LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   [Security] Mitigation & Patch (https://www.linuxquestions.org/questions/slackware-14/%5Bsecurity%5D-mitigation-and-patch-4175708118/)

elcore 09-19-2022 09:19 AM

Quote:

Originally Posted by marav (Post 6381123)
Which update ?

Excuse me, I was just being sarcastic because of "do not edit this file it will be overwritten on update" note in grub.cfg.

It really doesn't concern me because I write my own grub.cfg manually so for me it's more of a joke than a security vulnerability.
Never used mkconfig, os-prober or any other grub scripts & Slackware doesn't require any of that mess because it ships with lilo.

elcore 09-19-2022 10:07 AM

It's only affecting joke systems which update grub on each kernel update.
And to keep the thread on-topic, rather than argue about whether or not Slackware is affected by this joke vulnerability..
Here is something affecting each and every one of us web browser users:
https://www.bleepingcomputer.com/new...rs-spellcheck/

marav 09-20-2022 02:03 PM

Quote:

Originally Posted by marav (Post 6376221)
RPM

CVE-2021-35938
Code:

A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials
after installing a file. A local unprivileged user could use this flaw to exchange the original file with
a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat
from this vulnerability is to data confidentiality and integrity as well as system availability.

https://nvd.nist.gov/vuln/detail/CVE-2021-35938

CVE-2021-35937
Code:

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw
to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501,
potentially gaining root privileges. The highest threat from this vulnerability is to data
confidentiality and integrity as well as system availability.

https://nvd.nist.gov/vuln/detail/CVE-2021-35937

Note: Fixed in rpm-4.18, which is still in beta stage

RPM 4.18.0
https://ftp.osuosl.org/pub/rpm/relea...4.18.0.tar.bz2

marav 09-21-2022 04:30 PM

We will soon have a new Firefox release (105.0.1)

https://bugzilla.mozilla.org/show_bug.cgi?id=1786638
Code:

bugs: 1786638
milestone: 105.0.1

Return early if we can't fetch an internal obj when computing ATK relations.

https://hg.mozilla.org/releases/mozi...v/5042ee204b92

marav 09-21-2022 05:47 PM

KWayland

Code:

client/plasmashell: add fallback for applet popups

When the compositor doesn't support applet popups, the current code sends an
invalid surface role. This causes KWin to fall back to the "normal" surface role
and do normal window placement on it.

Patch:
https://invent.kde.org/frameworks/kw...ommit/d02188ad

FYI:
because of regression, Archlinux reverted this patch

marav 09-23-2022 06:00 AM

Vim

CVE-2022-3256
Code:

Use After Free in GitHub repository vim/vim prior to 9.0.0530.
https://nvd.nist.gov/vuln/detail/CVE-2022-3256

marav 09-25-2022 01:45 PM

Vim

This one is dedicated to LuckyCyborg ;-)
Cheers, my friend

CVE-2022-3296
Code:

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
https://nvd.nist.gov/vuln/detail/CVE-2022-3296

marav 09-28-2022 05:38 AM

Plasma Workspace

https://bugs.kde.org/show_bug.cgi?id=459309
Code:

1. Open Users settings
2. Press Change Password
3. Input the new password and the confirmation
4. Press Set Password

OBSERVED RESULT
Nothing is changed. I can login using my old password

Code:

set setInteractiveAuthorizationAllowed on SetPassword call

is important that the setpasswod call uses interactive authorization,
otherwise will be denied, unless the user had been modified beforehand
so an authorization was already granted

Patch:
https://invent.kde.org/plasma/plasma...ab599f01df97e8

marav 09-28-2022 11:17 AM

kscreenlocker

Code:

PATCH] Set QSurfaceFormat::ResetNotification

This got lost in frameworks porting from shared KDeclarative code and is
important especially for nvidia after suspend+resume.

https://invent.kde.org/plasma/kscree...cd05225f.patch

marav 09-29-2022 01:41 PM

Vim

CVE-2022-3352
Code:

