A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 | third party advisory exploit |
https://sourceware.org/bugzilla/show_bug.cgi?id=23057 | third party advisory issue tracking exploit |
http://www.securityfocus.com/bid/104538 | third party advisory vdb entry |
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 | vendor advisory issue tracking exploit |
https://security.gentoo.org/glsa/201908-01 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2075 | vendor advisory |
https://usn.ubuntu.com/4326-1/ | vendor advisory |
https://usn.ubuntu.com/4336-1/ | vendor advisory |