First published: Tue Aug 22 2023(Updated: )
GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <2.40 | |
ubuntu/binutils | <2.34-6ubuntu1.9 | 2.34-6ubuntu1.9 |
ubuntu/binutils | <2.38-4ubuntu2.6 | 2.38-4ubuntu2.6 |
ubuntu/binutils | <2.39 | 2.39 |
ubuntu/binutils | <2.30-21ubuntu1~18.04.9+ | 2.30-21ubuntu1~18.04.9+ |
ubuntu/binutils | <2.24-5ubuntu14.2+ | 2.24-5ubuntu14.2+ |
ubuntu/binutils | <2.26.1-1ubuntu1~16.04.8+ | 2.26.1-1ubuntu1~16.04.8+ |
debian/binutils | 2.40-2 2.42-4 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48063 is a vulnerability in GNU Binutils before version 2.40 that allows for excessive memory consumption and can be exploited through a crafted ELF file, leading to a DNS attack.
CVE-2022-48063 has a severity level of 5.5, which is considered medium.
The affected software for CVE-2022-48063 is GNU Binutils before version 2.40.
To fix CVE-2022-48063, you should update GNU Binutils to version 2.40 or later.
You can find more information about CVE-2022-48063 at the following references: [Link 1](https://sourceware.org/bugzilla/show_bug.cgi?id=29924), [Link 2](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd), [Link 3](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063).