UBUNTU-CVE-2021-32256

Source
https://ubuntu.com/security/CVE-2021-32256
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32256.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-32256
Related
Published
2023-07-18T14:15:00Z
Modified
2024-10-15T14:08:09Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c.

References

Affected packages

Ubuntu:Pro:16.04:LTS / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20141014-1
20160215-1

20160215-1ubuntu0.*

20160215-1ubuntu0.2
20160215-1ubuntu0.3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}

Ubuntu:Pro:18.04:LTS / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20170913-1

20170913-1ubuntu0.*

20170913-1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}

Ubuntu:20.04:LTS / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20190907-1
20200409-1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}

Ubuntu:22.04:LTS / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20210106-1build1
20211102-1
20211102-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}

Ubuntu:24.10 / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20240117-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}

Ubuntu:24.04:LTS / libiberty

Package

Name
libiberty
Purl
pkg:deb/ubuntu/libiberty?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

20230721-1
20240117-1
20240117-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No real security impact as binutils is not generally expected to handle untrusted input and the most likely impact is a denial of service."
}