Peng Zhang 2f36efec28 kernel: upgrade the kernel to the version 6.6.63
We upgrade the kernel to the version 6.6.63 to fix the following CVEs:

CVE-2024-50193: https://nvd.nist.gov/vuln/detail/CVE-2024-50193
CVE-2024-50180: https://nvd.nist.gov/vuln/detail/CVE-2024-50180
CVE-2024-50269: https://nvd.nist.gov/vuln/detail/CVE-2024-50269
CVE-2024-53068: https://nvd.nist.gov/vuln/detail/CVE-2024-53068
CVE-2024-53082: https://nvd.nist.gov/vuln/detail/CVE-2024-53082
CVE-2024-50275: https://nvd.nist.gov/vuln/detail/CVE-2024-50275
CVE-2024-50279: https://nvd.nist.gov/vuln/detail/CVE-2024-50279
CVE-2024-50278: https://nvd.nist.gov/vuln/detail/CVE-2024-50278
CVE-2024-50150: https://nvd.nist.gov/vuln/detail/CVE-2024-50150
CVE-2024-50164: https://nvd.nist.gov/vuln/detail/CVE-2024-50164
CVE-2024-50155: https://nvd.nist.gov/vuln/detail/CVE-2024-50155
CVE-2024-50158: https://nvd.nist.gov/vuln/detail/CVE-2024-50158
CVE-2024-50151: https://nvd.nist.gov/vuln/detail/CVE-2024-50151
CVE-2024-50221: https://nvd.nist.gov/vuln/detail/CVE-2024-50221
CVE-2024-50268: https://nvd.nist.gov/vuln/detail/CVE-2024-50268
CVE-2024-50267: https://nvd.nist.gov/vuln/detail/CVE-2024-50267
CVE-2024-50301: https://nvd.nist.gov/vuln/detail/CVE-2024-50301
CVE-2024-50276: https://nvd.nist.gov/vuln/detail/CVE-2024-50276
CVE-2024-50283: https://nvd.nist.gov/vuln/detail/CVE-2024-50283
CVE-2024-50282: https://nvd.nist.gov/vuln/detail/CVE-2024-50282
CVE-2024-50286: https://nvd.nist.gov/vuln/detail/CVE-2024-50286
CVE-2024-50264: https://nvd.nist.gov/vuln/detail/CVE-2024-50264
CVE-2024-53061: https://nvd.nist.gov/vuln/detail/CVE-2024-53061
CVE-2024-53057: https://nvd.nist.gov/vuln/detail/CVE-2024-53057
CVE-2024-50063: https://nvd.nist.gov/vuln/detail/CVE-2024-50063
CVE-2024-50209: https://nvd.nist.gov/vuln/detail/CVE-2024-50209
CVE-2024-50143: https://nvd.nist.gov/vuln/detail/CVE-2024-50143
CVE-2024-41071: https://nvd.nist.gov/vuln/detail/CVE-2024-41071
CVE-2024-50154: https://nvd.nist.gov/vuln/detail/CVE-2024-50154
CVE-2024-50159: https://nvd.nist.gov/vuln/detail/CVE-2024-50159
CVE-2024-50226: https://nvd.nist.gov/vuln/detail/CVE-2024-50226
CVE-2024-50250: https://nvd.nist.gov/vuln/detail/CVE-2024-50250
CVE-2024-50235: https://nvd.nist.gov/vuln/detail/CVE-2024-50235
CVE-2024-50215: https://nvd.nist.gov/vuln/detail/CVE-2024-50215
CVE-2024-50261: https://nvd.nist.gov/vuln/detail/CVE-2024-50261
CVE-2024-50257: https://nvd.nist.gov/vuln/detail/CVE-2024-50257
CVE-2024-50222: https://nvd.nist.gov/vuln/detail/CVE-2024-50222
CVE-2024-50262: https://nvd.nist.gov/vuln/detail/CVE-2024-50262
CVE-2024-50242: https://nvd.nist.gov/vuln/detail/CVE-2024-50242
CVE-2024-50246: https://nvd.nist.gov/vuln/detail/CVE-2024-50246
CVE-2024-50234: https://nvd.nist.gov/vuln/detail/CVE-2024-50234
CVE-2024-50230: https://nvd.nist.gov/vuln/detail/CVE-2024-50230
CVE-2024-50247: https://nvd.nist.gov/vuln/detail/CVE-2024-50247
