VYPR
High severity7.5NVD Advisory· Published Oct 27, 2017· Updated May 13, 2026

CVE-2017-15938

CVE-2017-15938

Description

dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A miscalculation in dwarf2.c of GNU Binutils 2.29 allows remote attackers to cause a denial of service via a crafted relocatable object file.

Vulnerability

The vulnerability resides in dwarf2.c within the Binary File Descriptor (BFD) library of GNU Binutils 2.29. It miscalculates DW_FORM_ref_addr die references when processing a relocatable object file, leading to an invalid memory read in the find_abstract_instance_name function [1].

Exploitation

An attacker can craft a malicious relocatable object file that triggers the miscalculation. The victim must process the file with binutils tools (e.g., nm, objdump) that parse DWARF debug information. No special privileges are needed beyond access to the crafted file [1][2].

Impact

Successful exploitation results in a segmentation fault and application crash, causing a denial of service condition [1].

Mitigation

Users should upgrade to Binutils version 2.29.1-r1 or later, as recommended by the Gentoo GLSA 201801-01 [2]. No known workarounds exist.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

19

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.