summaryrefslogtreecommitdiffstats
path: root/source/k/kernel-configs/config-huge-6.6.6.x64 (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Wed Dec 13 22:01:34 UTC 202320231213220134 Patrick J Volkerding2023-12-131-11052/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | a/kernel-firmware-20231212_c52dc25-noarch-1.txz: Upgraded. a/kernel-generic-6.6.7-x86_64-1.txz: Upgraded. a/kernel-huge-6.6.7-x86_64-1.txz: Upgraded. a/kernel-modules-6.6.7-x86_64-1.txz: Upgraded. d/kernel-headers-6.6.7-x86-1.txz: Upgraded. k/kernel-source-6.6.7-noarch-1.txz: Upgraded. kde/okteta-0.26.14-x86_64-1.txz: Upgraded. l/enchant-2.6.4-x86_64-1.txz: Upgraded. l/libxml2-2.12.3-x86_64-1.txz: Upgraded. l/v4l-utils-1.26.1-x86_64-1.txz: Upgraded. x/xorg-server-21.1.10-x86_64-1.txz: Upgraded. This update fixes two security issues: Out-of-bounds memory write in XKB button actions. Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty. For more information, see: https://lists.x.org/archives/xorg/2023-December/061517.html https://www.cve.org/CVERecord?id=CVE-2023-6377 https://www.cve.org/CVERecord?id=CVE-2023-6478 (* Security fix *) x/xorg-server-xephyr-21.1.10-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.10-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.10-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.2.3-x86_64-1.txz: Upgraded. This update fixes two security issues: Out-of-bounds memory write in XKB button actions. Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty. For more information, see: https://lists.x.org/archives/xorg/2023-December/061517.html https://www.cve.org/CVERecord?id=CVE-2023-6377 https://www.cve.org/CVERecord?id=CVE-2023-6478 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
* Mon Dec 11 22:18:13 UTC 202320231211221813 Patrick J Volkerding2023-12-121-0/+11052
We've gone ahead and moved the 6.6 kernel into the main tree. As previously mentioned when this branch first appeared in /testing, on the 32-bit side there are no longer any -smp labeled kernel packages, so if you were using those previously, you'll need to switch to using to kernel-generic or kernel-huge kernel, including the changes needed to your bootloader setup to load this instead of the -smp labeled kernel. Also, if you happen to be using a first generation Pentium M chip, you will need to append forcepae to your kernel command-line options. Enjoy! :-) a/kernel-firmware-20231211_f2e52a1-noarch-1.txz: Upgraded. a/kernel-generic-6.6.6-x86_64-1.txz: Upgraded. a/kernel-huge-6.6.6-x86_64-1.txz: Upgraded. a/kernel-modules-6.6.6-x86_64-1.txz: Upgraded. ap/qpdf-11.6.4-x86_64-1.txz: Upgraded. d/kernel-headers-6.6.6-x86-1.txz: Upgraded. k/kernel-source-6.6.6-noarch-1.txz: Upgraded. l/imagemagick-7.1.1_23-x86_64-1.txz: Upgraded. l/libsecret-0.21.2-x86_64-1.txz: Upgraded. Thanks to reddog83 and saxa. l/zxing-cpp-2.2.1-x86_64-1.txz: Upgraded. n/postfix-3.8.3-x86_64-2.txz: Rebuilt. OpenSSL upstream says that major versions are ABI/API compatible, so stop warning in the logs that they might not be. Thanks to gildbg and Markus Wiesner. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.