Slackware-15.0 ChangeLog (2021-12-29)
Wed Dec 29 20:48:42 UTC 2021
Packages
Upgraded
- a/kernel-firmware-20211229_57d6b95-noarch-1.txz
- a/kernel-generic-5.15.12-i586-1.txz
- a/kernel-generic-smp-5.15.12_smp-i686-1.txz
- a/kernel-huge-5.15.12-i586-1.txz
- a/kernel-huge-smp-5.15.12_smp-i686-1.txz
- a/kernel-modules-5.15.12-i586-1.txz
- a/kernel-modules-smp-5.15.12_smp-i686-1.txz
- d/kernel-headers-5.15.12_smp-x86-1.txz
- k/kernel-source-5.15.12_smp-noarch-1.txz
- extra/linux-5.15.12-nosmp-sdk/*
- kernels/*
Rebuilt
- isolinux/initrd.img
- usb-and-pxe-installers/usbboot.img
Wed Dec 29 02:42:32 UTC 2021
Packages
Upgraded
- l/libgsf-1.14.48-i586-1.txz
- l/netpbm-10.97.00-i586-1.txz
- xap/seamonkey-2.53.10.2-i686-1.txz
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.10.2
(* Security fix *)
Rebuilt
- n/wpa_supplicant-2.9-i586-8.txz
This update fixes the following security issues:
AP mode PMF disconnection protection bypass.
UPnP SUBSCRIBE misbehavior in hostapd WPS AP.
P2P group information processing vulnerability.
P2P provision discovery processing vulnerability.
ASN.1: Validate DigestAlgorithmIdentifier parameters.
Flush pending control interface message for an interface to be removed.
These issues could result in a denial-of-service, privilege escalation,
arbitrary code execution, or other unexpected behavior.
Thanks to nobodino for pointing out the patches.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004
(* Security fix *)