Release notes for Yocto-5.0.3 (Scarthgap)
Security Fixes in Yocto-5.0.3
- bind: Fix CVE-2024-0760, CVE-2024-1737, CVE-2024-1975 and CVE-2024-4076 
- busybox: Fix CVE-2023-42366, CVE-2023-42364, CVE-2023-42365, CVE-2021-42380 and CVE-2023-42363 
- cpio: Ignore CVE-2023-7216 
- curl: Fix CVE-2024-6197 
- ffmpeg: Fix CVE-2023-49502, CVE-2024-31578 and CVE-2024-31582 
- ghostscript: Fix CVE-2023-52722 
- go: Fix CVE-2024-24790 
- gstreamer1.0-plugins-base: Fix CVE-2024-4453 
- less: Fix CVE-2024-32487 
- libxml2: Fix CVE-2024-34459 
- libyaml: Ignore CVE-2024-35328 
- linux-yocto/6.6: Fix CVE-2024-23307, CVE-2024-24861, CVE-2024-26642, CVE-2024-26643, CVE-2024-26654, CVE-2024-26656 and CVE-2023-47233 
- linux-yocto/6.6: Ignore CVE-2019-25160, CVE-2019-25162, CVE-2020-36775, CVE-2020-36776, CVE-2020-36777, CVE-2020-36778, CVE-2020-36779, CVE-2020-36780, CVE-2020-36781, CVE-2020-36782, CVE-2020-36783, CVE-2020-36784, CVE-2020-36785, CVE-2020-36786, CVE-2020-36787, CVE-2021-46904, CVE-2021-46905, CVE-2021-46906, CVE-2021-46908, CVE-2021-46909, CVE-2021-46910, CVE-2021-46911, CVE-2021-46912, CVE-2021-46913, CVE-2021-46914, CVE-2021-46915, CVE-2021-46916, CVE-2021-46917, CVE-2021-46918, CVE-2021-46919, CVE-2021-46920, CVE-2021-46921, CVE-2021-46922, CVE-2021-46923, CVE-2021-46924, CVE-2021-46925, CVE-2021-46926, CVE-2021-46927, CVE-2021-46928, CVE-2021-46929, CVE-2021-46930, CVE-2021-46931, CVE-2021-46932, CVE-2021-46933, CVE-2021-46934, CVE-2021-46935, CVE-2021-46936, CVE-2021-46937, CVE-2021-46938, CVE-2021-46939, CVE-2021-46940, CVE-2021-46941, CVE-2021-46942, CVE-2021-46943, CVE-2021-46944, CVE-2021-46945, CVE-2021-46947, CVE-2021-46948, CVE-2021-46949, CVE-2021-46950, CVE-2021-46951, CVE-2021-46952, CVE-2021-46953, CVE-2021-46954, CVE-2021-46955, CVE-2021-46956, CVE-2021-46957, CVE-2021-46958, CVE-2021-46959, CVE-2021-46960, CVE-2021-46961, CVE-2021-46962, CVE-2021-46963, CVE-2021-46964, CVE-2021-46965, CVE-2021-46966, CVE-2021-46967, CVE-2021-46968, CVE-2021-46969, CVE-2021-46970, CVE-2021-46971, CVE-2021-46972, CVE-2021-46973, CVE-2021-46974, CVE-2021-46976, CVE-2021-46977, CVE-2021-46978, CVE-2021-46979, CVE-2021-46980, CVE-2021-46981, CVE-2021-46982, CVE-2021-46983, CVE-2021-46984, CVE-2021-46985, CVE-2021-46986, CVE-2021-46987, CVE-2021-46988, CVE-2021-46989, CVE-2021-46990, CVE-2021-46991, CVE-2021-46992, CVE-2021-46993, CVE-2021-46994, CVE-2021-46995, CVE-2021-46996, CVE-2021-46997, CVE-2021-46998, CVE-2021-46999, CVE-2021-47000, CVE-2021-47001, CVE-2021-47002, CVE-2021-47003, CVE-2021-47004, CVE-2021-47005, CVE-2021-47006, CVE-2021-47007, CVE-2021-47008, CVE-2021-47009, CVE-2021-47010, CVE-2021-47011, CVE-2021-47012, CVE-2021-47013, CVE-2021-47014, CVE-2021-47015, CVE-2021-47016, CVE-2021-47017, CVE-2021-47018, CVE-2021-47019, CVE-2021-47020, CVE-2021-47021, CVE-2021-47022, CVE-2021-47023, CVE-2021-47024, CVE-2021-47025, CVE-2021-47026, CVE-2021-47027, CVE-2021-47028, CVE-2021-47029, CVE-2021-47030, CVE-2021-47031, CVE-2021-47032, CVE-2021-47033, CVE-2021-47034, CVE-2021-47035, CVE-2021-47036, CVE-2021-47037, CVE-2021-47038