summaryrefslogtreecommitdiffstats
path: root/source/k/kernel-configs/config-huge-smp-5.4.34-smp (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fri Apr 24 18:54:41 UTC 202020200424185441 Patrick J Volkerding2020-04-251-9466/+0
| | | | | | | | | | | | | | | | | | | | | | | | a/bash-5.0.017-x86_64-1.txz: Upgraded. a/kernel-generic-5.4.35-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.35-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.35-x86_64-1.txz: Upgraded. a/mcelog-169-x86_64-1.txz: Upgraded. ap/nvme-cli-1.11.1-x86_64-1.txz: Upgraded. ap/powertop-2.12-x86_64-1.txz: Upgraded. ap/tmux-3.1-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.35-x86-1.txz: Upgraded. d/parallel-20200422-noarch-1.txz: Upgraded. d/rust-1.43.0-x86_64-1.txz: Upgraded. d/vala-0.48.5-x86_64-1.txz: Upgraded. k/kernel-source-5.4.35-noarch-1.txz: Upgraded. l/gmm-5.4-noarch-1.txz: Upgraded. l/librsvg-2.48.4-x86_64-1.txz: Upgraded. l/sip-4.19.22-x86_64-1.txz: Upgraded. n/dhcpcd-8.1.9-x86_64-1.txz: Upgraded. x/mesa-20.0.5-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
* Wed Apr 22 02:19:37 UTC 202020200422021937 Patrick J Volkerding2020-04-221-0/+9466
a/kernel-firmware-20200421_78c0348-noarch-1.txz: Upgraded. a/kernel-generic-5.4.34-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.34-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.34-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1g-x86_64-1.txz: Upgraded. d/git-2.26.2-x86_64-1.txz: Upgraded. This update fixes a security issue: With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the credentials are not for a host of the attacker's choosing; instead, they are for some unspecified host (based on how the configured credential helper handles an absent "host" parameter). For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008 (* Security fix *) d/kernel-headers-5.4.34-x86-1.txz: Upgraded. d/vala-0.48.4-x86_64-1.txz: Upgraded. k/kernel-source-5.4.34-noarch-1.txz: Upgraded. INFINIBAND_CXGB3 n -> m INFINIBAND_IPOIB_CM n -> y INFINIBAND_IPOIB_DEBUG_DATA n -> y Thanks to Karl Magnus Kolstø. l/M2Crypto-0.35.2-x86_64-4.txz: Rebuilt. Don't package typing-3.7.4.1 for python3. l/netpbm-10.90.01-x86_64-1.txz: Upgraded. n/openssl-1.1.1g-x86_64-1.txz: Upgraded. This update fixes a security issue: Fixed segmentation fault in SSL_check_chain() that could be exploited by a malicious peer in a Denial of Service attack. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967 (* Security fix *) x/libva-2.7.1-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/PAM/openvpn-2.4.9-x86_64-1_pam.txz: Upgraded. This update fixes a security issue: Fix illegal client float. Thanks to Lev Stipakov. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810 (* Security fix *) usb-and-pxe-installers/usbboot.img: Rebuilt.