https://sourceware.org/bugzilla/show_bug.cgi?id=23963

--- Comment #5 from Ben N <pajexali at gmail dot com> ---
(In reply to Nick Clifton from comment #3)
> (In reply to Ben N from comment #1)
> Hi Ben,
> 
>   Sorry for the delay.  I have now applied an extended version of your
>   patch, which should cover almost all of the symbols displayed by
>   objdump.  There is one place left where this kind of problem might
>   still arise - the print_section_stabs() function - but I think that
>   this will do for now.
> 
> Cheers
>   Nick

Thanks Nick. As I couldn't find functionality in objdump that warranted the
printing of control sequences and readelf already mitigate this behaviour, I
believe this to be a security vulnerability.

The premise being, users of objdump assume analysing the binary causes nothing
more than information to be displayed to screen. Whereas the affected version
allows the undefined treatment of control sequences to be abused to interact
with the terminal and in some cases exploit VTE vulnerabilities.

Can you please let me know your thoughts on this. I would like to apply for a
CVE and to notify pkg maintainers so this patch is backported.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils

Reply via email to