LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 04-07-2023, 05:25 PM   #226
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108

tcpdump

CVE-2023-1801
Code:
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write 
when decoding a crafted network packet.
https://www.cve.org/CVERecord?id=CVE-2023-1801

Fixed: 4.99.4
https://git.tcpdump.org/tcpdump/blob/HEAD:/CHANGES
https://www.tcpdump.org/index.html#latest-releases
Code:
This tcpdump release fixes an out-of-bounds write vulnerability (CVE-2023-1801) present 
in the previous release (4.99.3) in the SMB printer, which is not compiled by default. 
It also makes various minor improvements. This release requires libpcap 1.10.0 or later 
to pass all test cases.

Last edited by marav; 04-07-2023 at 05:28 PM.
 
2 members found this post helpful.
Old 04-07-2023, 05:54 PM   #227
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
breeze-gtk

Bug:
Code:
blackstar :: ~ » firefox

(firefox-default:3622): Gtk-WARNING **: 00:50:30.419: Theme parsing error: gtk.css:1649:16: '-gtk-icon-size' is not a valid property name

(firefox-default:3622): Gtk-WARNING **: 00:50:30.419: Theme parsing error: gtk.css:1652:16: '-gtk-icon-size' is not a valid property name
Patch:
Code:
gtk3: remove invalid icon size property

'-gtk-icon-size' is not a valid property name
https://invent.kde.org/plasma/breeze...5165b1e847802d


Bug:
https://bugs.kde.org/show_bug.cgi?id=468203
Code:
GTK3 window buttons are too big and blurry on Wayland with Breeze GTK
Patch (fixed in: 5.27.5) :
https://invent.kde.org/plasma/breeze...95948b5bffbcc3
 
1 members found this post helpful.
Old 04-08-2023, 05:05 AM   #228
Windu
Member
 
Registered: Aug 2021
Distribution: Arch Linux, Debian, Slackware
Posts: 591

Rep: Reputation: Disabled
Quote:
Originally Posted by marav View Post
breeze-gtk

Bug:
Code:
blackstar :: ~ » firefox

(firefox-default:3622): Gtk-WARNING **: 00:50:30.419: Theme parsing error: gtk.css:1649:16: '-gtk-icon-size' is not a valid property name

(firefox-default:3622): Gtk-WARNING **: 00:50:30.419: Theme parsing error: gtk.css:1652:16: '-gtk-icon-size' is not a valid property name
Patch:
Code:
gtk3: remove invalid icon size property

'-gtk-icon-size' is not a valid property name
https://invent.kde.org/plasma/breeze...5165b1e847802d


Bug:
https://bugs.kde.org/show_bug.cgi?id=468203
Code:
GTK3 window buttons are too big and blurry on Wayland with Breeze GTK
Patch (fixed in: 5.27.5) :
https://invent.kde.org/plasma/breeze...95948b5bffbcc3
I don't see how that is related to 'Security'? I would expect it to have been posted in the -current wishlist topic.
 
Old 04-08-2023, 05:14 AM   #229
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by Windu View Post
I don't see how that is related to 'Security'? I would expect it to have been posted in the -current wishlist topic.
Right

But it's been a while since this thread deals with other patches than "security only" ones, and after some time it is no longer possible to edit it

It should be "Mitigation & Patch"

Except from the title, the most important thing is the patches that are posted and the fact that PV reads it carefully

Last edited by marav; 04-08-2023 at 05:19 AM.
 
1 members found this post helpful.
Old 04-12-2023, 07:04 AM   #230
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by marav View Post
breeze-gtk

Bug:
https://bugs.kde.org/show_bug.cgi?id=468203
Code:
GTK3 window buttons are too big and blurry on Wayland with Breeze GTK
Patch (fixed in: 5.27.5) :
https://invent.kde.org/plasma/breeze...95948b5bffbcc3
Firefox buttons are ugly without this patch
Can we get it ?
 
Old 04-12-2023, 09:35 PM   #231
bigbadaboum
Member
 
Registered: Apr 2023
Posts: 145

Rep: Reputation: 59
Hello marav,

do you know why slackware 14.2 no longer receives the ruby security-update, slackware 15.0 receives them (gcc and glibc too old?).
 
