First published: Tue Sep 12 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=452bf675ea772002aa86fb1d28f3474da70ee1de
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=64aa1246572306b72dc479b46d13ff749b0c3236
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14333 is a vulnerability in GNU Binutils 2.29 that allows attackers to cause a denial of service or have other unspecified impacts via a crafted binary file.
CVE-2017-14333 affects GNU Binutils 2.29, specifically the process_version_sections function in readelf.c.
The severity of CVE-2017-14333 is not specified.
To fix CVE-2017-14333, update the affected software to version 2.29.1 or later.
More information about CVE-2017-14333 can be found at the following references: [1](https://sourceware.org/bugzilla/show_bug.cgi?id=21990), [2](https://security.gentoo.org/glsa/201801-01), [3](https://launchpad.net/bugs/cve/CVE-2017-14333).