diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-06-12 05:02:45 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-06-12 20:58:07 +0200 |
commit | 2c20c6847e0caa3b62f6e5a0506790393c141932 (patch) | |
tree | 5cbe54a04fa072a3719d68f109ebbff54fc87037 /source/installer/sources/efi.i586/EFI/BOOT/message.txt | |
parent | 548843b225f281a8d0583e3bf1ee77ac57d648a3 (diff) | |
download | current-2c20c6847e0caa3b62f6e5a0506790393c141932.tar.gz |
Tue Jun 12 05:02:45 UTC 201820180612050245
a/kernel-firmware-20180606_d114732-noarch-1.txz: Upgraded.
a/kernel-generic-4.14.49-x86_64-1.txz: Upgraded.
a/kernel-huge-4.14.49-x86_64-1.txz: Upgraded.
a/kernel-modules-4.14.49-x86_64-1.txz: Upgraded.
a/libcgroup-0.41-x86_64-4.txz: Rebuilt.
Apply all post 0.41 patches from git, including one for an infinite loop
bug that causes 100% CPU usage on one core. Thanks to chris.willing.
a/pkgtools-15.0-noarch-17.txz: Rebuilt.
installpkg: Use terse mode if TERSE=0 is set in the environment (this already
works for removepkg and upgradepkg). This allows using terse mode in other
tools that use the pkgtools (such as slackpkg with: TERSE=0 slackpkg).
Thanks to Xsane.
ap/hplip-3.18.6-x86_64-1.txz: Upgraded.
d/kernel-headers-4.14.49-x86-1.txz: Upgraded.
k/kernel-source-4.14.49-noarch-1.txz: Upgraded.
GPIO_AMDPT n -> m (thanks to walecha)
NFSD_V3_ACL n -> y (thanks to Jonathan Woithe)
NFS_V3_ACL n -> y (thanks to Jonathan Woithe)
NFS_V4_2 n -> y
+NFSD_V2_ACL y
+NFS_ACL_SUPPORT y
+NFS_V4_SECURITY_LABEL y
l/LibRaw-0.18.12-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues, including:
parse_qt: possible integer overflow
reject broken/crafted NOKIARAW files
recover read position if TIFF/EXIF tag is too long
possible infinite loop in parse_minolta()
possible stack overrun in X3F parser
out of bounds read in X3F parser
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10529
(* Security fix *)
l/dconf-0.26.1-x86_64-3.txz: Rebuilt.
Eliminate install script noise.
l/dconf-editor-3.26.2-x86_64-3.txz: Rebuilt.
Eliminate install script noise.
n/iproute2-4.17.0-x86_64-1.txz: Upgraded.
x/wqy-zenhei-font-ttf-0.8.38_1-noarch-7.txz: Rebuilt.
Try to avoid overriding other font choices unless lang = zh-cn or zh-sg.
x/xkbcomp-1.4.2-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/installer/sources/efi.i586/EFI/BOOT/message.txt')
-rwxr-xr-x | source/installer/sources/efi.i586/EFI/BOOT/message.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source/installer/sources/efi.i586/EFI/BOOT/message.txt b/source/installer/sources/efi.i586/EFI/BOOT/message.txt index 7fb5b03c..6153d784 100755 --- a/source/installer/sources/efi.i586/EFI/BOOT/message.txt +++ b/source/installer/sources/efi.i586/EFI/BOOT/message.txt @@ -1,5 +1,5 @@ -Welcome to Slackware version 14.2 (Linux kernel 4.1.13)! +Welcome to Slackware (32-bit) version 14.2 (Linux kernel 4.1.13)! If you need to pass extra parameters to the kernel, enter them at the prompt below after the name of the kernel to boot (e.g., hugesmp.s). |