This issue affects Apache Portable Runtime (APR) version 1.7.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5370-1 | apr security update |
EUVD |
EUVD-2022-29715 | Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. |
Ubuntu USN |
USN-5885-1 | APR vulnerability |
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions | Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:33:39.826Z
Reserved: 2022-02-11T12:49:56.769Z
Link: CVE-2022-24963
Updated: 2024-08-03T04:29:01.595Z
Status : Modified
Published: 2023-01-31T16:15:08.830
Modified: 2025-03-27T15:15:36.323
Link: CVE-2022-24963
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN