Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Related
{"id": "RH:CVE-2023-22608", "vendorId": null, "type": "redhatcve", "bulletinFamily": "info", "title": "CVE-2023-22608", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n", "published": "2023-01-31T10:06:14", "modified": "2023-04-21T08:56:28", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://access.redhat.com/security/cve/cve-2023-22608", "reporter": "redhat.com", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-22608\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-22608", "https://bugzilla.redhat.com/show_bug.cgi?id=2165857"], "cvelist": ["CVE-2023-22608"], "immutableFields": [], "lastseen": "2023-04-21T11:17:25", "viewCount": 5, "enchantments": {"score": {"value": 6.1, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2023-22608"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2023-22608"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2023-22608"]}, {"type": "veracode", "idList": ["VERACODE:39447"]}]}, "vulnersScore": 6.1}, "_state": {"score": 1684017862, "dependencies": 1682075896, "epss": 1682080568}, "_internal": {"score_hash": "7a01a150547248f0f2448a4d96426d1a"}, "vendorCvss": {}}
{"cve": [{"lastseen": "2023-03-27T22:13:27", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "cvss3": {}, "published": "2023-03-27T21:15:00", "type": "cve", "title": "CVE-2023-22608", "cwe": [], "bulletinFamily": "NVD", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-03-27T21:15:00", "cpe": [], "id": "CVE-2023-22608", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}, "cpe23": []}], "debiancve": [{"lastseen": "2023-03-27T22:19:31", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "cvss3": {}, "published": "2023-03-27T21:15:00", "type": "debiancve", "title": "CVE-2023-22608", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-03-27T21:15:00", "id": "DEBIANCVE:CVE-2023-22608", "href": "https://security-tracker.debian.org/tracker/CVE-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}}], "ubuntucve": [{"lastseen": "2023-02-01T13:08:07", "description": "binutils: objdump SEGV in concat_filename() at dwarf2.c:2060\n\n#### Notes\n\nAuthor| Note \n---|--- \n[seth-arnold](<https://launchpad.net/~seth-arnold>) | binutils isn't safe for untrusted inputs.\n", "cvss3": {}, "published": "2023-02-01T00:00:00", "type": "ubuntucve", "title": "CVE-2023-22608", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-02-01T00:00:00", "id": "UB:CVE-2023-22608", "href": "https://ubuntu.com/security/CVE-2023-22608", "cvss": {"score": 0.0, "vector": "NONE"}}], "veracode": [{"lastseen": "2023-03-29T09:31:28", "description": "binutils is vulnerable to Improper Input Validation. The vulnerability exists though the `concat_filename()` function of objdump SEGV, allowing an attacker to exploit this flaw by submitting a maliciously crafted input\n", "cvss3": {}, "published": "2023-02-27T20:07:30", "type": "veracode", "title": "Improper Input Validation", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2023-22608"], "modified": "2023-03-28T00:45:33", "id": "VERACODE:39447", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-39447/summary", "cvss": {"score": 0.0, "vector": "NONE"}}]}