First published: Fri Oct 24 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <=2.24 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
redhat/binutils | <2.25 | 2.25 |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/binutils-mingw-w64 | 8.11 10.4 12 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=bd25671c6f202c4a5108883caa2adb24ff6f361f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2014-8484.
The title of this vulnerability is 'srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.'
The severity level of CVE-2014-8484 is medium (4).
The affected software versions are binutils 2.25 (Ubuntu), binutils 2.20.1-3ubuntu7.2 (Ubuntu), binutils 2.22-6ubuntu1.2 (Ubuntu), binutils 2.24-5ubuntu3.1 (Ubuntu), binutils 2.25 (Red Hat), binutils 2.31.1-16, 2.35.2-2, 2.40-2, 2.41-5 (Debian), binutils-mingw-w64 8.3, 8.11, 10.4, 11+nmu1 (Debian).
To fix the vulnerability CVE-2014-8484, you should update the affected software to binutils version 2.25 or apply the corresponding patches provided by the vendor.