Elfutils through version 0.173 is vulnerable to a double-free in the libelf/elf_end.c:elf_end() function due to the decompression of section data multiple times.. An attacker could exploit this to cause a crash or possibly have unspecified other impact via a crafted ELF. Upstream Bug: https://sourceware.org/bugzilla/show_bug.cgi?id=23528 Upstream Patch: https://sourceware.org/git/?p=elfutils.git;a=patch;h=56b18521fb8d46d40fc090c0de9d11a08bc982fa
Created elfutils tracking bugs for this issue: Affects: fedora-all [bug 1625051]
Reproduced on 7+ quite easily. Did not reproduce on 5/6. 6 was running 0.164.
(In reply to Scott Gayou from comment #4) > Reproduced on 7+ quite easily. Did not reproduce on 5/6. 6 was running 0.164. That makes sense, support for compressed ELF sections was introduced in elfutils 0.165.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2197 https://access.redhat.com/errata/RHSA-2019:2197
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16402
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:1471 https://access.redhat.com/errata/RHSA-2020:1471