First published: Thu Jan 15 2015(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Debian Debian Linux | =7.0 | |
GNU Binutils | <=2.24 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/binutils-mingw-w64 | 8.11 10.4 12 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8738 is a vulnerability in the _bfd_slurp_extended_name_table function in GNU binutils 2.24 and earlier that allows remote attackers to cause a denial of service.
CVE-2014-8738 affects Ubuntu binutils packages with versions 2.20.1-3ubuntu7.2, 2.22-6ubuntu1.2, 2.24-5ubuntu3.1, and 2.24.90.20141014-0ubuntu3.1.
CVE-2014-8738 affects Debian binutils and binutils-mingw-w64 packages with various versions.
To fix CVE-2014-8738, update to binutils version 2.31.1-16 or later on Debian and apply the recommended updates for affected Ubuntu binutils versions.
You can find more information about CVE-2014-8738 at the following references: [link1](http://www.openwall.com/lists/oss-security/2014/11/02/4), [link2](http://www.openwall.com/lists/oss-security/2014/11/05/7), [link3](http://www.openwall.com/lists/oss-security/2014/11/13/2).