CVE-2024-50228: https://nvd.nist.gov/vuln/detail/CVE-2024-50228
CVE-2024-47670: https://nvd.nist.gov/vuln/detail/CVE-2024-47670
CVE-2024-49855: https://nvd.nist.gov/vuln/detail/CVE-2024-49855
CVE-2024-49854: https://nvd.nist.gov/vuln/detail/CVE-2024-49854
CVE-2024-47757: https://nvd.nist.gov/vuln/detail/CVE-2024-47757
CVE-2024-49852: https://nvd.nist.gov/vuln/detail/CVE-2024-49852
CVE-2024-49862: https://nvd.nist.gov/vuln/detail/CVE-2024-49862
CVE-2024-49861: https://nvd.nist.gov/vuln/detail/CVE-2024-49861
CVE-2024-49860: https://nvd.nist.gov/vuln/detail/CVE-2024-49860
CVE-2024-49853: https://nvd.nist.gov/vuln/detail/CVE-2024-49853
CVE-2024-47701: https://nvd.nist.gov/vuln/detail/CVE-2024-47701
CVE-2024-47723: https://nvd.nist.gov/vuln/detail/CVE-2024-47723
CVE-2024-47719: https://nvd.nist.gov/vuln/detail/CVE-2024-47719
CVE-2024-47718: https://nvd.nist.gov/vuln/detail/CVE-2024-47718
CVE-2024-47727: https://nvd.nist.gov/vuln/detail/CVE-2024-47727
CVE-2024-47751: https://nvd.nist.gov/vuln/detail/CVE-2024-47751
CVE-2024-47750: https://nvd.nist.gov/vuln/detail/CVE-2024-47750
CVE-2024-47748: https://nvd.nist.gov/vuln/detail/CVE-2024-47748
CVE-2024-47747: https://nvd.nist.gov/vuln/detail/CVE-2024-47747
CVE-2024-47745: https://nvd.nist.gov/vuln/detail/CVE-2024-47745
CVE-2024-47742: https://nvd.nist.gov/vuln/detail/CVE-2024-47742
CVE-2024-47730: https://nvd.nist.gov/vuln/detail/CVE-2024-47730
CVE-2024-47682: https://nvd.nist.gov/vuln/detail/CVE-2024-47682
CVE-2024-47691: https://nvd.nist.gov/vuln/detail/CVE-2024-47691
CVE-2024-47675: https://nvd.nist.gov/vuln/detail/CVE-2024-47675
CVE-2024-47685: https://nvd.nist.gov/vuln/detail/CVE-2024-47685
CVE-2024-47686: https://nvd.nist.gov/vuln/detail/CVE-2024-47686
CVE-2024-50047: https://nvd.nist.gov/vuln/detail/CVE-2024-50047
CVE-2024-50055: https://nvd.nist.gov/vuln/detail/CVE-2024-50055
CVE-2024-50061: https://nvd.nist.gov/vuln/detail/CVE-2024-50061
CVE-2024-50059: https://nvd.nist.gov/vuln/detail/CVE-2024-50059
CVE-2024-50035: https://nvd.nist.gov/vuln/detail/CVE-2024-50035
CVE-2024-50033: https://nvd.nist.gov/vuln/detail/CVE-2024-50033
CVE-2024-49874: https://nvd.nist.gov/vuln/detail/CVE-2024-49874
CVE-2024-47741: https://nvd.nist.gov/vuln/detail/CVE-2024-47741
CVE-2024-47696: https://nvd.nist.gov/vuln/detail/CVE-2024-47696
CVE-2024-47695: https://nvd.nist.gov/vuln/detail/CVE-2024-47695
CVE-2024-47698: https://nvd.nist.gov/vuln/detail/CVE-2024-47698
CVE-2024-47697: https://nvd.nist.gov/vuln/detail/CVE-2024-47697
CVE-2024-49884: https://nvd.nist.gov/vuln/detail/CVE-2024-49884
CVE-2024-49883: https://nvd.nist.gov/vuln/detail/CVE-2024-49883
CVE-2024-49900: https://nvd.nist.gov/vuln/detail/CVE-2024-49900
CVE-2024-49889: https://nvd.nist.gov/vuln/detail/CVE-2024-49889
CVE-2024-49894: https://nvd.nist.gov/vuln/detail/CVE-2024-49894
CVE-2024-49895: https://nvd.nist.gov/vuln/detail/CVE-2024-49895
