Summary: | <sys-devel/binutils-2.29.1 : denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (CVE-2017-13757) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | D'juan McDonald (domhnall) <flopwiki> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://sourceware.org/bugzilla/show_bug.cgi?id=22018 | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
D'juan McDonald (domhnall)
2017-08-30 02:11:02 UTC
Upstream Bug:https://sourceware.org/bugzilla/show_bug.cgi?id=22018 Upstream Patch:https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a Fixed in 2.29.1 all supported arches: alpha, amd64, hppa, ppc, ppc64, x86 stabilized in bug 627166. @security, please enter the bug number 629344 in the CVE tracker, thank you. Gentoo Security Padawan (jmbailey/mbailey_j) All affected versions are masked. No further cleanup (toolchain package). Nothing to do for toolchain here anymore. Please proceed. Added to existing GLSA request. Gentoo Security Padawan (Jmbailey/mbailey_j) This issue was resolved and addressed in GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01 by GLSA coordinator Aaron Bauman (b-man). |