Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-38533

Опубликовано: 26 авг. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.5

Описание

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

РелизСтатусПримечание
bionic

released

2.30-21ubuntu1~18.04.8
devel

released

2.40-2ubuntu1
esm-infra-legacy/trusty

released

2.24-5ubuntu14.2+esm6
esm-infra/bionic

released

2.30-21ubuntu1~18.04.8
esm-infra/focal

released

2.34-6ubuntu1.4
esm-infra/xenial

released

2.26.1-1ubuntu1~16.04.8+esm5
focal

released

2.34-6ubuntu1.4
jammy

released

2.38-4ubuntu2.1
kinetic

released

2.39-3ubuntu1.1
lunar

released

2.40-2ubuntu1

Показывать по

EPSS

Процентиль: 8%
0.00029
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 3 лет назад

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

CVSS3: 5.5
nvd
больше 3 лет назад

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

CVSS3: 5.5
msrc
больше 3 лет назад

In GNU Binutils before 2.40 there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

CVSS3: 5.5
debian
больше 3 лет назад

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the er ...

CVSS3: 5.5
github
больше 3 лет назад

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

EPSS

Процентиль: 8%
0.00029
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2022-38533