Updated: 2023-11-04 20:09:51.770096
Description:
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 5 |
CVSS Version 3.x | HIGH | 7.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 6 ELS | binutils | 2.20 | 7.5 | HIGH | Released | CLSA-2021:1638803819 | 2022-05-05 12:02:34 |
CloudLinux 6 ELS | binutils | 2.20 | 7.5 | HIGH | Released | 2021-12-06 11:56:09 | |
Oracle Linux 6 ELS | binutils | 2.20 | 7.5 | HIGH | Released | CLSA-2021:1637770725 | 2021-11-24 13:55:58 |
Ubuntu 16.04 ELS | binutils | 2.26 | 7.5 | HIGH | Released | CLSA-2021:1635459139 | 2021-11-02 21:02:48 |