Bug 1483582 (CVE-2017-12450) - CVE-2017-12450 binutils: out of bounds heap write in alpha_vms_object_p function
Summary: CVE-2017-12450 binutils: out of bounds heap write in alpha_vms_object_p function
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-12450
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1483603 1483604 1483605
Blocks: 1483587
TreeView+ depends on / blocked
 
Reported: 2017-08-21 12:43 UTC by Adam Mariš
Modified: 2019-09-29 14:19 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-09-22 12:28:29 UTC


Attachments (Terms of Use)

Description Adam Mariš 2017-08-21 12:43:58 UTC
The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File
Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils
2.29 and earlier, allows remote attackers to cause an out of bounds
heap write and possibly achieve code execution via a crafted vms alpha
file.

Upstream bug:

https://sourceware.org/bugzilla/show_bug.cgi?id=21813

Upstream patches:

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ca4cf9b9c622a5695e01f7f5815a7382a31fcf51
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8a2df5e2df374289e00ecd8f099eb46d76ef982e

Comment 1 Adam Mariš 2017-08-21 13:14:43 UTC
Created binutils tracking bugs for this issue:

Affects: fedora-all [bug 1483604]


Created mingw-binutils tracking bugs for this issue:

Affects: epel-all [bug 1483603]
Affects: fedora-all [bug 1483605]

Comment 2 Pedro Yóssis Silva Barbosa 2017-09-22 12:28:29 UTC
Marked binutils in Red Hat Enterprise Linux 5, 6, 7 and devtools 4, 6 and 7, as not affected.
Red Hat does not ship binutils compiled with the --enable-targets=all configuration. Therefore, Product Security Team was not able to reproduce the issues.


Note You need to log in before you can comment on or make changes to this bug.