An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Advisories
Source ID Title
EUVD EUVD EUVD-2019-16698 An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T20:38:33.482Z

Reserved: 2019-01-28T00:00:00

Link: CVE-2019-7148

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-29T00:29:00.347

Modified: 2024-11-21T04:47:39.797

Link: CVE-2019-7148

cve-icon Redhat

Severity :

Publid Date: 2019-01-11T00:00:00Z

Links: CVE-2019-7148 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses