<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0005</id>
    <title>An update for apr is now available for HCE 3.0</title>
    <severity>Moderate</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:11"/>
    <updated date="2025-10-09 06:38:11"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-49582" id="CVE-2023-49582" title="CVE-2023-49582 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. 

This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h)

Users are recommended to upgrade to APR version 1.7.5, which fixes this issue. (CVE-2023-49582)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="apr">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="apr" version="1.7.4" release="4.r1.hce3">
          <filename>apr-1.7.4-4.r1.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="apr-devel" version="1.7.4" release="4.r1.hce3">
          <filename>apr-devel-1.7.4-4.r1.hce3.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="apr-help" version="1.7.4" release="4.r1.hce3">
          <filename>apr-help-1.7.4-4.r1.hce3.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="apr" version="1.7.4" release="4.r1.hce3">
          <filename>apr-1.7.4-4.r1.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="apr-devel" version="1.7.4" release="4.r1.hce3">
          <filename>apr-devel-1.7.4-4.r1.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
