A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-25585 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2167498 | Exploit Issue Tracking Patch |
https://security.netapp.com/advisory/ntap-20231103-0003/ | |
https://sourceware.org/bugzilla/show_bug.cgi?id=29892 | Exploit Issue Tracking Patch |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7 | Mailing List Patch |
https://access.redhat.com/security/cve/CVE-2023-25585 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2167498 | Exploit Issue Tracking Patch |
https://security.netapp.com/advisory/ntap-20231103-0003/ | |
https://sourceware.org/bugzilla/show_bug.cgi?id=29892 | Exploit Issue Tracking Patch |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7 | Mailing List Patch |
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2023-25585 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2167498 - Exploit, Issue Tracking, Patch | |
References | () https://security.netapp.com/advisory/ntap-20231103-0003/ - | |
References | () https://sourceware.org/bugzilla/show_bug.cgi?id=29892 - Exploit, Issue Tracking, Patch | |
References | () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7 - Mailing List, Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
04 Nov 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Sep 2023, 17:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gnu binutils
Gnu |
|
CWE | CWE-908 | |
CPE | cpe:2.3:a:gnu:binutils:2.40:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2167498 - Exploit, Issue Tracking, Patch | |
References | (MISC) https://sourceware.org/bugzilla/show_bug.cgi?id=29892 - Exploit, Issue Tracking, Patch | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-25585 - Third Party Advisory | |
References | (MISC) https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7 - Mailing List, Patch |
15 Sep 2023, 00:31
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-14 21:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25585
Mitre link : CVE-2023-25585
CVE.ORG link : CVE-2023-25585
JSON object : View
Products Affected
gnu
- binutils