LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 01-26-2022, 07:28 PM   #961
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108

Quote:
Originally Posted by volkerdi View Post
Have a look at that patch lol

Anyway, thanks!
I hadn't looked at it ...

+"Special thanks to Roland Illig"

LOL

=> https://github.com/libexpat/libexpat...74fe7a7de4b573

Last edited by marav; 01-27-2022 at 02:35 AM.
 
1 members found this post helpful.
Old 01-29-2022, 12:13 PM   #962
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Vim 8.2

patch 8.2.4218: illegal memory access with bracketed paste in Ex mode
severity MEDIUM : 6.1
https://nvd.nist.gov/vuln/detail/CVE-2022-0392

patch 8.2.4233: crash when recording and using Select mode
severity HIGH : 8.4
https://nvd.nist.gov/vuln/detail/CVE-2022-0393
 
2 members found this post helpful.
Old 01-29-2022, 07:39 PM   #963
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
MariaDB

get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.
https://nvd.nist.gov/vuln/detail/CVE-2021-46657

save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery.
https://nvd.nist.gov/vuln/detail/CVE-2021-46658

MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
https://nvd.nist.gov/vuln/detail/CVE-2021-46659
 
Old 01-30-2022, 02:01 AM   #964
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,109

Rep: Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179
Quote:
Originally Posted by marav View Post
MariaDB

get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.
https://nvd.nist.gov/vuln/detail/CVE-2021-46657

save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery.
https://nvd.nist.gov/vuln/detail/CVE-2021-46658
actually these two are already fixed in current (the first has been fixed in 10.5.11 and the second in 10.5.12)
https://jira.mariadb.org/browse/MDEV-25629
https://jira.mariadb.org/browse/MDEV-25630

Quote:
MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
https://nvd.nist.gov/vuln/detail/CVE-2021-46659
this will be fixed in 10.5.14
https://jira.mariadb.org/browse/MDEV-25631
 
2 members found this post helpful.
Old 01-31-2022, 04:20 AM   #965
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 2,225

Rep: Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015
xterm NEW CVE:

https://cve.report/CVE-2022-24130

https://vuldb.com/fr/?id.192007

<<The following vulnerability was found:

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.>>

Last edited by gmgf; 01-31-2022 at 04:21 AM.
 
2 members found this post helpful.
Old 01-31-2022, 09:08 AM   #966
3rensho
Senior Member
 
Registered: Mar 2008
Location: Deutschland
Distribution: Slackware64-current
Posts: 1,026

Rep: Reputation: 618Reputation: 618Reputation: 618Reputation: 618Reputation: 618Reputation: 618
Is Slackware polkit susceptable to this vulnerability??

https://arstechnica.com/information-...-linux-distro/
 
Old 01-31-2022, 09:15 AM   #967
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,109

Rep: Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179Reputation: 4179
Quote:
Originally Posted by 3rensho View Post
Is Slackware polkit susceptable to this vulnerability??

https://arstechnica.com/information-...-linux-distro/
no, patched packages have been released a few days ago
Code:
Wed Jan 26 04:37:35 UTC 2022
l/polkit-0.120-x86_64-2.txz:  Rebuilt.
  [PATCH] pkexec: local privilege escalation.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
  (* Security fix *)
 
1 members found this post helpful.
Old 01-31-2022, 09:20 AM   #968
3rensho
Senior Member
 
Registered: Mar 2008
Location: Deutschland
Distribution: Slackware64-current
Posts: 1,026

Rep: Reputation: 618Reputation: 618Reputation: 618Reputation: 618Reputation: 618Reputation: 618
Quote:
Originally Posted by ponce View Post
no, patched packages have been released a few days ago
Code:
Wed Jan 26 04:37:35 UTC 2022
l/polkit-0.120-x86_64-2.txz:  Rebuilt.
  [PATCH] pkexec: local privilege escalation.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
  (* Security fix *)
Aha, thanks Ponce. I had missed that.
 
Old 01-31-2022, 09:33 AM   #969
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 2,225

Rep: Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015Reputation: 1015
CVE-2022-23853 concern 'ktexteditor'

https://invent.kde.org/frameworks/kt...804e4944.patch

https://invent.kde.org/frameworks/kt...c80f935c.patch

Only found in archlinux, for the moment:

https://github.com/archlinux/svntogi...5a195eb9b7203a

Last edited by gmgf; 01-31-2022 at 09:42 AM.
 
Old 01-31-2022, 02:45 PM   #970
ttk
Senior Member
 
Registered: May 2012
Location: Sebastopol, CA
Distribution: Slackware64
Posts: 1,038
Blog Entries: 27

Rep: Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484Reputation: 1484
Linux kernel 4.4.301 fixes a security vulnerability:

https://cdn.kernel.org/pub/linux/ker...ngeLog-4.4.301

fixes CVE-2022-0330

per https://www.phoronix.com/scan.php?pa...-CVE-2022-0330

Maybe 14.2 could get this as an update?
 
2 members found this post helpful.
Old 02-03-2022, 05:21 PM   #971
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Slackware Linux 15.0

CVE-2022-2222: setup command allows any user logged in as root to install the best distribution available

No mitigation found yet

Last edited by marav; 02-03-2022 at 05:22 PM.
 
7 members found this post helpful.
Old 02-03-2022, 05:40 PM   #972
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,904

Rep: Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025Reputation: 5025
Quote:
Originally Posted by marav View Post
Slackware Linux 15.0

CVE-2022-2222: setup command allows any user logged in as root to install the best distribution available

No mitigation found yet


Well, it's certainly "Outstanding", but perhaps not in the way this thread means!
 
3 members found this post helpful.
  


Reply

Tags
exploit, security, slackware



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[Slackware Security]: Some pending vulnerabilities... mancha Slackware 7 08-22-2013 09:08 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 01:40 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration