Описание
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 2.30-21ubuntu1~18.04.1 |
| cosmic | not-affected | 2.31.1-6ubuntu1.1 |
| devel | not-affected | 2.32-8ubuntu1 |
| disco | not-affected | 2.32-7ubuntu4 |
| eoan | not-affected | 2.32-8ubuntu1 |
| esm-infra-legacy/trusty | needed | |
| esm-infra/bionic | not-affected | 2.30-21ubuntu1~18.04.1 |
| esm-infra/focal | not-affected | 2.32-8ubuntu1 |
| esm-infra/xenial | released | 2.26.1-1ubuntu1~16.04.8+esm1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buf ...
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3