Red Hat Bugzilla – Bug 1435303
CVE-2017-7227 binutils: Heap-based buffer overflow in ld due to missing null termination
Last modified: 2017-03-23 10:14:58 EDT
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l. Upstream bug: https://sourceware.org/bugzilla/show_bug.cgi?id=20906 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=406bd128dba2a59d0736839fc87a59bce319076c
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1435308] Created mingw-binutils tracking bugs for this issue: Affects: epel-all [bug 1435309] Affects: fedora-all [bug 1435307]