First published: Wed Nov 15 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16828 is a vulnerability in GNU Binutils 2.29.1 that allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted ELF file.
CVE-2017-16828 can cause a denial of service (integer overflow and heap-based buffer over-read) or possibly have other unspecified impact on GNU Binutils.
To fix CVE-2017-16828 on Ubuntu, upgrade to version 2.29.90.20180122-1 of the binutils package.
To fix CVE-2017-16828 on Debian, upgrade to version 2.31.1-16, 2.35.2-2, 2.40-2, or 2.41-5 of the binutils package.
You can find more information about CVE-2017-16828 on the official Sourceware bugzilla page, the binutils-gdb gitweb page, and the Gentoo security advisory GLSA 201811-17.