Investigate vulnerability: CVE-2022-23218 in libc6-2.28-10
Issue created from vulnerability 77310244
Description:
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
- Severity: critical
- Confidence: unknown
Solution:
Upgrade libc6 to 2.28-10+deb10u2
Identifiers:
Links:
- https://access.redhat.com/security/cve/CVE-2022-23218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-23218
- https://security.gentoo.org/glsa/202208-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=28768
- https://ubuntu.com/security/notices/USN-5310-1
- https://ubuntu.com/security/notices/USN-5310-2
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://linux.oracle.com/errata/ELSA-2022-0896.html
Scanner:
- Name: Trivy