Definition List

17 Oct 2013

Linux Kernel 3.4.29 LTS Is Available For Download

Linux kernel 3.4.29 introduces a lot of various fixes, as well as driver improvements and improved Arch support.


Greg Kroah-Hartman announced the immediate availability for download of Linux kernel 3.4.29 LTS (long-term support).

Highlights of Linux kernel 3.4.29 LTS:

• Incorrect strncpy() has been fixed in hidp_setup_hid();
• A typo in PCIe adapter NULL check has been fixed;
• DMAR has been disabled for g4x integrated gfx;
• Pass a proper identity mapping in efi_call_phys_prelog;
• A fixup for Packard-Bell desktop with ALC880 has been implemented.

A complete list of changes and fixes can be found in the official
 mailing list.

“I'm announcing the release of the 3.4.29 kernel. All users of the 3.4 kernel series should upgrade or risk being turned into pumpkins.”

“The updated 3.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.4.y and can be browsed at the normal kernel.org git web browser:
 http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git,” said Greg Kroah-Hartman in the email announcement.

Users of the Linux kernel 3.4.x branch are urged to update to the
 new version as soon as possible.

Download Linux kernel 3.4.29
 LTS right now from Softpedia.

Related Posts:

  • Demo Of Basic SQL injection for website hacking You might have seen hackers hacking and defaceing websites, editing it with their own stuff, makeing post on websites etc. There are many methods of doing this, In this tutorial I will be showing you a very basic and simp… Read More
  • Hacking:-Best Hacking Tricks To Increase Your Internet Speed we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internet much … Read More
  • Hacking:-Lock your PRIVATE FOLDER 1. Make a folder on the desktop and name it as “folder” 2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as. 3. In the ‘save as’ name it as lo… Read More
  • How to detect a hacker attack How to detect a hacker attack Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the syste… Read More
  • Proxy and Anonymous Internet surfing 1) What is a proxy? A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet : Normal : Computer --------> Internet With proxy : Computer ---------> Proxy… Read More

0 comments:

Post a Comment