CVE-2018-16403 – elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash
https://notcve.org/view.php?id=CVE-2018-16403
libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash. libdw en elfutils 0.173 comprueba incorrectamente el final de la lista de atributos en dwarf_getabbrev en dwarf_getabbrev.c y dwarf_hasattr en dwarf_hasattr.c, lo que conduce a una sobrelectura de búfer basada en memoria dinámica (heap) y al cierre inesperado de la aplicación. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/errata/RHSA-2019:2197 https://sourceware.org/bugzilla/show_bug.cgi?id=23529 https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=6983e59b727458a6c64d9659c85f08218bc4fcda https://usn.ubuntu.com/4012-1 https://access.redhat.com/security/cve/CVE-2018-16403 https://bugzilla.redhat.com/show_bug.cgi?id=1625055 • CWE-125: Out-of-bounds Read •
CVE-2018-16062 – elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file
https://notcve.org/view.php?id=CVE-2018-16062
dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file. dwarf_getaranges en dwarf_getaranges.c en libdw en elfutils en versiones anteriores al 18/08/2018 permite que atacantes remotos provoquen una denegación de servicio (sobrelectura de búfer basada en memoria dinámica o heap) mediante un archivo manipulado. An out-of-bounds read was discovered in elfutils in the way it reads DWARF address ranges information. Function dwarf_getaranges() in dwarf_getaranges.c does not properly check whether it reads beyond the limits of the ELF section. An attacker could use this flaw to cause a denial of service via a crafted file. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/errata/RHSA-2019:2197 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html https://sourceware.org/bugzilla/show_bug.cgi?id=23541 https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=29e31978ba51c1051743a503ee325b5ebc03d7e9 https://usn.ubuntu.com/4012-1 https://access.redhat.com/security/cve/CVE-2018-16062 • CWE-125: Out-of-bounds Read •
CVE-2018-8769
https://notcve.org/view.php?id=CVE-2018-8769
elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported. elfutils 0.170 tiene una sobrelectura de búfer en la función ebl_dynamic_tag_name de libebl/ebldynamictagname.c debido a que SYMTAB_SHNDX no está soportado. • https://sourceware.org/bugzilla/show_bug.cgi?id=22976 • CWE-125: Out-of-bounds Read •
CVE-2017-7609
https://notcve.org/view.php?id=CVE-2017-7609
elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file. elf_compress.c en elfutils 0.168 no valida el factor de compresión zlib, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de un archivo ELF manipulado. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c https://security.gentoo.org/glsa/201710-10 https://usn.ubuntu.com/3670-1 • CWE-20: Improper Input Validation •
CVE-2017-7612
https://notcve.org/view.php?id=CVE-2017-7612
The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file. La función check_sysv_hash en elflint.c en elfutils 0.168 permite a atacantes remotos provocar una denegación de servicio (sobre lectura de búfer basado en memoria dinámica y caída de la aplicación) a través de un archivo ELF manipulado. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://usn.ubuntu.com/3670-1 • CWE-125: Out-of-bounds Read •