Package "libelf1t64"
Name: |
libelf1t64
|
Description: |
library to read and write ELF files
|
Latest version: |
0.191-2ubuntu0.1 |
Release: |
oracular (24.10) |
Level: |
security |
Repository: |
main |
Head package: |
elfutils |
Homepage: |
https://sourceware.org/elfutils/ |
Links
Download "libelf1t64"
Other versions of "libelf1t64" in Oracular
Changelog
elfutils (0.191-2ubuntu0.1) oracular-security; urgency=medium
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2025-1365.patch: Use validate_str also to check
dynamic symstr data.
- CVE-2025-1365
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1371.patch: Handle NULL phdr in
handle_dynamic_symtab.
- CVE-2025-1371
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1372.patch: Skip trying to uncompress
sections without a name.
- CVE-2025-1372
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1377.patch: Verify symbol table is a real
symbol table.
- CVE-2025-1377
-- Fabian Toepfer <email address hidden> Mon, 17 Mar 2025 16:56:15 +0100
|
CVE-2025-1365 |
A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of |
CVE-2025-1371 |
A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of |
CVE-2025-1372 |
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/p |
CVE-2025-1377 |
A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the f |
|
About
-
Send Feedback to @ubuntu_updates