libtasn1 (SSA:2026-008-01)
New libtasn1 packages have been released for Slackware 15.0 and -current to fix a security issue caused by a stack-based buffer overflow. This update fixes CVE-2025-13151, and more information about the vulnerability can be found on the CERT website.
libtasn1 (SSA:2026-008-01)
libtasn1 (SSA:2026-008-01)
New packages for curl have been released to fix security issues on Slackware 15.0 and -current. The updates address three vulnerabilities: an OpenSSL partial chain store policy bypass, a bearer token leak on cross-protocol redirect, and No QUIC certificate pinning with GnuTLS.
curl (SSA:2026-007-01)
curl (SSA:2026-007-01)
New packages for libsodium are available to fix a security issue in Slackware 15.0 and -current. The update fixes an insufficient validation vulnerability in crypto_core_ed25519_is_valid_point() and can be found at the official Slackware FTP site. To upgrade, users should run the "upgradepkg libsodium-1.0.18-i586-4_slack15.0.txz" command as root. The security issue is documented on the CVE website with ID CVE-2025-69277.
libsodium (SSA:2026-006-01)
libsodium (SSA:2026-006-01)
New packages are available for Slackware 15.0 and -current to fix security issues with libpcap and seamonkey. The updates include fixes for bugs and security vulnerabilities, including a bug that affected character encoding mapping from UTF-16 to UTF-8 and other issues with OOBR and OOBW in pcap_ether_aton().
libpcap (SSA:2026-001-02)
seamonkey (SSA:2026-001-01)
libpcap (SSA:2026-001-02)
seamonkey (SSA:2026-001-01)
New gnupg2 packages are available for Slackware 15.0 and -current to address security issues, including CVE-2025-68973 and CVE-2025-68972. These updates also include improvements and require the installation of the new libgpg-error package. Additionally, new wget2 packages are available for Slackware 15.0 and -current to address bugs and security issues, including a file overwrite issue with metalink and buffer overflows in get_local_filename_real() and wget_iri_clone(). Users can upgrade these packages by running the command "upgradepkg" as root.
gnupg2 (SSA:2025-364-01)
wget2 (SSA:2025-364-02)
gnupg2 (SSA:2025-364-01)
wget2 (SSA:2025-364-02)
New vim packages are available for Slackware 15.0 and -current to address a security issue involving a buffer overflow with incomplete multi-byte characters. The updated packages include vim-9.1.2028-i586-1_slack15.0.txz, vim-gvim-9.1.2028-i586-1_slack15.0.txz, and corresponding packages for Slackware x86_64 15.0 and -current.
vim (SSA:2025-361-01)
vim (SSA:2025-361-01)
A security issue has been fixed in the net-snmp packages for Slackware 15.0 and current, with new updates available to fix a critical vulnerability triggered by a specially crafted trap. The update is a result of patches/packages/net-snmp-5.9.3-i586-2_slack15.0.txz, which can be downloaded from the Slackware FTP site or other mirror sites near you.
net-snmp (SSA:2025-359-01)
net-snmp (SSA:2025-359-01)
New packages for PHP have been released to address security issues in Slackware 15.0 and -current. The updates fix vulnerabilities in PDO quoting, array_merge(), and getimagesize(). Users can find the updated packages at various mirror sites, including ftp.slackware.com and osuosl.org. To install the new package, users should upgrade as root and then restart Apache httpd.
php (SSA:2025-353-01)
php (SSA:2025-353-01)
New Mozilla Thunderbird packages are available for Slackware 15.0 and -current to address security issues. The updated package, version 140.6.0esr, includes security fixes and improvements.
mozilla-thunderbird (SSA:2025-345-01)
mozilla-thunderbird (SSA:2025-345-01)
Mozilla Firefox has released new packages to fix security issues, available for Slackware 15.0 and -current. The update includes security fixes and improvements, and can be found on the official Mozilla website. To install the update, users should run "upgradepkg mozilla-firefox-140.6.0esr-i686-1_slack15.0.txz" as root.
mozilla-firefox (SSA:2025-343-01)
mozilla-firefox (SSA:2025-343-01)
Security updates are available for libpng and httpd packages on Slackware 15.0 and -current. The libpng update fixes a high-severity security issue related to an out-of-bounds read, while the httpd update addresses multiple security issues, including bugs and vulnerabilities that could allow bypasses or data leaks. The updated packages can be downloaded from the Slackware FTP site or other mirror sites listed on the project's website. To install the updates, run the upgradepkg command as root and then restart Apache httpd.
libpng (SSA:2025-338-02)
httpd (SSA:2025-338-01)
libpng (SSA:2025-338-02)
httpd (SSA:2025-338-01)
New libxslt packages are available for Slackware 15.0 and -current to fix security issues. The updates address vulnerabilities including CVE-2025-9714, CVE-2025-7424, and CVE-2025-11731. These fixes were contributed by Apple's engineers, who identified type confusion in xmlNode.psvi between stylesheet and source nodes.
libxslt (SSA:2025-332-01)
libxslt (SSA:2025-332-01)
New cups packages are available for Slackware 15.0 and -current to fix security issues. These updates address various bugs and security vulnerabilities, including local denial-of-service (DoS) issues and unresponsive cupsd processes. The updated packages can be downloaded from the official Slackware FTP server or other mirror sites listed on the "Get Slack" section of slackware.com. To install the update, users should upgrade the package as root using upgradepkg, followed by restarting the CUPS server with /etc/rc.d/rc.cups restart.
cups (SSA:2025-331-01)
cups (SSA:2025-331-01)
The libpng package for Slackware 15.0 and -current has been updated to address security issues, including CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, and CVE-2025-65018. These updates fix heap buffer overflows and over-reads in the PNG library, which could potentially be exploited by attackers.
libpng (SSA:2025-327-01)
libpng (SSA:2025-327-01)
New gnutls packages are available for Slackware 15.0 and -current to fix security issues, including a stack overwrite vulnerability in libgnutls that was reported by Luigino Camastra from Aisle Research (CVE-2025-9820).
gnutls (SSA:2025-324-01)
gnutls (SSA:2025-324-01)
New openvpn packages are available for Slackware 15.0 and -current to fix security issues. The update, which includes OpenVPN version 2.6.16, fixes a bug that renders HMAC-based protection against state exhaustion when receiving spoofed TLS handshake packets inefficient. Users can find the new packages at ftp.slackware.com or additional mirror sites listed on slackware.com.
openvpn (SSA:2025-323-01)
openvpn (SSA:2025-323-01)
New libarchive packages have been released for Slackware 15.0 and -current to fix several security issues. The update includes patches to prevent buffer overruns, including one in LHA when using p[H_LEVEL_OFFSET] and another in 7-Zip when reading truncated headers.
libarchive (SSA:2025-322-01)
libarchive (SSA:2025-322-01)
New xpdf packages have been released for Slackware 15.0 to fix several security issues. The packages contain fixes for bugs and security issues listed in CVE records from 2024 to 2025.
xpdf (SSA:2025-319-01)
xpdf (SSA:2025-319-01)
Mozilla Thunderbird packages have been updated to fix security issues. The new versions are available for Slackware 15.0 and -current, with the release containing various security fixes and improvements.
mozilla-thunderbird (SSA:2025-316-01)
mozilla-thunderbird (SSA:2025-316-01)
Mozilla Firefox packages have been updated to fix security issues for Slackware 15.0 and -current. The update, version 140.5.0esr, includes security fixes and improvements, as detailed in the Mozilla release notes and security advisories.
mozilla-firefox (SSA:2025-315-01)
mozilla-firefox (SSA:2025-315-01)