty, so you can use in-line python to do something like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
inherit ${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The above example will inherit the &amp;lt;code&amp;gt;perlnative&amp;lt;/code&amp;gt; class if &amp;quot;scripting&amp;quot; is in the value of the &amp;lt;code&amp;gt;PACKAGECONFIG&amp;lt;/code&amp;gt; variable, otherwise it will do nothing.&lt;br /&gt;
&lt;br /&gt;
You could of course put this into a variable if you prefer:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
SOMEVAR = &amp;quot;${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&amp;quot;&lt;br /&gt;
inherit ${SOMEVAR}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== How do I collect the source revisions fetched by each recipe? ===&lt;br /&gt;
&lt;br /&gt;
If you have recipes where &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; then you won&#039;t necessarily know exactly which revisions were built after the fact - it will be whatever was current at the time. You also might alternatively just want to get all of the revisions. Either way, to do this, enable buildhistory by setting the following in your local.conf:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
INHERIT += &amp;quot;buildhistory&amp;quot;&lt;br /&gt;
BUILDHISTORY_COMMIT = &amp;quot;1&amp;quot;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(The last line is not required with version 2.5 and onwards as it is the default, but will do no harm.)&lt;br /&gt;
&lt;br /&gt;
Once you have enabled buildhistory, you then need to build your image again so that buildhistory has a chance to record history data for it. Following that you can run &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; (with &amp;lt;code&amp;gt;-a&amp;lt;/code&amp;gt; if you want to see all revisions, not just the ones where AUTOREV was used) and it will output the revisions in a form you can use in a .inc file that you can &amp;lt;code&amp;gt;require&amp;lt;/code&amp;gt; from your configuration if you want to fix the build to those revisions.&lt;br /&gt;
&lt;br /&gt;
For more information see the [https://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] section of the Yocto Project Development manual, which covers the buildhistory class in detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I do an offline build with recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; set? ===&lt;br /&gt;
&lt;br /&gt;
If you set &amp;lt;code&amp;gt;BB_NO_NETWORK = &amp;quot;1&amp;quot;&amp;lt;/code&amp;gt; and you have recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt;, you will get an error because the build system will try to check the latest revision on startup and be immediately blocked by &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt;. There are two ways to handle this:&lt;br /&gt;
&lt;br /&gt;
A) See the previous question &amp;quot;How do I collect the source revisions fetched by each recipe?&amp;quot; and use the output generated by &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; as a .inc file in your configuration in order to fix the revisions at the ones which were most recently built.&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
B) Set &amp;lt;code&amp;gt;BB_SRCREV_POLICY = &amp;quot;cache&amp;quot;&amp;lt;/code&amp;gt; in your configuration. This will use the last cached revision. (The disadvantage of this method is that it is a little more difficult to preserve or share with others the fixed revisions.)&lt;br /&gt;
&lt;br /&gt;
Note that in either case if you later want to build the latest version again, you will of course need to undo the configuration changes.&lt;br /&gt;
&lt;br /&gt;
=== Is it possible to append a bbclass file (like bbappends do for recipes)? ===&lt;br /&gt;
&lt;br /&gt;
No, see the next question for details.&lt;br /&gt;
&lt;br /&gt;
=== How do I override a bbclass file? ===&lt;br /&gt;
&lt;br /&gt;
This is tricky - bbclass files are found via BBPATH, which is added to by each layer.conf either by prepending or appending. Assuming you are putting your bbclass in a custom layer, you will probably want to have your layer&#039;s layer.conf prepend to BBPATH, but then you will also need to make sure that your layer does not appear before any other layer that is also prepending and overriding the same class.&lt;br /&gt;
&lt;br /&gt;
Another alternative is to have an additional class which makes the appropriate changes to the environment, and then you will need to inherit that class after (and in the same manner as) the original class. This is slightly cleaner but can be annoying to enable particularly if the class is inherited by a number of recipes, and won&#039;t work if you want to alter the behaviour of a class inherited by recipes you don&#039;t control. (If you want a class to be inherited for all images (i.e. all recipes inheriting the &amp;lt;code&amp;gt;image&amp;lt;/code&amp;gt; class) you can inject additional classes by setting IMAGE_CLASSES; similarly for the kernel there is KERNEL_CLASSES).&lt;br /&gt;
&lt;br /&gt;
Ultimately, overriding bbclass files is not good practice long term - you are opening yourself up to maintenance issues when the original class changes, and the override is fragile as hinted above. The best solution is to try to get whatever changes you need into the original class; this does of course require additional work and time though.&lt;br /&gt;
&lt;br /&gt;
=== There&#039;s a bbappend in a layer I&#039;m using that defines a &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; and I want to append to that function also, how do I do this? ===&lt;br /&gt;
&lt;br /&gt;
Simply create a bbappend in your layer and define your own &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, and your commands will be executed &#039;&#039;as well as&#039;&#039; those of the other bbappend.&lt;br /&gt;
&lt;br /&gt;
You might assume that defining &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; will overwrite any previously defined &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, as would be the case with &amp;lt;code&amp;gt;do_something()&amp;lt;/code&amp;gt; in the same situation, but that is not the case - the key is that &amp;lt;code&amp;gt;:append&amp;lt;/code&amp;gt; (and &amp;lt;code&amp;gt;:prepend&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;:remove&amp;lt;/code&amp;gt;, etc.) are &#039;&#039;operators&#039;&#039; and they will be applied in sequence, where that sequence is the order in which they are parsed (which for bbappends will be in ascending layer priority order).&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86144</id>
		<title>Technical FAQ</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86144"/>
		<updated>2023-12-23T20:30:44Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix syntax&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;color:black; background-color:#ffffcc&amp;quot; width=&amp;quot;100%&amp;quot; cellpadding=&amp;quot;10&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| &#039;&#039;&#039;NOTE:&#039;&#039;&#039; This is currently a draft. Not sure where this should end up but I&#039;ve been gathering these based on my interactions with people on IRC and email over the years. - [[User:PaulEggleton|PaulEggleton]] ([[User talk:PaulEggleton|talk]]) 21:13, 27 June 2016 (PDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Basics ==&lt;br /&gt;
&lt;br /&gt;
=== How do I figure out which version/codename/bitbake version matches up with which? ===&lt;br /&gt;
&lt;br /&gt;
There is a table in the [http://wiki.yoctoproject.org/wiki/Releases Releases page] on the Yocto Project wiki.&lt;br /&gt;
&lt;br /&gt;
=== How do I control what&#039;s in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Each image is defined by its own recipe, and that recipe specifies a list of packages that the image should contain. See [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#usingpoky-extend-customimage Customising Images] within the Yocto Project development manual for further details.&lt;br /&gt;
&lt;br /&gt;
Note: if you&#039;re doing anything more than basic experimentation / testing then you almost certainly should create your own image recipe rather than using one of the example images e.g. core-image-minimal - though you can certainly start by copying one of the example images. This way you have easier control over what goes into the image.&lt;br /&gt;
&lt;br /&gt;
=== Where do I find build logs? ===&lt;br /&gt;
&lt;br /&gt;
For the overall build, the output of bitbake gets logged to tmp/log/cooker/&amp;lt;machine&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
For each individual recipe, there is a &amp;quot;temp&amp;quot; directory under the work directory for the recipe that contains log.&amp;amp;lt;taskname&amp;amp;gt; and run.&amp;amp;lt;taskname&amp;amp;gt; files - the logs and the runfiles respectively. Within the build system this directory is pointed to by the T variable, so if you need to you can find it by using &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^T=&lt;br /&gt;
&lt;br /&gt;
=== How do I add a patch to a recipe? ===&lt;br /&gt;
&lt;br /&gt;
There are two concerns - how the recipe can fetch the patch and how it can be applied. For fetching, patch files are usually placed in a subdirectory next to the recipe; by default this directory should be named &amp;quot;files&amp;quot; or the the recipe name without any class prefix or suffix (for example for both &amp;quot;xyz&amp;quot; and &amp;quot;xyz-native&amp;quot; the subdirectory would be &amp;quot;xyz&amp;quot;). A pointer to it then needs to be added to &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; within the recipe, which usually takes the form &amp;lt;code&amp;gt;file://&amp;amp;lt;patchname&amp;amp;gt;.patch&amp;lt;/code&amp;gt; - i.e. just the filename, no path. If more than one subdirectory needs to be stripped off the paths in the patch (i.e. you need more than the equivalent of the -p1 option to the patch command) then you can add &amp;lt;code&amp;gt;;striplevel=&amp;amp;lt;number&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of the patch entry in SRC_URI (without any spaces).&lt;br /&gt;
&lt;br /&gt;
As with any modification, if the patch you are applying is a customisation that you do not intend to send to be incorporated in the layer you are modifying, then instead of adding the patch to the recipe directly then you should consider applying it in a bbappend within your own custom layer. This makes things easier if you later want to update the layer in question and the recipe has been modified upstream - you avoid effectively forking the layer.&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;devtool&amp;lt;/code&amp;gt; utility can help you modify the sources for a recipe and create a patch - basically &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt;, edit the sources, commit the changes with &amp;lt;code&amp;gt;git commit&amp;lt;/code&amp;gt;, then &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;devtool update-recipe&amp;lt;/code&amp;gt; in versions older than 2.2). Since &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt; gives you a git tree to work with, you can of course use something like &amp;lt;code&amp;gt;git am&amp;lt;/code&amp;gt; to apply existing patches this way. For more details see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#devtool-use-devtool-modify-to-enable-work-on-code-associated-with-an-existing-recipe Use devtool modify to Enable Work on Code Associated with an Existing Recipe] within the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;native&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;native&amp;quot; suffix identifies recipes (and variants of recipes) that produce files intended for the build host, as opposed to the target machine. This is usually for tools that are needed during the build process (such as automake).&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;nativesdk&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;nativesdk&amp;quot; prefix identifies recipes (and variants of recipes) that produce files intended for the host portion of the standard SDK, or for things which are constructed like an SDK such as buildtools-tarball. These are built for SDKMACHINE which may or may not be the same architecture as the build host.&lt;br /&gt;
&lt;br /&gt;
=== I have two recipes and one needs to access files provided by another - how can that work? ===&lt;br /&gt;
&lt;br /&gt;
Instead of providing direct access from a recipe to another&#039;s build tree (which wouldn&#039;t be practical with OpenEmbedded since the build tree (or &amp;quot;workdir&amp;quot;) is temporary), we create a &amp;quot;sysroot&amp;quot; where files that are intended to be shared between recipes get copied. The sysroot is managed by the build system and you should not copy files in there directly - instead, you install files under ${D} as normal during do_install and then the build system will copy a subset of those to the sysroot. There is a seperate sysroot for each machine being built for. In a recipe you can get the path of the sysroot and various standard directories under it using the STAGING_* variables.&lt;br /&gt;
&lt;br /&gt;
Often, for commonly-used build systems such as autotools and cmake you don&#039;t need to worry about these details - those systems and the environment that OpenEmbedded sets up for them will ensure that files get installed and picked up in the correct locations. However if the software your recipe is building has custom build scripts / makefiles and it takes shortcuts that don&#039;t account for cross-compilation or the use of a sysroot, then you will need to make appropriate adjustments.&lt;br /&gt;
&lt;br /&gt;
=== How do I enable package management in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Add &amp;lt;code&amp;gt;package-management&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;IMAGE_FEATURES&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;EXTRA_IMAGE_FEATURES&amp;lt;/code&amp;gt;). You should then be able to use dnf/rpm, opkg, or apt-get/dpkg from the running system depending on the packaging format you have selected through PACKAGE_CLASSES. For more information see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#using-runtime-package-management Using Runtime Package Management] in the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What do ?=, ??=, := etc. do within a recipe/config file? ===&lt;br /&gt;
&lt;br /&gt;
See the [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#basic-syntax Basic Syntax section of the BitBake manual] for details.&lt;br /&gt;
&lt;br /&gt;
== Layers ==&lt;br /&gt;
&lt;br /&gt;
See http://www.openembedded.org/Layers_FAQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a recipe but it&#039;s not showing up in my image, what&#039;s going on? ===&lt;br /&gt;
&lt;br /&gt;
Creating a recipe (or adding a layer to your configuration with a desired recipe in it) only makes it available to the build system, it doesn&#039;t change what goes into the image. For that, see [[#How do I control what&#039;s in the final image?|How do I control what&#039;s in the final image?]] above.&lt;br /&gt;
&lt;br /&gt;
=== I set a variable but it doesn&#039;t seem to be having an effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
First, double-check that you haven&#039;t misspelled the variable name.&lt;br /&gt;
&lt;br /&gt;
The main tool to help troubleshoot any variable-related issue is &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; - this lists all the variables and the complete history of how each one has been set (use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; if you&#039;re dealing with issues in a variable value within a recipe as opposed to the global level). Usually it&#039;s best to pipe this through &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; so you can easily see the history - within less you can press / to search for the variable name. Often you will be dealing with the behaviour of a variable within the context of a specific recipe, so specify that recipe on the &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; command line to get the variables as set within the context of the recipe rather than the global context.&lt;br /&gt;
&lt;br /&gt;
If you&#039;re setting a variable in a bbappend, double-check that the bbappend is actually being applied - see the next question.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a bbappend for a recipe but what I&#039;m setting there isn&#039;t having any effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Here are some things to check:&lt;br /&gt;
&lt;br /&gt;
# Check if the layer the bbappend is in is listed in &amp;lt;code&amp;gt;bitbake-layers show-layers&amp;lt;/code&amp;gt;. If it isn&#039;t, you need to edit your bblayers.conf and ensure the path to the layer is included in the BBLAYERS value&lt;br /&gt;
# Check that the bbappend is being picked up by running &amp;lt;code&amp;gt;bitbake-layers show-appends&amp;lt;/code&amp;gt; - if your bbappend file isn&#039;t listed, it could be named incorrectly (such that it doesn&#039;t match the recipe name) or it may be that the BBFILES value in the conf/layer.conf for the layer containing the bbappend file doesn&#039;t include an expression that will match the bbappend files.&lt;br /&gt;
# If there are multiple versions of the recipe you have bbappended, it could be that the actual recipe being built is a different version than the one you have bbappended. &amp;lt;code&amp;gt;bitbake-layers show-recipes &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; will list all the versions, with the first one listed being the one that will be built. If this is the case there are several different solutions to this - (a) Rename your bbappend to match the version being built, (b) use a % wildcard in your bbappend so it will apply to any version, (c) set &amp;lt;code&amp;gt;PREFERRED_VERSION_&amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; in the configuration to select a the version you want to be built.&lt;br /&gt;
# Finally, as with any other issue with setting variables, use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | less&amp;lt;/code&amp;gt; and search with &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt; to see the history of how the variable has been set - you may find that the value you&#039;re trying set is being overridden.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m getting warnings that a recipe is tainted - what does this mean? ===&lt;br /&gt;
&lt;br /&gt;
