First published: Fri Feb 15 2019(Updated: )
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash). Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24084">https://sourceware.org/bugzilla/show_bug.cgi?id=24084</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1677536 is classified as medium due to the denial of service caused by a segmentation fault.
To fix REDHAT-BUG-1677536, upgrade to the patched version of elfutils that addresses the overflow check issue.
The consequences of REDHAT-BUG-1677536 include application crashes and service interruptions due to the denial of service vulnerability.
All versions of elfutils prior to the security patch for REDHAT-BUG-1677536 are affected.
REDHAT-BUG-1677536 can be exploited by providing crafted ELF input which triggers the negative-sized memcpy.