I have uploaded new chromium 99 packages for Slackware. The chromium-ungoogled 99 packages are currently being built and will follow shortly.
These new packages were triggered by a recent Google Chromium update which mentions a fix for a security hole which allows remote attackers to take control of your computer. Opening a malicious advertisement or web page is already sufficient, the vulnerability does not need any interaction to do its work. See CVE-2022-0971.
Get my Chromium packages for version 99.0.4844.74 from my repository or any mirror, and upgrade to these as soon as you can: https://slackware.nl/people/alien/slackbuilds/chromium/ or https://us.slackware.nl/people/alien/slackbuilds/chromium/
Links to the un-googled chromium: https://slackware.nl/people/alien/slackbuilds/chromium-ungoogled/ or https://us.slackware.nl/people/alien/slackbuilds/chromium-ungoogled/ .
These packages work on Slackware 14.2 and newer, 32bit as well as 64bit variants still of course.
On 32bit Slackware 15.0 and newer, Patrick has updated the profile script as part of a qt5 package upgrade so that Chromium crashes are prevented by automatically disabling the seccomp filter sandbox:
# Unfortunately Chromium and derived projects (including QtWebEngine) seem # to be suffering some bitrot when it comes to 32-bit support, so we are # forced to disable the seccomp filter sandbox on 32-bit or else all of these # applications crash. If anyone has a patch that gets these things running on # 32-bit without this workaround, please let volkerdi or alienBOB know, or # post your solution on LQ. Thanks. :-) if file /bin/cat | grep -wq 32-bit ; then export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox" fi
Eric
Recent comments