
We upgrade the kernel to the version 6.6.63 to fix the following CVEs: CVE-2024-50193: https://nvd.nist.gov/vuln/detail/CVE-2024-50193 CVE-2024-50180: https://nvd.nist.gov/vuln/detail/CVE-2024-50180 CVE-2024-50269: https://nvd.nist.gov/vuln/detail/CVE-2024-50269 CVE-2024-53068: https://nvd.nist.gov/vuln/detail/CVE-2024-53068 CVE-2024-53082: https://nvd.nist.gov/vuln/detail/CVE-2024-53082 CVE-2024-50275: https://nvd.nist.gov/vuln/detail/CVE-2024-50275 CVE-2024-50279: https://nvd.nist.gov/vuln/detail/CVE-2024-50279 CVE-2024-50278: https://nvd.nist.gov/vuln/detail/CVE-2024-50278 CVE-2024-50150: https://nvd.nist.gov/vuln/detail/CVE-2024-50150 CVE-2024-50164: https://nvd.nist.gov/vuln/detail/CVE-2024-50164 CVE-2024-50155: https://nvd.nist.gov/vuln/detail/CVE-2024-50155 CVE-2024-50158: https://nvd.nist.gov/vuln/detail/CVE-2024-50158 CVE-2024-50151: https://nvd.nist.gov/vuln/detail/CVE-2024-50151 CVE-2024-50221: https://nvd.nist.gov/vuln/detail/CVE-2024-50221 CVE-2024-50268: https://nvd.nist.gov/vuln/detail/CVE-2024-50268 CVE-2024-50267: https://nvd.nist.gov/vuln/detail/CVE-2024-50267 CVE-2024-50301: https://nvd.nist.gov/vuln/detail/CVE-2024-50301 CVE-2024-50276: https://nvd.nist.gov/vuln/detail/CVE-2024-50276 CVE-2024-50283: https://nvd.nist.gov/vuln/detail/CVE-2024-50283 CVE-2024-50282: https://nvd.nist.gov/vuln/detail/CVE-2024-50282 CVE-2024-50286: https://nvd.nist.gov/vuln/detail/CVE-2024-50286 CVE-2024-50264: https://nvd.nist.gov/vuln/detail/CVE-2024-50264 CVE-2024-53061: https://nvd.nist.gov/vuln/detail/CVE-2024-53061 CVE-2024-53057: https://nvd.nist.gov/vuln/detail/CVE-2024-53057 CVE-2024-50063: https://nvd.nist.gov/vuln/detail/CVE-2024-50063 CVE-2024-50209: https://nvd.nist.gov/vuln/detail/CVE-2024-50209 CVE-2024-50143: https://nvd.nist.gov/vuln/detail/CVE-2024-50143 CVE-2024-41071: https://nvd.nist.gov/vuln/detail/CVE-2024-41071 CVE-2024-50154: https://nvd.nist.gov/vuln/detail/CVE-2024-50154 CVE-2024-50159: https://nvd.nist.gov/vuln/detail/CVE-2024-50159 CVE-2024-50226: https://nvd.nist.gov/vuln/detail/CVE-2024-50226 CVE-2024-50250: https://nvd.nist.gov/vuln/detail/CVE-2024-50250 CVE-2024-50235: https://nvd.nist.gov/vuln/detail/CVE-2024-50235 CVE-2024-50215: https://nvd.nist.gov/vuln/detail/CVE-2024-50215 CVE-2024-50261: https://nvd.nist.gov/vuln/detail/CVE-2024-50261 CVE-2024-50257: https://nvd.nist.gov/vuln/detail/CVE-2024-50257 CVE-2024-50222: https://nvd.nist.gov/vuln/detail/CVE-2024-50222 CVE-2024-50262: https://nvd.nist.gov/vuln/detail/CVE-2024-50262 CVE-2024-50242: https://nvd.nist.gov/vuln/detail/CVE-2024-50242 CVE-2024-50246: https://nvd.nist.gov/vuln/detail/CVE-2024-50246 CVE-2024-50234: https://nvd.nist.gov/vuln/detail/CVE-2024-50234 CVE-2024-50230: https://nvd.nist.gov/vuln/detail/CVE-2024-50230 CVE-2024-50247: https://nvd.nist.gov/vuln/detail/CVE-2024-50247 CVE-2024-50228: https://nvd.nist.gov/vuln/detail/CVE-2024-50228 CVE-2024-47670: https://nvd.nist.gov/vuln/detail/CVE-2024-47670 CVE-2024-49855: https://nvd.nist.gov/vuln/detail/CVE-2024-49855 CVE-2024-49854: https://nvd.nist.gov/vuln/detail/CVE-2024-49854 CVE-2024-47757: