=========================================================================Ubuntu Security Notice USN-5870-1
February 14, 2023

APR-util vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

APR-util could be made to crash or run programs as an administrator
if it received specially crafted input.

Software Description:
- apr-util: Apache Portable Runtime Utility Library

Details:

Ronald Crane discovered that APR-util did not properly handled memory when
encoding or decoding certain input data. An attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   libaprutil1                     1.6.1-5ubuntu4.22.10.1

Ubuntu 22.04 LTS:
   libaprutil1                     1.6.1-5ubuntu4.22.04.1

Ubuntu 20.04 LTS:
   libaprutil1                     1.6.1-4ubuntu2.1

Ubuntu 18.04 LTS:
   libaprutil1                     1.6.1-2ubuntu0.1

Ubuntu 16.04 ESM:
   libaprutil1                     1.5.4-1ubuntu0.1~esm2

Ubuntu 14.04 ESM:
   libaprutil1                     1.5.3-1ubuntu0.1~esm2

After a standard system update you need to restart any application
using APR-util libraries to make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5870-1
   CVE-2022-25147

Package Information:
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.10.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.04.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-4ubuntu2.1
   https://launchpad.net/ubuntu/+source/apr-util/1.6.1-2ubuntu0.1

Ubuntu 5870-1: apr-util vulnerability

February 14, 2023
APR-util could be made to crash or run programs as an administrator if it received specially crafted input.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libaprutil1 1.6.1-5ubuntu4.22.10.1 Ubuntu 22.04 LTS: libaprutil1 1.6.1-5ubuntu4.22.04.1 Ubuntu 20.04 LTS: libaprutil1 1.6.1-4ubuntu2.1 Ubuntu 18.04 LTS: libaprutil1 1.6.1-2ubuntu0.1 Ubuntu 16.04 ESM: libaprutil1 1.5.4-1ubuntu0.1~esm2 Ubuntu 14.04 ESM: libaprutil1 1.5.3-1ubuntu0.1~esm2 After a standard system update you need to restart any application using APR-util libraries to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5870-1

CVE-2022-25147

Severity
February 14, 2023

Package Information

https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.10.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-5ubuntu4.22.04.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-4ubuntu2.1 https://launchpad.net/ubuntu/+source/apr-util/1.6.1-2ubuntu0.1

Related News