First published: Fri Mar 17 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b814a36d3440de95f2ac6eaa4fc7935c322ea456
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=43a444f9c5bfd44b4304eafd78338e21d54bea14
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-6969.
The affected software is GNU Binutils version 2.28.
The vulnerability can trigger program crashes and may lead to an information leak.
To fix this vulnerability, update to binutils version 2.28.3 or later.
You can find more information about this vulnerability at the following references: [https://sourceware.org/bugzilla/show_bug.cgi?id=21156](https://sourceware.org/bugzilla/show_bug.cgi?id=21156), [http://www.securityfocus.com/bid/97065](http://www.securityfocus.com/bid/97065), and [https://security.gentoo.org/glsa/201709-02](https://security.gentoo.org/glsa/201709-02).