, CVE-2021-47039, CVE-2021-47040, CVE-2021-47041, CVE-2021-47042, CVE-2021-47043, CVE-2021-47044, CVE-2021-47045, CVE-2021-47046, CVE-2021-47047, CVE-2021-47048, CVE-2021-47049, CVE-2021-47050, CVE-2021-47051, CVE-2021-47052, CVE-2021-47053, CVE-2021-47054, CVE-2021-47055, CVE-2021-47056, CVE-2021-47057, CVE-2021-47058, CVE-2021-47059, CVE-2021-47060, CVE-2021-47061, CVE-2021-47062, CVE-2021-47063, CVE-2021-47064, CVE-2021-47065, CVE-2021-47066, CVE-2021-47067, CVE-2021-47068, CVE-2021-47069, CVE-2021-47070, CVE-2021-47071, CVE-2021-47072, CVE-2021-47073, CVE-2021-47074, CVE-2021-47075, CVE-2021-47076, CVE-2021-47077, CVE-2021-47078, CVE-2021-47079, CVE-2021-47080, CVE-2021-47081, CVE-2021-47082, CVE-2021-47083, CVE-2021-47086, CVE-2021-47087, CVE-2021-47088, CVE-2021-47089, CVE-2021-47090, CVE-2021-47091, CVE-2021-47092, CVE-2021-47093, CVE-2021-47094, CVE-2021-47095, CVE-2021-47096, CVE-2021-47097, CVE-2021-47098, CVE-2021-47099, CVE-2021-47100, CVE-2021-47101, CVE-2021-47102, CVE-2021-47103, CVE-2021-47104, CVE-2021-47105, CVE-2021-47106, CVE-2021-47107, CVE-2021-47108, CVE-2021-47109, CVE-2021-47110, CVE-2021-47111, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47116, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47120, CVE-2021-47121, CVE-2021-47122, CVE-2021-47123, CVE-2021-47124, CVE-2021-47125, CVE-2021-47126, CVE-2021-47127, CVE-2021-47128, CVE-2021-47129, CVE-2021-47130, CVE-2021-47131, CVE-2021-47132, CVE-2021-47133, CVE-2021-47134, CVE-2021-47135, CVE-2021-47136, CVE-2021-47137, CVE-2021-47138, CVE-2021-47139, CVE-2021-47140, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47144, CVE-2021-47145, CVE-2021-47146, CVE-2021-47147, CVE-2021-47148, CVE-2021-47149, CVE-2021-47150, CVE-2021-47151, CVE-2021-47152, CVE-2021-47153, CVE-2021-47158, CVE-2021-47159, CVE-2021-47160, CVE-2021-47161, CVE-2021-47162, CVE-2021-47163, CVE-2021-47164, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47170, CVE-2021-47171, CVE-2021-47172, CVE-2021-47173, CVE-2021-47174, CVE-2021-47175, CVE-2021-47176, CVE-2021-47177, CVE-2021-47178, CVE-2021-47179, CVE-2021-47180, CVE-2022-48626, CVE-2022-48627, CVE-2022-48628, CVE-2022-48629 and CVE-2022-48630 
- linux-yocto/6.6 (cont.): Ignore CVE-2023-6270, CVE-2023-6356, CVE-2023-6536, CVE-2023-7042, CVE-2023-28746, CVE-2023-52465, CVE-2023-52467, CVE-2023-52468, CVE-2023-52469, CVE-2023-52470, CVE-2023-52471, CVE-2023-52472, CVE-2023-52473, CVE-2023-52474, CVE-2023-52475, CVE-2023-52476, CVE-2023-52477, CVE-2023-52478, CVE-2023-52479, CVE-2023-52480, CVE-2023-52481, CVE-2023-52482, CVE-2023-52483, CVE-2023-52484, CVE-2023-52486, CVE-2023-52487, CVE-2023-52488, CVE-2023-52489, CVE-2023-52490, CVE-2023-52491, CVE-2023-52492, CVE-2023-52493, CVE-2023-52494, CVE-2023-52495, CVE-2023-52497, CVE-2023-52498, CVE-2023-52499, CVE-2023-52500, CVE-2023-52501, CVE-2023-52502, CVE-2023-52503, CVE-2023-52504, CVE-2023-52505, CVE-2023-52506, CVE-2023-52507, CVE-2023-52508, CVE-2023-52509, CVE-2023-52510, CVE-2023-52511, CVE-2023-52512, CVE-2023-52513, CVE-2023-52515, CVE-2023-52516, CVE-2023-