First published: Wed Nov 15 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-16826.
The affected software is GNU Binutils version 2.29.1.
This vulnerability can be exploited by remote attackers to cause a denial of service or potentially have unspecified other impact via a crafted input.
Yes, there are fixes available. For Ubuntu, use version 2.26.1-1ubuntu1~16.04.8+ or 2.29.90.20180122-1. For Debian, use versions 2.31.1-16, 2.35.2-2, 2.40-2, or 2.41-5.
You can find more information about this vulnerability at the following references: [link1](https://sourceware.org/bugzilla/show_bug.cgi?id=22376), [link2](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d), [link3](https://security.gentoo.org/glsa/201811-17).