Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Affected Package
Related
{"id": "DEBIANCVE:CVE-2023-22608", "vendorId": null, "type": "debiancve", "bulletinFamily": "info", "title": "CVE-2023-22608", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "published": "2023-03-27T21:15:00", "modified": "2023-03-27T21:15:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://security-tracker.debian.org/tracker/CVE-2023-22608", "reporter": "Debian Security Bug Tracker", "references": [], "cvelist": ["CVE-2023-22608"], "immutableFields": [], "lastseen": "2023-03-27T22:19:31", "viewCount": 6, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2023-22608"]}, {"type": "redhatcve", "idList": ["RH:CVE-2023-22608"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2023-22608"]}, {"type": "veracode", "idList": ["VERACODE:39447"]}]}, "score": {"value": 6.1, "vector": "NONE"}, "vulnersScore": 6.1}, "_state": {"dependencies": 1679955627, "score": 1684017862, "epss": 1679955630}, "_internal": {"score_hash": "3d9aff2624b24b127ff4a21d99760bc9"}, "affectedPackage": [{"OS": "Debian", "OSVersion": "12", "arch": "all", "packageFilename": "binutils_2.40-2_all.deb", "packageVersion": "2.40-2", "operator": "lt", "status": "resolved", "packageName": "binutils"}, {"OS": "Debian", "OSVersion": "11", "arch": "all", "packageFilename": "binutils_2.35.2-2_all.deb", "packageVersion": "2.35.2-2", "operator": "le", "status": "open", "packageName": "binutils"}, {"OS": "Debian", "OSVersion": "10", "arch": "all", "packageFilename": "binutils_2.31.1-16_all.deb", "packageVersion": "2.31.1-16", "operator": "le", "status": "open", "packageName": "binutils"}, {"OS": "Debian", "OSVersion": "999", "arch": "all", "packageFilename": "binutils_2.40-2_all.deb", "packageVersion": "2.40-2", "operator": "lt", "status": "resolved", "packageName": "binutils"}]}
{"ubuntucve": [{"lastseen": "2023-02-01T13:08:07", "description": "binutils: objdump SEGV in concat_filename() at dwarf2.c:2060\n\n#### Notes\n\nAuthor| Note \n---|--- \n[seth-arnold](<https://launchpad.net/~seth-arnold>) | binutils isn't safe for untrusted inputs.\n", "cvss3": {}, "published": "2023-02-01T00:00:00", "type": "ubuntucve", "title": "CVE-2023-22608", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-02-01T00:00:00", "id": "UB:CVE-2023-22608", "href": "https://ubuntu.com/security/CVE-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2023-03-27T22:13:27", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "cvss3": {}, "published": "2023-03-27T21:15:00", "type": "cve", "title": "CVE-2023-22608", "cwe": [], "bulletinFamily": "NVD", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-03-27T21:15:00", "cpe": [], "id": "CVE-2023-22608", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}, "cpe23": []}], "redhatcve": [{"lastseen": "2023-04-21T11:17:25", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n", "cvss3": {}, "published": "2023-01-31T10:06:14", "type": "redhatcve", "title": "CVE-2023-22608", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-04-21T08:56:28", "id": "RH:CVE-2023-22608", "href": "https://access.redhat.com/security/cve/cve-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}}], "veracode": [{"lastseen": "2023-03-29T09:31:28", "description": "binutils is vulnerable to Improper Input Validation. The vulnerability exists though the `concat_filename()` function of objdump SEGV, allowing an attacker to exploit this flaw by submitting a maliciously crafted input\n", "cvss3": {}, "published": "2023-02-27T20:07:30", "type": "veracode", "title": "Improper Input Validation", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-03-28T00:45:33", "id": "VERACODE:39447", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-39447/summary", "cvss": {"score": 0.0, "vector": "NONE"}}]}