https://bugzilla.redhat.com/show_bug.cgi?id=1250129



--- Comment #6 from Stefan Cornelius <scorn...@redhat.com> ---
For RHEL5/6/7/Fedora, the stack-based buffer overflow is detected and mitigated
by fortify source. Thus, the worst outcome should be a mere crash/application
abort. It should not be possible to exploit this flaw to gain code execution.

Statement:

This issue affects the versions of binutils as shipped with Red Hat Enterprise
Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Low
security impact. For additional information, refer to the Issue Severity
Classification: https://access.redhat.com/security/updates/classification/.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=0dJOMByior&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to