Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in elfutils
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in elfutils
ID: USN-7369-1
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Di, 25. März 2025, 06:34
Referenzen: https://www.cve.org/CVERecord?id=CVE-2025-1377
https://www.cve.org/CVERecord?id=CVE-2024-25260
https://www.cve.org/CVERecord?id=CVE-2025-1365
https://www.cve.org/CVERecord?id=CVE-2025-1372
https://www.cve.org/CVERecord?id=CVE-2025-1371
Applikationen: elfutils

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6360408498936692504==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------PizB2pD0z4sA1ABIbg2zgLdB"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------PizB2pD0z4sA1ABIbg2zgLdB
Content-Type: multipart/mixed;
boundary="------------lmtYBcjFbkthhm3Xob8miyeD";
protected-headers="v1"
From: Fabian Toepfer <fabian.toepfer@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <5b30a566-23cb-4aed-9688-c67a1c06c135@canonical.com>
Subject: [USN-7369-1] elfutils vulnerabilities

--------------lmtYBcjFbkthhm3Xob8miyeD
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7369-1
March 24, 2025

elfutils vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in elfutils.

Software Description:
- elfutils: collection of utilities to handle ELF objects

Details:

It was discovered that readelf from elfutils could be made to read out of
bounds. If a user or automated system were tricked into running readelf
on a specially crafted file, an attacker could cause readelf to crash,
resulting in a denial of service. This issue only affected Ubuntu 24.04
LTS. (CVE-2024-25260)

It was discovered that readelf from elfutils could be made to write out of
bounds. If a user or automated system were tricked into running readelf
on a specially crafted file, an attacker could cause readelf to crash,
resulting in a denial of service, or possibly execute arbitrary code.
This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365)

It was discovered that readelf from elfutils could be made to dereference
invalid memory. If a user or automated system were tricked into running
readelf on a specially crafted file, an attacker could cause readelf to
crash, resulting in a denial of service. This issue only affected Ubuntu
24.04 LTS and Ubuntu 24.10. (CVE-2025-1371)

It was discovered that readelf from elfutils could be made to dereference
invalid memory. If a user or automated system were tricked into running
readelf on a specially crafted file, an attacker could cause readelf to
crash, resulting in a denial of service. (CVE-2025-1372)

It was discovered that strip from elfutils could be made to dereference
invalid memory. If a user or automated system were tricked into running
strip on a specially crafted file, an attacker could cause strip to
crash, resulting in a denial of service. (CVE-2025-1377)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  elfutils                        0.191-2ubuntu0.1

Ubuntu 24.04 LTS
  elfutils                        0.190-1.1ubuntu0.1

Ubuntu 22.04 LTS
  elfutils                        0.186-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7369-1
  CVE-2024-25260, CVE-2025-1365, CVE-2025-1371, CVE-2025-1372,
  CVE-2025-1377

Package Information:
  https://launchpad.net/ubuntu/+source/elfutils/0.191-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/elfutils/0.190-1.1ubuntu0.1
  https://launchpad.net/ubuntu/+source/elfutils/0.186-1ubuntu0.1

--------------lmtYBcjFbkthhm3Xob8miyeD--

--------------PizB2pD0z4sA1ABIbg2zgLdB
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=sMGK
-----END PGP SIGNATURE-----

--------------PizB2pD0z4sA1ABIbg2zgLdB--


--===============6360408498936692504==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============6360408498936692504==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung