CVE-2014-8504

Publication date 9 December 2014

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.

Read the notes from the security team

Status

Package Ubuntu Release Status
binutils 14.10 utopic
Fixed 2.24.90.20141014-0ubuntu3.1
14.04 LTS trusty
Fixed 2.24-5ubuntu3.1
12.04 LTS precise
Fixed 2.22-6ubuntu1.2
10.04 LTS lucid
Fixed 2.20.1-3ubuntu7.2

Notes


sbeattie

buffer overflow is caught by fortify source, so DoS only

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
binutils