summaryrefslogtreecommitdiffstats
path: root/isolinux
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-07-24 22:07:56 +0000
committer Eric Hameleers <alien@slackware.com>2023-07-25 01:06:05 +0200
commit55547848f429c00f47fdb58a5b0a6d1e7eed6c6d (patch)
tree03a7fcc202fe329ed22772bb8f156318cb57920d /isolinux
parent84730d7abad295f83f3a923170248e19b2afb375 (diff)
downloadcurrent-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.gz
current-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.xz
Mon Jul 24 22:07:56 UTC 202320230724220756
a/kernel-firmware-20230724_59fbffa-noarch-1.txz: Upgraded. AMD microcode updated to fix a use-after-free in AMD Zen2 processors. From Tavis Ormandy's annoucement of the issue: "The practical result here is that you can spy on the registers of other processes. No system calls or privileges are required. It works across virtual machines and affects all operating systems. I have written a poc for this issue that's fast enough to reconstruct keys and passwords as users log in." For more information, see: https://seclists.org/oss-sec/2023/q3/59 https://www.cve.org/CVERecord?id=CVE-2023-20593 (* Security fix *) a/kernel-generic-6.1.41-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.41-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.41-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.41-x86-1.txz: Upgraded. k/kernel-source-6.1.41-noarch-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'isolinux')
-rw-r--r--isolinux/message.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/isolinux/message.txt b/isolinux/message.txt
index dcaac0fa5..381350502 100644
--- a/isolinux/message.txt
+++ b/isolinux/message.txt
@@ -1,5 +1,5 @@
-Welcome to 09Slackware6407 version 15.1 (Linux kernel 6.1.40)!
+Welcome to 09Slackware6407 version 15.1 (Linux kernel 6.1.41)!
If you need to pass extra parameters to the kernel, enter them at the prompt
below after the name of the kernel to boot (e.g., huge.s).