Bugzilla – Bug 902676
VUL-0: CVE-2014-8485: binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections()
Last modified: 2016-09-08 20:23:31 UTC
rh#1157276 References: https://bugzilla.redhat.com/show_bug.cgi?id=1157276
bugbot adjusting priority
Upstream fix: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=493a33860c71cac998f1a56d6d87d6faa801fbaa
It looks like all binutils versions are affected, sles10-sp3 also contains a binutils219 package that is affected (not sure if that is on the teradata product). SLE12 GA (and thus sles11-sp1-teradata after their binutils update) is also affected. I suppose this requires multiple updates. Micha - I'm not aware of any PTFs we did for binutils on the said products or any other bugs we fixed but did not release a maint update sofar?
Still backporting the 40 patches to our old binutils versions :-/ Tomorrow hopefully.
Gnah, still need more time, the patchset keeps growing and growing :(
I'm away the next two days. Do you think you can submit till Friday?
Yes, that should be possible. I think I have all patches together, but they still result in some testsuite regressions right now, which I need to look into.
Jeez! I have now something for SLE11-SP3, at home:matz2:branches:SUSE:SLE-11-SP3:Update:Test. It's fairly horrible, it essentially merges 44 relevant git commits except for readelf and dwarf dumper, adds readelf and dwarf dumper by upgrading to the newest master version (backporting patches for those two turned out to be too error-prone), adjusts ELF headers and testsuite for the latter via a further dozen patches. And that's backporting from 2.25 to 2.23.1 only. SLE10 will be much worse because that's 2.16.91-something. I _really_ don't want to do that again for the SLE10 line, it's ridiculous for this kind of non-problem. I will consider SLE12 (the backport should be easier there), as well as 13.1 (same as SLE12 essentially). For factory I'll update binutils to the newest branch. I haven't yet submitted this as I wait for everything to build through, as well as doing some more tests of other platforms than just x86_64.
I think we could leave sles10 out, given that sle10s audience is mostly server only usage these days, while this bug affects researchers and developers who are hopefully on newer OSes.
It's now SR 46895 for SLE11 SP3 (already accepted), and MR 47036 for SLE12.
SUSE-SU-2015:0152-1: An update that fixes 8 vulnerabilities is now available. Category: security (moderate) Bug References: 902676,902677,903655,905735,905736 CVE References: CVE-2014-8484,CVE-2014-8485,CVE-2014-8501,CVE-2014-8502,CVE-2014-8503,CVE-2014-8504,CVE-2014-8737,CVE-2014-8738 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): binutils-2.24-7.1, cross-ppc-binutils-2.24-7.1, cross-spu-binutils-2.24-7.1 SUSE Linux Enterprise Server 12 (src): binutils-2.24-7.1 SUSE Linux Enterprise Desktop 12 (src): binutils-2.24-7.1
SUSE-SU-2015:0168-1: An update that fixes 8 vulnerabilities is now available. Category: security (moderate) Bug References: 902676,902677,903655,905735,905736 CVE References: CVE-2014-8484,CVE-2014-8485,CVE-2014-8501,CVE-2014-8502,CVE-2014-8503,CVE-2014-8504,CVE-2014-8737,CVE-2014-8738 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): binutils-2.23.1-0.23.15, cross-ppc-binutils-2.23.1-0.23.2, cross-spu-binutils-2.23.1-0.23.2 SUSE Linux Enterprise Server 11 SP3 for VMware (src): binutils-2.23.1-0.23.15 SUSE Linux Enterprise Server 11 SP3 (src): binutils-2.23.1-0.23.15 SUSE Linux Enterprise Desktop 11 SP3 (src): binutils-2.23.1-0.23.15
released
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2015-12-30. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62377
Guys, was SLE11 SP1 also affected by this issue?
yes