Differences

This shows you the differences between two versions of the page.

Link to this comparison view

news:2020:10:21:slackware64-14.2-changelog [2020/10/26 09:31] (current)
Giuseppe Di Terlizzi created
Line 1: Line 1:
 +====== Slackware64-14.2 ChangeLog (2020-10-21) ======
 +
 +====== Wed Oct 21 21:51:26 UTC 2020 ======
 +===== Packages =====
 +
 +==== Upgraded ====
 +  * [[slackware64.14.2>patches/packages/kernel-firmware-20201005_58d41d0-noarch-1.txz]]
 +  * [[slackware64.14.2>patches/packages/linux-4.4.240/*]] \\   These updates fix various bugs and security issues, including the recently \\   discovered "Bleeding Tooth" vulnerability in the Bluetooth subsystem \\   (CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490). \\   Be sure to upgrade your initrd after upgrading the kernel packages. \\   If you use lilo to boot your machine, be sure lilo.conf points to the correct \\   kernel and initrd and run lilo as root to update the bootloader. \\   If you use elilo to boot your machine, you should run eliloconfig to copy the \\   kernel and initrd to the EFI System Partition. \\   For more information, see: \\     Fixed in 4.4.228: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810 \\     Fixed in 4.4.229: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771 \\     Fixed in 4.4.230: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393 \\     Fixed in 4.4.232: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323 \\     Fixed in 4.4.233: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073 \\     Fixed in 4.4.234: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314 \\     Fixed in 4.4.236: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285 \\     Fixed in 4.4.237: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390 \\     Fixed in 4.4.238: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643 \\     Fixed in 4.4.239: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211 \\     Fixed in 4.4.240: \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352 \\     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490 \\   (* Security fix *)
 +
 +
 +{{tag>slackware changelog slackware64-14.2 2020/10}}
  
  • news/2020/10/21/slackware64-14.2-changelog.txt
  • Last modified: 6 weeks ago
  • by Giuseppe Di Terlizzi