CVE-2017-15023

NameCVE-2017-15023
Descriptionread_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
binutils (PTS)jessie, jessie (lts)2.25-5+deb8u2vulnerable
stretch (lts), stretch2.28-5+deb9u1vulnerable
buster, buster (lts)2.31.1-16+deb10u1fixed
bullseye2.35.2-2fixed
bookworm2.40-2fixed
sid, trixie2.43.1-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
binutilssourceexperimental2.29.51.20171128-1
binutilssource(unstable)2.29.90.20180122-1low

Notes

[stretch] - binutils <ignored> (Minor issue)
[jessie] - binutils <ignored> (Minor issue)
[wheezy] - binutils <ignored> (Minor issue)
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
When this issue is fixed it is to make sure to not open CVE-2017-15939, i.e.
not to apply the incomplete fix. See notes on CVE-2017-15939

Search for package or bug name: Reporting problems