An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
References
Link | Resource |
---|---|
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f | Patch Third Party Advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=23770 | Exploit Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/105692 | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html | |
https://usn.ubuntu.com/4336-1/ |
Configurations
Information
Published : 2018-10-14 19:29
Updated : 2019-10-30 18:15
NVD link : CVE-2018-18309
Mitre link : CVE-2018-18309
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- binutils