First published: Wed Mar 22 2017(Updated: )
GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7223 is a vulnerability in the GNU assembler in GNU Binutils 2.28 that allows a global buffer overflow, potentially causing a program crash.
The severity of CVE-2017-7223 is not specified.
CVE-2017-7223 affects GNU Binutils 2.28 and potentially other versions.
To fix CVE-2017-7223, upgrade to a version of GNU Binutils specified by the vendor.
You can find more information about CVE-2017-7223 in the references provided: [sourceware.org](https://sourceware.org/bugzilla/show_bug.cgi?id=20898), [security.gentoo.org](https://security.gentoo.org/glsa/201801-01), [launchpad.net](https://launchpad.net/bugs/cve/CVE-2017-7223).