Your submission was sent successfully! Close

CVE-2018-7208

Published: 18 February 2018

In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
binutils
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(2.30-21ubuntu1~18.04.1)
cosmic Not vulnerable
(2.31.1-6ubuntu1)
disco Not vulnerable
(2.31.1-6ubuntu1)
eoan Not vulnerable
(2.31.1-6ubuntu1)
focal Not vulnerable
(2.31.1-6ubuntu1)
groovy Not vulnerable
(2.31.1-6ubuntu1)
hirsute Not vulnerable
(2.31.1-6ubuntu1)
impish Not vulnerable
(2.31.1-6ubuntu1)
jammy Not vulnerable
(2.31.1-6ubuntu1)
precise Ignored
(end of ESM support, was needs-triage)
trusty Needs triage

upstream
Released (2.30-6)
xenial
Released (2.26.1-1ubuntu1~16.04.8+esm1)
Patches:
upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=eb77f6a4621795367a39cdd30957903af9dbb815