First published: Mon Dec 04 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-17123.
The title of this vulnerability is 'The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka l...'
The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted COFF based file.
The affected software is binutils versions 2.26.1-1ubuntu1~16.04.8+ to 2.29.90.20180122-1, and versions 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5 of the package from the Debian repository.
You can find more information about this vulnerability at the following references: - https://sourceware.org/bugzilla/show_bug.cgi?id=22509 - https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543 - https://security.gentoo.org/glsa/201811-17