Bug ID | 1037057 |
---|---|
Summary | VUL-0: CVE-2017-8393: binutils: libbfd: global-buffer-overflow in objcopy (SHT_REL/SHR_RELA sections) |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.2 |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | mikhail.kasimov@gmail.com |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
Created attachment 723325 [details] 21412_upstream_crash_info Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8393 =================================================== Description The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash. =================================================== Hyperlink [1] https://sourceware.org/bugzilla/show_bug.cgi?id=21412 [2] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bce964aa6c777d236fbd641f2bc7bb931cfe4bf3 (see https://sourceware.org/bugzilla/show_bug.cgi?id=21412#c3) (open-)SUSE: https://software.opensuse.org/package/binutils 2.28 (TW, official repo) 2.26.1 (42.{1,2}, official repo)