Debian LTS: DLA-3269-1: libapreq2 security update | LinuxSecurity.com
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3269-1                [email protected]
https://www.debian.org/lts/security/                         Tobias Frost
January 14, 2023                              https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : libapreq2
Version        : 2.13-7~deb10u2
CVE ID         : CVE-2022-22728
Debian Bug     : 1018191

A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.

For Debian 10 buster, this problem has been fixed in version
2.13-7~deb10u2.

We recommend that you upgrade your libapreq2 packages.

For the detailed security status of libapreq2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libapreq2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3269-1: libapreq2 security update

January 14, 2023
A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads

Summary

For Debian 10 buster, this problem has been fixed in version
2.13-7~deb10u2.

We recommend that you upgrade your libapreq2 packages.

For the detailed security status of libapreq2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libapreq2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Severity
Package : libapreq2
Version : 2.13-7~deb10u2
CVE ID : CVE-2022-22728
Debian Bug : 1018191

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.