CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
83.8%
CentOS Errata and Security Advisory CESA-2019:2197
The elfutils packages contain a number of utility programs and libraries related to the creation and maintenance of executable code.
The following packages have been upgraded to a later upstream version: elfutils (0.176). (BZ#1676504)
Security Fix(es):
elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file (CVE-2018-16062)
elfutils: Double-free due to double decompression of sections in crafted ELF causes crash (CVE-2018-16402)
elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash (CVE-2018-16403)
elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl (CVE-2018-18310)
elfutils: eu-size cannot handle recursive ar files (CVE-2018-18520)
elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c (CVE-2018-18521)
elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149)
elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150)
elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664)
elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032126.html
Affected packages:
elfutils
elfutils-default-yama-scope
elfutils-devel
elfutils-devel-static
elfutils-libelf
elfutils-libelf-devel
elfutils-libelf-devel-static
elfutils-libs
Upstream details at:
https://access.redhat.com/errata/RHSA-2019:2197
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | elfutils | <ย 0.176-2.el7 | elfutils-0.176-2.el7.x86_64.rpm |
CentOS | 7 | noarch | elfutils-default-yama-scope | <ย 0.176-2.el7 | elfutils-default-yama-scope-0.176-2.el7.noarch.rpm |
CentOS | 7 | i686 | elfutils-devel | <ย 0.176-2.el7 | elfutils-devel-0.176-2.el7.i686.rpm |
CentOS | 7 | x86_64 | elfutils-devel | <ย 0.176-2.el7 | elfutils-devel-0.176-2.el7.x86_64.rpm |
CentOS | 7 | i686 | elfutils-devel-static | <ย 0.176-2.el7 | elfutils-devel-static-0.176-2.el7.i686.rpm |
CentOS | 7 | x86_64 | elfutils-devel-static | <ย 0.176-2.el7 | elfutils-devel-static-0.176-2.el7.x86_64.rpm |
CentOS | 7 | i686 | elfutils-libelf | <ย 0.176-2.el7 | elfutils-libelf-0.176-2.el7.i686.rpm |
CentOS | 7 | x86_64 | elfutils-libelf | <ย 0.176-2.el7 | elfutils-libelf-0.176-2.el7.x86_64.rpm |
CentOS | 7 | i686 | elfutils-libelf-devel | <ย 0.176-2.el7 | elfutils-libelf-devel-0.176-2.el7.i686.rpm |
CentOS | 7 | x86_64 | elfutils-libelf-devel | <ย 0.176-2.el7 | elfutils-libelf-devel-0.176-2.el7.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
83.8%