Bug 2234013 (CVE-2022-47673)
| Summary: | CVE-2022-47673 binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | acrosby, ailan, bdettelb, caswilli, desktop-qa-list, fjansen, fweimer, gdb-bugs, hkataria, jburrell, jmitchel, jsamir, jsherril, jtanner, kaycoth, keiths, kshier, mcermak, mpolacek, mprchlik, nickc, ohudlick, psegedy, rjones, sipoyare, sthirugn, tsasak, virt-maint, vkrizan |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | No Doc Update | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-11-09 09:18:46 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2234017, 2234018, 2234019, 2234285, 2234286, 2234287, 2234288, 2234289, 2234290, 2234291, 2234292, 2234293, 2234294, 2234295, 2234296, 2234297, 2234298, 2234299 | ||
| Bug Blocks: | 2233947 | ||
|
Description
Guilherme de Almeida Suckevicz
2023-08-23 21:20:47 UTC
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 2234017] Created gdb tracking bugs for this issue: Affects: fedora-all [bug 2234018] Created mingw-binutils tracking bugs for this issue: Affects: fedora-all [bug 2234019] (In reply to Guilherme de Almeida Suckevicz from comment #0) > An issue was discovered in Binutils addr2line before 2.39.3, function > parse_module contains multiple out of bound reads which may cause a denial > of service or other unspecified impacts. The SECURITY.txt file found in the upstream GNU Binutils sources makes it clear that bug in inspection tools like addr2line are not considered to be security issues, and hence do not qualify for CVE treatment. |