First published: Thu Aug 25 2022(Updated: )
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <=2.39 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/binutils | <=2.35.2-2 | 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified by CVE-2022-38533 is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
The GNU Binutils before version 2.40 and Fedora versions 36 and 37 are affected by CVE-2022-38533.
CVE-2022-38533 has a severity score of 5.5 (medium).
To fix the vulnerability CVE-2022-38533, update your GNU Binutils installation to version 2.40 or higher and update Fedora to a version higher than 37.
You can find more information about CVE-2022-38533 in the provided references: [GitHub commit](https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d) and [Fedora mailing list](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/).