SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Sun Nov 28 05:04:03 UTC 2021
ap/inxi-20211122_2feaf0b8-noarch-1.txz: Upgraded.
ap/neofetch-20211127_c1c69937-noarch-1.txz: Upgraded.
ap/sqlite-3.37.0-x86_64-1.txz: Upgraded.
a/kernel-generic-5.15.6-i586-1.txz: Upgraded.
Disabled PREEMPT on the non-SMP kernels, as it quickly leads to deadlocks.
a/kernel-huge-5.15.6-i586-1.txz: Upgraded.
Disabled PREEMPT on the non-SMP kernels, as it quickly leads to deadlocks.
3 updates (x86_64). Including a (* Security fix *)! : 3 upgraded
Code:
Thu Dec 2 19:14:20 UTC 2021
d/strace-5.15-x86_64-1.txz: Upgraded.
l/mozilla-nss-3.73-x86_64-1.txz: Upgraded.
Everything linked to NSS/NSPR was rebuild tested here.
This update fixes a critical security issue:
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are
vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS
signatures. Applications using NSS for handling signatures encoded within
CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications
using NSS for certificate validation or other TLS, X.509, OCSP or CRL
functionality may be impacted, depending on how they configure NSS.
Note: This vulnerability does NOT impact Mozilla Firefox. However, email
clients and PDF viewers that use NSS for signature verification, such as
Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted.
Thanks to Tavis Ormandy of Google Project Zero.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
(* Security fix *)
l/qt5-5.15.3_20211130_014c375b-x86_64-1.txz: Upgraded.
Side note :
As you can see, I now publish the changelog with the architecture
I have a version also for Slackware 32bits
I will publish it too, as it's different
Thanks to Petri Kaukasoina
Last edited by marav; 12-03-2021 at 02:33 PM.
Reason: + Security fix
Edit: Looks like Pat has now added this to the changelog, as well as releasing security fixes for Slackwares 14.x. The service in this place is excellent .
Last edited by semiprime; 12-04-2021 at 03:10 AM.
Reason: So that people don't think I'm an idiot who didn't spot what was clearly written in the changelog.
Sat Dec 4 20:31:55 UTC 2021
a/hwdata-0.354-noarch-1.txz: Upgraded.
a/sysklogd-2.3.0-x86_64-1.txz: Upgraded.
kde/breeze-icons-5.88.0-noarch-2.txz: Rebuilt.
Applied upstream patch:
[PATCH] Install dark icons via execute_process to use copy command.
Thanks to Heinz Wiesinger.
l/netpbm-10.96.04-x86_64-1.txz: Upgraded.
l/python-charset-normalizer-2.0.9-x86_64-1.txz: Upgraded.
13 updates (x86_64). Including a (* Security fix *)! : 11 upgraded, 2 rebuilt
Code:
Wed Dec 8 20:42:30 UTC 2021
a/kernel-generic-5.15.7-x86_64-1.txz: Upgraded.
a/kernel-huge-5.15.7-x86_64-1.txz: Upgraded.
a/kernel-modules-5.15.7-x86_64-1.txz: Upgraded.
d/kernel-headers-5.15.7-x86-1.txz: Upgraded.
k/kernel-source-5.15.7-noarch-1.txz: Upgraded.
n/samba-4.15.3-x86_64-1.txz: Upgraded.
This release fixes bugs and these regressions in the 4.15.2 release:
CVE-2020-25717: A user on the domain can become root on domain members.
https://www.samba.org/samba/security/CVE-2020-25717.html
PLEASE [RE-]READ!
The instructions have been updated and some workarounds initially advised
for 4.15.2 are no longer required and should be reverted in most cases.
BUG-14902: User with multiple spaces (eg Fred<space><space>Nurk) become
un-deletable. While this release should fix this bug, it is advised to have
a look at the bug report for more detailed information, see:
https://bugzilla.samba.org/show_bug.cgi?id=14902
For more information, see:
https://www.samba.org/samba/security/CVE-2020-25717.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
(* Security fix *)
x/libX11-1.7.3-x86_64-1.txz: Upgraded.
x/xscope-1.4.2-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-91.4.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/91.4.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
(* Security fix *)
xfce/exo-4.16.3-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.