{"id":"CVE-2018-18310","details":"An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.","modified":"2026-04-16T00:02:14.006879083Z","published":"2018-10-15T02:29:00.923Z","related":["SUSE-SU-2019:1486-1","SUSE-SU-2019:1733-1","SUSE-SU-2022:2614-1","SUSE-SU-2022:2614-2","openSUSE-SU-2019:1590-1","openSUSE-SU-2024:10733-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"18.10"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2197"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4012-1/"},{"type":"FIX","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23752"},{"type":"FIX","url":"https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/elfutils.git","events":[{"introduced":"0"},{"last_affected":"52b6b2f1f49e7385527e9f311f248092be0c0b61"}],"database_specific":{"cpe":"cpe:2.3:a:elfutils_project:elfutils:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.174"}],"source":"CPE_FIELD"}}],"versions":["elfutils-0.120","elfutils-0.121","elfutils-0.122","elfutils-0.123","elfutils-0.124","elfutils-0.125","elfutils-0.126","elfutils-0.127","elfutils-0.128","elfutils-0.129","elfutils-0.130","elfutils-0.131","elfutils-0.132","elfutils-0.133","elfutils-0.134","elfutils-0.135","elfutils-0.136","elfutils-0.137","elfutils-0.138","elfutils-0.142","elfutils-0.143","elfutils-0.144","elfutils-0.145","elfutils-0.146","elfutils-0.147","elfutils-0.148","elfutils-0.149","elfutils-0.150","elfutils-0.151","elfutils-0.152","elfutils-0.153","elfutils-0.154","elfutils-0.155","elfutils-0.156","elfutils-0.157","elfutils-0.158","elfutils-0.159","elfutils-0.160","elfutils-0.161","elfutils-0.162","elfutils-0.163","elfutils-0.164","elfutils-0.165","elfutils-0.166","elfutils-0.167","elfutils-0.168","elfutils-0.169","elfutils-0.170","elfutils-0.171","elfutils-0.172","elfutils-0.173","elfutils-0.174"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-18310.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}