Home / mailings [slackware-security] kernel (SSA:2026-135-02)
Posted on 16 May 2026
Slackware Security[slackware-security] kernel (SSA:2026-135-02)
New kernel packages are available for Slackware 15.0 and -current to fix
a security issue.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/linux-5.15.207/kernel-generic-5.15.207-i586-1.txz: Upgraded.
This update fixes a security issue:
ptrace: slightly saner 'get_dumpable()' logic.
For more information, see:
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
https://www.cve.org/CVERecord?id=CVE-2026-46333
(* Security fix *)
patches/packages/linux-5.15.207/kernel-generic-smp-5.15.207_smp-i686-1.txz: Upgraded.
This update fixes a security issue:
ptrace: slightly saner 'get_dumpable()' logic.
For more information, see:
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
https://www.cve.org/CVERecord?id=CVE-2026-46333
(* Security fix *)
patches/packages/linux-5.15.207/kernel-headers-5.15.207_smp-x86-1.txz: Upgraded.
patches/packages/linux-5.15.207/kernel-huge-5.15.207-i586-1.txz: Upgraded.
This update fixes a security issue:
ptrace: slightly saner 'get_dumpable()' logic.
For more information, see:
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
https://www.cve.org/CVERecord?id=CVE-2026-46333
(* Security fix *)
patches/packages/linux-5.15.207/kernel-huge-smp-5.15.207_smp-i686-1.txz: Upgraded.
This update fixes a security issue:
ptrace: slightly saner 'get_dumpable()' logic.
For more information, see:
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
https://www.cve.org/CVERecord?id=CVE-2026-46333
(* Security fix *)
patches/packages/linux-5.15.207/kernel-modules-5.15.207-i586-1.txz: Upgraded.
patches/packages/linux-5.15.207/kernel-modules-smp-5.15.207_smp-i686-1.txz: Upgraded.
patches/packages/linux-5.15.207/kernel-source-5.15.207_smp-noarch-1.txz: Upgraded.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-generic-5.15.207-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-generic-smp-5.15.207_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-headers-5.15.207_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-huge-5.15.207-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-huge-smp-5.15.207_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-modules-5.15.207-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-modules-smp-5.15.207_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.207/kernel-source-5.15.207_smp-noarch-1.txz
Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.207/kernel-generic-5.15.207-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.207/kernel-headers-5.15.207-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.207/kernel-huge-5.15.207-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.207/kernel-modules-5.15.207-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.207/kernel-source-5.15.207-noarch-1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-6.12.89-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-headers-6.12.89-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-source-6.12.89-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-6.18.x/kernel-generic-6.18.31-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-6.18.x/kernel-headers-6.18.31-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-6.18.x/kernel-source-6.18.31-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-7.0.x/kernel-generic-7.0.8-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-7.0.x/kernel-headers-7.0.8-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/testing/packages/linux-7.0.x/kernel-source-7.0.8-noarch-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-generic-6.18.31-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-headers-6.18.31-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-source-6.18.31-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/testing/packages/linux-7.0.x/kernel-generic-7.0.8-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/testing/packages/linux-7.0.x/kernel-headers-7.0.8-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/testing/packages/linux-7.0.x/kernel-source-7.0.8-noarch-1.txz
MD5 signatures:
+-------------+
Slackware 15.0 packages:
b84cf4fec2daf824381f1710ad0be7b1 kernel-generic-5.15.207-i586-1.txz
ed3e39be15e75222af28695b43273ef0 kernel-generic-smp-5.15.207_smp-i686-1.txz
05b9db0c3abac1c197aade4f163da71a kernel-headers-5.15.207_smp-x86-1.txz
8742e0b82b17663662308705ca9ad395 kernel-huge-5.15.207-i586-1.txz
532ee470da5bfa3660a744e72fd79980 kernel-huge-smp-5.15.207_smp-i686-1.txz
79b7e0bc917dac85d077db4e9edb39ef kernel-modules-5.15.207-i586-1.txz
1e48832efb8f47a06bfe19ad3d635f1f kernel-modules-smp-5.15.207_smp-i686-1.txz
b453b45262d1fe804606e830ee804487 kernel-source-5.15.207_smp-noarch-1.txz
Slackware x86_64 15.0 packages:
131bf6d345f78815107575fe67377a17 kernel-generic-5.15.207-x86_64-1.txz
90a9e87331c1c6ebdc1a648355d194cc kernel-headers-5.15.207-x86-1.txz
e9f6241925a59612c75e0cd3f757c5cb kernel-huge-5.15.207-x86_64-1.txz
5eadfa4b2e27bdfe988a326b0f2e5ca6 kernel-modules-5.15.207-x86_64-1.txz
dde8e3dbdd268f8c2c28785e1b14733e kernel-source-5.15.207-noarch-1.txz
Slackware -current packages:
1830531a682f02f8d87bc8e973c338a4 kernel-generic-6.12.89-i686-1.txz
9c2eeca46bbcd79babcde0e071a0aeb1 kernel-headers-6.12.89-x86-1.txz
ab22a88912eaaef34c375ff2f22dc788 kernel-source-6.12.89-noarch-1.txz
771128e092494397ea96677b835a8274 kernel-generic-6.18.31-i686-1.txz
744ca4b852debc9f41e59060bab388fa kernel-headers-6.18.31-x86-1.txz
89a8cbec5ed70f556ab96d3448499377 kernel-source-6.18.31-noarch-1.txz
1f6b3b0061ccec3bb8dbc1c08c601ef4 kernel-generic-7.0.8-i686-1.txz
9788ae933663b82fa46a13ea653a9137 kernel-headers-7.0.8-x86-1.txz
613bb5c0780814a3168b800ce6a24ed5 kernel-source-7.0.8-noarch-1.txz
Slackware x86_64 -current packages:
5a14babaf21d1ea453ba432ab545d310 kernel-generic-6.18.31-x86_64-1.txz
b1b29bb1c047b096223ac430332a04d1 kernel-headers-6.18.31-x86-1.txz
6d3e948d2bb457b775a100a3cf42cc22 kernel-source-6.18.31-noarch-1.txz
61d05b396466b85fab33693c79522668 kernel-generic-7.0.8-x86_64-1.txz
161f09e47a5020db4070f08a6ee8a944 kernel-headers-7.0.8-x86-1.txz
b205129402862d683f88b916e518f075 kernel-source-7.0.8-noarch-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 15.0):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.207-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 15.0):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.207 | bash
Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 5.15.207-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 5.15.207 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.
If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
