FX Dept. UNIX & FX System Div.
Fujitsu Limited
- Yocto: 5.2
- Kernel: 6.6.66
- Toolchain
- GCC: 14.2.0
- Binutils: 2.43.1
- glibc: 2.40
- GDB: 15.2
- License Files Format: SPDX 2.3
- x86 (64bit, 32bit Mulitlib)
- Armv8 (64bit EL, 32bit Mulitlib)
- NXP FRWY-LS1046A
- NXP Layerscape LS1088A-RDB
- NXP Layerscape LX2160A-RDB
- Lenovo QiTian M4550 (Processor: Core i5-4570)
- Ubuntu 24.04 LTS (64bit)
- NXP Layerscape SDK v21.08 (U-Boot v2021.04)
Following security issues have been fixed from ubinux-2024.12.
smarty:
- CVE-2018-25047
- CVE-2020-10375
- CVE-2021-21408
- CVE-2021-29454
- CVE-2022-29221
- CVE-2023-28447
libsndfile1:
- CVE-2024-50612
qemu:
- CVE-2024-6505
ubinux-kernel:
- CVE-2023-52920
- libdex
- libpanel
- xxhash
- giflib
- openjdk-8
- python3-iniparse
Run as root privilege the Toolchain installer at arbitrary directory, and Toolchain will be installed into /opt/ubinux/2025.01 directory.
[TYPE1] in the description, please read as shown below.
CPU | [TYPE1] |
---|---|
x86 (64bit) | core2-64-ubinux-x86-64 |
Armv8 (32bit EL, 64bit EL) | aarch64-ubinux-armv8 |
$ sudo sh ubinux-glibc-x86_64-meta-toolchain-[TYPE1]-toolchain-2025.01.sh
Run the following commands.
[TYPE2] in the description, please read as shown below.
CPU | [TYPE2] |
---|---|
x86 (64bit) | core2-64-ubinux-linux |
Armv8 (64bit EL) | aarch64-ubinux-linux |
Armv8 (32bit EL) | armv7ahf-neon-ubinuxmllib32-linux-gnueabi |
$ . /opt/ubinux/2025.01/environment-setup-[TYPE2]
To create rootfs, see Section 3.1.2 and 3.1.3 of the dnf-plugin-tui documentation.
https://github.com/ubinux/dnf-plugin-tui/blob/dc41277946edbca76e375a72e4c0babd38d71d35/README.md#312-initialize
Enable some kernel configs to use following features.
- systemd
- CONFIG_CGROUPS
- CONFIG_FHANDLE
- Booting with UEFI
- CONFIG_EFI_STUB
- Display Console in some environments (x86_64 only)
- CONFIG_DRM_FBDEV_EMULATION
N/A
N/A
The following objects are not validated because the hardware of the test environment does not support them:
- ipmi
- tcsd
- edac-util
- mdadm
- smartd
- hostapd
- ipmi
- resizecons
- lm_sensors
- cpufreq-aperf
- busybox devmem
- busybox setkeycodes
- cransh-cross-canadian
- mdadm
- dool
- tiptop
The following security issues were known in this release:
db:
- CVE-2016-0682
- CVE-2016-0689
- CVE-2016-0692
- CVE-2016-0694
- CVE-2016-3418
dovecot:
- CVE-2022-30550
glibc:
- CVE-2010-4756
hdf5:
- CVE-2018-17433
- CVE-2018-17436
- CVE-2019-8396
- CVE-2020-10809
- CVE-2020-10812
libmemcached:
- CVE-2023-27478
libsndfile1:
- CVE-2024-50613
libuser:
- CVE-2012-5644
libvirt:
- CVE-2023-3750
- CVE-2024-8235
opensc:
- CVE-2024-45615
- CVE-2024-45616
- CVE-2024-45617
- CVE-2024-45618
- CVE-2024-45619
- CVE-2024-45620
- CVE-2024-8443
openvswitch:
- CVE-2019-25076
php:
- CVE-2024-11233
- CVE-2024-11234
- CVE-2024-11236
polkit:
- CVE-2016-2568
procmail:
- CVE-2014-3618
- CVE-2017-16844
qemu:
- CVE-2023-1386
- CVE-2024-8354
qtbase:
- CVE-2023-43114
- CVE-2023-51714
- CVE-2024-39936
rpm:
- CVE-2021-35937
samba:
- CVE-2018-14628
- CVE-2021-3670
- CVE-2022-1615
- CVE-2022-32743
- CVE-2022-38023
- CVE-2023-37369
strace:
- CVE-2000-0006
sysstat:
- CVE-2022-39377
tiff:
- CVE-2023-1916
tigervnc:
- CVE-2014-8241
- CVE-2023-6377
- CVE-2023-6478
ubinux-kernel:
- CVE-1999-0524
- CVE-1999-0656
- CVE-2007-4998
- CVE-2008-4609
- CVE-2010-4563
- CVE-2019-14899
- CVE-2020-35501
- CVE-2021-3714
