Integer Underflow Affecting olcne-gluster-chart package, versions <0:1.6.1-8.el8
Threat Intelligence
EPSS
0.12% (46th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-OLCNEGLUSTERCHART-5603499
- published 27 May 2023
- disclosed 23 Sep 2022
Introduced: 23 Sep 2022
CVE-2022-27492 Open this link in a new tabHow to fix?
Upgrade Oracle:8 olcne-gluster-chart to version 0:1.6.1-8.el8 or higher.
This issue was patched in ELSA-2023-12354.
NVD Description
Note: Versions mentioned in the description apply only to the upstream olcne-gluster-chart package and not the olcne-gluster-chart package as distributed by Oracle.
See How to fix? for Oracle:8 relevant fixed versions and status.
An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file.
References
- https://linux.oracle.com/cve/CVE-2022-27492.html
- https://linux.oracle.com/errata/ELSA-2023-12354.html
- https://linux.oracle.com/errata/ELSA-2023-12355.html
- https://linux.oracle.com/errata/ELSA-2023-12356.html
- https://linux.oracle.com/errata/ELSA-2023-12357.html
- https://www.whatsapp.com/security/advisories/2022/
CVSS Scores
version 3.1