First published: Thu May 03 2018(Updated: )
A flaw was found in the _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23110">https://sourceware.org/bugzilla/show_bug.cgi?id=23110</a> Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aa4a8c2a2a67545e90c877162c53cc9de42dc8b4">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aa4a8c2a2a67545e90c877162c53cc9de42dc8b4</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | ||
GNU Binutils (libbfd) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1574696 is classified as a medium-level vulnerability due to potential unbounded loops.
To fix REDHAT-BUG-1574696, you should update to the latest version of GNU Binutils or apply the relevant patches provided by your Linux distribution.
REDHAT-BUG-1574696 affects the Binary File Descriptor (BFD) library as distributed in GNU Binutils 2.30.
The impact of REDHAT-BUG-1574696 is that it may cause denial of service through the potential for an unbounded loop when processing specific inputs.
Currently, the best workaround for REDHAT-BUG-1574696 is to avoid using affected versions of GNU Binutils until a fix is applied.