Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 515698 - (CVE-2009-2412) CVE-2009-2412 apr, apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
CVE-2009-2412 apr, apr-util: Integer overflows in memory pool (apr) and reloc...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
http://marc.info/?l=apr-dev&m=1249417...
impact=moderate,reported=20090730,pub...
: Security
Depends On: 595829 515705 515707 515708 515709 515710 515711 515712 515713 515714 515900 515901 591930 795917
Blocks:
  Show dependency treegraph
 
Reported: 2009-08-05 08:30 EDT by Jan Lieskovsky
Modified: 2016-03-04 07:23 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-06-20 13:11:04 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1204 normal SHIPPED_LIVE Moderate: apr and apr-util security update 2009-08-10 13:22:41 EDT
Red Hat Product Errata RHSA-2009:1205 normal SHIPPED_LIVE Moderate: httpd security and bug fix update 2009-08-10 13:40:21 EDT
Red Hat Product Errata RHSA-2009:1462 normal SHIPPED_LIVE Moderate: httpd22 security update 2009-09-24 11:17:04 EDT
Red Hat Product Errata RHSA-2010:0602 normal SHIPPED_LIVE Moderate: Red Hat Certificate System 7.3 security update 2010-08-05 10:04:51 EDT

  None (edit)
Description Jan Lieskovsky 2009-08-05 08:30:54 EDT
Multiple integer overflow flaws, leading to heap-based overflows were found
in the way Apache Portable Runtime (APR) library used to manage memory
pool and relocatable memory allocations. An attacker could issue 
a specially-crafted request for memory allocation, leading to denial
of service (crash) or, potentially, execute arbitrary code with the
privileges of an application using APR library.

Upstream patches:
-----------------
http://www.apache.org/dist/apr/patches/
Comment 6 Fedora Update System 2009-08-07 00:57:18 EDT
apr-util-1.3.9-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 7 Fedora Update System 2009-08-07 01:01:15 EDT
apr-1.3.8-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2009-08-07 01:05:08 EDT
apr-util-1.3.9-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2009-08-07 01:08:18 EDT
apr-1.3.8-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 errata-xmlrpc 2009-08-10 13:22:46 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2009:1204 https://rhn.redhat.com/errata/RHSA-2009-1204.html
Comment 11 errata-xmlrpc 2009-08-10 13:40:24 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2009:1205 https://rhn.redhat.com/errata/RHSA-2009-1205.html
Comment 12 errata-xmlrpc 2009-09-24 11:17:08 EDT
This issue has been addressed in following products:

  JBEWS 1.0.0 for RHEL 4

Via RHSA-2009:1462 https://rhn.redhat.com/errata/RHSA-2009-1462.html
Comment 13 Jan Lieskovsky 2009-09-25 12:09:33 EDT
Issue was fixed in upstream Apache httpd 2.2.13 version:

  http://httpd.apache.org/security/vulnerabilities_22.html
Comment 15 errata-xmlrpc 2010-08-04 17:31:03 EDT
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Note You need to log in before you can comment on or make changes to this bug.