First published: Tue Aug 22 2023(Updated: )
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <2.34 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8c5e259235a4e4546910245b170de1e29a711034
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2c5b6e1a1c406cbe06e2d6f77861764ebd01b9ce
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-35342.
The severity of CVE-2020-35342 is high with a severity value of 7.5.
CVE-2020-35342 affects GNU Binutils before version 2.34.
Attackers can exploit CVE-2020-35342 to make an information leak.
Yes, here are some references for CVE-2020-35342: - [Bugzilla](https://sourceware.org/bugzilla/show_bug.cgi?id=25319) - [CVE Details](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342) - [GitWeb](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8c5e259235a4e4546910245b170de1e29a711034)