There was code in the readelf program would assume that
the binary being examined was well behaved, and followed
the ELF specification correctly.
Using a specially crafted binary image, that did not quite
conform to the ELF specification would allow an attacker
to force the readelf program to attempt to read from an
attacker specified address.
Add code to readelf to verify conformation to the ELF
standard before attempting to read the required data.
Readelf can no longer be tricked into reading from an