CVE-2021-35940

An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
VendorProductVersion
apacheportable_runtime
1.7.0
oraclehttp_server
12.2.1.3.0
oraclehttp_server
12.2.1.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apr
bullseye (security)
1.7.0-6+deb11u2
fixed
bullseye
1.7.0-6+deb11u2
fixed
buster
not-affected
stretch
not-affected
bookworm
1.7.2-3
fixed
sid
1.7.5-1
fixed
trixie
1.7.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apr
jammy
Fixed 1.7.0-6ubuntu1
released
impish
Fixed 1.7.0-6ubuntu1
released
hirsute
Fixed 1.7.0-6ubuntu0.1
released
focal
not-affected
bionic
not-affected
xenial
Fixed 1.5.2-3ubuntu0.1~esm1
released
trusty
Fixed 1.5.0-1ubuntu0.1~esm1
released
References