2024-06-28 13:17:52 +00:00

229 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182658",
"Version": "oval:org.altlinux.errata:def:20182658",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2658: package `elfutils` update to version 0.175-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2658",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2658",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-01517",
"RefURL": "https://bdu.fstec.ru/vul/2018-01517",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01236",
"RefURL": "https://bdu.fstec.ru/vul/2019-01236",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01385",
"RefURL": "https://bdu.fstec.ru/vul/2021-01385",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01428",
"RefURL": "https://bdu.fstec.ru/vul/2021-01428",
"Source": "BDU"
},
{
"RefID": "CVE-2018-18310",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18520",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7148",
"Source": "CVE"
}
],
"Description": "This update upgrades elfutils to version 0.175-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01517: Уязвимость библиотеки libdwfl утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01236: Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01385: Уязвимость функции arlib_add_symbols() файла arlib.c набора утилит для обработки объектов ELF Elfutils, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01428: Уязвимость функции elf_end библиотеки libelf набора утилит для обработки объектов ELF Elfutils, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-18310: An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.\n\n * CVE-2018-18520: An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.\n\n * CVE-2018-18521: Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.\n\n * CVE-2019-7148: An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a \"warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens.\"",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-11-16"
},
"Updated": {
"Date": "2018-11-16"
},
"BDUs": [
{
"ID": "BDU:2018-01517",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-01517",
"Impact": "Low",
"Public": "20181010"
},
{
"ID": "BDU:2019-01236",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-400, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2019-01236",
"Impact": "Low",
"Public": "20190111"
},
{
"ID": "BDU:2021-01385",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://bdu.fstec.ru/vul/2021-01385",
"Impact": "Low",
"Public": "20181017"
},
{
"ID": "BDU:2021-01428",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-01428",
"Impact": "Low",
"Public": "20181017"
}
],
"CVEs": [
{
"ID": "CVE-2018-18310",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18310",
"Impact": "Low",
"Public": "20181015"
},
{
"ID": "CVE-2018-18520",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18520",
"Impact": "Low",
"Public": "20181019"
},
{
"ID": "CVE-2018-18521",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18521",
"Impact": "Low",
"Public": "20181019"
},
{
"ID": "CVE-2019-7148",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7148",
"Impact": "Low",
"Public": "20190129"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182658001",
"Comment": "elfutils is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658002",
"Comment": "elfutils-devel is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658003",
"Comment": "elfutils-devel-static is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658004",
"Comment": "libasm is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658005",
"Comment": "libasm-devel is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658006",
"Comment": "libasm-devel-static is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658007",
"Comment": "libdw is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658008",
"Comment": "libdw-devel is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658009",
"Comment": "libdw-devel-static is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658010",
"Comment": "libelf is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658011",
"Comment": "libelf-devel is earlier than 0:0.175-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182658012",
"Comment": "libelf-devel-static is earlier than 0:0.175-alt1"
}
]
}
]
}
}
]
}