drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in elfutils
| Name: |
Mehrere Probleme in elfutils |
|
| ID: |
USN-7369-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Di, 25. März 2025, 06:34 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2025-1377
https://www.cve.org/CVERecord?id=CVE-2024-25260
https://www.cve.org/CVERecord?id=CVE-2025-1365
https://www.cve.org/CVERecord?id=CVE-2025-1372
https://www.cve.org/CVERecord?id=CVE-2025-1371 |
|
| Applikationen: |
elfutils |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6360408498936692504== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------PizB2pD0z4sA1ABIbg2zgLdB"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------PizB2pD0z4sA1ABIbg2zgLdB Content-Type: multipart/mixed; boundary="------------lmtYBcjFbkthhm3Xob8miyeD"; protected-headers="v1" From: Fabian Toepfer <fabian.toepfer@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <5b30a566-23cb-4aed-9688-c67a1c06c135@canonical.com> Subject: [USN-7369-1] elfutils vulnerabilities
--------------lmtYBcjFbkthhm3Xob8miyeD Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7369-1 March 24, 2025
elfutils vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in elfutils.
Software Description: - elfutils: collection of utilities to handle ELF objects
Details:
It was discovered that readelf from elfutils could be made to read out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-25260)
It was discovered that readelf from elfutils could be made to write out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365)
It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1371)
It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. (CVE-2025-1372)
It was discovered that strip from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running strip on a specially crafted file, an attacker could cause strip to crash, resulting in a denial of service. (CVE-2025-1377)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 elfutils 0.191-2ubuntu0.1
Ubuntu 24.04 LTS elfutils 0.190-1.1ubuntu0.1
Ubuntu 22.04 LTS elfutils 0.186-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7369-1 CVE-2024-25260, CVE-2025-1365, CVE-2025-1371, CVE-2025-1372, CVE-2025-1377
Package Information: https://launchpad.net/ubuntu/+source/elfutils/0.191-2ubuntu0.1 https://launchpad.net/ubuntu/+source/elfutils/0.190-1.1ubuntu0.1 https://launchpad.net/ubuntu/+source/elfutils/0.186-1ubuntu0.1
--------------lmtYBcjFbkthhm3Xob8miyeD--
--------------PizB2pD0z4sA1ABIbg2zgLdB Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEE2WgtvmwmcgaEBLlnCAvK1QvD6SAFAmfh1xIFAwAAAAAACgkQCAvK1QvD6SAV BRAAkpR0ZPyWqraofEoYAQCai2k+3V2hERtUydSUkBNgajP4uEtMBbfxNUNyZmkC0sx+uHEILULw OGWAKB/YbX4SfGRVh4fDyis5sqLOb9xQB6umUnXqLr8/YfxsruqoD6Am6fewqCiPYMUrZbYOsbrf qVzkD5lSu5LPDznGDPQT368mvxFnpY0EFhYyVeI++N8C4kzHzGMP4rv1OjpO3g1+OCx0UzqamqLl 7kFplST/rfzr+Z7CmnjaO0Im3Lf2FDu89kaxUH/bh4eZW/mWd42eaOBE0OmoJby5Xb3hsI+RQ0sP QhaY+pFxTGNhaVlAumD/0DpwxbD4vCZpramHRyZO4qn9SL0hsHTgnDy3JBnkDibw4J9KuzkXoXph 0PA05ZV61ysVxCXzgZUdedhbsK4oPxN9G250Cszi0io6AGV8o3iWJe76dfNlWSbHPhn82ZCb4eRh 4PReljtnDyydS6JcMWVEv9f06jpNsUvtLqYAjo9VoudQ3wRG7WSc5Zq8ccGapczJJukY81Wj4JnX MJd9/OKFoP83SmxZi8ygP2c4e1NbVa5XLZ/rnhYXNlyfmywu5c9aX3WCtmBmsUIP+qvz4CMsXJVF eOxLCzZKJy1y1+pCYPu6hG/h027ppnjgaHshXban/59GSE4hrN+lSSXciDoKzrsL8oJ1cU3sqMPV XWs= =sMGK -----END PGP SIGNATURE-----
--------------PizB2pD0z4sA1ABIbg2zgLdB--
--===============6360408498936692504== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============6360408498936692504==--
|
|
|
|