New kernel packages are available for Slackware x86_64 13.1, and -current to fix security issues.
Here are the details from the Slackware64 13.1 ChangeLog: +--------------------------+ patches/packages/linux-18.104.22.168-2/kernel-firmware-22.214.171.124-noarch-2.txz: Rebuilt. patches/packages/linux-126.96.36.199-2/kernel-generic-188.8.131.52-x86_64-2.txz: Rebuilt. This kernel has been patched to fix security problems on x86_64: 64-bit Compatibility Mode Stack Pointer Underflow (CVE-2010-3081). IA32 System Call Entry Point Vulnerability (CVE-2010-3301). These vulnerabilities allow local users to gain root privileges. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301 (* Security fix *) patches/packages/linux-184.108.40.206-2/kernel-headers-220.127.116.11-x86-2.txz: Rebuilt. patches/packages/linux-18.104.22.168-2/kernel-huge-22.214.171.124-x86_64-2.txz: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) patches/packages/linux-126.96.36.199-2/kernel-modules-188.8.131.52-x86_64-2.txz: Rebuilt. patches/packages/linux-184.108.40.206-2/kernel-source-220.127.116.11-noarch-2.txz: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) patches/packages/linux-18.104.22.168-2/kernels/*: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-)
Upgrade the packages as root: # upgradepkg kernel-*txz
Then, make sure that LILO is configured to be using the correct kernel file, and reinstall LILO (run "lilo" as root).
NOTE FOR SPEAKUP: If you are using a Speakup kernel, you will need to copy the bzImage file from the kernels/speakup.s/ directory to your /boot directory. Rename bzImage to whatever filename LILO expects in /etc/lilo. Then, run "lilo".