CVE-2021-35940

EUVD-2021-22575
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
Affected Products (NVD)
VendorProductVersion
apacheportable_runtime
1.7.0
oraclehttp_server
12.2.1.3.0
oraclehttp_server
12.2.1.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apr
bookworm
1.7.2-3
fixed
bullseye
1.7.0-6+deb11u2
fixed
bullseye (security)
1.7.0-6+deb11u2
fixed
buster
not-affected
sid
1.7.5-1
fixed
stretch
not-affected
trixie
1.7.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apr
bionic
not-affected
focal
not-affected
hirsute
Fixed 1.7.0-6ubuntu0.1
released
impish
Fixed 1.7.0-6ubuntu1
released
jammy
Fixed 1.7.0-6ubuntu1
released
trusty
Fixed 1.5.0-1ubuntu0.1~esm1
released
xenial
Fixed 1.5.2-3ubuntu0.1~esm1
released
References