First published: Tue Aug 22 2023(Updated: )
An issue was discovered function parse_stab_struct_fields in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | >=2.34<=2.38 | |
ubuntu/binutils | <2.39 | 2.39 |
ubuntu/binutils | <2.30-21ubuntu1~18.04.9+ | 2.30-21ubuntu1~18.04.9+ |
ubuntu/binutils | <2.24-5ubuntu14.2+ | 2.24-5ubuntu14.2+ |
ubuntu/binutils | <2.26.1-1ubuntu1~16.04.8+ | 2.26.1-1ubuntu1~16.04.8+ |
ubuntu/binutils | <2.34-6ubuntu1.8 | 2.34-6ubuntu1.8 |
ubuntu/binutils | <2.38-4ubuntu2.5 | 2.38-4ubuntu2.5 |
debian/binutils | 2.40-2 2.42-4 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8a24927bc8dbf6beac2000593b21235c3796dc35
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-47011.
CVE-2022-47011 has a severity rating of 5.5 (medium).
The affected software is GNU Binutils version 2.34 through 2.38.
CVE-2022-47011 is a vulnerability in the function parse_stab_struct_fields in stabs.c in Binutils, which allows attackers to cause a denial of service due to memory leaks.
Yes, you can find more information about CVE-2022-47011 at the following link: [Link](https://sourceware.org/bugzilla/show_bug.cgi?id=29261)