Debian Security Advisory

DLA-1689-1 elfutils -- LTS security update

Date Reported:
25 Feb 2019
Affected Packages:
elfutils
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-7608, CVE-2017-7610, CVE-2017-7611, CVE-2017-7612, CVE-2017-7613, CVE-2018-16062, CVE-2018-18310, CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150, CVE-2019-7665.
More information:

Several issues in elfutils, a collection of utilities to handle ELF objects, have been found either by fuzzing or by using an AddressSanitizer.

  • CVE-2019-7665

    Due to a heap-buffer-overflow problem in function elf32_xlatetom() a crafted ELF input can cause segmentation faults.

  • CVE-2019-7150

    Add sanity check for partial core file dynamic data read.

  • CVE-2019-7149

    Due to a heap-buffer-overflow problem in function read_srclines() a crafted ELF input can cause segmentation faults.

  • CVE-2018-18521

    By using a crafted ELF file, containing a zero sh_entsize, a divide-by-zero vulnerability could allow remote attackers to cause a denial of service (application crash).

  • CVE-2018-18520

    By fuzzing an Invalid Address Deference problem in function elf_end has been found.

  • CVE-2018-18310

    By fuzzing an Invalid Address Read problem in eu-stack has been found.

  • CVE-2018-16062

    By using an AddressSanitizer a heap-buffer-overflow has been found.

  • CVE-2017-7613

    By using fuzzing it was found that an allocation failure was not handled properly.

  • CVE-2017-7612

    By using a crafted ELF file, containing an invalid sh_entsize, a remote attackers could cause a denial of service (application crash).

  • CVE-2017-7611

    By using a crafted ELF file a remote attackers could cause a denial of service (application crash).

  • CVE-2017-7610

    By using a crafted ELF file a remote attackers could cause a denial of service (application crash).

  • CVE-2017-7608

    By fuzzing a heap based buffer overflow has been detected.

For Debian 8 "Jessie", these problems have been fixed in version 0.159-4.2+deb8u1.

We recommend that you upgrade your elfutils packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS