The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/03/22/1 | Mailing List Third Party Advisory |
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1387584 | Issue Tracking Third Party Advisory |
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ | |
https://security.gentoo.org/glsa/201710-10 | |
https://usn.ubuntu.com/3670-1/ |
Configurations
History
No history.
Information
Published : 2017-03-23 16:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-10255
Mitre link : CVE-2016-10255
CVE.ORG link : CVE-2016-10255
JSON object : View
Products Affected
elfutils_project
- elfutils
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer