First published: Mon Oct 15 2018(Updated: )
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.31 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18309 is a vulnerability in the Binary File Descriptor (BFD) library, as distributed in GNU Binutils 2.31.
The vulnerability causes a segmentation fault and application crash, leading to denial of service.
The affected software includes binutils versions 2.30-21ubuntu1~18.04.3, 2.26.1-1ubuntu1~16.04.8+, and 2.31.1-16.
To fix CVE-2018-18309, upgrade to a version of binutils that is equal to or higher than 2.31.1-16.
You can find more information about CVE-2018-18309 at the following references: [sourceware.org/bugzilla/show_bug.cgi?id=23770](sourceware.org/bugzilla/show_bug.cgi?id=23770), [sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f](sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f), [securityfocus.com/bid/105692](securityfocus.com/bid/105692)