
This commit updates kernel to v5.10.205 to fix following CVE issues: 1.CVE-2023-51782: https://nvd.nist.gov/vuln/detail/CVE-2023-51782 2.CVE-2023-51781:https://nvd.nist.gov/vuln/detail/CVE-2023-51781 3.CVE-2023-51780: https://nvd.nist.gov/vuln/detail/CVE-2023-51780 4.CVE-2023-6531: https://nvd.nist.gov/vuln/detail/CVE-2023-6531 5.CVE-2023-6121: https://nvd.nist.gov/vuln/detail/CVE-2023-6121 6.CVE-2023-6546: https://nvd.nist.gov/vuln/detail/CVE-2023-6546 7.CVE-2023-6931: https://nvd.nist.gov/vuln/detail/CVE-2023-6931 8.CVE-2023-6932: https://nvd.nist.gov/vuln/detail/CVE-2023-6932 9.CVE-2023-6817: https://nvd.nist.gov/vuln/detail/CVE-2023-6817 10.CVE-2023-46862: https://nvd.nist.gov/vuln/detail/CVE-2023-46862 11.CVE-2023-39197: https://nvd.nist.gov/vuln/detail/CVE-2023-39197 12.CVE-2023-6176: https://nvd.nist.gov/vuln/detail/CVE-2023-6176 13.CVE-2023-4881: https://nvd.nist.gov/vuln/detail/CVE-2023-4881 14.CVE-2023-34324: https://nvd.nist.gov/vuln/detail/CVE-2023-34324 15.CVE-2023-5717: https://nvd.nist.gov/vuln/detail/CVE-2023-5717 16.CVE-2023-5178: https://nvd.nist.gov/vuln/detail/CVE-2023-5178 17.CVE-2023-46813: https://nvd.nist.gov/vuln/detail/CVE-2023-46813 18.CVE-2023-35827: https://nvd.nist.gov/vuln/detail/CVE-2023-35827 A local StarlingX kernel patch had already been integrated into the linux-yocto repository's v5.10/standard/preempt-rt/base branch after v5.10.198 as commit 2dccf008aa65 ("net: replace raw_write_seqcount_t_begin by do_raw_write_seqcount_begin"). Hence, we drop the following now-redundant local patch: 0083-net-replace-raw_write_seqcount_t_begin-by-do_raw_wri.patch. Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a AIO-DX lab with rt kernel. - Boot up successfully in the lab. - The sanity testing was done by our test team and no regression defect was found. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 259200000 avg: 1602 max: 4460 99.9999th percentile: 2737 overflows: 0". Given that the maximum and 99.9999 percentile latency values are well below 5 microseconds, the results are acceptable, and they are not significantly different than the ones acquired with kernel v5.10.198. Closes-Bug: 2043947 Change-Id: I558e40c4398428d73444bd4f50928c5248da0899 Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
35 lines
1.6 KiB
Plaintext
35 lines
1.6 KiB
Plaintext
0001-kernel-rt-Remove-the-old-changelog-file.patch
|
|
0002-kernel-rt-Add-a-new-changelog-file.patch
|
|
0003-kernel-rt-Add-a-kernel-config-file-for-stx-debian.patch
|
|
0004-kernel-rt-Adapt-the-debian-folder-for-new-source.patch
|
|
0005-kernel-modules-sign-kernel-modules.patch
|
|
0006-Debian-align-config-file-with-stx-centos.patch
|
|
0007-Debian-update-5.10-Kernel-to-5.10.99.patch
|
|
0008-config-set-configs-needed-for-secure-boot.patch
|
|
0009-Drop-Android-patches.patch
|
|
0010-Debian-Disable-CONFIG_BNXT.patch
|
|
0011-Debian-Hardcode-net.naming-scheme-in-CONFIG_CMDLINE.patch
|
|
0012-kernel-rt-add-rt-to-abiname.patch
|
|
0013-Debian-update-5.10-Kernel-to-5.10.112.patch
|
|
0014-kernel-rt-fix-proc-version-content.patch
|
|
0015-kernel-rt-clean-patches-from-debian-release.patch
|
|
0016-Debian-Added-apparmor-security-module.patch
|
|
0017-debian-rules.real-Parallelize-xz-compression.patch
|
|
0018-Debian-Enable-WireGuard-config.patch
|
|
0019-Place-module-signing-keys-in-a-separate-packa.patch
|
|
0020-Upgrade-5.10-kernel-to-5.10.152.patch
|
|
0021-kernel-rt-unset-LOCK_DOWN_IN_EFI_SECURE_BOOT.patch
|
|
0022-config-don-t-unset-CONFIG_EFIVAR_FS.patch
|
|
0023-Upgrade-5.10-kernel-to-5.10.162.patch
|
|
0024-Fix-badly-formatted-trailer-line.patch
|
|
0025-Upgrade-5.10-kernel-to-5.10.177.patch
|
|
0026-Disable-unprivileged-eBPF-by-default.patch
|
|
0027-Upgrade-5.10-kernel-to-5.10.180.patch
|
|
0028-config-Enable-Intel-RAPL-and-uncore-frequency-contro.patch
|
|
0029-Upgrade-5.10-kernel-to-5.10.185.patch
|
|
0030-Upgrade-5.10-kernel-to-5.10.189.patch
|
|
0031-kernel-rt-Add-pkgs-without-abiname-for-image-headers.patch
|
|
0032-Upgrade-5.10-kernel-to-5.10.192.patch
|
|
0033-Upgrade-5.10-kernel-to-5.10.198.patch
|
|
0034-Upgrade-5.10-kernel-to-5.10.205.patch
|