Repository 32bit  Forum
Repository 64bit  Wiki
Wed Feb 7 04:28:48 UTC 2018
patches/packages/gcc-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
  Upgraded to the latest gcc-5 release, with patches to support
  -mindirect-branch=thunk-extern, allowing full mitigation of Spectre v2
  in the kernel (when CONFIG_RETPOLINE is used).
patches/packages/gcc-g++-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/gcc-gfortran-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/gcc-gnat-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/gcc-go-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/gcc-java-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/gcc-objc-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
patches/packages/linux-4.4.115/*: Upgraded.
  This kernel includes full retpoline mitigation for the Spectre (variant 2)
  speculative side channel attack.
  Please note that this kernel was compiled with gcc-5.5.0, also provided as
  an update for Slackware 14.2. You'll need to install the updated gcc in order
  to compile kernel modules that will load into this updated kernel.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
  (* Security fix *)