Описание
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 2.41-4ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.24-5ubuntu14.2+esm3 |
esm-infra/bionic | released | 2.30-21ubuntu1~18.04.9+esm1 |
esm-infra/focal | not-affected | 2.34-6ubuntu1 |
esm-infra/xenial | released | 2.26.1-1ubuntu1~16.04.8+esm7 |
focal | not-affected | 2.34-6ubuntu1 |
jammy | not-affected | 2.38-3ubuntu1 |
lunar | not-affected | 2.40-2ubuntu4 |
mantic | not-affected | 2.41-4ubuntu1 |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS3
Связанные уязвимости
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in fu ...
GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.
Уязвимость функции tic4x_print_cond компонента opcodes/tic4x-dis.c программного средства разработки GNU Binutils, позволяющая нарушителю получить доступ к конфиденциальным данным
EPSS
7.5 High
CVSS3