Lucene search

K
suseSuseOPENSUSE-SU-2019:1590-1
HistoryJun 20, 2019 - 12:00 a.m.

Security update for elfutils (moderate)

2019-06-2000:00:00
lists.opensuse.org
181

EPSS

0.01

Percentile

83.8%

An update that fixes 15 vulnerabilities is now available.

Description:

This update for elfutils fixes the following issues:

Security issues fixed:

  • CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash
    (bsc#1033084)
  • CVE-2017-7608: Fixed a heap-based buffer overflow in
    ebl_object_note_type_name() (bsc#1033085)
  • CVE-2017-7609: Fixed a memory allocation failure in __libelf_decompress
    (bsc#1033086)
  • CVE-2017-7610: Fixed a heap-based buffer overflow in check_group
    (bsc#1033087)
  • CVE-2017-7611: Fixed a denial of service via a crafted ELF file
    (bsc#1033088)
  • CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a
    crafted ELF file (bsc#1033089)
  • CVE-2017-7613: Fixed denial of service caused by the missing validation
    of the number of sections and the number of segments in a crafted ELF
    file (bsc#1033090)
  • CVE-2018-16062: Fixed a heap-buffer overflow in
    /elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)
  • CVE-2018-16402: Fixed a denial of service/double free on an attempt to
    decompress the same section twice (bsc#1107066)
  • CVE-2018-16403: Fixed a heap buffer overflow in readelf (bsc#1107067)
  • CVE-2018-18310: Fixed an invalid address read problem in
    dwfl_segment_report_module.c (bsc#1111973)
  • CVE-2018-18520: Fixed bad handling of ar files inside are files
    (bsc#1112726)
  • CVE-2018-18521: Fixed a denial of service vulnerabilities in the
    function arlib_add_symbols() used by eu-ranlib (bsc#1112723)
  • CVE-2019-7150: dwfl_segment_report_module doesnโ€™t check whether the dyn
    data read from core file is truncated (bsc#1123685)
  • CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated
    string (bsc#1125007)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or โ€œzypper patchโ€.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-1590=1

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-1590=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1i586<ย - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.i586.rpm
openSUSE Leap15.1x86_64<ย - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.1noarch<ย - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm
openSUSE Leap15.1x86_64<ย - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm
openSUSE Leap15.0i586<ย - openSUSE Leap 15.0 (i586 x86_64):- openSUSE Leap 15.0 (i586 x86_64):.i586.rpm
openSUSE Leap15.0x86_64<ย - openSUSE Leap 15.0 (i586 x86_64):- openSUSE Leap 15.0 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.0noarch<ย - openSUSE Leap 15.0 (noarch):- openSUSE Leap 15.0 (noarch):.noarch.rpm
openSUSE Leap15.0x86_64<ย - openSUSE Leap 15.0 (x86_64):- openSUSE Leap 15.0 (x86_64):.x86_64.rpm