Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 792342 (CVE-2021-3530, CVE-2021-3549) - <sys-devel/binutils-2.37_p1 : Multiple vulnerabilities (CVE-2021-{3530,3549})
Summary: <sys-devel/binutils-2.37_p1 : Multiple vulnerabilities (CVE-2021-{3530,3549})
Status: RESOLVED FIXED
Alias: CVE-2021-3530, CVE-2021-3549
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://sourceware.org/bugzilla/show_...
Whiteboard: A3 [glsa+]
Keywords:
Depends on: binutils-2.37-stable
Blocks:
  Show dependency tree
 
Reported: 2021-05-27 00:00 UTC by Sam James
Modified: 2022-08-14 21:49 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-05-27 00:00:36 UTC
Description:
"An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability."
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-05-27 00:01:28 UTC
Which release is this in?
Comment 3 Hans Ulli Kroll 2021-05-27 16:54:36 UTC
$ git clone git://sourceware.org/git/binutils-gdb.git
$ cd binutils-gdb
$ git log binutils-2_36 --oneline | grep  "PR27290, PR27293, PR27295"
$ git log binutils-2_36_1 --oneline | grep  "PR27290, PR27293, PR27295"
$ git log master --oneline | grep  "PR27290, PR27293, PR27295"
1cfcf3004e1 PR27290, PR27293, PR27295, various avr objdump fixes
Comment 4 Hans Ulli Kroll 2021-05-27 17:17:21 UTC
for convenience

$ git format-patch 1cfcf3004e1~1..1cfcf3004e1
0001-PR27290-PR27293-PR27295-various-avr-objdump-fixes.patch
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-02 18:55:47 UTC
* CVE-2021-3530

Description:
"A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash."
Comment 6 NATTkA bot gentoo-dev 2021-07-29 17:22:09 UTC Comment hidden (obsolete)
Comment 7 NATTkA bot gentoo-dev 2021-07-29 17:30:22 UTC Comment hidden (obsolete)
Comment 8 NATTkA bot gentoo-dev 2021-07-29 17:38:19 UTC Comment hidden (obsolete)
Comment 9 NATTkA bot gentoo-dev 2021-07-29 17:46:27 UTC Comment hidden (obsolete)
Comment 10 NATTkA bot gentoo-dev 2021-07-29 18:02:25 UTC Comment hidden (obsolete)
Comment 11 NATTkA bot gentoo-dev 2021-07-29 18:10:42 UTC
Package list is empty or all packages have requested keywords.
Comment 12 Andreas K. Hüttel archtester gentoo-dev 2021-09-19 13:29:03 UTC
CVE-2021-3530

A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.

https://bugzilla.redhat.com/show_bug.cgi?id=1956423

I assume this is https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99935
(which is fixed in binutils-2.37)


CVE-2021-3549

An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.

https://sourceware.org/bugzilla/show_bug.cgi?id=27294

Fixed in binutils-2.37
Comment 13 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-06 15:48:18 UTC
Please cleanup.
Comment 14 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-06 15:48:53 UTC
(In reply to John Helmert III from comment #13)
> Please cleanup.

Er, sorry, this is toolchain@ so please handle as necessary :)
Comment 15 Larry the Git Cow gentoo-dev 2021-10-10 22:21:06 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=53686a56f9eaa50e8f549c92578a181d590c812f

commit 53686a56f9eaa50e8f549c92578a181d590c812f
Author:     Andreas K. Hüttel <dilfridge@gentoo.org>
AuthorDate: 2021-10-10 22:20:12 +0000
Commit:     Andreas K. Hüttel <dilfridge@gentoo.org>
CommitDate: 2021-10-10 22:20:55 +0000

    package.mask: extend binutils mask to <2.37_p1
    
    Bug: https://bugs.gentoo.org/792342
    Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>

 profiles/package.mask | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Comment 16 Andreas K. Hüttel archtester gentoo-dev 2021-10-10 22:21:31 UTC
No cleanup, but all affected are masked now.
Comment 17 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-14 05:11:03 UTC
GLSA request filed
Comment 18 Larry the Git Cow gentoo-dev 2022-08-14 21:48:36 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=1d8cf0a3e06fbdd4dd76f179edfa141b674a0968

commit 1d8cf0a3e06fbdd4dd76f179edfa141b674a0968
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-08-14 21:47:19 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2022-08-14 21:48:21 +0000

    [ GLSA 202208-30 ] GNU Binutils: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/778545
    Bug: https://bugs.gentoo.org/792342
    Bug: https://bugs.gentoo.org/829304
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Sam James <sam@gentoo.org>

 glsa-202208-30.xml | 61 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 61 insertions(+)
Comment 19 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-08-14 21:49:12 UTC
GLSA done, all done.