DEBIAN-CVE-2018-1000876

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2018-1000876
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000876.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2018-1000876
Upstream
Published
2018-12-20T17:29:01Z
Modified
2025-09-19T06:23:20Z
Summary
[none]
Details

binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfdgetdynamicrelocupperbound,bfdcanonicalizedynamicreloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.

References

Affected packages

Debian:11 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.32.51.20190707-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.32.51.20190707-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.32.51.20190707-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.32.51.20190707-1

Ecosystem specific

{
    "urgency": "unimportant"
}