First published: Tue Aug 22 2023(Updated: )
An issue was discovered function parse_stab_struct_fields in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | >=2.34<=2.38 | |
debian/binutils | <=2.35.2-2 | 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8a24927bc8dbf6beac2000593b21235c3796dc35
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-47011.
CVE-2022-47011 has a severity rating of 5.5 (medium).
The affected software is GNU Binutils version 2.34 through 2.38.
CVE-2022-47011 is a vulnerability in the function parse_stab_struct_fields in stabs.c in Binutils, which allows attackers to cause a denial of service due to memory leaks.
Yes, you can find more information about CVE-2022-47011 at the following link: [Link](https://sourceware.org/bugzilla/show_bug.cgi?id=29261)