The ignoresectionsym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
{
"unresolved_ranges": [
{
"vendor_product": "redhat:enterprise_linux_desktop",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_server",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_workstation",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
]
}
]
}