Name | CVE-2017-7226 |
Description | The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
binutils (PTS) | jessie, jessie (lts) | 2.25-5+deb8u2 | vulnerable |
stretch (lts), stretch | 2.28-5+deb9u1 | fixed | |
buster, buster (lts) | 2.31.1-16+deb10u1 | fixed | |
bullseye | 2.35.2-2 | fixed | |
bookworm | 2.40-2 | fixed | |
trixie | 2.43.50.20241215-1 | fixed | |
sid | 2.43.50.20241221-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
binutils | source | (unstable) | 2.27.51.20161212-1 |
[jessie] - binutils <ignored> (Minor issue)
[wheezy] - binutils <no-dsa> (Minor issue)
https://sourceware.org/bugzilla/show_bug.cgi?id=20905
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=fa6631b4eecfcca00c13b9594e6336dffd40982f