<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <atom:link href="https://www.sya54m.eu/ChangeLog-arm-15.0.xml" rel="self" type="application/rss+xml" />
    <title>Slackwarearm-15.0 ChangeLog</title>
    <link>https://www.sya54m.eu</link>
    <description>Latest 20 entries in the Slackwarearm-15.0 ChangeLog</description>
    <image>
      <url>https://www.sya54m.eu/immagini/s256.png</url>
      <title>Slackwarearm-15.0 ChangeLog</title>
      <link>https://www.sya54m.eu</link>
    </image>
    <language>en</language>
    <pubDate>Sun, 12 Apr 2026 10:08:08 +0200</pubDate>
    <lastBuildDate>Mon, 13 Apr 2026 19:30:09 +0200</lastBuildDate>
    <generator>www.sya54m.eu</generator>
<item>
      <title>Sun Apr 12 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sun, 12 Apr 2026 10:08:08 +0200</pubDate>
      <guid isPermaLink="false">1775981288</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/openssl-1.1.1zg-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/openssl-1.1.1zg-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Apply patch to fix the following security issues:<br>&nbsp;&nbsp;Potential Use-after-free in DANE Client Code.<br>&nbsp;&nbsp;NULL Pointer Dereference When Processing a Delta CRL.<br>&nbsp;&nbsp;Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo.<br>&nbsp;&nbsp;Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo.<br>&nbsp;&nbsp;These CVEs were fixed by the 1.1.1zg release that is only available to<br>&nbsp;&nbsp;subscribers to OpenSSL's premium extended support. The patch was prepared<br>&nbsp;&nbsp;by backporting from the OpenSSL-3.0 repo.<br>&nbsp;&nbsp;Thanks to Ken Zalewski for the patch!<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://openssl-library.org/news/vulnerabilities/#CVE-2026-28387<br>&nbsp;&nbsp;&nbsp;&nbsp;https://openssl-library.org/news/vulnerabilities/#CVE-2026-28388<br>&nbsp;&nbsp;&nbsp;&nbsp;https://openssl-library.org/news/vulnerabilities/#CVE-2026-28389<br>&nbsp;&nbsp;&nbsp;&nbsp;https://openssl-library.org/news/vulnerabilities/#CVE-2026-28390<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28387<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28388<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28389<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28390<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/openssl-solibs-1.1.1zg-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/openssl-solibs-1.1.1zg-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>]]></description>
    </item>
<item>
      <title>Fri Apr 10 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Fri, 10 Apr 2026 10:08:08 +0200</pubDate>
      <guid isPermaLink="false">1775808488</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libpng-1.6.57-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libpng-1.6.57-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Fixed a medium severity security issue:<br>&nbsp;&nbsp;Use-after-free in `png_set_PLTE`, `png_set_tRNS` and `png_set_hIST`<br>&nbsp;&nbsp;leading to corrupted chunk data and potential heap information disclosure.<br>&nbsp;&nbsp;Also hardened the append-style setters (`png_set_text`, `png_set_sPLT`,<br>&nbsp;&nbsp;`png_set_unknown_chunks`) against a theoretical variant of the same<br>&nbsp;&nbsp;aliasing pattern.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-34757<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Sat Apr 04 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sat, 04 Apr 2026 10:08:08 +0200</pubDate>
      <guid isPermaLink="false">1775290088</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/infozip-6.0-arm-6_slack15.0.txz' rel='nofollow'>patches/packages/infozip-6.0-arm-6_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Improper handling of Unicode strings can lead to a null pointer dereference.<br>&nbsp;&nbsp;The conversion of a wide string to a local string leads to an of out-of-bounds<br>&nbsp;&nbsp;write.<br>&nbsp;&nbsp;Thanks to pbslxw for the heads-up.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217<br>&nbsp;&nbsp;&nbsp;&nbsp;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529<br>&nbsp;&nbsp;&nbsp;&nbsp;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Wed Apr 01 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Wed, 01 Apr 2026 10:08:08 +0200</pubDate>
      <guid isPermaLink="false">1775030888</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/xz-5.2.13-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/xz-5.2.13-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Fix a buffer overflow in lzma_index_append().<br>&nbsp;&nbsp;Fix invalid memory access in --files and --files0.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34743<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Fri Mar 27 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Fri, 27 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1774598888</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/extra/tigervnc/tigervnc-1.16.2-arm-1_slack15.0.txz' rel='nofollow'>extra/tigervnc/tigervnc-1.16.2-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Fixed missing security fixes in the 1.16.1 release.<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libpng-1.6.56-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libpng-1.6.56-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE.<br>&nbsp;&nbsp;Out-of-bounds read/write in the palette expansion on ARM Neon.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-33416<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-33636<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Mar 26 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 26 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1774512488</guid>
