Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 624702 (CVE-2017-9954) - <sys-devel/binutils-2.28.1: stack-based buffer over-read in getvalue function
Summary: <sys-devel/binutils-2.28.1: stack-based buffer over-read in getvalue function
Status: RESOLVED FIXED
Alias: CVE-2017-9954
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A3 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-07-12 15:17 UTC by Agostino Sarubbo
Modified: 2017-09-17 15:32 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-07-12 15:17:56 UTC
From ${URL} :

The getvalue function in tekhex.c in the Binary File Descriptor (BFD)
library (aka libbfd), as distributed in GNU Binutils 2.28, allows
attackers to cause a denial of service (stack-based buffer
over-read and application crash) via a crafted tekhex file, as
demonstrated by mishandling within the nm program.

Upstream bug:

https://sourceware.org/bugzilla/show_bug.cgi?id=21670

Upstream patch:

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=04e15b4a9462cb1ae819e878a6009829aab8020b


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthias Maier gentoo-dev 2017-08-02 00:15:02 UTC
commit cf5003fe2fc3b45f366d0a3c6fdf834ed9d54321
Author: Matthias Maier <tamiko@gentoo.org>
Date:   Tue Aug 1 19:05:14 2017 -0500

    sys-devel/binutils: version bump to 2.28.1, patchset 1.0
    
    Includes fixes for bugs #622036 #622500 #622886 #624524 #624702
    
    Package-Manager: Portage-2.3.6, Repoman-2.3.3
Comment 2 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-09-07 02:25:55 UTC
@Maintainers could you please confirm if we need to stabilize or should we proceed with cleanup?

Thanks

Gentoo Security Padawan
ChrisADR
Comment 3 Andreas K. Hüttel archtester gentoo-dev 2017-09-15 18:58:15 UTC
All vulnerable versions are masked. No cleanup (toolchain package).
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2017-09-17 15:32:13 UTC
This issue was resolved and addressed in
 GLSA 201709-02 at https://security.gentoo.org/glsa/201709-02
by GLSA coordinator Aaron Bauman (b-man).