csaf2cusa/cusas/p/patchelf/patchelf-0.16.0-1_openEuler-SA-2023-1001.json
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

14 lines
807 B
JSON

{
"id": "openEuler-SA-2023-1001",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1001",
"title": "An update for patchelf is now available for openEuler-22.03-LTS and openEuler-22.03-LTS-SP1",
"severity": "Critical",
"description": "PatchELF is a simple utility for modifying an existing ELF executable or library. It can change the dynamic loader (\"ELF interpreter\") of an executable and change the RPATH of an executable or library.\r\n\r\nSecurity Fix(es):\r\n\r\nPatchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.(CVE-2022-44940)",
"cves": [
{
"id": "CVE-2022-44940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44940",
"severity": "Critical"
}
]
}