binutils-2.27-41.base.el7

エラータID: AXSA:2019-4165:01

Release date: 
Tuesday, August 20, 2019 - 04:51
Subject: 
binutils-2.27-41.base.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

Security Fix(es):

* binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876)

* binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641)

* binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. (CVE-2018-12697)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2018-1000876
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
CVE-2018-12641
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.
CVE-2018-12697
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. binutils-2.27-41.base.el7.src.rpm
    MD5: 1f16413ad6f5e339930c0fabe26da28f
    SHA-256: 96dfc5f8ee186fde030351e228f0104d837fe86b540c910e535d9f28da009d3c
    Size: 24.40 MB

Asianux Server 7 for x86_64
  1. binutils-2.27-41.base.el7.x86_64.rpm
    MD5: 3b60299d9ff7a99a0024b4eb7b8c62ae
    SHA-256: f8dee6f8a1c7fc4676fb59165fc9bce2710a8a28c9a45c814de4a87732fe7855
    Size: 5.90 MB
  2. binutils-devel-2.27-41.base.el7.x86_64.rpm
    MD5: fdf4d7a5fc9cd7e46c4b2f2e723802f6
    SHA-256: 03fd1573ea17c17f226cb275ea3d4f3671c8f6938c009e9ab0e59d9546b1c8c2
    Size: 878.15 kB
  3. binutils-devel-2.27-41.base.el7.i686.rpm
    MD5: 093b97cc82d3e9d9176fd11bfd2af1b4
    SHA-256: e3407248a76231610ac572523b768e32ffe222aa9b26fd47b8343dfe94ff3950
    Size: 917.68 kB