First published: Tue Aug 22 2023(Updated: )
GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <2.40 | |
debian/binutils | <=2.35.2-2 | 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48063 is a vulnerability in GNU Binutils before version 2.40 that allows for excessive memory consumption and can be exploited through a crafted ELF file, leading to a DNS attack.
CVE-2022-48063 has a severity level of 5.5, which is considered medium.
The affected software for CVE-2022-48063 is GNU Binutils before version 2.40.
To fix CVE-2022-48063, you should update GNU Binutils to version 2.40 or later.
You can find more information about CVE-2022-48063 at the following references: [Link 1](https://sourceware.org/bugzilla/show_bug.cgi?id=29924), [Link 2](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd), [Link 3](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063).