Your submission was sent successfully! Close

CVE-2017-7227

Published: 22 March 2017

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
binutils
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(2.30-21ubuntu1~18.04.1)
cosmic Not vulnerable
(2.31.1-6ubuntu1.1)
disco Not vulnerable
(2.32-7ubuntu4)
eoan Not vulnerable
(2.32-8ubuntu1)
focal Not vulnerable
(2.32-8ubuntu1)
groovy Not vulnerable
(2.32-8ubuntu1)
hirsute Not vulnerable
(2.32-8ubuntu1)
impish Not vulnerable
(2.32-8ubuntu1)
jammy Not vulnerable
(2.32-8ubuntu1)
precise Ignored
(end of ESM support, was needed)
trusty Needed

upstream
Released (2.27.51.20161212-1)
xenial
Released (2.26.1-1ubuntu1~16.04.8+esm1)
yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:
upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=406bd128dba2a59d0736839fc87a59bce319076c