Severity
Low
Vendor
Canonical Ubuntu
Versions Affected
- Canonical Ubuntu 16.04
Description
It was discovered that GNU binutils incorrectly handled checks for memory allocation when parsing relocs in a corrupt file. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-17122) It was discovered that GNU binutils incorrectly handled certain corrupt DWARF debug sections. An attacker could possibly use this issue to cause GNU binutils to consume memory, resulting in a denial of service. (CVE-2021-3487) It was discovered that GNU binutils incorrectly performed bounds checking operations when parsing stabs debugging information. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2021-45078)
CVEs contained in this USN include: CVE-2017-17122, CVE-2021-3487, CVE-2021-45078.
Affected Cloud Foundry Products and Versions
Severity is low unless otherwise noted.
- CF Deployment
- All versions with Xenial Stemcells prior to 621.224
Mitigation
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
- CF Deployment
- For all versions, upgrade Xenial Stemcells to 621.224 or greater
References
History
2022-04-21: Initial vulnerability report published.