First published: Tue Aug 22 2023(Updated: )
An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function bfd_mach_o_get_synthetic_symtab in match-o.c.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <2.39.3 | |
ubuntu/binutils | <2.34-6ubuntu1.9 | 2.34-6ubuntu1.9 |
ubuntu/binutils | <2.38-4ubuntu2.6 | 2.38-4ubuntu2.6 |
ubuntu/binutils | <2.40-2 | 2.40-2 |
ubuntu/binutils | <2.30-21ubuntu1~18.04.9+ | 2.30-21ubuntu1~18.04.9+ |
ubuntu/binutils | <2.24-5ubuntu14.2+ | 2.24-5ubuntu14.2+ |
ubuntu/binutils | <2.26.1-1ubuntu1~16.04.8+ | 2.26.1-1ubuntu1~16.04.8+ |
debian/binutils | 2.40-2 2.42-4 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3d3af4ba39e892b1c544d667ca241846bc3df386
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47695 is a vulnerability in Binutils objdump before version 2.39.3 that allows attackers to cause a denial of service or other unspecified impacts.
CVE-2022-47695 affects GNU Binutils before version 2.39.3.
CVE-2022-47695 affects Ubuntu Binutils versions 2.30-21ubuntu1~18.04.9+ and 2.24-5ubuntu14.2+.
CVE-2022-47695 affects Debian Binutils versions 2.31.1-16 to 2.35.2-2.
The severity of CVE-2022-47695 is high, with a CVSS score of 7.8.
To fix the CVE-2022-47695 vulnerability, update Binutils objdump to version 2.39.3 or later.