SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
It might be useful, to avoid user mistake (as root)
and because I think the package must stay in the version provided by Slackware
to disable the auto-update feature (some others do the same, e.g fedora)
This can be done with the addition of the following patch in the SlackBuild
Code:
sed -i 's/my $b_update = 1;/my $b_update = 0;/' inxi
which gives the following message
Code:
# inxi -U
Error 20: Option: U has been disabled by the inxi distribution maintainer.
-current is ok, but 15.0 still has a vulnerable ImageMagick:
CVE-2022-44267: ImageMagick 7.1.0-49 is vulnerable to Denial of Service. When it parses a PNG image (e.g., for resize), the convert process could be left waiting for stdin input.
CVE-2022-44268: ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary remote file (if the ImageMagick binary has permissions to read it).
Does that vulnerability exist in versions previous to 7.1.0-49 ?
Slackware-15.0 has....
+--------------------------+
Sun Jan 30 20:48:46 UTC 2022
l/imagemagick-7.1.0_22-x86_64-1.txz: Upgraded.
________________________________________________
Hi all. This is not software related but, in my opinion, probably including an exam with multiple answers on own knowledge about slackware could be a good compendium to traditional documentation.
Especially for the newbies that for obvious reasons cannot understand that the outdated-looking Slackware documentation is still valid in most, most cases.
Tue Oct 26 22:01:32 UTC 2021
l/ffmpeg-4.4.1-x86_64-2.txz: Rebuilt.
Recompiled against libvpx-1.11.0.
l/gst-plugins-good-1.18.5-x86_64-2.txz: Rebuilt.
Recompiled against libvpx-1.11.0.
l/libvpx-1.11.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/qt5-5.15.3_20211024_2aa0de43-x86_64-1.txz: Upgraded.
Upgraded to latest git (might as well) and compiled against libvpx-1.11.0.
xap/xine-lib-1.2.11-x86_64-7.txz: Rebuilt.
Recompiled against libvpx-1.11.0.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.