LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 09-23-2022, 06:00 AM   #106
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108

Vim

CVE-2022-3256
Code:
Use After Free in GitHub repository vim/vim prior to 9.0.0530.
https://nvd.nist.gov/vuln/detail/CVE-2022-3256
 
Old 09-25-2022, 01:45 PM   #107
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Vim

This one is dedicated to LuckyCyborg ;-)
Cheers, my friend

CVE-2022-3296
Code:
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
https://nvd.nist.gov/vuln/detail/CVE-2022-3296

Last edited by marav; 09-25-2022 at 01:47 PM.
 
2 members found this post helpful.
Old 09-28-2022, 05:38 AM   #108
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Plasma Workspace

https://bugs.kde.org/show_bug.cgi?id=459309
Code:
1. Open Users settings
2. Press Change Password
3. Input the new password and the confirmation
4. Press Set Password

OBSERVED RESULT
Nothing is changed. I can login using my old password
Code:
set setInteractiveAuthorizationAllowed on SetPassword call

is important that the setpasswod call uses interactive authorization,
otherwise will be denied, unless the user had been modified beforehand
so an authorization was already granted
Patch:
https://invent.kde.org/plasma/plasma...ab599f01df97e8
 
Old 09-28-2022, 11:17 AM   #109
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
kscreenlocker

Code:
PATCH] Set QSurfaceFormat::ResetNotification

This got lost in frameworks porting from shared KDeclarative code and is
important especially for nvidia after suspend+resume.
https://invent.kde.org/plasma/kscree...cd05225f.patch
 
Old 09-29-2022, 01:41 PM   #110
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Vim

CVE-2022-3352
Code:
Use After Free in GitHub repository vim/vim prior to 9.0.0614.
https://nvd.nist.gov/vuln/detail/CVE-2022-3352

CVE-2022-3324
Code:
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.
https://nvd.nist.gov/vuln/detail/CVE-2022-3324
 
Old 10-01-2022, 02:24 PM   #111
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Plasma-integration

Fix QtQuickRenderSettings from loading
Code:
Currently the firstCall guard is broken and the code is never run.
Patch:
https://invent.kde.org/plasma/plasma...72d2c82286bd2f
 
Old 10-02-2022, 05:44 AM   #112
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,754

Rep: Reputation: Disabled
The last qt5 version in slackware-15.0 looks like 5.15.3_20220318 from 2022-03-03
However, it seems 2 patches were made upstream, after 2022-03-03

CVE-2022-27404-27405-27406-qtbase-5.15.diff (2022-07-26 13:27)
CVE-2022-37434-qtbase-5.15.patch (2022-09-12 11:47)
 
3 members found this post helpful.
Old 10-06-2022, 10:12 AM   #113
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Bash 5.2

Code:
Starting bash with an invalid locale specification for LC_ALL/LANG/LC_CTYPE
can cause the shell to crash.
Patch:
https://ftp.gnu.org/gnu/bash/bash-5....hes/bash52-002
 
3 members found this post helpful.
Old 10-08-2022, 07:41 AM   #114
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Postfix 3.7.2

Code:
make -f Makefile.in MAKELEVEL= Makefiles
(echo "# Do not edit -- this file documents how Postfix was built for your machine."; /bin/sh makedefs) >makedefs.tmp
ATTENTION:
ATTENTION: Unknown system type: Linux 6.0.0
ATTENTION:
Postfix needs this patch to be compiled with a 6.x kernel:

https://gitweb.gentoo.org/repo/gento.../linux-6.patch

Last edited by marav; 10-08-2022 at 07:43 AM.
 
2 members found this post helpful.
Old 10-14-2022, 02:53 AM   #115
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
For Slackware 15.0

In the Linux kernel 5.2 through 5.19.14

CVE-2022-41674
CVE-2022-42719
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722

https://git.kernel.org/pub/scm/linux.../?h=queue/5.15

Last edited by marav; 10-14-2022 at 02:55 AM.
 
3 members found this post helpful.
Old 10-14-2022, 02:59 AM   #116
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
zlib 1.2.13

Fix the following CVE:
CVE-2022-37434

https://github.com/madler/zlib/commi...1ae950166bece1

Last edited by marav; 10-14-2022 at 03:00 AM.
 
2 members found this post helpful.
Old 10-14-2022, 10:38 AM   #117
Daedra
Senior Member
 
Registered: Dec 2005
Location: Springfield, MO
Distribution: Slackware64-15.0
Posts: 2,691

Rep: Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377
Quote:
Originally Posted by marav View Post
For Slackware 15.0

In the Linux kernel 5.2 through 5.19.14

CVE-2022-41674
CVE-2022-42719
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722

https://git.kernel.org/pub/scm/linux.../?h=queue/5.15
In addition to this, if we do get another kernel update for security patches to 15.0 (which is likely), could you please also add this patch for modern AMD CPU's. It's a very small patch but does make a noticeable difference, More information here

https://www.phoronix.com/news/Linux-AMD-Old-Chipset-WA

Last edited by Daedra; 10-14-2022 at 10:45 AM.
 
2 members found this post helpful.
Old 10-14-2022, 12:52 PM   #118
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,523

Rep: Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489
Quote:
Originally Posted by Daedra View Post
In addition to this, if we do get another kernel update for security patches to 15.0 (which is likely), could you please also add this patch for modern AMD CPU's. It's a very small patch but does make a noticeable difference, More information here

https://www.phoronix.com/news/Linux-AMD-Old-Chipset-WA
Of course I'm well aware of this patch, but we've never patched the kernel for non-security reasons (and even then only rarely). I'm not sure why this hasn't been backported to the stable kernels yet, but the linux-stable team is where this request should be made.
 
2 members found this post helpful.
Old 10-14-2022, 01:05 PM   #119
Daedra
Senior Member
 
Registered: Dec 2005
Location: Springfield, MO
Distribution: Slackware64-15.0
Posts: 2,691

Rep: Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377
Quote:
Originally Posted by volkerdi View Post
Of course I'm well aware of this patch, but we've never patched the kernel for non-security reasons (and even then only rarely). I'm not sure why this hasn't been backported to the stable kernels yet, but the linux-stable team is where this request should be made.
Understood, Your kernel SlackBuilds makes adding this patch a piece of cake anyway for us DIY'ers, so this is a non-issue for me personally. I am also slightly perplexed on why they haven't backported this yet given its simplicity and it does make a noticeable improvement under the right conditions.

Thanks for the consideration.
 
Old 10-17-2022, 10:51 AM   #120
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Original Poster
Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Xorg

https://nvd.nist.gov/vuln/detail/CVE-2022-3550
https://nvd.nist.gov/vuln/detail/CVE-2022-3551
https://nvd.nist.gov/vuln/detail/CVE-2022-3553
https://nvd.nist.gov/vuln/detail/CVE-2022-3554
https://nvd.nist.gov/vuln/detail/CVE-2022-3555

Note: All of them have been patched upstream for the next release
 
3 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 06:56 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration