The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/03/22/1 | Mailing List Third Party Advisory |
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1387584 | Issue Tracking Third Party Advisory |
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ | |
https://security.gentoo.org/glsa/201710-10 | |
https://usn.ubuntu.com/3670-1/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-23T16:00:00
Updated: 2018-06-06T09:57:01
Reserved: 2017-03-22T00:00:00
Link: CVE-2016-10255
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-23T16:59:00.197
Modified: 2023-11-07T02:29:33.623
Link: CVE-2016-10255
JSON object: View
Redhat Information
No data.
CWE