{"id":"USN-6413-1","summary":"binutils vulnerabilities","details":"It was discovered that GNU binutils was not properly performing checks\nwhen dealing with memory allocation operations, which could lead to\nexcessive memory consumption. An attacker could possibly use this issue\nto cause a denial of service. This issue only affected Ubuntu 14.04 LTS.\n(CVE-2017-17122, CVE-2017-8421)\n\nIt was discovered that GNU binutils was not properly performing bounds\nchecks when processing debug sections with objdump, which could lead to\nan overflow. An attacker could possibly use this issue to cause a denial\nof service or execute arbitrary code. This issue only affected Ubuntu\n14.04 LTS. (CVE-2018-20671, CVE-2018-6543)\n\nIt was discovered that GNU binutils contained a reachable assertion, which\ncould lead to an intentional assertion failure when processing certain\ncrafted DWARF files. An attacker could possibly use this issue to cause a\ndenial of service. This issue only affected Ubuntu 18.04 LTS.\n(CVE-2022-35205)\n\nIt was discovered that GNU binutils incorrectly handled memory management\noperations in several of its functions, which could lead to excessive\nmemory consumption due to memory leaks. An attacker could possibly use\nthese issues to cause a denial of service.\n(CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)\n\nIt was discovered that GNU binutils was not properly performing bounds\nchecks when dealing with memory allocation operations, which could lead\nto excessive memory consumption. An attacker could possibly use this issue\nto cause a denial of service. (CVE-2022-48063)\n","modified":"2026-02-10T04:43:21Z","published":"2023-10-04T17:09:59Z","related":["UBUNTU-CVE-2017-17122","UBUNTU-CVE-2017-8421","UBUNTU-CVE-2018-20671","UBUNTU-CVE-2018-6543","UBUNTU-CVE-2022-35205","UBUNTU-CVE-2022-47007","UBUNTU-CVE-2022-47008","UBUNTU-CVE-2022-47010","UBUNTU-CVE-2022-47011","UBUNTU-CVE-2022-48063"],"upstream":["CVE-2017-17122","CVE-2017-8421","CVE-2018-20671","CVE-2018-6543","CVE-2022-35205","CVE-2022-47007","CVE-2022-47008","CVE-2022-47010","CVE-2022-47011","CVE-2022-48063","UBUNTU-CVE-2017-17122","UBUNTU-CVE-2017-8421","UBUNTU-CVE-2018-20671","UBUNTU-CVE-2018-6543","UBUNTU-CVE-2022-35205","UBUNTU-CVE-2022-47007","UBUNTU-CVE-2022-47008","UBUNTU-CVE-2022-47010","UBUNTU-CVE-2022-47011","UBUNTU-CVE-2022-48063"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6413-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8421"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17122"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6543"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20671"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-35205"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47007"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47008"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47010"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47011"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48063"}],"affected":[{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.24-5ubuntu14.2+esm5?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.24-5ubuntu14.2+esm5"}]}],"versions":["2.23.52.20130913-0ubuntu1","2.23.90.20131017-1ubuntu1","2.23.90.20131116-1ubuntu1","2.23.91.20131123-1ubuntu1","2.24-1ubuntu1","2.24-1ubuntu2","2.24-2ubuntu1","2.24-2ubuntu2","2.24-2ubuntu3","2.24-4ubuntu1","2.24-5ubuntu1","2.24-5ubuntu2","2.24-5ubuntu3","2.24-5ubuntu3.1","2.24-5ubuntu13","2.24-5ubuntu14","2.24-5ubuntu14.1","2.24-5ubuntu14.2","2.24-5ubuntu14.2+esm1","2.24-5ubuntu14.2+esm2","2.24-5ubuntu14.2+esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"binutils","binary_version":"2.24-5ubuntu14.2+esm5"},{"binary_name":"binutils-dev","binary_version":"2.24-5ubuntu14.2+esm5"},{"binary_name":"binutils-multiarch","binary_version":"2.24-5ubuntu14.2+esm5"},{"binary_name":"binutils-multiarch-dev","binary_version":"2.24-5ubuntu14.2+esm5"},{"binary_name":"binutils-source","binary_version":"2.24-5ubuntu14.2+esm5"},{"binary_name":"binutils-static","binary_version":"2.24-5ubuntu14.2+esm5"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6413-1.json","cves_map":{"cves":[{"id":"CVE-2017-8421","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-17122","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6543","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-20671","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-47007","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47008","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47010","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47011","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-48063","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.26.1-1ubuntu1~16.04.8+esm9?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.26.1-1ubuntu1~16.04.8+esm9"}]}],"versions":["2.25.1-6ubuntu1","2.25.51.20151022-0ubuntu2","2.25.51.20151022-0ubuntu3","2.25.51.20151027-0ubuntu1","2.25.51.20151028-0ubuntu1","2.25.51.20151106-0ubuntu1","2.25.51.20151113-1ubuntu1","2.25.51.20151113-2ubuntu1","2.25.90.20151125-1ubuntu1","2.25.90.20151125-2ubuntu1","2.25.90.20151211-0ubuntu1","2.25.90.20151211-0ubuntu2","2.25.90.20160101-1ubuntu1","2.25.90.20160101-1ubuntu2","2.26-2ubuntu1","2.26-3ubuntu1","2.26-4ubuntu1","2.26-5ubuntu1","2.26-6ubuntu1","2.26-7ubuntu2","2.26-8ubuntu1","2.26-8ubuntu2","2.26-8ubuntu2.1","2.26.1-1ubuntu1~16.04","2.26.1-1ubuntu1~16.04.1","2.26.1-1ubuntu1~16.04.3","2.26.1-1ubuntu1~16.04.4","2.26.1-1ubuntu1~16.04.5","2.26.1-1ubuntu1~16.04.6","2.26.1-1ubuntu1~16.04.7","2.26.1-1ubuntu1~16.04.8","2.26.1-1ubuntu1~16.04.8+esm1","2.26.1-1ubuntu1~16.04.8+esm3","2.26.1-1ubuntu1~16.04.8+esm4","2.26.1-1ubuntu1~16.04.8+esm5","2.26.1-1ubuntu1~16.04.8+esm6","2.26.1-1ubuntu1~16.04.8+esm7"],"ecosystem_specific":{"binaries":[{"binary_name":"binutils","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-aarch64-