- Issued:
- 2018-02-13
- Updated:
- 2018-02-13
RHSA-2018:0316 - Security Advisory
Synopsis
Important: httpd24-apr security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for httpd24-apr is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.
Security Fix(es):
- An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Applications using the APR libraries, such as httpd, must be restarted for this update to take effect.
Affected Products
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 6 x86_64
- Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6 x86_64
Fixes
- BZ - 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions
CVEs
Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7
SRPM | |
---|---|
httpd24-apr-1.5.1-1.el6.1.src.rpm | SHA-256: d08ee68527711fd425bc6cba5130e16ebc6ac9f398e8ffbe3ff3ad46eab50757 |
x86_64 | |
httpd24-apr-1.5.1-1.el6.1.x86_64.rpm | SHA-256: 2f804ba03db84d81305407756a71bde349c2badb66070dcc4a9415da680719df |
httpd24-apr-debuginfo-1.5.1-1.el6.1.x86_64.rpm | SHA-256: f1208c37e7b2b30d92e0a704bd6e98b659f51008d0dfc015fca8cc910f416565 |
httpd24-apr-devel-1.5.1-1.el6.1.x86_64.rpm | SHA-256: a8d0fb3610eebebfa842f3a740d475612cc7eb5b460fe71088e63e4f7429ad09 |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 6
SRPM | |
---|---|
httpd24-apr-1.5.1-1.el6.1.src.rpm | SHA-256: d08ee68527711fd425bc6cba5130e16ebc6ac9f398e8ffbe3ff3ad46eab50757 |
x86_64 | |
httpd24-apr-1.5.1-1.el6.1.x86_64.rpm | SHA-256: 2f804ba03db84d81305407756a71bde349c2badb66070dcc4a9415da680719df |
httpd24-apr-debuginfo-1.5.1-1.el6.1.x86_64.rpm | SHA-256: f1208c37e7b2b30d92e0a704bd6e98b659f51008d0dfc015fca8cc910f416565 |
httpd24-apr-devel-1.5.1-1.el6.1.x86_64.rpm | SHA-256: a8d0fb3610eebebfa842f3a740d475612cc7eb5b460fe71088e63e4f7429ad09 |
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6
SRPM | |
---|---|
httpd24-apr-1.5.1-1.el6.1.src.rpm | SHA-256: d08ee68527711fd425bc6cba5130e16ebc6ac9f398e8ffbe3ff3ad46eab50757 |
x86_64 | |
httpd24-apr-1.5.1-1.el6.1.x86_64.rpm | SHA-256: 2f804ba03db84d81305407756a71bde349c2badb66070dcc4a9415da680719df |
httpd24-apr-debuginfo-1.5.1-1.el6.1.x86_64.rpm | SHA-256: f1208c37e7b2b30d92e0a704bd6e98b659f51008d0dfc015fca8cc910f416565 |
httpd24-apr-devel-1.5.1-1.el6.1.x86_64.rpm | SHA-256: a8d0fb3610eebebfa842f3a740d475612cc7eb5b460fe71088e63e4f7429ad09 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.