Search for packages
| purl | pkg:deb/debian/binutils@2.27.51.20161102-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1bz7-thv9-cyc6 | gcc: Invalid write due to a use-after-free to array ktypevec |
CVE-2016-4488
|
| VCID-aamn-9dtp-6fg6 | gcc: Read access violations |
CVE-2016-4493
|
| VCID-cd45-a3xv-6uhw | gcc: Read access violations |
CVE-2016-4492
|
| VCID-juv3-bucu-efhy | gcc: Exploitable buffer overflow |
CVE-2016-2226
|
| VCID-kbtu-7423-h7hv | binutils: use-after-free in c++filt in cplus-dem.c |
CVE-2021-37322
|
| VCID-nxer-a1h8-gfek | gcc: Invalid write due to integer overflow |
CVE-2016-4489
|
| VCID-sgrx-ndrs-nqdg | gcc: Invalid write due to a use-after-free to array btypevec |
CVE-2016-4487
|
| VCID-w77d-kbu4-gud8 | gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler |
CVE-2016-6131
|
| VCID-xa12-b129-gkb9 | gcc: Write access violation |
CVE-2016-4490
|