summaryrefslogtreecommitdiffstats
path: root/patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-02-18 02:04:34 +0000
committer Eric Hameleers <alien@slackware.com>2023-02-18 13:30:11 +0100
commitf3eb859afcec1996ea955cb993c3ab8fd441d605 (patch)
treebd2715d397df4f175f2131e5317694744d45e72b /patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686
parent1ae65ae489cb3581a1231fb71008e3240788be74 (diff)
downloadcurrent-ccb42b549d1745edae8001b590f06cc7b5104271.tar.gz
current-ccb42b549d1745edae8001b590f06cc7b5104271.tar.xz
Sat Feb 18 02:04:34 UTC 202320230218020434_15.0
patches/packages/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded. patches/packages/linux-5.15.80/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.81: https://www.cve.org/CVERecord?id=CVE-2022-47519 https://www.cve.org/CVERecord?id=CVE-2022-47518 https://www.cve.org/CVERecord?id=CVE-2022-47520 https://www.cve.org/CVERecord?id=CVE-2022-47521 https://www.cve.org/CVERecord?id=CVE-2022-3344 Fixed in 5.15.82: https://www.cve.org/CVERecord?id=CVE-2022-45869 https://www.cve.org/CVERecord?id=CVE-2022-4378 Fixed in 5.15.83: https://www.cve.org/CVERecord?id=CVE-2022-3643 Fixed in 5.15.84: https://www.cve.org/CVERecord?id=CVE-2022-3545 Fixed in 5.15.85: https://www.cve.org/CVERecord?id=CVE-2022-45934 Fixed in 5.15.86: https://www.cve.org/CVERecord?id=CVE-2022-3534 https://www.cve.org/CVERecord?id=CVE-2022-3424 Fixed in 5.15.87: https://www.cve.org/CVERecord?id=CVE-2022-41218 https://www.cve.org/CVERecord?id=CVE-2023-23455 https://www.cve.org/CVERecord?id=CVE-2023-23454 https://www.cve.org/CVERecord?id=CVE-2023-0045 https://www.cve.org/CVERecord?id=CVE-2023-0210 https://www.cve.org/CVERecord?id=CVE-2022-36280 Fixed in 5.15.88: https://www.cve.org/CVERecord?id=CVE-2023-0266 https://www.cve.org/CVERecord?id=CVE-2022-47929 Fixed in 5.15.89: https://www.cve.org/CVERecord?id=CVE-2023-0179 https://www.cve.org/CVERecord?id=CVE-2023-0394 Fixed in 5.15.90: https://www.cve.org/CVERecord?id=CVE-2022-4382 https://www.cve.org/CVERecord?id=CVE-2022-4842 Fixed in 5.15.91: https://www.cve.org/CVERecord?id=CVE-2022-4129 https://www.cve.org/CVERecord?id=CVE-2023-23559 (* Security fix *)
Diffstat (limited to 'patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686')
-rw-r--r--patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i68619
1 files changed, 19 insertions, 0 deletions
diff --git a/patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686 b/patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686
new file mode 100644
index 000000000..a6abc7703
--- /dev/null
+++ b/patches/source/linux-5.15.94/slack-desc/slack-desc.kernel-generic-smp.i686
@@ -0,0 +1,19 @@
+# HOW TO EDIT THIS FILE:
+# The "handy ruler" below makes it easier to edit a package description. Line
+# up the first '|' above the ':' following the base package name, and the '|'
+# on the right side marks the last column you can put a character in. You must
+# make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':'.
+
+ |-----handy-ruler------------------------------------------------------|
+kernel-generic-smp: kernel-generic-smp (a general purpose SMP Linux kernel)
+kernel-generic-smp:
+kernel-generic-smp: This is a Linux kernel with built-in support for most disk
+kernel-generic-smp: controllers. To use filesystems, or to load support for a SCSI or
+kernel-generic-smp: other controller, then you'll need to load one or more kernel
+kernel-generic-smp: modules using an initial ramdisk, or initrd. For more information
+kernel-generic-smp: about creating an initrd, see the README.initrd file in the /boot
+kernel-generic-smp: directory.
+kernel-generic-smp:
+kernel-generic-smp: SMP is "Symmetric multiprocessing", or multiple CPU/core support.
+kernel-generic-smp: