LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 02-20-2024, 02:46 PM   #316
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467

Quote:
Originally Posted by alex2grad View Post
Affected versions > v1.24.0
The version 1.43.0 is in Slackware 15.0. Why it's not vulnerable?

CVE-2024-24806
https://www.chainguard.dev/unchained...ard-images-tho
 
Old 02-20-2024, 02:55 PM   #317
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467
Quote:
Originally Posted by alex2grad View Post
Affected versions > v1.24.0
The version 1.43.0 is in Slackware 15.0. Why it's not vulnerable?

CVE-2024-24806
Ah, I see now that the original advisory had Affected versions: > 1.45.x

http://www.openwall.com/lists/oss-security/2024/02/08/2

But then they changed this a few days later:

https://www.openwall.com/lists/oss-s...y/2024/02/11/1

Thanks, I'll prepare an update for Slackware 15.0.
 
2 members found this post helpful.
Old 02-28-2024, 07:04 AM   #318
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
wpa_supplicant

CVE-2023-52160
Code:
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. 
For a successful attack, wpa_supplicant must be configured to not verify the network's 
TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can 
then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV 
Success packet instead of starting Phase 2. This allows an adversary to impersonate 
Enterprise Wi-Fi networks.
https://www.cve.org/CVERecord?id=CVE-2023-52160

https://w1.fi/cgit/hostap/commit/?id...a81270b768439c
 
1 members found this post helpful.
Old 03-10-2024, 01:04 PM   #319
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
qpdf

CVE-2024-24246
Code:
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash 
the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
https://www.cve.org/CVERecord?id=CVE-2024-24246
 
2 members found this post helpful.
Old 03-10-2024, 02:09 PM   #320
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467
Quote:
Originally Posted by marav View Post
qpdf

CVE-2024-24246
Code:
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash 
the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
https://www.cve.org/CVERecord?id=CVE-2024-24246
Thanks. Verified that the vulnerable code is not present in the version of qpdf shipped in Slackware 15.0.
 
4 members found this post helpful.
Old 03-11-2024, 04:12 AM   #321
opty
Member
 
Registered: Mar 2021
Posts: 175

Rep: Reputation: Disabled
OT: /me just noticed "Slackware Maintainer", nice! :-)
 
Old 03-11-2024, 08:47 AM   #322
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
Grub2

CVE-2024-1048
Code:
A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, 
grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to 
the original grubenv file. If the program is killed before the rename operation, the temporary 
file will not be removed and may fill the filesystem when invoked multiple times, resulting in 
a filesystem out of free inodes or blocks.
https://www.cve.org/CVERecord?id=CVE-2024-1048

https://www.openwall.com/lists/oss-s...y/2024/02/06/3

Last edited by marav; 03-11-2024 at 08:48 AM.
 
1 members found this post helpful.
Old 03-11-2024, 10:09 AM   #323
Didier Spaier
LQ Addict
 
Registered: Nov 2008
Location: Paris, France
Distribution: Slint64-15.0
Posts: 11,058

Rep: Reputation: Disabled
Quote:
Originally Posted by marav View Post
Grub2

CVE-2024-1048
Code:
A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, 
grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to 
the original grubenv file. If the program is killed before the rename operation, the temporary 
file will not be removed and may fill the filesystem when invoked multiple times, resulting in 
a filesystem out of free inodes or blocks.
https://www.cve.org/CVERecord?id=CVE-2024-1048

https://www.openwall.com/lists/oss-s...y/2024/02/06/3
Fortunately as stated in https://www.openwall.com/lists/oss-s...y/2024/02/06/3 grub2-set-bootflag.c is not included in the upstream source tree, I just checked after having cloned the repository.

Last edited by Didier Spaier; 03-11-2024 at 10:12 AM.
 
2 members found this post helpful.
Old 03-11-2024, 11:57 AM   #324
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
Quote:
Originally Posted by Didier Spaier View Post
Fortunately as stated in https://www.openwall.com/lists/oss-s...y/2024/02/06/3 grub2-set-bootflag.c is not included in the upstream source tree, I just checked after having cloned the repository.
Indeed
It seems that only Redhat builds this tool
 
Old 03-27-2024, 06:16 PM   #325
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
util-linux

CVE-2024-28085
Code:
The util-linux wall command does not filter escape sequences from command line arguments. 
The vulnerable code was introduced in commit cdd3cc7fa4 (2013). 
Every version since has been vulnerable. 
A full report can be found here. I have nicknamed this bug "WallEscape".
https://github.com/skyler-ferrante/CVE-2024-28085

https://www.cve.org/CVERecord?id=CVE-2024-28085

Fixed in 2.40
https://mirrors.edge.kernel.org/pub/...2.40-ChangeLog
 
1 members found this post helpful.
Old 03-27-2024, 06:23 PM   #326
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467Reputation: 8467
Quote:
Originally Posted by marav View Post
util-linux

CVE-2024-28085
Code:
The util-linux wall command does not filter escape sequences from command line arguments. 
The vulnerable code was introduced in commit cdd3cc7fa4 (2013). 
Every version since has been vulnerable. 
A full report can be found here. I have nicknamed this bug "WallEscape".
https://github.com/skyler-ferrante/CVE-2024-28085

https://www.cve.org/CVERecord?id=CVE-2024-28085

Fixed in 2.40
https://mirrors.edge.kernel.org/pub/...2.40-ChangeLog
It's almost as if using sudo+password all the time could be hazardous.
 
Old 03-27-2024, 06:32 PM   #327
Didier Spaier
LQ Addict
 
Registered: Nov 2008
Location: Paris, France
Distribution: Slint64-15.0
Posts: 11,058

Rep: Reputation: Disabled
Quote:
Originally Posted by volkerdi View Post
It's almost as if using sudo+password all the time could be hazardous.
It is not, if and only if sudo is set to require root's password
 
1 members found this post helpful.
Old 03-29-2024, 12:22 PM   #328
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
xz 5.6.1

Quote:
Assigner: Red Hat, Inc.
Published: 2024-03-29Updated: 2024-03-29

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
https://www.cve.org/CVERecord?id=CVE-2024-3094
https://www.openwall.com/lists/oss-s...y/2024/03/29/4
https://salsa.debian.org/debian/xz-u...type=heads#L63

Last edited by reddog83; 03-29-2024 at 12:29 PM.
 
2 members found this post helpful.
Old 03-29-2024, 12:48 PM   #329
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
Code:
The urgent Red Hat warning can be found via the Red Hat blog. 
Debian has also released a similar security message over the malicious code within XZ utils.

Long story short, make sure you don't have XZ 5.6.0/5.6.1 on your systems now.
https://www.phoronix.com/news/XZ-CVE-2024-3094

Last edited by marav; 03-29-2024 at 12:49 PM.
 
3 members found this post helpful.
Old 03-29-2024, 01:04 PM   #330
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,787

Rep: Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468Reputation: 1468
Slackware doesn't seem to be affected.
 
4 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:05 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration