First published: Thu Sep 26 2024(Updated: )
Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapr1-dev | <1.7.2-3.1ubuntu0.1 | 1.7.2-3.1ubuntu0.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/libapr1t64 | <1.7.2-3.1ubuntu0.1 | 1.7.2-3.1ubuntu0.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/libapr1 | <1.7.0-8ubuntu0.22.04.2 | 1.7.0-8ubuntu0.22.04.2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libapr1-dev | <1.7.0-8ubuntu0.22.04.2 | 1.7.0-8ubuntu0.22.04.2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libapr1 | <1.6.5-1ubuntu1.1 | 1.6.5-1ubuntu1.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libapr1-dev | <1.6.5-1ubuntu1.1 | 1.6.5-1ubuntu1.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libapr1 | <1.6.3-2ubuntu0.1~esm1 | 1.6.3-2ubuntu0.1~esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libapr1-dev | <1.6.3-2ubuntu0.1~esm1 | 1.6.3-2ubuntu0.1~esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libapr1 | <1.5.2-3ubuntu0.1~esm2 | 1.5.2-3ubuntu0.1~esm2 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libapr1-dev | <1.5.2-3ubuntu0.1~esm2 | 1.5.2-3ubuntu0.1~esm2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.