cvrf2cusa/cusa/p/patchelf/patchelf-0.16.0-1_openEuler-SA-2023-1001.json
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

14 lines
807 B
JSON

{
"id": "openEuler-SA-2023-1001",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1001",
"title": "An update for patchelf is now available for openEuler-22.03-LTS and openEuler-22.03-LTS-SP1",
"severity": "Critical",
"description": "PatchELF is a simple utility for modifying an existing ELF executable or library. It can change the dynamic loader (\"ELF interpreter\") of an executable and change the RPATH of an executable or library.\r\n\r\nSecurity Fix(es):\r\n\r\nPatchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.(CVE-2022-44940)",
"cves": [
{
"id": "CVE-2022-44940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44940",
"severity": "Critical"
}
]
}