Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 635968 (CVE-2017-12456, CVE-2017-14333) - <sys-devel/binutils-2.29.1-r1: Multiple vulnerabilities (CVE-2017-{12456,14333})
Summary: <sys-devel/binutils-2.29.1-r1: Multiple vulnerabilities (CVE-2017-{12456,14333})
Status: RESOLVED FIXED
Alias: CVE-2017-12456, CVE-2017-14333
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A3 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-10-31 01:03 UTC by GLSAMaker/CVETool Bot
Modified: 2018-04-29 20:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2017-10-31 01:03:31 UTC
CVE-2017-14333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14333):
  The process_version_sections function in readelf.c in GNU Binutils 2.29
  allows attackers to cause a denial of service (Integer Overflow, and hang
  because of a time-consuming loop) or possibly have unspecified other impact
  via a crafted binary file with invalid values of ent.vn_next, during
  "readelf -a" execution.

CVE-2017-12456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12456):
  The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils
  2.29 and earlier allows remote attackers to cause an out of bounds heap read
  via a crafted binary file.
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-31 01:08:05 UTC
@Maintainers please call for stabilization when ready or let us know.

Thank you
Comment 2 Andreas K. Hüttel gentoo-dev 2017-11-17 00:22:37 UTC
(In reply to GLSAMaker/CVETool Bot from comment #0)
> CVE-2017-14333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14333):
>   The process_version_sections function in readelf.c in GNU Binutils 2.29
>   allows attackers to cause a denial of service (Integer Overflow, and hang
>   because of a time-consuming loop) or possibly have unspecified other impact
>   via a crafted binary file with invalid values of ent.vn_next, during
>   "readelf -a" execution.

Fixed in sys-devel/binutils-2.29.1-r1

> 
> CVE-2017-12456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12456):
>   The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils
>   2.29 and earlier allows remote attackers to cause an out of bounds heap
> read
>   via a crafted binary file.

Fixed in sys-devel/binutils-2.29.1-r1
Comment 3 Andreas K. Hüttel gentoo-dev 2017-12-27 22:48:51 UTC
All affected versions are masked. No further cleanup (toolchain package). 

Nothing to do for toolchain here anymore. Please proceed.
Comment 4 D'juan McDonald (domhnall) 2018-01-05 06:49:35 UTC
Added to existing GLSA request.


Gentoo Security Padawan
(Jmbailey/mbailey_j)
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2018-01-07 23:12:55 UTC
This issue was resolved and addressed in
 GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01
by GLSA coordinator Aaron Bauman (b-man).
Comment 6 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-01-07 23:14:21 UTC
Re-opened to track masked vulnerable versions.