52517, CVE-2023-52518, CVE-2023-52519, CVE-2023-52520, CVE-2023-52522, CVE-2023-52523, CVE-2023-52524, CVE-2023-52525, CVE-2023-52526, CVE-2023-52527, CVE-2023-52528, CVE-2023-52529, CVE-2023-52530, CVE-2023-52531, CVE-2023-52532, CVE-2023-52559, CVE-2023-52560, CVE-2023-52561, CVE-2023-52562, CVE-2023-52563, CVE-2023-52564, CVE-2023-52565, CVE-2023-52566, CVE-2023-52567, CVE-2023-52568, CVE-2023-52569, CVE-2023-52570, CVE-2023-52571, CVE-2023-52572, CVE-2023-52573, CVE-2023-52574, CVE-2023-52575, CVE-2023-52576, CVE-2023-52577, CVE-2023-52578, CVE-2023-52580, CVE-2023-52581, CVE-2023-52582, CVE-2023-52583, CVE-2023-52584, CVE-2023-52587, CVE-2023-52588, CVE-2023-52589, CVE-2023-52591, CVE-2023-52593, CVE-2023-52594, CVE-2023-52595, CVE-2023-52596, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52600, CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52606, CVE-2023-52607, CVE-2023-52608, CVE-2023-52609, CVE-2023-52610, CVE-2023-52611, CVE-2023-52612, CVE-2023-52613, CVE-2023-52614, CVE-2023-52615, CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619, CVE-2023-52620, CVE-2023-52621, CVE-2023-52622, CVE-2023-52623, CVE-2023-52626, CVE-2023-52627, CVE-2023-52628, CVE-2023-52629, CVE-2023-52630, CVE-2023-52631, CVE-2023-52632, CVE-2023-52633, CVE-2023-52635, CVE-2023-52636, CVE-2023-52637, CVE-2023-52638, CVE-2023-52639, CVE-2023-52640, CVE-2023-52641, CVE-2024-0841, CVE-2024-22099, CVE-2024-23196, CVE-2024-26600, CVE-2024-26601, CVE-2024-26602, CVE-2024-26603, CVE-2024-26604, CVE-2024-26605, CVE-2024-26606, CVE-2024-26607, CVE-2024-26608, CVE-2024-26610, CVE-2024-26611, CVE-2024-26612, CVE-2024-26614, CVE-2024-26615, CVE-2024-26616, CVE-2024-26617, CVE-2024-26618, CVE-2024-26619, CVE-2024-26620, CVE-2024-26621, CVE-2024-26622, CVE-2024-26623, CVE-2024-26625, CVE-2024-26626, CVE-2024-26627, CVE-2024-26629, CVE-2024-26630, CVE-2024-26631, CVE-2024-26632, CVE-2024-26633, CVE-2024-26634, CVE-2024-26635, CVE-2024-26636, CVE-2024-26637, CVE-2024-26638, CVE-2024-26639, CVE-2024-26640, CVE-2024-26641, CVE-2024-26644, CVE-2024-26645, CVE-2024-26646, CVE-2024-26647, CVE-2024-26648, CVE-2024-26649, CVE-2024-26650, CVE-2024-26651, CVE-2024-26652, CVE-2024-26653, CVE-2024-26657, CVE-2024-26659, CVE-2024-26660, CVE-2024-26661, CVE-2024-26662, CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26666, CVE-2024-26667, CVE-2024-26668, CVE-2024-26669, CVE-2024-26670, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26675, CVE-2024-26676, CVE-2024-26677, CVE-2024-26678, CVE-2024-26679, CVE-2024-26680, CVE-2024-26681, CVE-2024-26682, CVE-2024-26683, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26690, CVE-2024-26691, CVE-2024-26692, CVE-2024-26693, CVE-2024-26694, CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698, CVE-2024-26700, CVE-2024-26702, CVE-2024-26703, CVE-2024-26704, CVE-2024-26705, CVE-2024-26706, CVE-2024-26707, CVE-2024-26708, CVE-2024-26709, CVE-2024-26710, CVE-2024-26711, CVE-2024-26712, CVE-2024-26713, CVE-2024-26714, CVE-2024-26715, CVE-2024-26716, CVE-2024-26717, CVE-2024-26718, CVE-2024-26719, CVE-2024-26720, CVE-2024-26721, CVE-2024-26722, CVE-2024-26723, CVE-2024-26724, CVE-2024-26725, CVE-2024-26726, CVE-2024-26727, CVE-2024-26728, CVE-2024-26729, CVE-2024-26730, CVE-2024-26731, CVE-2024-26732, CVE-2024-26733, CVE-2024-26734, CVE-2024-26735, CVE-2024-26736, CVE-2024-26737, CVE-2024-26738, CVE-2024-26739, CVE-2024-26740, CVE-2024-26741, CVE-2024-26742, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26746, CVE-2024-26747, CVE-2024-26748, CVE-2024-26749, CVE-2024-26750, CVE-2024-26751, CVE-2024-26752, CVE-2024-26753, CVE-2024-26754, CVE-2024-26755, CVE-2024-26759, CVE-2024-26760, CVE-2024-26761, CVE-2024-26762, CVE-2024-26763, CVE-2024-26764, CVE-2024-26765, CVE-2024-26766, CVE-2024-26767, CVE-2024-26768, CVE-2024-26769, CVE-2024-26770, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26780, CVE-2024-26781, CVE-2024-26782, CVE-2024-26783, CVE-2024-26786, CVE-2024-26787, CVE-2024-26788, CVE-2024-26789, CVE-2024-26790, CVE-2024-26791, CVE-2024-26792, CVE-2024-26793, CVE-2024-26794, CVE-2024-26795, CVE-2024-26796, CVE-2024-26798, CVE-2024-26799, CVE-2024-26800, CVE-2024-26801, CVE-2024-26802, CVE-2024-26803, CVE-2024-26804, CVE-2024-26805, CVE-2024-26807, CVE-2024-26808 and CVE-2024-26809 
- llvm: Fix CVE-2024-0151 
- ofono: Fix CVE-2023-2794 
- openssh: Fix CVE-2024-6387 and CVE-2024-39894 
- openssl: Fix CVE-2024-5535 
- pam: Fix CVE-2024-22365 
- python3-idna: Fix CVE-2024-3651 
- qemu: Fix CVE-2023-6683, CVE-2024-3446, CVE-2024-3447, CVE-2024-3567, CVE-2024-26327 and CVE-2024-26328 
- ruby: Fix CVE-2023-36617 and CVE-2024-27281 
- vte: Fix CVE-2024-37535 
- wget: Fix for CVE-2024-38428 
Fixes in Yocto-5.0.3
- apt-native: don’t let dpkg overwrite files by default 
- archiver.bbclass: Fix work-shared checking for kernel recipes 
- automake: mark new_rt_path_for_test-driver.patch as Inappropriate 
- bash: fix configure checks that fail with GCC 14.1 
- bind: upgrade to 9.18.28 
- binutils: stable 2.42 branch updates 
- bitbake: codeparser/data: Ensure module function contents changing is accounted for 
- bitbake: codeparser: Skip non-local functions for module dependencies 
- build-appliance-image: Update to scarthgap head revision 
- cargo: remove True option to getVar calls 
- classes/create-spdx-2.2: Fix SPDX Namespace Prefix 
- classes/kernel: No symlink in postinst without KERNEL_IMAGETYPE_SYMLINK 
- cmake-qemu.bbclass: fix if criterion 
- create-spdx-3.0/populate_sdk_base: Add SDK_CLASSES inherit mechanism to fix tarball SPDX manifests 
- create-spdx-‘*’: Support multilibs via SPDX_MULTILIB_SSTATE_ARCHS 
- curl: correct the PACKAGECONFIG for native/nativesdk 
- curl: locale-base-en-us isn’t glibc-specific 
- curl: skip FTP tests in run-ptest 
- cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX 
- cve-exclusion: Drop the version comparision/warning 
- devtool: ide-sdk: correct help typo 
- dnf: Fix missing leading whitespace with ‘:append’ 
- dpkg: mark patches adding custom non-debian architectures as inappropriate for upstream 
- ed: upgrade to 1.20.2 
- expect: fix configure with GCC 14 