      <description><![CDATA[<br>If you appreciate what we're doing with Slackware Linux on ARM, please consider<br>making a donation to support us. Your contribution helps maintain essential<br>hardware, cover electricity costs, and keep this longstanding open-source<br>project thriving.<br><br>You'll find the ways you can help here:<br>&nbsp;&nbsp; https://arm.slackware.com/sponsor/<br><br>Thanks for all of your support!<br><br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/extra/tigervnc/tigervnc-1.16.1-arm-1_slack15.0.txz' rel='nofollow'>extra/tigervnc/tigervnc-1.16.1-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;The bug fix release TigerVNC 1.16.1 is now available. This release is<br>&nbsp;&nbsp;primarily a security release to fix an issue in x0vncserver, where other<br>&nbsp;&nbsp;users can observe and manipulate the screen contents. Users of<br>&nbsp;&nbsp;x0vncserver are advised to update immediately.<br>&nbsp;&nbsp;The release also contains a fix for using the Plain security type with<br>&nbsp;&nbsp;the new w0vncserver, as well as some translation updates.<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/bind-9.18.47-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/bind-9.18.47-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes a security issue:<br>&nbsp;&nbsp;Fix unbounded NSEC3 iterations when validating referrals to unsigned<br>&nbsp;&nbsp;delegations.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://kb.isc.org/docs/cve-2026-1519<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-1519<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Mar 19 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 19 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1773907688</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/expat-2.7.5-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/expat-2.7.5-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Fix NULL function pointer dereference for empty external parameter entities;<br>&nbsp;&nbsp;it takes use of both functions XML_ExternalEntityParserCreate and<br>&nbsp;&nbsp;XML_SetParamEntityParsing for an application to be vulnerable.<br>&nbsp;&nbsp;Protect from XML_TOK_INSTANCE_START infinite loop in function<br>&nbsp;&nbsp;entityValueProcessor; it takes use of both functions<br>&nbsp;&nbsp;XML_ExternalEntityParserCreate and XML_SetParamEntityParsing for an<br>&nbsp;&nbsp;application to be vulnerable.<br>&nbsp;&nbsp;Fix NULL dereference in function setContext on retry after an earlier<br>&nbsp;&nbsp;ouf-of-memory condition; it takes use of function XML_ParserCreateNS or<br>&nbsp;&nbsp;XML_ParserCreate_MM for an application to be vulnerable.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-32776<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-32777<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-32778<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Mar 12 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 12 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1773302888</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libarchive-3.8.6-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libarchive-3.8.6-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes bugs and security issues:<br>&nbsp;&nbsp;libarchive: fix incompatibility with Nettle 4.x (#2858)<br>&nbsp;&nbsp;libarchive: fix NULL pointer dereference in<br>&nbsp;&nbsp;archive_acl_from_text_w() (#2859)<br>&nbsp;&nbsp;bsdunzip: fix ISO week year and Gregorian year confusion (#2860)<br>&nbsp;&nbsp;7zip: ix SEGV in check_7zip_header_in_sfx via ELF offset validation (#2864)<br>&nbsp;&nbsp;7zip: fix out-of-bounds access on ELF 64-bit header (#2875)<br>&nbsp;&nbsp;RAR5 reader: fix infinite loop in rar5 decompression (#2877)<br>&nbsp;&nbsp;RAR5 reader: fix potential memory leak (#2892)<br>&nbsp;&nbsp;RAR5: fix SIGSEGV when archive_read_support_format_rar5 is called<br>&nbsp;&nbsp;twice (#2893)<br>&nbsp;&nbsp;CAB reader: fix memory leak on repeated calls to<br>&nbsp;&nbsp;archive_read_support_format_cab (#2895)<br>&nbsp;&nbsp;mtree reader: Fix file descriptor leak in mtree parser<br>&nbsp;&nbsp;cleanup (CWE-775, #2878)<br>&nbsp;&nbsp;various small bugfixes in code and documentation<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libxml2-2.11.9-arm-7_slack15.0.txz' rel='nofollow'>patches/packages/libxml2-2.11.9-arm-7_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;CVE-2026-1757 fix: Memory leak in xmllint Shell - shell.c<br>&nbsp;&nbsp;CVE-2026-0990 fix: Prevent infinite recursion in<br>&nbsp;&nbsp;xmlCatalogListXMLResolve<br>&nbsp;&nbsp;CVE-2026-0992 fix: Exponential behavior when handling<br>&nbsp;&nbsp;parser: Fix infinite loop in xmlCtxtParseContent<br>&nbsp;&nbsp;CVE-2025-10911 libxslt related: Ignore next/prev of documents when<br>&nbsp;&nbsp;traversing XPath<br>&nbsp;&nbsp;CVE-2026-0989 fix: Add RelaxNG include limit<br>&nbsp;&nbsp;Thanks to r1w1s1 for locating the backported patches.