Bug 902676 (CVE-2014-8485) - VUL-0: CVE-2014-8485: binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections()
Summary: VUL-0: CVE-2014-8485: binutils: lack of range checking leading to controlled ...
Status: RESOLVED FIXED
Alias: CVE-2014-8485
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Deadline: 2015-12-30
Assignee: Michael Matz
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/110181/
Whiteboard: maint:released:sle11-sp3:60333 CVSSv2...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-10-27 09:24 UTC by Sebastian Krahmer
Modified: 2016-09-08 20:23 UTC (History)
8 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2014-10-27 09:24:10 UTC
rh#1157276



References:
https://bugzilla.redhat.com/show_bug.cgi?id=1157276
Comment 1 Swamp Workflow Management 2014-10-27 23:00:44 UTC
bugbot adjusting priority
Comment 4 Richard Biener 2014-10-30 09:44:29 UTC
It looks like all binutils versions are affected, sles10-sp3 also contains
a binutils219 package that is affected (not sure if that is on the teradata
product).

SLE12 GA (and thus sles11-sp1-teradata after their binutils update) is
also affected.

I suppose this requires multiple updates.

Micha - I'm not aware of any PTFs we did for binutils on the said products
or any other bugs we fixed but did not release a maint update sofar?
Comment 11 Michael Matz 2014-11-24 16:06:53 UTC
Still backporting the 40 patches to our old binutils versions :-/
Tomorrow hopefully.
Comment 12 Michael Matz 2014-11-25 16:50:56 UTC
Gnah, still need more time, the patchset keeps growing and growing :(
Comment 13 Johannes Segitz 2014-11-25 17:09:24 UTC
I'm away the next two days. Do you think you can submit till Friday?
Comment 14 Michael Matz 2014-11-26 15:59:38 UTC
Yes, that should be possible.  I think I have all patches together, but
they still result in some testsuite regressions right now, which I need to
look into.
Comment 15 Michael Matz 2014-11-27 17:34:30 UTC
Jeez!  I have now something for SLE11-SP3, at
  home:matz2:branches:SUSE:SLE-11-SP3:Update:Test.
It's fairly horrible, it essentially merges 44 relevant git
commits except for readelf and dwarf dumper, adds readelf and dwarf dumper by
upgrading to the newest master version (backporting patches for those two turned
out to be too error-prone), adjusts ELF headers and testsuite for the latter via
a further dozen patches.  And that's backporting from 2.25 to 2.23.1 only.
SLE10 will be much worse because that's 2.16.91-something.

I _really_ don't want to do that again for the SLE10 line, it's ridiculous for
this kind of non-problem.  I will consider SLE12 (the backport should be easier
there), as well as 13.1 (same as SLE12 essentially).  For factory I'll
update binutils to the newest branch.

I haven't yet submitted this as I wait for everything to build through, as
well as doing some more tests of other platforms than just x86_64.
Comment 16 Marcus Meissner 2014-12-01 14:46:10 UTC
I think we could leave sles10 out, given that sle10s audience is mostly server only usage these days, while this bug affects researchers and developers who are hopefully on newer OSes.
Comment 17 Michael Matz 2014-12-02 16:29:35 UTC
It's now SR 46895 for SLE11 SP3 (already accepted),
and MR 47036 for SLE12.
Comment 18 Swamp Workflow Management 2015-01-27 15:05:05 UTC
SUSE-SU-2015:0152-1: An update that fixes 8 vulnerabilities is now available.

Category: security (moderate)
Bug References: 902676,902677,903655,905735,905736
CVE References: CVE-2014-8484,CVE-2014-8485,CVE-2014-8501,CVE-2014-8502,CVE-2014-8503,CVE-2014-8504,CVE-2014-8737,CVE-2014-8738
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    binutils-2.24-7.1, cross-ppc-binutils-2.24-7.1, cross-spu-binutils-2.24-7.1
SUSE Linux Enterprise Server 12 (src):    binutils-2.24-7.1
SUSE Linux Enterprise Desktop 12 (src):    binutils-2.24-7.1
Comment 19 Swamp Workflow Management 2015-01-29 02:06:43 UTC
SUSE-SU-2015:0168-1: An update that fixes 8 vulnerabilities is now available.

Category: security (moderate)
Bug References: 902676,902677,903655,905735,905736
CVE References: CVE-2014-8484,CVE-2014-8485,CVE-2014-8501,CVE-2014-8502,CVE-2014-8503,CVE-2014-8504,CVE-2014-8737,CVE-2014-8738
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    binutils-2.23.1-0.23.15, cross-ppc-binutils-2.23.1-0.23.2, cross-spu-binutils-2.23.1-0.23.2
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    binutils-2.23.1-0.23.15
SUSE Linux Enterprise Server 11 SP3 (src):    binutils-2.23.1-0.23.15
SUSE Linux Enterprise Desktop 11 SP3 (src):    binutils-2.23.1-0.23.15
Comment 20 Marcus Meissner 2015-03-05 08:05:39 UTC
released
Comment 21 Swamp Workflow Management 2015-12-16 16:39:43 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-12-30.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62377
Comment 22 Tristan Ye 2016-02-05 03:38:09 UTC
Guys, was SLE11 SP1 also affected by this issue?
Comment 23 Marcus Meissner 2016-02-05 06:08:33 UTC
yes