Bugzilla – Bug 1126829
VUL-0: CVE-2019-9075: binutils: heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
Last modified: 2022-09-30 09:07:07 UTC
CVE-2019-9075 An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9075 https://sourceware.org/bugzilla/show_bug.cgi?id=24236
Created attachment 797927 [details] hbo QA REPRODUCER: size hbo should not crash
This has been a high severity vulnerability for some time. Any update or plans for the patch?
This is a typical script-kiddie-fuzzes CVE, not anything worth a high priority. The NIST categorization of these is notoriously non-sensical. We fix this type of CVEs with version updates of binutils, so the next one will contain a fix.
Thanks Michael for your prompt response and explanation of the severity from SUSE's standpoint. We understand that the NIST categorization and scoring can be off sometimes, but do see that SUSE is still listing this as a High severity vulnerability on the SUSE CVE page as well (https://www.suse.com/security/cve/CVE-2019-9075/). Do you have an estimation on when the binutils update expected to be released?
SUSE-SU-2020:3060-1: An update that solves 8 vulnerabilities, contains three features and has 5 fixes is now available. Category: security (moderate) Bug References: 1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744 CVE References: CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077 JIRA References: ECO-2373,SLE-7464,SLE-7903 Sources used: SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (src): binutils-2.35-7.11.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 (src): binutils-2.35-7.11.1 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): binutils-2.35-7.11.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): binutils-2.35-7.11.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): binutils-2.35-7.11.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): binutils-2.35-7.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2020:1790-1: An update that solves 8 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744 CVE References: CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077 JIRA References: Sources used: openSUSE Leap 15.1 (src): binutils-2.35-lp151.3.9.1, cross-aarch64-binutils-2.35-lp151.3.9.1, cross-arm-binutils-2.35-lp151.3.9.1, cross-avr-binutils-2.35-lp151.3.9.1, cross-epiphany-binutils-2.35-lp151.3.9.1, cross-hppa-binutils-2.35-lp151.3.9.1, cross-hppa64-binutils-2.35-lp151.3.9.1, cross-i386-binutils-2.35-lp151.3.9.1, cross-ia64-binutils-2.35-lp151.3.9.1, cross-m68k-binutils-2.35-lp151.3.9.1, cross-mips-binutils-2.35-lp151.3.9.1, cross-ppc-binutils-2.35-lp151.3.9.1, cross-ppc64-binutils-2.35-lp151.3.9.1, cross-ppc64le-binutils-2.35-lp151.3.9.1, cross-riscv64-binutils-2.35-lp151.3.9.1, cross-rx-binutils-2.35-lp151.3.9.1, cross-s390-binutils-2.35-lp151.3.9.1, cross-s390x-binutils-2.35-lp151.3.9.1, cross-sparc-binutils-2.35-lp151.3.9.1, cross-sparc64-binutils-2.35-lp151.3.9.1, cross-spu-binutils-2.35-lp151.3.9.1
openSUSE-SU-2020:1804-1: An update that solves 8 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744 CVE References: CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077 JIRA References: Sources used: openSUSE Leap 15.2 (src): binutils-2.35-lp152.4.3.1, cross-aarch64-binutils-2.35-lp152.4.3.1, cross-arm-binutils-2.35-lp152.4.3.1, cross-avr-binutils-2.35-lp152.4.3.1, cross-epiphany-binutils-2.35-lp152.4.3.1, cross-hppa-binutils-2.35-lp152.4.3.1, cross-hppa64-binutils-2.35-lp152.4.3.1, cross-i386-binutils-2.35-lp152.4.3.1, cross-ia64-binutils-2.35-lp152.4.3.1, cross-m68k-binutils-2.35-lp152.4.3.1, cross-mips-binutils-2.35-lp152.4.3.1, cross-ppc-binutils-2.35-lp152.4.3.1, cross-ppc64-binutils-2.35-lp152.4.3.1, cross-ppc64le-binutils-2.35-lp152.4.3.1, cross-riscv64-binutils-2.35-lp152.4.3.1, cross-rx-binutils-2.35-lp152.4.3.1, cross-s390-binutils-2.35-lp152.4.3.1, cross-s390x-binutils-2.35-lp152.4.3.1, cross-sparc-binutils-2.35-lp152.4.3.1, cross-sparc64-binutils-2.35-lp152.4.3.1, cross-spu-binutils-2.35-lp152.4.3.1, cross-xtensa-binutils-2.35-lp152.4.3.1
Hi Support, I don't see any information about CVE-2019-9075 on SLES12SP5. Is SLES12 SP5 affected by this CVE? Is it a plan to merge it into SLES12sp5? Thanks.
The current SLE12 binutils are still affected. We currently assess wether a version update of those is appropriate as well.
SUSE-SU-2020:3552-1: An update that solves 8 vulnerabilities, contains three features and has 6 fixes is now available. Category: security (moderate) Bug References: 1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744,1179036 CVE References: CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077 JIRA References: ECO-2373,SLE-7464,SLE-7903 Sources used: SUSE Linux Enterprise Server for SAP 15 (src): binutils-2.35.1-6.15.1 SUSE Linux Enterprise Server 15-LTSS (src): binutils-2.35.1-6.15.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): binutils-2.35.1-6.15.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): binutils-2.35.1-6.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:3593-1: An update that solves 21 vulnerabilities, contains 7 features and has 8 fixes is now available. Category: security (moderate) Bug References: 1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744,1179036,1179341,1179898,1179899,1179900,1179901,1179902,1179903,1180451,1180454,1180461,1181452,1182252,1183511,1184620,1184794 CVE References: CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077,CVE-2020-16590,CVE-2020-16591,CVE-2020-16592,CVE-2020-16593,CVE-2020-16598,CVE-2020-16599,CVE-2020-35448,CVE-2020-35493,CVE-2020-35496,CVE-2020-35507,CVE-2021-20197,CVE-2021-20284,CVE-2021-3487 JIRA References: ECO-2373,PM-2767,SLE-18637,SLE-19618,SLE-21561,SLE-7464,SLE-7903 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): binutils-2.37-9.39.1 SUSE OpenStack Cloud Crowbar 8 (src): binutils-2.37-9.39.1 SUSE OpenStack Cloud 9 (src): binutils-2.37-9.39.1 SUSE OpenStack Cloud 8 (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): binutils-2.37-9.39.1, cross-ppc-binutils-2.37-9.39.1, cross-spu-binutils-2.37-9.39.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server 12-SP5 (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): binutils-2.37-9.39.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): binutils-2.37-9.39.1 HPE Helion Openstack 8 (src): binutils-2.37-9.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
currently we will not fix this on the SLE11 lines anymore. Others are fixed.