First published: Fri Mar 17 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f84ce13b6708801ca1d6289b7c4003e2f5a6d7f9
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6966 is a use-after-free vulnerability in readelf in GNU Binutils 2.28.
CVE-2017-6966 affects GNU Binutils version 2.28-3 and potentially other versions as well.
The severity of CVE-2017-6966 is not specified, but it is a use-after-free vulnerability which can potentially lead to arbitrary code execution.
To fix CVE-2017-6966, it is recommended to update to a version of GNU Binutils that includes the fix, such as version 2.28-3.
More information about CVE-2017-6966 can be found at the following references: [1] https://sourceware.org/bugzilla/show_bug.cgi?id=21139 [2] https://security.gentoo.org/glsa/201709-02 [3] https://launchpad.net/bugs/cve/CVE-2017-6966