Denial of Service in expat
ID: | SSA:2017-199-01 |
Distribution: | Slackware |
Plattformen: | Slackware -current, Slackware 13.0, Slackware x86_64 13.0, Slackware x86_64 -current, Slackware x86_64 13.1, Slackware 13.1, Slackware x86_64 13.37, Slackware 13.37, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2 |
Datum: | Mi, 19. Juli 2017, 10:39 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 |
Applikationen: | expat |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] expat (SSA:2017-199-01) New expat packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/expat-2.2.2-i586-1_slack14.2.txz: Upgraded. Fixes security issues including: External entity infinite loop DoS For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 https://libexpat.github.io/doc/cve-2017-9233/ (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.2-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.2-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.2-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.2-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.2-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.2-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.2-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.2-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.2-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.2-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.2-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.2-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.2-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.2-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 7f9f98e2fbfdb2d7e92d2a74767f379b expat-2.2.2-i486-1_slack13.0.txz Slackware x86_64 13.0 package: ad390855001c2a32e8a01b1021ee0402 expat-2.2.2-x86_64-1_slack13.0.txz Slackware 13.1 package: aa73dc57c604e1b6c788c599b80561f0 expat-2.2.2-i486-1_slack13.1.txz Slackware x86_64 13.1 package: ab9dfe8b2afeb19b29f8e42f045b5284 expat-2.2.2-x86_64-1_slack13.1.txz Slackware 13.37 package: c2e3ca3e858afcd4ee5da8cb5c43d8eb expat-2.2.2-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 6e96f6eeec6c60d7b4215280cec27560 expat-2.2.2-x86_64-1_slack13.37.txz Slackware 14.0 package: afbae121e3ad167426ee9965e876e67b expat-2.2.2-i486-1_slack14.0.txz Slackware x86_64 14.0 package: edbbcbe637294edbeefe7e2697bd2fb1 expat-2.2.2-x86_64-1_slack14.0.txz Slackware 14.1 package: 8b24088cba47ee63104354dbdb84e504 expat-2.2.2-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 45ce0de8ae651851826e509ba0c490e3 expat-2.2.2-x86_64-1_slack14.1.txz Slackware 14.2 package: f8c21c6bd6c0503ac90ccfdc932bec05 expat-2.2.2-i586-1_slack14.2.txz Slackware x86_64 14.2 package: c2237eb21e2c700d4582bfcca7908cbd expat-2.2.2-x86_64-1_slack14.2.txz Slackware -current package: 0abebd7b1a8294d4a8cb4f4373576fec l/expat-2.2.2-i586-1.txz Slackware x86_64 -current package: fa3206d73e042332ea4e7950525cc4f6 l/expat-2.2.2-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg expat-2.2.2-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAllujGcACgkQakRjwEAQIjO5WgCfY2tdp2bPoc4uw5Au0rwUd4Vs fTwAn3loJ9+eG9cW6gjbtjcXpPMbkDC9 =9/gp -----END PGP SIGNATURE----- |