[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1iGVSs-0000Yr-Ny@seger.debian.org>
Date: Fri, 04 Oct 2019 21:50:18 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4541-1] libapreq2 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4541-1 security@...ian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 04, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libapreq2
CVE ID : CVE-2019-12412
Debian Bug : 939937
Max Kellermann reported a NULL pointer dereference flaw in libapreq2, a
generic Apache request library, allowing a remote attacker to cause a
denial of service against an application using the library (application
crash) if an invalid nested "multipart" body is processed.
For the oldstable distribution (stretch), this problem has been fixed
in version 2.13-7~deb9u1.
For the stable distribution (buster), this problem has been fixed in
version 2.13-7~deb10u1.
We recommend that you upgrade your libapreq2 packages.
For the detailed security status of libapreq2 please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libapreq2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----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=HkcC
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists