SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
CVE-2015-0235 is a glibc vulnerability, fixed in 2.18 (so -current shouldn't be vulnerable) but I'm not sure if the fix was applied to older Slackware releases (13.1, 14.0, 14.1). It wasn't recognized as a vulnerability until recently.
The wordexp function in glibc before 2.21 can ignore WRDE_NOCMD under certain input conditions resulting in the execution of a shell
for command substitution when the application did not request it. This can be exploited by context-dependent attackers to execute
arbitrary code (CVE-2014-7817)
The getnetbyname function in glibc before 2.21 can enter an infinite loop if the DNS back-end is activated in the system Name Service
Switch configuration, and the DNS resolver receives a positive answer while processing the network name. This can be exploited by
context-dependent attackers to cause of denial of service. (CVE-2014-9402)
A buffer overflow was discovered in __nss_hostname_digits_dots() in glibc prior to 2.18 that can be exploited locally and remotely via
the gethostbyname* functions. (CVE-2015-0235 aka GHOST)
glibc (multiple issues)[*]A buffer overflow was discovered in __nss_hostname_digits_dots() in glibc prior to 2.18 that can be exploited locally and remotely via
the gethostbyname* functions. (CVE-2015-0235 aka GHOST)
Note: You can test vulnerability with CVE-2015-0235-test.c
Solution
I trust we'll see some sort of actual slackware update soon ? Fixing a glibc issue from a diff patch above is probably beyond most people (myself incuded).
I trust we'll see some sort of actual slackware update soon ? Fixing a glibc issue from a diff patch above is probably beyond most people (myself incuded).
Not necessarily. Brad Spender's comment on lwn is interesting. He seems to be suggesting that this isn't nearly as "highly critical" as is being made out. Of course, that doesn't mean that someone isn't going to find something that is using it in such a way as to be exploitable at some point. Be interesting to see which way Pat jumps on this one.
Not necessarily. Brad Spender's comment on lwn is interesting. He seems to be suggesting that this isn't nearly as "highly critical" as is being made out. Of course, that doesn't mean that someone isn't going to find something that is using it in such a way as to be exploitable at some point. Be interesting to see which way Pat jumps on this one.
Stable Changelog for x86 (32-bit) + Attn. Slint users
Code:
Wed Jan 28 19:23:00 UTC 2015
patches/packages/glibc-2.17-i486-10_slack14.1.txz: Rebuilt.
This update patches a security issue __nss_hostname_digits_dots() function
of glibc which may be triggered through the gethostbyname*() set of
functions. This flaw could allow local or remote attackers to take control
of a machine running a vulnerable version of glibc. Thanks to Qualys for
discovering this issue (also known as the GHOST vulnerability.)
For more information, see:
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
(* Security fix *)
patches/packages/glibc-i18n-2.17-i486-10_slack14.1.txz: Rebuilt.
patches/packages/glibc-profile-2.17-i486-10_slack14.1.txz: Rebuilt.
patches/packages/glibc-solibs-2.17-i486-10_slack14.1.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded.
Upgraded to tzcode2014j and tzdata2014j.
+--------------------------+
Thanks Patrick.
PS Attn. Slint users:
After upgrade of glibc-* you'll loose the internationalization of timeconfig.
To get it back, reinstall a Slint package for your Slackware version after upgrade of glibc-*':
Caveat emptor: then you will loose the last updates of tzcode and tzdata. I'll provide updated Slint packages including them in the coming days and announce their availability in the Slint thread.
EDIT: the updated Slint packages are now available, see this post for instructions.
Last edited by Didier Spaier; 01-30-2015 at 05:58 PM.
Reason: EDIT added.
Its just "glibc-2.17-x86_64-10_slack14.1.txt" does not say the "This update patches a security issue __nss_hostname_digits_dots() function"...
If you use slackpkg for updates, then the correct package(s) will be upgraded. If you are curious about the update info, you could read the ChangeLog.txt at the top of the release directory. That will be more informative about what the update concerns and likely what you are looking for. http://mirrors.kernel.org/slackware/.../ChangeLog.txt
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.