First published: Sun Feb 24 2019(Updated: )
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.32 | |
Netapp Element Software | ||
Canonical Ubuntu Linux | =18.04 | |
F5 Traffix Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9077 is a vulnerability in GNU Binutils 2.32 that allows for a heap-based buffer overflow in the readelf.c file.
CVE-2019-9077 affects GNU Binutils 2.32, Netapp Element Software, Canonical Ubuntu Linux 18.04, F5 Traffix Signaling Delivery Controller (version 5.0.0 to 5.1.0), Apple High Sierra, and certain versions of Debian Binutils.
CVE-2019-9077 has a severity rating of 7.8 (high).
To fix CVE-2019-9077 in GNU Binutils, you should update to a version higher than 2.35.2-2, 2.40-2, or 2.41-5.
Yes, you can find more information about CVE-2019-9077 at the following links: http://www.securityfocus.com/bid/107139, https://security.netapp.com/advisory/ntap-20190314-0003/, and https://support.f5.com/csp/article/K00056379.