- CVE-2021-3847
- CVE-2021-3864
- CVE-2022-0400
- CVE-2022-0480
- CVE-2022-1247
- CVE-2022-25265
- CVE-2022-2961
- CVE-2022-38096
- CVE-2022-41848
- CVE-2022-44032
- CVE-2022-44033
- CVE-2022-44034
- CVE-2022-4543
- CVE-2022-45884
- CVE-2022-45885
- CVE-2022-45888
- CVE-2023-23039
- CVE-2023-26242
- CVE-2023-3397
- CVE-2023-3640
- CVE-2023-37454
- CVE-2023-4010
- CVE-2023-4155
- CVE-2023-6238
- CVE-2023-6240
- CVE-2023-6535
- CVE-2024-21803
- CVE-2024-23848
- CVE-2024-24857
- CVE-2024-24858
- CVE-2024-24859
- CVE-2024-24864
- CVE-2024-25739
- CVE-2024-25740
- CVE-2024-26596
- CVE-2024-26900
- CVE-2024-26913
- CVE-2024-27012
- CVE-2024-27017
- CVE-2024-36478
- CVE-2024-38608
- CVE-2024-40965
- CVE-2024-41012
- CVE-2024-41061
- CVE-2024-41071
- CVE-2024-41080
- CVE-2024-41085
- CVE-2024-42064
- CVE-2024-42065
- CVE-2024-42066
- CVE-2024-42071
- CVE-2024-42072
- CVE-2024-42075
- CVE-2024-42078
- CVE-2024-42081
- CVE-2024-42083
- CVE-2024-42122
- CVE-2024-42123
- CVE-2024-42134
- CVE-2024-42139
- CVE-2024-42151
- CVE-2024-42155
- CVE-2024-42156
- CVE-2024-42158
- CVE-2024-42162
- CVE-2024-42227
- CVE-2024-42252
- CVE-2024-43819
- CVE-2024-43835
- CVE-2024-43840
- CVE-2024-43886
- CVE-2024-43899
- CVE-2024-43901
- CVE-2024-43904
- CVE-2024-43911
- CVE-2024-43913
- CVE-2024-44950
- CVE-2024-44951
- CVE-2024-44955
- CVE-2024-44956
- CVE-2024-44963
- CVE-2024-46681
- CVE-2024-46727
- CVE-2024-46730
- CVE-2024-46751
- CVE-2024-46772
- CVE-2024-46774
- CVE-2024-46775
- CVE-2024-46778
- CVE-2024-46808
- CVE-2024-46813
- CVE-2024-46823
- CVE-2024-46833
- CVE-2024-46834
- CVE-2024-46841
- CVE-2024-46842
- CVE-2024-46863
- CVE-2024-46870
- CVE-2024-47661
- CVE-2024-47662
- CVE-2024-47702
- CVE-2024-47703
- CVE-2024-47726
- CVE-2024-47736
- CVE-2024-49854
- CVE-2024-49885
- CVE-2024-49888
- CVE-2024-49891
- CVE-2024-49893
- CVE-2024-49897
- CVE-2024-49898
- CVE-2024-49899
- CVE-2024-49904
- CVE-2024-49906
- CVE-2024-49908
- CVE-2024-49909
- CVE-2024-49910
- CVE-2024-49911
- CVE-2024-49914
- CVE-2024-49915
- CVE-2024-49916
- CVE-2024-49917
- CVE-2024-49918
- CVE-2024-49919
- CVE-2024-49920
- CVE-2024-49921
- CVE-2024-49922
- CVE-2024-49923
- CVE-2024-49926
- CVE-2024-49928
- CVE-2024-49932
- CVE-2024-49934
- CVE-2024-49940
- CVE-2024-49945
- CVE-2024-49968
- CVE-2024-49970
- CVE-2024-49971
- CVE-2024-49972
- CVE-2024-49974
- CVE-2024-49990
- CVE-2024-49994
- CVE-2024-49998
- CVE-2024-50004
- CVE-2024-50009
- CVE-2024-50010
- CVE-2024-50014
- CVE-2024-50017
- CVE-2024-50027
- CVE-2024-50028
- CVE-2024-50090
- CVE-2024-50091
- CVE-2024-50102
- CVE-2024-50106
- CVE-2024-50137
- CVE-2024-50138
- CVE-2024-50146
- CVE-2024-50157
- CVE-2024-50177
- CVE-2024-50178
- CVE-2024-50217
- CVE-2024-50221
- CVE-2024-50225
- CVE-2024-50277
- CVE-2024-50304
- CVE-2024-53050
- CVE-2024-53051
- CVE-2024-53056
- CVE-2024-53084
- CVE-2024-53085
- CVE-2024-53114
- CVE-2024-53124
- CVE-2024-53128
- CVE-2024-53133
- CVE-2024-53141
- CVE-2024-53142
uw-imap:
- CVE-2018-19518
wireshark:
- CVE-2024-9781
xrdp:
- CVE-2022-23468
- CVE-2022-23477
- CVE-2022-23478
- CVE-2022-23479
- CVE-2022-23480
- CVE-2022-23481
- CVE-2022-23482
- CVE-2022-23483
- CVE-2022-23484
- CVE-2022-23493
- CVE-2023-40184
- CVE-2023-42822
- CVE-2024-39917
xserver-xorg:
- CVE-2023-1393
If you find an issue in ubinux, you should report it in the issue tracker on GitHub.