mirror of
git://slackware.nl/current.git
synced 2024-12-31 10:28:29 +01:00
3c08cf6792
patches/packages/linux-5.15.38/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.27: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 Fixed in 5.15.28: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 Fixed in 5.15.29: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 Fixed in 5.15.32: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 Fixed in 5.15.33: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516 Fixed in 5.15.34: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582 Fixed in 5.15.35: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205 Fixed in 5.15.37: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 (* Security fix *)
92 lines
No EOL
3.2 KiB
Text
92 lines
No EOL
3.2 KiB
Text
; This file holds the information on root name servers needed to
|
|
; initialize cache of Internet domain name servers
|
|
; (e.g. reference this file in the "cache . <file>"
|
|
; configuration file of BIND domain name servers).
|
|
;
|
|
; This file is made available by InterNIC
|
|
; under anonymous FTP as
|
|
; file /domain/named.cache
|
|
; on server FTP.INTERNIC.NET
|
|
; -OR- RS.INTERNIC.NET
|
|
;
|
|
; last update: July 30, 2019
|
|
; related version of root zone: 2019073000
|
|
;
|
|
; FORMERLY NS.INTERNIC.NET
|
|
;
|
|
. 3600000 NS A.ROOT-SERVERS.NET.
|
|
A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4
|
|
A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30
|
|
;
|
|
; FORMERLY NS1.ISI.EDU
|
|
;
|
|
. 3600000 NS B.ROOT-SERVERS.NET.
|
|
B.ROOT-SERVERS.NET. 3600000 A 199.9.14.201
|
|
B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:200::b
|
|
;
|
|
; FORMERLY C.PSI.NET
|
|
;
|
|
. 3600000 NS C.ROOT-SERVERS.NET.
|
|
C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12
|
|
C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c
|
|
;
|
|
; FORMERLY TERP.UMD.EDU
|
|
;
|
|
. 3600000 NS D.ROOT-SERVERS.NET.
|
|
D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13
|
|
D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d
|
|
;
|
|
; FORMERLY NS.NASA.GOV
|
|
;
|
|
. 3600000 NS E.ROOT-SERVERS.NET.
|
|
E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10
|
|
E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e
|
|
;
|
|
; FORMERLY NS.ISC.ORG
|
|
;
|
|
. 3600000 NS F.ROOT-SERVERS.NET.
|
|
F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241
|
|
F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f
|
|
;
|
|
; FORMERLY NS.NIC.DDN.MIL
|
|
;
|
|
. 3600000 NS G.ROOT-SERVERS.NET.
|
|
G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4
|
|
G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d
|
|
;
|
|
; FORMERLY AOS.ARL.ARMY.MIL
|
|
;
|
|
. 3600000 NS H.ROOT-SERVERS.NET.
|
|
H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53
|
|
H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53
|
|
;
|
|
; FORMERLY NIC.NORDU.NET
|
|
;
|
|
. 3600000 NS I.ROOT-SERVERS.NET.
|
|
I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17
|
|
I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53
|
|
;
|
|
; OPERATED BY VERISIGN, INC.
|
|
;
|
|
. 3600000 NS J.ROOT-SERVERS.NET.
|
|
J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30
|
|
J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30
|
|
;
|
|
; OPERATED BY RIPE NCC
|
|
;
|
|
. 3600000 NS K.ROOT-SERVERS.NET.
|
|
K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129
|
|
K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1
|
|
;
|
|
; OPERATED BY ICANN
|
|
;
|
|
. 3600000 NS L.ROOT-SERVERS.NET.
|
|
L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42
|
|
L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42
|
|
;
|
|
; OPERATED BY WIDE
|
|
;
|
|
. 3600000 NS M.ROOT-SERVERS.NET.
|
|
M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33
|
|
M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35
|
|
; End of file |