First published: Mon Jun 19 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-9750.
The severity level of CVE-2017-9750 is not specified.
CVE-2017-9750 allows remote attackers to cause a denial of service or possibly have unspecified other impact by exploiting a buffer overflow vulnerability in opcodes/rx-decode.opc in GNU Binutils 2.28.
To fix the CVE-2017-9750 vulnerability in GNU Binutils 2.28 for Ubuntu Xenial (16.04), upgrade the binutils package to version 2.26.1-1ubuntu1~16.04.8+ or higher.
Yes, here are some references for CVE-2017-9750: [1] [2] [3].