[SSA:2022-263-01] expat
New expat packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/expat-2.4.9-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue:
Heap use-after-free vulnerability in function doContent. Expected impact is
denial of service or potentially arbitrary code execution.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.4.3-i486-7_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.4.3-x86_64-7_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.4.3-i486-7_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.4.3-x86_64-7_slack14.1.txz
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.4.3-i586-7_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.4.3-x86_64-7_slack14.2.txz
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/expat-2.4.9-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/expat-2.4.9-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.4.9-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.4.9-x86_64-1.txz
MD5 signatures
Slackware 14.0 package:
8875d0a7ef12b8b874e0c7a8f3daec23 expat-2.4.3-i486-7_slack14.0.txz
Slackware x86_64 14.0 package:
54c5c55709bf30f4f1c25b058e0e9dc0 expat-2.4.3-x86_64-7_slack14.0.txz
Slackware 14.1 package:
415fb2239e9bf331a113fa5a969f54f6 expat-2.4.3-i486-7_slack14.1.txz
Slackware x86_64 14.1 package:
7d2cddd0b8f59955c015fd816b27f1cf expat-2.4.3-x86_64-7_slack14.1.txz
Slackware 14.2 package:
afefed8cbde7f834e8ce26bed09942b3 expat-2.4.3-i586-7_slack14.2.txz
Slackware x86_64 14.2 package:
b4275c9656969751a44d04babbbffdbd expat-2.4.3-x86_64-7_slack14.2.txz
Slackware 15.0 package:
3e20a4c46f535008c74bafa0c6e0ce4b expat-2.4.9-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
f92b2727f730ace64518e86f62540b74 expat-2.4.9-x86_64-1_slack15.0.txz
Slackware -current package:
61b854ca80084f8d10756696c385108c l/expat-2.4.9-i586-1.txz
Slackware x86_64 -current package:
4367548913891639223cdccf9fac2827 l/expat-2.4.9-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg expat-2.4.9-i586-1_slack15.0.txz
- ID
- SSA:2022-263-01
- Severity
- high
- Severity from
- CVE-2022-40674
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.462733
- Published
-
2022-09-20T22:58:31
(2 years ago) - Modified
-
2022-09-20T22:58:31
(2 years ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2022-1654
- ALAS2-2022-1877
- ALAS2-2022-1900
- ALPINE:CVE-2022-40674
- ALSA-2022:6838
- ALSA-2022:6878
- ALSA-2022:7020
- ALSA-2022:7023
- ALSA-2022:7024
- ALSA-2023:3068
- DSA-5236-1
- ELSA-2022-6834
- ELSA-2022-6838
- ELSA-2022-6878
- ELSA-2022-6997
- ELSA-2022-6998
- ELSA-2022-7020
- ELSA-2022-7023
- ELSA-2022-7024
- ELSA-2022-7026
- ELSA-2022-9962
- ELSA-2022-9967
- FEDORA-2022-15ec504440
- FEDORA-2022-c22feb71ba
- FEDORA-2022-c68d90efc3
- FEDORA-2022-d93b3bd8b9
- FEDORA-2022-dcb1d7bcb1
- FREEBSD:0A0670A1-3E1A-11ED-B48B-E0D55E2A8BF9
- GLSA-202209-24
- GLSA-202211-06
- MFSA-2022-47
- MS:CVE-2022-40674
- RHSA-2022:6834
- RHSA-2022:6838
- RHSA-2022:6878
- RHSA-2022:6997
- RHSA-2022:6998
- RHSA-2022:7020
- RHSA-2022:7023
- RHSA-2022:7024
- RHSA-2022:7026
- RHSA-2023:3068
- RLSA-2022:6878
- RLSA-2022:7023
- RLSA-2022:7024
- SSA:2022-286-01
- SUSE-SU-2022:3466-1
- SUSE-SU-2022:3489-1
- SUSE-SU-2022:3597-1
- USN-5638-1
- USN-5638-2
- USN-5638-4
- USN-5726-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/expat?arch=x86_64&distro=slackware64-current | slackware | expat | < 2.4.9 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/expat?arch=x86_64&distro=slackware64-15.0 | slackware | expat | < 2.4.9 | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/expat?arch=x86_64&distro=slackware64-14.2 | slackware | expat | < 2.4.3 | slackware64-14.2 | x86_64 | |
Affected | pkg:slackbuild/slackware/expat?arch=x86_64&distro=slackware64-14.1 | slackware | expat | < 2.4.3 | slackware64-14.1 | x86_64 | |
Affected | pkg:slackbuild/slackware/expat?arch=x86_64&distro=slackware64-14.0 | slackware | expat | < 2.4.3 | slackware64-14.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/expat?arch=i586&distro=slackware-current | slackware | expat | < 2.4.9 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/expat?arch=i586&distro=slackware-15.0 | slackware | expat | < 2.4.9 | slackware-15.0 | i586 | |
Affected | pkg:slackbuild/slackware/expat?arch=i586&distro=slackware-14.2 | slackware | expat | < 2.4.3 | slackware-14.2 | i586 | |
Affected | pkg:slackbuild/slackware/expat?arch=i486&distro=slackware-14.1 | slackware | expat | < 2.4.3 | slackware-14.1 | i486 | |
Affected | pkg:slackbuild/slackware/expat?arch=i486&distro=slackware-14.0 | slackware | expat | < 2.4.3 | slackware-14.0 | i486 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |