- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201405-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Low
    Title: Apache Portable Runtime, APR Utility Library: Denial of
           Service
     Date: May 18, 2014
     Bugs: #339527, #366903, #368651, #399089
       ID: 201405-24

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
Memory consumption errors in Apache Portable Runtime and APR Utility
Library could result in Denial of Service.

Background
=========
The Apache Portable Runtime (aka APR) provides a set of APIs for
creating platform-independent applications. The Apache Portable Runtime
Utility Library (aka APR-Util) provides an interface to functionality
such as XML parsing, string matching and database connections.

Affected packages
================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  dev-libs/apr                < 1.4.8-r1               >= 1.4.8-r1 
  2  dev-libs/apr-util            < 1.3.10                  >= 1.3.10 
    -------------------------------------------------------------------
     2 affected packages

Description
==========
Multiple vulnerabilities have been discovered in Apache Portable
Runtime and APR Utility Library. Please review the CVE identifiersreferenced below for details.

Impact
=====
A remote attacker could cause a Denial of Service condition.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All Apache Portable Runtime users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/apr-1.4.8-r1"

All users of the APR Utility Library should upgrade to the latest
version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.10"

Packages which depend on these libraries may need to be recompiled.
Tools such as revdep-rebuild may assist in identifying some of these
packages.

References
=========
[ 1 ] CVE-2010-1623
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623
[ 2 ] CVE-2011-0419
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419
[ 3 ] CVE-2011-1928
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928
[ 4 ] CVE-2012-0840
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840

Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201405-24

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5/

Gentoo: GLSA-201405-24: Apache Portable Runtime, APR Utility Library: Denial of Service

Memory consumption errors in Apache Portable Runtime and APR Utility Library could result in Denial of Service.

Summary

Multiple vulnerabilities have been discovered in Apache Portable Runtime and APR Utility Library. Please review the CVE identifiersreferenced below for details.

Resolution

All Apache Portable Runtime users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/apr-1.4.8-r1"
All users of the APR Utility Library should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.10"
Packages which depend on these libraries may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

References

[ 1 ] CVE-2010-1623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623 [ 2 ] CVE-2011-0419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419 [ 3 ] CVE-2011-1928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928 [ 4 ] CVE-2012-0840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201405-24

Concerns

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

Severity
Severity: Low
Title: Apache Portable Runtime, APR Utility Library: Denial of
Date: May 18, 2014
Bugs: #339527, #366903, #368651, #399089
ID: 201405-24

Synopsis

Memory consumption errors in Apache Portable Runtime and APR Utility Library could result in Denial of Service.

Background

The Apache Portable Runtime (aka APR) provides a set of APIs for creating platform-independent applications. The Apache Portable Runtime Utility Library (aka APR-Util) provides an interface to functionality such as XML parsing, string matching and database connections.

Affected Packages

------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/apr < 1.4.8-r1 >= 1.4.8-r1 2 dev-libs/apr-util < 1.3.10 >= 1.3.10 ------------------------------------------------------------------- 2 affected packages

Impact

===== A remote attacker could cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Related News