CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
94.5%
New apr packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog:
patches/packages/apr-1.7.2-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
Integer Overflow or Wraparound vulnerability in apr_encode functions of
Apache Portable Runtime (APR) allows an attacker to write beyond bounds
of a buffer. (CVE-2022-24963)
Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
(This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
For more information, see:
https://vulners.com/cve/CVE-2022-24963
https://vulners.com/cve/CVE-2021-35940
https://vulners.com/cve/CVE-2017-12613
(* Security fix *)
Where to find the new packages:
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/apr-1.7.2-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/apr-1.7.2-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/apr-1.7.2-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/apr-1.7.2-x86_64-1.txz
MD5 signatures:
Slackware 15.0 package:
f27961f2a01dbddb9485c4ddd075f023 apr-1.7.2-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
328109881520f4758c0f435f33b1eee5 apr-1.7.2-x86_64-1_slack15.0.txz
Slackware -current package:
bdf0e548f53c8e2e8af46a6db145ad2e l/apr-1.7.2-i586-1.txz
Slackware x86_64 -current package:
083b32601177fe6096858986c0ed194b l/apr-1.7.2-x86_64-1.txz
Installation instructions:
Upgrade the package as root:
> upgradepkg apr-1.7.2-i586-1_slack15.0.txz
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Slackware | 15.0 | i586 | apr | < 1.7.2 | apr-1.7.2-i586-1_slack15.0.txz |
Slackware | 15.0 | x86_64 | apr | < 1.7.2 | apr-1.7.2-x86_64-1_slack15.0.txz |
Slackware | current | i586 | apr | < 1.7.2 | apr-1.7.2-i586-1.txz |
Slackware | current | x86_64 | apr | < 1.7.2 | apr-1.7.2-x86_64-1.txz |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
94.5%