summaryrefslogtreecommitdiffstats
path: root/README_LVM.TXT
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-03-30 22:37:05 +0000
committer Eric Hameleers <alien@slackware.com>2022-03-31 06:59:46 +0200
commit20f8c8e77495af3d80549ad1387c560581bc0b31 (patch)
treebbd95a42311104542b512fdfd2f019c34418a47d /README_LVM.TXT
parentf1c0c4aac5baeb5f422f8668a863d8f2eeb2edde (diff)
downloadcurrent-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.gz
current-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.xz
Wed Mar 30 22:37:05 UTC 202220220330223705
ap/vim-8.2.4649-x86_64-1.txz: Upgraded. Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646. This vulnerability is capable of crashing software, bypassing protection mechanisms, modifying memory, and possibly execution of arbitrary code. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 (* Security fix *) d/cmake-3.23.0-x86_64-1.txz: Upgraded. d/meson-0.61.4-x86_64-1.txz: Upgraded. l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded. l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded. l/mlt-7.6.0-x86_64-1.txz: Upgraded. x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded. xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded.
Diffstat (limited to 'README_LVM.TXT')
-rw-r--r--README_LVM.TXT6
1 files changed, 3 insertions, 3 deletions
diff --git a/README_LVM.TXT b/README_LVM.TXT
index 93aa4e423..85b894a9f 100644
--- a/README_LVM.TXT
+++ b/README_LVM.TXT
@@ -103,9 +103,9 @@ We are going to 'chroot' into our fresh installation:
Next, while we are in the chroot, create the initrd with LVM support -
in the example command line I assume that the root filesystem is 'ext4',
we used the LV '/dev/myvg/root' as the root device, and are running the
-Slackware 14.2 default kernel '4.4.14':
+Slackware 15.0 default kernel '5.15.19':
- # mkinitrd -c -k 4.4.14 -m ext4 -f ext4 -r /dev/myvg/root -L
+ # mkinitrd -c -k 5.15.19 -m ext4 -f ext4 -r /dev/myvg/root -L
The resulting initrd image will be written to the file '/boot/initrd.gz'
by default. We still need to tell lilo about this initrd, so open the
@@ -117,7 +117,7 @@ filename added by 'liloconfig' is '/boot/vmlinuz' which is a symbolic link to
the huge SMP kernel. Remember that we need a 'generic' kernel with the initrd.
The end result should look somewhat like this:
- image = /boot/vmlinuz-generic-4.4.14
+ image = /boot/vmlinuz-generic-5.15.19
initrd = /boot/initrd.gz
root = /dev/myvg/root
label = linux