{"id":"USN-4336-3","summary":"binutils vulnerabilities","details":"USN-4336-1 fixed several vulnerabilities in GNU. This update provides\nthe corresponding update for Ubuntu 14.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that GNU binutils contained a large number of security\n issues. If a user or automated system were tricked into processing a\n specially-crafted file, a remote attacker could cause GNU binutils to\n crash, resulting in a denial of service, or possibly execute arbitrary\n code.\n","modified":"2026-04-22T10:12:32.437470Z","published":"2023-08-09T11:09:00Z","related":["UBUNTU-CVE-2017-9742","UBUNTU-CVE-2017-9747","UBUNTU-CVE-2017-9748","UBUNTU-CVE-2017-9750","UBUNTU-CVE-2017-9756","UBUNTU-CVE-2018-6323"],"upstream":["CVE-2017-9742","CVE-2017-9747","CVE-2017-9748","CVE-2017-9750","CVE-2017-9756","CVE-2018-6323","UBUNTU-CVE-2017-9742","UBUNTU-CVE-2017-9747","UBUNTU-CVE-2017-9748","UBUNTU-CVE-2017-9750","UBUNTU-CVE-2017-9756","UBUNTU-CVE-2018-6323"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4336-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9742"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9747"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9748"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9750"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9756"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6323"}],"affected":[{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.24-5ubuntu14.2+esm2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.24-5ubuntu14.2+esm2"}]}],"versions":["2.23.52.20130913-0ubuntu1","2.23.90.20131017-1ubuntu1","2.23.90.20131116-1ubuntu1","2.23.91.20131123-1ubuntu1","2.24-1ubuntu1","2.24-1ubuntu2","2.24-2ubuntu1","2.24-2ubuntu2","2.24-2ubuntu3","2.24-4ubuntu1","2.24-5ubuntu1","2.24-5ubuntu2","2.24-5ubuntu3","2.24-5ubuntu3.1","2.24-5ubuntu13","2.24-5ubuntu14","2.24-5ubuntu14.1","2.24-5ubuntu14.2","2.24-5ubuntu14.2+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"binutils","binary_version":"2.24-5ubuntu14.2+esm2"},{"binary_name":"binutils-multiarch","binary_version":"2.24-5ubuntu14.2+esm2"},{"binary_name":"binutils-source","binary_version":"2.24-5ubuntu14.2+esm2"},{"binary_name":"binutils-static","binary_version":"2.24-5ubuntu14.2+esm2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2017-9742","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-9747","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-9748","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-9750","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-9756","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-6323","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4336-3.json"}}],"schema_version":"1.7.5"}