First published: Mon Jan 15 2024(Updated: )
It was discovered that GNU binutils was not properly performing bounds checks in several functions, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service, expose sensitive information or execute arbitrary code. (CVE-2022-44840, CVE-2022-45703) It was discovered that GNU binutils incorrectly handled memory management operations in several of its functions, which could lead to excessive memory consumption due to memory leaks. An attacker could possibly use these issues to cause a denial of service. (CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)
Affected Software | Affected Version | How to fix |
---|---|---|
Binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6581-1 is critical due to the potential for buffer overflow leading to denial of service, exposure of sensitive information, or arbitrary code execution.
To fix USN-6581-1, update the GNU binutils package to version 2.38-4ubuntu2.5 on Ubuntu 22.04 or 2.34-6ubuntu1.8 on Ubuntu 20.04.
USN-6581-1 affects the binutils and binutils-multiarch packages on Ubuntu 20.04 and 22.04.
USN-6581-1 addresses multiple vulnerabilities related to improper bounds checks leading to potential security risks.
Yes, USN-6581-1 presents a risk of remote code execution due to the buffer overflow vulnerability in GNU binutils.