CVE-2009-2412

NameCVE-2009-2412
DescriptionMultiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1854-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apr (PTS)bullseye (security), bullseye1.7.0-6+deb11u2fixed
bookworm1.7.2-3+deb12u1fixed
sid, trixie1.7.5-1fixed
apr-util (PTS)bullseye (security), bullseye1.6.1-5+deb11u1fixed
bookworm1.6.3-1fixed
sid, trixie1.6.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aprsourceetch1.2.7-9DSA-1854-1
aprsourcelenny1.2.12-5+lenny1DSA-1854-1
aprsource(unstable)1.3.8-1
apr-utilsourceetch1.2.7+dfsg-2+etch3DSA-1854-1
apr-utilsourcelenny1.2.12+dfsg-8+lenny4DSA-1854-1
apr-utilsource(unstable)1.3.9+dfsg-1

Search for package or bug name: Reporting problems