SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Wed Oct 21 21:51:26 UTC 2020
patches/packages/kernel-firmware-20201005_58d41d0-noarch-1.txz: Upgraded.
patches/packages/linux-4.4.240/*: Upgraded.
These updates fix various bugs and security issues, including the recently
discovered "Bleeding Tooth" vulnerability in the Bluetooth subsystem
(CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490).
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.228:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810
Fixed in 4.4.229:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771
Fixed in 4.4.230:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393
Fixed in 4.4.232:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
Fixed in 4.4.233:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
Fixed in 4.4.234:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314
Fixed in 4.4.236:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
Fixed in 4.4.237:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
Fixed in 4.4.238:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643
Fixed in 4.4.239:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211
Fixed in 4.4.240:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490
(* Security fix *)
+--------------------------+
If you forgot to update your initrd, you can boot from the flash drive, mount you drive, chroot it, cd to the "boot" folder and recreate initrd. See /boot/README.initrd . I also recommend to read ``main mkinitrd`` and ``ramfs-rootfs-initramfs.txt`` in the Kernel documentation folder.
If you forgot to update your initrd, you can boot from the flash drive, mount you drive, chroot it, cd to the "boot" folder and recreate initrd. See /boot/README.initrd . I also recommend to read ``main mkinitrd`` and ``ramfs-rootfs-initramfs.txt`` in the Kernel documentation folder.
Yes, i forgot to upgrade initrd, when i tried i was not able to read anything usin MC, or nano, links where broken!
Booting from usb installetion disk, is exactly the same situation, nothing works correctly.
I think that because i used slackpkg to upgrade the kernel, the old kernel has been deleted!
I am downloding a usb live to do chroot, or if it exist current usb image, because it has a newer kernel.
Wed Oct 21 21:51:26 UTC 2020
patches/packages/kernel-firmware-20201005_58d41d0-noarch-1.txz: Upgraded.
patches/packages/linux-4.4.240/*: Upgraded.
These updates fix various bugs and security issues, including the recently
discovered "Bleeding Tooth" vulnerability in the Bluetooth subsystem
(CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490).
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.228:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810
Fixed in 4.4.229:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771
Fixed in 4.4.230:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393
Fixed in 4.4.232:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
Fixed in 4.4.233:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
Fixed in 4.4.234:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314
Fixed in 4.4.236:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
Fixed in 4.4.237:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
Fixed in 4.4.238:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643
Fixed in 4.4.239:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211
Fixed in 4.4.240:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490
(* Security fix *)
+--------------------------+
If one is not using an encrypted file system on the bootable drive, there are extremely few situations that actually require an initrd. In most cases, just checking the box for your boot drive's file system as "built-in" (no loadable module needed) eliminates that "gotcha". I actually don't understand why the generic kernel doesn't come with the most common file system support built in. I know of no downside. The kernel size difference is insignificant in the extreme. Some folks just use the huge kernel but kernel building is so easy I don't see why. A stock generic kernel can be rebuilt to require no initrd in way less than an hour. My current i5 box takes 15 minutes.
Wed Oct 21 21:51:26 UTC 2020
patches/packages/kernel-firmware-20201005_58d41d0-noarch-1.txz: Upgraded.
patches/packages/linux-4.4.240/*: Upgraded.
These updates fix various bugs and security issues, including the recently
discovered "Bleeding Tooth" vulnerability in the Bluetooth subsystem
(CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490).
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.228:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810
Fixed in 4.4.229:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771
Fixed in 4.4.230:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393
Fixed in 4.4.232:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
Fixed in 4.4.233:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
Fixed in 4.4.234:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314
Fixed in 4.4.236:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
Fixed in 4.4.237:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
Fixed in 4.4.238:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643
Fixed in 4.4.239:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211
Fixed in 4.4.240:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490
(* Security fix *)
+--------------------------+
If i understend correctly, vmlinz point to huge kernel, and it does not need initrd!
The other thing is, that at boot prompt says "Welcome to kernel 2.2.227.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.