First published: Sun Oct 26 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
GNU Binutils | <=2.24 | |
redhat/binutils | <2.25 | 2.25 |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/binutils-mingw-w64 | 8.11 10.4 12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8485 is a vulnerability in the setup_group function in libbfd in GNU binutils 2.24 and earlier that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
CVE-2014-8485 affects GNU binutils versions 2.20.1-3ubuntu7.2, 2.22-6ubuntu1.2, 2.24-5ubuntu3.1, and 2.24.90.20141014-0ubuntu3.1, as well as Red Hat binutils version 2.25.
CVE-2014-8485 has a severity level of medium.
To fix CVE-2014-8485, you should update your GNU binutils package to version 2.25 or later.
You can find more information about CVE-2014-8485 in the references provided: http://www.openwall.com/lists/oss-security/2014/10/26/2, http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html, https://bugzilla.redhat.com/show_bug.cgi?id=1157276