MGASA-2019-0222

Source
https://advisories.mageia.org/MGASA-2019-0222.html
Import Source
https://advisories.mageia.org/MGASA-2019-0222.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0222
Related
Published
2019-08-18T12:39:41Z
Modified
2019-08-18T11:52:39Z
Summary
Updated elfutils packages fix security vulnerabilities
Details

It was discovered that elfutils incorrectly handled certain malformed files. If a user or automated system were tricked into processing a specially crafted file, elfutils could be made to crash or consume resources, resulting in a denial of service (CVE-2017-7607, CVE-2017-7608, CVE-2017-7609, CVE-2017-7610, CVE-2017-7611, CVE-2017-7612, CVE-2017-7613, CVE-2018-16062, CVE-2018-16402, CVE-2018-16403, CVE-2018-18310, CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150, CVE-2019-7665).

In elfutils 0.175, a negative-sized memcpy is attempted in elfcvtnote in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash) (CVE-2019-7664).

References
Credits

Affected packages

Mageia:6 / elfutils

Package

Name
elfutils
Purl
pkg:rpm/mageia/elfutils?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.176-1.mga6

Ecosystem specific

{
    "section": "core"
}