First published: Tue Jun 26 2018(Updated: )
A flaw was found in in GNU libiberty, as distributed in GNU Binutils 2.30. A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c. References: <a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102</a> <a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454</a> <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23057">https://sourceware.org/bugzilla/show_bug.cgi?id=23057</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1595417 is considered moderate due to the potential for a NULL pointer dereference.
To fix REDHAT-BUG-1595417, update to the latest version of GNU Binutils that addresses this vulnerability.
Systems using affected versions of GNU Binutils 2.30 are vulnerable to REDHAT-BUG-1595417.
REDHAT-BUG-1595417 is categorized as a NULL pointer dereference vulnerability.
The potential impact of REDHAT-BUG-1595417 includes crashes or instability in the applications making use of the vulnerable version of GNU Binutils.