Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 18.10 | |
ubuntu_linux | eq | 16.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
elfutils | eq | 0.174 | |
leap | eq | 15.0 | |
leap | eq | 15.1 | |
enterprise_linux_desktop | eq | 7.0 | |
enterprise_linux_server | eq | 7.0 |
lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
access.redhat.com/errata/RHSA-2019:2197
lists.debian.org/debian-lts-announce/2019/02/msg00036.html
lists.debian.org/debian-lts-announce/2021/10/msg00030.html
sourceware.org/bugzilla/show_bug.cgi?id=23786
sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html
usn.ubuntu.com/4012-1/