First published: Fri Feb 15 2019(Updated: )
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24089">https://sourceware.org/bugzilla/show_bug.cgi?id=24089</a> <a href="https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html">https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1677538 is classified as a denial of service vulnerability due to potential program crashes.
To fix REDHAT-BUG-1677538, ensure you apply the latest patches or updates for elfutils provided by your software distributor.
REDHAT-BUG-1677538 is caused by a heap-based buffer over-read in the elf32_xlatetom function which can process malformed ELF input.
The affected software for REDHAT-BUG-1677538 is elfutils version 0.175.
The potential consequences of REDHAT-BUG-1677538 include segmentation faults and denial of service, resulting in program crashes.