First published: Tue Sep 04 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a double-free in the libelf/elf_end.c:elf_end() function due to the decompression of section data multiple times.. An attacker could exploit this to cause a crash or possibly have unspecified other impact via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23528">https://sourceware.org/bugzilla/show_bug.cgi?id=23528</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa">https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa</a>
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils | <=0.173 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1625050 is currently classified as potentially high due to its ability to cause application crashes or other impacts.
To fix REDHAT-BUG-1625050, you should upgrade Elfutils to a version later than 0.173 where the vulnerability has been addressed.
REDHAT-BUG-1625050 affects Elfutils versions up to and including 0.173.
REDHAT-BUG-1625050 is a double-free vulnerability that occurs in the elf_end() function of Elfutils.
An attacker exploiting REDHAT-BUG-1625050 could potentially cause a crash of the application or achieve unspecified other impacts.