First published: Mon Sep 03 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a double-free in the libelf/elf_end.c:elf_end() function due to the decompression of section data multiple times.. An attacker could exploit this to cause a crash or possibly have unspecified other impact via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23528">https://sourceware.org/bugzilla/show_bug.cgi?id=23528</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa">https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | =0.173 | |
Debian | =9.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
https://sourceware.org/git/?p=elfutils.git;a=commit;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16402 has a medium severity rating due to the potential for a crash or other unspecified impacts.
To fix CVE-2018-16402, upgrade to elfutils version 0.183-1 or later.
CVE-2018-16402 affects elfutils through version 0.173.
CVE-2018-16402 could potentially be exploited via crafted ELF files, which may be processed by vulnerable systems.
Vulnerable systems include Debian 9.0, Red Hat Enterprise Linux 7.0, openSUSE Leap 15.0 and 15.1, and Ubuntu 16.04, 18.04, and 18.10.