summaryrefslogtreecommitdiffstats
path: root/kernels
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-10-05 18:55:36 +0000
committer Eric Hameleers <alien@slackware.com>2022-10-06 07:00:20 +0200
commitae24d0ad56e1be82b3d0dd19d312c84f61fae762 (patch)
tree07ed12f2495cdd92584f7e91e3c93b87d59df4e3 /kernels
parent10ffd711f75123532b9294a13be95be84d553765 (diff)
downloadcurrent-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.gz
current-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.xz
Wed Oct 5 18:55:36 UTC 202220221005185536
a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded. d/kernel-headers-5.19.14-x86-1.txz: Upgraded. k/kernel-source-5.19.14-noarch-1.txz: Upgraded. n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded. This update fixes two security issues: Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting these issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'kernels')
-rw-r--r--kernels/VERSIONS.TXT2
1 files changed, 1 insertions, 1 deletions
diff --git a/kernels/VERSIONS.TXT b/kernels/VERSIONS.TXT
index 089785b57..fd021a91b 100644
--- a/kernels/VERSIONS.TXT
+++ b/kernels/VERSIONS.TXT
@@ -1,3 +1,3 @@
-These kernels are version 5.19.13.
+These kernels are version 5.19.14.