diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-10-05 18:55:36 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-10-06 07:00:20 +0200 |
commit | ae24d0ad56e1be82b3d0dd19d312c84f61fae762 (patch) | |
tree | 07ed12f2495cdd92584f7e91e3c93b87d59df4e3 /isolinux/message.txt | |
parent | 10ffd711f75123532b9294a13be95be84d553765 (diff) | |
download | current-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.gz |
Wed Oct 5 18:55:36 UTC 202220221005185536
a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded.
a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded.
a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded.
d/kernel-headers-5.19.14-x86-1.txz: Upgraded.
k/kernel-source-5.19.14-noarch-1.txz: Upgraded.
n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded.
This update fixes two security issues:
Corrected a reference count leak that occurs when the server builds
responses to leasequery packets.
Corrected a memory leak that occurs when unpacking a packet that has an
FQDN option (81) that contains a label with length greater than 63 bytes.
Thanks to VictorV of Cyber Kunlun Lab for reporting these issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux/message.txt')
-rw-r--r-- | isolinux/message.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt index fe71a7a8..82e206e4 100644 --- a/isolinux/message.txt +++ b/isolinux/message.txt @@ -1,5 +1,5 @@ -Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.19.13)! +Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.19.14)! If you need to pass extra parameters to the kernel, enter them at the prompt below after the name of the kernel to boot (e.g., huge.s). |