- ffmpeg: backport patch to fix errors with GCC 14 
- ffmpeg: backport patches to use new Vulkan AV1 codec API 
- flac: fix buildpaths warnings 
- fribidi: upgrade to 1.0.14 
- gawk: Remove References to /usr/local/bin/gawk 
- gawk: update patch status 
- gettext: fix a parallel build issue 
- ghostscript: upgrade to 10.03.1 
- glib-networking: submit eagain.patch upstream 
- glibc: cleanup old cve status 
- glibc: stable 2.39 branch updates 
- glslang: mark 0001-generate-glslang-pkg-config.patch as Inappropriate 
- go: drop the old 1.4 bootstrap C version 
- go: upgrade to 1.22.5 
- gpgme: move gpgme-tool to own sub-package 
- grub,grub-efi: Remove -mfpmath=sse on x86 
- grub: mark grub-module-explicitly-keeps-symbole-.module_license.patch as a workaround 
- gstreamer1.0: skip another known flaky test 
- gstreamer: upgrade to 1.22.12 
- insane.bbclass: fix HOST_ variable names 
- insane.bbclass: remove leftover variables and comment 
- insane.bbclass: remove skipping of cross-compiled packages 
- insane: handle dangling symlinks in the libdir QA check 
- iptables: fix memory corruption when parsing nft rules 
- iptables: fix save/restore symlinks with libnftnl PACKAGECONFIG enabled 
- iptables: submit 0001-configure-Add-option-to-enable-disable-libnfnetlink.patch upstream 
- kexec-tools: submit 0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch upstream 
- layer.conf: Add os-release to SIGGEN_EXCLUDERECIPES_ABISAFE 
- libacpi: mark patches as inactive-upstream 
- libadwaita: upgrade to 1.5.1 
- libcap-ng-python: upgrade to 0.8.5 
- libcap-ng: upgrade to 0.8.5 
- libmnl: explicitly disable doxygen 
- libnl: change HOMEPAGE 
- libpam: fix runtime error in pam_pwhistory moudle 
- libpng: update SRC_URI 
- libportal: fix rare build race 
- libstd-rs: set CVE_PRODUCT to rust 
- libxcrypt: correct the check for a working libucontext.h 
- libxml2: upgrade to 2.12.8 
- linux-yocto-custom: Fix comment override syntax 
- linux-yocto/6.6: cfg: drop obselete options 
- linux-yocto/6.6: cfg: introduce Intel NPU fragment 
- linux-yocto/6.6: fix AMD boot trace 
- linux-yocto/6.6: fix kselftest failures 
- linux-yocto/6.6: intel configuration changes 
- linux-yocto/6.6: nft: enable veth 
- linux-yocto/6.6: update to v6.6.35 
- linux-yocto: Enable team net driver 
- linuxloader: add -armhf on arm only for TARGET_FPU ‘hard’ 
- llvm: upgrade to 18.1.6 
- maintainers.inc: update self e-mail address 
- maintainers: Drop go-native as recipe removed 
- mesa: Fix missing leading whitespace with ‘:append’ 
- mesa: remove obsolete 0001-meson.build-check-for-all-linux-host_os-combinations.patch 
- mesa: upgrade to 24.0.7 
- meson: don’t use deprecated pkgconfig variable 
- migration-guides: add release notes for 4.0.19 
- migration-guides: add release notes for 5.0.2 
- migration-notes: add release notes for 5.0.1 
- mmc-utils: fix URL 
- mobile-broadband-provider-info: upgrade to 20240407 
- multilib.bbclass: replace deprecated e.data with d 
- multilib.conf: remove appending to PKG_CONFIG_PATH 
- nasm: upgrade to 2.16.03 
- ncurses: switch to new mirror 
