Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6965

Опубликовано: 17 мар. 2017
Источник: debian

Описание

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.28-3package
binutilsignoredjessiepackage
binutilsno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21137

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=03f7786e2f440b9892b1c34a58fb26222ce1b493

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

CVSS3: 7
redhat
почти 9 лет назад

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

CVSS3: 5.5
nvd
почти 9 лет назад

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

CVSS3: 5.5
github
больше 3 лет назад

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

suse-cvrf
больше 7 лет назад

Security update for binutils