First published: Tue Mar 27 2018(Updated: )
binutils through version 2.30 has a vulnerability in the elf.c:bfd_section_from_shdr() functionof the Binary File Descriptor (BFD) library (aka libbfd). An attacker could exploit this with a crafted executable file to cause a crash. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22809">https://sourceware.org/bugzilla/show_bug.cgi?id=22809</a> Upstream Patch: <a href="https://sourceware.org/bugzilla/attachment.cgi?id=10814&action=diff">https://sourceware.org/bugzilla/attachment.cgi?id=10814&action=diff</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <=2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1560827 is considered to be high due to the potential for an attacker to exploit the vulnerability and cause a crash.
To fix REDHAT-BUG-1560827, update to a version of GNU binutils that is newer than 2.30.
GNU binutils versions up to and including 2.30 are affected by REDHAT-BUG-1560827.
The potential impact of REDHAT-BUG-1560827 is that it may allow an attacker to crash the system by exploiting a crafted executable file.
No official workaround is provided for REDHAT-BUG-1560827; upgrading to a secure version is the recommended approach.