
This commit updates kernel to 5.10.185 to fix following CVE issues: CVE-2023-3609: https://nvd.nist.gov/vuln/detail/CVE-2023-3609 CVE-2023-3090: https://nvd.nist.gov/vuln/detail/CVE-2023-3090 CVE-2023-3212: https://nvd.nist.gov/vuln/detail/CVE-2023-3212 CVE-2023-35788: https://nvd.nist.gov/vuln/detail/CVE-2023-35788 CVE-2023-3141: https://nvd.nist.gov/vuln/detail/CVE-2023-3141 CVE-2023-3111: https://nvd.nist.gov/vuln/detail/CVE-2023-3111 CVE-2023-2124: https://nvd.nist.gov/vuln/detail/CVE-2023-2124 CVE-2023-3338: https://nvd.nist.gov/vuln/detail/CVE-2023-3338 None of our source patches requires refresh against the new kernel source. Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a AIO-DX lab with rt kernel. - Boot up successfully in the lab. - The sanity testing was run including kernel and applications by our test team. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 259199999 avg: 1649 max: 9363 99.9999th percentile: 8579 overflows: 0", It is not big difference with 5.10.180 for avg and max. Closes-Bug: 2025123 Change-Id: Ia4d825573e03a8c6f03a4c5f53104db5903f41ae Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
29 lines
1.4 KiB
Plaintext
29 lines
1.4 KiB
Plaintext
0001-kernel-std-Remove-the-old-changelog-file.patch
|
|
0002-kernel-std-Add-a-new-changelog-file-for-linux-yocto-.patch
|
|
0003-kernel-std-Add-a-kernel-config-file-for-stx-debian.patch
|
|
0004-kernel-std-Adapt-the-debian-folder-for-new-source.patch
|
|
0005-kernel-modules-sign-kernel-modules.patch
|
|
0006-Debian-align-config-file-with-stx-centos.patch
|
|
0007-Debian-update-5.10-Kernel-to-5.10.99.patch
|
|
0008-config-set-configs-needed-for-secure-boot.patch
|
|
0009-Drop-Android-patches.patch
|
|
0010-Debian-Disable-CONFIG_BNXT.patch
|
|
0011-Debian-Hardcode-net.naming-scheme-in-CONFIG_CMDLINE.patch
|
|
0012-Debian-update-5.10-Kernel-to-5.10.112.patch
|
|
0013-kernel-std-fix-proc-version-content.patch
|
|
0014-kernel-std-clean-patches-from-debian-release.patch
|
|
0015-Debian-Added-apparmor-security-module.patch
|
|
0016-debian-rules.real-Parallelize-xz-compression.patch
|
|
0017-Debian-Enable-WireGuard-config.patch
|
|
0018-Place-module-signing-keys-in-a-separate-packa.patch
|
|
0019-Upgrade-5.10-kernel-to-5.10.152.patch
|
|
0020-kernel-std-unset-LOCK_DOWN_IN_EFI_SECURE_BOOT.patch
|
|
0021-config-don-t-unset-CONFIG_EFIVAR_FS.patch
|
|
0022-Upgrade-5.10-kernel-to-5.10.162.patch
|
|
0023-Fix-badly-formatted-trailer-line.patch
|
|
0024-Upgrade-5.10-kernel-to-5.10.177.patch
|
|
0025-Disable-unprivileged-eBPF-by-default.patch
|
|
0026-Upgrade-5.10-kernel-to-5.10.180.patch
|
|
0027-config-Enable-Intel-RAPL-and-uncore-frequency-contro.patch
|
|
0028-Upgrade-5.10-kernel-to-5.10.185.patch
|