https://nvd.nist.gov/vuln/detail/CVE-2024-47757 CVE-2024-49852: https://nvd.nist.gov/vuln/detail/CVE-2024-49852 CVE-2024-49862: https://nvd.nist.gov/vuln/detail/CVE-2024-49862 CVE-2024-49861: https://nvd.nist.gov/vuln/detail/CVE-2024-49861 CVE-2024-49860: https://nvd.nist.gov/vuln/detail/CVE-2024-49860 CVE-2024-49853: https://nvd.nist.gov/vuln/detail/CVE-2024-49853 CVE-2024-47701: https://nvd.nist.gov/vuln/detail/CVE-2024-47701 CVE-2024-47723: https://nvd.nist.gov/vuln/detail/CVE-2024-47723 CVE-2024-47719: https://nvd.nist.gov/vuln/detail/CVE-2024-47719 CVE-2024-47718: https://nvd.nist.gov/vuln/detail/CVE-2024-47718 CVE-2024-47727: https://nvd.nist.gov/vuln/detail/CVE-2024-47727 CVE-2024-47751: https://nvd.nist.gov/vuln/detail/CVE-2024-47751 CVE-2024-47750: https://nvd.nist.gov/vuln/detail/CVE-2024-47750 CVE-2024-47748: https://nvd.nist.gov/vuln/detail/CVE-2024-47748 CVE-2024-47747: https://nvd.nist.gov/vuln/detail/CVE-2024-47747 CVE-2024-47745: https://nvd.nist.gov/vuln/detail/CVE-2024-47745 CVE-2024-47742: https://nvd.nist.gov/vuln/detail/CVE-2024-47742 CVE-2024-47730: https://nvd.nist.gov/vuln/detail/CVE-2024-47730 CVE-2024-47682: https://nvd.nist.gov/vuln/detail/CVE-2024-47682 CVE-2024-47691: https://nvd.nist.gov/vuln/detail/CVE-2024-47691 CVE-2024-47675: https://nvd.nist.gov/vuln/detail/CVE-2024-47675 CVE-2024-47685: https://nvd.nist.gov/vuln/detail/CVE-2024-47685 CVE-2024-47686: https://nvd.nist.gov/vuln/detail/CVE-2024-47686 CVE-2024-50047: https://nvd.nist.gov/vuln/detail/CVE-2024-50047 CVE-2024-50055: https://nvd.nist.gov/vuln/detail/CVE-2024-50055 CVE-2024-50061: https://nvd.nist.gov/vuln/detail/CVE-2024-50061 CVE-2024-50059: https://nvd.nist.gov/vuln/detail/CVE-2024-50059 CVE-2024-50035: https://nvd.nist.gov/vuln/detail/CVE-2024-50035 CVE-2024-50033: https://nvd.nist.gov/vuln/detail/CVE-2024-50033 CVE-2024-49874: https://nvd.nist.gov/vuln/detail/CVE-2024-49874 CVE-2024-47741: https://nvd.nist.gov/vuln/detail/CVE-2024-47741 CVE-2024-47696: https://nvd.nist.gov/vuln/detail/CVE-2024-47696 CVE-2024-47695: https://nvd.nist.gov/vuln/detail/CVE-2024-47695 CVE-2024-47698: https://nvd.nist.gov/vuln/detail/CVE-2024-47698 CVE-2024-47697: https://nvd.nist.gov/vuln/detail/CVE-2024-47697 CVE-2024-49884: https://nvd.nist.gov/vuln/detail/CVE-2024-49884 CVE-2024-49883: https://nvd.nist.gov/vuln/detail/CVE-2024-49883 CVE-2024-49900: https://nvd.nist.gov/vuln/detail/CVE-2024-49900 CVE-2024-49889: https://nvd.nist.gov/vuln/detail/CVE-2024-49889 CVE-2024-49894: https://nvd.nist.gov/vuln/detail/CVE-2024-49894 CVE-2024-49895: https://nvd.nist.gov/vuln/detail/CVE-2024-49895 CVE-2024-49903: https://nvd.nist.gov/vuln/detail/CVE-2024-49903 CVE-2024-49930: https://nvd.nist.gov/vuln/detail/CVE-2024-49930 CVE-2024-49931: https://nvd.nist.gov/vuln/detail/CVE-2024-49931 CVE-2024-49936: https://nvd.nist.gov/vuln/detail/CVE-2024-49936 CVE-2024-49924: https://nvd.nist.gov/vuln/detail/CVE-2024-49924 CVE-2024-49969: https://nvd.nist.gov/vuln/detail/CVE-2024-49969 CVE-2024-49960: https://nvd.nist.gov/vuln/detail/CVE-2024-49960 CVE-2024-49981: