summaryrefslogtreecommitdiffstats
path: root/patches/packages
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-11-21 21:15:30 +0000
committer Eric Hameleers <alien@slackware.com>2023-11-22 13:30:37 +0100
commit151fc86d2595ab8bd3bf28eb38280bfb40db2dd7 (patch)
treee2e85adc990264ebc6dacb776b7bff08eb80b8ab /patches/packages
parent4989eb7599ec6d777838c4fbc5644255dae0e963 (diff)
downloadcurrent-e5ea114c07a1a9a71c3db9a5057b079d06bc970a.tar.gz
current-e5ea114c07a1a9a71c3db9a5057b079d06bc970a.tar.xz
Tue Nov 21 21:15:30 UTC 202320231121211530_15.0
patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded. Updated to the latest kernel firmware. patches/packages/linux-5.15.139/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.116: https://www.cve.org/CVERecord?id=CVE-2023-35788 https://www.cve.org/CVERecord?id=CVE-2022-45887 https://www.cve.org/CVERecord?id=CVE-2022-45886 https://www.cve.org/CVERecord?id=CVE-2023-3212 https://www.cve.org/CVERecord?id=CVE-2022-45919 Fixed in 5.15.117: https://www.cve.org/CVERecord?id=CVE-2023-2124 https://www.cve.org/CVERecord?id=CVE-2023-34255 Fixed in 5.15.118: https://www.cve.org/CVERecord?id=CVE-2023-3609 https://www.cve.org/CVERecord?id=CVE-2023-3117 https://www.cve.org/CVERecord?id=CVE-2023-3390 https://www.cve.org/CVERecord?id=CVE-2023-3338 Fixed in 5.15.119: https://www.cve.org/CVERecord?id=CVE-2023-3610 Fixed in 5.15.121: https://www.cve.org/CVERecord?id=CVE-2023-31248 https://www.cve.org/CVERecord?id=CVE-2023-38432 https://www.cve.org/CVERecord?id=CVE-2023-3866 https://www.cve.org/CVERecord?id=CVE-2023-2898 https://www.cve.org/CVERecord?id=CVE-2023-44466 https://www.cve.org/CVERecord?id=CVE-2023-4132 https://www.cve.org/CVERecord?id=CVE-2023-3611 https://www.cve.org/CVERecord?id=CVE-2022-48502 https://www.cve.org/CVERecord?id=CVE-2023-3865 https://www.cve.org/CVERecord?id=CVE-2023-35001 https://www.cve.org/CVERecord?id=CVE-2023-3776 https://www.cve.org/CVERecord?id=CVE-2023-3863 Fixed in 5.15.122: https://www.cve.org/CVERecord?id=CVE-2023-20593 Fixed in 5.15.123: https://www.cve.org/CVERecord?id=CVE-2023-3777 https://www.cve.org/CVERecord?id=CVE-2023-4004 Fixed in 5.15.124: https://www.cve.org/CVERecord?id=CVE-2023-4015 https://www.cve.org/CVERecord?id=CVE-2023-4147 https://www.cve.org/CVERecord?id=CVE-2023-1206 Fixed in 5.15.125: https://www.cve.org/CVERecord?id=CVE-2022-40982 https://www.cve.org/CVERecord?id=CVE-2023-20569 Fixed in 5.15.126: https://www.cve.org/CVERecord?id=CVE-2023-20588 https://www.cve.org/CVERecord?id=CVE-2023-4128 https://www.cve.org/CVERecord?id=CVE-2023-4208 https://www.cve.org/CVERecord?id=CVE-2023-4206 https://www.cve.org/CVERecord?id=CVE-2023-4207 https://www.cve.org/CVERecord?id=CVE-2023-40283 Fixed in 5.15.128: https://www.cve.org/CVERecord?id=CVE-2023-4569 https://www.cve.org/CVERecord?id=CVE-2023-39194 https://www.cve.org/CVERecord?id=CVE-2023-4273 https://www.cve.org/CVERecord?id=CVE-2023-3772 Fixed in 5.15.132: https://www.cve.org/CVERecord?id=CVE-2023-4921 https://www.cve.org/CVERecord?id=CVE-2023-4623 https://www.cve.org/CVERecord?id=CVE-2023-42753 https://www.cve.org/CVERecord?id=CVE-2023-42752 https://www.cve.org/CVERecord?id=CVE-2023-39189 https://www.cve.org/CVERecord?id=CVE-2023-4881 https://www.cve.org/CVERecord?id=CVE-2023-45871 https://www.cve.org/CVERecord?id=CVE-2023-39193 https://www.cve.org/CVERecord?id=CVE-2023-39192 Fixed in 5.15.133: https://www.cve.org/CVERecord?id=CVE-2023-42755 Fixed in 5.15.134: https://www.cve.org/CVERecord?id=CVE-2023-42754 https://www.cve.org/CVERecord?id=CVE-2023-4563 https://www.cve.org/CVERecord?id=CVE-2023-4244 https://www.cve.org/CVERecord?id=CVE-2023-5197 Fixed in 5.15.135: https://www.cve.org/CVERecord?id=CVE-2023-34324 https://www.cve.org/CVERecord?id=CVE-2023-31085 https://www.cve.org/CVERecord?id=CVE-2023-5158 Fixed in 5.15.136: https://www.cve.org/CVERecord?id=CVE-2023-35827 Fixed in 5.15.137: https://www.cve.org/CVERecord?id=CVE-2023-46813 https://www.cve.org/CVERecord?id=CVE-2023-5717 https://www.cve.org/CVERecord?id=CVE-2023-5178 (* Security fix *) patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txz: Upgraded. This update contains security fixes and improvements. Thanks to zuriel for the taskbar icon fix on Wayland. :-) For more information, see: https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2023-50/ https://www.cve.org/CVERecord?id=CVE-2023-6204 https://www.cve.org/CVERecord?id=CVE-2023-6205 https://www.cve.org/CVERecord?id=CVE-2023-6206 https://www.cve.org/CVERecord?id=CVE-2023-6207 https://www.cve.org/CVERecord?id=CVE-2023-6208 https://www.cve.org/CVERecord?id=CVE-2023-6209 https://www.cve.org/CVERecord?id=CVE-2023-6212 (* Security fix *)
Diffstat (limited to 'patches/packages')
-rw-r--r--patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt (renamed from patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt)0
