Search for packages
purl | pkg:alpm/archlinux/binutils@2.28.0-4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2g37-m7h8-aaan
Aliases: CVE-2017-9041 |
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c. |
Affected by 0 other vulnerabilities. |
VCID-8avx-j583-aaap
Aliases: CVE-2017-9043 |
readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. |
Affected by 0 other vulnerabilities. |
VCID-j35t-2dc1-aaar
Aliases: CVE-2017-7209 |
The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash. |
Affected by 0 other vulnerabilities. |
VCID-kbr7-tbru-aaaq
Aliases: CVE-2017-9042 |
readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. |
Affected by 0 other vulnerabilities. |
VCID-p85y-jrz7-aaab
Aliases: CVE-2017-9040 |
GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt. |
Affected by 0 other vulnerabilities. |
VCID-pdrv-qfbp-aaan
Aliases: CVE-2017-6966 |
readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations. |
Affected by 0 other vulnerabilities. |
VCID-rf1t-p1hp-aaar
Aliases: CVE-2017-9044 |
The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file. |
Affected by 0 other vulnerabilities. |
VCID-szyg-h58d-aaas
Aliases: CVE-2017-6969 |
readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well. |
Affected by 0 other vulnerabilities. |
VCID-y3jg-d2j2-aaar
Aliases: CVE-2017-6965 |
readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow. |
Affected by 0 other vulnerabilities. |
VCID-ysqh-yybj-aaac
Aliases: CVE-2017-9039 |
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c. |
Affected by 0 other vulnerabilities. |
VCID-yt2h-eyr6-aaaa
Aliases: CVE-2017-7210 |
objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash. |
Affected by 0 other vulnerabilities. |
VCID-zg4d-pabs-aaap
Aliases: CVE-2017-9038 |
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:12.925839+00:00 | Arch Linux Importer | Affected by | VCID-y3jg-d2j2-aaar | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.907177+00:00 | Arch Linux Importer | Affected by | VCID-pdrv-qfbp-aaan | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.888503+00:00 | Arch Linux Importer | Affected by | VCID-szyg-h58d-aaas | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.869956+00:00 | Arch Linux Importer | Affected by | VCID-j35t-2dc1-aaar | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.851331+00:00 | Arch Linux Importer | Affected by | VCID-yt2h-eyr6-aaaa | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.832643+00:00 | Arch Linux Importer | Affected by | VCID-zg4d-pabs-aaap | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.814071+00:00 | Arch Linux Importer | Affected by | VCID-ysqh-yybj-aaac | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.795290+00:00 | Arch Linux Importer | Affected by | VCID-p85y-jrz7-aaab | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.776653+00:00 | Arch Linux Importer | Affected by | VCID-2g37-m7h8-aaan | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.758141+00:00 | Arch Linux Importer | Affected by | VCID-kbr7-tbru-aaaq | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.739281+00:00 | Arch Linux Importer | Affected by | VCID-8avx-j583-aaap | https://security.archlinux.org/AVG-276 | 36.0.0 |
2025-03-28T07:46:12.720775+00:00 | Arch Linux Importer | Affected by | VCID-rf1t-p1hp-aaar | https://security.archlinux.org/AVG-276 | 36.0.0 |
2024-09-18T02:01:23.216791+00:00 | Arch Linux Importer | Affected by | VCID-y3jg-d2j2-aaar | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.189897+00:00 | Arch Linux Importer | Affected by | VCID-pdrv-qfbp-aaan | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.163007+00:00 | Arch Linux Importer | Affected by | VCID-szyg-h58d-aaas | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.131136+00:00 | Arch Linux Importer | Affected by | VCID-j35t-2dc1-aaar | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.105593+00:00 | Arch Linux Importer | Affected by | VCID-yt2h-eyr6-aaaa | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.076095+00:00 | Arch Linux Importer | Affected by | VCID-zg4d-pabs-aaap | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.055530+00:00 | Arch Linux Importer | Affected by | VCID-ysqh-yybj-aaac | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:23.024903+00:00 | Arch Linux Importer | Affected by | VCID-p85y-jrz7-aaab | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:22.999101+00:00 | Arch Linux Importer | Affected by | VCID-2g37-m7h8-aaan | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:22.972827+00:00 | Arch Linux Importer | Affected by | VCID-kbr7-tbru-aaaq | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:22.947461+00:00 | Arch Linux Importer | Affected by | VCID-8avx-j583-aaap | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-09-18T02:01:22.921465+00:00 | Arch Linux Importer | Affected by | VCID-rf1t-p1hp-aaar | https://security.archlinux.org/AVG-276 | 34.0.1 |
2024-01-03T22:27:33.450666+00:00 | Arch Linux Importer | Affected by | VCID-y3jg-d2j2-aaar | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.428013+00:00 | Arch Linux Importer | Affected by | VCID-pdrv-qfbp-aaan | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.406454+00:00 | Arch Linux Importer | Affected by | VCID-szyg-h58d-aaas | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.387233+00:00 | Arch Linux Importer | Affected by | VCID-j35t-2dc1-aaar | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.368417+00:00 | Arch Linux Importer | Affected by | VCID-yt2h-eyr6-aaaa | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.349354+00:00 | Arch Linux Importer | Affected by | VCID-zg4d-pabs-aaap | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.330064+00:00 | Arch Linux Importer | Affected by | VCID-ysqh-yybj-aaac | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.310969+00:00 | Arch Linux Importer | Affected by | VCID-p85y-jrz7-aaab | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.291802+00:00 | Arch Linux Importer | Affected by | VCID-2g37-m7h8-aaan | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.272760+00:00 | Arch Linux Importer | Affected by | VCID-kbr7-tbru-aaaq | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.253728+00:00 | Arch Linux Importer | Affected by | VCID-8avx-j583-aaap | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |
2024-01-03T22:27:33.234842+00:00 | Arch Linux Importer | Affected by | VCID-rf1t-p1hp-aaar | https://security.archlinux.org/AVG-276 | 34.0.0rc1 |