Path: ...!fu-berlin.de!bofh.it!news.nic.it!robomod From: Salvatore Bonaccorso Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5370-1] apr security update Date: Tue, 07 Mar 2023 22:00:01 +0100 Message-ID: X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Tue Mar 7 20:52:01 2023 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.491 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=mkKgVir9RgJJ4oWomJm34uinF2jgovHf/otmJA+ur0Q=; b=E4 DGk9hZ8miUhmBwi7OMqe5RnnT6Vw1lCtOJh/tm/4c/Fw77qysXYA5IMN66890paWsgJdgKwIjxt9p wVv+Hs3Kv7IZ4+qoKsLcucVcl/71fc2DUbL4gFSkDcqJBHkFM10YYggZmL743tCEi6poDpfUWrJip 0/CrgpNngzqc26FbqzRlEtMynVbhm/L7C43BbMwJ9UyodCiLA2zVWQxdk/ByT4QBpn7EwkORvlESA eIZ9uvmf9PL3QsC2s741GnnODYPDHQxYcCI7KaxALtVyAGs0wCOPh52B48VHEUuhMH+r7Jt5aZ1bN DAWnM+vlB02Ck6o5Lb9QQKgFxMR9FPkw==; X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4270 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/E1pZeHV-00GKXC-Lf@seger.debian.org Approved: robomod@news.nic.it Lines: 48 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Tue, 07 Mar 2023 20:51:33 +0000 X-Original-Message-ID: Bytes: 4394 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5370-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 07, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : apr CVE ID : CVE-2022-24963 Ronald Crane discovered that missing input saniting in the apr_encode functions of apr, the Apache Portable Runtime library, may result in denial of service or potentially the execution of arbitrary code. For the stable distribution (bullseye), this problem has been fixed in version 1.7.0-6+deb11u2. We recommend that you upgrade your apr packages. For the detailed security status of apr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apr Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmQHo6lfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RadA/9FBVTrnAYXoqBJKLvvbNvPgKJnH+Ll5pVZa6rDEmum5Hph7TEszT+yB4f k37TxZicRIQKTs1t5UPPATVGn1JXqOfNTvxqz5MDWzAe48gCF6V/xwEYqAScA6BO k9cd+5C5GFF1t/TEUz6v9I2plZ4WMjSPEW0Tl1zervirvBBSjql7RDGP/uGM+2gP zayc4ufLJEOhaprQptp6wPyMaAgd2vTNoqzVW3StZd/7aBRMSHyN9qMy+WFAUwWN BgF9Uk8LInVMNDT0JGjHFqlHXi4zHGgBCUHz3l4SWvUwBhrjX4JRcN2egZ07A/1n rN7pVgCtRPkY9vdwKTnM9yMOV5cJ0fQvYlX73Zwogay4WYWFu3lNFAW1KsnlFcGE hGIKpJCOjV+BBvcJrR9CWPChKpGTbW0naKfAXUcFBcyGsovkFfzH45idrmkNFw+o ZVRLt95LhNj0/AinYuaTpT7guPnOIvblZ/g608ULAtTS/BIiN4lTiQ9gjSTWeILo YFui8ZpFcFIQMgRb8aIeyjQJOp/I/4t5dRBcKdNh7xlxgGNJTPPwY+Acpc3hippe pcPdtKBq5MBPWvz5fI45DtE3Nbn0GrgPFwW0u7z8xIJ05lyLdTRTozkZTlSzmfTe v58rxaUqnm+CuZEeEoCbdDZ2uOpRmP031VqXVoQKRer6xm8VkO0= =J/gX -----END PGP SIGNATURE-----