- oeqa/runtime/scp: requires openssh-sftp-server 
- oeqa/runtime: fix race-condition in minidebuginfo test 
- oeqa/runtime: fix regression in minidebuginfo test 
- oeqa/runtime: make minidebuginfo test work with coreutils 
- oeqa/sdk/case: Ensure DL_DIR is populated with artefacts if used 
- oeqa/sdk/case: Skip SDK test cases when TCLIBC is newlib 
- oeqa/selftest/devtool: Fix for usrmerge in DISTRO_FEATURES 
- oeqa/selftest/recipetool: Fix for usrmerge in DISTRO_FEATURES 
- openssh: drop rejected patch fixed in 8.6p1 release 
- openssh: systemd notification was implemented upstream 
- openssh: systemd sd-notify patch was rejected upstream 
- orc: upgrade to 0.4.39 
- package.py: Fix static debuginfo split 
- package.py: Fix static library processing 
- pcmanfm: Disable incompatible-pointer-types warning as error 
- perl: submit the rest of determinism.patch upstream 
- pixman: fixing inline failure with -Og 
- poky.conf: bump version for 5.0.3 
- populate_sdk_ext.bbclass: Fix undefined variable error 
- pseudo: Fix to work with glibc 2.40 
- pseudo: Update to include open symlink handling bugfix 
- pseudo: Update to pull in python 3.12+ fix 
- python3-attrs: drop python3-ctypes from RDEPENDS 
- python3-bcrypt: drop python3-six from RDEPENDS 
- python3-idna: upgrade to 3.7 
- python3-jinja2: upgrade to 3.1.4 
- python3-pyopenssl: drop python3-six from RDEPENDS 
- python3-requests: cleanup RDEPENDS 
- python3-setuptools: drop python3-2to3 from RDEPENDS 
- python3: Treat UID/GID overflow as failure 
- python3: skip test_concurrent_futures/test_deadlock 
- python3: skip test_multiprocessing/test_active_children test 
- python3: submit deterministic_imports.patch upstream as a ticket 
- python3: upgrade to 3.12.4 
- qemu: upgrade to 8.2.3 
- rng-tools: ignore incompatible-pointer-types errors for now 
- rt-tests: rt_bmark.py: fix TypeError 
- rust-cross-canadian: set CVE_PRODUCT to rust 
- rust: Add new varaible RUST_ENABLE_EXTRA_TOOLS 
- sanity: Check if tar is gnutar 
- sdk: Fix path length limit to match reserved size 
- selftest-hardlink: Add additional test cases 
- selftest/cases/runtime_test: Exclude centos-9 from virgl tests 
- selftest: add Upstream-Status to .patch files 
- settings-daemon: submit addsoundkeys.patch upstream and update to a revision that has it 
- systemd.bbclass: Clarify error message 
- tcp-wrappers: mark all patches as inactive-upstream 
- tzdata: Add tzdata.zi to tzdata-core package 
- vorbis: mark patch as Inactive-Upstream 
- vulkan-samples: fix do_compile error when -Og enabled 
- watchdog: Set watchdog_module in default config 
- webkitgtk: fix do_compile errors on beaglebone-yocto 
- webkitgtk: fix do_configure error on beaglebone-yocto 
- weston: upgrade to 13.0.1 
- wic/partition.py: Set hash_seed for empty ext partition 
- wic: bootimg-efi: fix error handling 
- wic: engine.py: use raw string for escape sequence 
- wireless-regdb: upgrade to 2024.05.08 
- xserver-xorg: upgrade to 21.1.13 
- xz: Update LICENSE variable for xz packages 
Known Issues in Yocto-5.0.3
- N/A 
Contributors to Yocto-5.0.3
