Bug 41813 - binutils: Multiple issues (4.1)
Summary: binutils: Multiple issues (4.1)
Status: CLOSED WONTFIX
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 4.1
Hardware: Other Linux
: P3 normal
Target Milestone: UCS 4.1-x-errata
Assignee: UCS maintainers
QA Contact:
URL:
Keywords:
Depends on:
Blocks: 41814
  Show dependency treegraph
 
Reported: 2016-07-18 14:38 CEST by Arvid Requate
Modified: 2019-04-11 19:24 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Customer ID:
Max CVSS v3 score: 5.9 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2016-07-18 14:38:17 CEST
Upstream Debian package version 2.22-8+deb7u3 fixes these issues:

* Exploitable buffer overflow (CVE-2016-2226)
* Invalid write due to a use-after-free to array btypevec (CVE-2016-4487)
* Invalid write due to a use-after-free to array ktypevec (CVE-2016-4488)
* Invalid write due to integer overflow (CVE-2016-4489)
* Write access violation (CVE-2016-4490)
* Write access violations (CVE-2016-4492)
* Read access violations (CVE-2016-4493)
* Bug 1352068 – CVE-2016-6131 gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler (CVE-2016-6131)
Comment 1 Arvid Requate univentionstaff 2016-07-18 14:48:33 CEST
Of these CVE-2016-2226 currently has the highest impact
 CVSS v2 Base score (6.1 AV:N/AC:M/Au:N/C:P/I:P/A:P)
Comment 2 Arvid Requate univentionstaff 2018-04-17 15:56:39 CEST
This issue has been filed against UCS 4.1.

UCS 4.1 is out of maintenance and many UCS components have vastly changed in later releases. Thus, this issue is now being closed.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen this issue. In this case please provide detailed information on how this issue is affecting you.