First published: Tue May 01 2018(Updated: )
GNU Binutils through version 2.30 is vulnerable to a NULL pointer dereference in dwarf2.c:concat_filename(). An attacker could exploit this to crash the nm-new application by providing a binary file. Upstream Issue: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23065">https://sourceware.org/bugzilla/show_bug.cgi?id=23065</a> Upstream Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6327533b1fd29fa86f6bf34e61c332c010e3c689">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6327533b1fd29fa86f6bf34e61c332c010e3c689</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <=2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1573365 is considered high due to its potential to crash applications.
To fix REDHAT-BUG-1573365, update GNU Binutils to a version higher than 2.30.
The symptoms of REDHAT-BUG-1573365 include the nm-new application crashing when processing a vulnerable binary file.
REDHAT-BUG-1573365 can potentially be exploited by an attacker providing a specially crafted binary file.
GNU Binutils versions up to and including 2.30 are affected by REDHAT-BUG-1573365.