![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.892802 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-2802-1) |
Summary: | The remote host is missing an update for the Debian 'elfutils' package(s) announced via the DLA-2802-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'elfutils' package(s) announced via the DLA-2802-1 advisory. Vulnerability Insight: Several vulnerabilities were fixed in elfutils, a collection of utilities and libraries to handle ELF objects. CVE-2018-16062 dwarf_getaranges in dwarf_getaranges.c in libdw allowed a denial of service (heap-based buffer over-read) via a crafted file. CVE-2018-16402 libelf/elf_end.c in allowed to cause a denial of service (double free and application crash) because it tried to decompress twice. CVE-2018-18310 An invalid memory address dereference libdwfl allowed a denial of service (application crash) via a crafted file. CVE-2018-18520 A use-after-free in recursive ELF ar files allowed a denial of service (application crash) via a crafted file. CVE-2018-18521 A divide-by-zero in arlib_add_symbols() allowed a denial of service (application crash) via a crafted file. CVE-2019-7150 A segmentation fault could occur due to dwfl_segment_report_module() not checking whether the dyn data read from a core file is truncated. CVE-2019-7665 NT_PLATFORM core notes contain a zero terminated string allowed a denial of service (application crash) via a crafted file. For Debian 9 stretch, these problems have been fixed in version 0.168-1+deb9u1. We recommend that you upgrade your elfutils packages. For the detailed security status of elfutils please refer to its security tracker page at: [link moved to references] Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references] Affected Software/OS: 'elfutils' package(s) on Debian 9. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-16062 https://sourceware.org/bugzilla/show_bug.cgi?id=23541 https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html RedHat Security Advisories: RHSA-2019:2197 https://access.redhat.com/errata/RHSA-2019:2197 SuSE Security Announcement: openSUSE-SU-2019:1590 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://usn.ubuntu.com/4012-1/ Common Vulnerability Exposure (CVE) ID: CVE-2018-16402 https://sourceware.org/bugzilla/show_bug.cgi?id=23528 https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E Common Vulnerability Exposure (CVE) ID: CVE-2018-18310 https://sourceware.org/bugzilla/show_bug.cgi?id=23752 https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2018-18520 https://sourceware.org/bugzilla/show_bug.cgi?id=23787 https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html Common Vulnerability Exposure (CVE) ID: CVE-2018-18521 https://sourceware.org/bugzilla/show_bug.cgi?id=23786 https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html Common Vulnerability Exposure (CVE) ID: CVE-2019-7150 https://sourceware.org/bugzilla/show_bug.cgi?id=24103 https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html RedHat Security Advisories: RHSA-2019:3575 https://access.redhat.com/errata/RHSA-2019:3575 Common Vulnerability Exposure (CVE) ID: CVE-2019-7665 https://sourceware.org/bugzilla/show_bug.cgi?id=24089 https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |