RHSA-2018:0316
Vulnerability from csaf_redhat - Published: 2018-02-13 17:19 - Updated: 2025-11-21 18:03Summary
Red Hat Security Advisory: httpd24-apr security update
Severity
Important
Notes
Topic: An update for httpd24-apr is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.
Security Fix(es):
* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.
7.4 (High)
Vendor Fix
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Applications using the APR libraries, such as httpd, must be restarted for this update to take effect.
https://access.redhat.com/errata/RHSA-2018:0316
References
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd24-apr is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.\n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:0316",
"url": "https://access.redhat.com/errata/RHSA-2018:0316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1506523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0316.json"
}
],
"title": "Red Hat Security Advisory: httpd24-apr security update",
"tracking": {
"current_release_date": "2025-11-21T18:03:48+00:00",
"generator": {
"date": "2025-11-21T18:03:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:0316",
"initial_release_date": "2018-02-13T17:19:19+00:00",
"revision_history": [
{
"date": "2018-02-13T17:19:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-02-13T17:19:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:03:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.0-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"product": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"product_id": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"product": {
"name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"product_id": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-apr-devel@1.5.1-1.el6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"product": {
"name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"product_id": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-apr-debuginfo@1.5.1-1.el6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-apr-0:1.5.1-1.el6.1.src",
"product": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.src",
"product_id": "httpd24-apr-0:1.5.1-1.el6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src",
"relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src",
"relates_to_product_reference": "6Server-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src",
"relates_to_product_reference": "6Workstation-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
},
"product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-12613",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-10-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1506523"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr: Out-of-bounds array deref in apr_time_exp*() functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12613"
},
{
"category": "external",
"summary": "RHBZ#1506523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/apr/Announcement1.x.html",
"url": "http://www.apache.org/dist/apr/Announcement1.x.html"
}
],
"release_date": "2017-10-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-02-13T17:19:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect.",
"product_ids": [
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:0316"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src",
"6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64",
"6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "apr: Out-of-bounds array deref in apr_time_exp*() functions"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…