Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime (APR) version 1.7.0.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9 | Mailing List Vendor Advisory |
https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9 | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230908-0008/ | |
https://security.netapp.com/advisory/ntap-20230908-0008/ |
Configurations
History
27 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. | |
CWE | ||
References |
|
|
References | () https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9 - Mailing List, Vendor Advisory |
Information
Published : 2023-01-31 16:15
Updated : 2025-03-27 15:15
NVD link : CVE-2022-24963
Mitre link : CVE-2022-24963
JSON object : View
Products Affected
apache
- portable_runtime
CWE
No CWE.