Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-032-01
HistoryFeb 01, 2023 - 10:29 p.m.

[slackware-security] apr

2023-02-0122:29:05
Slackware Linux Project
www.slackware.com
21
slackware
apr
security fix
integer overflow
buffer overflow
cve-2022-24963
cve-2021-35940
cve-2017-12613

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.084

Percentile

94.5%

New apr packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/apr-1.7.2-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
Integer Overflow or Wraparound vulnerability in apr_encode functions of
Apache Portable Runtime (APR) allows an attacker to write beyond bounds
of a buffer. (CVE-2022-24963)
Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
(This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
For more information, see:
https://vulners.com/cve/CVE-2022-24963
https://vulners.com/cve/CVE-2021-35940
https://vulners.com/cve/CVE-2017-12613
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/apr-1.7.2-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/apr-1.7.2-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/apr-1.7.2-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/apr-1.7.2-x86_64-1.txz

MD5 signatures:

Slackware 15.0 package:
f27961f2a01dbddb9485c4ddd075f023 apr-1.7.2-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
328109881520f4758c0f435f33b1eee5 apr-1.7.2-x86_64-1_slack15.0.txz

Slackware -current package:
bdf0e548f53c8e2e8af46a6db145ad2e l/apr-1.7.2-i586-1.txz

Slackware x86_64 -current package:
083b32601177fe6096858986c0ed194b l/apr-1.7.2-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg apr-1.7.2-i586-1_slack15.0.txz

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.084

Percentile

94.5%