[Git][security-tracker-team/security-tracker][master] add a few dubious CVE assignments for binutils

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Dec 29 23:28:22 GMT 2025



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
26f6ba74 by Moritz Muehlenhoff at 2025-12-30T00:27:53+01:00
add a few dubious CVE assignments for binutils

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -47,17 +47,29 @@ CVE-2025-66877 (Buffer overflow vulnerability in function dcputchar in decompile
 CVE-2025-66869 (Buffer overflow vulnerability in function strcat in asan_interceptors. ...)
 	- ming <removed>
 CVE-2025-66866 (An issue was discovered in function d_abi_tags in file cp-demangle.c i ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-66865 (An issue was discovered in function d_print_comp_inner in file cp-dema ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-66864 (An issue was discovered in function d_print_comp_inner in file cp-dema ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-66863 (An issue was discovered in function d_discriminator in file cp-demangl ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-66862 (A buffer overflow vulnerability in function gnu_special in file cplus- ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-66861 (An issue was discovered in function d_unqualified_name in file cp-dema ...)
-	TODO: check
+	- binutils <unfixed> (unimportant)
+	NOTE: binutils not covered by security support and most certainly bogus since they
+	NOTE: were assigned for a very old binutils release
 CVE-2025-65570 (A type confusion in jsish 2.0 allows incorrect control flow during exe ...)
 	NOT-FOR-US: Jsish
 CVE-2025-65442 (DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/26f6ba74911b470f1a1dd75f2e836dde617a57b8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/26f6ba74911b470f1a1dd75f2e836dde617a57b8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251229/9715f00a/attachment.htm>


More information about the debian-security-tracker-commits mailing list