diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-11-21 21:15:30 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-11-22 13:30:37 +0100 |
commit | 151fc86d2595ab8bd3bf28eb38280bfb40db2dd7 (patch) | |
tree | e2e85adc990264ebc6dacb776b7bff08eb80b8ab /patches/packages | |
parent | 4989eb7599ec6d777838c4fbc5644255dae0e963 (diff) | |
download | current-e5ea114c07a1a9a71c3db9a5057b079d06bc970a.tar.gz current-e5ea114c07a1a9a71c3db9a5057b079d06bc970a.tar.xz |
Tue Nov 21 21:15:30 UTC 202320231121211530_15.0
patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded.
Updated to the latest kernel firmware.
patches/packages/linux-5.15.139/*: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.116:
https://www.cve.org/CVERecord?id=CVE-2023-35788
https://www.cve.org/CVERecord?id=CVE-2022-45887
https://www.cve.org/CVERecord?id=CVE-2022-45886
https://www.cve.org/CVERecord?id=CVE-2023-3212
https://www.cve.org/CVERecord?id=CVE-2022-45919
Fixed in 5.15.117:
https://www.cve.org/CVERecord?id=CVE-2023-2124
https://www.cve.org/CVERecord?id=CVE-2023-34255
Fixed in 5.15.118:
https://www.cve.org/CVERecord?id=CVE-2023-3609
https://www.cve.org/CVERecord?id=CVE-2023-3117
https://www.cve.org/CVERecord?id=CVE-2023-3390
https://www.cve.org/CVERecord?id=CVE-2023-3338
Fixed in 5.15.119:
https://www.cve.org/CVERecord?id=CVE-2023-3610
Fixed in 5.15.121:
https://www.cve.org/CVERecord?id=CVE-2023-31248
https://www.cve.org/CVERecord?id=CVE-2023-38432
https://www.cve.org/CVERecord?id=CVE-2023-3866
https://www.cve.org/CVERecord?id=CVE-2023-2898
https://www.cve.org/CVERecord?id=CVE-2023-44466
https://www.cve.org/CVERecord?id=CVE-2023-4132
https://www.cve.org/CVERecord?id=CVE-2023-3611
https://www.cve.org/CVERecord?id=CVE-2022-48502
https://www.cve.org/CVERecord?id=CVE-2023-3865
https://www.cve.org/CVERecord?id=CVE-2023-35001
https://www.cve.org/CVERecord?id=CVE-2023-3776
https://www.cve.org/CVERecord?id=CVE-2023-3863
Fixed in 5.15.122:
https://www.cve.org/CVERecord?id=CVE-2023-20593
Fixed in 5.15.123:
https://www.cve.org/CVERecord?id=CVE-2023-3777
https://www.cve.org/CVERecord?id=CVE-2023-4004
Fixed in 5.15.124:
https://www.cve.org/CVERecord?id=CVE-2023-4015
https://www.cve.org/CVERecord?id=CVE-2023-4147
https://www.cve.org/CVERecord?id=CVE-2023-1206
Fixed in 5.15.125:
https://www.cve.org/CVERecord?id=CVE-2022-40982
https://www.cve.org/CVERecord?id=CVE-2023-20569
Fixed in 5.15.126:
https://www.cve.org/CVERecord?id=CVE-2023-20588
https://www.cve.org/CVERecord?id=CVE-2023-4128
https://www.cve.org/CVERecord?id=CVE-2023-4208
https://www.cve.org/CVERecord?id=CVE-2023-4206
https://www.cve.org/CVERecord?id=CVE-2023-4207
https://www.cve.org/CVERecord?id=CVE-2023-40283
Fixed in 5.15.128:
https://www.cve.org/CVERecord?id=CVE-2023-4569
https://www.cve.org/CVERecord?id=CVE-2023-39194
https://www.cve.org/CVERecord?id=CVE-2023-4273
https://www.cve.org/CVERecord?id=CVE-2023-3772
Fixed in 5.15.132:
https://www.cve.org/CVERecord?id=CVE-2023-4921
https://www.cve.org/CVERecord?id=CVE-2023-4623
https://www.cve.org/CVERecord?id=CVE-2023-42753
https://www.cve.org/CVERecord?id=CVE-2023-42752
https://www.cve.org/CVERecord?id=CVE-2023-39189
https://www.cve.org/CVERecord?id=CVE-2023-4881
https://www.cve.org/CVERecord?id=CVE-2023-45871
https://www.cve.org/CVERecord?id=CVE-2023-39193
https://www.cve.org/CVERecord?id=CVE-2023-39192
Fixed in 5.15.133:
https://www.cve.org/CVERecord?id=CVE-2023-42755
Fixed in 5.15.134:
https://www.cve.org/CVERecord?id=CVE-2023-42754
https://www.cve.org/CVERecord?id=CVE-2023-4563
https://www.cve.org/CVERecord?id=CVE-2023-4244
https://www.cve.org/CVERecord?id=CVE-2023-5197
Fixed in 5.15.135:
https://www.cve.org/CVERecord?id=CVE-2023-34324
https://www.cve.org/CVERecord?id=CVE-2023-31085
https://www.cve.org/CVERecord?id=CVE-2023-5158
Fixed in 5.15.136:
https://www.cve.org/CVERecord?id=CVE-2023-35827
Fixed in 5.15.137:
https://www.cve.org/CVERecord?id=CVE-2023-46813
https://www.cve.org/CVERecord?id=CVE-2023-5717
https://www.cve.org/CVERecord?id=CVE-2023-5178
(* Security fix *)
patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to zuriel for the taskbar icon fix on Wayland. :-)
For more information, see:
https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-50/
https://www.cve.org/CVERecord?id=CVE-2023-6204
https://www.cve.org/CVERecord?id=CVE-2023-6205
https://www.cve.org/CVERecord?id=CVE-2023-6206
https://www.cve.org/CVERecord?id=CVE-2023-6207
https://www.cve.org/CVERecord?id=CVE-2023-6208
https://www.cve.org/CVERecord?id=CVE-2023-6209
https://www.cve.org/CVERecord?id=CVE-2023-6212
(* Security fix *)
Diffstat (limited to 'patches/packages')
-rw-r--r-- | patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt (renamed from patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt) | 0 | ||||
-rw-r--r-- | patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt | 11 | ||||
-rw-r--r-- | patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt | 11 | ||||
