LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices



Reply
 
Search this Thread
Old 06-07-2014, 08:12 AM   #181
Didier Spaier
Senior Member
 
Registered: Nov 2008
Location: Paris, France
Distribution: Slackware{,64}-{14.1,current} on a Lenovo Thinkpad T61 6457-4XG
Posts: 4,656

Rep: Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233Reputation: 1233

Quote:
Originally Posted by eloi View Post
They are running, not by me, but they are.
None for discussion or bug reporting as far as I know.
 
Old 06-07-2014, 08:17 AM   #182
jtsn
Member
 
Registered: Sep 2011
Location: Europe
Distribution: Slackware
Posts: 905

Rep: Reputation: 445Reputation: 445Reputation: 445Reputation: 445Reputation: 445
Quote:
Originally Posted by metaschima View Post
Anyway, hopefully libressl will come out soon so I can switch.
LibReSSL is already out: for OpenBSD. There is just no port to Linux yet, because Linux is not compatible enough to (Open)BSD to run this unmodified...

Quote:
I tried e-mailing the devs and recommending crowdfunding the project. No response so far.
You could start a crowd fund raiser for a Linux port of LibreSSL (done by professionals, not half-assed "get it to compile" stuff) on your own. Or you could start a campaign to get the strl*() functions into glibc, which would make every Linux software out there more secure.

Last edited by jtsn; 06-07-2014 at 08:53 AM.
 
Old 06-12-2014, 02:22 AM   #183
Thom1b
Member
 
Registered: Mar 2010
Posts: 72

Rep: Reputation: 31
bind-9.9.5-P1 fixed two security issues and many bugs :

Quote:
Security Fixes

Treat an all zero netmask as invalid when generating the localnets
acl to workaround bug on Windows platform. [CVE-2013-6230] [RT #34687]

Fix crashes when serving some NSEC3 signed zones. memcpy was
incorrectly called with overlapping ranges, resulting in malformed
names being generated on some platforms. This could cause INSIST
failures. (CVE 2014-0591) [RT #35120]
 
Old 06-20-2014, 02:33 AM   #184
Thom1b
Member
 
Registered: Mar 2010
Posts: 72

Rep: Reputation: 31
There is a security bug in linux :

Quote:
Name: CVE-2014-3153
URL: http://cve.mitre.org/cgi-bin/cvename...=CVE-2014-3153

The futex_requeue function in kernel/futex.c in the Linux kernel
through 3.14.5 does not ensure that calls have two different futex
addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification.
It's been fixed since 3.14.6, 3.10.42, 3.2.60.
 
Old 06-20-2014, 04:28 AM   #185
GazL
Senior Member
 
Registered: May 2008
Posts: 3,502

Rep: Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024
Quote:
Originally Posted by Thom1b View Post
There is a security bug in linux :
It's been fixed since 3.14.6, 3.10.42, 3.2.60.
When isn't there.

The above is already mentioned. Duplicate of the one posted by ben in post #166


However, 3.10.44 also fixes: CVE-2014-4014. I also noticed a couple of lesser issues on the changelog, including a DoS/Information disclosure one.

Last edited by GazL; 06-20-2014 at 04:41 AM.
 
Old 06-20-2014, 04:44 AM   #186
Thom1b
Member
 
Registered: Mar 2010
Posts: 72

Rep: Reputation: 31
Quote:
Originally Posted by GazL View Post
The above is already mentioned. Duplicate of the one posted by ben in post #166
Sorry, I didn't see this post. Thanks.
 
Old 06-20-2014, 04:52 AM   #187
GazL
Senior Member
 
Registered: May 2008
Posts: 3,502

Rep: Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024
Quote:
Originally Posted by Thom1b View Post
Sorry, I didn't see this post. Thanks.
It's understandable given the length of this thread now. I've done the same.
 
Old 06-20-2014, 10:20 AM   #188
mancha
Member
 
Registered: Aug 2012
Posts: 361

Original Poster
Rep: Reputation: Disabled
Update 20140620
  1. glibc

    A flaw was discovered in posix_spawn_file_actions_addopen() which can be exploited via use-after-free situations or other exploitable
    situations with mutated paths (CVE-2014-4043).

    Solution for Slackware 14.1: Re-build glibc 2.17 with my backport of upstream's fix.

    Note: If re-building glibc, I recommend the application of additional security fixes that have not been incorporated into Slackware:
    CVE-2012-4424, CVE-2012-4412, CVE-2013-4237, CVE-2013-4788, and CVE-2013-4458. See this thread for details and links to my
    backported fixes.

    This can be accomplished by getting all the diffs and adding the following lines (in red) to the end of glibc.SlackBuild's
    apply_patches() function:

    Code:
      zcat $CWD/glibc.CVE-2013-2207.diff.gz | patch -p1 --verbose || exit 1
      # Patch integer overflows in pvalloc, valloc, and
      # posix_memalign/memalign/aligned_alloc (CVE-2013-4332).
      zcat $CWD/glibc.CVE-2013-4332.diff.gz | patch -p1 --verbose || exit 1
      # Various security fixes
      patch -p1 --verbose < $CWD/glibc-2.17_strcoll-change.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2012-4424.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2012-4412.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2013-4237.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2013-4788.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2013-4458.diff || exit 1
      patch -p1 --verbose < $CWD/glibc-2.17_CVE-2014-4043.diff || exit 1
    }
 
2 members found this post helpful.
Old 06-20-2014, 12:40 PM   #189
mancha
Member
 
Registered: Aug 2012
Posts: 361

Original Poster
Rep: Reputation: Disabled
Update 20140620-1
  1. OpenSSL

    OpenSSL recently released 0.9.8za, 1.0.0m, and 1.0.1h to correct several security flaws. In the case of CVE-2014-0224, the
    original fix restricts ChangeCipherSpec in a way that is causing problems for implementations that use tls_session_secret_cb
    for session resumption (e.g. wpa-supplicant/EAP-FAST) or use TLS renegotiation.

