The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
https://usn.ubuntu.com/3670-1/
https://security.gentoo.org/glsa/201710-10
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
http://www.securityfocus.com/bid/98609
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
Source: Mitre, NVD
Published: 2017-04-09
Updated: 2025-04-20
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS: 0.00112