UBUNTU-CVE-2024-25260

Source
https://ubuntu.com/security/CVE-2024-25260
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-25260.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-25260
Related
Published
2024-02-20T18:15:00Z
Modified
2025-01-13T10:24:50Z
Summary
[none]
Details

elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c.

References

Affected packages

Ubuntu:Pro:14.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.158-0ubuntu5.3+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.157-1ubuntu1
0.158-0ubuntu3
0.158-0ubuntu4
0.158-0ubuntu5
0.158-0ubuntu5.1
0.158-0ubuntu5.2
0.158-0ubuntu5.3
0.158-0ubuntu5.3+esm1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:Pro:16.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.165-3ubuntu1.2+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.163-4ubuntu1
0.163-5.1
0.164-1
0.165-3
0.165-3ubuntu1
0.165-3ubuntu1.1
0.165-3ubuntu1.2
0.165-3ubuntu1.2+esm1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:Pro:18.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.170-0.4ubuntu0.1+esm1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.170-0.1
0.170-0.2
0.170-0.3
0.170-0.4
0.170-0.4ubuntu0.1
0.170-0.4ubuntu0.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:20.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.176-1.1ubuntu0.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.176-1.1
0.176-1.1build1
0.176-1.1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:22.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.186-1build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.185-1build1
0.185-2
0.186-1
0.186-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:24.10 / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.191-2?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.190-1.1build4
0.191-1
0.191-2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}

Ubuntu:24.04:LTS / elfutils

Package

Name
elfutils
Purl
pkg:deb/ubuntu/elfutils@0.190-1.1build4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.189-4
0.190-1
0.190-1.1build2
0.190-1.1build3
0.190-1.1build4

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "No security impact per upstream elfutils developers"
}