Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <d1b6acf9-0f59-1954-ccad-2243ca03d138@apache.org>
Date: Thu, 25 Aug 2022 14:09:16 +0000
From: Joe Orton <jorton@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory
 corruption 

Severity: important

Description:

A flaw in libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads.  A remote attacker could send a request causing a process crash which could lead to a denial of service attack.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.