Bug 2330669 (CVE-2024-53589)

Summary: CVE-2024-53589 binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dfreiber, drow, dymurray, ibolton, jburrell, jmatthew, jmitchel, jmontleo, jtanner, kshier, pgaikwad, rjohnson, slucidi, sseago, vkumar, whayutin
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A buffer overflow vulnerability exists in GNU Binutils’ objdump utility when processing tekhex format files. During format identification, the vulnerability occurs in the Binary File Descriptor (BFD) library’s tekhex parser. A specially crafted tekhex file, when processed by objdump, may trigger an out-of-bounds read, leading to a denial of service or other undefined behavior.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-12-05 21:01:25 UTC
GNU objdump 2.43 is vulnerable to Buffer Overflow in the BFD (Binary File Descriptor) library's handling of tekhex format files.

Comment 2 Robb Gatica 2024-12-06 20:09:26 UTC
Fixed in commit: e0323071916878e0634a6e24d8250e4faff67e88