diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-10-05 18:55:36 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-10-06 07:00:20 +0200 |
commit | ae24d0ad56e1be82b3d0dd19d312c84f61fae762 (patch) | |
tree | 07ed12f2495cdd92584f7e91e3c93b87d59df4e3 /source/a/tar | |
parent | 10ffd711f75123532b9294a13be95be84d553765 (diff) | |
download | current-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.gz current-ae24d0ad56e1be82b3d0dd19d312c84f61fae762.tar.xz |
Wed Oct 5 18:55:36 UTC 202220221005185536
a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded.
a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded.
a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded.
d/kernel-headers-5.19.14-x86-1.txz: Upgraded.
k/kernel-source-5.19.14-noarch-1.txz: Upgraded.
n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded.
This update fixes two security issues:
Corrected a reference count leak that occurs when the server builds
responses to leasequery packets.
Corrected a memory leak that occurs when unpacking a packet that has an
FQDN option (81) that contains a label with length greater than 63 bytes.
Thanks to VictorV of Cyber Kunlun Lab for reporting these issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/a/tar')
0 files changed, 0 insertions, 0 deletions