{"affected":[{"ecosystem_specific":{"binaries":[{"elfutils":"0.168-4.5.3","elfutils-lang":"0.168-4.5.3","libasm-devel":"0.168-4.5.3","libasm1":"0.168-4.5.3","libdw-devel":"0.168-4.5.3","libdw1":"0.168-4.5.3","libdw1-32bit":"0.168-4.5.3","libebl-devel":"0.168-4.5.3","libebl-plugins":"0.168-4.5.3","libebl-plugins-32bit":"0.168-4.5.3","libelf-devel":"0.168-4.5.3","libelf1":"0.168-4.5.3","libelf1-32bit":"0.168-4.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"elfutils","purl":"pkg:rpm/suse/elfutils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.168-4.5.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"elfutils":"0.168-4.5.3","elfutils-lang":"0.168-4.5.3","libasm-devel":"0.168-4.5.3","libasm1":"0.168-4.5.3","libdw-devel":"0.168-4.5.3","libdw1":"0.168-4.5.3","libdw1-32bit":"0.168-4.5.3","libebl-devel":"0.168-4.5.3","libebl-plugins":"0.168-4.5.3","libebl-plugins-32bit":"0.168-4.5.3","libelf-devel":"0.168-4.5.3","libelf1":"0.168-4.5.3","libelf1-32bit":"0.168-4.5.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"elfutils","purl":"pkg:rpm/suse/elfutils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.168-4.5.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for elfutils fixes the following issues:\n\nSecurity issues fixed:  \n\n- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084)\n- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085)\n- CVE-2017-7609: Fixed a memory allocation failure in __libelf_decompress (bsc#1033086)\n- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087)\n- CVE-2017-7611: Fixed a denial of service via a crafted ELF file (bsc#1033088)\n- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089)\n- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections and the number of segments in a crafted ELF file (bsc#1033090)\n- CVE-2018-16062: Fixed a heap-buffer overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)\n- CVE-2018-16402: Fixed a denial of service/double free on an attempt to decompress the same section twice (bsc#1107066)\n- CVE-2018-16403: Fixed a heap buffer overflow in readelf (bsc#1107067)\n- CVE-2018-18310: Fixed an invalid address read problem in dwfl_segment_report_module.c (bsc#1111973)\n- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726)\n- CVE-2018-18521: Fixed a denial of service vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bsc#1112723)\n- CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bsc#1123685)\n- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007)\n","id":"SUSE-SU-2019:1486-1","modified":"2019-06-13T07:40:27Z","published":"2019-06-13T07:40:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20191486-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1106390"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1123685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1125007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7609"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7613"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16402"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7665"}],"related":["CVE-2017-7607","CVE-2017-7608","CVE-2017-7609","CVE-2017-7610","CVE-2017-7611","CVE-2017-7612","CVE-2017-7613","CVE-2018-16062","CVE-2018-16402","CVE-2018-16403","CVE-2018-18310","CVE-2018-18520","CVE-2018-18521","CVE-2019-7150","CVE-2019-7665"],"summary":"Security update for elfutils","upstream":["CVE-2017-7607","CVE-2017-7608","CVE-2017-7609","CVE-2017-7610","CVE-2017-7611","CVE-2017-7612","CVE-2017-7613","CVE-2018-16062","CVE-2018-16402","CVE-2018-16403","CVE-2018-18310","CVE-2018-18520","CVE-2018-18521","CVE-2019-7150","CVE-2019-7665"]}