kernel/kernel-std
Peng Zhang 7f53ef73e9 kernel: upgrade the kernel to the version 6.6.52
We upgrade the kernel to the version 6.6.52 to fix the following CVEs:
CVE-2024-46786: https://nvd.nist.gov/vuln/detail/CVE-2024-46786
CVE-2024-46746: https://nvd.nist.gov/vuln/detail/CVE-2024-46746
CVE-2024-46731: https://nvd.nist.gov/vuln/detail/CVE-2024-46731
CVE-2024-46782: https://nvd.nist.gov/vuln/detail/CVE-2024-46782
CVE-2024-46759: https://nvd.nist.gov/vuln/detail/CVE-2024-46759
CVE-2024-46758: https://nvd.nist.gov/vuln/detail/CVE-2024-46758
CVE-2024-46757: https://nvd.nist.gov/vuln/detail/CVE-2024-46757
CVE-2024-46756: https://nvd.nist.gov/vuln/detail/CVE-2024-46756
CVE-2024-46800: https://nvd.nist.gov/vuln/detail/CVE-2024-46800
CVE-2024-46796: https://nvd.nist.gov/vuln/detail/CVE-2024-46796
CVE-2024-46798: https://nvd.nist.gov/vuln/detail/CVE-2024-46798
CVE-2024-46747: https://nvd.nist.gov/vuln/detail/CVE-2024-46747
CVE-2024-46738: https://nvd.nist.gov/vuln/detail/CVE-2024-46738
CVE-2024-46740: https://nvd.nist.gov/vuln/detail/CVE-2024-46740
CVE-2024-46741: https://nvd.nist.gov/vuln/detail/CVE-2024-46741
CVE-2024-46743: https://nvd.nist.gov/vuln/detail/CVE-2024-46743

It also contains kernel 6.6.50 which fix following CVEs:
CVE-2024-46725: https://nvd.nist.gov/vuln/detail/CVE-2024-46725
CVE-2024-46724: https://nvd.nist.gov/vuln/detail/CVE-2024-46724
CVE-2024-46723: https://nvd.nist.gov/vuln/detail/CVE-2024-46723
CVE-2024-46722: https://nvd.nist.gov/vuln/detail/CVE-2024-46722
CVE-2024-45026: https://nvd.nist.gov/vuln/detail/CVE-2024-45026
CVE-2024-46687: https://nvd.nist.gov/vuln/detail/CVE-2024-46687
CVE-2024-46674: https://nvd.nist.gov/vuln/detail/CVE-2024-46674
CVE-2024-46673: https://nvd.nist.gov/vuln/detail/CVE-2024-46673
CVE-2024-44941: https://nvd.nist.gov/vuln/detail/CVE-2024-44941
CVE-2024-44940: https://nvd.nist.gov/vuln/detail/CVE-2024-44940
CVE-2024-41040: https://nvd.nist.gov/vuln/detail/CVE-2024-41040
CVE-2024-41039: https://nvd.nist.gov/vuln/detail/CVE-2024-41039
CVE-2024-42280: https://nvd.nist.gov/vuln/detail/CVE-2024-42280
CVE-2024-41059: https://nvd.nist.gov/vuln/detail/CVE-2024-41059
CVE-2024-44983: https://nvd.nist.gov/vuln/detail/CVE-2024-44983
CVE-2024-44985: https://nvd.nist.gov/vuln/detail/CVE-2024-44985
CVE-2024-44974: https://nvd.nist.gov/vuln/detail/CVE-2024-44974
CVE-2024-44987: https://nvd.nist.gov/vuln/detail/CVE-2024-44987
CVE-2024-44986: https://nvd.nist.gov/vuln/detail/CVE-2024-44986
CVE-2024-44999: https://nvd.nist.gov/vuln/detail/CVE-2024-44999
CVE-2024-44997: https://nvd.nist.gov/vuln/detail/CVE-2024-44997
CVE-2024-44998: https://nvd.nist.gov/vuln/detail/CVE-2024-44998
CVE-2024-43882: https://nvd.nist.gov/vuln/detail/CVE-2024-43882
CVE-2024-43873: https://nvd.nist.gov/vuln/detail/CVE-2024-43873

It also contains kernel 6.6.47 which fix following CVEs:
CVE-2024-43858: https://nvd.nist.gov/vuln/detail/CVE-2024-43858
CVE-2024-42314: https://nvd.nist.gov/vuln/detail/CVE-2024-42314
CVE-2024-42313: https://nvd.nist.gov/vuln/detail/CVE-2024-42313
CVE-2024-42302: https://nvd.nist.gov/vuln/detail/CVE-2024-42302
CVE-2024-42301: https://nvd.nist.gov/vuln/detail/CVE-2024-42301
CVE-2024-41046: https://nvd.nist.gov/vuln/detail/CVE-2024-41046
CVE-2024-41049: https://nvd.nist.gov/vuln/detail/CVE-2024-41049
CVE-2024-41057: https://nvd.nist.gov/vuln/detail/CVE-2024-41057
CVE-2024-41058: https://nvd.nist.gov/vuln/detail/CVE-2024-41058
CVE-2024-41070: https://nvd.nist.gov/vuln/detail/CVE-2024-41070
CVE-2024-41073: https://nvd.nist.gov/vuln/detail/CVE-2024-41073
CVE-2024-42284: https://nvd.nist.gov/vuln/detail/CVE-2024-42284
CVE-2024-42271: https://nvd.nist.gov/vuln/detail/CVE-2024-42271
CVE-2024-42285: https://nvd.nist.gov/vuln/detail/CVE-2024-42285
CVE-2024-44942: https://nvd.nist.gov/vuln/detail/CVE-2024-44942
CVE-2024-44934: https://nvd.nist.gov/vuln/detail/CVE-2024-44934
CVE-2024-43900: https://nvd.nist.gov/vuln/detail/CVE-2024-43900

For updated kernel v6.6.52 has contained following patch under
ice-ptp-vsi directory:
    ice-fix-VSI-lists-confusion-when-adding-VLANs.patch
it will be deleted to adapt source code.

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was run and the test results PASS.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples: 86400000 avg: 1674.128 std_dev: 49.673 max: 3711
  99.9999th percentile: 2625".
- The values are relatively similar kernel v6.6.40 (1674 vs 1658,
  49 vs 44 and 2625 vs 2590).

Closes-Bug: 2077387
Closes-Bug: 2079952
Closes-Bug: 2081784

Change-Id: I140260d0a9c5617ee8f9650cc8a89db5b284a8db
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2024-10-21 10:32:55 +08:00
..
debian kernel: upgrade the kernel to the version 6.6.52 2024-10-21 10:32:55 +08:00
files Kernel: Enable the use of WireGuard secure network tunnel. 2022-09-18 22:05:52 -04:00