Use After Free in GitHub repository vim/vim prior to 9.0.0614.
https://nvd.nist.gov/vuln/detail/CVE-2022-3352

CVE-2022-3324
Code:

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.
https://nvd.nist.gov/vuln/detail/CVE-2022-3324

marav 10-01-2022 02:24 PM

Plasma-integration

Fix QtQuickRenderSettings from loading
Code:

Currently the firstCall guard is broken and the code is never run.
Patch:
https://invent.kde.org/plasma/plasma...72d2c82286bd2f

elcore 10-02-2022 05:44 AM

The last qt5 version in slackware-15.0 looks like 5.15.3_20220318 from 2022-03-03
However, it seems 2 patches were made upstream, after 2022-03-03

CVE-2022-27404-27405-27406-qtbase-5.15.diff (2022-07-26 13:27)
CVE-2022-37434-qtbase-5.15.patch (2022-09-12 11:47)

marav 10-06-2022 10:12 AM

Bash 5.2

Code:

Starting bash with an invalid locale specification for LC_ALL/LANG/LC_CTYPE
can cause the shell to crash.

Patch:
https://ftp.gnu.org/gnu/bash/bash-5....hes/bash52-002

marav 10-08-2022 07:41 AM

Postfix 3.7.2

Code:

make -f Makefile.in MAKELEVEL= Makefiles
(echo "# Do not edit -- this file documents how Postfix was built for your machine."; /bin/sh makedefs) >makedefs.tmp
ATTENTION:
ATTENTION: Unknown system type: Linux 6.0.0
ATTENTION:

Postfix needs this patch to be compiled with a 6.x kernel:

https://gitweb.gentoo.org/repo/gento.../linux-6.patch

marav 10-14-2022 02:53 AM

For Slackware 15.0

In the Linux kernel 5.2 through 5.19.14

CVE-2022-41674
CVE-2022-42719
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722

https://git.kernel.org/pub/scm/linux.../?h=queue/5.15

marav 10-14-2022 02:59 AM

zlib 1.2.13

Fix the following CVE:
CVE-2022-37434

https://github.com/madler/zlib/commi...1ae950166bece1

Daedra 10-14-2022 10:38 AM

Quote:

Originally Posted by marav (Post 6386283)
For Slackware 15.0

In the Linux kernel 5.2 through 5.19.14

CVE-2022-41674
CVE-2022-42719
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722

https://git.kernel.org/pub/scm/linux.../?h=queue/5.15

In addition to this, if we do get another kernel update for security patches to 15.0 (which is likely), could you please also add this patch for modern AMD CPU's. It's a very small patch but does make a noticeable difference, More information here

https://www.phoronix.com/news/Linux-AMD-Old-Chipset-WA

volkerdi 10-14-2022 12:52 PM

Quote:

Originally Posted by Daedra (Post 6386368)
In addition to this, if we do get another kernel update for security patches to 15.0 (which is likely), could you please also add this patch for modern AMD CPU's. It's a very small patch but does make a noticeable difference, More information here

https://www.phoronix.com/news/Linux-AMD-Old-Chipset-WA

Of course I'm well aware of this patch, but we've never patched the kernel for non-security reasons (and even then only rarely). I'm not sure why this hasn't been backported to the stable kernels yet, but the linux-stable team is where this request should be made.

Daedra 10-14-2022 01:05 PM

Quote:

Originally Posted by volkerdi (Post 6386397)
Of course I'm well aware of this patch, but we've never patched the kernel for non-security reasons (and even then only rarely). I'm not sure why this hasn't been backported to the stable kernels yet, but the linux-stable team is where this request should be made.

Understood, Your kernel SlackBuilds makes adding this patch a piece of cake anyway for us DIY'ers, so this is a non-issue for me personally. I am also slightly perplexed on why they haven't backported this yet given its simplicity and it does make a noticeable improvement under the right conditions.

