First published: Mon Oct 15 2018(Updated: )
A flaw was found in elfutils through v0.174. An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23752">https://sourceware.org/bugzilla/show_bug.cgi?id=23752</a> <a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elfutils Project Elfutils | <=0.174 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.