Slackware Security Advisories
Slackware Logo


Security Advisories



General Info

Get Slack

Install Help






Other Sites



Mailing Lists


From: Slackware Security Team <>
Subject: [slackware-security] kernel (SSA:2018-016-01)
Date: Mon, 15 Jan 2018 22:32:33 -0800 (PST)
Hash: SHA1

[slackware-security]  kernel (SSA:2018-016-01)

New kernel packages are available for Slackware 14.0 and 14.2 to fix
security issues.

Here are the details from the Slackware 14.2 ChangeLog:
patches/packages/linux-4.4.111/*:  Upgraded.
  This kernel includes mitigations for the Spectre (variant 2) and Meltdown
  speculative side channel attacks.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
  (* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
( for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on for
additional mirror sites near you.

Updated packages for Slackware 14.0:

Updated packages for Slackware x86_64 14.0:

Updated packages for Slackware 14.2:

Updated packages for Slackware x86_64 14.2:

Updated packages for Slackware -current:

Updated packages for Slackware x86_64 -current:

MD5 signatures:

Slackware 14.0 packages:
bf85158499277e0398e41293370abc4a  kernel-firmware-20180104_65b1c68-noarch-1.txz
0ef73b92f14f3e0494f36b4074d62a35  kernel-generic-3.2.98-i586-1.txz
193dda4b6e27335a17411c6a29f60ea3  kernel-generic-smp-3.2.98_smp-i686-1.txz
d9d8f98a4d25cadf60f48160bdf30ae7  kernel-headers-3.2.98_smp-x86-1.txz
2c45a0a535d82af30302e6f635eb0ba0  kernel-huge-3.2.98-i586-1.txz
803e8c349a811ee41ee53e350084fe44  kernel-huge-smp-3.2.98_smp-i686-1.txz
ffc5679148ddc84e374382263f2a5961  kernel-modules-3.2.98-i586-1.txz
01c13c7e9d5aaf71d94567bdc4dd13ea  kernel-modules-smp-3.2.98_smp-i686-1.txz
6f9a2484dca0bfc6cdb1283265c3cc19  kernel-source-3.2.98_smp-noarch-1.txz

Slackware x86_64 14.0 packages:
bf85158499277e0398e41293370abc4a  kernel-firmware-20180104_65b1c68-noarch-1.txz
6f05db9ce854f92fb440799124d87f4a  kernel-generic-3.2.98-x86_64-1.txz
e32cde2cb8e5c22eae3c473aaddcc492  kernel-headers-3.2.98-x86-1.txz
fc501013a04b89f4c829dc95d2737d08  kernel-huge-3.2.98-x86_64-1.txz
4bded5fdf8de31bcff6e6125c6b1cf3e  kernel-modules-3.2.98-x86_64-1.txz
e0c621c22934741155c3f7ec4f25ca97  kernel-source-3.2.98-noarch-1.txz

Slackware 14.2 packages:
bf85158499277e0398e41293370abc4a  kernel-firmware-20180104_65b1c68-noarch-1.txz
55b1acd85f0dd9813b8d2fef44dd1aae  kernel-generic-4.4.111-i586-1.txz
c0d837091607479cc85adb180eeb35bf  kernel-generic-smp-4.4.111_smp-i686-1.txz
feb19648f920e02e48d8c9a2b9ad42c0  kernel-headers-4.4.111_smp-x86-1.txz
8afbb68507e4b57a419b3f0175e60266  kernel-huge-4.4.111-i586-1.txz
81678780cde9ba1885ead0c5ec8348cd  kernel-huge-smp-4.4.111_smp-i686-1.txz
504677324345522321dce25515e1bb67  kernel-modules-4.4.111-i586-1.txz
0443b18244cad227346b2dc81301d8c0  kernel-modules-smp-4.4.111_smp-i686-1.txz
dc6d52e7f44bee953e8885c42ff969fe  kernel-source-4.4.111_smp-noarch-1.txz

Slackware x86_64 14.2 packages:
bf85158499277e0398e41293370abc4a  kernel-firmware-20180104_65b1c68-noarch-1.txz
cc3b1bf83ed853d867b86e68ccae43da  kernel-generic-4.4.111-x86_64-1.txz
3b8e65e8e2ed82c1c3320ddb552dbd5f  kernel-headers-4.4.111-x86-1.txz
db1e811cec9d0acc003226ca8fff6d73  kernel-huge-4.4.111-x86_64-1.txz
be8500e6820957f4ed674fb325fd0c53  kernel-modules-4.4.111-x86_64-1.txz
80f813a256d80064d584f09d18a77f9b  kernel-source-4.4.111-noarch-1.txz

Slackware -current packages:
bf85158499277e0398e41293370abc4a  a/kernel-firmware-20180104_65b1c68-noarch-1.txz
cd566e152b3504d350b68331a79f9924  a/kernel-generic-4.14.13-i586-1.txz
830a1b7ab36a1ccd0268d90eb9d202c4  a/kernel-generic-smp-4.14.13_smp-i686-1.txz
4077c7deecee1131e97e348c07e2bd52  a/kernel-huge-4.14.13-i586-1.txz
7f1070bb3f47dd960b26bfb4cb383e27  a/kernel-huge-smp-4.14.13_smp-i686-1.txz
a14936b31e2dbdb96f807006faebeaca  a/kernel-modules-4.14.13-i586-1.txz
115efae6390092080c0d8759cf0ab29e  a/kernel-modules-smp-4.14.13_smp-i686-1.txz
fe1ae020a95c8f2ee5dcf6e719454642  d/kernel-headers-4.14.13_smp-x86-1.txz
8698f2eb6e19738fd70e1190c12f1f77  k/kernel-source-4.14.13_smp-noarch-1.txz

Slackware x86_64 -current packages:
bf85158499277e0398e41293370abc4a  a/kernel-firmware-20180104_65b1c68-noarch-1.txz
ebdd84b0dd7951ab87a0f7ac80115c7b  a/kernel-generic-4.14.13-x86_64-1.txz
df6d28423447d505d2a934751fb84989  a/kernel-huge-4.14.13-x86_64-1.txz
c998eec627dc1734a6913bc651f45591  a/kernel-modules-4.14.13-x86_64-1.txz
61cdd86bb7f642786c72991db7ec1845  d/kernel-headers-4.14.13-x86-1.txz
8bab48aa2a5aad8547e7e6183db33c17  k/kernel-source-4.14.13-noarch-1.txz

Installation instructions:

Upgrade the packages as root:
# upgradepkg kernel-*.txz

If you are using an initrd, you'll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 14.2):
# /usr/share/mkinitrd/ -k 4.4.111-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 14.2):
# /usr/share/mkinitrd/ -k 4.4.111 | bash

Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU.  Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has.  If you aren't sure which
kernel you are running, run "uname -a".  If you see SMP there, you are
running the SMP kernel and should use the 4.4.111-smp version when running
mkinitrd_command_generator.  Note that this is only for 32-bit -- 64-bit
systems should always use 4.4.111 as the version.

If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.

If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel.  No editing should be required
unless your machine uses a custom lilo.conf.  If that is the case, be sure
that the image= line references the correct kernel file.  Either way,
you'll need to run "lilo" as root to reinstall the boot loader.

If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.


Slackware Linux Security Team

| To leave the slackware-security mailing list:                          |
| Send an email to with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |


Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.