Bug 159892 - CAN-2005-1704 Integer overflow in the Binary File Descriptor (BFD) library
CAN-2005-1704 Integer overflow in the Binary File Descriptor (BFD) library
Status: CLOSED WONTFIX
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: libelf (Show other bugs)
2.1
All Linux
medium Severity high
: ---
: ---
Assigned To: Jakub Jelinek
impact=important,public=20050525,repo...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-06-08 17:16 EDT by Josh Bressers
Modified: 2007-11-30 17:06 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-06-09 11:43:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2005-06-08 17:16:40 EDT
+++ This bug was initially created as a clone of Bug #159888 +++

Integer overflow in the BFD library for libelf allows attackers to execute
arbitrary code via a crafted object file that specifies a large number of
section headers, leading to a heap-based buffer overflow.
Comment 1 Jakub Jelinek 2005-06-09 11:43:44 EDT
Although libelf is shipped in AS2.1, it is completely different codebase
from elfutils' libelf (RHEL3+).  AS2.1 libelf is only shipped as static library
(libelf.a) and to my knowledge nothing in the distro links against it.

Note You need to log in before you can comment on or make changes to this bug.