Source: elfutils Version: 0.175-2 Severity: normal Tags: patch security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=24103
Hi, The following vulnerability was published for elfutils. CVE-2019-7150[0]: | An issue was discovered in elfutils 0.175. A segmentation fault can | occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to | dwfl_segment_report_module not checking whether the dyn data read from | a core file is truncated. A crafted input can cause a program crash, | leading to denial-of-service, as demonstrated by eu-stack. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-7150 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150 [1] https://sourceware.org/bugzilla/show_bug.cgi?id=24103 Please adjust the affected versions in the BTS as needed. Regards, Salvatore