USN-813-1: apr vulnerability
Ubuntu Security Notice USN-813-1
7th August, 2009
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 9.04
- Ubuntu 8.10
- Ubuntu 8.04 LTS
Matt Lewis discovered that apr did not properly sanitize its input when
allocating memory. If an application using apr processed crafted input, a
remote attacker could cause a denial of service or potentially execute
arbitrary code as the user invoking the application.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 9.04:
- libapr1 1.2.12-5ubuntu0.1
- Ubuntu 8.10:
- libapr1 1.2.12-4ubuntu0.1
- Ubuntu 8.04 LTS:
- libapr1 1.2.11-1ubuntu0.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system upgrade you need to restart any applications using
apr, such as Subversion and Apache, to effect the necessary changes.