ALT-PU-2019-1249-1
Closed vulnerabilities
BDU:2019-01235
Уязвимость функции ebl_object_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01236
Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01237
Уязвимость функции read_srclines в пакете elfutils, связанная с чтением за границей буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01238
Уязвимость функции elf64_xlatetom в пакете elfutils, связанная с отсутствием проверки соответствия ожидаемого размера данных и реально прочитанных из файла дампа (core), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01239
Уязвимость функции elf_cvt_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01240
Уязвимость функции elf32_xlatetom в пакете elfutils, связанная с возможностью выхода операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-7146
In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
Modified: 2024-11-21
CVE-2019-7148
An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Modified: 2024-11-21
CVE-2019-7149
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- USN-4012-1
- RHSA-2019:2197
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
Modified: 2024-11-21
CVE-2019-7150
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197
Modified: 2024-11-21
CVE-2019-7664
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
Modified: 2024-11-21
CVE-2019-7665
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197