LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 11-13-2022, 09:09 AM   #151
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125

ffmpeg

CVE-2022-3964
Code:
A vulnerability classified as problematic has been found in ffmpeg. 
This affects an unknown part of the file libavcodec/rpzaenc.c of the 
component QuickTime RPZA Video Encoder. 
The manipulation of the argument y_size leads to out-of-bounds read. 
It is possible to initiate the attack remotely. 
The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. 
It is recommended to apply a patch to fix this issue. 
The associated identifier of this vulnerability is VDB-213543.
https://nvd.nist.gov/vuln/detail/CVE-2022-3964

Patch:
https://git.ffmpeg.org/gitweb/ffmpeg...a16c146bdaf984

CVE-2022-3965
Code:
A vulnerability classified as problematic was found in ffmpeg. 
This vulnerability affects the function smc_encode_stream of the file 
libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. 
The manipulation of the argument y_size leads to out-of-bounds read. 
The attack can be initiated remotely. 
The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. 
It is recommended to apply a patch to fix this issue. 
The identifier of this vulnerability is VDB-213544.
https://nvd.nist.gov/vuln/detail/CVE-2022-3965

Patch:
https://git.ffmpeg.org/gitweb/ffmpeg...75e13b36ed8edd

Last edited by marav; 11-13-2022 at 09:11 AM.
 
1 members found this post helpful.
Old 11-13-2022, 04:27 PM   #152
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
apr

CVE-2021-35940
Code:
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 
release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence 
version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.
https://www.cve.org/CVERecord?id=CVE-2021-35940

Patch:
https://svn.apache.org/viewvc?view=r...vision=1891198
 
Old 11-13-2022, 04:39 PM   #153
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Quote:
Originally Posted by marav View Post
libvncclient

CVE-2020-29260
Code:
libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup().
https://nvd.nist.gov/vuln/detail/CVE-2020-29260

[PATCH] libvncclient: free vncRec memory in rfbClientCleanup()
https://github.com/LibVNC/libvncserv...fbd757ec.patch
This one is still unfixed
 
Old 11-14-2022, 05:19 AM   #154
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
python-pillow

CVE-2022-45198
Code:
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).
https://www.cve.org/CVERecord?id=CVE-2022-45198

CVE-2022-45199
Code:
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.
https://www.cve.org/CVERecord?id=CVE-2022-45199

Last edited by marav; 11-14-2022 at 05:21 AM.
 
Old 11-14-2022, 05:34 PM   #155
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
CURL

Regression in 7.86.0

https://github.com/curl/curl/issues/9813
https://github.com/curl/curl/issues/9821

Patches:

noproxy: fix tail-matching
Code:
Also ignore trailing dots in both host name and comparison pattern.
Regression in 7.86.0 (from 1e9a538)
Extended test 1614 to verify better.
Reported-by: Henning Schild
Fixes #9821
Closes #9822
https://github.com/curl/curl/commit/...ff679fa888838b

noproxy: also match with adjacent comma
Code:
If the host name is an IP address and the noproxy string contained that
IP address with a following comma, it would erroneously not match.
Extended test 1614 to verify this combo as well.
Reported-by: Henning Schild
Fixes #9813
Closes #9814
https://github.com/curl/curl/commit/...791c9955182128
 
1 members found this post helpful.
Old 11-15-2022, 01:22 AM   #156
lazardo
Member
 
Registered: Feb 2010
Location: SD Bay Area
Posts: 274

Rep: Reputation: Disabled
Quote:
Originally Posted by Daedra View Post
Understood, Your kernel SlackBuilds makes adding this patch a piece of cake anyway for us DIY'ers, so this is a non-issue for me personally. I am also slightly perplexed on why they haven't backported this yet given its simplicity and it does make a noticeable improvement under the right conditions.

Thanks for the consideration.
note: patch included in 6.0.8

5.15.63v3 is with processor_idle.c patch, 63v2 without, no other changes
kernel compile == 92.8 seconds vs 105, almost 15% gain.

