Last kernel version 2.6 update in slackware64-13.37:
--------------------------+
Mon May 20 21:01:33 UTC 2013
patches/packages/linux-2.6.37.6-3/*: Rebuilt.
Added new kernel packages with a patch for CVE-2013-2094, a bug that can
allow local users to gain a root shell. Be sure to reinstall LILO after
upgrading the kernel packages.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename...=CVE-2013-2094
(* Security fix *)
+--------------------------+
EOL notice for slackware versions 13.X
+--------------------------+
Fri Apr 6 20:47:43 UTC 2018
####################################################################
# NOTICE OF INPENDING EOL (END OF LIFE) FOR OLD SLACKWARE VERSIONS #
# #
# Effective July 5, 2018, security patches will no longer be #
# provided for the following versions of Slackware (which will all #
# be more than 7 years old at that time): #
# Slackware 13.0, Slackware 13.1, Slackware 13.37. #
# If you are still running these versions you should consider #
# migrating to a newer version (preferably as recent as possible). #
# Alternately, you may make arrangements to handle your own #
# security patches. #
####################################################################
patches/packages/patch-2.7.4-x86_64-2_slack13.37.txz: Rebuilt.
Fix arbitrary shell execution possible with obsolete ed format patches.
For more information, see:
https://cve.mitre.org/cgi-bin/cvenam...E-2018-1000156
(* Security fix *)
+--------------------------+