Description
Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime (APR) version 1.7.0.
This issue affects Apache Portable Runtime (APR) version 1.7.0.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5370-1 | apr security update |
EUVD |
EUVD-2022-29715 | Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. |
Ubuntu USN |
USN-5885-1 | APR vulnerability |
References
History
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions | Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:33:39.826Z
Reserved: 2022-02-11T12:49:56.769Z
Link: CVE-2022-24963
Updated: 2024-08-03T04:29:01.595Z
Status : Modified
Published: 2023-01-31T16:15:08.830
Modified: 2025-03-27T15:15:36.323
Link: CVE-2022-24963
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN