Package "elfutils"
Name: |
elfutils
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- debuginfo-related http file-server daemon
|
Latest version: |
0.191-2ubuntu0.1 |
Release: |
oracular (24.10) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "elfutils" in Oracular
Packages in group
Deleted packages are displayed in grey.
Changelog
elfutils (0.191-2ubuntu0.1) oracular-security; urgency=medium
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2025-1365.patch: Use validate_str also to check
dynamic symstr data.
- CVE-2025-1365
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1371.patch: Handle NULL phdr in
handle_dynamic_symtab.
- CVE-2025-1371
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1372.patch: Skip trying to uncompress
sections without a name.
- CVE-2025-1372
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2025-1377.patch: Verify symbol table is a real
symbol table.
- CVE-2025-1377
-- Fabian Toepfer <email address hidden> Mon, 17 Mar 2025 16:56:15 +0100
|
CVE-2025-1365 |
A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of |
CVE-2025-1371 |
A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of |
CVE-2025-1372 |
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/p |
CVE-2025-1377 |
A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the f |
|
About
-
Send Feedback to @ubuntu_updates