First published: Thu Aug 30 2018(Updated: )
Elfutils is vulnerable to a heap-based buffer over-read in the libdw/dwarf_getaranges.c:dwarf_getaranges() function. An attacker could exploit this to cause a crash in the eu-addr2line command via a crafted file. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23541">https://sourceware.org/bugzilla/show_bug.cgi?id=23541</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9">https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1623752 is classified as a moderate vulnerability.
To fix REDHAT-BUG-1623752, update to the latest version of Elfutils that addresses this vulnerability.
The impact of REDHAT-BUG-1623752 includes potential crashes of the eu-addr2line command when processing specially crafted files.
Users of Elfutils, specifically those using the eu-addr2line command, are affected by REDHAT-BUG-1623752.
Yes, REDHAT-BUG-1623752 can potentially be exploited remotely if an attacker provides a crafted file to the affected system.