An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24103
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://usn.ubuntu.com/4012-1/
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/errata/RHSA-2019:2197
https://access.redhat.com/errata/RHSA-2019:3575
https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
Source: MITRE
Published: 2019-01-29
Updated: 2021-11-30
Type: CWE-125
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 1.8
Severity: MEDIUM