Red Hat Bugzilla – Bug 164666
CAN-2005-1704 Integer overflow in the Binary File Descriptor (BFD) library
Last modified: 2007-11-30 17:06:54 EST
+++ This bug was initially created as a clone of Bug #159894 +++
Integer overflow in the BFD library for binutils allows attackers to
execute arbitrary code via a crafted object file that specifies a large number
of section headers, leading to a heap-based buffer overflow.
This is the place holder for RHEL2.1, the parent bug is for RHEL4 U2.
I recall you telling me that the RHEL2.1 code is very different and the backport
will be very difficult. Any status on this issue for RHEL2.1?
Ok, the rest is now backported, and binutils-188.8.131.52.8-12.5
in dist-2.1AS-errata-candidate. WIll need extra QA care though, as
I had to basically rewrite most of the patches from scratch (with around 80%
of rejects I can't speak about applying patches).
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.