https://bugzilla.redhat.com/show_bug.cgi?id=1162570

            Bug ID: 1162570
           Summary: CVE-2014-8501 binutils: out-of-bounds write when
                    parsing specially crafted PE executable
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-t...@redhat.com
          Reporter: vkaig...@redhat.com
                CC: bgoll...@redhat.com, d...@danny.cz,
                    dhowe...@redhat.com, erik-fed...@vanpienbroek.nl,
                    fedora-mi...@lists.fedoraproject.org,
                    ja...@redhat.com, kalevlem...@gmail.com,
                    kande...@redhat.com, kti...@redhat.com,
                    l...@redhat.com, lkoc...@redhat.com, lkund...@v3.sk,
                    mfr...@redhat.com, mhlav...@redhat.com,
                    ni...@redhat.com, ohudl...@redhat.com,
                    pfran...@redhat.com, rjo...@redhat.com,
                    r...@robspanton.com, seceng-idm-qe-l...@redhat.com,
                    swhit...@redhat.com, thibault.no...@gmail.com,
                    tmlc...@redhat.com, trond.daniel...@gmail.com



It was reported [1] that running strings, nm or objdump on a constructed PE
file [2] leads to out-of bounds write to an unitialized memory area.
Upstream path for this issue is at [3].

[1]: https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c0
[2]: https://sourceware.org/bugzilla/attachment.cgi?id=7849
[3]:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=xVCMYjG9bG&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to