Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-47696

Опубликовано: 04 дек. 2022
Источник: redhat

Описание

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

A NULL pointer vulnerability was found in binutils in the 'compare_symbols' function. This flaw allows an attacker to craft a specific payload, possibly causing a denial of service that results in a loss of the system's availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6binutilsNot affected
Red Hat Enterprise Linux 7binutilsNot affected
Red Hat Enterprise Linux 7gdbNot affected
Red Hat Enterprise Linux 8binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-11-binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-11-gdbNot affected
Red Hat Enterprise Linux 8gcc-toolset-12-binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-12-gdbNot affected
Red Hat Enterprise Linux 8gcc-toolset-13-binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-13-gdbNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2234029binutils: segmentation fault in compare_symbols() in objdump.c

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

CVSS3: 7.8
nvd
больше 2 лет назад

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

CVSS3: 7.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

An issue was discovered Binutils objdump before 2.39.3 allows attacker ...

CVSS3: 7.8
github
больше 2 лет назад

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.