Hide Forgot
A heap buffer underwrite flaw was found in apr-util's apr_strmatch_precompile() function. This flaw could allow a remote attacker to overwrite arbitrary heap memory. The upstream fix is here: http://svn.apache.org/viewvc?view=rev&revision=779880
After looking through the things in RHEL that use this fuction, nothing is using it to parse untrusted remote data. Everything uses this function to parse configuration data, which significantly reduces the severity of this flaw.
This subsequent change: http://svn.apache.org/viewvc?view=rev&revision=781063 fixes another instance of the same mistake, but in this case it would seem to result in only a buffer underread, not a write. I'll include both changes.
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Via RHSA-2009:1108 https://rhn.redhat.com/errata/RHSA-2009-1108.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 Via RHSA-2009:1107 https://rhn.redhat.com/errata/RHSA-2009-1107.html
apr-util-1.2.12-7.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
apr-util-1.3.7-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
apr-util-1.3.7-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: JBEWS 1.0.0 for RHEL 4 Via RHSA-2009:1160 https://rhn.redhat.com/errata/RHSA-2009-1160.html
This issue has been addressed in following products: Red Hat Certificate System 7.3 Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html