
We upgrade the kernel to the version 6.6.71 to fix the following CVEs: https://nvd.nist.gov/vuln/detail/CVE-2024-56627 https://nvd.nist.gov/vuln/detail/CVE-2024-56626 https://nvd.nist.gov/vuln/detail/CVE-2024-56615 https://nvd.nist.gov/vuln/detail/CVE-2024-56598 https://nvd.nist.gov/vuln/detail/CVE-2024-56596 https://nvd.nist.gov/vuln/detail/CVE-2024-56595 https://nvd.nist.gov/vuln/detail/CVE-2024-56551 https://nvd.nist.gov/vuln/detail/CVE-2024-53208 https://nvd.nist.gov/vuln/detail/CVE-2024-53166 https://nvd.nist.gov/vuln/detail/CVE-2024-53206 https://nvd.nist.gov/vuln/detail/CVE-2024-53186 https://nvd.nist.gov/vuln/detail/CVE-2024-53179 https://nvd.nist.gov/vuln/detail/CVE-2024-53173 https://nvd.nist.gov/vuln/detail/CVE-2024-53171 https://nvd.nist.gov/vuln/detail/CVE-2024-53165 https://nvd.nist.gov/vuln/detail/CVE-2024-56582 https://nvd.nist.gov/vuln/detail/CVE-2024-56538 https://nvd.nist.gov/vuln/detail/CVE-2024-53237 https://nvd.nist.gov/vuln/detail/CVE-2024-56581 https://nvd.nist.gov/vuln/detail/CVE-2024-56605 https://nvd.nist.gov/vuln/detail/CVE-2024-56604 https://nvd.nist.gov/vuln/detail/CVE-2024-56603 https://nvd.nist.gov/vuln/detail/CVE-2024-56602 https://nvd.nist.gov/vuln/detail/CVE-2024-56601 https://nvd.nist.gov/vuln/detail/CVE-2024-56600 https://nvd.nist.gov/vuln/detail/CVE-2024-56704 https://nvd.nist.gov/vuln/detail/CVE-2024-56640 https://nvd.nist.gov/vuln/detail/CVE-2024-53227 https://nvd.nist.gov/vuln/detail/CVE-2024-53213 https://nvd.nist.gov/vuln/detail/CVE-2024-56759 https://nvd.nist.gov/vuln/detail/CVE-2024-53156 https://nvd.nist.gov/vuln/detail/CVE-2024-53155 https://nvd.nist.gov/vuln/detail/CVE-2024-53150 https://nvd.nist.gov/vuln/detail/CVE-2024-53103 https://nvd.nist.gov/vuln/detail/CVE-2024-56606 https://nvd.nist.gov/vuln/detail/CVE-2024-56614 https://nvd.nist.gov/vuln/detail/CVE-2024-56631 https://nvd.nist.gov/vuln/detail/CVE-2024-56642 https://nvd.nist.gov/vuln/detail/CVE-2024-56708 https://nvd.nist.gov/vuln/detail/CVE-2024-56766 https://nvd.nist.gov/vuln/detail/CVE-2024-56765 https://nvd.nist.gov/vuln/detail/CVE-2024-56675 https://nvd.nist.gov/vuln/detail/CVE-2024-56672 https://nvd.nist.gov/vuln/detail/CVE-2024-56664 https://nvd.nist.gov/vuln/detail/CVE-2024-56663 https://nvd.nist.gov/vuln/detail/CVE-2024-56662 https://nvd.nist.gov/vuln/detail/CVE-2024-56658 https://nvd.nist.gov/vuln/detail/CVE-2024-56653 https://nvd.nist.gov/vuln/detail/CVE-2024-56651 https://nvd.nist.gov/vuln/detail/CVE-2024-56650 https://nvd.nist.gov/vuln/detail/CVE-2024-8805 https://nvd.nist.gov/vuln/detail/CVE-2024-53144 https://nvd.nist.gov/vuln/detail/CVE-2024-53108 https://nvd.nist.gov/vuln/detail/CVE-2024-53142 https://nvd.nist.gov/vuln/detail/CVE-2024-53141 https://nvd.nist.gov/vuln/detail/CVE-2024-53139 https://nvd.nist.gov/vuln/detail/CVE-2024-53126 Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a All-in-One lab with rt kernel. - Boot up successfully in the lab. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 86400000 avg: 1691.716 std_dev: 58.475 max: 3932 99.9999th percentile: 2591", It is not big difference with 6.6.63 which is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928 99.9999th percentile: 2546". Closes-Bug: 2092795 Change-Id: I616796274d39f8cadc4417185ff90167cd0e2f25 Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>