-rw-r--r-- | patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt | 11 | ||||
-rw-r--r-- | patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt | 11 | ||||
-rw-r--r-- | patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt | 11 | ||||
-rw-r--r-- | patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt (renamed from patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt) | 0 |
7 files changed, 55 insertions, 0 deletions
diff --git a/patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt b/patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt index 4b07a89f4..4b07a89f4 100644 --- a/patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txt +++ b/patches/packages/kernel-firmware-20231120_9552083-noarch-1.txt diff --git a/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt new file mode 100644 index 000000000..975a5ba6d --- /dev/null +++ b/patches/packages/linux-5.15.139/kernel-generic-5.15.139-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-generic: kernel-generic (a general purpose SMP Linux kernel) +kernel-generic: +kernel-generic: This is a Linux kernel with built-in support for most disk +kernel-generic: controllers. To use filesystems, or to load support for a SCSI or +kernel-generic: other controller, then you'll need to load one or more kernel +kernel-generic: modules using an initial ramdisk, or initrd. For more information +kernel-generic: about creating an initrd, see the README.initrd file in the /boot +kernel-generic: directory. +kernel-generic: +kernel-generic: SMP is "Symmetric multiprocessing", or multiple CPU/core support. +kernel-generic: diff --git a/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt b/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt new file mode 100644 index 000000000..27b46a0e6 --- /dev/null +++ b/patches/packages/linux-5.15.139/kernel-headers-5.15.139-x86-1.txt @@ -0,0 +1,11 @@ +kernel-headers: kernel-headers (Linux kernel include files) +kernel-headers: +kernel-headers: These are the include files from the Linux kernel. +kernel-headers: +kernel-headers: You'll need these to compile most system software for Linux. +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: diff --git a/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt new file mode 100644 index 000000000..2d6170611 --- /dev/null +++ b/patches/packages/linux-5.15.139/kernel-huge-5.15.139-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-huge: kernel-huge (a fully-loaded SMP Linux kernel) +kernel-huge: +kernel-huge: This is a Linux kernel with built-in support for most disk +kernel-huge: controllers. If you're looking for a more stripped down kernel +kernel-huge: (this one contains everything but the kitchen sink ;-), then install +kernel-huge: the kernel-generic in the /boot directory along with an initrd to +kernel-huge: load support for your boot device and filesystem. For instructions +kernel-huge: on the initrd, see README.initrd in the /boot directory. +kernel-huge: +kernel-huge: SMP is "Symmetric multiprocessing", or multiple CPU/core support. +kernel-huge: diff --git a/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt b/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt new file mode 100644 index 000000000..9a9441043 --- /dev/null +++ b/patches/packages/linux-5.15.139/kernel-modules-5.15.139-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-modules: kernel-modules (Linux kernel modules) +kernel-modules: +kernel-modules: Kernel modules are pieces of code that can be loaded and unloaded into +kernel-modules: the kernel upon demand. They extend the functionality of the kernel +kernel-modules: without the need to reboot the system. These modules provide support +kernel-modules: for hardware such as USB devices, RAID controllers, network +kernel-modules: interfaces, and display devices, or add other additional capabilities +kernel-modules: to the kernel. +kernel-modules: +kernel-modules: +kernel-modules: diff --git a/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt b/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt new file mode 100644 index 000000000..eb2b0a30c --- /dev/null +++ b/patches/packages/linux-5.15.139/kernel-source-5.15.139-noarch-1.txt @@ -0,0 +1,11 @@ +kernel-source: kernel-source (Linux kernel source) +kernel-source: +kernel-source: Source code for Linus Torvalds' Linux kernel. +kernel-source: +kernel-source: This is the complete and unmodified source code for the Linux kernel. +kernel-source: +kernel-source: +kernel-source: +kernel-source: +kernel-source: +kernel-source: diff --git a/patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt b/patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt index 9d8594319..9d8594319 100644 --- a/patches/packages/mozilla-firefox-115.4.0esr-x86_64-1_slack15.0.txt +++ b/patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txt |