https://nvd.nist.gov/vuln/detail/CVE-2024-49981 CVE-2024-49982: https://nvd.nist.gov/vuln/detail/CVE-2024-49982 CVE-2024-49983: https://nvd.nist.gov/vuln/detail/CVE-2024-49983 CVE-2024-49986: https://nvd.nist.gov/vuln/detail/CVE-2024-49986 CVE-2024-49989: https://nvd.nist.gov/vuln/detail/CVE-2024-49989 CVE-2024-49992: https://nvd.nist.gov/vuln/detail/CVE-2024-49992 CVE-2024-49996: https://nvd.nist.gov/vuln/detail/CVE-2024-49996 CVE-2024-49991: https://nvd.nist.gov/vuln/detail/CVE-2024-49991 CVE-2024-49997: https://nvd.nist.gov/vuln/detail/CVE-2024-49997 CVE-2024-50067: https://nvd.nist.gov/vuln/detail/CVE-2024-50067 CVE-2024-49995: https://nvd.nist.gov/vuln/detail/CVE-2024-49995 CVE-2024-50036: https://nvd.nist.gov/vuln/detail/CVE-2024-50036 CVE-2024-50029: https://nvd.nist.gov/vuln/detail/CVE-2024-50029 CVE-2024-50074: https://nvd.nist.gov/vuln/detail/CVE-2024-50074 CVE-2024-50083: https://nvd.nist.gov/vuln/detail/CVE-2024-50083 CVE-2024-50086: https://nvd.nist.gov/vuln/detail/CVE-2024-50086 CVE-2024-50130: https://nvd.nist.gov/vuln/detail/CVE-2024-50130 CVE-2024-50131: https://nvd.nist.gov/vuln/detail/CVE-2024-50131 CVE-2024-50115: https://nvd.nist.gov/vuln/detail/CVE-2024-50115 CVE-2024-50112: https://nvd.nist.gov/vuln/detail/CVE-2024-50112 CVE-2024-50127: https://nvd.nist.gov/vuln/detail/CVE-2024-50127 CVE-2024-50124: https://nvd.nist.gov/vuln/detail/CVE-2024-50124 CVE-2024-50128: https://nvd.nist.gov/vuln/detail/CVE-2024-50128 CVE-2024-50126: https://nvd.nist.gov/vuln/detail/CVE-2024-50126 CVE-2024-50121: https://nvd.nist.gov/vuln/detail/CVE-2024-50121 CVE-2024-50125: https://nvd.nist.gov/vuln/detail/CVE-2024-50125 CVE-2024-50088: https://nvd.nist.gov/vuln/detail/CVE-2024-50088 CVE-2024-50073: https://nvd.nist.gov/vuln/detail/CVE-2024-50073 CVE-2024-50066: https://nvd.nist.gov/vuln/detail/CVE-2024-50066 CVE-2024-50007: https://nvd.nist.gov/vuln/detail/CVE-2024-50007 CVE-2024-50005: https://nvd.nist.gov/vuln/detail/CVE-2024-50005 CVE-2024-49967: https://nvd.nist.gov/vuln/detail/CVE-2024-49967 CVE-2024-49966: https://nvd.nist.gov/vuln/detail/CVE-2024-49966 CVE-2024-49950: https://nvd.nist.gov/vuln/detail/CVE-2024-49950 CVE-2024-49882: https://nvd.nist.gov/vuln/detail/CVE-2024-49882 Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a All-in-One lab with rt kernel. - Boot up successfully in the lab. - The sanity testing was run and the test results PASS. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928 99.9999th percentile: 2546". - The values are relatively similar kernel v6.6.52 (1659 vs 1674, 58 vs 49 and 2546 vs 2625). Closes-Bug: 2089729 Change-Id: Ie7df6f84888768c566e3124a0e59e114674978bb Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
112 lines
4.5 KiB
Plaintext
112 lines
4.5 KiB
Plaintext
linux (6.6.63-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=7161bda718e673d92774adeec664c182a9503b23
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Wen, 27 Nov 2024 15:46:21 +0800
|
|
|
|
linux (6.6.52-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=01b1f32be4b0eb108c00b16ec4eef29ce7fa9546
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 17 Oct 2024 12:23:49 +0800
|
|
|
|
linux (6.6.40-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=12524ba963715d599cd28515eb8814476b6bf1d9
|
|
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 10 Jul 2024 16:37:34 +0800
|
|
|
|
linux (6.6.7-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=a7d960cfa075eb93eef1e04e96940a35d1a49d79
|
|
-- Li Zhou <li.zhou@windriver.com> Fri, 22 Dec 2023 15:36:30 +0800
|
|
|
|
linux (5.10.205-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=0e1dfe1d29013deb4cfa75170fa414e75a14c530
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Tue, 16 Jan 2024 06:57:16 +0000
|
|
|
|
linux (5.10.198-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=5601201f60a8abb5bbb54da99da2a38bfb7a46dd
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 18 Oct 2023 08:33:53 +0000
|
|
|
|
linux (5.10.192-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=11b247211e00c610587b27a762e4814f56723958
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 02 Oct 2023 08:09:11 +0000
|
|
|
|
linux (5.10.189-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=fc99f5e7ce23e4814c7b41f24c5d0296754be89e
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 28 Aug 2023 05:56:12 +0000
|
|
|
|
linux (5.10.185-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=dafc025b033585311d1693255c80b60b690b0e54
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 17 Jul 2023 10:47:53 +0000
|
|
|
|
linux (5.10.180-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=c6515d2a698792220bed8fd39ccbcfec64d1130f
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 31 May 2023 08:56:14 +0000
|
|
|
|
linux (5.10.177-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=cf160f367e3ceb54cde11392a80413b152ca4e15
|
|
|
|
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 26 Apr 2023 19:22:54 +0000
|
|
|
|
linux (5.10.162-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=353f388471e281c0f387436b035bfdcd2f468505
|
|
|
|
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 11 Jan 2023 9:33:12 +0800
|
|
|
|
linux (5.10.152-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=7d078581c0f754d6cb38b2bf1952925e0460ef84
|
|
|
|
-- Jiping Ma <jiping.ma2@windriver.com> Fri, 04 Nov 2022 16:43:32 +0800
|
|
|
|
linux (5.10.112-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=6cf7dea05bd756513cf58c5ced8c6bf1d1f23c15
|
|
* To fix the follow 2 CVE issues.
|
|
CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
|
|
CVE-2022-0847: kernel: improper initialization of the "flags" member of the new pipe_buffer
|
|
|
|
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 27 Apr 2022 11:13:32 +0800
|
|
|
|
linux (5.10.99-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=84f6a75f64961e59d61bf3d70ab17e8bb430386b
|
|
|
|
-- Li Zhou <li.zhou@windriver.com> Wed, 13 Apr 2022 11:37:52 +0800
|
|
|
|
linux (5.10.74-1) unstable; urgency=medium
|
|
|
|
* New upstream update:
|
|
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=9e84a42af61ff9c6feb89ab8d61ee5f25fb35c72
|
|
|
|
-- Li Zhou <li.zhou@windriver.com> Tue, 9 Nov 2021 11:23:35 +0800
|
|
|