summaryrefslogtreecommitdiff
path: root/source/k/kernel-configs/config-generic-5.19.3.x64
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2022-10-05 18:55:36 +0000
committerEric Hameleers <alien@slackware.com>2022-10-06 07:00:20 +0200
commitae24d0ad56e1be82b3d0dd19d312c84f61fae762 (patch)
tree07ed12f2495cdd92584f7e91e3c93b87d59df4e3 /source/k/kernel-configs/config-generic-5.19.3.x64
parent10ffd711f75123532b9294a13be95be84d553765 (diff)
downloadcurrent-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.gz
Wed Oct 5 18:55:36 UTC 202220221005185536
a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded. d/kernel-headers-5.19.14-x86-1.txz: Upgraded. k/kernel-source-5.19.14-noarch-1.txz: Upgraded. n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded. This update fixes two security issues: Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting these issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/k/kernel-configs/config-generic-5.19.3.x64')
0 files changed, 0 insertions, 0 deletions