7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
33.9%
Medium
Canonical Ubuntu
It was discovered that GNU binutils incorrectly handled certain DWARF files. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 22.10. (CVE-2023-1579) It was discovered that GNU binutils did not properly verify the version definitions in zer0-lengthverdef table. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu 23.04. (CVE-2023-1972) It was discovered that GNU binutils did not properly validate the size of length parameter in vms-alpha. An attacker could possibly use this issue to cause a crash or access sensitive information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-25584) It was discovered that GNU binutils did not properly initialized the file_table field of struct module and the_bfd field of asymbol. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-25585, CVE-2023-25586) Update Instructions: Run sudo pro fix USN-6101-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils-dev – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-powerpc-linux-gnuspe – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-arm-linux-gnueabihf – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-hppa64-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-multiarch – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-mipsel-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-m68k-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-s390x-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-multiarch-dev – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-doc – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-sh4-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-mips64-linux-gnuabi64 – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-aarch64-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-source – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-mips64el-linux-gnuabi64 – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-mips-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-powerpc64le-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-powerpc64-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-hppa-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-sparc64-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-arm-linux-gnueabi – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-alpha-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils-powerpc-linux-gnu – 2.26.1-1ubuntu1~16.04.8+esm6 binutils – 2.26.1-1ubuntu1~16.04.8+esm6 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2023-1579, CVE-2023-1972, CVE-2023-25584, CVE-2023-25585, CVE-2023-25588.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2023-06-30: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.204 | |
cflinuxfs3 | lt | 0.369.0 | |
cflinuxfs4 | lt | 1.11.0 | |
jammy stemcells | lt | 1.125 | |
cf deployment | lt | 30.0.0 |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
33.9%