Headline
Ubuntu Security Notice USN-6655-1
Ubuntu Security Notice 6655-1 - It was discovered that GNU binutils was not properly handling the logic behind certain memory management related operations, which could lead to an invalid memory access. An attacker could possibly use this issue to cause a denial of service. It was discovered that GNU binutils was not properly performing bounds checks when dealing with memory allocation operations, which could lead to excessive memory consumption. An attacker could possibly use this issue to cause a denial of service.
==========================================================================Ubuntu Security Notice USN-6655-1February 26, 2024binutils vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.04 LTS- Ubuntu 20.04 LTSSummary:Several security issues were fixed in GNU binutils.Software Description:- binutils: GNU assembler, linker and binary utilitiesDetails:It was discovered that GNU binutils was not properly handling the logicbehind certain memory management related operations, which could lead toan invalid memory access. An attacker could possibly use this issue tocause a denial of service. (CVE-2022-47695)It was discovered that GNU binutils was not properly performing boundschecks when dealing with memory allocation operations, which could leadto excessive memory consumption. An attacker could possibly use this issueto cause a denial of service. (CVE-2022-48063)It was discovered that GNU binutils incorrectly handled memory managementoperations in several of its functions, which could lead to excessivememory consumption due to memory leaks. An attacker could possibly usethese issues to cause a denial of service. (CVE-2022-48065)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.04 LTS: binutils 2.38-4ubuntu2.6 binutils-multiarch 2.38-4ubuntu2.6Ubuntu 20.04 LTS: binutils 2.34-6ubuntu1.9 binutils-multiarch 2.34-6ubuntu1.9In general, a standard system update will make all the necessary changes.References: https://ubuntu.com/security/notices/USN-6655-1 CVE-2022-47695, CVE-2022-48063, CVE-2022-48065Package Information: https://launchpad.net/ubuntu/+source/binutils/2.38-4ubuntu2.6 https://launchpad.net/ubuntu/+source/binutils/2.34-6ubuntu1.9
Related news
Ubuntu Security Notice 6413-1 - It was discovered that GNU binutils was not properly performing checks when dealing with memory allocation operations, which could lead to excessive memory consumption. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. It was discovered that GNU binutils was not properly performing bounds checks when processing debug sections with objdump, which could lead to an overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS.
GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.
GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.