Slackware alert SSA:2021-143-01 (expat)
| From: | Slackware Security Team <security@slackware.com> | |
| To: | slackware-security@slackware.com | |
| Subject: | [slackware-security] expat (SSA:2021-143-01) | |
| Date: | Sun, 23 May 2021 12:55:46 -0700 | |
| Message-ID: | <alpine.LNX.2.02.2105231255310.25198@connie.slackware.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] expat (SSA:2021-143-01) New expat packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/expat-2.4.1-i586-1_slack14.2.txz: Upgraded. This update provides new mitigations against the "billion laughs" denial of service attack. For more information, see: https://github.com/libexpat/libexpat/blob/R_2_4_1/expat/C... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patc... Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/pa... Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patc... Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/pa... Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patc... Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/pa... Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/s... Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current... MD5 signatures: +-------------+ Slackware 14.0 package: 1380289fd84bf1953cebdda9bd210c3d expat-2.4.1-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 9d054e8ea825f037a2cdf20cb56c21bb expat-2.4.1-x86_64-1_slack14.0.txz Slackware 14.1 package: 7a245716339bc04c21b6ecc55b44e63d expat-2.4.1-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 21a6c8f7663cf02acc05f7da90daa93e expat-2.4.1-x86_64-1_slack14.1.txz Slackware 14.2 package: 89e9c52f2528af96c4ec42982c53765a expat-2.4.1-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 760cfb8ea7e0cc39fa80b3941a38e98d expat-2.4.1-x86_64-1_slack14.2.txz Slackware -current package: 5e0aac7b641db5683fe5c43ec918d049 l/expat-2.4.1-i586-1.txz Slackware x86_64 -current package: c0b118942c1cab5308a061b5043a51db l/expat-2.4.1-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg expat-2.4.1-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAmCqrbAACgkQakRjwEAQIjODqQCgjdM2fU+4vfmMX6jMM73aZ3Y3 XUMAn0UN1WU43uPIUi6LYoS1Oywlhs9W =OqLN -----END PGP SIGNATURE-----
