Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7227

Опубликовано: 22 мар. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

2.30-21ubuntu1~18.04.1
cosmic

not-affected

2.31.1-6ubuntu1.1
devel

not-affected

2.32-8ubuntu1
disco

not-affected

2.32-7ubuntu4
eoan

not-affected

2.32-8ubuntu1
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2.30-21ubuntu1~18.04.1
esm-infra/focal

not-affected

2.32-8ubuntu1
esm-infra/xenial

released

2.26.1-1ubuntu1~16.04.8+esm1

Показывать по

EPSS

Процентиль: 63%
0.0044
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
около 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVSS3: 7.5
nvd
почти 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVSS3: 7.5
debian
почти 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buf ...

CVSS3: 7.5
github
больше 3 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

suse-cvrf
около 8 лет назад

Security update for binutils

EPSS

Процентиль: 63%
0.0044
Низкий

5 Medium

CVSS2

7.5 High

CVSS3