First published: Mon Nov 05 2018(Updated: )
A flaw was found in elfutils 0.174. A Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23786">https://sourceware.org/bugzilla/show_bug.cgi?id=23786</a> <a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=2b16a9be69939822dcafe075413468daac98b327">https://sourceware.org/git/?p=elfutils.git;a=commit;h=2b16a9be69939822dcafe075413468daac98b327</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1646482 is considered high due to its potential to cause a denial of service.
To address REDHAT-BUG-1646482, you should update the elfutils package to the latest version that contains the patch.
REDHAT-BUG-1646482 affects users of the elfutils library, specifically those utilizing versions susceptible to the divide-by-zero flaw.
The REDHAT-BUG-1646482 vulnerability is caused by mishandling of a zero sh_entsize value within the arlib_add_symbols() function.
The impact of REDHAT-BUG-1646482 is that it can lead to application crashes when processing maliciously crafted ELF files.