Bug 1162621 (CVE-2014-8504)
| Summary: | CVE-2014-8504 binutils: stack overflow in the SREC parser | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> | ||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||
| Severity: | low | Docs Contact: | |||||||
| Priority: | low | ||||||||
| Version: | unspecified | CC: | dan, dhowells, erik-fedora, fedora-mingw, jakub, kalevlember, kanderso, law, lkundrak, mhlavink, mnewsome, mprchlik, nickc, nobody+bgollahe, ohudlick, pfrankli, rjones, rob, seceng-idm-qe-list, swhiteho, thibault.north, trond.danielsen | ||||||
| Target Milestone: | --- | Keywords: | Security | ||||||
| Target Release: | --- | ||||||||
| Hardware: | All | ||||||||
| OS: | Linux | ||||||||
| Whiteboard: | |||||||||
| Fixed In Version: | binutils 2.25 | Doc Type: | Bug Fix | ||||||
| Doc Text: |
A stack-based buffer overflow flaw was found in the SREC parser of the libbfd library. A specially crafted file could cause an application using the libbfd library to crash or, potentially, execute arbitrary code with the privileges of the user running that application.
|
Story Points: | --- | ||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2019-06-08 02:35:54 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Bug Depends On: | 1162622, 1162623, 1162624, 1162625, 1162626, 1162627, 1162628, 1162629, 1162630, 1168281, 1168302, 1172710 | ||||||||
| Bug Blocks: | 1156276, 1210268 | ||||||||
| Attachments: |
|
||||||||
|
Description
Vasyl Kaigorodov
2014-11-11 11:38:55 UTC
Created mingw-binutils tracking bugs for this issue: Affects: fedora-all [bug 1162626] Affects: epel-all [bug 1162630] Created avr-binutils tracking bugs for this issue: Affects: fedora-all [bug 1162623] Affects: epel-all [bug 1162628] Created arm-none-eabi-binutils-cs tracking bugs for this issue: Affects: fedora-all [bug 1162622] Created msp430-binutils tracking bugs for this issue: Affects: fedora-all [bug 1162627] Created cross-binutils tracking bugs for this issue: Affects: fedora-all [bug 1162625] Affects: epel-all [bug 1162629] Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1162624] Statement: Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. arm-none-eabi-binutils-cs-2014.05.28-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. avr-binutils-2.24-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. avr-binutils-2.24-4.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. arm-none-eabi-binutils-cs-2014.05.28-3.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. avr-binutils-2.24-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. arm-none-eabi-binutils-cs-2014.05.28-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. Reproducer for this is available at http://lcamtuf.coredump.cx/strings-stack-overflow - just run "strings" utility on that crafted file. Created attachment 1043598 [details]
Patch imported from PR 17510
Created attachment 1043599 [details]
Corrupt SREC file
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2079 https://rhn.redhat.com/errata/RHSA-2015-2079.html |