elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.158-0ubuntu5.3", "binary_name": "elfutils" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libasm-dev" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libasm1" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libdw-dev" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libdw1" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libelf-dev" }, { "binary_version": "0.158-0ubuntu5.3", "binary_name": "libelf1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.165-3ubuntu1.1", "binary_name": "elfutils" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libasm-dev" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libasm1" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libdw-dev" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libdw1" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libelf-dev" }, { "binary_version": "0.165-3ubuntu1.1", "binary_name": "libelf1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.170-0.4", "binary_name": "elfutils" }, { "binary_version": "0.170-0.4", "binary_name": "libasm-dev" }, { "binary_version": "0.170-0.4", "binary_name": "libasm1" }, { "binary_version": "0.170-0.4", "binary_name": "libdw-dev" }, { "binary_version": "0.170-0.4", "binary_name": "libdw1" }, { "binary_version": "0.170-0.4", "binary_name": "libelf-dev" }, { "binary_version": "0.170-0.4", "binary_name": "libelf1" } ] }