Slackware 1229 Published by

New security updates are available for OpenSSL and p11-kit on Slackware 15.0. The OpenSSL update fixes several vulnerabilities, including heap out-of-bounds write, unauthenticated/unencrypted trailing bytes, and null pointer dereference issues. The p11-kit update addresses a single security issue: a NULL dereference via C_DeriveKey with specific NULL parameters. This vulnerability has been fixed in the latest version of p11-kit, which is now available for Slackware 15.0 and -current.

openssl (SSA:2026-037-02)
p11-kit (SSA:2026-037-01)



openssl (SSA:2026-037-02)


openssl (SSA:2026-037-02)

New openssl packages are available for Slackware 15.0 to fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/openssl-1.1.1ze-i586-1_slack15.0.txz: Upgraded.
Apply patch to fix the following security issues:
Fixed Heap out-of-bounds write in BIO_f_linebuffer on short writes.
Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB function
calls.
Fixed Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion.
Fixed Missing ASN1_TYPE validation in TS_RESP_verify_response() function.
Fixed NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex() function.
Fixed Missing ASN1_TYPE validation in PKCS#12 parsing.
Fixed ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function.
These CVEs were fixed by the 1.1.1ze release that is only available to
subscribers to OpenSSL's premium extended support. The patch was prepared
by backporting from the OpenSSL-3.0 repo.
Thanks to Ken Zalewski for the patch!
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2025-68160
https://www.cve.org/CVERecord?id=CVE-2025-69418
https://www.cve.org/CVERecord?id=CVE-2025-69419
https://www.cve.org/CVERecord?id=CVE-2025-69420
https://www.cve.org/CVERecord?id=CVE-2025-69421
https://www.cve.org/CVERecord?id=CVE-2026-22795
https://www.cve.org/CVERecord?id=CVE-2026-22796
(* Security fix *)
patches/packages/openssl-solibs-1.1.1ze-i586-1_slack15.0.txz: Upgraded.
+--------------------------+

Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
( http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/openssl-1.1.1ze-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/openssl-solibs-1.1.1ze-i586-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/openssl-1.1.1ze-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/openssl-solibs-1.1.1ze-x86_64-1_slack15.0.txz

MD5 signatures:
+-------------+

Slackware 15.0 packages:
9eb3161d34b27ddf1bd837eb6740a65d openssl-1.1.1ze-i586-1_slack15.0.txz
0230bf924143eff3cb415e57d11e633c openssl-solibs-1.1.1ze-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
42a66f3f102331fd4cfc5cce34d848de openssl-1.1.1ze-x86_64-1_slack15.0.txz
e462b1853f80f063a922e558d6074561 openssl-solibs-1.1.1ze-x86_64-1_slack15.0.txz

Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg openssl-1.1.1ze-i586-1_slack15.0.txz openssl-solibs-1.1.1ze-i586-1_slack15.0.txz

+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key



p11-kit (SSA:2026-037-01)


p11-kit (SSA:2026-037-01)

New p11-kit packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/p11-kit-0.26.2-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue:
rpc: fix NULL dereference via C_DeriveKey with specific NULL parameters.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2026-2100
(* Security fix *)
+--------------------------+

Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
( http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/p11-kit-0.26.2-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/p11-kit-0.26.2-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/p11-kit-0.26.2-i686-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/p11-kit-0.26.2-x86_64-1.txz

MD5 signatures:
+-------------+

Slackware 15.0 package:
97ddf299bf02e49a10b1c77be7aaa726 p11-kit-0.26.2-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
ffb232e42537d03547a19ab5cab29ad4 p11-kit-0.26.2-x86_64-1_slack15.0.txz

Slackware -current package:
231ea9b5ae31d8a312fe26629726c059 n/p11-kit-0.26.2-i686-1.txz

Slackware x86_64 -current package:
5f9c33d6fc1537e98c17ce81549e139d n/p11-kit-0.26.2-x86_64-1.txz

Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg p11-kit-0.26.2-i586-1_slack15.0.txz

+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key