An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://sourceware.org/bugzilla/show_bug.cgi?id=23770 | issue tracking patch exploit third party advisory |
http://www.securityfocus.com/bid/105692 | vdb entry third party advisory |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0930cb3021b8078b34cf216e79eb8608d017864f | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html | vendor advisory |
https://usn.ubuntu.com/4336-1/ | vendor advisory |