Source: binutils Severity: important Tags: patch security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=21157
Hi, the following vulnerability was published for binutils. CVE-2017-7210[0]: | objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based | buffer over-reads (of size 1 and size 8) while handling corrupt STABS | enum type strings in a crafted object file, leading to program crash. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-7210 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

