Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 230593 (CVE-2008-2310) - sys-devel/binutils < 2.18-r3 c++filt demangle_it() Format String Vulnerability (CVE-2008-2310)
Summary: sys-devel/binutils < 2.18-r3 c++filt demangle_it() Format String Vulnerabilit...
Status: RESOLVED FIXED
Alias: CVE-2008-2310
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Toolchain Maintainers
URL: http://sourceware.org/ml/binutils/200...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-07-03 00:31 UTC by Robert Buchholz (RETIRED)
Modified: 2008-08-20 02:56 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-07-03 00:31:20 UTC
CVE-2008-2310 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2310):
  Format string vulnerability in c++filt in Apple Mac OS X 10.5 before 10.5.4
  allows user-assisted attackers to execute arbitrary code or cause a denial of
  service (application crash) via a crafted string in (1) C++ or (2) Java
  source code.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-07-03 00:33:54 UTC
Apple writes:

http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html

Impact: Passing a maliciously crafted string to c++filt may lead to an
unexpected application termination or arbitrary code execution

Description: A format string issue exists in c++filt, which is a
debugging tool used to demangle C++ and Java symbols. Passing a
maliciously crafted string to c++filt may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved handling of format strings. This
issue does not affect systems prior to Mac OS X 10.5.


Patch:
http://sourceware.org/ml/binutils/2007-11/msg00221.html
http://sourceware.org/cgi-bin/cvsweb.cgi/src/binutils/cxxfilt.c.diff?r1=1.14&r2=1.15&cvsroot=src
Comment 2 Mark Loeser (RETIRED) gentoo-dev 2008-07-05 14:25:16 UTC
sys-devel/binutils-2.18-r3 has been added to the tree
Comment 3 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-07-06 18:29:36 UTC
arches, please test and mark stable sys-devel/binutils-2.18-r3. 
Target KEYWORDS: "alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
Comment 4 Christian Faulhammer (RETIRED) gentoo-dev 2008-07-06 18:59:57 UTC
Are test failures expected?
Comment 5 Mark Loeser (RETIRED) gentoo-dev 2008-07-06 23:04:47 UTC
Any new failures between the new version and the last stable?  That one failed tests as well.  I'll try and make the tests useful at some point, but that will take some time.
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2008-07-06 23:44:14 UTC
Stable for HPPA.
Comment 7 Brent Baude (RETIRED) gentoo-dev 2008-07-07 03:46:13 UTC
ppc and ppc64 done
Comment 8 Christian Faulhammer (RETIRED) gentoo-dev 2008-07-07 08:48:31 UTC
x86 stable
Comment 9 Raúl Porcel (RETIRED) gentoo-dev 2008-07-07 11:52:42 UTC
alpha/ia64/sparc stable
Comment 10 Markus Meier gentoo-dev 2008-07-07 21:35:31 UTC
amd64 stable
Comment 11 Robert Buchholz (RETIRED) gentoo-dev 2008-07-08 00:35:39 UTC
glsa request filed
Comment 12 SpanKY gentoo-dev 2008-07-16 11:10:41 UTC
security team has already decided in the past to not do glsa's for toolchain, and there's no reason to start now