GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=20898 | Issue Tracking Patch | 
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=20898 | Issue Tracking Patch | 
Configurations
                    History
                    21 Nov 2024, 03:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://security.gentoo.org/glsa/201801-01 - | |
| References | () https://sourceware.org/bugzilla/show_bug.cgi?id=20898 - Issue Tracking, Patch | 
Information
                Published : 2017-03-22 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-7223
Mitre link : CVE-2017-7223
CVE.ORG link : CVE-2017-7223
JSON object : View
Products Affected
                gnu
- binutils
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
