Show plain JSON{"affected_release": [{"advisory": "RHSA-2023:3355", "cpe": "cpe:/a:redhat:jboss_core_services:1", "package": "apr-util", "product_name": "JBCS httpd 2.4.51.sp2", "release_date": "2023-06-05T00:00:00Z"}, {"advisory": "RHSA-2023:3354", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-apr-util-0:1.6.1-101.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2023-06-05T00:00:00Z"}, {"advisory": "RHSA-2023:3354", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-apr-util-0:1.6.1-101.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2023-06-05T00:00:00Z"}, {"advisory": "RHSA-2023:3145", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "apr-util-0:1.5.2-6.el7_9.1", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-05-16T00:00:00Z"}, {"advisory": "RHSA-2023:3109", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "apr-util-0:1.6.1-6.el8_8.1", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-05-16T00:00:00Z"}, {"advisory": "RHSA-2023:3177", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "apr-util-0:1.6.1-6.el8_1.1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3380", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "apr-util-0:1.6.1-6.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-05-31T00:00:00Z"}, {"advisory": "RHSA-2023:3380", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "apr-util-0:1.6.1-6.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-05-31T00:00:00Z"}, {"advisory": "RHSA-2023:3380", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "apr-util-0:1.6.1-6.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-05-31T00:00:00Z"}, {"advisory": "RHSA-2023:3360", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "apr-util-0:1.6.1-6.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-05-31T00:00:00Z"}, {"advisory": "RHSA-2023:3178", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "apr-util-0:1.6.1-6.el8_6.1", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3147", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "apr-util-0:1.6.1-20.el9_2.1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-05-16T00:00:00Z"}, {"advisory": "RHSA-2023:3146", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "apr-util-0:1.6.1-20.el9_0.1", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-05-16T00:00:00Z"}], "bugzilla": {"description": "apr-util: out-of-bounds writes in the apr_base64", "id": "2169652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169652"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "status": "verified"}, "cwe": "CWE-190", "details": ["Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.\nThis issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.", "A flaw was found in the Apache Portable Runtime Utility (APR-util) library. This issue may allow a malicious attacker to cause an out-of-bounds write due to an integer overflow when encoding/decoding a very long string using the base64 family of functions."], "name": "CVE-2022-25147", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "apr-util", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-01-31T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2022-25147\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-25147"], "statement": "The Apache Portable Runtime Utility (APR-util) library contains additional utility interfaces for APR (Apache Portable Runtime). \nThis vulnerability is related to the incorrect usage of the base64 encoding/decoding family of functions through APR-util API.\nUsage of these functions with long enough string would cause integer overflow and will lead to out-of-bound write.\nThis flaw was rated with an important severity for a moment as Red Hat received information that this vulnerability potentially can allow remote attackers to cause a denial of service to the application linked to the APR-util library. Deep analysis confirmed that there are no known conditions that could lead to DoS. \nAdditionally the APR-util API should not be exposed to the untrusted uploads and usage.", "threat_severity": "Moderate"}