Bug 1906756 (CVE-2020-16598) - CVE-2020-16598 binutils: Null Pointer Dereference in debug_get_real_type could result in DoS
Summary: CVE-2020-16598 binutils: Null Pointer Dereference in debug_get_real_type coul...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-16598
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1906757 1906758 1909890 1909896 1910135 1910148
Blocks: 1906786
TreeView+ depends on / blocked
 
Reported: 2020-12-11 11:38 UTC by Michael Kaplan
Modified: 2021-11-02 18:22 UTC (History)
20 users (show)

Fixed In Version: binutils 2.35
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-11-02 18:22:26 UTC
Embargoed:


Attachments (Terms of Use)

Description Michael Kaplan 2020-12-11 11:38:57 UTC
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.34, in debug_get_real_type, as demonstrated in objdump, that can cause a denial of service via a crafted file.

External References:

https://sourceware.org/bugzilla/show_bug.cgi?id=25840
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ca3f923f82a079dcf441419f4a50a50f8b4b33c2

Comment 1 Michael Kaplan 2020-12-11 11:39:51 UTC
Created binutils tracking bugs for this issue:

Affects: fedora-32 [bug 1906757]


Created mingw-binutils tracking bugs for this issue:

Affects: fedora-all [bug 1906758]

Comment 7 Todd Cullum 2020-12-22 19:20:10 UTC
Statement:

The version of binutils shipped in Red Hat Developer Toolset 10 and Red Hat Enterprise Linux 8's GCC Toolset 10 is not affected by this flaw because it has already been patched.


Note You need to log in before you can comment on or make changes to this bug.