CVE-2023-1579
Publication date 3 April 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
Status
Package | Ubuntu Release | Status |
---|---|---|
binutils | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
seth-arnold
binutils isn't safe for untrusted inputs.
ccdm94
the vulnerable code was introduced by commit 31d6c13d (v2.39). The vulnerable function was introduced by commit f67741e1 (v2.39). Therefore, jammy and earlier are not affected.
Patch details
Package | Patch details |
---|---|
binutils |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6101-1
- GNU binutils vulnerabilities
- 24 May 2023