summaryrefslogtreecommitdiffstats
path: root/source/k/kernel-configs/config-huge-5.19.14.x64 (follow)
Commit message (Expand)AuthorAgeFilesLines
* Wed Oct 12 19:21:37 UTC 2022...a/kernel-generic-5.19.15-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.15-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.15-x86_64-1.txz: Upgraded. d/kernel-headers-5.19.15-x86-1.txz: Upgraded. k/kernel-source-5.19.15-noarch-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20221012192137 Patrick J Volkerding2022-10-131-10665/+0
* Wed Oct 5 18:55:36 UTC 2022...a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded. d/kernel-headers-5.19.14-x86-1.txz: Upgraded. k/kernel-source-5.19.14-noarch-1.txz: Upgraded. n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded. This update fixes two security issues: Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting these issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20221005185536 Patrick J Volkerding2022-10-061-0/+10665