summaryrefslogtreecommitdiff
path: root/isolinux/message.txt
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2022-10-05 18:55:36 +0000
committerEric Hameleers <alien@slackware.com>2022-10-06 07:00:20 +0200
commitae24d0ad56e1be82b3d0dd19d312c84f61fae762 (patch)
tree07ed12f2495cdd92584f7e91e3c93b87d59df4e3 /isolinux/message.txt
parent10ffd711f75123532b9294a13be95be84d553765 (diff)
downloadcurrent-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.gz
Wed Oct 5 18:55:36 UTC 202220221005185536
a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded. d/kernel-headers-5.19.14-x86-1.txz: Upgraded. k/kernel-source-5.19.14-noarch-1.txz: Upgraded. n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded. This update fixes two security issues: Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting these issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux/message.txt')
-rw-r--r--isolinux/message.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt
index fe71a7a8..82e206e4 100644
--- a/isolinux/message.txt
+++ b/isolinux/message.txt
@@ -1,5 +1,5 @@
-Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.19.13)!
+Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.19.14)!
If you need to pass extra parameters to the kernel, enter them at the prompt
below after the name of the kernel to boot (e.g., huge.s).