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-alpha-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-arm-linux-gnueabi","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-arm-linux-gnueabihf","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-dev","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-hppa-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-hppa64-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-m68k-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-mips-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-mips64-linux-gnuabi64","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-mips64el-linux-gnuabi64","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-mipsel-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-multiarch","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-multiarch-dev","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-powerpc-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-powerpc-linux-gnuspe","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-powerpc64-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-powerpc64le-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-s390x-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-sh4-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-source","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"},{"binary_name":"binutils-sparc64-linux-gnu","binary_version":"2.26.1-1ubuntu1~16.04.8+esm9"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6413-1.json","cves_map":{"cves":[{"id":"CVE-2022-47007","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47008","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47010","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47011","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-48063","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.30-21ubuntu1~18.04.9+esm3?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.30-21ubuntu1~18.04.9+esm3"}]}],"versions":["2.29.1-4ubuntu1","2.29.1-6ubuntu1","2.29.1-7ubuntu1","2.29.1-8ubuntu1","2.29.1-10ubuntu1","2.29.1-12ubuntu1","2.30-4ubuntu1","2.30-5ubuntu1","2.30-7ubuntu1","2.30-8ubuntu1","2.30-9ubuntu1","2.30-10ubuntu1","2.30-11ubuntu1","2.30-14ubuntu2","2.30-15ubuntu1","2.30-20ubuntu2~18.04","2.30-21ubuntu1~18.04","2.30-21ubuntu1~18.04.1","2.30-21ubuntu1~18.04.2","2.30-21ubuntu1~18.04.3","2.30-21ubuntu1~18.04.4","2.30-21ubuntu1~18.04.5","2.30-21ubuntu1~18.04.7","2.30-21ubuntu1~18.04.8","2.30-21ubuntu1~18.04.9","2.30-21ubuntu1~18.04.9+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"binutils","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-aarch64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-alpha-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-arm-linux-gnueabi","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-arm-linux-gnueabihf","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-common","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-dev","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-for-build","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-for-host","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-hppa-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-hppa64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-i686-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-i686-kfreebsd-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-i686-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-ia64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-m68k-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mips-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mips64-linux-gnuabi64","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mips64-linux-gnuabin32","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mips64el-linux-gnuabi64","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mips64el-linux-gnuabin32","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsel-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa32r6-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa32r6el-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa64r6-linux-gnuabi64","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa64r6-linux-gnuabin32","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa64r6el-linux-gnuabi64","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-mipsisa64r6el-linux-gnuabin32","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-multiarch","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-multiarch-dev","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-powerpc-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-powerpc-linux-gnuspe","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-powerpc64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-powerpc64le-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-riscv64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-s390x-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-sh4-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-source","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-sparc64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-x86-64-kfreebsd-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-x86-64-linux-gnu","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"binutils-x86-64-linux-gnux32","binary_version":"2.30-21ubuntu1~18.04.9+esm3"},{"binary_name":"libbinutils","binary_version":"2.30-21ubuntu1~18.04.9+esm3"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6413-1.json","cves_map":{"cves":[{"id":"CVE-2022-35205","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47007","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47008","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47010","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-47011","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-48063","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}}],"schema_version":"1.7.3"}