Name | CVE-2017-15023 |
Description | read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
binutils (PTS) | jessie, jessie (lts) | 2.25-5+deb8u2 | vulnerable |
| stretch (lts), stretch | 2.28-5+deb9u1 | vulnerable |
| buster, buster (lts) | 2.31.1-16+deb10u1 | fixed |
| bullseye | 2.35.2-2 | fixed |
| bookworm | 2.40-2 | fixed |
| trixie | 2.43.50.20241215-1 | fixed |
| sid | 2.43.50.20241221-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
binutils | source | experimental | 2.29.51.20171128-1 | | | |
binutils | source | (unstable) | 2.29.90.20180122-1 | low | | |
Notes
[stretch] - binutils <ignored> (Minor issue)
[jessie] - binutils <ignored> (Minor issue)
[wheezy] - binutils <ignored> (Minor issue)
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
When this issue is fixed it is to make sure to not open CVE-2017-15939, i.e.
not to apply the incomplete fix. See notes on CVE-2017-15939