LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   [Slackware security] vulnerabilities outstanding 20140101 (https://www.linuxquestions.org/questions/slackware-14/%5Bslackware-security%5D-vulnerabilities-outstanding-20140101-a-4175489800/)

atelszewski 09-13-2017 03:30 PM

Hi,

Thanks.

--
Best regards,
Andrzej Telszewski

atelszewski 09-13-2017 04:59 PM

Hi,

Quote:

Originally Posted by volkerdi (Post 5758519)
Waiting on proper upstream fixes.

Wouldn't it be this one: e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3 ?

4.4.88 with this fix has just been releases.

--
Best regards,
Andrzej Telszewski

chytraeus 09-14-2017 07:43 PM

cairo-1.14.6 CVE-2016-9082
 
CVE-2016-9082

Cairo 'cairo-png.c' Integer Overflow Vulnerability
http://www.securityfocus.com/bid/93931

A patch is provided here https://bugs.freedesktop.org/attachment.cgi?id=127421.
This patch is also used in Debian's libcairo2-1.14.8

majekw 09-15-2017 04:07 PM

Quote:

Originally Posted by atelszewski (Post 5758542)
Hi,


Wouldn't it be this one: e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3 ?

4.4.88 with this fix has just been releases.


Bluez 5.47 is also out with the fixes for http://cve.mitre.org/cgi-bin/cvename...E-2017-1000250

Z5T1 09-17-2017 10:33 AM

A vulnerability in libgcrypt which makes it easier for attackers to discover a secret key:

CVE-2017-0379 (https://nvd.nist.gov/vuln/detail/CVE-2017-0379)

This has been fixed in libgcrypt 1.7.9. More details at http://security.cucumberlinux.com/se...ails.php?id=26

Z5T1 09-17-2017 02:17 PM

A vulnerability in gdk-pixbuf allowing for a denial of service:

CVE-2017-6311 (https://nvd.nist.gov/vuln/detail/CVE-2017-6311)

This has been fixed in gdk-pixbuf 2.36.10

Thom1b 09-20-2017 03:19 AM

samba 4.4.16, 4.5.14, 4.6.8 are released with security fixes.

Quote:

Details
=======

o CVE-2017-12150:
A man in the middle attack may hijack client connections.

o CVE-2017-12151:
A man in the middle attack can read and may alter confidential
documents transferred via a client connection, which are reached
via DFS redirect when the original connection used SMB3.

o CVE-2017-12163:
Client with write access to a share can cause server memory contents to be
written into a file or printer.

For more details and workarounds, please see the security advisories:

o https://www.samba.org/samba/security...017-12150.html
o https://www.samba.org/samba/security...017-12151.html
o https://www.samba.org/samba/security...017-12163.html


Changes:
--------

o Jeremy Allison <jra@samba.org>
* BUG 12836: s3: smbd: Fix a read after free if a chained SMB1 call goes
async.
* BUG 13020: CVE-2017-12163: s3:smbd: Prevent client short SMB1 write from
writing server memory to file.

o Ralph Boehme <slow@samba.org>
* BUG 12885: s3/smbd: Let non_widelink_open() chdir() to directories
directly.

o Stefan Metzmacher <metze@samba.org>
* BUG 12996: CVE-2017-12151: Keep required encryption across SMB3 dfs
redirects.
* BUG 12997: CVE-2017-12150: Some code path don't enforce smb signing
when they should.


ttk 09-21-2017 02:40 PM

A bunch of linux kernel CVEs were announced here:
https://lists.debian.org/debian-secu.../msg00243.html

Checking each against the kernels now in current, 14.2 and 14.1 revealed some outstanding vulnerabilities -- I think. Please double-check. All I did was check the kernel sources for the code which introduced the vulns and/or the existence of patches which fixed them, and didn't run POCs.

CVE-2017-7518: none (CONFIG_KVM=m in Slackware)
CVE-2017-7558: current
CVE-2017-10661: not sure
CVE-2017-11600: current, 14.2, 14.1
CVE-2017-12146: current, 14.2, 14.1
CVE-2017-12134: none (no xen in Slackware; those using xen sbo should use workaround "echo 2 > /sys/block/nvme0n1/queue/nomerges")
CVE-2017-12153: current, 14.2, 14.1
CVE-2017-12154: none (CONFIG_KVM=m in Slackware)
CVE-2017-14106: current, 14.2, 14.1 (not finding Linus' patch in net/ipv4/tcp.c)
CVE-2017-14140: 14.1
CVE-2017-14156: current, 14.2 (atyfb_base.c not present in 14.1)
CVE-2017-14340: 14.1
CVE-2017-14489: current, 14.2, 14.1
CVE-2017-14497: current
CVE-2017-1000111: 14.1
CVE-2017-1000112: not sure
CVE-2017-1000251: none
CVE-2017-1000252: current, 14.2
CVE-2017-1000370: not sure
CVE-2017-1000371: 14.1
CVE-2017-1000380: 14.1

CTM 10-02-2017 09:32 AM

dnsmasq 2.78 has been released, which fixes a truckload of remotely-exploitable vulnerabilities.

2.78 release announcement
Google Security blog post on the vulnerabilities they discovered

mats_b_tegner 10-04-2017 09:26 AM

curl 7.56.0
 
curl 7.56.0 fixes CVE-2017-1000254
https://curl.haxx.se/docs/adv_20171004.html

USUARIONUEVO 10-06-2017 05:48 PM

lame , in current have CVE-2017-15018 , AND same in slackbuilds , but this is another question.

https://cve.mitre.org/cgi-bin/cvenam...CVE-2017-15018

the patch
https://git.archlinux.org/svntogit/p...=packages/lame

USUARIONUEVO 10-12-2017 03:37 PM

I posted in the current hread but , this probably need patch in 14.2 and other slack versions.

Xorg-server , ..again !


CVE-2017-12176: Unvalidated extra length in ProcEstablishConnection
CVE-2017-12177: dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo
CVE-2017-12178: Xi: fix wrong extra length check in ProcXIChangeHierarchy
CVE-2017-12179: Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
CVE-2017-12180: hw/xfree86: unvalidated lengths
CVE-2017-12181: hw/xfree86: unvalidated lengths
CVE-2017-12182: hw/xfree86: unvalidated lengths
CVE-2017-12183: xfixes: unvalidated lengths
CVE-2017-12184: Unvalidated lengths
CVE-2017-12185: Unvalidated lengths
CVE-2017-12186: Unvalidated lengths
CVE-2017-12187: Unvalidated lengths

a4z 10-14-2017 11:02 AM

will Slackware update gcc to 5.5?

https://gcc.gnu.org/ml/gcc/2017-10/msg00064.html

the fixes since 5.3 are rather huge

https://gcc.gnu.org/bugzilla/buglist..._milestone=5.4
https://gcc.gnu.org/bugzilla/buglist..._milestone=5.5

and some of them are marked critical

volkerdi 10-14-2017 01:45 PM

Quote:

Originally Posted by a4z (Post 5769900)
will Slackware update gcc to 5.5?

Since -current is already past the 5.x branch (on gcc-7.2.0), no we won't.

Didier Spaier 10-16-2017 04:42 AM

KRACK Attacks
 
I don't know if and when WPA supplicant will be patched.

https://www.krackattacks.com/

Details should published soon.

Meanwhile, I'd suggest to be careful with your WIFI connections, and prefer wired connections whenever possible, although no exploit seems to have been recorded at time of writing to my knowledge.


All times are GMT -5. The time now is 08:19 AM.