The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
References
Link | Resource |
---|---|
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1387584 | Issue Tracking Third Party Advisory |
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/03/22/1 | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201710-10 | |
https://usn.ubuntu.com/3670-1/ |
Configurations
Information
Published : 2017-03-23 09:59
Updated : 2018-06-06 18:29
NVD link : CVE-2016-10255
Mitre link : CVE-2016-10255
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
elfutils_project
- elfutils