CVE-2017-9755

Priority
Description
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of
registers for bnd mode, which allows remote attackers to cause a denial of
service (buffer overflow and application crash) or possibly have
unspecified other impact via a crafted binary file, as demonstrated by
mishandling of this file during "objdump -D" execution.
Notes
Package
Upstream:released (2.29)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.29-1ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.29-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.29-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (2.29-1ubuntu1)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d96e4df4812c3bad77c229dfef47a9bc115ac12
Upstream:https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8cac017d35ef374e65acc98818a17cf8a652cbd0
More Information

Updated: 2019-12-05 19:51:11 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)