Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 635968 (CVE-2017-12456, CVE-2017-14333)

Summary: <sys-devel/binutils-2.29.1-r1: Multiple vulnerabilities (CVE-2017-{12456,14333})
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: arthur
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: A3 [glsa+ cve]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2017-10-31 01:03:31 UTC
CVE-2017-14333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14333):
  The process_version_sections function in readelf.c in GNU Binutils 2.29
  allows attackers to cause a denial of service (Integer Overflow, and hang
  because of a time-consuming loop) or possibly have unspecified other impact
  via a crafted binary file with invalid values of ent.vn_next, during
  "readelf -a" execution.

CVE-2017-12456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12456):
  The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils
  2.29 and earlier allows remote attackers to cause an out of bounds heap read
  via a crafted binary file.
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-31 01:08:05 UTC
@Maintainers please call for stabilization when ready or let us know.

Thank you
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2017-11-17 00:22:37 UTC
(In reply to GLSAMaker/CVETool Bot from comment #0)
> CVE-2017-14333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14333):
>   The process_version_sections function in readelf.c in GNU Binutils 2.29
>   allows attackers to cause a denial of service (Integer Overflow, and hang
>   because of a time-consuming loop) or possibly have unspecified other impact
>   via a crafted binary file with invalid values of ent.vn_next, during
>   "readelf -a" execution.

Fixed in sys-devel/binutils-2.29.1-r1

> 
> CVE-2017-12456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12456):
>   The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils
>   2.29 and earlier allows remote attackers to cause an out of bounds heap
> read
>   via a crafted binary file.

Fixed in sys-devel/binutils-2.29.1-r1
Comment 3 Andreas K. Hüttel archtester gentoo-dev 2017-12-27 22:48:51 UTC
All affected versions are masked. No further cleanup (toolchain package). 

Nothing to do for toolchain here anymore. Please proceed.
Comment 4 D'juan McDonald (domhnall) 2018-01-05 06:49:35 UTC
Added to existing GLSA request.


Gentoo Security Padawan
(Jmbailey/mbailey_j)
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2018-01-07 23:12:55 UTC
This issue was resolved and addressed in
 GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01
by GLSA coordinator Aaron Bauman (b-man).
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2018-01-07 23:14:21 UTC
Re-opened to track masked vulnerable versions.