CVE-2017-7227

Published: 22 March 2017

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
binutils
Launchpad, Ubuntu, Debian
Upstream
Released (2.27.51.20161212-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.32-8ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.32-8ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.30-21ubuntu1~18.04.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.26.1-1ubuntu1~16.04.8+esm1)
Ubuntu 14.04 ESM (Trusty Tahr) Needed

Patches:
Upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=406bd128dba2a59d0736839fc87a59bce319076c