LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 09-14-2022, 01:53 PM   #91
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108

Quote:
Originally Posted by volkerdi View Post
This one looks to be already applied.
Sure ?
The commit is from yesterday
 
Old 09-14-2022, 02:27 PM   #92
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
expat

CVE-2022-40674
Code:
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-40674

Commit:
https://github.com/libexpat/libexpat...d4ebee5b853459
 
1 members found this post helpful.
Old 09-14-2022, 03:04 PM   #93
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by volkerdi View Post
This one looks to be already applied.
The commit is not very clear to me ...

Gentoo applied this patch:
https://gitweb.gentoo.org/repo/gento...nv-setup.patch
 
1 members found this post helpful.
Old 09-15-2022, 06:48 PM   #94
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
kio-extras

Can't connect to a Windows samba share with samba-libs 4.16
https://bugs.kde.org/show_bug.cgi?id=453090
Code:
With `samba-libs` >= 4.16, when user connect to the windows file sharing with incorrect 
user credential, the error code is `EINVAL`.

The user should get the password dialog to enter username and password if the error code is `EINVAL`.
Patch:
https://invent.kde.org/network/kio-e...13fe8d26b00db1
 
1 members found this post helpful.
Old 09-18-2022, 10:10 AM   #95
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Vim

CVE-2022-3234
Code:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
https://nvd.nist.gov/vuln/detail/CVE-2022-3234
 
Old 09-18-2022, 12:23 PM   #96
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Grub

CVE-2021-3981
Code:
A flaw in grub2 was found where its configuration file, known as grub.cfg, 
is being created with the wrong permission set allowing non privileged users 
to read its content. This represents a low severity confidentiality issue, 
as those users can eventually read any encrypted passwords present in grub.cfg. 
This flaw affects grub2 2.06 and previous versions. This issue has been fixed 
in grub upstream but no version with the fix is currently released
https://nvd.nist.gov/vuln/detail/CVE-2021-3981

Patch:
https://github.com/rhboot/grub2/comm...035821b0973838
 
1 members found this post helpful.
Old 09-19-2022, 01:03 AM   #97
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,754

Rep: Reputation: Disabled
Obligatory; do not fix permissions of grub.cfg file, they will be made vulnerable again on update. /s
 
Old 09-19-2022, 03:23 AM   #98
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by elcore View Post
Obligatory; do not fix permissions of grub.cfg file, they will be made vulnerable again on update. /s
Which update ?
 
Old 09-19-2022, 03:43 AM   #99
LuckyCyborg
Senior Member
 
Registered: Mar 2010
Posts: 3,529

Rep: Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364Reputation: 3364
Quote:
Originally Posted by marav View Post
Which update ?
Probably he talks about running "grub-mkconfig -o /boot/grub/grub.cfg" which will recreate the config file with wrong permissions, unless your patch is applied.
 
Old 09-19-2022, 04:23 AM   #100
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by LuckyCyborg View Post
Probably he talks about running "grub-mkconfig -o /boot/grub/grub.cfg" which will recreate the config file with wrong permissions, unless your patch is applied.
Code:
blackstar:grub:# ls -l grub.cfg     
-rw-r--r-- 1 root root 4298 sept. 19 10:22 grub.cfg
blackstar:grub:# chmod 0600 grub.cfg 
blackstar:grub:# ls -l grub.cfg      
-rw------- 1 root root 4298 sept. 19 10:22 grub.cfg
Code:
blackstar:grub:# grub-mkconfig -o /boot/grub/grub.cfg 
Generating grub configuration file ...
Found theme: /boot/grub/themes/breeze/theme.txt
Found linux image: /boot/vmlinuz-custom-5.19.9-1
Found initrd image: /boot/initrd-5.19.9-1.gz
Found linux image: /boot/vmlinuz-generic-5.19.9
Found initrd image: /boot/initrd.gz
Found linux image: /boot/vmlinuz-huge-5.19.9
Adding boot menu entry for UEFI Firmware Settings ...
done
Code:
blackstar:grub:# ls -l grub.cfg                       
-rw------- 1 root root 4298 sept. 19 11:21 grub.cfg
Et voilà
 
1 members found this post helpful.
Old 09-19-2022, 09:19 AM   #101
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,754

Rep: Reputation: Disabled
Quote:
Originally Posted by marav View Post
Which update ?
Excuse me, I was just being sarcastic because of "do not edit this file it will be overwritten on update" note in grub.cfg.

It really doesn't concern me because I write my own grub.cfg manually so for me it's more of a joke than a security vulnerability.
Never used mkconfig, os-prober or any other grub scripts & Slackware doesn't require any of that mess because it ships with lilo.

Last edited by elcore; 09-19-2022 at 10:07 AM. Reason: typo
 
2 members found this post helpful.
Old 09-19-2022, 10:07 AM   #102
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,754

Rep: Reputation: Disabled
It's only affecting joke systems which update grub on each kernel update.
And to keep the thread on-topic, rather than argue about whether or not Slackware is affected by this joke vulnerability..
Here is something affecting each and every one of us web browser users:
https://www.bleepingcomputer.com/new...rs-spellcheck/
 
2 members found this post helpful.
Old 09-20-2022, 02:03 PM   #103
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by marav View Post
RPM

CVE-2021-35938
Code:
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials 
after installing a file. A local unprivileged user could use this flaw to exchange the original file with 
a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat 
from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-35938

CVE-2021-35937
Code:
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw 
to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, 
potentially gaining root privileges. The highest threat from this vulnerability is to data 
confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-35937

Note: Fixed in rpm-4.18, which is still in beta stage
RPM 4.18.0
https://ftp.osuosl.org/pub/rpm/relea...4.18.0.tar.bz2
 
1 members found this post helpful.
Old 09-21-2022, 04:30 PM   #104
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
We will soon have a new Firefox release (105.0.1)

https://bugzilla.mozilla.org/show_bug.cgi?id=1786638
Code:
bugs: 1786638
milestone: 105.0.1

Return early if we can't fetch an internal obj when computing ATK relations.
https://hg.mozilla.org/releases/mozi...v/5042ee204b92
 
1 members found this post helpful.
Old 09-21-2022, 05:47 PM   #105
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
KWayland

Code:
client/plasmashell: add fallback for applet popups

When the compositor doesn't support applet popups, the current code sends an
invalid surface role. This causes KWin to fall back to the "normal" surface role
and do normal window placement on it.
Patch:
https://invent.kde.org/frameworks/kw...ommit/d02188ad

FYI:
because of regression, Archlinux reverted this patch

Last edited by marav; 09-23-2022 at 05:59 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 05:49 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration