First published: Tue Sep 04 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a heap-based buffer over-read due to incorrect checks for the end of attribute lists in the libdw/dwarf_getabbrev.c:__libdw_getabbrev() and libdw/dwarf_hasattr.c:dwarf_hasattr() functions. An attacker could exploit this to cause a crash via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23529">https://sourceware.org/bugzilla/show_bug.cgi?id=23529</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda">https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils | <=0.173 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1625055 is classified as a moderate vulnerability due to potential crash exploitation.
To fix REDHAT-BUG-1625055, upgrade Elfutils to a version later than 0.173 that includes the necessary patches.
Elfutils versions up to and including 0.173 are affected by REDHAT-BUG-1625055.
An attacker could exploit REDHAT-BUG-1625055 to cause a crash via a crafted ELF file.
There are no official workarounds for REDHAT-BUG-1625055; updating to a patched version is recommended.