CVE-2024-49903: https://nvd.nist.gov/vuln/detail/CVE-2024-49903
CVE-2024-49930: https://nvd.nist.gov/vuln/detail/CVE-2024-49930
CVE-2024-49931: https://nvd.nist.gov/vuln/detail/CVE-2024-49931
CVE-2024-49936: https://nvd.nist.gov/vuln/detail/CVE-2024-49936
CVE-2024-49924: https://nvd.nist.gov/vuln/detail/CVE-2024-49924
CVE-2024-49969: https://nvd.nist.gov/vuln/detail/CVE-2024-49969
CVE-2024-49960: https://nvd.nist.gov/vuln/detail/CVE-2024-49960
CVE-2024-49981: https://nvd.nist.gov/vuln/detail/CVE-2024-49981
CVE-2024-49982: https://nvd.nist.gov/vuln/detail/CVE-2024-49982
CVE-2024-49983: https://nvd.nist.gov/vuln/detail/CVE-2024-49983
CVE-2024-49986: https://nvd.nist.gov/vuln/detail/CVE-2024-49986
CVE-2024-49989: https://nvd.nist.gov/vuln/detail/CVE-2024-49989
CVE-2024-49992: https://nvd.nist.gov/vuln/detail/CVE-2024-49992
CVE-2024-49996: https://nvd.nist.gov/vuln/detail/CVE-2024-49996
CVE-2024-49991: https://nvd.nist.gov/vuln/detail/CVE-2024-49991
CVE-2024-49997: https://nvd.nist.gov/vuln/detail/CVE-2024-49997
CVE-2024-50067: https://nvd.nist.gov/vuln/detail/CVE-2024-50067
CVE-2024-49995: https://nvd.nist.gov/vuln/detail/CVE-2024-49995
CVE-2024-50036: https://nvd.nist.gov/vuln/detail/CVE-2024-50036
CVE-2024-50029: https://nvd.nist.gov/vuln/detail/CVE-2024-50029
CVE-2024-50074: https://nvd.nist.gov/vuln/detail/CVE-2024-50074
CVE-2024-50083: https://nvd.nist.gov/vuln/detail/CVE-2024-50083
CVE-2024-50086: https://nvd.nist.gov/vuln/detail/CVE-2024-50086
CVE-2024-50130: https://nvd.nist.gov/vuln/detail/CVE-2024-50130
CVE-2024-50131: https://nvd.nist.gov/vuln/detail/CVE-2024-50131
CVE-2024-50115: https://nvd.nist.gov/vuln/detail/CVE-2024-50115
CVE-2024-50112: https://nvd.nist.gov/vuln/detail/CVE-2024-50112
CVE-2024-50127: https://nvd.nist.gov/vuln/detail/CVE-2024-50127
CVE-2024-50124: https://nvd.nist.gov/vuln/detail/CVE-2024-50124
CVE-2024-50128: https://nvd.nist.gov/vuln/detail/CVE-2024-50128
CVE-2024-50126: https://nvd.nist.gov/vuln/detail/CVE-2024-50126
CVE-2024-50121: https://nvd.nist.gov/vuln/detail/CVE-2024-50121
CVE-2024-50125: https://nvd.nist.gov/vuln/detail/CVE-2024-50125
CVE-2024-50088: https://nvd.nist.gov/vuln/detail/CVE-2024-50088
CVE-2024-50073: https://nvd.nist.gov/vuln/detail/CVE-2024-50073
CVE-2024-50066: https://nvd.nist.gov/vuln/detail/CVE-2024-50066
CVE-2024-50007: https://nvd.nist.gov/vuln/detail/CVE-2024-50007
CVE-2024-50005: https://nvd.nist.gov/vuln/detail/CVE-2024-50005
CVE-2024-49967: https://nvd.nist.gov/vuln/detail/CVE-2024-49967
CVE-2024-49966: https://nvd.nist.gov/vuln/detail/CVE-2024-49966
CVE-2024-49950: https://nvd.nist.gov/vuln/detail/CVE-2024-49950
CVE-2024-49882: https://nvd.nist.gov/vuln/detail/CVE-2024-49882

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was run and the test results PASS.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928
  99.9999th percentile: 2546".
- The values are relatively similar kernel v6.6.52 (1659 vs 1674,
  58 vs 49 and 2546 vs 2625).

Closes-Bug: 2089729

Change-Id: Ie7df6f84888768c566e3124a0e59e114674978bb
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2024-12-01 19:59:04 +08:00

112 lines
4.5 KiB
Plaintext

linux (6.6.63-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=7161bda718e673d92774adeec664c182a9503b23
-- Peng Zhang <Peng.Zhang2@windriver.com> Wen, 27 Nov 2024 15:46:21 +0800
linux (6.6.52-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=01b1f32be4b0eb108c00b16ec4eef29ce7fa9546
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 17 Oct 2024 12:23:49 +0800
linux (6.6.40-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=12524ba963715d599cd28515eb8814476b6bf1d9
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 10 Jul 2024 16:37:34 +0800
linux (6.6.7-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=a7d960cfa075eb93eef1e04e96940a35d1a49d79
-- Li Zhou <li.zhou@windriver.com> Fri, 22 Dec 2023 15:36:30 +0800
linux (5.10.205-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=0e1dfe1d29013deb4cfa75170fa414e75a14c530
-- Peng Zhang <Peng.Zhang2@windriver.com> Tue, 16 Jan 2024 06:57:16 +0000
linux (5.10.198-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=5601201f60a8abb5bbb54da99da2a38bfb7a46dd
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 18 Oct 2023 08:33:53 +0000
linux (5.10.192-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=11b247211e00c610587b27a762e4814f56723958
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 02 Oct 2023 08:09:11 +0000
linux (5.10.189-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=fc99f5e7ce23e4814c7b41f24c5d0296754be89e
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 28 Aug 2023 05:56:12 +0000
linux (5.10.185-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=dafc025b033585311d1693255c80b60b690b0e54
-- Peng Zhang <Peng.Zhang2@windriver.com> Mon, 17 Jul 2023 10:47:53 +0000
linux (5.10.180-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=c6515d2a698792220bed8fd39ccbcfec64d1130f
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 31 May 2023 08:56:14 +0000
linux (5.10.177-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=cf160f367e3ceb54cde11392a80413b152ca4e15
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 26 Apr 2023 19:22:54 +0000
linux (5.10.162-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=353f388471e281c0f387436b035bfdcd2f468505
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 11 Jan 2023 9:33:12 +0800
linux (5.10.152-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=7d078581c0f754d6cb38b2bf1952925e0460ef84
-- Jiping Ma <jiping.ma2@windriver.com> Fri, 04 Nov 2022 16:43:32 +0800
linux (5.10.112-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=6cf7dea05bd756513cf58c5ced8c6bf1d1f23c15
* To fix the follow 2 CVE issues.
CVE-2022-0435: kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
CVE-2022-0847: kernel: improper initialization of the "flags" member of the new pipe_buffer
-- Jiping Ma <jiping.ma2@windriver.com> Wed, 27 Apr 2022 11:13:32 +0800
linux (5.10.99-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=84f6a75f64961e59d61bf3d70ab17e8bb430386b
-- Li Zhou <li.zhou@windriver.com> Wed, 13 Apr 2022 11:37:52 +0800
linux (5.10.74-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/cgit/cgit.cgi/linux-yocto/log/?h=v5.10%2Fstandard%2Fbase&qt=range&q=9e84a42af61ff9c6feb89ab8d61ee5f25fb35c72
-- Li Zhou <li.zhou@windriver.com> Tue, 9 Nov 2021 11:23:35 +0800