Ubuntu 5870-1: apr-util vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5870-1
February 14, 2023

APR-util vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

APR-util could be made to crash or run programs as an administrator
if it received specially crafted input.

Software Description:
- apr-util: Apache Portable Runtime Utility Library

Details:

Ronald Crane discovered that APR-util did not properly handled memory when
encoding or decoding certain input data. An attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   libaprutil1                     1.6.1-5ubuntu4.22.10.1

Ubuntu 22.04 LTS:
   libaprutil1                     1.6.1-5ubuntu4.22.04.1

Ubuntu 20.04 LTS:
   libaprutil1                     1.6.1-4ubuntu2.1

Ubuntu 18.04 LTS:
   libaprutil1                     1.6.1-2ubuntu0.1

Ubuntu 16.04 ESM:
   libaprutil1                     1.5.4-1ubuntu0.1~esm2

Ubuntu 14.04 ESM:
   libaprutil1                     1.5.3-1ubuntu0.1~esm2

After a standard system update you need to restart any application
using APR-util libraries to make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5870-1
   CVE-2022-25147

Package Information:
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.10.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.04.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-4ubuntu2.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-2ubuntu0.1

Ubuntu 5870-1: apr-util vulnerability

February 14, 2023
APR-util could be made to crash or run programs as an administrator if it received specially crafted input.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: APR-util could be made to crash or run programs as an administrator if it received specially crafted input. Software Description: - apr-util: Apache Portable Runtime Utility Library Details: Ronald Crane discovered that APR-util did not properly handled memory when encoding or decoding certain input data. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libaprutil1 1.6.1-5ubuntu4.22.10.1 Ubuntu 22.04 LTS: libaprutil1 1.6.1-5ubuntu4.22.04.1 Ubuntu 20.04 LTS: libaprutil1 1.6.1-4ubuntu2.1 Ubuntu 18.04 LTS: libaprutil1 1.6.1-2ubuntu0.1 Ubuntu 16.04 ESM: libaprutil1 1.5.4-1ubuntu0.1~esm2 Ubuntu 14.04 ESM: libaprutil1 1.5.3-1ubuntu0.1~esm2 After a standard system update you need to restart any application using APR-util libraries to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5870-1

CVE-2022-25147

Severity
Ubuntu Security Notice USN-5870-1

Package Information

https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.10.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.04.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-4ubuntu2.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-2ubuntu0.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.