diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-03-17 19:46:28 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-03-18 06:59:44 +0100 |
commit | a55e318a865afebcd9ca91039ed256ce4e907f81 (patch) | |
tree | b07b4d25ff149f236acfe09ad7b03aa17298702d /isolinux | |
parent | ae74897d321c65aca844b23e4ae780fdd915185f (diff) | |
download | current-a55e318a865afebcd9ca91039ed256ce4e907f81.tar.gz |
Thu Mar 17 19:46:28 UTC 202220220317194628
Have a great day, everyone! Off to enjoy a couple Guinness. :-)
a/kernel-generic-5.16.15-x86_64-1.txz: Upgraded.
a/kernel-huge-5.16.15-x86_64-1.txz: Upgraded.
a/kernel-modules-5.16.15-x86_64-1.txz: Upgraded.
a/openssl-solibs-1.1.1n-x86_64-1.txz: Upgraded.
d/kernel-headers-5.16.15-x86-1.txz: Upgraded.
d/meson-0.61.3-x86_64-1.txz: Upgraded.
k/kernel-source-5.16.15-noarch-1.txz: Upgraded.
kde/kstars-3.5.8-x86_64-1.txz: Upgraded.
l/nodejs-16.14.1-x86_64-1.txz: Upgraded.
n/bind-9.18.1-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issues:
An assertion could occur in resume_dslookup() if the fetch had been shut
down earlier.
Lookups involving a DNAME could trigger an INSIST when "synth-from-dnssec"
was enabled.
A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
to be called recursively, which in turn left TCP connections hanging in the
CLOSE_WAIT state blocking indefinitely when out-of-order processing was
disabled.
The rules for acceptance of records into the cache have been tightened to
prevent the possibility of poisoning if forwarders send records outside
the configured bailiwick.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
(* Security fix *)
n/bluez-5.64-x86_64-1.txz: Upgraded.
n/mobile-broadband-provider-info-20220316-x86_64-1.txz: Upgraded.
n/openssl-1.1.1n-x86_64-1.txz: Upgraded.
This update fixes a high severity security issue:
The BN_mod_sqrt() function, which computes a modular square root, contains
a bug that can cause it to loop forever for non-prime moduli.
For more information, see:
https://www.openssl.org/news/secadv/20220315.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
(* Security fix *)
n/openvpn-2.5.6-x86_64-1.txz: Upgraded.
x/ibus-1.5.26-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux')
-rw-r--r-- | isolinux/message.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt index 1a3db36a..3e031eee 100644 --- a/isolinux/message.txt +++ b/isolinux/message.txt @@ -1,5 +1,5 @@ -Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.16.14)! +Welcome to 09Slackware6407 version 15.1 (Linux kernel 5.16.15)! If you need to pass extra parameters to the kernel, enter them at the prompt below after the name of the kernel to boot (e.g., huge.s). |