- Adithya Balakumar 
- Aleksandar Nikolic 
- Alexander Kanavin 
- Antonin Godard 
- Archana Polampalli 
- Ashish Sharma 
- Benjamin Szőke 
- Bruce Ashfield 
- Changqing Li 
- Chen Qi 
- Christian Taedcke 
- Deepthi Hemraj 
- Denys Dmytriyenko 
- Dmitry Baryshkov 
- Emil Kronborg 
- Enrico Jörns 
- Etienne Cordonnier 
- Guðni Már Gilbert 
- Hitendra Prajapati 
- Jonas Gorski 
- Jookia 
- Jose Quaresma 
- Joshua Watt 
- Jörg Sommer 
- Kai Kang 
- Khem Raj 
- Kirill Yatsenko 
- Lee Chee Yang 
- Mark Hatle 
- Markus Volk 
- Martin Jansa 
- Michael Opdenacker 
- Mingli Yu 
- Niko Mauno 
- Patrick Wicki 
- Peter Marko 
- Quentin Schulz 
- Ranjitsinh Rathod 
- Richard Purdie 
- Robert Kovacsics 
- Ross Burton 
- Siddharth Doshi 
- Simone Weiß 
- Soumya Sambu 
- Steve Sakoman 
- Sundeep KOKKONDA 
- Trevor Gamblin 
- Vijay Anusuri 
- Wadim Egorov 
- Wang Mingyu 
- Xiangyu Chen 
- Yi Zhao 
- Yogita Urade 
- Zahir Hussain 
Repositories / Downloads for Yocto-5.0.3
poky
- Repository Location: https://git.yoctoproject.org/poky 
- Branch: scarthgap 
- Tag: yocto-5.0.3 
- Git Revision: 0b37512fb4b231cc106768e2a7328431009b3b70 
- Release Artefact: poky-0b37512fb4b231cc106768e2a7328431009b3b70 
- sha: b37fe0b2f6a685ee94b4af55f896cbf52ba69023e10eb21d3e54798ca21ace79 
- Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/poky-0b37512fb4b231cc106768e2a7328431009b3b70.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/poky-0b37512fb4b231cc106768e2a7328431009b3b70.tar.bz2 
openembedded-core
- Repository Location: https://git.openembedded.org/openembedded-core 
- Branch: scarthgap 
- Tag: yocto-5.0.3 
- Git Revision: 236ac1b43308df722a78d3aa20aef065dfae5b2b 
- Release Artefact: oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b 
- sha: 44b89feba9563c2281c8c2f45037dd7c312fb20e8b7d9289b25f0ea0fe1fc2c4 
- Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/oecore-236ac1b43308df722a78d3aa20aef065dfae5b2b.tar.bz2 
meta-mingw
- Repository Location: https://git.yoctoproject.org/meta-mingw 
- Branch: scarthgap 
- Tag: yocto-5.0.3 
- Git Revision: acbba477893ef87388effc4679b7f40ee49fc852 
- Release Artefact: meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852 
- sha: 3b7c2f475dad5130bace652b150367f587d44b391218b1364a8bbc430b48c54c 
- Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/meta-mingw-acbba477893ef87388effc4679b7f40ee49fc852.tar.bz2 
bitbake
- Repository Location: https://git.openembedded.org/bitbake 
- Branch: 2.8 
- Tag: yocto-5.0.3 
- Git Revision: 11d83170922a2c6b9db1f6e8c23e533526984b2c 
- Release Artefact: bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c 
- sha: 9643433748d7ed80d6334124390271929566b3bc076dad0f6e6be1ec6d753b8d 
- Download Locations: http://downloads.yoctoproject.org/releases/yocto/yocto-5.0.3/bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c.tar.bz2 http://mirrors.kernel.org/yocto/yocto/yocto-5.0.3/bitbake-11d83170922a2c6b9db1f6e8c23e533526984b2c.tar.bz2 
yocto-docs
- Repository Location: https://git.yoctoproject.org/yocto-docs 
- Branch: scarthgap 
- Tag: yocto-5.0.3 
- Git Revision: TBD