A flaw was found in the ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy. References: https://sourceware.org/bugzilla/show_bug.cgi?id=23113 Patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db0c309f4011ca94a4abc8458e27f3734dab92ac
Created binutils tracking bugs for this issue: Affects: fedora-all [bug 1574700] Created mingw-binutils tracking bugs for this issue: Affects: epel-all [bug 1574698] Affects: fedora-all [bug 1574701]
The worst outcome should be a mere crash/application abort.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3032 https://access.redhat.com/errata/RHSA-2018:3032