| Summary: | <sys-devel/binutils-2.29.1 : denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (CVE-2017-13757) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | D'juan McDonald (domhnall) <flopwiki> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://sourceware.org/bugzilla/show_bug.cgi?id=22018 | ||
| Whiteboard: | A3 [glsa cve] | ||
| Package list: | Runtime testing required: | --- | |
Upstream Bug:https://sourceware.org/bugzilla/show_bug.cgi?id=22018 Upstream Patch:https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a Fixed in 2.29.1 all supported arches: alpha, amd64, hppa, ppc, ppc64, x86 stabilized in bug 627166. @security, please enter the bug number 629344 in the CVE tracker, thank you. Gentoo Security Padawan (jmbailey/mbailey_j) All affected versions are masked. No further cleanup (toolchain package). Nothing to do for toolchain here anymore. Please proceed. Added to existing GLSA request. Gentoo Security Padawan (Jmbailey/mbailey_j) This issue was resolved and addressed in GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01 by GLSA coordinator Aaron Bauman (b-man). |
From ${URL}: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c. CVE Details:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13757