|
Message-ID: <798669d5-4ba0-a023-3002-d351f72ced5f@apache.org> Date: Mon, 23 Aug 2021 09:35:34 +0000 From: Joe Orton <jorton@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613 Description: An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue. Credit: The Apache Portable Runtime project would like to thank Iveta Cesalova (Red Hat) for reporting this issue. References: http://svn.apache.org/viewvc?view=revision&revision=1891198 http://mail-archives.apache.org/mod_mbox/www-announce/201710.mbox/%3CCACsi251B8UaLvM-rrH9fv57-zWi0zhyF3275_jPg1a9VEVVoxw@mail.gmail.com%3E https://dist.apache.org/repos/dist/release/apr/patches/apr-1.7.0-CVE-2021-35940.patch
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.