    Solution: Those experiencing problems related to the issues described above should re-build OpenSSL 1.0.1h after applying my
    regression fix (based on upstream commits).

    Note: If re-building OpenSSL, consider the following:

    • On 64-bit systems, enabling 64-bit optimized code for NIST Suite B elliptic curves provides speed improvements as well
      as protection against timing attacks. See this thread for details.

    • In post #163 I describe my personal set of configuration options and their security implications.
--mancha
 
1 members found this post helpful.
Old 06-21-2014, 12:27 PM   #190
mancha
Member
 
Registered: Aug 2012
Posts: 361

Original Poster
Rep: Reputation: Disabled
Update 20140621
  1. Samba

    A flaw has been discovered in Samba's internal DNS server which can be exploited to cause two affected Samba servers to DoS
    themselves (CVE-2014-0239). Additionally, a flaw in SRV_SNAPSHOT_ARRAY permits attackers to leverage configurations that use
    shadow_copy* for vfs objects to reveal potentially private server information (CVE-2014-0178).

    Solution: Upgrade to Samba 4.1.8 (sig)
--mancha
 
1 members found this post helpful.
Old 06-23-2014, 02:57 PM   #191
sardinha
Member
 
Registered: Aug 2012
Location: Portugal
Distribution: Slackware, Salix OS
Posts: 51

Rep: Reputation: 10
samba 4.1.9 and 3.6.24

Quote:
Originally Posted by mancha View Post
Update 20140621
  1. Samba

    A flaw has been discovered in Samba's internal DNS server which can be exploited to cause two affected Samba servers to DoS
    themselves (CVE-2014-0239). Additionally, a flaw in SRV_SNAPSHOT_ARRAY permits attackers to leverage configurations that use
    shadow_copy* for vfs objects to reveal potentially private server information (CVE-2014-0178).

    Solution: Upgrade to Samba 4.1.8 (sig)
--mancha
Suggested security upgrades for resolve CVE-2014-0244 (Denial of service - CPU loop) and CVE-2014-3493 (Denial of service - Server crash/memory corruption):
 
1 members found this post helpful.
Old 06-24-2014, 01:06 AM   #192
Thom1b
Member
 
Registered: Mar 2010
Posts: 72

Rep: Reputation: 31
gnupg:

Quote:
We are pleased to announce the availability of a new stable GnuPG-1
release: Version 1.4.17. This release includes a *security fix* to stop
a possible DoS using garbled compressed data packets which can be used
to put gpg into an infinite loop.
ftp://ftp.gnupg.org/GnuPG/gnupg/gnupg-1.4.17.tar.bz2
ftp://ftp.gnupg.org/GnuPG/gnupg/gnup...17.tar.bz2.sig
 
Old 06-26-2014, 11:04 PM   #193
mancha
Member
 
Registered: Aug 2012
Posts: 361

Original Poster
Rep: Reputation: Disabled
Update 20140626
  1. PHP

    The following security issues have been fixed in PHP 5.4.30:

    Code:
    CVE-2014-0207    CVE-2014-3478    CVE-2014-3479
    CVE-2014-3480    CVE-2014-3487    CVE-2014-3515
    CVE-2014-3981    CVE-2014-4049
    Solution: Upgrade to PHP 5.4.30 (sig)
--mancha
 
Old 06-27-2014, 11:56 AM   #194
GazL
Senior Member
 
Registered: May 2008
Posts: 3,502

Rep: Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024Reputation: 1024
Looks like there's some ancient LZO nastiness that is likely to be triggering security fixes across a number of upstream projects, including the kernel, ffmpeg and others... http://lwn.net/Articles/603668/

One of the comments in the linked lwn article points to a nice blog post about the issues: http://blog.securitymouse.com/2014/0...-bug-that.html

However, as the blog points out, whether its exploitable in any given use case seems to be somewhat situational. Might take a while for the details of various projects affected by this one to come out of the woodwork.

Last edited by GazL; 06-27-2014 at 11:57 AM.
 
2 members found this post helpful.
Old 07-20-2014, 06:01 AM   #195
mats_b_tegner
Member
 
Registered: Nov 2009
Location: Gothenburg, Sweden
Distribution: Slackware64
Posts: 145

Rep: Reputation: 47
httpd 2.4.10 has been released, it fixes the following:
https://httpd.apache.org/security/vu...lities_24.html

Mats
 
  


Reply

Tags
exploit, security, slackware


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
[Slackware Security]: Some pending vulnerabilities... mancha Slackware 7 08-22-2013 10:08 AM


All times are GMT -5. The time now is 07:17 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration