ALT-BU-2018-3584-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-01517
Уязвимость библиотеки libdwfl утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01236
Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01385
Уязвимость функции arlib_add_symbols() файла arlib.c набора утилит для обработки объектов ELF Elfutils, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01428
Уязвимость функции elf_end библиотеки libelf набора утилит для обработки объектов ELF Elfutils, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-18310
An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23752
- https://sourceware.org/bugzilla/show_bug.cgi?id=23752
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-18520
An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23787
- https://sourceware.org/bugzilla/show_bug.cgi?id=23787
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-18521
Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23786
- https://sourceware.org/bugzilla/show_bug.cgi?id=23786
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2019-7148
An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."