vulnerability
SUSE: CVE-2019-7148: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jan 29, 2019 | Aug 9, 2024 | Aug 9, 2024 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jan 29, 2019
Added
Aug 9, 2024
Modified
Aug 9, 2024
Description
An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Solutions
suse-upgrade-dwarvessuse-upgrade-elfutilssuse-upgrade-elfutils-langsuse-upgrade-libasm-develsuse-upgrade-libasm1suse-upgrade-libasm1-32bitsuse-upgrade-libdw-develsuse-upgrade-libdw1suse-upgrade-libdw1-32bitsuse-upgrade-libdwarves-develsuse-upgrade-libdwarves-devel-32bitsuse-upgrade-libdwarves1suse-upgrade-libdwarves1-32bitsuse-upgrade-libebl-develsuse-upgrade-libebl-pluginssuse-upgrade-libebl-plugins-32bitsuse-upgrade-libelf-develsuse-upgrade-libelf-devel-32bitsuse-upgrade-libelf1suse-upgrade-libelf1-32bit
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.