Back to bug 2033715
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-12-17 17:02:40 UTC | Depends On | 2033717, 2033716 | |
| Guilherme de Almeida Suckevicz | 2021-12-17 17:02:49 UTC | Blocks | 2033719 | |
| Sandipan Roy | 2021-12-20 06:43:12 UTC | Fixed In Version | binutils 2.38 | |
| Sandipan Roy | 2021-12-20 06:44:38 UTC | Depends On | 2034108, 2034106, 2034105, 2034104, 2034103, 2034107 | |
| Sandipan Roy | 2021-12-20 06:49:44 UTC | Depends On | 2034110, 2034112, 2034109, 2034111 | |
| Sandipan Roy | 2021-12-20 06:56:58 UTC | Doc Text | An out-of-bounds flaw was found in binutils’ stabs functionality. The attack needs to be initiated locally where an attacker could convince a victim to read a specially crafted file that is processed by objdump, leading to the disclosure of memory and possibly leading to the execution of arbitrary code or causing the utility to crash. | |
| Red Hat Bugzilla | 2022-02-22 06:37:30 UTC | CC | jnakfour | |
| Red Hat Bugzilla | 2023-07-07 08:30:28 UTC | Assignee | security-response-team | nobody |
| Carlos O'Donell | 2023-07-09 12:57:33 UTC | CC | mnewsome |
Back to bug 2033715