MGASA-2022-0425

Source
https://advisories.mageia.org/MGASA-2022-0425.html
Import Source
https://advisories.mageia.org/MGASA-2022-0425.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0425
Related
Published
2022-11-13T02:25:20Z
Modified
2022-11-13T01:03:46Z
Summary
Updated binutils/gdb packages fix security vulnerability
Details

libiberty: Heap/stack buffer overflow in the dlanglname function in d-demangle.c (CVE-2021-3826) binutils: heap-based buffer overflow in bfdgetl32() when called by strip_main() in objcopy.c via a crafted file (CVE-2022-38533)

References
Credits

Affected packages

Mageia:8 / binutils

Package

Name
binutils
Purl
pkg:rpm/mageia/binutils?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36.1-1.5.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / gdb

Package

Name
gdb
Purl
pkg:rpm/mageia/gdb?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.1-5.1.mga8

Ecosystem specific

{
    "section": "core"
}