The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a SECTION type that has a 0 value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Binutils | Gnu | 2.30 (including) | 2.30 (including) |
Red Hat Enterprise Linux 7 | RedHat | binutils-0:2.27-34.base.el7 | * |
Binutils | Ubuntu | artful | * |
Binutils | Ubuntu | bionic | * |
Binutils | Ubuntu | esm-infra-legacy/trusty | * |
Binutils | Ubuntu | esm-infra/xenial | * |
Binutils | Ubuntu | precise/esm | * |
Binutils | Ubuntu | trusty | * |
Binutils | Ubuntu | trusty/esm | * |
Binutils | Ubuntu | upstream | * |
Binutils | Ubuntu | xenial | * |