It was discovered that GNU binutils incorrectly handled checks for memory allocation when parsing relocs in a corrupt file. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-17122)
It was discovered that GNU binutils incorrectly handled certain corrupt DWARF debug sections. An attacker could possibly use this issue to cause GNU binutils to consume memory, resulting in a denial of service. (CVE-2021-3487)
It was discovered that GNU binutils incorrectly performed bounds checking operations when parsing stabs debugging information. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2021-45078)
{
"binaries": [
{
"binary_name": "binutils",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-aarch64-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-alpha-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-arm-linux-gnueabi",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-arm-linux-gnueabihf",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-dev",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-hppa-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-hppa64-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-m68k-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-mips-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-mips64-linux-gnuabi64",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-mips64el-linux-gnuabi64",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-mipsel-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-multiarch",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-multiarch-dev",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-powerpc-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-powerpc-linux-gnuspe",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-powerpc64-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-powerpc64le-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-s390x-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-sh4-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-source",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
},
{
"binary_name": "binutils-sparc64-linux-gnu",
"binary_version": "2.26.1-1ubuntu1~16.04.8+esm3"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2017-17122"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2021-3487"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2021-45078"
}
]
}