Описание
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 0.168-0.2 |
| bionic | released | 0.168-0.2 |
| cosmic | released | 0.168-0.2 |
| devel | released | 0.168-0.2 |
| disco | released | 0.168-0.2 |
| eoan | released | 0.168-0.2 |
| esm-infra-legacy/trusty | released | 0.158-0ubuntu5.3 |
| esm-infra/bionic | released | 0.168-0.2 |
| esm-infra/focal | released | 0.168-0.2 |
| esm-infra/xenial | released | 0.165-3ubuntu1.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils ...
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
EPSS
4.3 Medium
CVSS2
5.5 Medium
CVSS3