Thanks for the consideration.

marav 10-17-2022 10:51 AM

Xorg

https://nvd.nist.gov/vuln/detail/CVE-2022-3550
https://nvd.nist.gov/vuln/detail/CVE-2022-3551
https://nvd.nist.gov/vuln/detail/CVE-2022-3553
https://nvd.nist.gov/vuln/detail/CVE-2022-3554
https://nvd.nist.gov/vuln/detail/CVE-2022-3555

Note: All of them have been patched upstream for the next release

kjhambrick 10-17-2022 04:28 PM

Slackware64 15.0 + MultiLib / KDE and new xorg Packages
 
All --

Slackware64 15.0 + Multilib / KDE here ...

Exited KDE to RunLevel 3 ; installed latest xorg Packages for Slackware64 15.0.

From the latest ChangeLog:
Code:

Mon Oct 17 19:31:45 UTC 2022
patches/packages/xorg-server-1.20.14-x86_64-4_slack15.0.txz:  Rebuilt.
  xkb: proof GetCountedString against request length attacks.
  xkb: fix some possible memleaks in XkbGetKbdByName.
  xquartz: Fix a possible crash when editing the Application menu due
  to mutating immutable arrays.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-3_slack15.0.txz:  Rebuilt.
  xkb: proof GetCountedString against request length attacks.
  xkb: fix some possible memleaks in XkbGetKbdByName.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
  (* Security fix *)

Rebuilt NVIDIA-Linux-x86_64-520.56.06.run ; rebooted

Everything is running fine here.

-- kjh

p.s. a big THANK YOU to Pat and the Dev Team

cwizardone 10-18-2022 12:21 PM

Git v2.38.1, has been released to fix security concerns.

Quote:

From: Junio C Hamano <gitster@pobox.com>
To: git@vger.kernel.org
Cc: Linux Kernel <linux-kernel@vger.kernel.org>,
git-packagers@googlegroups.com
Subject: [ANNOUNCE] Git v2.38.1 and others
Date: Tue, 18 Oct 2022 10:01:54 -0700 [thread overview]
Message-ID: <xmqq4jw1uku5.fsf@gitster.g> (raw)

A maintenance release v2.38.1, together with releases for older
maintenance tracks v2.30.6, v2.31.5, v2.32.4, v2.33.5, v2.34.5,
v2.35.5, v2.36.3, and v2.37.4, are now available at the usual
places.

These maintenance releases are to address the security issues
identified as CVE-2022-39253 and CVE-2022-39260.........
The full announcement can be found here, https://lore.kernel.org/lkml/xmqq4jw...fsf@gitster.g/

marav 10-19-2022 09:19 AM

kguiaddons

Code:

[PATCH] systemclipboard: Don't signals data source cancellation

Right now we emit "selectionChanged" when either:
 - we get an external new selection
 - our own selection gets cancelled

Semantically that's correct, if our own selection gets cancelled there's
no data in the clipboard, globally it's changed.

Pragmatically, we don't need to know about the latter event. It's not
useful information for userspace code - and worst means we process
events twice if clipboard is transferred from klipper to a client.

This fixes a major issue with klipper when a user disables middle click
paste. The compositor sends a cancel event on new clipboards, klipper
detects the clipboard is empty and populates it.

Patch:
https://invent.kde.org/frameworks/kg...a30c1fd2.patch

marav 10-21-2022 08:04 PM

libTIFF 4.4.0

CVE-2022-3626
https://nvd.nist.gov/vuln/detail/CVE-2022-3626
Patch:
https://gitlab.com/libtiff/libtiff/-...2c841047.patch

CVE-2022-3627
https://nvd.nist.gov/vuln/detail/CVE-2022-3627
Patch:
https://gitlab.com/libtiff/libtiff/-...2c841047.patch

CVE-2022-3570
https://nvd.nist.gov/vuln/detail/CVE-2022-3570
Patch:
https://gitlab.com/libtiff/libtiff/-...d10b094c.patch

