The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution. Upstream bug: https://sourceware.org/bugzilla/show_bug.cgi?id=21990 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=452bf675ea772002aa86fb1d28f3474da70ee1de References: https://bugzilla.novell.com/show_bug.cgi?id=1058480 http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14333.html
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1492130] Created mingw-binutils tracking bugs for this issue: Affects: epel-all [bug 1492131]