Summary: | <dev-libs/apr-1.4.8-r1: Hash collision DoS (CVE-2012-0840) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | alexanderyt, apache-bugs, n0idx80, pva |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=781606 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 477296 | ||
Bug Blocks: | 396397 |
Description
Agostino Sarubbo
![]() Discussion on APR development mailing list seems to imply that the fix is incompatible and will never be backported to APR 1.*. (In reply to comment #0) > http://svn.apache.org/viewvc?view=revision&revision=1231605 > http://svn.apache.org/viewvc?view=revision&revision=1231858 http://svn.apache.org/viewvc?view=revision&revision=1232320 New commits: http://svn.apache.org/viewvc?view=revision&revision=1236642 http://svn.apache.org/viewvc?view=revision&revision=1236967 APR project says that there is no security vulnerability: http://www.mail-archive.com/dev%40apr.apache.org/msg24609.html *** Bug 403731 has been marked as a duplicate of this bug. *** Oh, what would security be without drama? ;)
From that last link:
> Contrary to Mr Seifreid's confusion, the recent code
> changes reflect a possibility of mitigating potential hash collisions,
> but certainly do not and can not eliminate such risks, and it is up to
> the developer to select appropriate storage and lookup mechansims for
> their specific problem domain.
@apache, am I correct believe these changes are in 1.4.6? And shall we stabilize this for good measure? Thanks much.
@apache, Arfrever pointed out to me that these changes in APR may cause downstream tests to fail. The example shared was: https://svn.apache.org/viewvc?view=revision&revision=1293602 Thanks, Arfrever. @maintainers: okay to stable apr-1.4.8-r1 on sh in order to drop 1.4.5? sh -> ~arch, no longer a concern. @maintainers: please drop affected, will remove in 30 days if no response. GLSA vote: no. Stabilization completed in 477296. GLSA vote: yes. I had an existing draft. This issue was resolved and addressed in GLSA 201405-24 at http://security.gentoo.org/glsa/glsa-201405-24.xml by GLSA coordinator Sean Amoss (ackle). |