diff options
author | covener <covener@13f79535-47bb-0310-9956-ffa450edef68> | 2023-01-31 15:25:02 +0000 |
---|---|---|
committer | covener <covener@13f79535-47bb-0310-9956-ffa450edef68> | 2023-01-31 15:25:02 +0000 |
commit | aa7417014fa22a23590cde109779be98cd75af9b (patch) | |
tree | c0749ebfc2ce51fe278ab7a876197ab14589230f | |
parent | ad40e1356385bea0bf4dc836416c9bca6b9b8dcb (diff) | |
download | libapr-aa7417014fa22a23590cde109779be98cd75af9b.tar.gz |
changes for released CVES
git-svn-id: https://svn.apache.org/repos/asf/apr/apr/branches/1.7.x@1907155 13f79535-47bb-0310-9956-ffa450edef68
-rw-r--r-- | CHANGES | 10 |
1 files changed, 10 insertions, 0 deletions
@@ -1,6 +1,16 @@ -*- coding: utf-8 -*- Changes for APR 1.7.1 + *) SECURITY: CVE-2022-24963 (cve.mitre.org) + Integer Overflow or Wraparound vulnerability in apr_encode functions of + Apache Portable Runtime (APR) allows an attacker to write beyond bounds + of a buffer. + + *) SECURITY: CVE-2022-28331 (cve.mitre.org) + On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond + the end of a stack based buffer in apr_socket_sendv(). This is a result + of integer overflow. + *) SECURITY: CVE-2021-35940 (cve.mitre.org) Restore fix for out-of-bounds array dereference in apr_time_exp*() functions. (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and |