Slackware has released new git packages to address several security vulnerabilities for both Slackware 15.0 and the current version. The updated packages include git version 2.46.4 for Slackware 15.0 and version 2.50.1 for Slackware -current. These updates fix multiple security issues, with specific vulnerabilities identified by their CVE numbers.
For detailed information on the vulnerabilities, users can refer to the provided links related to various CVE records. The changes have been documented in the Slackware 15.0 ChangeLog, confirming the upgrade of git to version 2.46.4.
Users can find the new packages at the designated FTP links for both i586 and x86_64 architectures. The Slackware project expresses gratitude to the OSU Open Source Lab for their support in hosting the necessary files.
To upgrade, users must execute the command as root to install the latest package. The MD5 signatures for the updated packages are also provided to ensure integrity during the download.
The Slackware Linux Security Team encourages users to stay updated with security patches and maintain their systems effectively. For more information, users can visit the Slackware website.
Extended Summary:
In addition to the security updates, users are advised to periodically check the Slackware ChangeLog for future updates and security advisories. Keeping packages current not only enhances functionality but also mitigates potential security risks. Users should remain vigilant about security practices, such as verifying package integrity through MD5 signatures and regularly visiting the Slackware community for support and updates. For those unfamiliar with the upgrade process, detailed documentation is available on the Slackware website to assist users in managing their installations effectively
For detailed information on the vulnerabilities, users can refer to the provided links related to various CVE records. The changes have been documented in the Slackware 15.0 ChangeLog, confirming the upgrade of git to version 2.46.4.
Users can find the new packages at the designated FTP links for both i586 and x86_64 architectures. The Slackware project expresses gratitude to the OSU Open Source Lab for their support in hosting the necessary files.
To upgrade, users must execute the command as root to install the latest package. The MD5 signatures for the updated packages are also provided to ensure integrity during the download.
The Slackware Linux Security Team encourages users to stay updated with security patches and maintain their systems effectively. For more information, users can visit the Slackware website.
Extended Summary:
In addition to the security updates, users are advised to periodically check the Slackware ChangeLog for future updates and security advisories. Keeping packages current not only enhances functionality but also mitigates potential security risks. Users should remain vigilant about security practices, such as verifying package integrity through MD5 signatures and regularly visiting the Slackware community for support and updates. For those unfamiliar with the upgrade process, detailed documentation is available on the Slackware website to assist users in managing their installations effectively
GIT update for Slackware
New git packages have been released for Slackware 15.0 to address security vulnerabilities:
git (SSA:2025-190-01)