The bfd_mach_o_read_symtab_strtab function in bfd/mach-o.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted mach-o file. Upstream bug: https://sourceware.org/bugzilla/show_bug.cgi?id=21840 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8bdf0be19d2777565a8b1c88347f65d6a4b8c5fc
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1483604] Created mingw-binutils tracking bugs for this issue: Affects: epel-all [bug 1483603] Affects: fedora-all [bug 1483605]
The issues did not affect Red Hat Enterprise Linux 5, 6, 7 and devtools 4, 6 and 7. Red Hat does not ship binutils compiled with the --enable-targets=all configuration. Therefore, Product Security Team was not able to reproduce the issues.