LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-29-2024, 01:33 PM   #331
jmccue
Member
 
Registered: Nov 2008
Location: US
Distribution: slackware
Posts: 691
Blog Entries: 1

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380

Quote:
Originally Posted by Petri Kaukasoina View Post
Slackware doesn't seem to be affected.
Slackware 15 anyway But maybe it is an issue with current ? see:

Quote:
Sat Mar 9 21:56:02 UTC 2024
a/xz-5.6.1-x86_64-1.txz: Upgraded.

Last edited by jmccue; 03-29-2024 at 01:36 PM.
 
1 members found this post helpful.
Old 03-29-2024, 01:34 PM   #332
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
Quote:
Originally Posted by jmccue View Post
Slackware 15 anyway : But maybe it is an issue with current ? see:
That is why i posted it, I wasnt sure so I posted here so that we can find out if we are affected on current.
 
Old 03-29-2024, 01:39 PM   #333
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,791

Rep: Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470Reputation: 1470
The malicious code is inserted only when building a deb or rpm package of xz. Probably because some systemd based distros patch openssh to use liblzma (part of xz) and the idea is to have a backdoor in sshd.
 
9 members found this post helpful.
Old 03-29-2024, 01:44 PM   #334
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,098

Rep: Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175
thanks, Pat! <3
 
1 members found this post helpful.
Old 03-29-2024, 01:45 PM   #335
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
Red face

Quote:
Originally Posted by Petri Kaukasoina View Post
The malicious code is inserted only when building a deb or rpm package of xz. Probably because some systemd based distros patch openssh to use liblzma (part of xz) and the idea is to have a backdoor in sshd.
I am thankful we dont have a backdoor in sshd then.....
 
1 members found this post helpful.
Old 03-31-2024, 06:38 PM   #336
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,365

Original Poster
Rep: Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080
libarchive

We should probably highly consider this:

https://github.com/libarchive/libarchive/pull/2101
https://github.com/libarchive/libarchive/pull/1609
 
2 members found this post helpful.
Old 03-31-2024, 07:58 PM   #337
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469
Yeah, I'd heard about the potential for libarchive issues. With Tavis Ormandy on the case, I think if there's an issue it'll be handled quickly.
 
2 members found this post helpful.
Old 04-03-2024, 03:59 PM   #338
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,365

Original Poster
Rep: Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080
XWayland 23.2.5 and X.Org Server 21.1.12

CVE-2024-31080
CVE-2024-31081
CVE-2024-31082
CVE-2024-31083

Code:
Multiple issues have been found in the X server and Xwayland implementations
published by X.Org for which we are releasing security fixes for in
xorg-server-21.1.12 and xwayland-23.2.5.
https://lists.x.org/archives/xorg/20...il/061615.html
 
4 members found this post helpful.
Old 04-04-2024, 09:08 AM   #339
alex2grad
LQ Newbie
 
Registered: Dec 2021
Posts: 5

Rep: Reputation: Disabled
Apache HTTP Server 2.4.59 (released 2024-04-04)

*) SECURITY: CVE-2024-27316: Apache HTTP Server: HTTP/2 DoS by
memory exhaustion on endless continuation frames (cve.mitre.org)
HTTP/2 incoming headers exceeding the limit are temporarily
buffered in nghttp2 in order to generate an informative HTTP 413
response. If a client does not stop sending headers, this leads
to memory exhaustion.
Credits: Bartek Nowotarski (https://nowotarski.info/)

*) SECURITY: CVE-2024-24795: Apache HTTP Server: HTTP Response
Splitting in multiple modules (cve.mitre.org)
HTTP Response splitting in multiple modules in Apache HTTP
Server allows an attacker that can inject malicious response
headers into backend applications to cause an HTTP
desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes
this issue.
Credits: Keran Mu, Tsinghua University and Zhongguancun
Laboratory.

*) SECURITY: CVE-2023-38709: Apache HTTP Server: HTTP response
splitting (cve.mitre.org)
Faulty input validation in the core of Apache allows malicious
or exploitable backend/content generators to split HTTP
responses.
This issue affects Apache HTTP Server: through 2.4.58.
Credits: Orange Tsai (@orange_8361) from DEVCORE
 
2 members found this post helpful.
Old 04-04-2024, 09:12 AM   #340
alex2grad
LQ Newbie
 
Registered: Dec 2021
Posts: 5

Rep: Reputation: Disabled
nghttp2 v1.61.0 (released 2024-04-04)

Fixes CVE-2024-28182
 
2 members found this post helpful.
Old 04-06-2024, 07:07 PM   #341
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,365

Original Poster
Rep: Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080
polkit 124

Because of this new "systemd_dep"
Code:
../meson.build:222:37: ERROR: Unknown variable "systemd_dep".
that leads to a FTB if -Dsystemdsystemunitdir= isn't empty, we need these 2 patches:

https://gitweb.gentoo.org/repo/gento...-systemd.patch

https://gitweb.gentoo.org/repo/gento...md-fixup.patch

Last edited by marav; 04-06-2024 at 07:21 PM.
 
2 members found this post helpful.
Old 04-14-2024, 11:59 AM   #342
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,365

Original Poster
Rep: Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080
less

Code:
less(1) does not correctly escape newlines in pathnames when 
constructing command line of the input preprocessor. If a user ran 
less(1) on files with untrusted names, this could result in execution of 
arbitrary code.
https://www.openwall.com/lists/oss-s...y/2024/04/12/5

Fix:
https://github.com/gwsw/less/commit/007521ac3c95bc76
 
1 members found this post helpful.
Old 04-15-2024, 06:34 AM   #343
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,897

Rep: Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019
I've never liked that feature of less. I use the -L option here.
 
Old 04-18-2024, 06:20 AM   #344
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,365

Original Poster
Rep: Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080Reputation: 4080
glibc

CVE-2024-2961
Code:
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output 
buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, 
which may be used to crash an application or overwrite a neighbouring variable.
affected from 2.1.93 before 2.40

https://www.cve.org/CVERecord?id=CVE-2024-2961

https://sourceware.org/git/?p=glibc....C-SA-2024-0004

Last edited by marav; 04-18-2024 at 06:21 AM.
 
3 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Draft data loss mitigation method for spanned LVM (would like suggestions) ACiD GRiM Linux - General 1 10-18-2009 03:17 AM
LXer: This week at LWN: Interrupt mitigation in the block layer LXer Syndicated Linux News 0 08-25-2009 12:20 PM
Stateful Firewall/IDS/Filter/DDoS Mitigation - What Would You Advise? Xolo Linux - Security 17 07-27-2006 11:21 PM
Ph&#7909;c h&#7891;i d&#7919; li&#7879;u b&#7883; m&#7845;t???, c&#7913; pollsite General 1 06-27-2005 12:39 PM
Gotta love those &#1649;&#1649;&#1649;&#1649;&#1649;&#1649;&#1649;&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 01:25 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration