Scientific Linux Security Update : elfutils on SL7.x x86_64 (20190806)

critical Nessus Plugin ID 128214

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

The following packages have been upgraded to a later upstream version:
elfutils (0.176).

Security Fix(es) :

- elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file (CVE-2018-16062)

- elfutils: Double-free due to double decompression of sections in crafted ELF causes crash (CVE-2018-16402)

- elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash (CVE-2018-16403)

- elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl (CVE-2018-18310)

- elfutils: eu-size cannot handle recursive ar files (CVE-2018-18520)

- elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c (CVE-2018-18521)

- elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149)

- elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150)

- elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664)

- elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?5d9aff1e

Plugin Details

Severity: Critical

ID: 128214

File Name: sl_20190806_elfutils_on_SL7_x.nasl

Version: 1.4

Type: local

Agent: unix

Published: 8/27/2019

Updated: 5/1/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-16402

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:elfutils, p-cpe:/a:fermilab:scientific_linux:elfutils-debuginfo, p-cpe:/a:fermilab:scientific_linux:elfutils-default-yama-scope, p-cpe:/a:fermilab:scientific_linux:elfutils-devel, p-cpe:/a:fermilab:scientific_linux:elfutils-devel-static, p-cpe:/a:fermilab:scientific_linux:elfutils-libelf, p-cpe:/a:fermilab:scientific_linux:elfutils-libelf-devel, p-cpe:/a:fermilab:scientific_linux:elfutils-libelf-devel-static, p-cpe:/a:fermilab:scientific_linux:elfutils-libs, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2019

Vulnerability Publication Date: 8/29/2018

Reference Information

CVE: CVE-2018-16062, CVE-2018-16402, CVE-2018-16403, CVE-2018-18310, CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150, CVE-2019-7664, CVE-2019-7665