Linux kernel (SSA:2016-236-03)
From: Slackware Security Team <>
Subject: [slackware-security] Linux kernel (SSA:2016-236-03)
Date: Tue, 23 Aug 2016 14:31:47 -0700 (PDT)

Hash: SHA1

[slackware-security] Linux kernel (SSA:2016-236-03)

New Linux kernel packages are available for Slackware 14.2 and -current to
fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
patches/packages/linux-4.4.19/*: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
( for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on for
additional mirror sites near you.

Updated packages for Slackware 14.2:

Updated packages for Slackware x86_64 14.2:

Updated packages for Slackware -current:

Updated packages for Slackware x86_64 -current:

MD5 signatures:

Slackware 14.2 packages:
2c825a510bed80122f194b1d01af3fa0 kernel-firmware-20160823git-noarch-1_slack14.2.txz
cd6769504fa3d442c5a86b80e9d6a8f8 kernel-generic-4.4.19-i586-1_slack14.2.txz
19bdd53257f0266f044422acc0d27256 kernel-generic-smp-4.4.19_smp-i686-1_slack14.2.txz
a1dcff2c2ea9742684d212525bb3f0e0 kernel-headers-4.4.19_smp-x86-1_slack14.2.txz
f14e40ab6d30319c3568a431a6c5f34a kernel-huge-4.4.19-i586-1_slack14.2.txz
9e0c4fb01970b56609643abbdc0f570f kernel-huge-smp-4.4.19_smp-i686-1_slack14.2.txz
a5a9c9857876d1d3956e593d0c579218 kernel-modules-4.4.19-i586-1_slack14.2.txz
e65fdec2123d847d5be8fb0232b281c3 kernel-modules-smp-4.4.19_smp-i686-1_slack14.2.txz
4c605389c82b97a33d2559e5df2bebf2 kernel-source-4.4.19_smp-noarch-1_slack14.2.txz

Slackware x86_64 14.2 packages:
2c825a510bed80122f194b1d01af3fa0 kernel-firmware-20160823git-noarch-1_slack14.2.txz
40a410f5a628051bb1cc50ae88fd591d kernel-generic-4.4.19-x86_64-1_slack14.2.txz
91adc5fedd7aaf334de7665a735788cd kernel-headers-4.4.19-x86-1_slack14.2.txz
b772650ff79a6d357256e7a9aecd0a23 kernel-huge-4.4.19-x86_64-1_slack14.2.txz
149c712cccd49fa92ad06e33ce7c263a kernel-modules-4.4.19-x86_64-1_slack14.2.txz
cced4f9d6dbc5ef072c7ed557d8509a9 kernel-source-4.4.19-noarch-1_slack14.2.txz

Slackware -current packages:
2c825a510bed80122f194b1d01af3fa0 a/kernel-firmware-20160823git-noarch-1.txz
9083f53ce484767fd7c8cdbb40a2713f a/kernel-generic-4.4.19-i586-1.txz
2cd4d4ccabda7abc53ce25a10c37ccdb a/kernel-generic-smp-4.4.19_smp-i686-1.txz
9a1c7e393c5a5ff4e58613dc9a1db18c a/kernel-huge-4.4.19-i586-1.txz
bbc0d94f8d1e4403eaeb534c3edfacb8 a/kernel-huge-smp-4.4.19_smp-i686-1.txz
fd2c5fdc2e94e8be34c062592586f33e a/kernel-modules-4.4.19-i586-1.txz
6592497f616bb62fda7ce7cdb2f2f1f3 a/kernel-modules-smp-4.4.19_smp-i686-1.txz
04b40c091f4146347cfd3310be7b7f2e d/kernel-headers-4.4.19_smp-x86-1.txz
1cf357ecc4349463a0bdb6afc77e2eb4 k/kernel-source-4.4.19_smp-noarch-1.txz

Slackware x86_64 -current packages:
2c825a510bed80122f194b1d01af3fa0 a/kernel-firmware-20160823git-noarch-1.txz
b9883b33ee3706ac04646d5249763861 a/kernel-generic-4.4.19-x86_64-1.txz
d1b8e708f13f4a8eded5b0580f78472e a/kernel-huge-4.4.19-x86_64-1.txz
0edd8593e606554fd8ec65a4e167c0ca a/kernel-modules-4.4.19-x86_64-1.txz
5aa03b03d2163ca142eaf9eb1500dbbb d/kernel-headers-4.4.19-x86-1.txz
1e4b6ea7e5936f22671f5f8283ce513c k/kernel-source-4.4.19-noarch-1.txz

Installation instructions:

Upgrade the packages as root:
# upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.

For a 32-bit SMP machine, use this command:
# /usr/share/mkinitrd/ -k 4.4.19-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command:
# /usr/share/mkinitrd/ -k 4.4.19 | bash

Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 4.4.19-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 4.4.19 as the version.

If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.

If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you'll need to run "lilo" as root to reinstall the boot loader.

If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.


Slackware Linux Security Team

| To leave the slackware-security mailing list: |
| Send an email to with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |