The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
References
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2017/03/22/1 - Mailing List, Third Party Advisory | |
References | () https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1387584 - Issue Tracking, Third Party Advisory | |
References | () https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ - | |
References | () https://security.gentoo.org/glsa/201710-10 - | |
References | () https://usn.ubuntu.com/3670-1/ - |
07 Nov 2023, 02:29
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-03-23 16:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10255
Mitre link : CVE-2016-10255
CVE.ORG link : CVE-2016-10255
JSON object : View
Products Affected
elfutils_project
- elfutils
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer