krita (SSA:2026-093-02)
infozip (SSA:2026-093-01)
krita (SSA:2026-093-02)
krita (SSA:2026-093-02)
New krita packages are available for Slackware 15.0 to fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/krita-5.0.2-i586-3_slack15.0.txz: Rebuilt.
This update fixes a security issue:
Heap-based buffer overflow when parsing TGA files.
Thanks to pbslxw for the heads-up.
For more information, see:
https://kde.org/info/security/advisory-20250929-1.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59820
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
( http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/krita-5.0.2-i586-3_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/krita-5.0.2-x86_64-3_slack15.0.txz
MD5 signatures:
+-------------+
Slackware 15.0 package:
e6c6a2224f180c85bf081ba93ab19e61 krita-5.0.2-i586-3_slack15.0.txz
Slackware x86_64 15.0 package:
6de3b2e0ed7da333bdb77eab98c1331a krita-5.0.2-x86_64-3_slack15.0.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg krita-5.0.2-i586-3_slack15.0.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
infozip (SSA:2026-093-01)
infozip (SSA:2026-093-01)
New infozip packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/infozip-6.0-i586-8_slack15.0.txz: Rebuilt.
This update fixes security issues:
Improper handling of Unicode strings can lead to a null pointer dereference.
The conversion of a wide string to a local string leads to an of out-of-bounds
write.
Thanks to pbslxw for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
( http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/infozip-6.0-i586-8_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/infozip-6.0-x86_64-8_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/infozip-6.0-i686-8.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/infozip-6.0-x86_64-8.txz
MD5 signatures:
+-------------+
Slackware 15.0 package:
4cafad94e2466073f4a075a104edf0be infozip-6.0-i586-8_slack15.0.txz
Slackware x86_64 15.0 package:
63a6304f58b5e3117f904feb666dca43 infozip-6.0-x86_64-8_slack15.0.txz
Slackware -current package:
ed1f4bef97c67dc7cb64bc2e7e277a43 a/infozip-6.0-i686-8.txz
Slackware x86_64 -current package:
94f115066f8a09ef5fbda6b5a8673597 a/infozip-6.0-x86_64-8.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg infozip-6.0-i586-8_slack15.0.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key