First published: Tue Mar 21 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-7210.
The software affected by this vulnerability is objdump in GNU Binutils 2.28.
This vulnerability in objdump allows for multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
The severity of this vulnerability is not mentioned in the provided information.
Yes, for Ubuntu, the remedy is to update to version 2.26.1-1ubuntu1~16.04.8+ or higher. For Debian, the remedy is to update to version 2.31.1-16, 2.35.2-2, 2.40-2, or 2.41-5.