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-1757<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0990<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0992<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-10911<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0989<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Mar 05 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 05 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1772698088</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/nfs-utils-2.5.4-arm-3_slack15.0.txz' rel='nofollow'>patches/packages/nfs-utils-2.5.4-arm-3_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;Added sample /etc/idmapd.conf and missing documentation for nfsidmap.<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/nvi-1.81.6-arm-3_slack15.0.txz' rel='nofollow'>patches/packages/nvi-1.81.6-arm-3_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;Merge patchset from Debian.<br>&nbsp;&nbsp;This makes a number of fixes and improvements, especially concerning<br>&nbsp;&nbsp;wide-character support. It also fixes a possible heap-based buffer<br>&nbsp;&nbsp;overflow in the regex handling affecting 32-bit platforms.<br>&nbsp;&nbsp;Thanks to r1w1s1.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2015-2305<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Wed Mar 04 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Wed, 04 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1772611688</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/glibc-zoneinfo-2026a-noarch-1_slack15.0.txz' rel='nofollow'>patches/packages/glibc-zoneinfo-2026a-noarch-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This package provides the latest timezone updates.<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/nfs-utils-2.5.4-arm-2_slack15.0.txz' rel='nofollow'>patches/packages/nfs-utils-2.5.4-arm-2_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;rc.nfsd: mount nfsd virtual filesystem on /proc/fs/nfsd, not /proc/fs/nfs.<br>&nbsp;&nbsp;Thanks to Jonathan Woithe.<br>&nbsp;&nbsp;Kill processes only within the current namespace.<br>&nbsp;&nbsp;Support starting rpc.gssd, rpc.svcgssd, and rpc.idmapd.<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/python3-3.9.25-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/python3-3.9.25-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes bugs and security issues.<br>&nbsp;&nbsp;For details, see /usr/doc/python3-3.9.25/Misc/NEWS.<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Sun Mar 01 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sun, 01 Mar 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1772352488</guid>
      <description><![CDATA[<br>If you appreciate what we're doing with Slackware Linux on ARM, please consider<br>making a donation to support us. Your contribution helps maintain essential<br>hardware, cover electricity costs, and keep this longstanding open-source<br>project thriving.<br><br>You'll find the ways you can help here:<br>&nbsp;&nbsp; https://arm.slackware.com/sponsor/<br><br>Thanks for all of your support!<br><br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/bind-9.18.46-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/bind-9.18.46-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This is a bugfix release.<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/gvfs-1.48.1-arm-2_slack15.0.txz' rel='nofollow'>patches/packages/gvfs-1.48.1-arm-2_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;ftp: Use control connection address for PASV data.<br>&nbsp;&nbsp;ftp: Reject paths containing CR/LF characters.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28295<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-28296<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/telnet-0.17-arm-6_slack15.0.txz' rel='nofollow'>patches/packages/telnet-0.17-arm-6_slack15.0.txz</a>:&nbsp;&nbsp;Rebuilt.<br></b>&nbsp;&nbsp;This update fixes a security issue:<br>&nbsp;&nbsp;The nextitem() function in telnetd/utility.c has no bounds checking in the SB<br>&nbsp;&nbsp;(suboption) case. The for(;;) loop scans past nfrontp into uncontrolled<br>&nbsp;&nbsp;memory. This can be exploited by an unauthenticated remote attacker to<br>&nbsp;&nbsp;execute arbitrary code on the server running telnetd.<br>&nbsp;&nbsp;Please note that while telnet itself is a useful utility for network testing,<br>&nbsp;&nbsp;telnetd is a legacy application which should generally not be used. If it is<br>&nbsp;&nbsp;used, it should be used only on isolated networks where there is no<br>&nbsp;&nbsp;expectation of security.<br>&nbsp;&nbsp;Thanks to r1w1s1.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2020-10188<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Tue Feb 17 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Tue, 17 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1771315688</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libssh-0.11.4-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libssh-0.11.4-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;SCP Protocol Path Traversal in ssh_scp_pull_request().