Severity
6.5MEDIUM
EPSS
0.9%
top 24.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 29
Latest updateMay 13

Description

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

Debianelfutils< 0.176-1+3

🔴Vulnerability Details

3
GHSA
GHSA-67vc-2q9c-6854: An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin2022-05-13
OSV
CVE-2019-7148: An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin2019-01-29
CVEList
CVE-2019-7148: An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin2019-01-29

📋Vendor Advisories

2
Red Hat
elfutils: excessive memory allocation in read_long_names in elf_begin.c in libelf2019-01-11
Debian
CVE-2019-7148: elfutils - An attempted excessive memory allocation was discovered in the function read_lon...2019

💬Community

1
Bugzilla
CVE-2019-7148 elfutils: excessive memory allocation in read_long_names in elf_begin.c in libelf2019-01-31