'make clean; /usr/bin/time make -j16 bzImage'

recent zenbook pro (laptop), performance governor, mitigations=off

Code:
###
Kernel: arch/x86/boot/bzImage is ready  (#17)
1149.70user 116.45system 1:33.26elapsed 1357%CPU (0avgtext+0avgdata 337928maxresident)k
199296inputs+1139240outputs (1630major+39558843minor)pagefaults 0swaps
Linux zen 5.15.63v3 #16 SMP PREEMPT Mon Nov 14 20:35:58 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

Kernel: arch/x86/boot/bzImage is ready  (#19)
1130.75user 112.22system 1:31.10elapsed 1364%CPU (0avgtext+0avgdata 338044maxresident)k
128424inputs+1139208outputs (1560major+39560793minor)pagefaults 0swaps
Linux zen 5.15.63v3 #16 SMP PREEMPT Mon Nov 14 20:35:58 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

Kernel: arch/x86/boot/bzImage is ready  (#20)
1129.37user 112.11system 1:31.04elapsed 1363%CPU (0avgtext+0avgdata 337964maxresident)k
0inputs+1139240outputs (1434major+39553868minor)pagefaults 0swaps
Linux zen 5.15.63v3 #16 SMP PREEMPT Mon Nov 14 20:35:58 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

###
Kernel: arch/x86/boot/bzImage is ready  (#18)
1213.51user 118.30system 1:42.06elapsed 1304%CPU (0avgtext+0avgdata 337916maxresident)k
99216inputs+1139232outputs (1374major+39553967minor)pagefaults 0swaps
Linux zen 5.15.63v2 #15 SMP PREEMPT Mon Nov 14 11:00:16 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

Kernel: arch/x86/boot/bzImage is ready  (#21)
1199.79user 115.20system 1:47.08elapsed 1228%CPU (0avgtext+0avgdata 337904maxresident)k
201960inputs+1139240outputs (1546major+39553843minor)pagefaults 0swaps
Linux zen 5.15.63v2 #15 SMP PREEMPT Mon Nov 14 11:00:16 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

Kernel: arch/x86/boot/bzImage is ready  (#22)
1195.48user 115.14system 1:46.02elapsed 1236%CPU (0avgtext+0avgdata 338056maxresident)k
0inputs+1139232outputs (1342major+39553005minor)pagefaults 0swaps
Linux zen 5.15.63v2 #15 SMP PREEMPT Mon Nov 14 11:00:16 PST 2022 x86_64 AMD Ryzen 9 5900HX with Radeon Graphics AuthenticAMD GNU/Linux

Last edited by lazardo; 11-16-2022 at 10:32 PM.
 
1 members found this post helpful.
Old 11-15-2022, 01:23 PM   #157
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Quote:
Originally Posted by marav View Post
python3

Code:
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists
in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, 
unreasonably long name being presented to the decoder could lead to a CPU denial of service. 
Hostnames are often supplied by remote servers that could be controlled by a malicious actor; 
in such a scenario, they could trigger excessive CPU consumption on the client attempting to 
make use of an attacker-supplied supposed hostname. For example, the attack payload could be 
placed in the Location header of an HTTP response with status code 302.
https://www.cve.org/CVERecord?id=CVE-2022-45061

A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
patch for 3.9 serie:
https://github.com/python/cpython/co...8f71b46806605c
 
Old 11-15-2022, 02:57 PM   #158
Didier Spaier
LQ Addict
 
Registered: Nov 2008
Location: Paris, France
Distribution: Slint64-15.0
Posts: 11,064

Rep: Reputation: Disabled
GRUB

Quoting https://lists.gnu.org/archive/html/g.../msg00059.html below:
Quote:
From: Daniel Kiper
Subject: [SECURITY PATCH 00/13] Multiple GRUB2 vulnerabilities - 2022/11/15
Date: Tue, 15 Nov 2022 19:00:20 +0100

