First published: Fri Jan 14 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.34 | |
Oracle Communications Cloud Native Core Unified Data Repository | =22.2.0 | |
Oracle Enterprise Operations Monitor | =4.3 | |
Oracle Enterprise Operations Monitor | =4.4 | |
Oracle Enterprise Operations Monitor | =5.0 | |
Debian Debian Linux | =10.0 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23218 is a vulnerability in the GNU C Library (glibc) that allows for a buffer overflow, potentially leading to a denial of service or arbitrary code execution.
CVE-2022-23218 has a severity rating of 9.8, which is considered critical.
GNU glibc up to version 2.34, Oracle Communications Cloud Native Core Unified Data Repository version 22.2.0, Oracle Enterprise Operations Monitor versions 4.3, 4.4, and 5.0, and Debian Debian Linux version 10.0 are affected by CVE-2022-23218.
To fix CVE-2022-23218, it is recommended to update to the latest version of the affected software.
More information about CVE-2022-23218 can be found at the following references: [link1], [link2], [link3].