Usually this happens because you have used I used bitbake&#039;s &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; option to force a task to re-execute. The assumption is that if you forced a task, it is possible that a rebuild from scratch would not include whatever changes you made that necessitated forcing (e.g. if you modified the source in the work directory for the recipe and then ran &amp;lt;code&amp;gt;bitbake -c compile -f&amp;lt;/code&amp;gt;). Generally, forcing a task should be reserved for situations where the build system has failed to detect a change you made rather than for everyday usage - if you&#039;re finding yourself needing to do it regularly then either there&#039;s a bug, you&#039;re doing something wrong, or perhaps you&#039;re using &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; when it&#039;s not really needed. Running &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the recipe will get rid of the taint flag.&lt;br /&gt;
&lt;br /&gt;
There is one other situation where we apply a taint, and that is &amp;lt;code&amp;gt;bitbake -c menuconfig&amp;lt;/code&amp;gt; on the kernel (or some other kconfig-using recipe). In this case, the configuration has been saved into the work directory for the kernel, but that is temporary - any rebuild from scratch will use the default configuration, so it is a reminder that you need to take the configuration and apply it back to the metadata and then run &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the kernel recipe.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m fetching from a git repository over ssh / http / https but it&#039;s not fetching properly, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake expects the prefix of entries in SRC_URI to specify the fetcher to be used, not the actual protocol. Thus, instead of:&lt;br /&gt;
&lt;br /&gt;
 # This will NOT work&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;https://git.example.com/repository&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
You should specify:&lt;br /&gt;
&lt;br /&gt;
 # This is better&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;git://git.example.com/repository;protocol=https&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The same applies for ssh and of course http.&lt;br /&gt;
&lt;br /&gt;
=== I tried bitbake &amp;lt;some target package name&amp;gt; that I know exists and it told me that nothing PROVIDES this...? ===&lt;br /&gt;
&lt;br /&gt;
There are two namespaces that bitbake concerns itself with - recipe names (a.k.a. build time targets) and package names (a.k.a. runtime targets). You can specify a build time target on the bitbake command line, but not a runtime target; you need to find the recipe that provides the package you are trying to build and build that instead (or simply add that package to your image and build the image). In current versions bitbake will at least tell you which recipes have matching or similar-sounding runtime provides (RPROVIDES) so that you&#039;ll usually get a hint on which recipe you need to build.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve included a package in my image but files I expect to be there are missing, what&#039;s the issue? ===&lt;br /&gt;
&lt;br /&gt;
Check the simple stuff: verify that the package is really in the image - look at the manifest file next to the image to ensure the package is listed. Also if you&#039;re flashing the image, double-check that you did indeed flash the right image and if there are multiple partitions / storage devices on your board or device that you&#039;re booting the one that you think you are.&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re sure of the above, it may be a matter of the package splitting - a lot of recipes split less commonly used components out to separate packages, so it&#039;s possible that the files you are looking for are in a different package. You can look at the recipe for this (look for PACKAGES and FILES statements) or assuming the recipe has been built, you can use &amp;lt;code&amp;gt;oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;oe-pkgdata-util list-pkg-files&amp;lt;/code&amp;gt; to inspect the packages provided by the recipe and the files they contain. Once you find the right package you can add it to your image.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m required to set LIC_FILES_CHKSUM but the software I&#039;m building doesn&#039;t have a license statement, what do I do? ===&lt;br /&gt;
&lt;br /&gt;
Ideally, all software should come with some kind of license statement so that the terms of distribution are clearly stated (especially if its source code is made publicly available); if not a text file describing the license then at the very least a line or two in the accompanying documentation, README file or source header comments. Assuming there is a license statement somewhere but not in a form you can point to with LIC_FILES_CHKSUM as part of the source tree, you can point LIC_FILES_CHKSUM to one of the generic license files in ${COMMON_LICENSE_DIR} (meta/files/common-licenses/), or alternatively you can include a file containing the license statement in a &amp;quot;files&amp;quot; subdirectory next to the recipe (or subdirectory named the same as the recipe - see how such files are handled in other recipes), point to it in SRC_URI using file://, then add it to LIC_FILES_CHKSUM. It is worth noting however that LIC_FILES_CHKSUM is intended to give you a warning if upstream changes its license terms when you do an upgrade of the recipe, and by pointing it to this common license file that is part of the metadata, that mechanism will not function. You may wish to consider encouraging the upstream provider of the software your recipe is building to follow best practices and include a proper license statement, so that you can point to it in a future version. At minimum if you do use such workarounds, you will need to take extra care when upgrading the recipe in future in case the upstream provider changes the license terms.&lt;br /&gt;
&lt;br /&gt;
If there really is no license stated at all anywhere for the software (and this is unfortunately not uncommon on github, for example) then you should really contact upstream - if there&#039;s no license, then technically you really shouldn&#039;t be distributing it until that&#039;s clarified with the original author(s).&lt;br /&gt;
&lt;br /&gt;
=== I am getting a package QA error / warning when building a recipe, how do I solve it? ===&lt;br /&gt;
&lt;br /&gt;
There are some general and specific recommendations in the [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#qa-errors-and-warnings QA Errors and Warnings] section of the Yocto Project Reference Manual.&lt;br /&gt;
&lt;br /&gt;
=== I am getting &amp;quot;taskhash mismatch&amp;quot; errors, what does this mean and how do I fix it? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake parses the metadata (recipes, classes and configuration) repeatedly during its operation, and this error means that the result of parsing changed between one parse and the next. Two situations that can cause this:&lt;br /&gt;
# One of the parsed files changed in between e.g. you edited a recipe or performed a git operation (e.g. git checkout) during the build. &#039;&#039;&#039;Do not make changes to the metadata while a build is running.&#039;&#039;&#039; If you run the build again the error should not recur.&lt;br /&gt;
# Alternatively, there is something in the metadata that results in a variable expanding to a different value each time it is parsed. This is often something time-related e.g. a timestamp which is calculated every time an expression is expanded. The solution is to ensure the value is calculated once per build and then the expression expands to the same value for the duration of the build.&lt;br /&gt;
&lt;br /&gt;
=== Building on a system with a GRSec kernel doesn&#039;t work well, is that supported? ===&lt;br /&gt;
&lt;br /&gt;
No, grsec isn&#039;t really supported. The list of distros that are supported (tested) is in the Yocto mega manual for each release.&lt;br /&gt;
You can refer to the work-around given in this defect: https://bugzilla.yoctoproject.org/show_bug.cgi?id=10885&lt;br /&gt;
&lt;br /&gt;
=== Working around Firejail ===&lt;br /&gt;
For users of Parrot OS and other secured Linux distros, you will find that your bitbake fetch commands refuse to work, yet you can manually run wget and retrieve the packages with no problem.  This is due to Poky creating links to all the tools it requires, in particular &#039;wget&#039;, &#039;ssh&#039; and &#039;strings&#039;, using the links to these tools in the /usr/local/bin/ directory which all redirect to firejail.  To fix the problem you can cd into &amp;lt;your Yocto install directory&amp;gt;/poky/build/tmp/hosttools directory and replace these links with ones redirecting to the actual executables under the /usr/bin directory.&lt;br /&gt;
&lt;br /&gt;
== Dependencies ==&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is being built? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;bitbake -g &amp;amp;lt;recipe&amp;amp;gt;&amp;lt;/code&amp;gt; will produce some .dot files that allow you to see the dependency relationships - usually pn-depends.dot holds the answers although sometimes you may need to look at task-depends.dot if the dependency is only in the form of a task dependency. Note that these graphs are much too large for most graphviz visualisation tools to process, so you&#039;ll probably find it&#039;s easiest to view them with &amp;quot;less&amp;quot; or a text editor and search for the item you&#039;re looking for.&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is in my image? ===&lt;br /&gt;
&lt;br /&gt;
Enable the buildhistory class and build the image again, and it will write out a depends.dot file containing the relationships between packages in the final image. If the package name isn&#039;t mentioned it is probably explicitly mentioned in IMAGE_INSTALL or being brought in via IMAGE_FEATURES.&lt;br /&gt;
&lt;br /&gt;
See [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] in the Yocto Project Reference manual which covers how to enable buildhistory and the output it produces.&lt;br /&gt;
&lt;br /&gt;
=== How do I view the .dot files produced by bitbake -g or buildhistory? ===&lt;br /&gt;
&lt;br /&gt;
The size of some of these .dot graphs (particularly those produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt;) is a little large for most viewers / processing tools, and unfortunately this isn&#039;t something that can be fixed - it&#039;s just the nature of the dependency relationships between targets and tasks within OpenEmbedded. Usually if you&#039;re just after answering a simple dependency question you can figure it out by viewing it with &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; and using its built-in search function (or alternatively your favourite text editor).&lt;br /&gt;
&lt;br /&gt;
You can try [http://github.com/jrfonseca/xdot.py xdot] which will work well for some of the graphs, but the task graph produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt; for something like an image in particular is likely to be too large to view within it.&lt;br /&gt;
&lt;br /&gt;
=== Why are all of these -native items being built when my host distro has some of these available? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s complicated. In some cases the software in question isn&#039;t widely packaged by common Linux distributions. In other cases we need to apply patches to the software, use a more up-to-date version than commonly packaged or build it with a particular configuration. In general it just helps us isolate ourselves from potential problems caused by differences in host Linux distributions. For the most part the time spent building the native tools that are definitely provided by the host distro are dwarfed by the time spent building things that definitely aren&#039;t provided, such as the C library for the target and the cross-compiling toolchain.&lt;br /&gt;
&lt;br /&gt;
=== I disabled runtime package management and yet it still seems to be building rpm/opkg, why? ===&lt;br /&gt;
&lt;br /&gt;
The build system always uses a package manager on the host to assemble images, because it is usually the best tool for this job. This is completely independent of whether the package manager is available in the target image - &amp;quot;package-management&amp;quot; being in IMAGE_FEATURES (possibly indirectly via EXTRA_IMAGE_FEATURES) controls whether the package manager is used at runtime i.e. whether it (and its associated package database) will be present in the target image.&lt;br /&gt;
&lt;br /&gt;
=== Why is opkg-native / opkg-utils being built when I don&#039;t have ipk packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
opkg-utils provides update-alternatives which is the default tool used to manage the alternatives system (for selecting between multiple providers of the same file, e.g. busybox and bash both provide /bin/sh).&lt;br /&gt;
&lt;br /&gt;
=== Why is rpm-native being built when I don&#039;t have rpm packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
rpm-native is needed for two things in the generic packaging code implemented in the package class: &lt;br /&gt;
&lt;br /&gt;
# Debug symbol splitting - rpm-native provides the debugedit tool which this code uses&lt;br /&gt;
# Per-file dependencies - although this was originally just feeding into rpm when rpm was being used, it also now gets verified by QA checks regardless of which packaging backend is in use.&lt;br /&gt;
&lt;br /&gt;
=== I see a recipe built, but building an image containing the corresponding package fails at do_rootfs because it can&#039;t find the package. How does this happen? ===&lt;br /&gt;
&lt;br /&gt;
(For ipk, the error is &amp;quot;Couldn&#039;t find anything to satisfy &#039;&amp;lt;package&amp;gt;&#039;&amp;quot;; for rpm it is &amp;quot;&amp;lt;package&amp;gt; not found in the base feeds (&amp;lt;architecture list&amp;gt;)&amp;quot;.)&lt;br /&gt;
&lt;br /&gt;
Usually this is because the recipe claimed to provide the specified package (via PACKAGES or PACKAGES_DYNAMIC) but it wasn&#039;t actually produced, possibly because it ended up empty (since by default empty packages aren&#039;t produced), but the image or some other package still has a dependency that pulls in the specified package. If this is a recipe you are writing yourself the probable cause is your recipe isn&#039;t installing any files and thus the main package for the recipe is empty. Fix do_install (or what do_install is already running, e.g. make install) such that files are installed into the correct location such that they can then subsequently be packaged, and then all should be well.&lt;br /&gt;
&lt;br /&gt;
In other situations the reference to the package in question is spurious and either it should be removed entirely or there&#039;s another package that should be used instead. For example, the avahi and dhcp recipes both have an empty main package since the client and server are split out into their own packages, and those are the ones you should be using instead (avahi-daemon, avahi-utils, dhcp-server, dhcp-client - there are other packages as well, please see [[#How_do_I_find_out_what_packages_are_produced_by_a_recipe.3F|How do I find out what packages are produced by a recipe?]].) You could argue that these recipes shouldn&#039;t claim to provide the main package, or they should have a main package that depends on all the other packages (as some other recipes do).&lt;br /&gt;
&lt;br /&gt;
=== X11 and various other items are being built but I&#039;m only building core-image-minimal that doesn&#039;t have X11 in it - why? ===&lt;br /&gt;
&lt;br /&gt;
This is where it helps to understand the difference between build-time dependencies and runtime dependencies - often, a recipe will require things at build time (for example tools that help the build process, or to satisfy optional dependencies) that it doesn&#039;t necessarily need at runtime. The default configuration includes &amp;quot;&amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt;&amp;quot; in &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt;, and thus anything that can optionally support X11 will have its X11 support enabled; however when it comes to actually producing the image there won&#039;t be any X11 packages included as long as there are no hard dependencies and there aren&#039;t any X11 packages explicitly requested. &lt;br /&gt;
&lt;br /&gt;
