It was discovered that GNU binutils was not properly performing bounds checks in several functions, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service, expose sensitive information or execute arbitrary code. (CVE-2022-44840, CVE-2022-45703)
It was discovered that GNU binutils incorrectly handled memory management operations in several of its functions, which could lead to excessive memory consumption due to memory leaks. An attacker could possibly use these issues to cause a denial of service. (CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)
{
"binaries": [
{
"binary_name": "binutils",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-aarch64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-alpha-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-arm-linux-gnueabi",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-arm-linux-gnueabihf",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-common",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-dev",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-for-build",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-for-host",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-hppa-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-hppa64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-i686-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-i686-kfreebsd-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-i686-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-ia64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-m68k-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-multiarch",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-multiarch-dev",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-powerpc-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-powerpc64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-powerpc64le-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-riscv64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-s390x-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-sh4-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-source",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-sparc64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-x86-64-kfreebsd-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-x86-64-linux-gnu",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "binutils-x86-64-linux-gnux32",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "libbinutils",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "libctf-nobfd0",
"binary_version": "2.34-6ubuntu1.8"
},
{
"binary_name": "libctf0",
"binary_version": "2.34-6ubuntu1.8"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2022-44840",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-45703",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47007",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47010",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47011",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:20.04:LTS"
}
{
"binaries": [
{
"binary_name": "binutils",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-aarch64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-alpha-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-arm-linux-gnueabi",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-arm-linux-gnueabihf",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-common",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-dev",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-for-build",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-for-host",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-hppa-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-hppa64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-i686-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-i686-kfreebsd-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-i686-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-ia64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-m68k-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-multiarch",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-multiarch-dev",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-powerpc-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-powerpc64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-powerpc64le-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-riscv64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-s390x-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-sh4-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-source",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-sparc64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-x86-64-kfreebsd-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-x86-64-linux-gnu",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "binutils-x86-64-linux-gnux32",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "libbinutils",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "libctf-nobfd0",
"binary_version": "2.38-4ubuntu2.5"
},
{
"binary_name": "libctf0",
"binary_version": "2.38-4ubuntu2.5"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2022-44840",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-45703",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47007",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47010",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-47011",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:22.04:LTS"
}