ID SSA-2018-016-01
Type slackware
Reporter Slackware Linux Project
Modified 2018-01-15T22:32:33


New kernel packages are available for Slackware 14.0 and 14.2 to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/linux-4.4.111/: Upgraded. This kernel includes mitigations for the Spectre (variant 2) and Meltdown speculative side channel attacks. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: ( Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab ( for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on for additional mirror sites near you.

Updated packages for Slackware 14.0:

Updated packages for Slackware x86_64 14.0:

Updated packages for Slackware 14.2:

Updated packages for Slackware x86_64 14.2:

Updated packages for Slackware -current:

Updated packages for Slackware x86_64 -current:

MD5 signatures:

Slackware 14.0 packages: bf85158499277e0398e41293370abc4a kernel-firmware-20180104_65b1c68-noarch-1.txz 0ef73b92f14f3e0494f36b4074d62a35 kernel-generic-3.2.98-i586-1.txz 193dda4b6e27335a17411c6a29f60ea3 kernel-generic-smp-3.2.98_smp-i686-1.txz d9d8f98a4d25cadf60f48160bdf30ae7 kernel-headers-3.2.98_smp-x86-1.txz 2c45a0a535d82af30302e6f635eb0ba0 kernel-huge-3.2.98-i586-1.txz 803e8c349a811ee41ee53e350084fe44 kernel-huge-smp-3.2.98_smp-i686-1.txz ffc5679148ddc84e374382263f2a5961 kernel-modules-3.2.98-i586-1.txz 01c13c7e9d5aaf71d94567bdc4dd13ea kernel-modules-smp-3.2.98_smp-i686-1.txz 6f9a2484dca0bfc6cdb1283265c3cc19 kernel-source-3.2.98_smp-noarch-1.txz

Slackware x86_64 14.0 packages: bf85158499277e0398e41293370abc4a kernel-firmware-20180104_65b1c68-noarch-1.txz 6f05db9ce854f92fb440799124d87f4a kernel-generic-3.2.98-x86_64-1.txz e32cde2cb8e5c22eae3c473aaddcc492 kernel-headers-3.2.98-x86-1.txz fc501013a04b89f4c829dc95d2737d08 kernel-huge-3.2.98-x86_64-1.txz 4bded5fdf8de31bcff6e6125c6b1cf3e kernel-modules-3.2.98-x86_64-1.txz e0c621c22934741155c3f7ec4f25ca97 kernel-source-3.2.98-noarch-1.txz

Slackware 14.2 packages: bf85158499277e0398e41293370abc4a kernel-firmware-20180104_65b1c68-noarch-1.txz 55b1acd85f0dd9813b8d2fef44dd1aae kernel-generic-4.4.111-i586-1.txz c0d837091607479cc85adb180eeb35bf kernel-generic-smp-4.4.111_smp-i686-1.txz feb19648f920e02e48d8c9a2b9ad42c0 kernel-headers-4.4.111_smp-x86-1.txz 8afbb68507e4b57a419b3f0175e60266 kernel-huge-4.4.111-i586-1.txz 81678780cde9ba1885ead0c5ec8348cd kernel-huge-smp-4.4.111_smp-i686-1.txz 504677324345522321dce25515e1bb67 kernel-modules-4.4.111-i586-1.txz 0443b18244cad227346b2dc81301d8c0 kernel-modules-smp-4.4.111_smp-i686-1.txz dc6d52e7f44bee953e8885c42ff969fe kernel-source-4.4.111_smp-noarch-1.txz

Slackware x86_64 14.2 packages: bf85158499277e0398e41293370abc4a kernel-firmware-20180104_65b1c68-noarch-1.txz cc3b1bf83ed853d867b86e68ccae43da kernel-generic-4.4.111-x86_64-1.txz 3b8e65e8e2ed82c1c3320ddb552dbd5f kernel-headers-4.4.111-x86-1.txz db1e811cec9d0acc003226ca8fff6d73 kernel-huge-4.4.111-x86_64-1.txz be8500e6820957f4ed674fb325fd0c53 kernel-modules-4.4.111-x86_64-1.txz 80f813a256d80064d584f09d18a77f9b kernel-source-4.4.111-noarch-1.txz

Slackware -current packages: bf85158499277e0398e41293370abc4a a/kernel-firmware-20180104_65b1c68-noarch-1.txz cd566e152b3504d350b68331a79f9924 a/kernel-generic-4.14.13-i586-1.txz 830a1b7ab36a1ccd0268d90eb9d202c4 a/kernel-generic-smp-4.14.13_smp-i686-1.txz 4077c7deecee1131e97e348c07e2bd52 a/kernel-huge-4.14.13-i586-1.txz 7f1070bb3f47dd960b26bfb4cb383e27 a/kernel-huge-smp-4.14.13_smp-i686-1.txz a14936b31e2dbdb96f807006faebeaca a/kernel-modules-4.14.13-i586-1.txz 115efae6390092080c0d8759cf0ab29e a/kernel-modules-smp-4.14.13_smp-i686-1.txz fe1ae020a95c8f2ee5dcf6e719454642 d/kernel-headers-4.14.13_smp-x86-1.txz 8698f2eb6e19738fd70e1190c12f1f77 k/kernel-source-4.14.13_smp-noarch-1.txz

Slackware x86_64 -current packages: bf85158499277e0398e41293370abc4a a/kernel-firmware-20180104_65b1c68-noarch-1.txz ebdd84b0dd7951ab87a0f7ac80115c7b a/kernel-generic-4.14.13-x86_64-1.txz df6d28423447d505d2a934751fb84989 a/kernel-huge-4.14.13-x86_64-1.txz c998eec627dc1734a6913bc651f45591 a/kernel-modules-4.14.13-x86_64-1.txz 61cdd86bb7f642786c72991db7ec1845 d/kernel-headers-4.14.13-x86-1.txz 8bab48aa2a5aad8547e7e6183db33c17 k/kernel-source-4.14.13-noarch-1.txz

Installation instructions:

Upgrade the packages as root: > upgradepkg kernel-*.txz

If you are using an initrd, you'll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2): > /usr/share/mkinitrd/ -k 4.4.111-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2): > /usr/share/mkinitrd/ -k 4.4.111 | bash

Please note that "uniprocessor" has to do with the kernel you are running, not with the CPU. Most systems should run the SMP kernel (if they can) regardless of the number of cores the CPU has. If you aren't sure which kernel you are running, run "uname -a". If you see SMP there, you are running the SMP kernel and should use the 4.4.111-smp version when running mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit systems should always use 4.4.111 as the version.

If you are using lilo or elilo to boot the machine, you'll need to ensure that the machine is properly prepared before rebooting.

If using LILO: By default, lilo.conf contains an image= line that references a symlink that always points to the correct kernel. No editing should be required unless your machine uses a custom lilo.conf. If that is the case, be sure that the image= line references the correct kernel file. Either way, you'll need to run "lilo" as root to reinstall the boot loader.

If using elilo: Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish to use, and then run eliloconfig to update the EFI System Partition.