If you never intend to use X11, you can set your own &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt; value that excludes &amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt; (note lower case, as with all feature names) and then X11 support will be disabled at build time and these items won&#039;t even be built.&lt;br /&gt;
&lt;br /&gt;
=== How do I avoid the kernel itself being pulled into my image when installing kernel modules? ===&lt;br /&gt;
&lt;br /&gt;
By default, the kernel class sets a dependency on the kernel-base package (which kernel modules always depend on) onto kernel-image, which contains the actual kernel binary. If you don&#039;t want this, set the following either in your kernel recipe or at the configuration level:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_${KERNEL_PACKAGE_NAME}-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Note: for older releases (pre-2.5) do this instead:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_kernel-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Misc ==&lt;br /&gt;
&lt;br /&gt;
=== How do I remove a value from a list variable? ===&lt;br /&gt;
&lt;br /&gt;
For variables that are expected to contain a space-separated list of items, BitBake supports a _remove operator to remove items from it. See [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#removing-override-style-syntax Removal (override style syntax)] in the BitBake user manual.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; the _remove operation is final - you cannot &amp;quot;undo&amp;quot; it with other operations elsewhere, thus you should really only make use of it in your distro / local configuration and not in layers that you expect others to re-use for different purposes (and therefore they may need to undo your changes). An alternative way to effectively remove an item is to set the list outright to include all the items minus the one you want to remove.&lt;br /&gt;
&lt;br /&gt;
=== How do I change how my recipe is built depending on what image I&#039;m building? ===&lt;br /&gt;
&lt;br /&gt;
The short answer is you cannot - the reason is that OpenEmbedded builds packages based on the overall configuration, and then the image only selects which of these packages should go into the final image. However, there are some solutions that do allow you to achieve the desired result:&lt;br /&gt;
&lt;br /&gt;
# Have separate packages for the two different versions. This could take the form of different recipes or you could do it within the same recipe. The two packages do have to have different names however; this may create problems if you have other packages that depend on the package.&lt;br /&gt;
# Use a postprocessing function within the image(s) - within the image recipe, define a shell or python function that makes the desired changes to the files in the image and add a call to it to ROOTFS_POSTPROCESS_COMMAND within the image recipe. Note that this may not be appropriate if you have runtime package management enabled since the postprocessing will only happen at image creation time and not if the package is installed later on at runtime - you may need to use a postinstall script instead in this case.&lt;br /&gt;
# Use a postinstall script (pkg_postinst_&amp;lt;package&amp;gt; function) within the recipe. In order to work, the postinstall script will need to be able to determine what to do when it&#039;s run - this may not be practical depending on what you&#039;re trying to achieve.&lt;br /&gt;
&lt;br /&gt;
=== Can I use a toolchain built by OE as the external toolchain? ===&lt;br /&gt;
&lt;br /&gt;
In general, this is not recommended and not something that is tested or directly supported out of the box. If you are wanting to do this solely as a means of speeding up the build, it is strongly suggested that you use shared state instead.&lt;br /&gt;
&lt;br /&gt;
There is a [http://layers.openembedded.org/layerindex/branch/master/layer/meta-sourcery/ meta-sourcery layer] available to enable support for the CodeSourcery toolchain, you may be able to use this as a template for bringing in an external toolchain however there are no guarantees.&lt;br /&gt;
&lt;br /&gt;
=== Why can&#039;t I run bitbake as root? ===&lt;br /&gt;
&lt;br /&gt;
If you try to run bitbake as root you may have noticed you get a sanity check failure that prevents the build from continuing. The reason we have this check is that it is very risky to run builds as root; if any build script mistakenly tries to install files to the root path (/) instead of where it is supposed to, you want it to fail immediately and not (in the worst case) overwrite files critical to your Linux system&#039;s operation e.g. under /bin or /etc. Thus, we do not support running the build as root. The only time root access is needed is (completely outside of a build) where the runqemu script uses sudo to set up TAP devices for networking.&lt;br /&gt;
&lt;br /&gt;
=== When I run bitbake -c devshell it looks like it&#039;s running as root! How is that possible? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s not running as the actual root user, it&#039;s just pretending for the benefit of programs that run under it (including your shell) that it is, via pseudo. This is important, because you normally want any owner/group/permission values that you set on files to be reflected in files that the recipe installs and packages and thus reflected in the final image - without this mechanism the actual build would have to run as root which would be very risky (see above). There are no actual elevated privileges through this mechanism however, so you need not be worried.&lt;br /&gt;
&lt;br /&gt;
=== Why does OE use pseudo? Why not use fakeroot / fakechroot instead? ===&lt;br /&gt;
&lt;br /&gt;
Splitting this up into two questions - we use pseudo (not to be confused with sudo!) because we want to be able to create images containing files have the correct permissions and ownership, e.g. files owned by root, without the user running the build system having to have that privilege. By using LD_PRELOAD to intercept function calls, pseudo creates an environment for programs running underneath it where it appears as if the running user has those privileges (and the results of any operations persist within the pseudo environment, i.e. you can write a file as root and it will appear to be owned by root while still running under pseudo). This allows us to run builds entirely as a normal user without needing extra privileges. Without pseudo we would require running the build system under sudo or as root - which would be ill-advised for things such as &amp;quot;make install&amp;quot; in case it happened to be broken and tried to write to / instead of somewhere under the work directory for the recipe; a broken recipe could easily end up destroying your system in that case.&lt;br /&gt;
&lt;br /&gt;
To answer the second part, why we use pseudo instead of fakeroot / fakechroot, see [https://github.com/wrpseudo/pseudo/wiki/WhyNotFakeroot WhyNotFakeroot on the pseudo wiki].&lt;br /&gt;
&lt;br /&gt;
=== How do I find out what packages are produced by a recipe? ===&lt;br /&gt;
&lt;br /&gt;
The Toaster web UI provides easy ways to query this.&lt;br /&gt;
&lt;br /&gt;
In the 1.8 (fido) release and newer you can use the following command, assuming the recipe has already been built:&lt;br /&gt;
&lt;br /&gt;
 oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
Alternatively you can look in the &amp;quot;packages-split&amp;quot; subdirectory under the work directory for the recipe - each package produced by the recipe will have a subdirectory under that. If you&#039;re not sure how to find the work directory you can run the following command:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^WORKDIR=&lt;br /&gt;
&lt;br /&gt;
Before a recipe gets built it is a bit trickier, since the system often doesn&#039;t know exactly which packages will be produced until do_package time; this is particularly true for recipes that package plugins or modules (e.g. kernel modules). You can get a reasonable idea though by looking at the value of PACKAGES (and PACKAGES_DYNAMIC for recipes that produce plugins).&lt;br /&gt;
&lt;br /&gt;
=== How do I find out which package contains a particular file (or python module)? ===&lt;br /&gt;
&lt;br /&gt;
oe-pkgdata-util has a find-path subcommand that will tell you exactly this. For example:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path /etc/network/interfaces&lt;br /&gt;
 init-ifupdown: /etc/network/interfaces&lt;br /&gt;
&lt;br /&gt;
Wildcards are allowed anywhere in the path (but you should enclose such expressions in quotes to avoid the shell itself attempting to expand the wildcard):&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/fstrim&amp;quot;&lt;br /&gt;
 util-linux-bash-completion: /usr/share/bash-completion/completions/fstrim&lt;br /&gt;
 util-linux-ptest: /usr/lib/util-linux/ptest/fstrim&lt;br /&gt;
 util-linux-dbg: /sbin/.debug/fstrim&lt;br /&gt;
 util-linux-fstrim: /sbin/fstrim&lt;br /&gt;
&lt;br /&gt;
As a specific example of where this can be useful, our Python packaging is a bit more granular than most typical distributions, allowing you to tune the contents of your image to just what you need. However, that does mean you may have trouble figuring out which package provides a particular module. oe-pkgdata-util find-path can also be used for this. For example, to find the package containing the &amp;quot;shutil&amp;quot; module, run this:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/shutil.*&amp;quot;&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/shutil.py&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-2.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-1.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.pyc&lt;br /&gt;
&lt;br /&gt;
Thus the package you are looking for is python3-shell. (Note that you could use */shutil.py, but if the module you are looking for is written in C as some of them are, that won&#039;t match it.)&lt;br /&gt;
&lt;br /&gt;
=== I have a local source tree I want to build instead of the upstream source a recipe normally fetches, how do I do that? ===&lt;br /&gt;
&lt;br /&gt;
If it&#039;s for development purposes i.e. you have your own local source tree you want to work on and have built, then run:&lt;br /&gt;
&lt;br /&gt;
 devtool modify -n &amp;lt;recipename&amp;gt; path/to/sourcetree/&lt;br /&gt;
&lt;br /&gt;
Once you are done you can use &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;devtool reset&amp;lt;/code&amp;gt; (depending on the situation) to return to building the source specified in the recipe.&lt;br /&gt;
&lt;br /&gt;
Alternatively if it&#039;s more permanent, use the &amp;lt;code&amp;gt;externalsrc&amp;lt;/code&amp;gt; class - you can inherit this in the original recipe or a bbappend:&lt;br /&gt;
&lt;br /&gt;
 inherit externalsrc&lt;br /&gt;
 EXTERNALSRC = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you&#039;re going to use it across a number of recipes you can inherit it globally at the configuration level (perhaps via an inc file that you include/require there):&lt;br /&gt;
&lt;br /&gt;
 INHERIT += &amp;quot;externalsrc&amp;quot;&lt;br /&gt;
 EXTERNALSRC_pn-&amp;lt;recipename&amp;gt; = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I specify the default shell? (e.g. bash instead of busybox) ===&lt;br /&gt;
&lt;br /&gt;
It depends what you mean. As far as which provides /bin/sh, this is controlled through the alternatives system, and by default bash has a higher priority than busybox, so simply installing bash into your image will automatically have /bin/sh link to bash rather than busybox.&lt;br /&gt;
&lt;br /&gt;
If you mean you want a user&#039;s login shell to be a specific shell, you&#039;ll need to modify /etc/passwd. One fairly easy way to achieve this is to use the extrausers class in your image recipe:&lt;br /&gt;
&lt;br /&gt;
 inherit extrausers&lt;br /&gt;
 EXTRA_USERS_PARAMS = &amp;quot;usermod -s /bin/bash &amp;lt;username&amp;gt;; &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I get &amp;quot;full&amp;quot; versions of typical shell commands? ===&lt;br /&gt;
&lt;br /&gt;
Most of the shell commands in our images are provided by busybox by default, and are very much simplified compared to what you would have on a typical Linux system in order to save space. If you need the full versions, most of them are built and packaged by the coreutils recipe (for disk and other typical utilities) and procps (for ps, etc). You may also want to install bash for more typical shell built-in commands. There is also a core-image-full-cmdline image if you want a base image that is already set up to provide a more typical Linux command-line experience. (Note: these will of course use up more disk space and memory.)&lt;br /&gt;
&lt;br /&gt;
=== How do I allow a variable&#039;s value through from the external environment? ===&lt;br /&gt;
&lt;br /&gt;
Add the variable&#039;s name to the BB_ENV_EXTRAWHITE &#039;&#039;in the external environment&#039;&#039; before running bitbake. Note that the oe-init-build-env script sets a default for this which you will want to preserve, so add to the default value rather than overwriting it.&lt;br /&gt;
&lt;br /&gt;
Alternatively if you just want to get the external value of a variable from python code within the metadata, you can use the BB_ORIGENV variable which itself contains a datastore of the original environment. For example to get the value of the DISPLAY variable from the environment within a python function you would do this:&lt;br /&gt;
&lt;br /&gt;
 display = d.getVar(&amp;quot;BB_ORIGENV&amp;quot;, False).getVar(&amp;quot;DISPLAY&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Note that you must specify &amp;quot;false&amp;quot; for the expand parameter when getting the BB_ORIGENV variable, because it&#039;s not a string and therefore cannot be expanded in the normal manner.&lt;br /&gt;
&lt;br /&gt;
=== Why is bitbake showing &amp;quot;AUTOINC&amp;quot; in the version for some recipes? ===&lt;br /&gt;
&lt;br /&gt;
Recipes where you see AUTOINC within the version in the console output during a build will be those that set &amp;lt;code&amp;gt;PV&amp;lt;/code&amp;gt; to include &amp;lt;code&amp;gt;&amp;quot;${SRCPV}&amp;quot;&amp;lt;/code&amp;gt; to get the SCM revision (e.g. the git hash) in the package version. In order to have the version increment properly, there needs to be a number in front of the revision which automatically increments each time the revision changes (assuming you have a PR server enabled), which is where AUTOINC comes in. During the build, AUTOINC is a stand-in for this auto-incrementing number, and later during &amp;lt;code&amp;gt;do_package&amp;lt;/code&amp;gt; it gets replaced with the real number so that the packages produced at the end have the full version number.&lt;br /&gt;
&lt;br /&gt;
=== Why are .so files in the -dev package instead of the main package for a recipe? ===&lt;br /&gt;
&lt;br /&gt;
In standard Unix library packaging, non-versioned .so symlinks (e.g. /usr/lib/libgd.so) are intended for development purposes only. At runtime, binaries should be linked to the major-versioned .so file/symlink e.g. /usr/lib/libgd.so.3. This (theoretically) allows multiple major versions of the same library as well as binaries that depend upon each of them to coexist on the same system. If the library is versioned but you have a binary that links to the unversioned .so file, it has almost certainly been linked incorrectly.&lt;br /&gt;
&lt;br /&gt;
Non-symlink .so files on the other hand are sometimes produced and are entirely legal - however these will be picked up in the -dev package in OpenEmbedded simply by virtue of their name, which is almost always not what you want. In this case you can do one of two things:&lt;br /&gt;
&lt;br /&gt;
# Fix the build of the library so it gets versioned. This may not always be appropriate, especially not for things like plugins.&lt;br /&gt;
# Set FILES_${PN}-dev within the recipe so that it does not include ${FILES_SOLIBSDEV}. If the software the recipe is building also produces symlink .so files you&#039;ll need to set FILES_${PN}-dev such that those do still get packaged in the -dev package though, or you&#039;ll get a package QA warning.&lt;br /&gt;
&lt;br /&gt;
=== Can I disable shared state? ===&lt;br /&gt;
&lt;br /&gt;
You cannot, no. Shared state (sstate) is an intrinsic part of staging files into the sysroot. It is possible to construct a recipe that bypasses sstate for some tasks (the kernel does this), however this is quite difficult and if not done properly will lead to many other problems.&lt;br /&gt;
&lt;br /&gt;
Almost always when you are having a problem with shared state the issue is either (a) you&#039;re adding/changing files in the sysroot directly (i.e. outside sstate control), or (b) what is being placed into the sysroot isn&#039;t relocatable due to hardcoded paths. The solution for (a) is do not do that - files should always be installed under &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; within &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; and then a subset of those are staged into the sysroot automatically. For (b) you need to fix or adapt the hardcoded path(s) - if the program reads (or can be made to read) each path from an environment variable, then you can use the &amp;lt;code&amp;gt;create_wrapper&amp;lt;/code&amp;gt; utility function to create a wrapper script that will set the path appropriately. Run &amp;lt;code&amp;gt;git grep create_wrapper&amp;lt;/code&amp;gt; in the &amp;lt;code&amp;gt;meta&amp;lt;/code&amp;gt; subdirectory to see examples.&lt;br /&gt;
&lt;br /&gt;
=== Files I installed into /opt or some other path never make it into the sysroot but I need them - how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
