First published: Mon Nov 05 2018(Updated: )
A flaw was found in elfutils through v0.174. An Invalid Memory Address Dereference exists in the function elf_end in libelf. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23787">https://sourceware.org/bugzilla/show_bug.cgi?id=23787</a> <a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=22d2d082d57a7470fadc0eae67179553f4919209">https://sourceware.org/git/?p=elfutils.git;a=commit;h=22d2d082d57a7470fadc0eae67179553f4919209</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Elfutils | <=0.174 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1646477 is categorized as critical due to its potential for causing invalid memory access.
To fix REDHAT-BUG-1646477, upgrade elfutils to the latest version beyond 0.174 that contains the patch addressing this vulnerability.
The impact of REDHAT-BUG-1646477 may include application crashes, memory corruption, or execution of arbitrary code if exploited.
Versions of elfutils up to and including 0.174 are affected by REDHAT-BUG-1646477.
There is no official workaround for REDHAT-BUG-1646477; the best course of action is to apply the appropriate update.