summaryrefslogtreecommitdiffstats
path: root/slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz
diff options
context:
space:
mode:
authorAdrien Nader <adrien@notk.org>2014-11-08 01:36:05 +0100
committerAdrien Nader <adrien@notk.org>2014-11-08 01:36:05 +0100
commit782306be04f1fbc8faf83f3edc31f02ac3d4d9b9 (patch)
tree9aa6c7c7af5627da009f981f00f3f39b264a27fc /slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz
parent9075b478ad34517299460d93be259c461fa15e6d (diff)
Fri Nov 7 21:02:55 UTC 2014
a/bash-4.3.030-x86_64-1.txz: Upgraded. Applied all upstream patches. The previously applied patch requiring a specific prefix/suffix in order to parse variables for functions closed all of the known vulnerabilities anyway, but it's clear that until all the patches were applied that the "is this still vulnerable" questions were not going to end... a/btrfs-progs-20141107-x86_64-1.txz: Upgraded. Added the header files to the package. Thanks to Vincent Batts. a/kernel-firmware-20141106git-noarch-1.txz: Upgraded. a/kernel-generic-3.14.23-x86_64-1.txz: Upgraded. a/kernel-huge-3.14.23-x86_64-1.txz: Upgraded. a/kernel-modules-3.14.23-x86_64-1.txz: Upgraded. ap/mpg123-1.21.0-x86_64-1.txz: Upgraded. d/kernel-headers-3.14.23-x86-1.txz: Upgraded. k/kernel-source-3.14.23-noarch-1.txz: Upgraded. xfce/xfce4-weather-plugin-0.8.4-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz')
-rw-r--r--slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz1
1 files changed, 1 insertions, 0 deletions
diff --git a/slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz b/slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz
new file mode 100644
index 000000000..c7fec2cd0
--- /dev/null
+++ b/slackware64-current/slackware64/a/kernel-generic-3.14.23-x86_64-1.txz
@@ -0,0 +1 @@
+286d7717042de4345163c62b260c700a5ead3d1e