From 9f3af3accb48f4e6c3ae536251b11d7f70bdb74c Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Wed, 2 Oct 2019 06:46:20 +0000 Subject: Wed Oct 2 06:46:20 UTC 2019 a/kernel-generic-4.19.76-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.76-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.76-x86_64-1.txz: Upgraded. ap/sysstat-12.1.7-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.76-x86-1.txz: Upgraded. d/ruby-2.6.5-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: A code injection vulnerability of Shell#[] and Shell#test. HTTP response splitting in WEBrick (Additional fix). A NUL injection vulnerability of File.fnmatch and File.fnmatch?. Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201 (* Security fix *) k/kernel-source-4.19.76-noarch-1.txz: Upgraded. l/harfbuzz-2.6.2-x86_64-1.txz: Upgraded. l/libpcap-1.9.1-x86_64-1.txz: Upgraded. n/p11-kit-0.23.18.1-x86_64-1.txz: Upgraded. n/tcpdump-4.9.3-x86_64-1.txz: Upgraded. Fix buffer overflow/overread vulnerabilities and command line argument/local issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. --- README.initrd | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) (limited to 'README.initrd') diff --git a/README.initrd b/README.initrd index c45a40690..7931a3fe4 100644 --- a/README.initrd +++ b/README.initrd @@ -1,7 +1,7 @@ Slackware initrd mini HOWTO by Patrick Volkerding, volkerdi@slackware.com -Sat Sep 21 20:57:17 UTC 2019 +Wed Oct 2 04:06:50 UTC 2019 This document describes how to create and install an initrd, which may be required to use the 4.x kernel. Also see "man mkinitrd". @@ -33,15 +33,15 @@ flexible to ship a generic kernel and a set of kernel modules for it. The easiest way to make the initrd is to use the mkinitrd script included in Slackware's mkinitrd package. We'll walk through the process of -upgrading to the generic 4.19.75 Linux kernel using the packages +upgrading to the generic 4.19.76 Linux kernel using the packages found in Slackware's slackware/a/ directory. First, make sure the kernel, kernel modules, and mkinitrd package are installed (the current version numbers might be a little different, so this is just an example): - installpkg kernel-generic-4.19.75-x86_64-1.txz - installpkg kernel-modules-4.19.75-x86_64-1.txz + installpkg kernel-generic-4.19.76-x86_64-1.txz + installpkg kernel-modules-4.19.76-x86_64-1.txz installpkg mkinitrd-1.4.11-x86_64-13.txz Change into the /boot directory: @@ -52,7 +52,7 @@ Now you'll want to run "mkinitrd". I'm using ext4 for my root filesystem, and since the disk controller requires no special support the ext4 module will be the only one I need to load: - mkinitrd -c -k 4.19.75 -m ext4 + mkinitrd -c -k 4.19.76 -m ext4 This should do two things. First, it will create a directory /boot/initrd-tree containing the initrd's filesystem. Then it will @@ -61,10 +61,10 @@ you could make some additional changes in /boot/initrd-tree/ and then run mkinitrd again without options to rebuild the image. That's optional, though, and only advanced users will need to think about that. -Here's another example: Build an initrd image using Linux 4.19.75 +Here's another example: Build an initrd image using Linux 4.19.76 kernel modules for a system with an ext4 root partition on /dev/sdb3: - mkinitrd -c -k 4.19.75 -m ext4 -f ext4 -r /dev/sdb3 + mkinitrd -c -k 4.19.76 -m ext4 -f ext4 -r /dev/sdb3 4. Now that I've built an initrd, how do I use it? -- cgit v1.2.3-65-gdbad