First published: Mon Sep 04 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-14128.
The severity of CVE-2017-14128 is a denial of service (DoS) vulnerability.
The software affected by CVE-2017-14128 is the Binary File Descriptor (BFD) library (libbfd) in GNU Binutils 2.29.
An attacker can exploit CVE-2017-14128 by using a crafted ELF file to cause a denial of service (DoS) and crash the application.
Yes, for Ubuntu, the recommended remedy for CVE-2017-14128 is to upgrade to a version equal to or higher than 2.26.1-1ubuntu1~16.04.8+. For Debian, versions 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5 are recommended remedies.