ALT-PU-2024-1521-1
Package elfutils updated to version 0.189.0.46.27a8-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2018-01517
Уязвимость библиотеки libdwfl утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01235
Уязвимость функции ebl_object_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01236
Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01237
Уязвимость функции read_srclines в пакете elfutils, связанная с чтением за границей буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01238
Уязвимость функции elf64_xlatetom в пакете elfutils, связанная с отсутствием проверки соответствия ожидаемого размера данных и реально прочитанных из файла дампа (core), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01239
Уязвимость функции elf_cvt_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01240
Уязвимость функции elf32_xlatetom в пакете elfutils, связанная с возможностью выхода операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01387
Уязвимость функции dwarf_getaranges в dwarf_getaranges.c набора утилит для обработки объектов ELF Elfutils, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01428
Уязвимость функции elf_end библиотеки libelf набора утилит для обработки объектов ELF Elfutils, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10254
The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
- [oss-security] 20170322 Re: elfutils: memory allocation failure in allocate_elf (common.h)
- [oss-security] 20170322 Re: elfutils: memory allocation failure in allocate_elf (common.h)
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
- [elfutils-devel] 20161024 [PATCH] libelf: Always set ELF maxsize when reading an ELF file for sanity checks.
- [elfutils-devel] 20161024 [PATCH] libelf: Always set ELF maxsize when reading an ELF file for sanity checks.
- GLSA-201710-10
- GLSA-201710-10
- USN-3670-1
- USN-3670-1
Modified: 2024-11-21
CVE-2016-10255
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
- [oss-security] 20170322 Re: elfutils: memory allocation failure in __libelf_set_rawdata_wrlock (elf_getdata.c)
- [oss-security] 20170322 Re: elfutils: memory allocation failure in __libelf_set_rawdata_wrlock (elf_getdata.c)
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
- https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
- https://bugzilla.redhat.com/show_bug.cgi?id=1387584
- https://bugzilla.redhat.com/show_bug.cgi?id=1387584
- [elfutils-devel] 20161021 [PATCH] libelf: Sanity check offset and size before trying to malloc and read data.
- [elfutils-devel] 20161021 [PATCH] libelf: Sanity check offset and size before trying to malloc and read data.
- GLSA-201710-10
- GLSA-201710-10
- USN-3670-1
- USN-3670-1
Modified: 2024-11-21
CVE-2018-16062
dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23541
- https://sourceware.org/bugzilla/show_bug.cgi?id=23541
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=29e31978ba51c1051743a503ee325b5ebc03d7e9
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=29e31978ba51c1051743a503ee325b5ebc03d7e9
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-18310
An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23752
- https://sourceware.org/bugzilla/show_bug.cgi?id=23752
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-18520
An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23787
- https://sourceware.org/bugzilla/show_bug.cgi?id=23787
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2019-7146
In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
Modified: 2024-11-21
CVE-2019-7148
An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Modified: 2024-11-21
CVE-2019-7149
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- USN-4012-1
- RHSA-2019:2197
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
Modified: 2024-11-21
CVE-2019-7150
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197
Modified: 2024-11-21
CVE-2019-7664
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
Modified: 2024-11-21
CVE-2019-7665
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197
Closed bugs
eu-elflint не умеет обрабатывать ELF файлы для архитектуры LoongArch
elfutils: LoongArch: не поддерживаются релокации ELF psABI v2