OpenEmbedded only stages a subset of files that are installed into &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; by &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; so that the sysroot doesn&#039;t fill up with unneeded files. You have two choices in this situation:&lt;br /&gt;
# install the files into a more standard location which is part of the subset, or &lt;br /&gt;
# adjust the subset to include the paths you are installing to.&lt;br /&gt;
Usually option 1 is recommended. If you really do need to adjust the subset, you can append the path (more specifically, the part below &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt;) to &amp;lt;code&amp;gt;SYSROOT_DIRS&amp;lt;/code&amp;gt; within your recipe. For example:&lt;br /&gt;
&lt;br /&gt;
 SYSROOT_DIRS += &amp;quot;/opt&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== I have some software which needs to build a binary that it then runs as part of its own build process, how do I make this work? ===&lt;br /&gt;
&lt;br /&gt;
Whilst it is possible to do this within a single recipe building for the target, it is tricky to do so because in that context everything is set up for cross-compiling for the target, and you would have to undo all of that to build host tools. The standard and much easier way of handling this is to create a native variant of the recipe using BBCLASSEXTEND and have your host tools built within that, and then have the target variant depend on the native variant. For example, assume your recipe were called xyz (xyz_1.1.bb), then you would include something like this in the recipe:&lt;br /&gt;
&lt;br /&gt;
 DEPENDS:append_class-target = &amp;quot; xyz-native&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 ...&lt;br /&gt;
 &lt;br /&gt;
 BBCLASSEXTEND += &amp;quot;native&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The host tools will then be built and installed into the sysroot in the native variant ready for when the target variant starts building. If the software you are building didn&#039;t intend for those tools to be installed outside of the build tree then you may need to patch the build process (e.g. the makefile) in order to install them and possibly also for the target side to find them in the sysroot. Additionally, for performance since you only need the tools in the native variant, you may also choose to disable building everything except those tools there - e.g. by using _native overrides for variables such as EXTRA_OECONF or functions such as do_configure.&lt;br /&gt;
&lt;br /&gt;
=== How do I fetch from two git repositories in the same recipe? ===&lt;br /&gt;
&lt;br /&gt;
By default, sources fetched from git within a recipe are unpacked into ${WORKDIR}/git, however that only works for a single repository. If you want to fetch from more than one, you need to change the path each repository is unpacked to. This is easy to do, just add &amp;lt;code&amp;gt;;destsuffix=&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of each URL in SRC_URI (replacing &amp;lt;code&amp;gt;&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; with the name of the subdirectory). You may then need to change S to match whichever of these you want to be considered the root of the source tree - or alternatively you can specify destsuffix such that repositories beyond the first go into a subdirectory under the default &amp;quot;git&amp;quot; subdirectory. For example, from the gst-libav recipe:&lt;br /&gt;
&lt;br /&gt;
 ...&lt;br /&gt;
 SRC_URI = &amp;quot; \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/gst-libav;branch=1.8;name=base \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/common;destsuffix=git/common;name=common \&lt;br /&gt;
     ...&lt;br /&gt;
     &amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
 S = &amp;quot;${WORKDIR}/git&amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
(Here we&#039;re using the default of &amp;quot;git&amp;quot; for the first repository, so we don&#039;t need to specify &amp;lt;code&amp;gt;destsuffix&amp;lt;/code&amp;gt; for the first URL.)&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m building a native recipe and I notice that the install path has the full path to the root directory repeated - why? ===&lt;br /&gt;
&lt;br /&gt;
It does look a little odd, but the reason for doing this is that native targets are meant to run on the system they&#039;re built on and run in the location they&#039;re installed to. This means they install to a destination of &amp;quot;/&amp;quot; and PREFIX is inside the native sysroot directory. We install them to a DESTDIR to allow us to manipulate them before they then get moved to a final DESTDIR of &amp;quot;/&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Most Makefiles handle this correctly by doing:&lt;br /&gt;
&lt;br /&gt;
 DESTDIR ?= &amp;quot;&amp;quot;&lt;br /&gt;
 prefix ?= &amp;quot;/usr&amp;quot;&lt;br /&gt;
 bindir ?= &amp;quot;$(prefix)/bin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
and then, importantly, install in the form:&lt;br /&gt;
&lt;br /&gt;
 install -d $(DESTDIR)$(bindir)&lt;br /&gt;
&lt;br /&gt;
so both prefix and DESTDIR are used. Whilst this is a convention, its a widely adopted and followed one. You can call into a custom makefile and set the variables manually if the makefile doesn&#039;t follow the convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do I generate static libraries? ===&lt;br /&gt;
&lt;br /&gt;
Its possible you have conf/distro/include/no-static-libs.inc included in your build - poky does this by default. The include list at the top of the bitbake -e output will tell you for certain.&lt;br /&gt;
&lt;br /&gt;
If so, you can remove that or set:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
as it would currently be set to this if that include file is included:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot; --disable-static&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Poky disables building static libraries by default as for the most part they&#039;re a waste of space/time.&lt;br /&gt;
&lt;br /&gt;
=== Can I conditionally inherit a class in a recipe? ===&lt;br /&gt;
&lt;br /&gt;
Yes, you can. What makes this possible is that the &amp;lt;code&amp;gt;inherit&amp;lt;/code&amp;gt; keyword will not complain if what comes after it expands to being empty, so you can use in-line python to do something like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
inherit ${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The above example will inherit the &amp;lt;code&amp;gt;perlnative&amp;lt;/code&amp;gt; class if &amp;quot;scripting&amp;quot; is in the value of the &amp;lt;code&amp;gt;PACKAGECONFIG&amp;lt;/code&amp;gt; variable, otherwise it will do nothing.&lt;br /&gt;
&lt;br /&gt;
You could of course put this into a variable if you prefer:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
SOMEVAR = &amp;quot;${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&amp;quot;&lt;br /&gt;
inherit ${SOMEVAR}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== How do I collect the source revisions fetched by each recipe? ===&lt;br /&gt;
&lt;br /&gt;
If you have recipes where &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; then you won&#039;t necessarily know exactly which revisions were built after the fact - it will be whatever was current at the time. You also might alternatively just want to get all of the revisions. Either way, to do this, enable buildhistory by setting the following in your local.conf:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
INHERIT += &amp;quot;buildhistory&amp;quot;&lt;br /&gt;
BUILDHISTORY_COMMIT = &amp;quot;1&amp;quot;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(The last line is not required with version 2.5 and onwards as it is the default, but will do no harm.)&lt;br /&gt;
&lt;br /&gt;
Once you have enabled buildhistory, you then need to build your image again so that buildhistory has a chance to record history data for it. Following that you can run &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; (with &amp;lt;code&amp;gt;-a&amp;lt;/code&amp;gt; if you want to see all revisions, not just the ones where AUTOREV was used) and it will output the revisions in a form you can use in a .inc file that you can &amp;lt;code&amp;gt;require&amp;lt;/code&amp;gt; from your configuration if you want to fix the build to those revisions.&lt;br /&gt;
&lt;br /&gt;
For more information see the [https://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] section of the Yocto Project Development manual, which covers the buildhistory class in detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I do an offline build with recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; set? ===&lt;br /&gt;
&lt;br /&gt;
If you set &amp;lt;code&amp;gt;BB_NO_NETWORK = &amp;quot;1&amp;quot;&amp;lt;/code&amp;gt; and you have recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt;, you will get an error because the build system will try to check the latest revision on startup and be immediately blocked by &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt;. There are two ways to handle this:&lt;br /&gt;
&lt;br /&gt;
A) See the previous question &amp;quot;How do I collect the source revisions fetched by each recipe?&amp;quot; and use the output generated by &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; as a .inc file in your configuration in order to fix the revisions at the ones which were most recently built.&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
B) Set &amp;lt;code&amp;gt;BB_SRCREV_POLICY = &amp;quot;cache&amp;quot;&amp;lt;/code&amp;gt; in your configuration. This will use the last cached revision. (The disadvantage of this method is that it is a little more difficult to preserve or share with others the fixed revisions.)&lt;br /&gt;
&lt;br /&gt;
Note that in either case if you later want to build the latest version again, you will of course need to undo the configuration changes.&lt;br /&gt;
&lt;br /&gt;
=== Is it possible to append a bbclass file (like bbappends do for recipes)? ===&lt;br /&gt;
&lt;br /&gt;
No, see the next question for details.&lt;br /&gt;
&lt;br /&gt;
=== How do I override a bbclass file? ===&lt;br /&gt;
&lt;br /&gt;
This is tricky - bbclass files are found via BBPATH, which is added to by each layer.conf either by prepending or appending. Assuming you are putting your bbclass in a custom layer, you will probably want to have your layer&#039;s layer.conf prepend to BBPATH, but then you will also need to make sure that your layer does not appear before any other layer that is also prepending and overriding the same class.&lt;br /&gt;
&lt;br /&gt;
Another alternative is to have an additional class which makes the appropriate changes to the environment, and then you will need to inherit that class after (and in the same manner as) the original class. This is slightly cleaner but can be annoying to enable particularly if the class is inherited by a number of recipes, and won&#039;t work if you want to alter the behaviour of a class inherited by recipes you don&#039;t control. (If you want a class to be inherited for all images (i.e. all recipes inheriting the &amp;lt;code&amp;gt;image&amp;lt;/code&amp;gt; class) you can inject additional classes by setting IMAGE_CLASSES; similarly for the kernel there is KERNEL_CLASSES).&lt;br /&gt;
&lt;br /&gt;
Ultimately, overriding bbclass files is not good practice long term - you are opening yourself up to maintenance issues when the original class changes, and the override is fragile as hinted above. The best solution is to try to get whatever changes you need into the original class; this does of course require additional work and time though.&lt;br /&gt;
&lt;br /&gt;
=== There&#039;s a bbappend in a layer I&#039;m using that defines a &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; and I want to append to that function also, how do I do this? ===&lt;br /&gt;
&lt;br /&gt;
Simply create a bbappend in your layer and define your own &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, and your commands will be executed &#039;&#039;as well as&#039;&#039; those of the other bbappend.&lt;br /&gt;
&lt;br /&gt;
You might assume that defining &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; will overwrite any previously defined &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, as would be the case with &amp;lt;code&amp;gt;do_something()&amp;lt;/code&amp;gt; in the same situation, but that is not the case - the key is that &amp;lt;code&amp;gt;:append&amp;lt;/code&amp;gt; (and &amp;lt;code&amp;gt;:prepend&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;:remove&amp;lt;/code&amp;gt;, etc.) are &#039;&#039;operators&#039;&#039; and they will be applied in sequence, where that sequence is the order in which they are parsed (which for bbappends will be in ascending layer priority order).&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86143</id>
		<title>Technical FAQ</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Technical_FAQ&amp;diff=86143"/>
		<updated>2023-12-23T20:30:15Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix syntax&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;color:black; background-color:#ffffcc&amp;quot; width=&amp;quot;100%&amp;quot; cellpadding=&amp;quot;10&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| &#039;&#039;&#039;NOTE:&#039;&#039;&#039; This is currently a draft. Not sure where this should end up but I&#039;ve been gathering these based on my interactions with people on IRC and email over the years. - [[User:PaulEggleton|PaulEggleton]] ([[User talk:PaulEggleton|talk]]) 21:13, 27 June 2016 (PDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Basics ==&lt;br /&gt;
&lt;br /&gt;
=== How do I figure out which version/codename/bitbake version matches up with which? ===&lt;br /&gt;
&lt;br /&gt;
There is a table in the [http://wiki.yoctoproject.org/wiki/Releases Releases page] on the Yocto Project wiki.&lt;br /&gt;
&lt;br /&gt;
=== How do I control what&#039;s in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Each image is defined by its own recipe, and that recipe specifies a list of packages that the image should contain. See [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#usingpoky-extend-customimage Customising Images] within the Yocto Project development manual for further details.&lt;br /&gt;
&lt;br /&gt;
Note: if you&#039;re doing anything more than basic experimentation / testing then you almost certainly should create your own image recipe rather than using one of the example images e.g. core-image-minimal - though you can certainly start by copying one of the example images. This way you have easier control over what goes into the image.&lt;br /&gt;
&lt;br /&gt;
=== Where do I find build logs? ===&lt;br /&gt;
&lt;br /&gt;
For the overall build, the output of bitbake gets logged to tmp/log/cooker/&amp;lt;machine&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
For each individual recipe, there is a &amp;quot;temp&amp;quot; directory under the work directory for the recipe that contains log.&amp;amp;lt;taskname&amp;amp;gt; and run.&amp;amp;lt;taskname&amp;amp;gt; files - the logs and the runfiles respectively. Within the build system this directory is pointed to by the T variable, so if you need to you can find it by using &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^T=&lt;br /&gt;
&lt;br /&gt;
=== How do I add a patch to a recipe? ===&lt;br /&gt;
&lt;br /&gt;
There are two concerns - how the recipe can fetch the patch and how it can be applied. For fetching, patch files are usually placed in a subdirectory next to the recipe; by default this directory should be named &amp;quot;files&amp;quot; or the the recipe name without any class prefix or suffix (for example for both &amp;quot;xyz&amp;quot; and &amp;quot;xyz-native&amp;quot; the subdirectory would be &amp;quot;xyz&amp;quot;). A pointer to it then needs to be added to &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; within the recipe, which usually takes the form &amp;lt;code&amp;gt;file://&amp;amp;lt;patchname&amp;amp;gt;.patch&amp;lt;/code&amp;gt; - i.e. just the filename, no path. If more than one subdirectory needs to be stripped off the paths in the patch (i.e. you need more than the equivalent of the -p1 option to the patch command) then you can add &amp;lt;code&amp;gt;;striplevel=&amp;amp;lt;number&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of the patch entry in SRC_URI (without any spaces).&lt;br /&gt;
&lt;br /&gt;
As with any modification, if the patch you are applying is a customisation that you do not intend to send to be incorporated in the layer you are modifying, then instead of adding the patch to the recipe directly then you should consider applying it in a bbappend within your own custom layer. This makes things easier if you later want to update the layer in question and the recipe has been modified upstream - you avoid effectively forking the layer.&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;devtool&amp;lt;/code&amp;gt; utility can help you modify the sources for a recipe and create a patch - basically &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt;, edit the sources, commit the changes with &amp;lt;code&amp;gt;git commit&amp;lt;/code&amp;gt;, then &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;devtool update-recipe&amp;lt;/code&amp;gt; in versions older than 2.2). Since &amp;lt;code&amp;gt;devtool modify&amp;lt;/code&amp;gt; gives you a git tree to work with, you can of course use something like &amp;lt;code&amp;gt;git am&amp;lt;/code&amp;gt; to apply existing patches this way. For more details see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#devtool-use-devtool-modify-to-enable-work-on-code-associated-with-an-existing-recipe Use devtool modify to Enable Work on Code Associated with an Existing Recipe] within the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;native&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;native&amp;quot; suffix identifies recipes (and variants of recipes) that produce files intended for the build host, as opposed to the target machine. This is usually for tools that are needed during the build process (such as automake).&lt;br /&gt;
