Search for packages
purl | pkg:alpm/archlinux/binutils@2.36.1-3 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4mbs-absj-aaae
Aliases: CVE-2021-3530 |
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash. |
Affected by 0 other vulnerabilities. |
VCID-h1bx-cfnr-aaaq
Aliases: CVE-2021-20197 |
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. |
Affected by 0 other vulnerabilities. |
VCID-j8km-6eau-aaak
Aliases: CVE-2021-3648 |
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
Affected by 0 other vulnerabilities. |
VCID-qmbd-knvg-aaas
Aliases: CVE-2021-3549 |
An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:01.971343+00:00 | Arch Linux Importer | Affected by | VCID-qmbd-knvg-aaas | https://security.archlinux.org/AVG-2002 | 36.0.0 |
2025-03-28T07:46:23.384821+00:00 | Arch Linux Importer | Affected by | VCID-h1bx-cfnr-aaaq | https://security.archlinux.org/AVG-1540 | 36.0.0 |
2025-03-28T07:46:23.366096+00:00 | Arch Linux Importer | Affected by | VCID-4mbs-absj-aaae | https://security.archlinux.org/AVG-1540 | 36.0.0 |
2025-03-28T07:46:23.347412+00:00 | Arch Linux Importer | Affected by | VCID-j8km-6eau-aaak | https://security.archlinux.org/AVG-1540 | 36.0.0 |
2024-09-18T02:02:24.438256+00:00 | Arch Linux Importer | Affected by | VCID-qmbd-knvg-aaas | https://security.archlinux.org/AVG-2002 | 34.0.1 |
2024-09-18T02:01:37.889492+00:00 | Arch Linux Importer | Affected by | VCID-h1bx-cfnr-aaaq | https://security.archlinux.org/AVG-1540 | 34.0.1 |
2024-09-18T02:01:37.867052+00:00 | Arch Linux Importer | Affected by | VCID-4mbs-absj-aaae | https://security.archlinux.org/AVG-1540 | 34.0.1 |
2024-09-18T02:01:37.845475+00:00 | Arch Linux Importer | Affected by | VCID-j8km-6eau-aaak | https://security.archlinux.org/AVG-1540 | 34.0.1 |
2024-01-03T22:28:25.783101+00:00 | Arch Linux Importer | Affected by | VCID-qmbd-knvg-aaas | https://security.archlinux.org/AVG-2002 | 34.0.0rc1 |
2024-01-03T22:27:44.875276+00:00 | Arch Linux Importer | Affected by | VCID-h1bx-cfnr-aaaq | https://security.archlinux.org/AVG-1540 | 34.0.0rc1 |
2024-01-03T22:27:44.855581+00:00 | Arch Linux Importer | Affected by | VCID-4mbs-absj-aaae | https://security.archlinux.org/AVG-1540 | 34.0.0rc1 |
2024-01-03T22:27:44.835764+00:00 | Arch Linux Importer | Affected by | VCID-j8km-6eau-aaak | https://security.archlinux.org/AVG-1540 | 34.0.0rc1 |