First published: Wed Jun 21 2017(Updated: )
It was discovered that Valgrind incorrectly handled certain string operations. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-2226) It was discovered that Valgrind incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause Valgrind to crash, resulting in a denial of service. (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4491, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/valgrind | <1:3.12.0-1ubuntu1.1 | 1:3.12.0-1ubuntu1.1 |
=17.04 | ||
All of | ||
ubuntu/valgrind | <1:3.12.0~svn20160714-1ubuntu2.1 | 1:3.12.0~svn20160714-1ubuntu2.1 |
=16.10 | ||
All of | ||
ubuntu/valgrind | <1:3.11.0-1ubuntu4.2 | 1:3.11.0-1ubuntu4.2 |
=16.04 | ||
All of | ||
ubuntu/valgrind | <1:3.10.1-1ubuntu3~14.5 | 1:3.10.1-1ubuntu3~14.5 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-3337-1.
Valgrind is affected by this vulnerability.
Valgrind versions 1:3.12.0-1ubuntu1.1, 1:3.12.0~svn20160714-1ubuntu2.1, 1:3.11.0-1ubuntu4.2, and 1:3.10.1-1ubuntu3~14.5 are affected.
The severity of this vulnerability has not been specified.
To fix this vulnerability, update Valgrind to the recommended versions provided in the Ubuntu security advisory.