Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3332-1 | apr-util security update |
![]() |
DSA-5364-1 | apr-util security update |
![]() |
USN-5870-1 | apr-util vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. | Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. |

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:32:27.154Z
Reserved: 2022-02-14T07:58:18.424Z
Link: CVE-2022-25147

No data.

Status : Modified
Published: 2023-01-31T16:15:08.907
Modified: 2025-02-13T17:15:39.127
Link: CVE-2022-25147


No data.