First published: Tue Jul 19 2022(Updated: )
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gsasl | 1.8.0-8+deb10u1 1.10.0-4+deb11u1 2.2.0-1 2.2.0-2 | |
GNU SASL | <2.0.1 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2469 is a vulnerability in GNU SASL libgsasl that allows for server-side read-out-of-bounds with a malicious authenticated GSS-API client.
The severity of CVE-2022-2469 is high with a score of 8.1.
CVE-2022-2469 affects GNU SASL libgsasl versions 1.8.0-8+deb10u1, 1.10.0-4+deb11u1, 2.2.0-1, and 2.2.0-2.
To fix CVE-2022-2469, update to a version of GNU SASL libgsasl that includes the necessary patches, as recommended by the package maintainers or the official sources.
The Common Weakness Enumeration (CWE) ID for CVE-2022-2469 is CWE-125.