CVE-2023-49582

NameCVE-2023-49582
DescriptionLax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h) Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1080375

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apr (PTS)jessie, jessie (lts)1.5.1-3+deb8u1vulnerable
stretch (security), stretch (lts), stretch1.5.2-5+deb9u1vulnerable
buster1.6.5-1vulnerable
bullseye (security), bullseye1.7.0-6+deb11u2vulnerable
bookworm1.7.2-3vulnerable
sid, trixie1.7.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aprsource(unstable)1.7.5-11080375

Notes

[bookworm] - apr <no-dsa> (Minor issue)
[bullseye] - apr <postponed> (Minor issue; can be fixed in next update)
https://www.openwall.com/lists/oss-security/2024/08/26/1
https://lists.apache.org/thread/h5f1c2dqm8bf5yfosw3rg85927p612l0
[buster] - apr <postponed> (Minor issue; can be fixed in next update)
[stretch] - apr <postponed> (Minor issue; can be fixed in next update)
[jessie] - apr <postponed> (Minor issue; can be fixed in next update)

Search for package or bug name: Reporting problems