summaryrefslogtreecommitdiff
path: root/README.initrd
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2019-10-02 06:46:20 +0000
committerEric Hameleers <alien@slackware.com>2019-10-02 17:59:48 +0200
commit9f3af3accb48f4e6c3ae536251b11d7f70bdb74c (patch)
tree4188a481b638885f64a5144591c3907059830656 /README.initrd
parent0857ff7f632e57090e5dcb764eb1837e34181fcf (diff)
downloadcurrent-9f3af3accb48f4e6c3ae536251b11d7f70bdb74c.tar.gz
Wed Oct 2 06:46:20 UTC 201920191002064620
a/kernel-generic-4.19.76-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.76-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.76-x86_64-1.txz: Upgraded. ap/sysstat-12.1.7-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.76-x86-1.txz: Upgraded. d/ruby-2.6.5-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: A code injection vulnerability of Shell#[] and Shell#test. HTTP response splitting in WEBrick (Additional fix). A NUL injection vulnerability of File.fnmatch and File.fnmatch?. Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201 (* Security fix *) k/kernel-source-4.19.76-noarch-1.txz: Upgraded. l/harfbuzz-2.6.2-x86_64-1.txz: Upgraded. l/libpcap-1.9.1-x86_64-1.txz: Upgraded. n/p11-kit-0.23.18.1-x86_64-1.txz: Upgraded. n/tcpdump-4.9.3-x86_64-1.txz: Upgraded. Fix buffer overflow/overread vulnerabilities and command line argument/local issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'README.initrd')
-rw-r--r--README.initrd14
1 files changed, 7 insertions, 7 deletions
diff --git a/README.initrd b/README.initrd
index c45a4069..7931a3fe 100644
--- a/README.initrd
+++ b/README.initrd
@@ -1,7 +1,7 @@
Slackware initrd mini HOWTO
by Patrick Volkerding, volkerdi@slackware.com
-Sat Sep 21 20:57:17 UTC 2019
+Wed Oct 2 04:06:50 UTC 2019
This document describes how to create and install an initrd, which may be
required to use the 4.x kernel. Also see "man mkinitrd".
@@ -33,15 +33,15 @@ flexible to ship a generic kernel and a set of kernel modules for it.
The easiest way to make the initrd is to use the mkinitrd script included
in Slackware's mkinitrd package. We'll walk through the process of
-upgrading to the generic 4.19.75 Linux kernel using the packages
+upgrading to the generic 4.19.76 Linux kernel using the packages
found in Slackware's slackware/a/ directory.
First, make sure the kernel, kernel modules, and mkinitrd package are
installed (the current version numbers might be a little different, so
this is just an example):
- installpkg kernel-generic-4.19.75-x86_64-1.txz
- installpkg kernel-modules-4.19.75-x86_64-1.txz
+ installpkg kernel-generic-4.19.76-x86_64-1.txz
+ installpkg kernel-modules-4.19.76-x86_64-1.txz
installpkg mkinitrd-1.4.11-x86_64-13.txz
Change into the /boot directory:
@@ -52,7 +52,7 @@ Now you'll want to run "mkinitrd". I'm using ext4 for my root filesystem,
and since the disk controller requires no special support the ext4 module
will be the only one I need to load:
- mkinitrd -c -k 4.19.75 -m ext4
+ mkinitrd -c -k 4.19.76 -m ext4
This should do two things. First, it will create a directory
/boot/initrd-tree containing the initrd's filesystem. Then it will
@@ -61,10 +61,10 @@ you could make some additional changes in /boot/initrd-tree/ and
then run mkinitrd again without options to rebuild the image. That's
optional, though, and only advanced users will need to think about that.
-Here's another example: Build an initrd image using Linux 4.19.75
+Here's another example: Build an initrd image using Linux 4.19.76
kernel modules for a system with an ext4 root partition on /dev/sdb3:
- mkinitrd -c -k 4.19.75 -m ext4 -f ext4 -r /dev/sdb3
+ mkinitrd -c -k 4.19.76 -m ext4 -f ext4 -r /dev/sdb3
4. Now that I've built an initrd, how do I use it?