binutils-2.27-41.base.el7
エラータID: AXSA:2019-4165:01
リリース日:
2019/08/20 Tuesday - 04:51
題名:
binutils-2.27-41.base.el7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- binutilsには、objdump コマンドに整数オーバーフローがあるため、
ヒープオーバーフローの引き金となり、ローカルの攻撃者が任意のコードを実行
できてしまう脆弱性があります。(CVE-2018-1000876)
- binutilsには、NULLポインタデリファレンスが GNU libiberty の中に発見 された
ため、実行中にSEGVを起こす脆弱性があります。(CVE-2018-12697)
- binutilsには、GNU libiberty によって提供されるデマングリングする
C++関数の中でスタック枯渇を起こすため、攻撃者がサービス拒否を引き起こせる
脆弱性があります。(CVE-2018-12641)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2018-1000876
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
CVE-2018-12641
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.
CVE-2018-12697
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
追加情報:
N/A
ダウンロード:
SRPMS
- binutils-2.27-41.base.el7.src.rpm
MD5: 1f16413ad6f5e339930c0fabe26da28f
SHA-256: 96dfc5f8ee186fde030351e228f0104d837fe86b540c910e535d9f28da009d3c
Size: 24.40 MB
Asianux Server 7 for x86_64
- binutils-2.27-41.base.el7.x86_64.rpm
MD5: 3b60299d9ff7a99a0024b4eb7b8c62ae
SHA-256: f8dee6f8a1c7fc4676fb59165fc9bce2710a8a28c9a45c814de4a87732fe7855
Size: 5.90 MB - binutils-devel-2.27-41.base.el7.x86_64.rpm
MD5: fdf4d7a5fc9cd7e46c4b2f2e723802f6
SHA-256: 03fd1573ea17c17f226cb275ea3d4f3671c8f6938c009e9ab0e59d9546b1c8c2
Size: 878.15 kB - binutils-devel-2.27-41.base.el7.i686.rpm
MD5: 093b97cc82d3e9d9176fd11bfd2af1b4
SHA-256: e3407248a76231610ac572523b768e32ffe222aa9b26fd47b8343dfe94ff3950
Size: 917.68 kB