[slackware-security] python3 (SSA:2022-077-01) New python3 packages are available for Slackware 15.0 and -current to fix security issues.Läs mer...
Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/python3-3.9.11-i586-1_slack15.0.txz: Upgraded. This update fixes bugs and security issues: libexpat upgraded from 2.4.1 to 2.4.7 bundled pip upgraded from 21.2.4 to 22.0.4 authorization bypass fixed in urllib.request REDoS avoided in importlib.metadata For more information, see: https://pythoninsider.blogspot.com/2022/03/python-3103-3911-3813-and-3713-are-now.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28363 (* Security fix *) +--------------------------+
[slackware-security] openssl (SSA:2022-076-02) New openssl packages are available for Slackware 14.2, 15.0, and -current to fix a security issue.Läs mer...
Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/openssl-1.1.1n-i586-1_slack15.0.txz: Upgraded. This update fixes a high severity security issue: The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. For more information, see: https://www.openssl.org/news/secadv/20220315.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 (* Security fix *) patches/packages/openssl-solibs-1.1.1n-i586-1_slack15.0.txz: Upgraded. +--------------------------+
[slackware-security] bind (SSA:2022-076-01) New bind packages are available for Slackware 14.0, 14.1, 14.2, 15.0, and -current to fix security issues.Läs mer...
Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/bind-9.18.1-i586-1_slack15.0.txz: Upgraded. This update fixes bugs and the following security issues: An assertion could occur in resume_dslookup() if the fetch had been shut down earlier. Lookups involving a DNAME could trigger an INSIST when "synth-from-dnssec" was enabled. A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer() to be called recursively, which in turn left TCP connections hanging in the CLOSE_WAIT state blocking indefinitely when out-of-order processing was disabled. The rules for acceptance of records into the cache have been tightened to prevent the possibility of poisoning if forwarders send records outside the configured bailiwick. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220 (* Security fix *) +--------------------------+
Runda 18...
5.16.16 RC1 med 28 uppdateringar/ändringar sedan 5.16.15
5.15.30 RC1 med 25 uppdateringar/ändringar sedan 5.15.29
5.10.107 RC1 med 23 uppdateringar/ändringar sedan 5.10.106
5.4.186 RC1 med 43 uppdateringar/ändringar sedan 5.4.185
Redigerat:
Ovan listade kärnor är nu släppta, och 5.16.16 finner du nu i -current (vid uppdatering)
Senaste versionen av Skypeforlinux släpptes som stabil version igår.
Precis som tidigare, endast i 64-bit version
Slackforlinux finner du här (.deb paket - Välj rätt fil för nedladdning).
SlackBuild för 15.0 14.2 -current
OBS! Samtliga ovan listade SlackBuilds har en äldre version av Skypeforlinux, så redigering av SlackBuild krävs.
Tänk också på att det inte finns någon garanti för att nyare versioner av Skypeforlinux och befintlig SlackBuild fungerar "som det är",
utan vissa "dependencies" kan ha tillkommit (alt. dess versioner kan behöva en uppdatering också).
Till minne av Håkan Nilsson
Mitt Slackware
Appendix Programhantering