&lt;br /&gt;
=== What does &amp;quot;nativesdk&amp;quot; mean? ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;nativesdk&amp;quot; prefix identifies recipes (and variants of recipes) that produce files intended for the host portion of the standard SDK, or for things which are constructed like an SDK such as buildtools-tarball. These are built for SDKMACHINE which may or may not be the same architecture as the build host.&lt;br /&gt;
&lt;br /&gt;
=== I have two recipes and one needs to access files provided by another - how can that work? ===&lt;br /&gt;
&lt;br /&gt;
Instead of providing direct access from a recipe to another&#039;s build tree (which wouldn&#039;t be practical with OpenEmbedded since the build tree (or &amp;quot;workdir&amp;quot;) is temporary), we create a &amp;quot;sysroot&amp;quot; where files that are intended to be shared between recipes get copied. The sysroot is managed by the build system and you should not copy files in there directly - instead, you install files under ${D} as normal during do_install and then the build system will copy a subset of those to the sysroot. There is a seperate sysroot for each machine being built for. In a recipe you can get the path of the sysroot and various standard directories under it using the STAGING_* variables.&lt;br /&gt;
&lt;br /&gt;
Often, for commonly-used build systems such as autotools and cmake you don&#039;t need to worry about these details - those systems and the environment that OpenEmbedded sets up for them will ensure that files get installed and picked up in the correct locations. However if the software your recipe is building has custom build scripts / makefiles and it takes shortcuts that don&#039;t account for cross-compilation or the use of a sysroot, then you will need to make appropriate adjustments.&lt;br /&gt;
&lt;br /&gt;
=== How do I enable package management in the final image? ===&lt;br /&gt;
&lt;br /&gt;
Add &amp;lt;code&amp;gt;package-management&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;IMAGE_FEATURES&amp;lt;/code&amp;gt; (or &amp;lt;code&amp;gt;EXTRA_IMAGE_FEATURES&amp;lt;/code&amp;gt;). You should then be able to use dnf/rpm, opkg, or apt-get/dpkg from the running system depending on the packaging format you have selected through PACKAGE_CLASSES. For more information see [http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#using-runtime-package-management Using Runtime Package Management] in the Yocto Project Development manual.&lt;br /&gt;
&lt;br /&gt;
=== What do ?=, ??=, := etc. do within a recipe/config file? ===&lt;br /&gt;
&lt;br /&gt;
See the [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#basic-syntax Basic Syntax section of the BitBake manual] for details.&lt;br /&gt;
&lt;br /&gt;
== Layers ==&lt;br /&gt;
&lt;br /&gt;
See http://www.openembedded.org/Layers_FAQ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a recipe but it&#039;s not showing up in my image, what&#039;s going on? ===&lt;br /&gt;
&lt;br /&gt;
Creating a recipe (or adding a layer to your configuration with a desired recipe in it) only makes it available to the build system, it doesn&#039;t change what goes into the image. For that, see [[#How do I control what&#039;s in the final image?|How do I control what&#039;s in the final image?]] above.&lt;br /&gt;
&lt;br /&gt;
=== I set a variable but it doesn&#039;t seem to be having an effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
First, double-check that you haven&#039;t misspelled the variable name.&lt;br /&gt;
&lt;br /&gt;
The main tool to help troubleshoot any variable-related issue is &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; - this lists all the variables and the complete history of how each one has been set (use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; if you&#039;re dealing with issues in a variable value within a recipe as opposed to the global level). Usually it&#039;s best to pipe this through &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; so you can easily see the history - within less you can press / to search for the variable name. Often you will be dealing with the behaviour of a variable within the context of a specific recipe, so specify that recipe on the &amp;lt;code&amp;gt;bitbake -e&amp;lt;/code&amp;gt; command line to get the variables as set within the context of the recipe rather than the global context.&lt;br /&gt;
&lt;br /&gt;
If you&#039;re setting a variable in a bbappend, double-check that the bbappend is actually being applied - see the next question.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve created a bbappend for a recipe but what I&#039;m setting there isn&#039;t having any effect, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Here are some things to check:&lt;br /&gt;
&lt;br /&gt;
# Check if the layer the bbappend is in is listed in &amp;lt;code&amp;gt;bitbake-layers show-layers&amp;lt;/code&amp;gt;. If it isn&#039;t, you need to edit your bblayers.conf and ensure the path to the layer is included in the BBLAYERS value&lt;br /&gt;
# Check that the bbappend is being picked up by running &amp;lt;code&amp;gt;bitbake-layers show-appends&amp;lt;/code&amp;gt; - if your bbappend file isn&#039;t listed, it could be named incorrectly (such that it doesn&#039;t match the recipe name) or it may be that the BBFILES value in the conf/layer.conf for the layer containing the bbappend file doesn&#039;t include an expression that will match the bbappend files.&lt;br /&gt;
# If there are multiple versions of the recipe you have bbappended, it could be that the actual recipe being built is a different version than the one you have bbappended. &amp;lt;code&amp;gt;bitbake-layers show-recipes &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; will list all the versions, with the first one listed being the one that will be built. If this is the case there are several different solutions to this - (a) Rename your bbappend to match the version being built, (b) use a % wildcard in your bbappend so it will apply to any version, (c) set &amp;lt;code&amp;gt;PREFERRED_VERSION_&amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; in the configuration to select a the version you want to be built.&lt;br /&gt;
# Finally, as with any other issue with setting variables, use &amp;lt;code&amp;gt;bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | less&amp;lt;/code&amp;gt; and search with &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt; to see the history of how the variable has been set - you may find that the value you&#039;re trying set is being overridden.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m getting warnings that a recipe is tainted - what does this mean? ===&lt;br /&gt;
&lt;br /&gt;
Usually this happens because you have used I used bitbake&#039;s &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; option to force a task to re-execute. The assumption is that if you forced a task, it is possible that a rebuild from scratch would not include whatever changes you made that necessitated forcing (e.g. if you modified the source in the work directory for the recipe and then ran &amp;lt;code&amp;gt;bitbake -c compile -f&amp;lt;/code&amp;gt;). Generally, forcing a task should be reserved for situations where the build system has failed to detect a change you made rather than for everyday usage - if you&#039;re finding yourself needing to do it regularly then either there&#039;s a bug, you&#039;re doing something wrong, or perhaps you&#039;re using &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;-C&amp;lt;/code&amp;gt; when it&#039;s not really needed. Running &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the recipe will get rid of the taint flag.&lt;br /&gt;
&lt;br /&gt;
There is one other situation where we apply a taint, and that is &amp;lt;code&amp;gt;bitbake -c menuconfig&amp;lt;/code&amp;gt; on the kernel (or some other kconfig-using recipe). In this case, the configuration has been saved into the work directory for the kernel, but that is temporary - any rebuild from scratch will use the default configuration, so it is a reminder that you need to take the configuration and apply it back to the metadata and then run &amp;lt;code&amp;gt;bitbake -c clean&amp;lt;/code&amp;gt; on the kernel recipe.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m fetching from a git repository over ssh / http / https but it&#039;s not fetching properly, how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake expects the prefix of entries in SRC_URI to specify the fetcher to be used, not the actual protocol. Thus, instead of:&lt;br /&gt;
&lt;br /&gt;
 # This will NOT work&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;https://git.example.com/repository&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
You should specify:&lt;br /&gt;
&lt;br /&gt;
 # This is better&lt;br /&gt;
 SRC_URI = &amp;quot;&amp;lt;nowiki&amp;gt;git://git.example.com/repository;protocol=https&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The same applies for ssh and of course http.&lt;br /&gt;
&lt;br /&gt;
=== I tried bitbake &amp;lt;some target package name&amp;gt; that I know exists and it told me that nothing PROVIDES this...? ===&lt;br /&gt;
&lt;br /&gt;
There are two namespaces that bitbake concerns itself with - recipe names (a.k.a. build time targets) and package names (a.k.a. runtime targets). You can specify a build time target on the bitbake command line, but not a runtime target; you need to find the recipe that provides the package you are trying to build and build that instead (or simply add that package to your image and build the image). In current versions bitbake will at least tell you which recipes have matching or similar-sounding runtime provides (RPROVIDES) so that you&#039;ll usually get a hint on which recipe you need to build.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;ve included a package in my image but files I expect to be there are missing, what&#039;s the issue? ===&lt;br /&gt;
&lt;br /&gt;
Check the simple stuff: verify that the package is really in the image - look at the manifest file next to the image to ensure the package is listed. Also if you&#039;re flashing the image, double-check that you did indeed flash the right image and if there are multiple partitions / storage devices on your board or device that you&#039;re booting the one that you think you are.&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re sure of the above, it may be a matter of the package splitting - a lot of recipes split less commonly used components out to separate packages, so it&#039;s possible that the files you are looking for are in a different package. You can look at the recipe for this (look for PACKAGES and FILES statements) or assuming the recipe has been built, you can use &amp;lt;code&amp;gt;oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;oe-pkgdata-util list-pkg-files&amp;lt;/code&amp;gt; to inspect the packages provided by the recipe and the files they contain. Once you find the right package you can add it to your image.&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m required to set LIC_FILES_CHKSUM but the software I&#039;m building doesn&#039;t have a license statement, what do I do? ===&lt;br /&gt;
&lt;br /&gt;
Ideally, all software should come with some kind of license statement so that the terms of distribution are clearly stated (especially if its source code is made publicly available); if not a text file describing the license then at the very least a line or two in the accompanying documentation, README file or source header comments. Assuming there is a license statement somewhere but not in a form you can point to with LIC_FILES_CHKSUM as part of the source tree, you can point LIC_FILES_CHKSUM to one of the generic license files in ${COMMON_LICENSE_DIR} (meta/files/common-licenses/), or alternatively you can include a file containing the license statement in a &amp;quot;files&amp;quot; subdirectory next to the recipe (or subdirectory named the same as the recipe - see how such files are handled in other recipes), point to it in SRC_URI using file://, then add it to LIC_FILES_CHKSUM. It is worth noting however that LIC_FILES_CHKSUM is intended to give you a warning if upstream changes its license terms when you do an upgrade of the recipe, and by pointing it to this common license file that is part of the metadata, that mechanism will not function. You may wish to consider encouraging the upstream provider of the software your recipe is building to follow best practices and include a proper license statement, so that you can point to it in a future version. At minimum if you do use such workarounds, you will need to take extra care when upgrading the recipe in future in case the upstream provider changes the license terms.&lt;br /&gt;
&lt;br /&gt;
If there really is no license stated at all anywhere for the software (and this is unfortunately not uncommon on github, for example) then you should really contact upstream - if there&#039;s no license, then technically you really shouldn&#039;t be distributing it until that&#039;s clarified with the original author(s).&lt;br /&gt;
&lt;br /&gt;
=== I am getting a package QA error / warning when building a recipe, how do I solve it? ===&lt;br /&gt;
&lt;br /&gt;
There are some general and specific recommendations in the [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#qa-errors-and-warnings QA Errors and Warnings] section of the Yocto Project Reference Manual.&lt;br /&gt;
&lt;br /&gt;
=== I am getting &amp;quot;taskhash mismatch&amp;quot; errors, what does this mean and how do I fix it? ===&lt;br /&gt;
&lt;br /&gt;
Bitbake parses the metadata (recipes, classes and configuration) repeatedly during its operation, and this error means that the result of parsing changed between one parse and the next. Two situations that can cause this:&lt;br /&gt;
# One of the parsed files changed in between e.g. you edited a recipe or performed a git operation (e.g. git checkout) during the build. &#039;&#039;&#039;Do not make changes to the metadata while a build is running.&#039;&#039;&#039; If you run the build again the error should not recur.&lt;br /&gt;
# Alternatively, there is something in the metadata that results in a variable expanding to a different value each time it is parsed. This is often something time-related e.g. a timestamp which is calculated every time an expression is expanded. The solution is to ensure the value is calculated once per build and then the expression expands to the same value for the duration of the build.&lt;br /&gt;
&lt;br /&gt;
=== Building on a system with a GRSec kernel doesn&#039;t work well, is that supported? ===&lt;br /&gt;
&lt;br /&gt;
No, grsec isn&#039;t really supported. The list of distros that are supported (tested) is in the Yocto mega manual for each release.&lt;br /&gt;
You can refer to the work-around given in this defect: https://bugzilla.yoctoproject.org/show_bug.cgi?id=10885&lt;br /&gt;
&lt;br /&gt;
=== Working around Firejail ===&lt;br /&gt;
For users of Parrot OS and other secured Linux distros, you will find that your bitbake fetch commands refuse to work, yet you can manually run wget and retrieve the packages with no problem.  This is due to Poky creating links to all the tools it requires, in particular &#039;wget&#039;, &#039;ssh&#039; and &#039;strings&#039;, using the links to these tools in the /usr/local/bin/ directory which all redirect to firejail.  To fix the problem you can cd into &amp;lt;your Yocto install directory&amp;gt;/poky/build/tmp/hosttools directory and replace these links with ones redirecting to the actual executables under the /usr/bin directory.&lt;br /&gt;
&lt;br /&gt;
== Dependencies ==&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is being built? ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;bitbake -g &amp;amp;lt;recipe&amp;amp;gt;&amp;lt;/code&amp;gt; will produce some .dot files that allow you to see the dependency relationships - usually pn-depends.dot holds the answers although sometimes you may need to look at task-depends.dot if the dependency is only in the form of a task dependency. Note that these graphs are much too large for most graphviz visualisation tools to process, so you&#039;ll probably find it&#039;s easiest to view them with &amp;quot;less&amp;quot; or a text editor and search for the item you&#039;re looking for.&lt;br /&gt;
&lt;br /&gt;
=== How do I find out why something is in my image? ===&lt;br /&gt;
&lt;br /&gt;
Enable the buildhistory class and build the image again, and it will write out a depends.dot file containing the relationships between packages in the final image. If the package name isn&#039;t mentioned it is probably explicitly mentioned in IMAGE_INSTALL or being brought in via IMAGE_FEATURES.&lt;br /&gt;
&lt;br /&gt;
See [http://www.yoctoproject.org/docs/current/ref-manual/ref-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] in the Yocto Project Reference manual which covers how to enable buildhistory and the output it produces.&lt;br /&gt;
