First published: Mon Sep 03 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a double-free in the libelf/elf_end.c:elf_end() function due to the decompression of section data multiple times.. An attacker could exploit this to cause a crash or possibly have unspecified other impact via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23528">https://sourceware.org/bugzilla/show_bug.cgi?id=23528</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa">https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elfutils Project Elfutils | =0.173 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/elfutils | 0.183-1 0.188-2.1 0.191-2 |
https://sourceware.org/git/?p=elfutils.git;a=commit;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.