It was discovered that GNU binutils incorrectly handled checks for memory allocation when parsing relocs in a corrupt file. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-17122)
It was discovered that GNU binutils incorrectly handled certain corrupt DWARF debug sections. An attacker could possibly use this issue to cause GNU binutils to consume memory, resulting in a denial of service. (CVE-2021-3487)
It was discovered that GNU binutils incorrectly performed bounds checking operations when parsing stabs debugging information. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2021-45078)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-aarch64-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-alpha-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-arm-linux-gnueabi" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-arm-linux-gnueabihf" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-dev" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-hppa-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-hppa64-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-m68k-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-mips-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-mips64-linux-gnuabi64" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-mips64el-linux-gnuabi64" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-mipsel-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-multiarch" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-multiarch-dev" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-powerpc-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-powerpc-linux-gnuspe" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-powerpc64-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-powerpc64le-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-s390x-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-sh4-linux-gnu" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-source" }, { "binary_version": "2.26.1-1ubuntu1~16.04.8+esm3", "binary_name": "binutils-sparc64-linux-gnu" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:Pro:16.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2017-17122" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2021-3487" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2021-45078" } ] } }