The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Binutils | Gnu | 2.28 (including) | 2.28 (including) |
Binutils | Ubuntu | artful | * |
Binutils | Ubuntu | esm-infra-legacy/trusty | * |
Binutils | Ubuntu | esm-infra/xenial | * |
Binutils | Ubuntu | precise | * |
Binutils | Ubuntu | precise/esm | * |
Binutils | Ubuntu | trusty | * |
Binutils | Ubuntu | trusty/esm | * |
Binutils | Ubuntu | upstream | * |
Binutils | Ubuntu | xenial | * |
Binutils | Ubuntu | yakkety | * |
Binutils | Ubuntu | zesty | * |