First published: Thu Oct 05 2017(Updated: )
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the DW_AT_name data type, which allows remote attackers to cause a denial of service (bfd_hash_hash NULL pointer dereference, or out-of-bounds access, and application crash) via a crafted ELF file, related to scan_unit_for_symbols and parse_comp_unit.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241210-1 2.43.50.20241215-1 |
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15022 is a vulnerability in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, that allows remote attackers to cause a denial of service (application crash).
CVE-2017-15022 affects the Ubuntu binutils package versions 2.26.1-1ubuntu1~16.04.8+, 2.29.90.20180122-1, and the Debian binutils package versions 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5.
CVE-2017-15022 can be exploited by remote attackers by causing a NULL pointer dereference or out-of-bounds access, leading to a denial of service and application crash.
The severity of CVE-2017-15022 is high.
Yes, there are various fixes available depending on the affected software version. Please refer to the provided references for more information on the specific fixes.