First published: Fri Mar 17 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=03f7786e2f440b9892b1c34a58fb26222ce1b493
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6965 is a vulnerability in GNU Binutils 2.28 that allows attackers to cause a heap-based buffer overflow by processing corrupt input files.
If you are using GNU Binutils 2.28, your system may be vulnerable to a heap-based buffer overflow when processing corrupt input files containing symbol-difference relocations.
GNU Binutils versions 2.28 and earlier are affected by CVE-2017-6965.
Upgrade to GNU Binutils 2.26.1-1ubuntu1~16.04.8+ for Ubuntu, or to a version of GNU Binutils that is higher than 2.28 for Debian.
You can find more information about CVE-2017-6965 on the Sourceware Bugzilla, Gentoo GLSA, and Launchpad bug tracker.