<br>&nbsp;&nbsp;Possible Denial of Service when parsing unexpected configuration files.<br>&nbsp;&nbsp;Buffer underflow in ssh_get_hexa() on invalid input.<br>&nbsp;&nbsp;Specially crafted patterns could cause DoS.<br>&nbsp;&nbsp;OOB Read in sftp_parse_longname().<br>&nbsp;&nbsp;Read buffer overrun when handling SFTP extensions.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0964<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0965<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0966<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0967<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-0968<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-14821<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/lrzip-0.660-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/lrzip-0.660-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Address multiple potential security issues with crafted or corrupt archives.<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/whois-5.6.6-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/whois-5.6.6-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Added the .mc TLD server.<br>&nbsp;&nbsp;Updated the .ps TLD server.<br>&nbsp;&nbsp;Removed the .info, .mobi, .travel and .ï¿œ.ï¿œ.Ø³Ø·ï¿œ.ï¿œ. (.xn--ygbi2ammx,<br>&nbsp;&nbsp;Palestinian Territory) TLD servers.<br>&nbsp;&nbsp;Removed 3 new gTLDs which are no longer active.<br>&nbsp;&nbsp;mkpasswd: added support the Chinese SM3-based hashing algorithms.<br>]]></description>
    </item>
<item>
      <title>Sun Feb 15 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sun, 15 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1771142888</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/ca-certificates-20260212-noarch-1_slack15.0.txz' rel='nofollow'>patches/packages/ca-certificates-20260212-noarch-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update provides the latest CA certificates to check for the<br>&nbsp;&nbsp;authenticity of SSL connections.<br>]]></description>
    </item>
<item>
      <title>Thu Feb 12 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 12 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1770883688</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/gnutls-3.8.12-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/gnutls-3.8.12-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;libgnutls: Fix NULL pointer dereference in PSK binder verification.<br>&nbsp;&nbsp;libgnutls: Fix name constraint processing performance issue.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-1584<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-14831<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libpng-1.6.55-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libpng-1.6.55-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Fixed a high severity security issue:<br>&nbsp;&nbsp;Heap buffer overflow in `png_set_quantize`.<br>&nbsp;&nbsp;Reported and fixed by Joshua Inscoe.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-25646<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Sat Feb 07 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sat, 07 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1770451688</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/openssl-1.1.1ze-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/openssl-1.1.1ze-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Apply patch to fix the following security issues:<br>&nbsp;&nbsp;Fixed Heap out-of-bounds write in BIO_f_linebuffer on short writes.<br>&nbsp;&nbsp;Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB function<br>&nbsp;&nbsp;calls.<br>&nbsp;&nbsp;Fixed Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion.<br>&nbsp;&nbsp;Fixed Missing ASN1_TYPE validation in TS_RESP_verify_response() function.<br>&nbsp;&nbsp;Fixed NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex() function.<br>&nbsp;&nbsp;Fixed Missing ASN1_TYPE validation in PKCS#12 parsing.<br>&nbsp;&nbsp;Fixed ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function.<br>&nbsp;&nbsp;These CVEs were fixed by the 1.1.1ze release that is only available to<br>&nbsp;&nbsp;subscribers to OpenSSL's premium extended support. The patch was prepared<br>&nbsp;&nbsp;by backporting from the OpenSSL-3.0 repo.<br>&nbsp;&nbsp;Thanks to Ken Zalewski for the patch!<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-68160<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-69418<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-69419<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-69420<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-69421<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-22795<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-22796<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/openssl-solibs-1.1.1ze-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/openssl-solibs-1.1.1ze-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/p11-kit-0.26.2-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/p11-kit-0.26.2-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes a security issue:<br>&nbsp;&nbsp;rpc: fix NULL dereference via C_DeriveKey with specific NULL parameters.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-2100<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Fri Feb 06 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Fri, 06 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1770365288</guid>
