Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1573356 - (CVE-2018-10372) CVE-2018-10372 binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_index() allows for denial of service via crafted file
CVE-2018-10372 binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180414,reported=2...
: Security
Depends On: 1573357 1573359 1573360 1573358 1579051
Blocks: 1573371
  Show dependency treegraph
 
Reported: 2018-04-30 22:08 EDT by Sam Fowler
Modified: 2018-10-30 03:24 EDT (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3032 None None None 2018-10-30 03:24 EDT

  None (edit)
Description Sam Fowler 2018-04-30 22:08:22 EDT
GNU Binutils through version 2.30 has a heap-based buffer over-read vulnerability in dwarf.c:process_cu_tu_index(). An attacker could exploit this to crash the readelf application  by providing a binary file.


Upstream Issue:

https://sourceware.org/bugzilla/show_bug.cgi?id=23064


Upstream Patch:

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6aea08d9f3e3d6475a65454da488a0c51f5dc97d
Comment 1 Sam Fowler 2018-04-30 22:09:19 EDT
Created binutils tracking bugs for this issue:

Affects: fedora-all [bug 1573359]


Created mingw-binutils tracking bugs for this issue:

Affects: epel-all [bug 1573358]
Affects: fedora-all [bug 1573357]
Comment 3 Pedro Yóssis Silva Barbosa 2018-05-16 17:37:41 EDT
For RHEL 7, the heap overflow in the memcpy is detected and mitigated by fortify source. Also, the overflowed area is less than 8 bytes.
Comment 5 errata-xmlrpc 2018-10-30 03:24:04 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3032 https://access.redhat.com/errata/RHSA-2018:3032

Note You need to log in before you can comment on or make changes to this bug.