Debian Patches

Status for libapreq2/2.13-7+deb11u1

Patch Description Author Forwarded Bugs Origin Last update
11-CVE-2022-22728_2of4.patch CVE-2022-22728 -- multipart form parse memory corruption A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.
This is #2 of 4 patches, see alos https://www.openwall.com/lists/oss-security/2023/01/02/2
no debian https://svn.apache.org/viewvc?view=revision&revision=1894940 2023-01-13
01-fake-installed-apache.patch Fake that Apache is installed. Instead of checking version number with apache2 -v, we hard-code a working
version. This enables the package to be built without installing a running
Apache on the building host.
Steinar H. Gunderson <sesse@debian.org> not-needed vendor 2010-02-28
02-hardcode-usr-prefix.patch Hard-code apreq2-config --prefix apreq2-config will leak information about the build environment.
Hard-code what --prefix returns, so it's at least slightly more sane.
Steinar H. Gunderson <sesse@debian.org> not-needed debian vendor 2010-02-28
03-link-in-apr-shared-objects.patch Don't try to regenerate Makefiles at installation time, as this will forget
to link against the internal copy of libapreq2-dev, which will cause problems
when trying to load the module outside Apache.

===================================================================
no
04-pass-libdir-to-configure.patch =================================================================== no
05-nested-multipart-null-dereference.patch commit f27d15e47000b0442e8071ab0fd76b82df9f2d2f

parser_multipart: fix NULL pointer dereference in nested multipart

create_multipart_context() can return NULL if the given Content-Type
was not recognized (if there is no "boundary" attribute). This
crashes libapreq2.

This bug was introduced by SVN commit 227276. Prior to this commit,
there was a NULL check, but the commit removed it:

http://svn.apache.org/viewvc/httpd/apreq/trunk/library/parser_multipart.c?r1=227276&r2=227275&pathrev=227276

diff --git a/library/parser_multipart.c b/library/parser_multipart.c
index 60b5bad..4242b7e 100644
Max Kellermann <max.kellermann@gmail.com> no 2019-09-10
10-CVE-2022-22728_1of4.patch CVE-2022-22728 -- multipart form parse memory corruption A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.
This is #1 of 4 patches, see also https://www.openwall.com/lists/oss-security/2023/01/02/2
no debian https://svn.apache.org/viewvc?view=revision&revision=1894937 2023-01-13
12-CVE-2022-22728_3of4.patch CVE-2022-22728 -- multipart form parse memory corruption A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.
This is #3 of 4 patches, see alos https://www.openwall.com/lists/oss-security/2023/01/02/2
no debian https://svn.apache.org/viewvc?view=revision&revision=1894977 2023-01-13
13-CVE-2022-22728_4of4.patch CVE-2022-22728 -- multipart form parse memory corruption A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.
This is #4 of 4 patches, see alos https://www.openwall.com/lists/oss-security/2023/01/02/2
no debian https://svn.apache.org/viewvc?view=revision&revision=1895054 2023-01-13

All known versions for source package 'libapreq2'

Links