Old 04-14-2023, 06:18 AM   #232
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by bigbadaboum View Post
Hello marav,

do you know why slackware 14.2 no longer receives the ruby security-update, slackware 15.0 receives them (gcc and glibc too old?).
Hi bigbadaboum,

2.2.x branch is EOL since 2018, and 2.2.10 is the latest 2.2.x release
http://www.ruby-lang.org/en/downloads/branches/

I don't remember if there are exceptions, but basically, Slackware Stable never switch from one branch to another, whatever the software is

Anyway, it's always recommended to use the latest Slackware stable release

Last edited by marav; 04-14-2023 at 06:19 AM.
 
1 members found this post helpful.
Old 04-14-2023, 06:20 AM   #233
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
ncurses

CVE-2023-29491
Code:
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger 
security-relevant memory corruption via malformed data in a terminfo database file that is found 
in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
https://www.cve.org/CVERecord?id=CVE-2023-29491
 
2 members found this post helpful.
Old 04-14-2023, 08:04 AM   #234
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
xorg-server

CVE-2023-1393
Code:
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation.
If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling 
pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
https://www.cve.org/CVERecord?id=CVE-2023-1393

affected at 21.1.8
 
1 members found this post helpful.
Old 04-14-2023, 10:56 AM   #235
JayByrd
Member
 
Registered: Aug 2021
Location: Seattle, WA
Distribution: Slackware
Posts: 300

Rep: Reputation: 309Reputation: 309Reputation: 309Reputation: 309
Perhaps I'm missing something here, marav...

You've now mentioned this CVE-2023-1393 twice (today and April 3rd.) However, according to this, Pat has already addressed this CVE, as of March 29th ...

What gives?
 
2 members found this post helpful.
Old 04-14-2023, 11:18 AM   #236
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by JayByrd View Post
Perhaps I'm missing something here, marav...

You've now mentioned this CVE-2023-1393 twice (today and April 3rd.) However, according to this, Pat has already addressed this CVE, as of March 29th ...

What gives?
As usual, more coffee :-)
 
1 members found this post helpful.
Old 04-15-2023, 05:34 PM   #237
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Pipewire

Revert "alsa-mixer: allow to re-attach the mixer control element"
Code:
This reverts commit b554fc20.
https://gitlab.freedesktop.org/pipew...1a9909d1e603bd
 
2 members found this post helpful.
Old 04-17-2023, 07:22 AM   #238
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
polkit

Bug report:
https://gitlab.freedesktop.org/polki...t/-/issues/191

Stop installing /usr/share/polkit-1/rules.d as 700/polkitd
Code:
The vendor tree (/usr) cannot contain any secrets or privileged data, as it
is normally shipped in images or packages that can be trivially downloaded and
inspected by anybody.
It thus makes no sense to impose that /usr/share/polkit-1/rules.d is installed
as 700 and owned by the polkitd user. Remove this logic from meson.

The local (admin) configuration tree is /etc, and that is left as-is.

Having non-root directories in /usr creates huge problems for image builders,
as you must ensure that the uid available at build time is exactly the same
as the uid available at runtime. Dropping this requirement will allow to remove
a lot of kludges.
https://gitlab.freedesktop.org/polki...e_requests/153

Patch:
https://gitlab.freedesktop.org/polki...4e7be55900962b
 
1 members found this post helpful.
Old 04-17-2023, 06:04 PM   #239
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
screen

CVE-2023-24626
Code:
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms 
such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, 
causing a denial of service or disruption of the target process.
https://www.cve.org/CVERecord?id=CVE-2023-24626

Patch:
https://git.savannah.gnu.org/cgit/sc...b27c7739f168f7
 
Old 04-18-2023, 12:56 AM   #240
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 978

Rep: Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667
Quote:
Originally Posted by marav View Post
screen

CVE-2023-24626
Code:
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms 
such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, 
causing a denial of service or disruption of the target process.
https://www.cve.org/CVERecord?id=CVE-2023-24626
At least it does not seem as if screen is setuid or setgid by default on Slackware 15.0:

Code:
> ls -al /usr/bin/screen
lrwxrwxrwx 1 root root 12 Jul 17  2022 /usr/bin/screen -> screen-4.9.0*
> ls -al /usr/bin/screen-4.9.0 
-rwxr-xr-x 1 root root 455016 Feb  2  2022 /usr/bin/screen-4.9.0*
The same seems to apply also on the older versions of Slackware that I have checked.

regards Henrik
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 04:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration