The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c. Upstream bug: https://sourceware.org/bugzilla/show_bug.cgi?id=21787 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=909e4e716c4d77e33357bbe9bc902bfaf2e1af24
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1483604] Created mingw-binutils tracking bugs for this issue: Affects: epel-all [bug 1483603] Affects: fedora-all [bug 1483605]
Marked binutils in RHEL 5, 6, 7 and devtools 4, 6 and 7, as not affected. Red Hat does not ship binutils compiled with the --enable-targets=all configuration. Therefore, Product Security Team was not able to reproduce the issue.