&lt;br /&gt;
=== How do I view the .dot files produced by bitbake -g or buildhistory? ===&lt;br /&gt;
&lt;br /&gt;
The size of some of these .dot graphs (particularly those produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt;) is a little large for most viewers / processing tools, and unfortunately this isn&#039;t something that can be fixed - it&#039;s just the nature of the dependency relationships between targets and tasks within OpenEmbedded. Usually if you&#039;re just after answering a simple dependency question you can figure it out by viewing it with &amp;lt;code&amp;gt;less&amp;lt;/code&amp;gt; and using its built-in search function (or alternatively your favourite text editor).&lt;br /&gt;
&lt;br /&gt;
You can try [http://github.com/jrfonseca/xdot.py xdot] which will work well for some of the graphs, but the task graph produced by &amp;lt;code&amp;gt;bitbake -g&amp;lt;/code&amp;gt; for something like an image in particular is likely to be too large to view within it.&lt;br /&gt;
&lt;br /&gt;
=== Why are all of these -native items being built when my host distro has some of these available? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s complicated. In some cases the software in question isn&#039;t widely packaged by common Linux distributions. In other cases we need to apply patches to the software, use a more up-to-date version than commonly packaged or build it with a particular configuration. In general it just helps us isolate ourselves from potential problems caused by differences in host Linux distributions. For the most part the time spent building the native tools that are definitely provided by the host distro are dwarfed by the time spent building things that definitely aren&#039;t provided, such as the C library for the target and the cross-compiling toolchain.&lt;br /&gt;
&lt;br /&gt;
=== I disabled runtime package management and yet it still seems to be building rpm/opkg, why? ===&lt;br /&gt;
&lt;br /&gt;
The build system always uses a package manager on the host to assemble images, because it is usually the best tool for this job. This is completely independent of whether the package manager is available in the target image - &amp;quot;package-management&amp;quot; being in IMAGE_FEATURES (possibly indirectly via EXTRA_IMAGE_FEATURES) controls whether the package manager is used at runtime i.e. whether it (and its associated package database) will be present in the target image.&lt;br /&gt;
&lt;br /&gt;
=== Why is opkg-native / opkg-utils being built when I don&#039;t have ipk packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
opkg-utils provides update-alternatives which is the default tool used to manage the alternatives system (for selecting between multiple providers of the same file, e.g. busybox and bash both provide /bin/sh).&lt;br /&gt;
&lt;br /&gt;
=== Why is rpm-native being built when I don&#039;t have rpm packaging enabled? ===&lt;br /&gt;
&lt;br /&gt;
rpm-native is needed for two things in the generic packaging code implemented in the package class: &lt;br /&gt;
&lt;br /&gt;
# Debug symbol splitting - rpm-native provides the debugedit tool which this code uses&lt;br /&gt;
# Per-file dependencies - although this was originally just feeding into rpm when rpm was being used, it also now gets verified by QA checks regardless of which packaging backend is in use.&lt;br /&gt;
&lt;br /&gt;
=== I see a recipe built, but building an image containing the corresponding package fails at do_rootfs because it can&#039;t find the package. How does this happen? ===&lt;br /&gt;
&lt;br /&gt;
(For ipk, the error is &amp;quot;Couldn&#039;t find anything to satisfy &#039;&amp;lt;package&amp;gt;&#039;&amp;quot;; for rpm it is &amp;quot;&amp;lt;package&amp;gt; not found in the base feeds (&amp;lt;architecture list&amp;gt;)&amp;quot;.)&lt;br /&gt;
&lt;br /&gt;
Usually this is because the recipe claimed to provide the specified package (via PACKAGES or PACKAGES_DYNAMIC) but it wasn&#039;t actually produced, possibly because it ended up empty (since by default empty packages aren&#039;t produced), but the image or some other package still has a dependency that pulls in the specified package. If this is a recipe you are writing yourself the probable cause is your recipe isn&#039;t installing any files and thus the main package for the recipe is empty. Fix do_install (or what do_install is already running, e.g. make install) such that files are installed into the correct location such that they can then subsequently be packaged, and then all should be well.&lt;br /&gt;
&lt;br /&gt;
In other situations the reference to the package in question is spurious and either it should be removed entirely or there&#039;s another package that should be used instead. For example, the avahi and dhcp recipes both have an empty main package since the client and server are split out into their own packages, and those are the ones you should be using instead (avahi-daemon, avahi-utils, dhcp-server, dhcp-client - there are other packages as well, please see [[#How_do_I_find_out_what_packages_are_produced_by_a_recipe.3F|How do I find out what packages are produced by a recipe?]].) You could argue that these recipes shouldn&#039;t claim to provide the main package, or they should have a main package that depends on all the other packages (as some other recipes do).&lt;br /&gt;
&lt;br /&gt;
=== X11 and various other items are being built but I&#039;m only building core-image-minimal that doesn&#039;t have X11 in it - why? ===&lt;br /&gt;
&lt;br /&gt;
This is where it helps to understand the difference between build-time dependencies and runtime dependencies - often, a recipe will require things at build time (for example tools that help the build process, or to satisfy optional dependencies) that it doesn&#039;t necessarily need at runtime. The default configuration includes &amp;quot;&amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt;&amp;quot; in &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt;, and thus anything that can optionally support X11 will have its X11 support enabled; however when it comes to actually producing the image there won&#039;t be any X11 packages included as long as there are no hard dependencies and there aren&#039;t any X11 packages explicitly requested. &lt;br /&gt;
&lt;br /&gt;
If you never intend to use X11, you can set your own &amp;lt;code&amp;gt;DISTRO_FEATURES&amp;lt;/code&amp;gt; value that excludes &amp;lt;code&amp;gt;x11&amp;lt;/code&amp;gt; (note lower case, as with all feature names) and then X11 support will be disabled at build time and these items won&#039;t even be built.&lt;br /&gt;
&lt;br /&gt;
=== How do I avoid the kernel itself being pulled into my image when installing kernel modules? ===&lt;br /&gt;
&lt;br /&gt;
By default, the kernel class sets a dependency on the kernel-base package (which kernel modules always depend on) onto kernel-image, which contains the actual kernel binary. If you don&#039;t want this, set the following either in your kernel recipe or at the configuration level:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_${KERNEL_PACKAGE_NAME}-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Note: for older releases (pre-2.5) do this instead:&lt;br /&gt;
&lt;br /&gt;
 RDEPENDS_kernel-base = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Misc ==&lt;br /&gt;
&lt;br /&gt;
=== How do I remove a value from a list variable? ===&lt;br /&gt;
&lt;br /&gt;
For variables that are expected to contain a space-separated list of items, BitBake supports a _remove operator to remove items from it. See [http://www.yoctoproject.org/docs/current/bitbake-user-manual/bitbake-user-manual.html#removing-override-style-syntax Removal (override style syntax)] in the BitBake user manual.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; the _remove operation is final - you cannot &amp;quot;undo&amp;quot; it with other operations elsewhere, thus you should really only make use of it in your distro / local configuration and not in layers that you expect others to re-use for different purposes (and therefore they may need to undo your changes). An alternative way to effectively remove an item is to set the list outright to include all the items minus the one you want to remove.&lt;br /&gt;
&lt;br /&gt;
=== How do I change how my recipe is built depending on what image I&#039;m building? ===&lt;br /&gt;
&lt;br /&gt;
The short answer is you cannot - the reason is that OpenEmbedded builds packages based on the overall configuration, and then the image only selects which of these packages should go into the final image. However, there are some solutions that do allow you to achieve the desired result:&lt;br /&gt;
&lt;br /&gt;
# Have separate packages for the two different versions. This could take the form of different recipes or you could do it within the same recipe. The two packages do have to have different names however; this may create problems if you have other packages that depend on the package.&lt;br /&gt;
# Use a postprocessing function within the image(s) - within the image recipe, define a shell or python function that makes the desired changes to the files in the image and add a call to it to ROOTFS_POSTPROCESS_COMMAND within the image recipe. Note that this may not be appropriate if you have runtime package management enabled since the postprocessing will only happen at image creation time and not if the package is installed later on at runtime - you may need to use a postinstall script instead in this case.&lt;br /&gt;
# Use a postinstall script (pkg_postinst_&amp;lt;package&amp;gt; function) within the recipe. In order to work, the postinstall script will need to be able to determine what to do when it&#039;s run - this may not be practical depending on what you&#039;re trying to achieve.&lt;br /&gt;
&lt;br /&gt;
=== Can I use a toolchain built by OE as the external toolchain? ===&lt;br /&gt;
&lt;br /&gt;
In general, this is not recommended and not something that is tested or directly supported out of the box. If you are wanting to do this solely as a means of speeding up the build, it is strongly suggested that you use shared state instead.&lt;br /&gt;
&lt;br /&gt;
There is a [http://layers.openembedded.org/layerindex/branch/master/layer/meta-sourcery/ meta-sourcery layer] available to enable support for the CodeSourcery toolchain, you may be able to use this as a template for bringing in an external toolchain however there are no guarantees.&lt;br /&gt;
&lt;br /&gt;
=== Why can&#039;t I run bitbake as root? ===&lt;br /&gt;
&lt;br /&gt;
If you try to run bitbake as root you may have noticed you get a sanity check failure that prevents the build from continuing. The reason we have this check is that it is very risky to run builds as root; if any build script mistakenly tries to install files to the root path (/) instead of where it is supposed to, you want it to fail immediately and not (in the worst case) overwrite files critical to your Linux system&#039;s operation e.g. under /bin or /etc. Thus, we do not support running the build as root. The only time root access is needed is (completely outside of a build) where the runqemu script uses sudo to set up TAP devices for networking.&lt;br /&gt;
&lt;br /&gt;
=== When I run bitbake -c devshell it looks like it&#039;s running as root! How is that possible? ===&lt;br /&gt;
&lt;br /&gt;
It&#039;s not running as the actual root user, it&#039;s just pretending for the benefit of programs that run under it (including your shell) that it is, via pseudo. This is important, because you normally want any owner/group/permission values that you set on files to be reflected in files that the recipe installs and packages and thus reflected in the final image - without this mechanism the actual build would have to run as root which would be very risky (see above). There are no actual elevated privileges through this mechanism however, so you need not be worried.&lt;br /&gt;
&lt;br /&gt;
=== Why does OE use pseudo? Why not use fakeroot / fakechroot instead? ===&lt;br /&gt;
&lt;br /&gt;
Splitting this up into two questions - we use pseudo (not to be confused with sudo!) because we want to be able to create images containing files have the correct permissions and ownership, e.g. files owned by root, without the user running the build system having to have that privilege. By using LD_PRELOAD to intercept function calls, pseudo creates an environment for programs running underneath it where it appears as if the running user has those privileges (and the results of any operations persist within the pseudo environment, i.e. you can write a file as root and it will appear to be owned by root while still running under pseudo). This allows us to run builds entirely as a normal user without needing extra privileges. Without pseudo we would require running the build system under sudo or as root - which would be ill-advised for things such as &amp;quot;make install&amp;quot; in case it happened to be broken and tried to write to / instead of somewhere under the work directory for the recipe; a broken recipe could easily end up destroying your system in that case.&lt;br /&gt;
&lt;br /&gt;
To answer the second part, why we use pseudo instead of fakeroot / fakechroot, see [https://github.com/wrpseudo/pseudo/wiki/WhyNotFakeroot WhyNotFakeroot on the pseudo wiki].&lt;br /&gt;
&lt;br /&gt;
=== How do I find out what packages are produced by a recipe? ===&lt;br /&gt;
&lt;br /&gt;
The Toaster web UI provides easy ways to query this.&lt;br /&gt;
&lt;br /&gt;
In the 1.8 (fido) release and newer you can use the following command, assuming the recipe has already been built:&lt;br /&gt;
&lt;br /&gt;
 oe-pkgdata-util list-pkgs -p &amp;amp;lt;recipename&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
Alternatively you can look in the &amp;quot;packages-split&amp;quot; subdirectory under the work directory for the recipe - each package produced by the recipe will have a subdirectory under that. If you&#039;re not sure how to find the work directory you can run the following command:&lt;br /&gt;
&lt;br /&gt;
 bitbake -e &amp;amp;lt;recipename&amp;amp;gt; | grep ^WORKDIR=&lt;br /&gt;
&lt;br /&gt;
Before a recipe gets built it is a bit trickier, since the system often doesn&#039;t know exactly which packages will be produced until do_package time; this is particularly true for recipes that package plugins or modules (e.g. kernel modules). You can get a reasonable idea though by looking at the value of PACKAGES (and PACKAGES_DYNAMIC for recipes that produce plugins).&lt;br /&gt;
&lt;br /&gt;
=== How do I find out which package contains a particular file (or python module)? ===&lt;br /&gt;
&lt;br /&gt;
oe-pkgdata-util has a find-path subcommand that will tell you exactly this. For example:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path /etc/network/interfaces&lt;br /&gt;
 init-ifupdown: /etc/network/interfaces&lt;br /&gt;
&lt;br /&gt;
Wildcards are allowed anywhere in the path (but you should enclose such expressions in quotes to avoid the shell itself attempting to expand the wildcard):&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/fstrim&amp;quot;&lt;br /&gt;
 util-linux-bash-completion: /usr/share/bash-completion/completions/fstrim&lt;br /&gt;
 util-linux-ptest: /usr/lib/util-linux/ptest/fstrim&lt;br /&gt;
 util-linux-dbg: /sbin/.debug/fstrim&lt;br /&gt;
 util-linux-fstrim: /sbin/fstrim&lt;br /&gt;
&lt;br /&gt;
As a specific example of where this can be useful, our Python packaging is a bit more granular than most typical distributions, allowing you to tune the contents of your image to just what you need. However, that does mean you may have trouble figuring out which package provides a particular module. oe-pkgdata-util find-path can also be used for this. For example, to find the package containing the &amp;quot;shutil&amp;quot; module, run this:&lt;br /&gt;
&lt;br /&gt;
 $ oe-pkgdata-util find-path &amp;quot;*/shutil.*&amp;quot;&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/shutil.py&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-2.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.opt-1.pyc&lt;br /&gt;
 python3-shell: /usr/lib/python3.5/__pycache__/shutil.cpython-35.pyc&lt;br /&gt;
&lt;br /&gt;
Thus the package you are looking for is python3-shell. (Note that you could use */shutil.py, but if the module you are looking for is written in C as some of them are, that won&#039;t match it.)&lt;br /&gt;
&lt;br /&gt;
=== I have a local source tree I want to build instead of the upstream source a recipe normally fetches, how do I do that? ===&lt;br /&gt;
&lt;br /&gt;
If it&#039;s for development purposes i.e. you have your own local source tree you want to work on and have built, then run:&lt;br /&gt;
&lt;br /&gt;
 devtool modify -n &amp;lt;recipename&amp;gt; path/to/sourcetree/&lt;br /&gt;
&lt;br /&gt;
Once you are done you can use &amp;lt;code&amp;gt;devtool finish&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;devtool reset&amp;lt;/code&amp;gt; (depending on the situation) to return to building the source specified in the recipe.&lt;br /&gt;
&lt;br /&gt;
Alternatively if it&#039;s more permanent, use the &amp;lt;code&amp;gt;externalsrc&amp;lt;/code&amp;gt; class - you can inherit this in the original recipe or a bbappend:&lt;br /&gt;
&lt;br /&gt;
 inherit externalsrc&lt;br /&gt;
 EXTERNALSRC = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you&#039;re going to use it across a number of recipes you can inherit it globally at the configuration level (perhaps via an inc file that you include/require there):&lt;br /&gt;
