[2024-05-17]: We are pleased to announce the release of the first version of OpenCloudOS 9.2, which will serve as the baseline version of OC9.2, featuring kernel verison 6.6.30-4. The file pointing relationship is as follows: OpenCloudOS-9.2-x86_64-boot.iso -> OpenCloudOS-9.2-20240513.0-x86_64-boot.iso OpenCloudOS-9.2-x86_64-minimal.iso -> OpenCloudOS-9.2-20240513.0-x86_64-minimal.iso OpenCloudOS-9.2-x86_64-everything.iso -> OpenCloudOS-9.2-20240513.0-x86_64-everything.iso [2024-07-16]: Update monthly version OpenCloudOS-9.2-20240701.0. Typically includes: fixed rpm packages for recently discovered bugs, security fixes, and optimization or upgrades for some rpm packages. Special note the following updates: - kernel update to version 6.6.34-9. - openssh update to version 9.3p2-11,which has fixed the race condition vulnerability in openssh-7.1p2-audit-race-condition.patch and further addressed the issue that related to low-memory environments when using SSH channel multiplexing to execute multiple commands concurrently during the initial connection, which could result in a segfault when reaching the cipher_free function and lead to occasional connection failures. [2024-08-22]: Update monthly version OpenCloudOS-9.2-20240807.0. Typically includes: fixed rpm packages for recently discovered bugs, security fixes, and optimization or upgrades for some rpm packages. Special note the following updates: - openssh has been updated to version 9.3p2-13, several community patches have been added to address bugs and improve functionality,and also fixed CVE-2024-6387. [2024-09-30]: Update monthly version OpenCloudOS-9.2-20240923.1. Typically includes: fixed rpm packages for recently discovered bugs, security fixes, and optimization or upgrades for some rpm packages. Special note the following updates: - python3.11 has been updated to version 3.11.6-10, incorporating the upstream fix for issue (GH-121286) (#123639), which removes backtracking when parsing tarfile headers to enhance efficiency and security. Additionally, we have addressed the critical vulnerability CVE-2024-6232.