Security update for elfutils

SUSE Security Update: Security update for elfutils
Announcement ID: SUSE-SU-2015:0434-1
Rating: moderate
References: #911662
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Desktop 11 SP3

  • An update that fixes one vulnerability is now available.

    Description:


    elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
    read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
    0.161 allowed remote attackers to write to arbitrary files to the
    root directory via a / (slash) in a crafted archive, as demonstrated
    using the ar program (bnc#911662).

    Security Issues:

    * CVE-2014-9447

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-elfutils=10328
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-elfutils=10328
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-elfutils=10328
    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-elfutils=10328

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • libasm-devel-0.152-4.9.17
      • libdw-devel-0.152-4.9.17
      • libebl-devel-0.152-4.9.17
      • libelf-devel-0.152-4.9.17
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (x86_64):
      • libelf1-32bit-0.152-4.9.17
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
      • elfutils-0.152-4.9.17
      • libasm1-0.152-4.9.17
      • libdw1-0.152-4.9.17
      • libebl1-0.152-4.9.17
      • libelf1-0.152-4.9.17
    • SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
      • libasm1-32bit-0.152-4.9.17
      • libdw1-32bit-0.152-4.9.17
      • libebl1-32bit-0.152-4.9.17
      • libelf1-32bit-0.152-4.9.17
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • elfutils-0.152-4.9.17
      • libasm1-0.152-4.9.17
      • libdw1-0.152-4.9.17
      • libebl1-0.152-4.9.17
      • libelf1-0.152-4.9.17
    • SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
      • libasm1-32bit-0.152-4.9.17
      • libdw1-32bit-0.152-4.9.17
      • libebl1-32bit-0.152-4.9.17
      • libelf1-32bit-0.152-4.9.17
    • SUSE Linux Enterprise Server 11 SP3 (ia64):
      • libdw1-x86-0.152-4.9.17
      • libebl1-x86-0.152-4.9.17
      • libelf1-x86-0.152-4.9.17
    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
      • elfutils-0.152-4.9.17
      • libasm1-0.152-4.9.17
      • libdw1-0.152-4.9.17
      • libebl1-0.152-4.9.17
      • libelf1-0.152-4.9.17
    • SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
      • libdw1-32bit-0.152-4.9.17
      • libebl1-32bit-0.152-4.9.17
      • libelf1-32bit-0.152-4.9.17

    References:

    • http://support.novell.com/security/cve/CVE-2014-9447.html
    • https://bugzilla.suse.com/911662
    • http://download.suse.com/patch/finder/?keywords=5917735137bccf43b36b187166bb4d3b