https://bugzilla.redhat.com/show_bug.cgi?id=1162621

            Bug ID: 1162621
           Summary: CVE-2014-8504 binutils: stack overflow in the SREC
                    parser
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-t...@redhat.com
          Reporter: vkaig...@redhat.com
                CC: bgoll...@redhat.com, d...@danny.cz,
                    dhowe...@redhat.com, erik-fed...@vanpienbroek.nl,
                    fedora-mi...@lists.fedoraproject.org,
                    ja...@redhat.com, kalevlem...@gmail.com,
                    kande...@redhat.com, kti...@redhat.com,
                    l...@redhat.com, lkoc...@redhat.com, lkund...@v3.sk,
                    mfr...@redhat.com, mhlav...@redhat.com,
                    ni...@redhat.com, ohudl...@redhat.com,
                    pfran...@redhat.com, rjo...@redhat.com,
                    r...@robspanton.com, seceng-idm-qe-l...@redhat.com,
                    swhit...@redhat.com, thibault.no...@gmail.com,
                    tmlc...@redhat.com, trond.daniel...@gmail.com



Stack overflow issue was reported [1] in SREC parser in binutils.
Upstream patch that fixes this issue is at [2].

[1]: https://sourceware.org/bugzilla/show_bug.cgi?id=17510#c7
[2]:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=708d7d0d11f0f2d776171979aa3479e8e12a38a0

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=bHcxYEBDhk&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to