First published: Fri Jan 04 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <=2.31.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-20671.
The title of the vulnerability is 'load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow...'
The description of the vulnerability is that 'load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.'
The software affected by this vulnerability includes binutils version 2.30-21ubuntu1~18.04.3 and binutils version 2.26.1-1ubuntu1~16.04.8+.
The severity level of this vulnerability is not specified.