Quote:
Originally Posted by ondoho
how?
does slackware have compulsory package management like debian?
so there were no kernel updates?
what about kernel security patches?
thanks for taking the time to explain things a little.
|
Slackware does not have compulsory anything. The mentality of the devs is more-or-less let us do what we want, when we want, how we want. While this can lead to out of date boxes for those that are too lazy, don't know how or for other reasons choose not to apply updates, it also gives us max control over our systems. I despise compulsory anything, and I despise high level of hand holding, which is not only why I left the Windows world, but is why I settled with Slackware.
Slackware 14.1 is using the 3.10.107 kernel, which was last updated June 2017 and hit end of life November 2017. I don't think Slackware 14.1 itself is at end of life, so I don't know why it still runs that old kernel, nor if there are any security implications for doing so. Since they have not updated the kernel for so long, the box did not require a reboot. It runs 24/7, never goes down, never needs attention. It just keeps running.
43 days ago I discovered the kernel had reached end of life, so decided to update the kernel. I didn't have time to rebuild the box, so I kept Slackware 14.1 and just installed a new kernel, 4.9.148. I see 4.9 is now up to 4.9.159, so I might update the kernel again.
I use the "slackpkg" package manager, which I think is the "official" package manager, to keep the box update.
So the question that comes to mind is, why is Slackware 14.1 still running an end of life kernel, and are their any security implications for doing so?