Summary: | <sys-devel/binutils-2.29.1-r1: remote denial of service via crafted ELF file | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Aleksandr Wagner (Kivak) <alwag> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | floppym |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Aleksandr Wagner (Kivak)
2017-10-30 00:42:10 UTC
How is this a *remote* DOS if it requires reading an ELF file? That's something I don't understand either... In master, will be in 2.30; patch added to gentoo/binutils-2.29.1 branch All affected versions are masked. No further cleanup (toolchain package). Nothing to do for toolchain here anymore. Please proceed. Added to existing GLSA request. Gentoo Security Padawan (Jmbailey/mbailey_j) This issue was resolved and addressed in GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01 by GLSA coordinator Aaron Bauman (b-man). |