First published: Fri Aug 17 2018(Updated: )
An out-of-bounds read was discovered in elfutils in the way it reads DWARF address ranges information. Function dwarf_getaranges() in dwarf_getaranges.c does not properly check whether it reads beyond the limits of the ELF section. An attacker could use this flaw to cause a denial of service via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/elfutils | <0:0.176-2.el7 | 0:0.176-2.el7 |
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | <0.174 | |
Debian | =8.0 | |
Debian | =9.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16062 is rated as medium, indicating a moderate potential impact.
To mitigate CVE-2018-16062, update the affected elfutils package to at least version 0:0.176-2.el7 for Red Hat or the recommended versions for Debian and Ubuntu.
CVE-2018-16062 affects multiple Linux distributions including Red Hat Enterprise Linux, Debian, and Ubuntu systems running specific versions of the elfutils package.
CVE-2018-16062 is classified as an out-of-bounds read vulnerability leading to potential denial of service.
As of now, there are no publicly available exploits specifically targeting CVE-2018-16062.