Hi

We are pleased to announce the Yocto Project 3.1.30 (dunfell-23.0.30) Release 
is now available for download.

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/poky-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/poky-dunfell-23.0.30.tar.bz2

A gpg signed version of these release notes is available at:

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/RELEASENOTES

Full Test Report:

http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/testreport.txt

Thank you for everyone's contributions to this release.

Chee Yang Lee chee.yang....@intel.com<mailto:chee.yang....@intel.com>
Yocto Project Build and Release


- --------------------------
yocto-3.1.30 Release Notes
- --------------------------


- --------------------------
Repositories/Downloads
- --------------------------

Repository Name: poky
Repository Location: https://git.yoctoproject.org/git/poky
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: dbe19706ec01c1eaa1d377a792e7d825054050b0
Release Artefact: poky-dunfell-23.0.30
sha: 0cd2eb3293a90f3e0cf52c301e7688b4eeb22b0d9c19f4ed9abb53096e101122
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/poky-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/poky-dunfell-23.0.30.tar.bz2

Repository Name: openembedded-core
Repository Location: https://git.openembedded.org/openembedded-core
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: 55157aa2f8b157b1cc63e1134d9eba6db0cf16da
Release Artefact: oecore-dunfell-23.0.30
sha: 2e2726c5dee392cd80a66bd5a9aeebd837b6427c8d6b4759a53e8cb501aef0a6
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/oecore-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/oecore-dunfell-23.0.30.tar.bz2

Repository Name: meta-mingw
Repository Location: https://git.yoctoproject.org/git/meta-mingw
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: 7bdc58e6c5d1054b1b6ad5c4e480a95e995ccbae
Release Artefact: meta-mingw-dunfell-23.0.30
sha: 539a4db558f0261bba1615905285553209af0781a3b01dd134b762a3248204dd
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/meta-mingw-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/meta-mingw-dunfell-23.0.30.tar.bz2

Repository Name: meta-gplv2
Repository Location: https://git.yoctoproject.org/git/meta-gplv2
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: 60b251c25ba87e946a0ca4cdc8d17b1cb09292ac
Release Artefact: meta-gplv2-dunfell-23.0.30
sha: 9656e83a09da96234abc7ce46a79e2ded5506000414d01304368efbf67589e43
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/meta-gplv2-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/meta-gplv2-dunfell-23.0.30.tar.bz2

Repository Name: bitbake
Repository Location: https://git.openembedded.org/bitbake
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: c0d60794a32e3f8bbfbbd6800d87ef2782aacf2c
Release Artefact: bitbake-dunfell-23.0.30
sha: e2a8e74d9638c727af33ecf7d3a865adf3826d5c1cd7e12eb6ac8f164a820671
Download Locations:
http://downloads.yoctoproject.org/releases/yocto/yocto-3.1.30/bitbake-dunfell-23.0.30.tar.bz2
http://mirrors.kernel.org/yocto/yocto/yocto-3.1.30/bitbake-dunfell-23.0.30.tar.bz2

Repository Name: yocto-docs
Repository Location: https://git.yoctoproject.org/git/yocto-docs
Branch: dunfell
Tag: yocto-3.1.30
Git Revision: 2bf8c79006a7ea17f123f585b32cf8fedaea9bb5


- ---------------
Known Issues
- ---------------
N/A


- ---------------
Security Fixes
- ---------------
avahi: Fix CVE-2023-1981 CVE-2023-38469 CVE-2023-38470 CVE-2023-38471 
CVE-2023-38472 CVE-2023-38473
bind: Fix CVE-2023-3341
binutils: Fix CVE-2021-46174 CVE-2022-47696
curl: Fix CVE-2023-28321 CVE-2023-28322
epiphany: Fix CVE-2022-29536
glibc: Ignore CVE-2023-4527
grub: Fix CVE-2023-4692 CVE-2023-4693
kexec-tools: Ignore CVE-2021-20269
libsndfile: Fix CVE-2022-33065
libwebp: Fix CVE-2023-4863
libx11: Fix CVE-2023-43785 CVE-2023-43786 CVE-2023-43787
linux-yocto: Ignore CVE-2021-44879 CVE-2023-1193 CVE-2023-5090 CVE-2023-5158 
CVE-2023-5178 CVE-2023-5633 CVE-2023-5717 CVE-2023-6111 CVE-2023-6176 
CVE-2023-31085 CVE-2023-34324 CVE-2023-35827 CVE-2023-39191 CVE-2023-39197 
CVE-2023-40791 CVE-2023-42754 CVE-2023-45863 CVE-2023-45898 CVE-2023-46813
mdadm: Fix CVE-2023-28938
python3-setuptools: Fix CVE-2022-40897
qemu: Ignore CVE-2021-20295 CVE-2023-2680
qemu: Revert "qemu: Backport fix for CVE-2023-0330" ( revert only the follow-up 
fix for CVE-2023-0330)
shadow: Fix CVE-2023-29383
tiff: Fix CVE-2022-40090 CVE-2023-3576 CVE-2023-40745 CVE-2023-41175
vim: Fix CVE-2023-46246 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 
CVE-2023-48234 CVE-2023-48235 CVE-2023-48236 CVE-2023-48237
wayland: Fix CVE-2021-3782
xserver-xorg: Fix CVE-2023-5367 CVE-2023-5380
zlib: Fix CVE-2023-45853


- ---------------
Fixes
- ---------------
assimp: Explicitly use nobranch=1 in SRC_URI
bitbake: Fix disk space monitoring on cephfs
bitbake: siggen: use correct umask when writing siginfo
bitbake: utils: add umask changing context manager
build-appliance-image: Update to dunfell head revision
cve-check: don't warn if a patch is remote
cve-check: slightly more verbose warning when adding the same package twice
cve-check: sort the package list in the JSON report
documentation: update for 3.1.30
linux-yocto-rt/5.4: fix buld failure
linux-yocto/5.4: update to v5.4.262
lz4: Update sstate/equiv versions to clean cache
lz4: use CFLAGS from bitbake
poky.conf: bump version for 3.1.30
resolvconf: Fix fetch error
selftest: skip virgl test on all fedora
vim: Improve locale handling
vim: update obsolete comment
vim: Upgrade to 9.0.2130
vim: use upstream generated .po files


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#61998): https://lists.yoctoproject.org/g/yocto/message/61998
Mute This Topic: https://lists.yoctoproject.org/mt/103281430/21656
Group Owner: yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to