First published: Mon Dec 31 2018(Updated: )
In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.31.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=28e817cc440bce73691c03e01860089a0954a837
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20623 is a vulnerability in GNU Binutils 2.31.1 that allows a use-after-free exploit when processing a crafted ELF file.
CVE-2018-20623 affects GNU Binutils 2.31.1 by causing a use-after-free issue in the elfcomm.c error function when called from the process_archive function in readelf.c.
On Ubuntu Xenial, you can fix CVE-2018-20623 by upgrading to binutils version 2.26.1-1ubuntu1~16.04.8 or higher.
On Ubuntu Bionic, you can fix CVE-2018-20623 by upgrading to binutils version 2.30-21ubuntu1~18.04.3 or higher.
On Debian, you can fix CVE-2018-20623 by upgrading to binutils version 2.35.2-2, 2.40-2, or 2.41-5 or higher.