CVE-2022-3597
https://nvd.nist.gov/vuln/detail/CVE-2022-3597
Patch:
https://gitlab.com/libtiff/libtiff/-...2c841047.patch

CVE-2022-3598
https://nvd.nist.gov/vuln/detail/CVE-2022-3598
Patch:
https://gitlab.com/libtiff/libtiff/-...4522fdff.patch

CVE-2022-3599
https://nvd.nist.gov/vuln/detail/CVE-2022-3599
Patch:
https://gitlab.com/libtiff/libtiff/-...094ff246.patch

marav 10-25-2022 12:15 PM

libexpat 2.5.0
Code:

Security fixes:
  CVE-2022-43680 -- Fix heap use-after-free after overeager
                    destruction of a shared DTD in function
                    XML_ExternalEntityParserCreate in out-of-memory situations.
                    Expected impact is denial of service or potentially
                    arbitrary code execution.


marav 10-26-2022 04:49 PM

I put it back in the right place
 
xorg-server-xwayland

xwayland/input: Do not ignore leave events
Code:

Commit 8a5f3ddb2 ("set tag on our surface") introduced the use of tags
to differentiate our own surfaces, and commit a1d14aa8c ("Clear the
"xwl-window" tag on unrealize") removed the tags before the surfaces are
actually destroyed.

Xwayland would then rely on these tags on the surface to decide whether
to ignore or to process the Wayland event in various places.

However, in doing so, it also checked for the tag on keyboard leave
events.

As a result, if the keyboard leave events is received after the X11
window is unrealized, keyboard_handle_leave() would not queue the
LeaveNotify events for the DIX to proceed, and the key repeat would
kick in and repeat the key event indefinitely.

Patch:
https://gitlab.freedesktop.org/xorg/...ests/987.patch

marav 10-27-2022 12:21 PM

Long time no see :D

Vim

CVE-2022-3705
Code:

A vulnerability was found in vim and classified as problematic. Affected by this issue is the function
qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use
after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue.
The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected
component. The identifier of this vulnerability is VDB-212324.

https://nvd.nist.gov/vuln/detail/CVE-2022-3705

cwizardone 10-27-2022 07:05 PM

These excerpts are from an article about Fedora, but as it relates to OpenSSL, the security implications should apply to all Linux distributions.
Quote:

......a "critical" openSSL vulnerability yet to be made public.....
.......Details of this "critical" security vulnerability in OpenSSL aren't yet public but should see its embargo lifted next Tuesday. We'll see how nasty this latest OpenSSL vulnerability is on Tuesday but it's ranked critical.......
The full story can be found at, https://www.phoronix.com/news/Fedora-37-November-Delay

elcore 10-29-2022 10:25 AM

Quote:

Originally Posted by cwizardone (Post 6389056)
These excerpts are from an article about Fedora, but as it relates to OpenSSL, the security implications should apply to all Linux distributions.

There were a few comments around saying 1.1.1 version is apparently unaffected by this vulnerability.
There's also a Syndicated Linux News Article where it says everyone will need to patch ... OpenSSL 3.x.
Is it something we should be worried about, I mean is there some software in Slackware using 3.x version at the moment?

marav 10-29-2022 10:49 AM

Quote:

Originally Posted by elcore (Post 6389352)
There were a few comments around saying 1.1.1 version is apparently unaffected by this vulnerability.

Indeed
Code:

The OpenSSL Project team has announced that, on November 1, 2022, they will
release OpenSSL version 3.0.7, which will fix a critical vulnerability in the
popular open-source cryptographic library (but does not affect OpenSSL versions before 3.0).

https://www.helpnetsecurity.com/2022...-critical-fix/

marav 10-29-2022 08:26 PM

1 Attachment(s)
kwin

x11: Don't force QT_NO_GLIB=1
Code:

This breaks certain apps, e.g. KDE System Settings when launched from
overview effect.

Patch:
https://invent.kde.org/plasma/kwin/-...624dfc981d281c

e.g. see attch.

marav 10-29-2022 08:34 PM

kwin

x11: Don't force QT_QPA_PLATFORM=xcb
Code:

We're setting this env variable because earlier we used it to force kwin to use
its special QPA so we need to change that back to something sensible.

However setting it to Wayland breaks apps that ship their own Qt with missing or
broken Wayland support.

Set it to be empty instead. Well-behaved Qt apps will use Wayland regardless
because of XDG_SESSION_TYPE.

Patch:
https://invent.kde.org/plasma/kwin/-...2e19ef6d4ee3fd

elcore 10-30-2022 07:00 AM

Quote:

Originally Posted by marav (Post 6389436)
x11: Don't force QT_QPA_PLATFORM=xcb

Interesting, this might fix some qt5ct compatibility issues since it really does depend on QT_QPA_PLATFORMTHEME=qt5ct being set.
Still not very happy about qtconfig being dropped by upstream, but it's good to see KDE devs still care about compatibility.

marav 10-30-2022 11:53 AM

@Pat

In order not to have all your links down in the changelog in the future
Code:

29 septembre 2021

This is the first step in transitioning from the old CVE.MITRE.ORG website.
The phased quarterly transition process began today and will last for up to one year.
During the quarterly transition, new releases of this website will occur every quarter,
and the new CVE.ORG website will operate concurrently with the CVE.MITRE.ORG website.
Upon completion of the phased transition, the CVE.MITRE.ORG website will be archived and retired.

It seems that is now effective
Code:

cve.mitre.org. PR_CONNECT_RESET_ERROR
https://www.cve.org/Media/News/item/...to-the-New-CVE

kjhambrick 10-30-2022 01:48 PM

Thanks marav,

The only Kernel on Kernel.org with an open CVE is 5.19.17

Code:

stable:    5.19.17  [EOL] Source ChangeLog [CVE] 2022-10-24
CVE References:

ChangeLog-5.19.17 references CVE-2022-1184.

The new link format is this:
Code:

Where:

CVE="CVE-2022-1184"

Link is:
https://www.cve.org/CVERecord?id=${CVE}

Example:
https://www.cve.org/CVERecord?id=CVE-2022-1184

-- kjh

Didier Spaier 10-30-2022 02:10 PM

Well, all Linux kernel branches or streams have outstanding CVEs, for instances 5.19 (EOL) but also 6.0 (stable).

kjhambrick 10-30-2022 03:22 PM

Quote:

Originally Posted by Didier Spaier (Post 6389548)
Well, all Linux kernel branches or streams have outstanding CVEs, for instances 5.19 (EOL) but also 6.0 (stable).

Didier Spaier --

The CVE I printed came from the Kernel ChangeLog which means it was addressed in the source for that Kernel.

The Slackware Kernels are another matter -- All CVEs since the Last Kernel Update ( 5.15.63 ) are unmitigated.

-- kjh

This is the list of unmitigated CVEs for the Slackware 5.15.y Kernel:
Code:

# grep CVE- linux-5.15.6[49]-ChangeLog linux-5.15.7[0-6]-ChangeLog

linux-5.15.72-ChangeLog:    This fix addresses CVE-2022-2308.
linux-5.15.74-ChangeLog:    This fixes CVE-2022-42719.
linux-5.15.74-ChangeLog:    This fixes CVE-2022-42722.
linux-5.15.74-ChangeLog:    This fixes CVE-2022-42721.
linux-5.15.74-ChangeLog:    This fixes CVE-2022-42720.
linux-5.15.74-ChangeLog:    I found this during the investigation of CVE-2022-41674 fixed by the
linux-5.15.74-ChangeLog:    This fixes CVE-2022-41674.
linux-5.15.75-ChangeLog:    CVE: CVE-2022-1184


kjhambrick 10-31-2022 04:20 AM

Quote:

Originally Posted by Didier Spaier (Post 6389548)
Well, all Linux kernel branches or streams have outstanding CVEs, for instances 5.19 (EOL) but also 6.0 (stable).

