Two DoS vulnerabilities in readelf 2.46: 1. Resource exhaustion: 1KB crafted ELF triggers 6.3TB allocation (357M relocation entries), OOM kill 2. Null pointer deref: malformed sh_entsize/shoff causes SIGSEGV Found via AFL++ QEMU-mode fuzzing. PoC files provided. Not disclosed publicly.
Does this issue affect versions between 2.34 and 2.44? Also, is there an estimated timeline for an upstream fix or patch release?