SB2023120506 - Multiple vulnerabilities in GNU Binutils
Published: December 5, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2022-47011)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within the parse_stab_struct_fields() function in stabs.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.
2) Memory leak (CVE-ID: CVE-2022-47010)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within the pr_function_type(0 function in prdbg.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.
3) Memory leak (CVE-ID: CVE-2022-47008)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within the make_tempdir() and make_tempname() function in bucomm.c. A remote attacker can trick the victim to pass specially crafted data to the application and and perform denial of service attack.
4) Memory leak (CVE-ID: CVE-2022-47007)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within the stab_demangle_v3_arg() function in stabs.c. A remote attacker can force the application to leak memory and perform denial of service attack.
5) Reachable Assertion (CVE-ID: CVE-2022-35205)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion within the display_debug_names() function. A remote attacker can trick the victim to pass specially crafted input to the application and crash it.
Remediation
Install update from vendor's website.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=29261
- https://sourceware.org/bugzilla/show_bug.cgi?id=29262
- https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20
- https://sourceware.org/bugzilla/show_bug.cgi?id=29254
- https://sourceware.org/bugzilla/show_bug.cgi?id=29289
- https://security.netapp.com/advisory/ntap-20231006-0010/