CVE-2022-23218

CRITICAL

GNU Glibc < 2.31 - Buffer Overflow

Title source: rule
STIX 2.1

Description

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

References (4)

Core 4
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202208-24
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
Exploit, Issue Tracking, Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=28768

Scores

CVSS v3 9.8
EPSS 0.0038
EPSS Percentile 59.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-120
Status published
Products (6)
debian/debian_linux 10.0
gnu/glibc < 2.31
oracle/communications_cloud_native_core_unified_data_repository 22.2.0
oracle/enterprise_operations_monitor 4.3
oracle/enterprise_operations_monitor 4.4
oracle/enterprise_operations_monitor 5.0
Published Jan 14, 2022
Tracked Since Feb 18, 2026