summaryrefslogtreecommitdiff
path: root/isolinux
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2018-12-06 04:38:11 +0000
committerEric Hameleers <alien@slackware.com>2018-12-06 17:59:30 +0100
commit37eaf40ce515cbb15e1b86fe5351a8e53efc0ede (patch)
tree199d4b6d44ea50f05a7bddeff5d2789da22a185d /isolinux
parent03a61ce0245413a8759dd3391ca37dc25794f565 (diff)
downloadcurrent-37eaf40ce515cbb15e1b86fe5351a8e53efc0ede.tar.gz
Thu Dec 6 04:38:11 UTC 201820181206043811
a/kernel-generic-4.19.7-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.7-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.7-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.7-x86-1.txz: Upgraded. k/kernel-source-4.19.7-noarch-1.txz: Upgraded. n/gnutls-3.6.5-x86_64-1.txz: Upgraded. This update fixes a security issue: Bleichenbacher-like side channel leakage in PKCS#1 1.5 verification and padding oracle verification. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868 (* Security fix *) n/nettle-3.4.1-x86_64-1.txz: Upgraded. This update fixes a security issue: A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux')
-rw-r--r--isolinux/message.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt
index 52cd1815..dff8b182 100644
--- a/isolinux/message.txt
+++ b/isolinux/message.txt
@@ -1,5 +1,5 @@
-Welcome to 09Slackware6407 version 15.0 (Linux kernel 4.19.6)!
+Welcome to 09Slackware6407 version 15.0 (Linux kernel 4.19.7)!
If you need to pass extra parameters to the kernel, enter them at the prompt
below after the name of the kernel to boot (e.g., huge.s).