Slackware This Forum is for the discussion of Slackware Linux.
|
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
|
07-12-2022, 02:27 PM
|
#61
|
LQ Veteran
Registered: Feb 2007
Distribution: Slackware64-current with KDE4Town.
Posts: 9,399
|
Quote:
"Retbleed" Published As Arbitrary Speculative Execution With Return Instructions
Written by Michael Larabel. 12 July 2022
..........The security researchers found that Retbleed impacts AMD Zen 1/1+/2 and Intel Core 6th through 8th Gen processors............
|
The full story can be found here, https://www.phoronix.com/scan.php?pa...em&px=RETBLEED
From looking at the latest kernel update release candidates, it appears the patches may have already been applied.
https://www.linuxquestions.org/quest...ml#post6367105
Last edited by cwizardone; 07-12-2022 at 02:33 PM.
|
|
3 members found this post helpful.
|
07-27-2022, 12:40 PM
|
#62
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Samba 4.16.4 fixes
Code:
o CVE-2022-2031: Samba AD users can bypass certain restrictions associated with
changing passwords.
https://www.samba.org/samba/security/CVE-2022-2031.html
o CVE-2022-32744: Samba AD users can forge password change requests for any user.
https://www.samba.org/samba/security/CVE-2022-32744.html
o CVE-2022-32745: Samba AD users can crash the server process with an LDAP add
or modify request.
https://www.samba.org/samba/security/CVE-2022-32745.html
o CVE-2022-32746: Samba AD users can induce a use-after-free in the server
process with an LDAP add or modify request.
https://www.samba.org/samba/security/CVE-2022-32746.html
o CVE-2022-32742: Server memory information leak via SMB1.
https://www.samba.org/samba/security/CVE-2022-32742.html
|
|
2 members found this post helpful.
|
08-17-2022, 08:59 AM
|
#63
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
|
|
1 members found this post helpful.
|
08-17-2022, 01:55 PM
|
#65
|
Slackware Maintainer
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,766
|
Quote:
Originally Posted by marav
|
This one should be CVE-2022-2816
|
|
2 members found this post helpful.
|
08-18-2022, 12:57 AM
|
#66
|
LQ 5k Club
Registered: Oct 2003
Location: Melbourne
Distribution: Slackware64-15.0
Posts: 6,449
|
Those vulnerabilities were reported for xpdf-3.04.
I note that Slackware 15.0 has xpdf-4.03.
|
|
1 members found this post helpful.
|
08-19-2022, 06:44 AM
|
#67
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Libtiff (tiffcrop)
Affected version : 4.4.0
Severity : HIGH
Code:
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write.
An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop
on it with certain parameters) could cause a crash or in some cases, further exploitation.
https://nvd.nist.gov/vuln/detail/CVE-2022-2867
Code:
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read
and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
https://nvd.nist.gov/vuln/detail/CVE-2022-2868
Code:
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the
extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger
this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this
flaw could cause a crash or potentially further exploitation.
https://nvd.nist.gov/vuln/detail/CVE-2022-2869
Last edited by marav; 08-19-2022 at 09:21 AM.
|
|
2 members found this post helpful.
|
08-19-2022, 09:38 AM
|
#68
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Vim
CVE-2022-2889
Code:
Use After Free in GitHub repository vim/vim prior to 9.0.0224
https://nvd.nist.gov/vuln/detail/CVE-2022-2889
|
|
1 members found this post helpful.
|
08-23-2022, 02:35 PM
|
#70
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Vim
CVE-2022-2946
Code:
Use After Free in GitHub repository vim/vim prior to 9.0.0245
https://nvd.nist.gov/vuln/detail/CVE-2022-2946
CVE-2022-2923
Code:
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240
https://nvd.nist.gov/vuln/detail/CVE-2022-2923
Last edited by marav; 08-23-2022 at 02:39 PM.
|
|
2 members found this post helpful.
|
08-26-2022, 06:04 AM
|
#71
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Binutils
CVE-2022-38533
Code:
In GNU Binutils before 2.4.0, there is a heap-buffer-overflow in the error function bfd_getl32
when called from the strip_main function in strip-new via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2022-38533
|
|
2 members found this post helpful.
|
08-26-2022, 06:07 AM
|
#72
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
RPM
CVE-2021-35938
Code:
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials
after installing a file. A local unprivileged user could use this flaw to exchange the original file with
a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat
from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
CVE-2021-35937
Code:
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw
to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501,
potentially gaining root privileges. The highest threat from this vulnerability is to data
confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
Note: Fixed in rpm-4.18, which is still in beta stage
Last edited by marav; 08-26-2022 at 06:15 AM.
|
|
2 members found this post helpful.
|
08-26-2022, 06:25 AM
|
#73
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Sox
CVE-2021-33844
Code:
A vulnerability was found in SoX where a divide by zero bug exists in wav.c:967, functon startread.
With a crafted wav file, the application crashes.
CVE-2021-23210
Code:
A vulnerability was found in SoX, where a divide by zero exists in voc.c:334, functon read_samples.
CVE-2021-23172
Code:
A vulnerability was found in SoX, where a heap overflow was found in hcom.c:161, function startread.
The vulnerability is exploitable with a crafted hcomn file.
CVE-2021-23159
Code:
A vulnerability was found in SoX, where a heap based overflow was found in formats_i.c:376, function lsx_read_w_buf.
Note : Archlinux PKGBUILD
Code:
# using a git snapshot as 14.4.2 has many unfixed security vulns
Snapshot:
https://sourceforge.net/code-snapsho...addbe65f49.zip
|
|
2 members found this post helpful.
|
08-28-2022, 02:39 PM
|
#74
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
Vim
CVE-2022-3016
Code:
Use After Free in GitHub repository vim/vim prior to 9.0.0286
https://nvd.nist.gov/vuln/detail/CVE-2022-3016
Last edited by marav; 08-29-2022 at 02:41 PM.
|
|
|
08-29-2022, 02:32 PM
|
#75
|
LQ Sage
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,723
Original Poster
|
dnsmasq
CVE-2022-0934
Code:
A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker
who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-0934
|
|
1 members found this post helpful.
|
All times are GMT -5. The time now is 03:00 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|