Hi all, This patch set contains a bundle of fixes for various security flaws discovered in the GRUB2 font code during last few months. The most severe ones, i.e. potentially exploitable, have CVEs assigned and are listed at the end of this email. Details of exactly what needs updating will be provided by the respective distros and vendors when updates become available. Here [1] we are listing at least some links to the messaging known at the time of this posting.
If/how to apply this patch set is is up to Patrick. For Slint I have put this in the SlackBuild:
Code:
COMMIT="15146788"
...
rm -rf grub
git clone https://git.savannah.gnu.org/git/grub.git
cd grub
git checkout $COMMIT || exit 1
The last commit of the patch set being: https://git.savannah.gnu.org/gitweb/...b7ff769edd1e9c

Please note that for people allowing installation with Secure Boot enabled reading the full message from Daniel Kiper is necessary.

PS. The source for the package I have built is available in https://slackware.uk/slint/x86_64/sl...0/source/grub/ and the package in https://slackware.uk/slint/x86_64/slint-15.0/slint/

Last edited by Didier Spaier; 11-15-2022 at 03:01 PM. Reason: PS added.
 
4 members found this post helpful.
Old 11-16-2022, 12:20 PM   #159
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Plasma-framework 5.100

Code:
Some plasma elements are drawn way too big after upgrade to Frameworks 5.100
https://bugs.kde.org/show_bug.cgi?id=461682

Patch:
Code:
svgitem: do not upscale svg when using fractional scaling

BUG: 461682
FIXED-IN: 5.101
https://invent.kde.org/frameworks/pl...3fce7c47e3d8b2
 
1 members found this post helpful.
Old 11-17-2022, 02:05 PM   #160
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Pipewire 0.3.60

alsa: force playback start when buffer is full
Code:
When we try to play data but the ringbuffer is full, we need to start
the device or else we will stay in this situation forever and stay
silent.
Patch:
https://gitlab.freedesktop.org/pipew...68da95bf59b59e

audioadapter: perform setup again after a PortConfig
Code:
After the ports are reconfigured, we need to perform the setup again so
that buffers and processing can happen with the right settings.

This fixes an issue when autoswitching between A2DP and HFP with
bluetooth headsets when there is also a stereo capture device available.
The input stream of the browser is quickly reconfigured between stereo
and mono with only a Pause command in between, clearing the setup state
is enough to redo the setup when going back to Playing.
Patch:
https://gitlab.freedesktop.org/pipew...53f23964178897

Last edited by marav; 11-17-2022 at 02:26 PM.
 
1 members found this post helpful.
Old 11-18-2022, 02:40 PM   #161
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Quote:
Originally Posted by marav View Post
qt: wayland

The issue (for which I am also concerned)
Code:
plasmashell crashes when hovering or clicking items on the Panel
The full story:
https://bugs.kde.org/show_bug.cgi?id=447717

[PATCH] Client: Ensure that wl_surface lives as long as qtquick render thread needs it
Code:
wl_surface can be destroyed while qtquick render thread still uses it.
That can end up in eglSwapBuffers() using defunct wl_surface, which will
eventually lead to a crash due to the compositor posting an error.
https://invent.kde.org/qt/qt/qtwayla...e203daae044d81
Code:
Nate Graham <nate@kde.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Version Fixed In|                            |5.26.4
shell: Use the basic scene graph rendering loop on wayland
Code:
This avoids crashing Plasma when a surface gets destroyed too early
while still in use by the threaded loop. To avoid leaking things into
child processes, we clear the environment variable again after we've
created the initial views for the shell.
Commit:
https://invent.kde.org/plasma/plasma...4c8e238c935dc2
 
Old 11-21-2022, 07:34 AM   #162
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
xdg-utils

CVE-2022-4055
Code:
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead 
to additional headers being passed to thunderbird that should not be included per RFC 2368. 
An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach
files when clicked.
https://www.cve.org/CVERecord?id=CVE-2022-4055
 
2 members found this post helpful.
Old 11-22-2022, 11:54 AM   #163
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
libarchive

CVE-2022-36227
Code:
In libarchive 3.6.1, the software does not check for an error after calling calloc function 
that can return with a NULL pointer if the function fails, which leads to a resultant NULL 
pointer dereference or, in some cases, even arbitrary code execution.
https://www.cve.org/CVERecord?id=CVE-2022-36227

Patch:
https://github.com/libarchive/libarc...732a10ad8cd024
 
1 members found this post helpful.
Old 11-23-2022, 02:57 AM   #164
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,395

Original Poster
Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
libxml2

CVE-2022-40303
Code:
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML 
document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. 
This results in an attempt to access an array at a negative 2GB offset, typically leading to 
a segmentation fault.
https://www.cve.org/CVERecord?id=CVE-2022-40303

Patch:
https://gitlab.gnome.org/GNOME/libxm...198abc266bc2c0


CVE-2022-40304
Code:
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity 
definitions can corrupt a hash table key, potentially leading to subsequent 
logic errors. In one case, a double-free can be provoked.
https://www.cve.org/CVERecord?id=CVE-2022-40304

Patch:
https://gitlab.gnome.org/GNOME/libxm...5804c54ef1d80b


https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3

Last edited by marav; 11-24-2022 at 05:06 AM.
 
1 members found this post helpful.
Old 11-24-2022, 01:21 AM   #165
nobodino
Senior Member
 
Registered: Jul 2010
Location: Near Bordeaux in France
Distribution: slackware, slackware from scratch, LFS, slackware [arm], linux Mint...
Posts: 1,564

Rep: Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892
make

make-4.4 is affected by a bug see: https://savannah.gnu.org/bugs/?63307

solved in LFS, see https://www.linuxfromscratch.org/lfs...#ch-tools-make

Code:
sed -e '/ifdef SIGPIPE/,+2 d' \
    -e '/undef  FATAL_SIG/i FATAL_SIG (SIGPIPE);' \
    -i src/main.c
either by a patch:

Code:
commit 0370a7a40fe9523ea334dcb8a2a60f1418595b49
Author: Dmitry Goncharov <dgoncharov@users.sf.net>
Date:   Sun Nov 6 07:36:26 2022 -0500

    [SV 63307] Spawn children with the default disposition of sigpipe.
    
    * src/main.c (main): Set sigpipe disposition to a handler, rather than
    SIG_IGN, in order for children to have the default sigpipe disposition.
    * tests/scripts/misc/sigpipe: Add sigpipe tests.

diff --git a/src/main.c b/src/main.c
index eec93656..d8857696 100644
--- a/src/main.c
+++ b/src/main.c
@@ -1152,6 +1152,15 @@ temp_stdin_unlink ()
     }
 }
 
+#ifdef SIGPIPE
+static void
+handle_sigpipe (int sig)
+{
+  /* Suppress unused variable warning.  */
+  sig = sig;
+}
+#endif
+
 #ifdef _AMIGA
 int
 main (int argc, char **argv)
@@ -1182,9 +1191,15 @@ main (int argc, char **argv, char **envp)
   /* Useful for attaching debuggers, etc.  */
   SPIN ("main-entry");
 
-  /* Don't die if our stdout sends us SIGPIPE.  */
+  /* Don't die if our stdout sends us SIGPIPE to get temporary files removed.
+   * If make has inherited SIG_IGN, keep running with SIG_IGN to let make's
+   * children inherit SIG_IGN.
+   * Othwerwise, set sigpipe disposition to a handler, in order for children to
+   * have the default sigpipe disposition.  */
+
 #ifdef SIGPIPE
-  bsd_signal (SIGPIPE, SIG_IGN);
+  if (bsd_signal (SIGPIPE, handle_sigpipe) == SIG_IGN)
+    bsd_signal (SIGPIPE, SIG_IGN);
 #endif
 
 #ifdef HAVE_ATEXIT

Last edited by nobodino; 11-24-2022 at 01:23 AM.
 
3 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Ph&#7909;c h&#7891;i d&#7919; li&#7879;u b&#7883; m&#7845;t???, c&#7913; pollsite General 1 06-27-2005 12:39 PM
Gotta love those &#1649;&#1649;&#1649;&#1649;&#1649;&#1649;&#1649;&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 10:32 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration