Ubuntu 5885-1: APR vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5885-1
February 27, 2023

apr vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS

Summary:

APR could possibly be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- apr: Apache Portable Runtime Library

Details:

Ronald Crane discovered integer overflow vulnerabilities in the Apache
Portable Runtime (APR) that could potentially result in memory corruption.
A remote attacker could possibly use these issues to cause a denial of
service or execute arbitary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
libapr1 1.7.0-8ubuntu0.22.10.1

Ubuntu 22.04 LTS:
libapr1 1.7.0-8ubuntu0.22.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5885-1
CVE-2022-24963

Package Information:
https://launchpad.net/ubuntu/+source/apr/1.7.0-8ubuntu0.22.10.1
https://launchpad.net/ubuntu/+source/apr/1.7.0-8ubuntu0.22.04.1

Ubuntu 5885-1: APR vulnerability

February 27, 2023
APR could possibly be made to crash or run programs if it received specially crafted network traffic.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS Summary: APR could possibly be made to crash or run programs if it received specially crafted network traffic. Software Description: - apr: Apache Portable Runtime Library Details: Ronald Crane discovered integer overflow vulnerabilities in the Apache Portable Runtime (APR) that could potentially result in memory corruption. A remote attacker could possibly use these issues to cause a denial of service or execute arbitary code.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libapr1 1.7.0-8ubuntu0.22.10.1 Ubuntu 22.04 LTS: libapr1 1.7.0-8ubuntu0.22.04.1 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5885-1

CVE-2022-24963

Severity
Ubuntu Security Notice USN-5885-1

Package Information

https://launchpad.net/ubuntu/+source/apr/1.7.0-8ubuntu0.22.10.1 https://launchpad.net/ubuntu/+source/apr/1.7.0-8ubuntu0.22.04.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.