Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 629922 (CVE-2017-14128, CVE-2017-14129, CVE-2017-14130) - <sys-devel/binutils-2.29.1 : Multiple Denial of Service Vulnerabilities
Summary: <sys-devel/binutils-2.29.1 : Multiple Denial of Service Vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-14128, CVE-2017-14129, CVE-2017-14130
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://sourceware.org/bugzilla/show_...
Whiteboard: A3 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-09-05 00:14 UTC by D'juan McDonald (domhnall)
Modified: 2018-01-07 23:11 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2017-09-05 00:14:40 UTC
From ${URL}:

The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14128

The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14129

The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14130
Comment 1 D'juan McDonald (domhnall) 2017-09-05 01:06:26 UTC
CVE-2017-14130:( Proposed Patch 3/3
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
)

CVE-2017-14129:( Proposed Patch 2/3
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
)

CVE-2017-14128:( Proposed Patch 1/3
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
)

@maintainer(s), upstream closed this rather quickly on #21787, hope same happens here. Call stable if needed.

Daj Uan (jmbailey/mbailey_j)
Gentoo Security Padawan
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2017-10-03 22:39:17 UTC
This is fixed in 2.29.1
Comment 3 Andreas K. Hüttel archtester gentoo-dev 2017-12-27 22:51:41 UTC
All affected versions are masked. No further cleanup (toolchain package). 

Nothing to do for toolchain here anymore. Please proceed.
Comment 4 D'juan McDonald (domhnall) 2018-01-05 06:46:10 UTC
Added to existing GLSA request.


Gentoo Security Padawan
(Jmbailey/mbailey_j)
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2018-01-07 23:11:35 UTC
This issue was resolved and addressed in
 GLSA 201801-01 at https://security.gentoo.org/glsa/201801-01
by GLSA coordinator Aaron Bauman (b-man).