A flaw was found in elfutils through v0.174. An Invalid Memory Address Dereference exists in the function elf_end in libelf. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
Created elfutils tracking bugs for this issue:
Affects: fedora-all [bug 1646478]
The title of this CVE is very misleading. A correct description would be "eu-size cannot handle recursive ar files". This has nothing to do with a bug in libelf or elf_end. It is just that eu-size calls elf_end () in the wrong order when seeing an ar file containing an ar file itself.
This issue affects the versions of elfutils as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2019:2197 https://access.redhat.com/errata/RHSA-2019:2197
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):