Back to bug 2172556
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Patrick Del Bello | 2023-02-22 14:16:21 UTC | Doc Text | A flaw was found in Apache Portable Runtime. This affects versions <= 1.7.0. A malicious user may use it to write beyond the end of a stack buffer and cause integer overflow | A flaw was found in Apache Portable Runtime. This affects versions <= 1.7.0. A malicious user may use it to write beyond the end of a stack buffer and cause integer overflow. This affects Windows environments. |
| Blocks | 2166092 | |||
| Summary | CVE-2022-28331 apr-util: Windows out-of-bounds write in apr_socket_sendv function | CVE-2022-28331 apr-util: Windows out-of-bounds write in apr_socket_sendv function | ||
| Paige Jung | 2023-02-22 17:38:20 UTC | Doc Text | A flaw was found in Apache Portable Runtime. This affects versions <= 1.7.0. A malicious user may use it to write beyond the end of a stack buffer and cause integer overflow. This affects Windows environments. | A flaw was found in Apache Portable Runtime, affecting versions <= 1.7.0. This issue may allow a malicious user to write beyond the end of a stack buffer and cause an integer overflow. This affects Windows environments. |
| Red Hat Bugzilla | 2023-07-07 08:27:58 UTC | Assignee | security-response-team | nobody |
| Avinash Hanwate | 2023-08-10 11:53:14 UTC | Summary | CVE-2022-28331 apr-util: Windows out-of-bounds write in apr_socket_sendv function | CVE-2022-28331 apr: Windows out-of-bounds write in apr_socket_sendv function |
| errata-xmlrpc | 2023-08-15 17:37:15 UTC | Link ID | Red Hat Product Errata RHSA-2023:4628 | |
| Product Security DevOps Team | 2023-08-15 21:50:09 UTC | Resolution | --- | ERRATA |
| Status | NEW | CLOSED | ||
| Last Closed | 2023-08-15 21:50:09 UTC |
Back to bug 2172556