&lt;br /&gt;
 INHERIT += &amp;quot;externalsrc&amp;quot;&lt;br /&gt;
 EXTERNALSRC_pn-&amp;lt;recipename&amp;gt; = &amp;quot;/path/to/sources&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I specify the default shell? (e.g. bash instead of busybox) ===&lt;br /&gt;
&lt;br /&gt;
It depends what you mean. As far as which provides /bin/sh, this is controlled through the alternatives system, and by default bash has a higher priority than busybox, so simply installing bash into your image will automatically have /bin/sh link to bash rather than busybox.&lt;br /&gt;
&lt;br /&gt;
If you mean you want a user&#039;s login shell to be a specific shell, you&#039;ll need to modify /etc/passwd. One fairly easy way to achieve this is to use the extrausers class in your image recipe:&lt;br /&gt;
&lt;br /&gt;
 inherit extrausers&lt;br /&gt;
 EXTRA_USERS_PARAMS = &amp;quot;usermod -s /bin/bash &amp;lt;username&amp;gt;; &amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== How do I get &amp;quot;full&amp;quot; versions of typical shell commands? ===&lt;br /&gt;
&lt;br /&gt;
Most of the shell commands in our images are provided by busybox by default, and are very much simplified compared to what you would have on a typical Linux system in order to save space. If you need the full versions, most of them are built and packaged by the coreutils recipe (for disk and other typical utilities) and procps (for ps, etc). You may also want to install bash for more typical shell built-in commands. There is also a core-image-full-cmdline image if you want a base image that is already set up to provide a more typical Linux command-line experience. (Note: these will of course use up more disk space and memory.)&lt;br /&gt;
&lt;br /&gt;
=== How do I allow a variable&#039;s value through from the external environment? ===&lt;br /&gt;
&lt;br /&gt;
Add the variable&#039;s name to the BB_ENV_EXTRAWHITE &#039;&#039;in the external environment&#039;&#039; before running bitbake. Note that the oe-init-build-env script sets a default for this which you will want to preserve, so add to the default value rather than overwriting it.&lt;br /&gt;
&lt;br /&gt;
Alternatively if you just want to get the external value of a variable from python code within the metadata, you can use the BB_ORIGENV variable which itself contains a datastore of the original environment. For example to get the value of the DISPLAY variable from the environment within a python function you would do this:&lt;br /&gt;
&lt;br /&gt;
 display = d.getVar(&amp;quot;BB_ORIGENV&amp;quot;, False).getVar(&amp;quot;DISPLAY&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Note that you must specify &amp;quot;false&amp;quot; for the expand parameter when getting the BB_ORIGENV variable, because it&#039;s not a string and therefore cannot be expanded in the normal manner.&lt;br /&gt;
&lt;br /&gt;
=== Why is bitbake showing &amp;quot;AUTOINC&amp;quot; in the version for some recipes? ===&lt;br /&gt;
&lt;br /&gt;
Recipes where you see AUTOINC within the version in the console output during a build will be those that set &amp;lt;code&amp;gt;PV&amp;lt;/code&amp;gt; to include &amp;lt;code&amp;gt;&amp;quot;${SRCPV}&amp;quot;&amp;lt;/code&amp;gt; to get the SCM revision (e.g. the git hash) in the package version. In order to have the version increment properly, there needs to be a number in front of the revision which automatically increments each time the revision changes (assuming you have a PR server enabled), which is where AUTOINC comes in. During the build, AUTOINC is a stand-in for this auto-incrementing number, and later during &amp;lt;code&amp;gt;do_package&amp;lt;/code&amp;gt; it gets replaced with the real number so that the packages produced at the end have the full version number.&lt;br /&gt;
&lt;br /&gt;
=== Why are .so files in the -dev package instead of the main package for a recipe? ===&lt;br /&gt;
&lt;br /&gt;
In standard Unix library packaging, non-versioned .so symlinks (e.g. /usr/lib/libgd.so) are intended for development purposes only. At runtime, binaries should be linked to the major-versioned .so file/symlink e.g. /usr/lib/libgd.so.3. This (theoretically) allows multiple major versions of the same library as well as binaries that depend upon each of them to coexist on the same system. If the library is versioned but you have a binary that links to the unversioned .so file, it has almost certainly been linked incorrectly.&lt;br /&gt;
&lt;br /&gt;
Non-symlink .so files on the other hand are sometimes produced and are entirely legal - however these will be picked up in the -dev package in OpenEmbedded simply by virtue of their name, which is almost always not what you want. In this case you can do one of two things:&lt;br /&gt;
&lt;br /&gt;
# Fix the build of the library so it gets versioned. This may not always be appropriate, especially not for things like plugins.&lt;br /&gt;
# Set FILES_${PN}-dev within the recipe so that it does not include ${FILES_SOLIBSDEV}. If the software the recipe is building also produces symlink .so files you&#039;ll need to set FILES_${PN}-dev such that those do still get packaged in the -dev package though, or you&#039;ll get a package QA warning.&lt;br /&gt;
&lt;br /&gt;
=== Can I disable shared state? ===&lt;br /&gt;
&lt;br /&gt;
You cannot, no. Shared state (sstate) is an intrinsic part of staging files into the sysroot. It is possible to construct a recipe that bypasses sstate for some tasks (the kernel does this), however this is quite difficult and if not done properly will lead to many other problems.&lt;br /&gt;
&lt;br /&gt;
Almost always when you are having a problem with shared state the issue is either (a) you&#039;re adding/changing files in the sysroot directly (i.e. outside sstate control), or (b) what is being placed into the sysroot isn&#039;t relocatable due to hardcoded paths. The solution for (a) is do not do that - files should always be installed under &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; within &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; and then a subset of those are staged into the sysroot automatically. For (b) you need to fix or adapt the hardcoded path(s) - if the program reads (or can be made to read) each path from an environment variable, then you can use the &amp;lt;code&amp;gt;create_wrapper&amp;lt;/code&amp;gt; utility function to create a wrapper script that will set the path appropriately. Run &amp;lt;code&amp;gt;git grep create_wrapper&amp;lt;/code&amp;gt; in the &amp;lt;code&amp;gt;meta&amp;lt;/code&amp;gt; subdirectory to see examples.&lt;br /&gt;
&lt;br /&gt;
=== Files I installed into /opt or some other path never make it into the sysroot but I need them - how do I fix this? ===&lt;br /&gt;
&lt;br /&gt;
OpenEmbedded only stages a subset of files that are installed into &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt; by &amp;lt;code&amp;gt;do_install&amp;lt;/code&amp;gt; so that the sysroot doesn&#039;t fill up with unneeded files. You have two choices in this situation:&lt;br /&gt;
# install the files into a more standard location which is part of the subset, or &lt;br /&gt;
# adjust the subset to include the paths you are installing to.&lt;br /&gt;
Usually option 1 is recommended. If you really do need to adjust the subset, you can append the path (more specifically, the part below &amp;lt;code&amp;gt;${D}&amp;lt;/code&amp;gt;) to &amp;lt;code&amp;gt;SYSROOT_DIRS&amp;lt;/code&amp;gt; within your recipe. For example:&lt;br /&gt;
&lt;br /&gt;
 SYSROOT_DIRS += &amp;quot;/opt&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== I have some software which needs to build a binary that it then runs as part of its own build process, how do I make this work? ===&lt;br /&gt;
&lt;br /&gt;
Whilst it is possible to do this within a single recipe building for the target, it is tricky to do so because in that context everything is set up for cross-compiling for the target, and you would have to undo all of that to build host tools. The standard and much easier way of handling this is to create a native variant of the recipe using BBCLASSEXTEND and have your host tools built within that, and then have the target variant depend on the native variant. For example, assume your recipe were called xyz (xyz_1.1.bb), then you would include something like this in the recipe:&lt;br /&gt;
&lt;br /&gt;
 DEPENDS_append_class-target = &amp;quot; xyz-native&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 ...&lt;br /&gt;
 &lt;br /&gt;
 BBCLASSEXTEND += &amp;quot;native&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The host tools will then be built and installed into the sysroot in the native variant ready for when the target variant starts building. If the software you are building didn&#039;t intend for those tools to be installed outside of the build tree then you may need to patch the build process (e.g. the makefile) in order to install them and possibly also for the target side to find them in the sysroot. Additionally, for performance since you only need the tools in the native variant, you may also choose to disable building everything except those tools there - e.g. by using _native overrides for variables such as EXTRA_OECONF or functions such as do_configure.&lt;br /&gt;
&lt;br /&gt;
=== How do I fetch from two git repositories in the same recipe? ===&lt;br /&gt;
&lt;br /&gt;
By default, sources fetched from git within a recipe are unpacked into ${WORKDIR}/git, however that only works for a single repository. If you want to fetch from more than one, you need to change the path each repository is unpacked to. This is easy to do, just add &amp;lt;code&amp;gt;;destsuffix=&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; to the end of each URL in SRC_URI (replacing &amp;lt;code&amp;gt;&amp;amp;lt;subdir&amp;amp;gt;&amp;lt;/code&amp;gt; with the name of the subdirectory). You may then need to change S to match whichever of these you want to be considered the root of the source tree - or alternatively you can specify destsuffix such that repositories beyond the first go into a subdirectory under the default &amp;quot;git&amp;quot; subdirectory. For example, from the gst-libav recipe:&lt;br /&gt;
&lt;br /&gt;
 ...&lt;br /&gt;
 SRC_URI = &amp;quot; \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/gst-libav;branch=1.8;name=base \&lt;br /&gt;
     git://anongit.freedesktop.org/gstreamer/common;destsuffix=git/common;name=common \&lt;br /&gt;
     ...&lt;br /&gt;
     &amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
 S = &amp;quot;${WORKDIR}/git&amp;quot;&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
(Here we&#039;re using the default of &amp;quot;git&amp;quot; for the first repository, so we don&#039;t need to specify &amp;lt;code&amp;gt;destsuffix&amp;lt;/code&amp;gt; for the first URL.)&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m building a native recipe and I notice that the install path has the full path to the root directory repeated - why? ===&lt;br /&gt;
&lt;br /&gt;
It does look a little odd, but the reason for doing this is that native targets are meant to run on the system they&#039;re built on and run in the location they&#039;re installed to. This means they install to a destination of &amp;quot;/&amp;quot; and PREFIX is inside the native sysroot directory. We install them to a DESTDIR to allow us to manipulate them before they then get moved to a final DESTDIR of &amp;quot;/&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Most Makefiles handle this correctly by doing:&lt;br /&gt;
&lt;br /&gt;
 DESTDIR ?= &amp;quot;&amp;quot;&lt;br /&gt;
 prefix ?= &amp;quot;/usr&amp;quot;&lt;br /&gt;
 bindir ?= &amp;quot;$(prefix)/bin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
and then, importantly, install in the form:&lt;br /&gt;
&lt;br /&gt;
 install -d $(DESTDIR)$(bindir)&lt;br /&gt;
&lt;br /&gt;
so both prefix and DESTDIR are used. Whilst this is a convention, its a widely adopted and followed one. You can call into a custom makefile and set the variables manually if the makefile doesn&#039;t follow the convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do I generate static libraries? ===&lt;br /&gt;
&lt;br /&gt;
Its possible you have conf/distro/include/no-static-libs.inc included in your build - poky does this by default. The include list at the top of the bitbake -e output will tell you for certain.&lt;br /&gt;
&lt;br /&gt;
If so, you can remove that or set:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
as it would currently be set to this if that include file is included:&lt;br /&gt;
&lt;br /&gt;
 DISABLE_STATIC = &amp;quot; --disable-static&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Poky disables building static libraries by default as for the most part they&#039;re a waste of space/time.&lt;br /&gt;
&lt;br /&gt;
=== Can I conditionally inherit a class in a recipe? ===&lt;br /&gt;
&lt;br /&gt;
Yes, you can. What makes this possible is that the &amp;lt;code&amp;gt;inherit&amp;lt;/code&amp;gt; keyword will not complain if what comes after it expands to being empty, so you can use in-line python to do something like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
inherit ${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The above example will inherit the &amp;lt;code&amp;gt;perlnative&amp;lt;/code&amp;gt; class if &amp;quot;scripting&amp;quot; is in the value of the &amp;lt;code&amp;gt;PACKAGECONFIG&amp;lt;/code&amp;gt; variable, otherwise it will do nothing.&lt;br /&gt;
&lt;br /&gt;
You could of course put this into a variable if you prefer:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
SOMEVAR = &amp;quot;${@bb.utils.contains(&#039;PACKAGECONFIG&#039;, &#039;scripting&#039;, &#039;perlnative&#039;, &#039;&#039;, d)}&amp;quot;&lt;br /&gt;
inherit ${SOMEVAR}&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== How do I collect the source revisions fetched by each recipe? ===&lt;br /&gt;
&lt;br /&gt;
If you have recipes where &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; then you won&#039;t necessarily know exactly which revisions were built after the fact - it will be whatever was current at the time. You also might alternatively just want to get all of the revisions. Either way, to do this, enable buildhistory by setting the following in your local.conf:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
INHERIT += &amp;quot;buildhistory&amp;quot;&lt;br /&gt;
BUILDHISTORY_COMMIT = &amp;quot;1&amp;quot;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(The last line is not required with version 2.5 and onwards as it is the default, but will do no harm.)&lt;br /&gt;
&lt;br /&gt;
Once you have enabled buildhistory, you then need to build your image again so that buildhistory has a chance to record history data for it. Following that you can run &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; (with &amp;lt;code&amp;gt;-a&amp;lt;/code&amp;gt; if you want to see all revisions, not just the ones where AUTOREV was used) and it will output the revisions in a form you can use in a .inc file that you can &amp;lt;code&amp;gt;require&amp;lt;/code&amp;gt; from your configuration if you want to fix the build to those revisions.&lt;br /&gt;
&lt;br /&gt;
For more information see the [https://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#maintaining-build-output-quality Maintaining Build Output Quality] section of the Yocto Project Development manual, which covers the buildhistory class in detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I do an offline build with recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt; set? ===&lt;br /&gt;
&lt;br /&gt;
If you set &amp;lt;code&amp;gt;BB_NO_NETWORK = &amp;quot;1&amp;quot;&amp;lt;/code&amp;gt; and you have recipes that have &amp;lt;code&amp;gt;SRCREV = &amp;quot;${AUTOREV}&amp;quot;&amp;lt;/code&amp;gt;, you will get an error because the build system will try to check the latest revision on startup and be immediately blocked by &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt;. There are two ways to handle this:&lt;br /&gt;
&lt;br /&gt;
A) See the previous question &amp;quot;How do I collect the source revisions fetched by each recipe?&amp;quot; and use the output generated by &amp;lt;code&amp;gt;buildhistory-collect-srcrevs&amp;lt;/code&amp;gt; as a .inc file in your configuration in order to fix the revisions at the ones which were most recently built.&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
B) Set &amp;lt;code&amp;gt;BB_SRCREV_POLICY = &amp;quot;cache&amp;quot;&amp;lt;/code&amp;gt; in your configuration. This will use the last cached revision. (The disadvantage of this method is that it is a little more difficult to preserve or share with others the fixed revisions.)&lt;br /&gt;
&lt;br /&gt;
Note that in either case if you later want to build the latest version again, you will of course need to undo the configuration changes.&lt;br /&gt;
&lt;br /&gt;
=== Is it possible to append a bbclass file (like bbappends do for recipes)? ===&lt;br /&gt;
&lt;br /&gt;
No, see the next question for details.&lt;br /&gt;
&lt;br /&gt;
=== How do I override a bbclass file? ===&lt;br /&gt;
&lt;br /&gt;
This is tricky - bbclass files are found via BBPATH, which is added to by each layer.conf either by prepending or appending. Assuming you are putting your bbclass in a custom layer, you will probably want to have your layer&#039;s layer.conf prepend to BBPATH, but then you will also need to make sure that your layer does not appear before any other layer that is also prepending and overriding the same class.&lt;br /&gt;
&lt;br /&gt;
Another alternative is to have an additional class which makes the appropriate changes to the environment, and then you will need to inherit that class after (and in the same manner as) the original class. This is slightly cleaner but can be annoying to enable particularly if the class is inherited by a number of recipes, and won&#039;t work if you want to alter the behaviour of a class inherited by recipes you don&#039;t control. (If you want a class to be inherited for all images (i.e. all recipes inheriting the &amp;lt;code&amp;gt;image&amp;lt;/code&amp;gt; class) you can inject additional classes by setting IMAGE_CLASSES; similarly for the kernel there is KERNEL_CLASSES).&lt;br /&gt;
&lt;br /&gt;
Ultimately, overriding bbclass files is not good practice long term - you are opening yourself up to maintenance issues when the original class changes, and the override is fragile as hinted above. The best solution is to try to get whatever changes you need into the original class; this does of course require additional work and time though.&lt;br /&gt;
&lt;br /&gt;
=== There&#039;s a bbappend in a layer I&#039;m using that defines a &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; and I want to append to that function also, how do I do this? ===&lt;br /&gt;
&lt;br /&gt;
Simply create a bbappend in your layer and define your own &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, and your commands will be executed &#039;&#039;as well as&#039;&#039; those of the other bbappend.&lt;br /&gt;
&lt;br /&gt;
You might assume that defining &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt; will overwrite any previously defined &amp;lt;code&amp;gt;do_something:append()&amp;lt;/code&amp;gt;, as would be the case with &amp;lt;code&amp;gt;do_something()&amp;lt;/code&amp;gt; in the same situation, but that is not the case - the key is that &amp;lt;code&amp;gt;:append&amp;lt;/code&amp;gt; (and &amp;lt;code&amp;gt;:prepend&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;:remove&amp;lt;/code&amp;gt;, etc.) are &#039;&#039;operators&#039;&#039; and they will be applied in sequence, where that sequence is the order in which they are parsed (which for bbappends will be in ascending layer priority order).&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=YoctoProjectEvents&amp;diff=86142</id>
		<title>YoctoProjectEvents</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=YoctoProjectEvents&amp;diff=86142"/>
		<updated>2023-12-23T19:27:13Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Update past events and add project summit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Traditionally, the Linux Foundation organizes the Embedded Linux Conference -- one in North America (ELC) and one in Europe (ELCE). The Yocto Project often has a considerable presence at these events in the form of:&lt;br /&gt;
* talks submitted/presented about The Yocto Project, OpenEmbedded, and related technologies including a community BoF (Birds of a Feather) session&lt;br /&gt;
* a 1-day pre-event OpenEmbedded Developers Day (OEDAM [OpenEmbedded Developers Americas Meeting] for ELC and OEDEM [OpenEmbedded Developers European Meeting] for ELCE)&lt;br /&gt;
* a 1-day post-event DevDay&lt;br /&gt;
* a conference booth in the ELC/ELCE event hall, usually with demos&lt;br /&gt;
&lt;br /&gt;
The ELC/ELCE events are often co-located with other LF-related events such as: the Linux Security Summit, Zephyr Summit, KVM Forum, Open Source Summit, etc… Starting around 2019, in an effort to better align some of these events, the early Embedded Linux Conference started moving later in the year, closing the gap between the ELC event and the ELCE event towards the end of the year and expanding the gap between the ELCE event and the ELC event. As a result there has been efforts to add YP/OE-specific events earlier in the year in order to maintain the roughly 6-month gap between events.&lt;br /&gt;
&lt;br /&gt;
=== OE Developers Meeting ===&lt;br /&gt;
The OpenEmbedded Developers {Americas|European} Meeting is a 1-day event, organized by the OpenEmbedded members, for an informal, free-form round-table-style discussion of core issues of concern to core OE/YP developers, BSP maintainers, etc&lt;br /&gt;
&lt;br /&gt;
== Yocto Project Summit ==&lt;br /&gt;
The Yocto Project Summit is a multiple day event and includes workshops and a forum where the current and future use of the Yocto Project can be discussed.&lt;br /&gt;
&lt;br /&gt;
=== DevDay ===&lt;br /&gt;
DevDay was a 1-day training event consisting of multiple tracks:&lt;br /&gt;
* a full-day beginners tutorial to get newcomers up-to-speed on basic YP/OE usage&lt;br /&gt;
* hands-on classes based on narrow topics of a more specialized nature&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
Future events:&lt;br /&gt;
See also: https://www.yoctoproject.org/events/&lt;br /&gt;
&lt;br /&gt;
Past events:&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YoctoProject_Summit_yps2023.11 Yocto Project Summit 2023.11]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YoctoProject_Summit_yps2022.11 Yocto Project Summit 2022.11]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YoctoProject_Summit_yps2022.05 Yocto Project Summit yps2022.05]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YoctoProject_Summit_May2021 Yocto Project Summit May 2021]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YP_Summit_Europe_2020 Yocto Project Summit Europe 2020]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YP_DevDay_Austin_2020 DevDay Austin 2020]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/YP_Summit_Lyon_2019 Yocto Project Summit Lyon 2019]&lt;br /&gt;
* [https://www.socallinuxexpo.org/scale/17x/open-embedded-summit-0 OE Summit @ SCaLE 17x 2019]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/DevDay_San_Diego_2019 DevDay San Diego 2019]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/DevDay_Edinburgh_2018 DevDay Edinburgh 2018]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/DevDay_Portland_2018 DevDay Portland 2018]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/DevDay_Prague_2017 DevDay Prague 2017]&lt;br /&gt;
* [https://wiki.yoctoproject.org/wiki/DevDay_US_2017 DevDay US 2017]&lt;br /&gt;
&lt;br /&gt;
for a list of YP/OE-related talks at ELC/ELCE see:&lt;br /&gt;
* [https://elinux.org/Buildsystems https://elinux.org/Buildsystems]&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Glossary_of_Terms_and_Acronyms&amp;diff=86139</id>
		<title>Glossary of Terms and Acronyms</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Glossary_of_Terms_and_Acronyms&amp;diff=86139"/>
		<updated>2023-12-20T15:59:52Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Remove release information, there is a sep. page for this. I will link it instead where appropriate&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to Yocto Project [[Main Page]].&lt;br /&gt;
&lt;br /&gt;
== Terminology ==&lt;br /&gt;
Here is a list of basic terms users new to the Yocto Project might find helpful. For a more complete list of terms, see the &lt;br /&gt;
&amp;quot;[http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#yocto-project-terms Yocto Project Terms]&amp;quot; section in the Yocto Project Development Manual.&lt;br /&gt;
:&#039;&#039;&#039;Yocto Project&#039;&#039;&#039;: A Linux Foundation project that acts as an umbrella for various efforts to improve Embedded Linux.&lt;br /&gt;
: &#039;&#039;&#039;OpenEmbedded&#039;&#039;&#039;: The build system architecture promoted by the Yocto Project.&lt;br /&gt;
: &#039;&#039;&#039;BitBake&#039;&#039;&#039;: A tool that reads metadata and runs tasks.&lt;br /&gt;
: &#039;&#039;&#039;OpenEmbedded-Core&#039;&#039;&#039;: The common base set of metadata that BitBake uses. This metadata is shared between OpenEmbedded and the Yocto Project.&lt;br /&gt;
: &#039;&#039;&#039;Poky&#039;&#039;&#039;: A reference distribution used for test and release purposes by the Yocto Project.&lt;br /&gt;
: &#039;&#039;&#039;Recipe&#039;&#039;&#039;: Meta data defining how bitbake is to configure, build and package a software project.&lt;br /&gt;
: &#039;&#039;&#039;Layer&#039;&#039;&#039;: A collection of recipes and/or configuration used by bitbake. Typically each layer is organised around a specific theme, e.g. adding recipes for building web browser software.&lt;br /&gt;
&lt;br /&gt;
== Acronyms ==&lt;br /&gt;
:&#039;&#039;&#039;BSP&#039;&#039;&#039;	Board Support Package&lt;br /&gt;
: &#039;&#039;&#039;CCB&#039;&#039;&#039;	Change Control Board&lt;br /&gt;
: &#039;&#039;&#039;PMP&#039;&#039;&#039;	Program  Management Plan&lt;br /&gt;
: &#039;&#039;&#039;POR&#039;&#039;&#039;	Plan of Record&lt;br /&gt;
: &#039;&#039;&#039;PRD&#039;&#039;&#039;	Product Requirements Document&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Main_Page&amp;diff=86138</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Main_Page&amp;diff=86138"/>
		<updated>2023-12-20T15:49:38Z</updated>

		<summary type="html">&lt;p&gt;Simonew: Fix broken links, spelling&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Yocto Project Wiki! ==&lt;br /&gt;
The [http://yoctoproject.org Yocto Project] is an open-source project that delivers a set of tools that create operating system images for embedded Linux systems. The Yocto Project tools are based on the [http://www.openembedded.org/wiki/Main_Page OpenEmbedded] (OE) project, which uses the BitBake build tool, to construct complete Linux images. BitBake and OE are combined to form a reference build host known as Poky which includes the following [[Core Components|core components]]. This [https://www.youtube.com/watch?v=utZpKM7i5Z4 video] will help explain what it&#039;s all about.&lt;br /&gt;
&lt;br /&gt;
===Where to Start?===&lt;br /&gt;
If you&#039;re new to Yocto take a look at the &#039;&#039;&#039;[[Glossary]]&#039;&#039;&#039; so you&#039;re familiar with the terms used in this wiki and the project documentation. Then take a look at the [https://docs.yoctoproject.org/brief-yoctoprojectqs/index.html &#039;&#039;&#039;Quick Start Guide&#039;&#039;&#039;]. You can follow the steps in this document to clone the poky repository, quickly configure your build environment, and then try a build. Corporate firewalls can be problematic so network proxy configurations are detailed on the &#039;&#039;&#039;[[Working Behind a Network Proxy]]&#039;&#039;&#039; page. We advise you go straight for the [[Working_Behind_a_Network_Proxy#Option_2:_Chameleonsocks| Chameleonsocks option]].&lt;br /&gt;
&lt;br /&gt;
===Where to Next?===&lt;br /&gt;
Thanks to the quick start guide, it&#039;s pretty easy to get your first Linux image build and running. Here are some places to look for help when improving your Yocto skills.&lt;br /&gt;
* The [https://linuxfoundation.org Linux Foundation] have some great [https://docs.google.com/presentation/d/1LmI3mHoD_Dzl8wplIYcUBrFF8BzDb_EadTvfbnpSK7Q/edit training slides]. There is also an [https://docs.google.com/presentation/d/1HoDtyN5SzlmuTN47ab4Y7w_i6c_VEW6EBUD944ntf38/edit#slide advanced slide deck] for more experienced users. &lt;br /&gt;
* The first tool you&#039;ll need to get familiar with is &#039;&#039;&#039;bitbake&#039;&#039;&#039;, so reading through the [[https://docs.yoctoproject.org/dev/bitbake.htmluser manual] is recommended. You don&#039;t need to understand it all right now, but bookmark this page for reference. Implementation of bitake is covered in the [[Bitbake Internals Primer]] &lt;br /&gt;
* Once you start adding packages and configuring your image to create your own distribution, things can go wrong and it can hard to track down the root cause. There is no shortage of Yocto documentation resource, but if you&#039;re not exactly sure what you&#039;re looking for this &#039;&#039;&#039;[[Documentation Decoder]]&#039;&#039;&#039; will help you out. Also take a look at the [https://wiki.yoctoproject.org/wiki/Cookbook &#039;&#039;&#039;Cookbook&#039;&#039;&#039;] and [https://wiki.yoctoproject.org/wiki/Technical_FAQ troubleshooting guide]. Also [https://www.yoctoproject.org/community/learn/#books these books] are helpful. &lt;br /&gt;
* Some new tools such as [https://docs.yoctoproject.org/dev/toaster-manual/index.html Toaster], [[Extensible SDK]] and [https://github.com/crops CROPS] are making it easier to get the best out of Yocto on Windows and Mac OS X. Take a look at the new workflow in [[Developer Workflow Improvements]].&lt;br /&gt;
* There is also a [https://wiki.yoctoproject.org/wiki/TipsAndTricks &#039;&#039;&#039;Tips and Tricks&#039;&#039;&#039;] section where more experienced developers contribute to articles that will help those new to Yocto Project.&lt;br /&gt;
* You can also read and participate on the [https://lists.yoctoproject.org mailing lists] - start with the [https://lists.yoctoproject.org/g/yocto main list] first - and the IRC channel. More information about the Yocto Project mailing lists, IRC and Matrix channels can be found [https://www.yoctoproject.org/community/mailing-lists/ here].&lt;br /&gt;
&lt;br /&gt;
== Project planning ==&lt;br /&gt;
&lt;br /&gt;
=== Features === &lt;br /&gt;
* [[Yocto Feature Summary]] (Current and Next)&lt;br /&gt;
&lt;br /&gt;
=== Project Planning for current release  ===&lt;br /&gt;
&lt;br /&gt;
* [[Planning]]&lt;br /&gt;
&lt;br /&gt;
=== Project Status and Schedule ===&lt;br /&gt;
* [[Weekly_Status]]&lt;br /&gt;
* Testresults - https://git.yoctoproject.org/cgit/cgit.cgi/yocto-testresults-contrib/log/?h=intel-yocto-testresults&lt;br /&gt;
&lt;br /&gt;
=== Future Directions ===&lt;br /&gt;
* [[Future_Directions]]&lt;br /&gt;
&lt;br /&gt;
== Documentation ==&lt;br /&gt;
&lt;br /&gt;
* [[Documentation Decoder]]&lt;br /&gt;
&lt;br /&gt;
=== Improvement ideas ===&lt;br /&gt;
&lt;br /&gt;
* [[Documentation Production Workflow]]&lt;br /&gt;
&lt;br /&gt;
== Release Engineering ==&lt;br /&gt;
&lt;br /&gt;
* [[Yocto Release Engineering | Yocto Project Release Engineering]]&lt;br /&gt;
* [[Yocto Release Engineering | Release Activity (with status, version info, QA links, etc)]]&lt;br /&gt;
&lt;br /&gt;
== QA &amp;amp; Automation ==&lt;br /&gt;
&lt;br /&gt;
* [[The_Yocto_Autobuilder| The Yocto Project Autobuilder]]&lt;br /&gt;
* [[QA| Yocto Project QA Main Page]]&lt;br /&gt;
* [[QA/Archive| Yocto Project QA Test Report Archive ]]&lt;br /&gt;
&lt;br /&gt;
== Quick guide for newcomers ==&lt;br /&gt;
&lt;br /&gt;
If you are new to the project and are willing to contribute, please refer to our [[Newcomers|guide for newcomers]].&lt;br /&gt;
&lt;br /&gt;
== TSC ==&lt;br /&gt;
* Yocto Project Technical Steering Committee [[TSC]] &lt;br /&gt;
&lt;br /&gt;
== Wiki reference sitemap ==&lt;br /&gt;
* [[Glossary]]&lt;br /&gt;
* [[Working Behind a Network Proxy]]&lt;br /&gt;
* [[FAQ]] and [[Technical FAQ]]. These need to be unified.&lt;br /&gt;
* [[Cookbook]] and [[TipsAndTricks | Tips and Tricks]]. Need clear messaging on how these should be differentiated.&lt;br /&gt;
* [[Developer Workflow Improvements]], including [[Nodejs Workflow Improvements]]&lt;br /&gt;
* [[Bug_Triage | Bug Triage Reference ]]&lt;br /&gt;
* [[Planning and Governance]]&lt;br /&gt;
* [[Community Guidelines]]&lt;br /&gt;
* [[Yocto Release Engineering | Yocto Project Release Engineering]]&lt;br /&gt;
* [[License Infrastructure Interest Group | License Infrastructure]]&lt;br /&gt;
* [[Processes and Activities]]&lt;br /&gt;
* [[Member Technical Contacts]]&lt;br /&gt;
* [[Projects]]&lt;br /&gt;
* [[Security]] - find out what we do about CVEs and security&lt;br /&gt;
* [[Yocto Interest Groups]]&lt;br /&gt;
* [[Toaster]] - the web interface &lt;br /&gt;
* [[YoctoProjectEvents]] - links to YoctoProject/OpenEmbedded related conferences and events&lt;br /&gt;
* [[Archive]] - Graveyard for out of date articles.&lt;br /&gt;
&lt;br /&gt;
== Other resources ==&lt;br /&gt;
* [http://yoctoproject.org Yocto Project Front Page]&lt;br /&gt;
* [http://git.yoctoproject.org/ Yocto Project Git Source Repos]&lt;br /&gt;
* [https://docs.yoctoproject.org/ Yocto Project Documentation]&lt;br /&gt;
* [https://bugzilla.yoctoproject.org/ Yocto Project Bugzilla]&lt;br /&gt;
* [https://www.yoctoproject.org/tools-resources/community/mailing-lists Yocto Project Mailing Lists]&lt;br /&gt;
* [http://recipes.yoctoproject.org/rrs Yocto Project Recipe Reporting System]&lt;br /&gt;
* [https://autobuilder.yoctoproject.org/typhoon Yocto Project Autobuilder]&lt;br /&gt;
* [http://downloads.yoctoproject.org/releases/yocto/ Yocto Project Releases Downloads]&lt;br /&gt;
* [http://autobuilder.yoctoproject.org/pub/nightly/ Yocto Project Nightly Build Images]&lt;br /&gt;
* [http://downloads.yoctoproject.org/mirror/sources/ Upstream Sources Mirror]&lt;br /&gt;
* [http://www.openembedded.org/wiki/Main_Page OpenEmbedded Wiki]&lt;br /&gt;
* [http://cgit.openembedded.org/ OpenEmbedded Git Repos]&lt;br /&gt;
* [http://layers.openembedded.org/ OpenEmbedded Community Layers] &lt;br /&gt;
* [http://patchwork.openembedded.org/ OpenEmbedded Patch Tracking System]&lt;br /&gt;
* &#039;&#039;&#039;IRC&#039;&#039;&#039;: [https://libera.chat/ irc.libera.chat]&lt;br /&gt;
:* #yocto - Public discussions on the Yocto Project.&lt;br /&gt;
:* #oe - Public discussions on OpenEmbedded Core.&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=User:Simonew&amp;diff=86137</id>
		<title>User:Simonew</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=User:Simonew&amp;diff=86137"/>
		<updated>2023-12-20T15:33:15Z</updated>

		<summary type="html">&lt;p&gt;Simonew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I just started out to get involved upstream and want to use the opportunity - when I find stuff missing/outdated here - to add it directly.&lt;/div&gt;</summary>
		<author><name>Simonew</name></author>
	</entry>
</feed>