      <description><![CDATA[<br>If you appreciate what we're doing with Slackware Linux on ARM, please consider<br>making a donation to support us. Your contribution helps maintain essential<br>hardware, cover electricity costs, and keep this longstanding open-source<br>project thriving.<br><br>You'll find the ways you can help here:<br>&nbsp;&nbsp; https://arm.slackware.com/sponsor/<br><br>Thanks for all of your support!<br><br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/ca-certificates-20260203-noarch-1_slack15.0.txz' rel='nofollow'>patches/packages/ca-certificates-20260203-noarch-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update provides the latest CA certificates to check for the<br>&nbsp;&nbsp;authenticity of SSL connections.<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/nano-8.7.1-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/nano-8.7.1-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>]]></description>
    </item>
<item>
      <title>Sun Feb 01 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sun, 01 Feb 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1769933288</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/expat-2.7.4-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/expat-2.7.4-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Function XML_ExternalEntityParserCreate failed to copy the encoding handler<br>&nbsp;&nbsp;data passed to XML_SetUnknownEncodingHandler from the parent to the new<br>&nbsp;&nbsp;subparser. This can cause a NULL dereference and denial of service.<br>&nbsp;&nbsp;Integer overflow related to buffer size determination in function doContent.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-24515<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-25210<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Jan 22 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 22 Jan 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1769069288</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/bind-9.18.44-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/bind-9.18.44-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes a security issue:<br>&nbsp;&nbsp;Fix incorrect length checks for BRID and HHIT records.<br>&nbsp;&nbsp;Malformed BRID and HHIT records could trigger an assertion failure.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://kb.isc.org/docs/cve-2025-13878<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-13878<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Thu Jan 15 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Thu, 15 Jan 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1768464488</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libpng-1.6.54-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libpng-1.6.54-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes security issues:<br>&nbsp;&nbsp;Heap buffer over-read in the libpng simplified API function<br>&nbsp;&nbsp;png_image_finish_read() when processing interlaced 16-bit PNGs with 8-bit<br>&nbsp;&nbsp;output format and non-minimal row stride.<br>&nbsp;&nbsp;Integer truncation in the libpng simplified write API functions<br>&nbsp;&nbsp;png_write_image_16bit() and png_write_image_8bit() causes heap buffer<br>&nbsp;&nbsp;over-read when the caller provides a negative row stride (for bottom-up<br>&nbsp;&nbsp;image layouts) or a stride exceeding 65535 bytes.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-22695<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2026-22801<br>&nbsp;&nbsp;(* Security fix *)<br>]]></description>
    </item>
<item>
      <title>Sat Jan 10 08:08:08 UTC 2026</title>
      <link>https://www.sya54m.eu</link>
      <pubDate>Sat, 10 Jan 2026 09:08:08 +0100</pubDate>
      <guid isPermaLink="false">1768032488</guid>
      <description><![CDATA[<b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/lcms2-2.18-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/lcms2-2.18-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes a security issue:<br>&nbsp;&nbsp;Fix for #469 heap buffer overflow on convert_utf16_to_utf32().<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/libtasn1-4.21.0-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/libtasn1-4.21.0-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;This update fixes a stack-based buffer overflow.<br>&nbsp;&nbsp;For more information, see:<br>&nbsp;&nbsp;&nbsp;&nbsp;https://www.cve.org/CVERecord?id=CVE-2025-13151<br>&nbsp;&nbsp;(* Security fix *)<br><b><a href='http://ftp.arm.slackware.com/slackwarearm/slackwarearm-15.0/patches/packages/vim-9.1.2072-arm-1_slack15.0.txz' rel='nofollow'>patches/packages/vim-9.1.2072-arm-1_slack15.0.txz</a>:&nbsp;&nbsp;Upgraded.<br></b>&nbsp;&nbsp;Bundle universal-ctags with the vim package. Thanks to jmccue.<br>]]></description>
    </item>
</channel>
</rss>