Gentoo Archives: gentoo-announce

From: Alex Legler <a3li@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200909-03 ] Apache Portable Runtime, APR Utility Library: Execution of arbitrary code
Date: Wed, 09 Sep 2009 13:25:52
Message-Id: 20090909151846.0f91a36a@neon
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200909-03
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Apache Portable Runtime, APR Utility Library: Execution of
9 arbitrary code
10 Date: September 09, 2009
11 Bugs: #280514
12 ID: 200909-03
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 Multiple integer overflows in the Apache Portable Runtime and its
20 Utility Library might allow for the remote execution of arbitrary code.
21
22 Background
23 ==========
24
25 The Apache Portable Runtime (aka APR) provides a set of APIs for
26 creating platform-independent applications. The Apache Portable Runtime
27 Utility Library (aka APR-Util) provides an interface to functionality
28 such as XML parsing, string matching and databases connections.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 dev-libs/apr < 1.3.8 >= 1.3.8
37 2 dev-libs/apr-util < 1.3.9 >= 1.3.9
38 -------------------------------------------------------------------
39 2 affected packages on all of their supported architectures.
40 -------------------------------------------------------------------
41
42 Description
43 ===========
44
45 Matt Lewis reported multiple Integer overflows in the apr_rmm_malloc(),
46 apr_rmm_calloc(), and apr_rmm_realloc() functions in misc/apr_rmm.c of
47 APR-Util and in memory/unix/apr_pools.c of APR, both occurring when
48 aligning memory blocks.
49
50 Impact
51 ======
52
53 A remote attacker could entice a user to connect to a malicious server
54 with software that uses the APR or act as a malicious client to a
55 server that uses the APR (such as Subversion or Apache servers),
56 possibly resulting in the execution of arbitrary code with the
57 privileges of the user running the application.
58
59 Workaround
60 ==========
61
62 There is no known workaround at this time.
63
64 Resolution
65 ==========
66
67 All Apache Portable Runtime users should upgrade to the latest version:
68
69 # emerge --sync
70 # emerge --ask --oneshot --verbose =dev-libs/apr-1.3.8
71
72 All APR Utility Library users should upgrade to the latest version:
73
74 # emerge --sync
75 # emerge --ask --oneshot --verbose =dev-libs/apr-util-1.3.9
76
77 References
78 ==========
79
80 [ 1 ] CVE-2009-2412
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412
82
83 Availability
84 ============
85
86 This GLSA and any updates to it are available for viewing at
87 the Gentoo Security Website:
88
89 http://security.gentoo.org/glsa/glsa-200909-03.xml
90
91 Concerns?
92 =========
93
94 Security is a primary focus of Gentoo Linux and ensuring the
95 confidentiality and security of our users machines is of utmost
96 importance to us. Any security concerns should be addressed to
97 security@g.o or alternatively, you may file a bug at
98 https://bugs.gentoo.org.
99
100 License
101 =======
102
103 Copyright 2009 Gentoo Foundation, Inc; referenced text
104 belongs to its owner(s).
105
106 The contents of this document are licensed under the
107 Creative Commons - Attribution / Share Alike license.
108
109 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature