Hash: SHA256

Package        : apr
Version        : 1.4.6-3+deb7u2
CVE ID         : CVE-2017-12613
Debian Bug     : #879708

It was discovered that there was an out-of-bounds memory vulnerability
in apr, a support/portability library for various applications.

When the apr_exp_time*() or apr_os_exp_time*() functions were invoked
with an invalid month field value, out of bounds memory may have been be
accessed when converting this value to an apr_time_exp_t value. This
could have potentially revealed the contents of a different static heap
value or resulted in program termination.

For Debian 7 "Wheezy", this issue has been fixed in apr version
1.4.6-3+deb7u2.

We recommend that you upgrade your apr packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-1162-1: apr security update

November 6, 2017
It was discovered that there was an out-of-bounds memory vulnerability in apr, a support/portability library for various applications

Summary

When the apr_exp_time*() or apr_os_exp_time*() functions were invoked
with an invalid month field value, out of bounds memory may have been be
accessed when converting this value to an apr_time_exp_t value. This
could have potentially revealed the contents of a different static heap
value or resulted in program termination.

For Debian 7 "Wheezy", this issue has been fixed in apr version
1.4.6-3+deb7u2.

We recommend that you upgrade your apr packages.


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : apr
Version : 1.4.6-3+deb7u2
CVE ID : CVE-2017-12613
Debian Bug : #879708

Related News