LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 04-13-2022, 05:27 AM   #31
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075

Quote:
Originally Posted by semiprime View Post
According to https://lwn.net/Articles/891112/ and https://github.blog/2022-04-12-git-s...ity-announced/ the vulnerability affects multi-user systems, including Linux.
Right
Code:
If you can’t upgrade immediately, the most effective ways to reduce your risk are the following:

    Define the GIT_CEILING_DIRECTORIES environment variable to contain the parent directory of your user profile (i.e., /Users on macOS,
    /home on Linux, and C:\Users on Windows).
 
2 members found this post helpful.
Old 04-18-2022, 05:22 PM   #32
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-29458

https://nvd.nist.gov/vuln/detail/CVE-2022-29458
Code:
ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation 
violation in convert_strings in tinfo/read_entry.c in the terminfo library.
Patch:
https://invisible-island.net/archive...20416.patch.gz
 
1 members found this post helpful.
Old 04-19-2022, 06:19 AM   #33
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
Freetype 2.12.0

Code:
src/cff/cffgload.c (cff_slot_load) [FT_CONFIG_OPTION_SVG]:Fix segfault.
https://bugs.gentoo.org/836898

Patch:
https://gitweb.gentoo.org/repo/gento...ault_fix.patch
 
1 members found this post helpful.
Old 04-20-2022, 10:35 AM   #34
Daedra
Senior Member
 
Registered: Dec 2005
Location: Springfield, MO
Distribution: Slackware64-15.0
Posts: 2,683

Rep: Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375Reputation: 1375
Even though this is not technically a security fix, it is worth mentioning the new 5.15.35 kernel has a backported patch that improves performance for alder lake processors. There will probably be a kernel security upgrade in the future so this is not that important but still I thought I would post about it.

https://www.phoronix.com/scan.php?pa...1535-adl&num=1
 
Old 04-21-2022, 07:32 AM   #35
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-1420

Code:
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
 
Old 04-21-2022, 08:28 PM   #36
nullptr
Member
 
Registered: Nov 2019
Posts: 50

Rep: Reputation: Disabled
CVE-2022-0742
Linux Kernel up to 5.15.27/5.16.13/5.17-rc7 ICMPv6 Packet igmp6_event_query/igmp6_event_report resource consumption
https://vuldb.com/?id.195443
 
1 members found this post helpful.
Old 04-28-2022, 05:22 AM   #37
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-29869
https://nvd.nist.gov/vuln/detail/CVE-2022-29869

Code:
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file 
contains = (equal sign) characters but is not a valid credentials file.
Patch:
https://github.com/piastry/cifs-util...f5a03f83d9c379
 
1 members found this post helpful.
Old 05-07-2022, 03:30 PM   #38
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-1616
https://nvd.nist.gov/vuln/detail/CVE-2022-1616

Code:
Use after free in append_command in GitHub repository vim/vim prior to 8.2. 
This vulnerability is capable of crashing software, Bypass Protection Mechanism, 
Modify Memory, and possible remote execution

patch 8.2.4895
: buffer overflow with invalid command with composing chars
https://github.com/vim/vim/commit/d8...1c9f0cab68cc6c
 
2 members found this post helpful.
Old 05-16-2022, 02:09 AM   #39
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-30775

Code:
xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered 
by (for example) sending a crafted PDF document to the pdftoppm binary. 
It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.
https://nvd.nist.gov/vuln/detail/CVE-2022-30775
 
1 members found this post helpful.
Old 05-17-2022, 02:20 PM   #40
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-1733
https://nvd.nist.gov/vuln/detail/CVE-2022-1733
Code:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
patch 8.2.4968: reading past end of the line when C-indenting
https://github.com/vim/vim/commit/60...a61cacf220f813


CVE-2022-1769
https://nvd.nist.gov/vuln/detail/CVE-2022-1769
Code:
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
patch 8.2.4974: ":so" command may read after end of buffer
https://github.com/vim/vim/commit/47...bb1aad51f8d0b4

Last edited by marav; 05-17-2022 at 02:22 PM.
 
1 members found this post helpful.
Old 05-17-2022, 02:24 PM   #41
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-30067

https://nvd.nist.gov/vuln/detail/CVE-2022-30067
Code:
GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. 
Through a crafted XCF file, the program will allocate for a huge amount of memory,
resulting in insufficient memory or program crash.
From Gitlab:
Code:
Jacob Boerema @Wormnest · 2 weeks ago

Should be fixed now in both master and the next stable release.
Commit:
https://gitlab.gnome.org/GNOME/gimp/...d38a99d71214b6

Last edited by marav; 05-17-2022 at 02:26 PM.
 
1 members found this post helpful.
Old 05-18-2022, 06:19 PM   #42
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-1771

https://nvd.nist.gov/vuln/detail/CVE-2022-1771
Code:
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
patch 8.2.4975: recursive command line loop may cause a crash:
https://github.com/vim/vim/commit/51...a59880d1ee37a8
 
1 members found this post helpful.
Old 05-18-2022, 06:26 PM   #43
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
icu4c 71.1

CVE-2022-1638 patch from Gentoo:
Code:
Fix int32 overflow in FormattedStringBuilder
https://gitweb.gentoo.org/repo/gento...022-1638.patch
 
1 members found this post helpful.
Old 05-19-2022, 09:47 AM   #44
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2022-1785

https://nvd.nist.gov/vuln/detail/CVE-2022-1785

patch 8.2.4977: memory access error when substitute expression changes window
https://github.com/vim/vim/commit/e2...cba8b1dba18839
 
1 members found this post helpful.
Old 05-22-2022, 05:39 AM   #45
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,362

Original Poster
Rep: Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075Reputation: 4075
CVE-2019-16707

https://nvd.nist.gov/vuln/detail/CVE-2019-16707
Code:
Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
Patch:
https://gitweb.gentoo.org/repo/gento...19-16707.patch
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:02 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration