diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2021-01-06 22:59:38 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2021-01-07 08:59:48 +0100 |
commit | ba4a3a137963e8f2dd63d2c594cbbfd099a2bc47 (patch) | |
tree | abc50bfa097ac5e7989881d214de7834d08624be /ChangeLog.rss | |
parent | 8b1588afc8929eda7491496bfac0b004a1d88efc (diff) | |
download | current-ba4a3a137963e8f2dd63d2c594cbbfd099a2bc47.tar.gz current-ba4a3a137963e8f2dd63d2c594cbbfd099a2bc47.tar.xz |
Wed Jan 6 22:59:38 UTC 202120210106225938
a/kernel-generic-5.10.5-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.5-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.5-x86_64-1.txz: Upgraded.
d/kernel-headers-5.10.5-x86-1.txz: Upgraded.
d/meson-0.56.1-x86_64-1.txz: Upgraded.
k/kernel-source-5.10.5-noarch-1.txz: Upgraded.
We'll turn off the silent stream feature as there's a known deadlock bug that
remains in 5.10.5. Perhaps we'll restore it once that's patched... but we
made it this far without the feature so I'll probably wait for a case to be
made for it. Thanks to Petri Kaukasoina.
Also build the intelfb module. This doesn't have anything to do with the
lockups occurring on Intel systems, but we might as well provide the module.
It remains blacklisted by default.
FB_INTEL n -> m
SND_HDA_INTEL_HDMI_SILENT_STREAM y -> n
+FB_INTEL_DEBUG n
+FB_INTEL_I2C y
l/imagemagick-7.0.10_56-x86_64-1.txz: Upgraded.
x/ibus-table-1.12.3-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-78.6.1esr-x86_64-1.txz: Upgraded.
This release contains a security fix:
A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet
in a way that potentially resulted in a use-after-free. We presume that with
enough effort it could have been exploited to run arbitrary code.
For more information, see:
https://www.mozilla.org/en-US/firefox/78.6.1/releasenotes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 45 |
1 files changed, 43 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index fdd4b9f22..4dcdbd129 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,51 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 5 Jan 2021 22:42:46 GMT</pubDate> - <lastBuildDate>Wed, 6 Jan 2021 07:59:42 GMT</lastBuildDate> + <pubDate>Wed, 6 Jan 2021 22:59:38 GMT</pubDate> + <lastBuildDate>Thu, 7 Jan 2021 07:59:40 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.12</generator> <item> + <title>Wed, 6 Jan 2021 22:59:38 GMT</title> + <pubDate>Wed, 6 Jan 2021 22:59:38 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20210106225938</link> + <guid isPermaLink="false">20210106225938</guid> + <description> + <![CDATA[<pre> +a/kernel-generic-5.10.5-x86_64-1.txz: Upgraded. +a/kernel-huge-5.10.5-x86_64-1.txz: Upgraded. +a/kernel-modules-5.10.5-x86_64-1.txz: Upgraded. +d/kernel-headers-5.10.5-x86-1.txz: Upgraded. +d/meson-0.56.1-x86_64-1.txz: Upgraded. +k/kernel-source-5.10.5-noarch-1.txz: Upgraded. + We'll turn off the silent stream feature as there's a known deadlock bug that + remains in 5.10.5. Perhaps we'll restore it once that's patched... but we + made it this far without the feature so I'll probably wait for a case to be + made for it. Thanks to Petri Kaukasoina. + Also build the intelfb module. This doesn't have anything to do with the + lockups occurring on Intel systems, but we might as well provide the module. + It remains blacklisted by default. + FB_INTEL n -> m + SND_HDA_INTEL_HDMI_SILENT_STREAM y -> n + +FB_INTEL_DEBUG n + +FB_INTEL_I2C y +l/imagemagick-7.0.10_56-x86_64-1.txz: Upgraded. +x/ibus-table-1.12.3-x86_64-1.txz: Upgraded. +xap/mozilla-firefox-78.6.1esr-x86_64-1.txz: Upgraded. + This release contains a security fix: + A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet + in a way that potentially resulted in a use-after-free. We presume that with + enough effort it could have been exploited to run arbitrary code. + For more information, see: + https://www.mozilla.org/en-US/firefox/78.6.1/releasenotes/ + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044 + (* Security fix *) +isolinux/initrd.img: Rebuilt. +kernels/*: Upgraded. +usb-and-pxe-installers/usbboot.img: Rebuilt. + </pre>]]> + </description> + </item> + <item> <title>Tue, 5 Jan 2021 22:42:46 GMT</title> <pubDate>Tue, 5 Jan 2021 22:42:46 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20210105224246</link> |