Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200506-01 ] Binutils, elfutils: Buffer overflow
Date: Wed, 01 Jun 2005 15:12:45
Message-Id: 200506011709.39513.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200506-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Binutils, elfutils: Buffer overflow
9 Date: June 01, 2005
10 Bugs: #91398, #91817
11 ID: 200506-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Various utilities from the GNU Binutils and elfutils packages are
19 vulnerable to a heap based buffer overflow, potentially resulting in
20 the execution of arbitrary code.
21
22 Background
23 ==========
24
25 The GNU Binutils are a collection of tools to create, modify and
26 analyse binary files. Many of the files use BFD, the Binary File
27 Descriptor library, to do low-level manipulation. Elfutils provides a
28 library and utilities to access, modify and analyse ELF objects.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 dev-libs/elfutils < 0.108 >= 0.108
37 2 sys-devel/binutils < 2.16-r1 *>= 2.14.90.0.8-r3
38 *>= 2.15.90.0.1.1-r5
39 *>= 2.15.90.0.3-r5
40 *>= 2.15.91.0.2-r2
41 *>= 2.15.92.0.2-r10
42 >= 2.16-r1
43 -------------------------------------------------------------------
44 2 affected packages on all of their supported architectures.
45 -------------------------------------------------------------------
46
47 Description
48 ===========
49
50 Tavis Ormandy and Ned Ludd of the Gentoo Linux Security Audit Team
51 discovered an integer overflow in the BFD library and elfutils,
52 resulting in a heap based buffer overflow.
53
54 Impact
55 ======
56
57 Successful exploitation would require a user to access a specially
58 crafted binary file, resulting in the execution of arbitrary code.
59
60 Workaround
61 ==========
62
63 There is no known workaround at this time.
64
65 Resolution
66 ==========
67
68 All GNU Binutils users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose sys-devel/binutils
72
73 All elfutils users should upgrade to the latest version:
74
75 # emerge --sync
76 # emerge --ask --oneshot --verbose ">=dev-libs/elfutils-0.108"
77
78 Availability
79 ============
80
81 This GLSA and any updates to it are available for viewing at
82 the Gentoo Security Website:
83
84 http://security.gentoo.org/glsa/glsa-200506-01.xml
85
86 Concerns?
87 =========
88
89 Security is a primary focus of Gentoo Linux and ensuring the
90 confidentiality and security of our users machines is of utmost
91 importance to us. Any security concerns should be addressed to
92 security@g.o or alternatively, you may file a bug at
93 http://bugs.gentoo.org.
94
95 License
96 =======
97
98 Copyright 2005 Gentoo Foundation, Inc; referenced text
99 belongs to its owner(s).
100
101 The contents of this document are licensed under the
102 Creative Commons - Attribution / Share Alike license.
103
104 http://creativecommons.org/licenses/by-sa/2.0