diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-12-06 04:38:11 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-12-06 17:59:30 +0100 |
commit | 37eaf40ce515cbb15e1b86fe5351a8e53efc0ede (patch) | |
tree | 199d4b6d44ea50f05a7bddeff5d2789da22a185d /isolinux | |
parent | 03a61ce0245413a8759dd3391ca37dc25794f565 (diff) | |
download | current-37eaf40ce515cbb15e1b86fe5351a8e53efc0ede.tar.gz |
Thu Dec 6 04:38:11 UTC 201820181206043811
a/kernel-generic-4.19.7-x86_64-1.txz: Upgraded.
a/kernel-huge-4.19.7-x86_64-1.txz: Upgraded.
a/kernel-modules-4.19.7-x86_64-1.txz: Upgraded.
d/kernel-headers-4.19.7-x86-1.txz: Upgraded.
k/kernel-source-4.19.7-noarch-1.txz: Upgraded.
n/gnutls-3.6.5-x86_64-1.txz: Upgraded.
This update fixes a security issue:
Bleichenbacher-like side channel leakage in PKCS#1 1.5 verification and
padding oracle verification.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
(* Security fix *)
n/nettle-3.4.1-x86_64-1.txz: Upgraded.
This update fixes a security issue:
A Bleichenbacher type side-channel based padding oracle attack was found
in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5
data. An attacker who is able to run a process on the same physical core
as the victim process, could use this flaw to extract plaintext or in some
cases downgrade any TLS connections to a vulnerable server.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux')
-rw-r--r-- | isolinux/message.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt index 52cd1815..dff8b182 100644 --- a/isolinux/message.txt +++ b/isolinux/message.txt @@ -1,5 +1,5 @@ -Welcome to 09Slackware6407 version 15.0 (Linux kernel 4.19.6)! +Welcome to 09Slackware6407 version 15.0 (Linux kernel 4.19.7)! If you need to pass extra parameters to the kernel, enter them at the prompt below after the name of the kernel to boot (e.g., huge.s). |