First published: Mon Sep 03 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a heap-based buffer over-read due to incorrect checks for the end of attribute lists in the libdw/dwarf_getabbrev.c:__libdw_getabbrev() and libdw/dwarf_hasattr.c:dwarf_hasattr() functions. An attacker could exploit this to cause a crash via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23529">https://sourceware.org/bugzilla/show_bug.cgi?id=23529</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda">https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elfutils Project Elfutils | =0.173 | |
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 |
https://sourceware.org/git/?p=elfutils.git;a=commit;h=6983e59b727458a6c64d9659c85f08218bc4fcda
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.