UBUNTU-CVE-2019-7148

Source
https://ubuntu.com/security/CVE-2019-7148
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-7148.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-7148
Related
Published
2019-01-29T00:29:00Z
Modified
2019-01-29T00:29:00Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An attempted excessive memory allocation was discovered in the function readlongnames in elfbegin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASANOPTIONS=allocatormayreturn_null=1 and running the reproducer, nothing happens."

References

Affected packages

Ubuntu:Pro:14.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.157-1ubuntu1
0.158-0ubuntu3
0.158-0ubuntu4
0.158-0ubuntu5
0.158-0ubuntu5.1
0.158-0ubuntu5.2
0.158-0ubuntu5.3
0.158-0ubuntu5.3+esm1

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:Pro:16.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.163-4ubuntu1
0.163-5.1
0.164-1
0.165-3
0.165-3ubuntu1
0.165-3ubuntu1.1
0.165-3ubuntu1.2
0.165-3ubuntu1.2+esm1

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:Pro:18.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.170-0.1
0.170-0.2
0.170-0.3
0.170-0.4
0.170-0.4ubuntu0.1
0.170-0.4ubuntu0.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}