CWE
119 120
Advisory Published
Updated

CVE-2022-23219: Buffer Overflow

First published: Fri Jan 14 2022(Updated: )

Last updated 24 July 2024

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
GNU glibc<=2.34
Oracle Communications Cloud Native Core Binding Support Function=22.1.3
Oracle Communications Cloud Native Core Network Function Cloud Native Environment=22.1.0
Oracle Communications Cloud Native Core Network Repository Function=22.1.2
Oracle Communications Cloud Native Core Network Repository Function=22.2.0
Oracle Communications Cloud Native Core Security Edge Protection Proxy=22.1.1
Oracle Communications Cloud Native Core Unified Data Repository=22.2.0
Oracle Enterprise Operations Monitor=4.3
Oracle Enterprise Operations Monitor=4.4
Oracle Enterprise Operations Monitor=5.0
Debian Debian Linux=10.0
debian/glibc
2.31-13+deb11u11
2.31-13+deb11u10
2.36-9+deb12u8
2.36-9+deb12u7
2.40-3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-23219?

    CVE-2022-23219 is a vulnerability in the GNU C Library (glibc) that allows for a buffer overflow, potentially leading to a denial of service or arbitrary code execution.

  • What software versions are affected by CVE-2022-23219?

    GNU glibc versions up to and including 2.34, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Network Function Cloud Native Environment 22.1.0, Oracle Communications Cloud Native Core Network Repository Function 22.1.2 and 22.2.0, VMware Spring Cloud Gateway 22.1.1, Oracle Communications Cloud Native Core Unified Data Repository 22.2.0, Oracle Enterprise Operations Monitor 4.3, 4.4, and 5.0, and Debian Debian Linux 10.0 are affected by CVE-2022-23219.

  • How severe is CVE-2022-23219?

    CVE-2022-23219 has a severity rating of 9.8 (out of 10), indicating a critical vulnerability.

  • How can I fix CVE-2022-23219?

    To fix CVE-2022-23219, users should update to a patched version of the GNU C Library (glibc) or apply any available security patches provided by the software vendor.

  • Are there any references for CVE-2022-23219?

    Yes, you can find more information about CVE-2022-23219 at the following references: [1] https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html [2] https://security.gentoo.org/glsa/202208-24 [3] https://sourceware.org/bugzilla/show_bug.cgi?id=22542

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203