CVE-2023-49582
MediumVulnerability Description
Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data.
This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h)
Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Known Affected Software
81 configuration(s) from 1 vendor(s)
cpe:2.3:a:apache:portable_runtime:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.16-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.7-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.3-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.7.2:-:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.7.3:-:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.7.1:-:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.4-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.6-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.7.4:-:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:0.9.2-dev:*:*:*:*:*:*:*
cpe:2.3:a:apache:portable_runtime:1.1.0:*:*:*:*:*:*:*
2024-Nov-CVE-2023-49582
CVE-2023-49582: None
CPUJUL2025
Oracle Critical Patch Update Advisory - July 2025
CPUAPR2025
Oracle Critical Patch Update Advisory - April 2025
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
Severity Details
Weakness Type (CWE)
Incorrect Permission Assignment for Critical Resource
- Description
- The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- August 26, 2024
