First published: Fri May 14 2021(Updated: )
A flaw was discovered in objdump as distributed in GNU Binutils version 2.36. A large section parameter can be passed to avr_elf32_load_records_from_section() leading to DoS and memory corruption. Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27294">https://sourceware.org/bugzilla/show_bug.cgi?id=27294</a> Upstream patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1cfcf3004e1830f8fe9112cfcd15285508d2c2b7">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1cfcf3004e1830f8fe9112cfcd15285508d2c2b7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1960717 is categorized as a DoS and memory corruption vulnerability.
To fix REDHAT-BUG-1960717, update your GNU Binutils to a patched version that addresses this flaw.
REDHAT-BUG-1960717 affects GNU Binutils version 2.36 and potentially earlier versions.
Exploiting REDHAT-BUG-1960717 can lead to denial of service and memory corruption.
REDHAT-BUG-1960717 affects the objdump component of GNU Binutils.