Didier Spaier --

I missed the links in your post.

Nice site !

Man, That's a lot of unresolved CVEs !

Thank you.

-- kjh

P.S. your sited site Linux Kernel CVEs > CVEs in Stream 5.15 shows a LOT more fixes than I found in the ChangeLogs. They seem to be grepping for the CVE Text.

OTOH, all I did was grep the String 'CVE-' on the list of ChangeLogs since 5.15.63 on my local system like this:
Code:

grep -- CVE- linux-5.15.6[49]-ChangeLog linux-5.15.7[0-6]-ChangeLog

marav 11-01-2022 11:32 AM

Quote:

Originally Posted by marav (Post 6389354)
Indeed
Code:

The OpenSSL Project team has announced that, on November 1, 2022, they will
release OpenSSL version 3.0.7, which will fix a critical vulnerability in the
popular open-source cryptographic library (but does not affect OpenSSL versions before 3.0).

https://www.helpnetsecurity.com/2022...-critical-fix/

OpenSSL Outlines Two High Severity Vulnerabilities
Code:

The OpenSSL vulnerabilities made public today are an X.509 email address 4-byte buffer overflow (CVE-2022-3602)
and an X.509 email address variable length buffer overflow (CVE-2022-3786).

Both vulnerabilities pertain to buffer overruns within the X.509 certificate verification. CVE-2022-3602 is
the vulnerability originally deemed "critical" and what led to the delayed Fedora 37 and the like.
However, on further analysis they decided to downgrade it to "high" severity.


OpenSSL 3.0.x prior to OpenSSL 3.0.7 are affected by these vulnerabilities but not the older OpenSSL 1.x releases.

https://www.phoronix.com/news/OpenSSL-1-November-2022

kjhambrick 11-01-2022 11:42 AM

Quote:

Originally Posted by marav (Post 6389836)
OpenSSL Outlines Two High Severity Vulnerabilities

<<snip>>

OpenSSL 3.0.x prior to OpenSSL 3.0.7 are affected by these vulnerabilities but not the older OpenSSL 1.x releases.

Whew !

No problem for Slackware 15.0

Thanks marav.

-- kjh

Code:

# ls -lad /var/log/packages/openssl*
-rw-r--r-- 1 root root 51967 Jul  6 02:35 /var/log/packages/openssl-1.1.1q-x86_64-1_slack15.0
-rw-r--r-- 1 root root  1453 Jul  6 02:35 /var/log/packages/openssl-compat32-1.1.1q-x86_64-1_slack15.0compat32
-rw-r--r-- 1 root root  1742 Jul  6 02:35 /var/log/packages/openssl-solibs-1.1.1q-x86_64-1_slack15.0
-rw-r--r-- 1 root root  1246 Jul  6 02:35 /var/log/packages/openssl-solibs-compat32-1.1.1q-x86_64-1_slack15.0compat32


metaed 11-01-2022 04:12 PM

sysklogd before 2.4.0:
loses file mode on rotated files

sysklogd before 2.4.1:
can overread memory (no bounds checking) when parsing incoming messages

Slackware-stable has 2.3.0
Slackware-current has 2.4.4

Sorry for the repost -- I was ignorant of this thread and it looks like this belongs here.

marav 11-03-2022 05:31 AM

Aspell 0.60.8

CVE-2019-25051
Code:

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top
(called from acommon::StringMap::add and acommon::Config::lookup_list).

https://nvd.nist.gov/vuln/detail/CVE-2019-25051

[PATCH] objstack: assert that the alloc size will fit within a chunk to prevent a buffer overflow
https://github.com/gnuaspell/aspell/...c6fd324a.patch

marav 11-03-2022 07:39 AM

mozilla-nss 3.84

CVE-2022-3479
Code:

A vulnerability found in nss. By this security vulnerability, nss client auth crash without
a user certificate in the database and this can lead us to a segmentation fault or crash.

https://www.cve.org/CVERecord?id=CVE-2022-3479

The CVE lists <=nss-3.81 as vulnerable
But doesn't seem to have been applied upstream
https://gitweb.gentoo.org/repo/gento...76304a208eb817

fix-client-cert-crash.patch:
https://gitweb.gentoo.org/repo/gento...rt-crash.patch

marav 11-08-2022 03:57 PM

Slackware 32bits: 15.0 & current

sysstat overflow on 32-bit systems
https://www.cve.org/CVERecord?id=CVE-2022-39377
Code:

On 32 bit systems, an arithmetic overflow present in allocate_structures can be triggered
when displaying activity data files and may lead to a variety of exploit primitives due to
an incorrectly sized buffer.

Severity: moderate
Affected version : >= 9.1.6
Patched version : 12.7.1

https://github.com/sysstat/sysstat/s...q8r6-g56f-9w7x

marav 11-08-2022 04:24 PM

sddm

Code:

in Qt6 (and the KDE patch collection for Qt 5) genericunixservices will
internally attempt to probe the portal tech early on in the app life
cycle. this causes the protal system to launch app and then crash
because we aren't actually providing a fully functional session. instead
opt out of this altogether

[PATCH] disable automatic portal launching:
https://build.opensuse.org/package/v...patch?expand=1

marav 11-09-2022 05:42 AM

xfce4-settings

Code:

In Xfce xfce4-settings before 4.16.4 and 4.17.x before 4.17.1, there is an argument
injection vulnerability in xfce4-mime-helper.

https://www.cve.org/CVERecord?id=CVE-2022-45062

Fix:
Code:

4.16.4

- Escape characters which do not belong into an URI/URL (Issue #390)
- Prefer full command when basic command is env (Fixes #358)
- Translation Updates:
  Japanese, Portuguese, Russian


marav 11-09-2022 05:48 AM

python3

Code:

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists
in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted,
unreasonably long name being presented to the decoder could lead to a CPU denial of service.
Hostnames are often supplied by remote servers that could be controlled by a malicious actor;
in such a scenario, they could trigger excessive CPU consumption on the client attempting to
make use of an attacker-supplied supposed hostname. For example, the attack payload could be
placed in the Location header of an HTTP response with status code 302.

https://www.cve.org/CVERecord?id=CVE-2022-45061

A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

marav 11-09-2022 05:51 AM

qt: wayland

The issue (for which I am also concerned)
Code:

plasmashell crashes when hovering or clicking items on the Panel
The full story:
https://bugs.kde.org/show_bug.cgi?id=447717

[PATCH] Client: Ensure that wl_surface lives as long as qtquick render thread needs it
Code:

wl_surface can be destroyed while qtquick render thread still uses it.
That can end up in eglSwapBuffers() using defunct wl_surface, which will
eventually lead to a crash due to the compositor posting an error.

https://invent.kde.org/qt/qt/qtwayla...e203daae044d81

marav 11-12-2022 06:08 PM

polkit-qt

fix: memory leak
Code:

agent listener does not reclaim private memory after destructing.
Use `QScopedPointer` to protect private pointers from being copied and to
reclaim memory properly.

Patch:
https://invent.kde.org/libraries/pol...eda0777d6535e8

marav 11-13-2022 09:06 AM

libtiff
CVE-2022-3970
Code:

A vulnerability was found in LibTIFF. It has been classified as critical.
This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c.
The manipulation leads to integer overflow. It is possible to initiate the attack remotely.
The exploit has been disclosed to the public and may be used.
The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be.
It is recommended to apply a patch to fix this issue.
The identifier VDB-213549 was assigned to this vulnerability.

https://nvd.nist.gov/vuln/detail/CVE-2022-3970

Patch:
https://gitlab.com/libtiff/libtiff/-...0050e62617e3be


All times are GMT -5. The time now is 10:16 PM.