Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-current ChangeLog (2020-04-03) ====== ====== Fri Apr 3 23:07:16 UTC 2020 ====== ===== Packages ===== ==== Rebuilt ==== * [[slackware.current>ap/lsof-4.93.2-i586-2.txz]] \\ Fixed the manpage. Thanks to kaott. * [[slackware.current>ap/sc-7.16-i586-7.txz]] \\ Brought back the classic SC. Thanks to dive. ==== Upgraded ==== * [[slackware.current>d/Cython-0.29.16-i586-1.txz]] * [[slackware.current>d/mercurial-5.3.2-i586-1.txz]] * [[slackware.current>l/gtk+3-3.24.17-i586-1.txz]] * [[slackware.current>n/dhcpcd-8.1.7-i586-1.txz]] * [[slackware.current>n/iproute2-5.6.0-i586-1.txz]] * [[slackware.current>x/libdrm-2.4.101-i586-1.txz]] * [[slackware.current>x/mesa-20.0.4-i586-1.txz]] * [[slackware.current>xap/mozilla-firefox-68.6.1esr-i686-1.txz]] \\ This release contains critical security fixes and improvements. \\ "Under certain conditions, when running the nsDocShell destructor, a race \\ condition can cause a use-after-free. We are aware of targeted attacks in \\ the wild abusing this flaw." \\ "Under certain conditions, when handling a ReadableStream, a race condition \\ can cause a use-after-free. We are aware of targeted attacks in the wild \\ abusing this flaw." \\ For more information, see: \\ https://www.mozilla.org/en-US/firefox/68.6.1/releasenotes/ \\ https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/ \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820 \\ (* Security fix *) {{tag>slackware changelog slackware-current 2020/04}} news/2020/04/03/slackware-current-changelog.txt Last modified: 4 years agoby Giuseppe Di Terlizzi Log In