First published: Wed Feb 28 2018(Updated: )
A flaw was found in the read_attribute_value function in dwarf2.c file in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils up to version 2.30, when compiled in 32bit mode. This allows attackers to cause a denial of service (integer wraparound and application crash) via an ELF file with a corrupt DWARF FORM block. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22895">https://sourceware.org/bugzilla/show_bug.cgi?id=22895</a> Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12c963421d045a127c413a0722062b9932c50aa9">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12c963421d045a127c413a0722062b9932c50aa9</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.30 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-7569.
The severity of CVE-2018-7569 is low.
The affected software is GNU Binutils version 2.30.
CVE-2018-7569 allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via a corrupt ELF file.
To fix CVE-2018-7569, update to the latest version of GNU Binutils or apply the available patches.