First published: Fri Jan 14 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.34 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =22.1.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.1.2 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.2.0 | |
Oracle Communications Cloud Native Core Security Edge Protection Proxy | =22.1.1 | |
Oracle Communications Cloud Native Core Unified Data Repository | =22.2.0 | |
Oracle Enterprise Operations Monitor | =4.3 | |
Oracle Enterprise Operations Monitor | =4.4 | |
Oracle Enterprise Operations Monitor | =5.0 | |
Debian Debian Linux | =10.0 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23219 is a vulnerability in the GNU C Library (glibc) that allows for a buffer overflow, potentially leading to a denial of service or arbitrary code execution.
GNU glibc versions up to and including 2.34, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Network Function Cloud Native Environment 22.1.0, Oracle Communications Cloud Native Core Network Repository Function 22.1.2 and 22.2.0, VMware Spring Cloud Gateway 22.1.1, Oracle Communications Cloud Native Core Unified Data Repository 22.2.0, Oracle Enterprise Operations Monitor 4.3, 4.4, and 5.0, and Debian Debian Linux 10.0 are affected by CVE-2022-23219.
CVE-2022-23219 has a severity rating of 9.8 (out of 10), indicating a critical vulnerability.
To fix CVE-2022-23219, users should update to a patched version of the GNU C Library (glibc) or apply any available security patches provided by the software vendor.
Yes, you can find more information about CVE-2022-23219 at the following references: [1] https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html [2] https://security.gentoo.org/glsa/202208-24 [3] https://sourceware.org/bugzilla/show_bug.cgi?id=22542