News: 0000838315

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Security updates for Wednesday

([Security] Nov 25, 2020 15:49 UTC (Wed) (ris))


Dist.

ID

Release

Package

Date

Debian

[1]DSA-4798-1

stable

spip

2020-11-25

Debian

[2]DSA-4797-1

stable

webkit2gtk

2020-11-24

Fedora

[3]FEDORA-2020-4700a73bd5

F32

kernel

2020-11-25

Fedora

[4]FEDORA-2020-8c15928d23

F33

kernel

2020-11-25

Fedora

[5]FEDORA-2020-0aa0fc1b0c

F32

libexif

2020-11-25

openSUSE

[6]openSUSE-SU-2020:2013-1

chromium

2020-11-25

openSUSE

[7]openSUSE-SU-2020:2012-1

chromium

2020-11-25

openSUSE

[8]openSUSE-SU-2020:2010-1

chromium

2020-11-25

openSUSE

[9]openSUSE-SU-2020:2008-1

15.2

rclone

2020-11-24

Slackware

[10]SSA:2020-329-01

mutt

2020-11-24

SUSE

[11]SUSE-SU-2020:3501-1

OS7 SLE12

kernel

2020-11-24

SUSE

[12]SUSE-SU-2020:3503-1

OS8 SLE12 SES5

kernel

2020-11-24

SUSE

[13]SUSE-SU-2020:3512-1

SLE12

kernel

2020-11-25

SUSE

[14]SUSE-SU-2020:3513-1

SLE15

kernel

2020-11-25

SUSE

[15]SUSE-SU-2020:3507-1

SLE15

kernel

2020-11-24

SUSE

[16]SUSE-SU-2020:3507-1

SLE15

kernel

2020-11-24

SUSE

[17]SUSE-SU-2020:3500-1

SLE15

mariadb

2020-11-24

SUSE

[18]SUSE-SU-2020:3506-1

SLE15

slurm

2020-11-24

SUSE

[19]SUSE-SU-2020:3505-1

SLE15

slurm

2020-11-24

Ubuntu

[20]USN-4644-1

16.04 18.04

igraph

2020-11-24



[1] https://lwn.net/Articles/838295/

[2] https://lwn.net/Articles/838296/

[3] https://lwn.net/Articles/838297/

[4] https://lwn.net/Articles/838298/

[5] https://lwn.net/Articles/838299/

[6] https://lwn.net/Articles/838302/

[7] https://lwn.net/Articles/838301/

[8] https://lwn.net/Articles/838300/

[9] https://lwn.net/Articles/838303/

[10] https://lwn.net/Articles/838304/

[11] https://lwn.net/Articles/838305/

[12] https://lwn.net/Articles/838306/

[13] https://lwn.net/Articles/838309/

[14] https://lwn.net/Articles/838310/

[15] https://lwn.net/Articles/838308/

[16] https://lwn.net/Articles/838307/

[17] https://lwn.net/Articles/838311/

[18] https://lwn.net/Articles/838313/

[19] https://lwn.net/Articles/838312/

[20] https://lwn.net/Articles/838314/

Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"