Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3332-1 | apr-util security update |
Debian DSA |
DSA-5364-1 | apr-util security update |
Ubuntu USN |
USN-5870-1 | apr-util vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. | Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:32:27.154Z
Reserved: 2022-02-14T07:58:18.424Z
Link: CVE-2022-25147
No data.
Status : Modified
Published: 2023-01-31T16:15:08.907
Modified: 2025-02-13T17:15:39.127
Link: CVE-2022-25147
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN