MGASA-2023-0045

Source
https://advisories.mageia.org/MGASA-2023-0045.html
Import Source
https://advisories.mageia.org/MGASA-2023-0045.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0045
Related
Published
2023-02-14T22:43:23Z
Modified
2023-02-14T21:32:35Z
Summary
Updated apr-util packages fix security vulnerability
Details

Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. (CVE-2022-25147)

References
Credits

Affected packages

Mageia:8 / apr-util

Package

Name
apr-util
Purl
pkg:rpm/mageia/apr-util?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.3-1.mga8

Ecosystem specific

{
    "section": "core"
}