-rw-r--r--patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt11
-rw-r--r--patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt11
-rw-r--r--patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt11
-rw-r--r--patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt11
-rw-r--r--patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt11
-rw-r--r--patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt (renamed from patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt)0
7 files changed, 55 insertions, 0 deletions
diff --git a/patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt b/patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt
index 4b07a89f4..4b07a89f4 100644
--- a/patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt
+++ b/patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt
diff --git a/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt
new file mode 100644
index 000000000..975a5ba6d
--- /dev/null
+++ b/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt
@@ -0,0 +1,11 @@
+kernel-generic: kernel-generic (a general purpose SMP Linux kernel)
+kernel-generic:
+kernel-generic: This is a Linux kernel with built-in support for most disk
+kernel-generic: controllers. To use filesystems, or to load support for a SCSI or
+kernel-generic: other controller, then you'll need to load one or more kernel
+kernel-generic: modules using an initial ramdisk, or initrd. For more information
+kernel-generic: about creating an initrd, see the README.initrd file in the /boot
+kernel-generic: directory.
+kernel-generic:
+kernel-generic: SMP is "Symmetric multiprocessing", or multiple CPU/core support.
+kernel-generic:
diff --git a/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt b/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt
new file mode 100644
index 000000000..27b46a0e6
--- /dev/null
+++ b/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt
@@ -0,0 +1,11 @@
+kernel-headers: kernel-headers (Linux kernel include files)
+kernel-headers:
+kernel-headers: These are the include files from the Linux kernel.
+kernel-headers:
+kernel-headers: You'll need these to compile most system software for Linux.
+kernel-headers:
+kernel-headers:
+kernel-headers:
+kernel-headers:
+kernel-headers:
+kernel-headers:
diff --git a/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt
new file mode 100644
index 000000000..2d6170611
--- /dev/null
+++ b/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt
@@ -0,0 +1,11 @@
+kernel-huge: kernel-huge (a fully-loaded SMP Linux kernel)
+kernel-huge:
+kernel-huge: This is a Linux kernel with built-in support for most disk
+kernel-huge: controllers. If you're looking for a more stripped down kernel
+kernel-huge: (this one contains everything but the kitchen sink ;-), then install
+kernel-huge: the kernel-generic in the /boot directory along with an initrd to
+kernel-huge: load support for your boot device and filesystem. For instructions
+kernel-huge: on the initrd, see README.initrd in the /boot directory.
+kernel-huge:
+kernel-huge: SMP is "Symmetric multiprocessing", or multiple CPU/core support.
+kernel-huge:
diff --git a/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt
new file mode 100644
index 000000000..9a9441043
--- /dev/null
+++ b/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt
@@ -0,0 +1,11 @@
+kernel-modules: kernel-modules (Linux kernel modules)
+kernel-modules:
+kernel-modules: Kernel modules are pieces of code that can be loaded and unloaded into
+kernel-modules: the kernel upon demand. They extend the functionality of the kernel
+kernel-modules: without the need to reboot the system. These modules provide support
+kernel-modules: for hardware such as USB devices, RAID controllers, network
+kernel-modules: interfaces, and display devices, or add other additional capabilities
+kernel-modules: to the kernel.
+kernel-modules:
+kernel-modules:
+kernel-modules:
diff --git a/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt b/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt
new file mode 100644
index 000000000..eb2b0a30c
--- /dev/null
+++ b/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt
@@ -0,0 +1,11 @@
+kernel-source: kernel-source (Linux kernel source)
+kernel-source:
+kernel-source: Source code for Linus Torvalds' Linux kernel.
+kernel-source:
+kernel-source: This is the complete and unmodified source code for the Linux kernel.
+kernel-source:
+kernel-source:
+kernel-source:
+kernel-source:
+kernel-source:
+kernel-source:
diff --git a/patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt b/patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt
index 9d8594319..9d8594319 100644
--- a/patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt
+++ b/patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt