First published: Thu Jan 31 2019(Updated: )
In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24075">https://sourceware.org/bugzilla/show_bug.cgi?id=24075</a> <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24081">https://sourceware.org/bugzilla/show_bug.cgi?id=24081</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=012018907ca05eb0ab51d424a596ef38fc87cae1">https://sourceware.org/git/?p=elfutils.git;a=commit;h=012018907ca05eb0ab51d424a596ef38fc87cae1</a> <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=cd7ded3df43f655af945c869976401a602e46fcd">https://sourceware.org/git/?p=elfutils.git;a=commit;h=cd7ded3df43f655af945c869976401a602e46fcd</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1671432 has a severity rating that indicates it can lead to denial-of-service conditions.
To fix REDHAT-BUG-1671432, update the elfutils package to the latest patched version.
Yes, REDHAT-BUG-1671432 can be exploited remotely through a crafted ELF file.
The affected software for REDHAT-BUG-1671432 is the Elfutils package.
REDHAT-BUG-1671432 is classified as a buffer over-read vulnerability.