Your message dated Tue, 22 Apr 2025 17:25:10 +0000
with message-id <e1u7hms-008p3w...@fasolo.debian.org>
and subject line Bug#1103642: Removed package(s) from unstable
has caused the Debian Bug report #1014122,
regarding libelfin: CVE-2020-24821 CVE-2020-24822 CVE-2020-24823 CVE-2020-24824 
CVE-2020-24825 CVE-2020-24826 CVE-2020-24827
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1014122: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014122
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libelfin
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libelfin.

CVE-2020-24821[0]:
| A vulnerability in the dwarf::cursor::skip_form function of Libelfin
| v0.3 allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/52
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc191

CVE-2020-24822[1]:
| A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3
| allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/50
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154

CVE-2020-24823[2]:
| A vulnerability in the dwarf::to_string function of Libelfin v0.3
| allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/51
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300

CVE-2020-24824[3]:
| A global buffer overflow issue in the dwarf::line_table::line_table
| function of Libelfin v0.3 allows attackers to cause a denial of
| service (DOS).

https://github.com/aclements/libelfin/issues/48
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107

CVE-2020-24825[4]:
| A vulnerability in the line_table::line_table function of Libelfin
| v0.3 allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/46
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104

CVE-2020-24826[5]:
| A vulnerability in the elf::section::as_strtab function of Libelfin
| v0.3 allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/49
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284

CVE-2020-24827[6]:
| A vulnerability in the dwarf::cursor::skip_form function of Libelfin
| v0.3 allows attackers to cause a denial of service (DOS) through a
| segmentation fault via a crafted ELF file.

https://github.com/aclements/libelfin/issues/47
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc181

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-24821
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24821
[1] https://security-tracker.debian.org/tracker/CVE-2020-24822
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24822
[2] https://security-tracker.debian.org/tracker/CVE-2020-24823
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24823
[3] https://security-tracker.debian.org/tracker/CVE-2020-24824
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24824
[4] https://security-tracker.debian.org/tracker/CVE-2020-24825
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24825
[5] https://security-tracker.debian.org/tracker/CVE-2020-24826
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24826
[6] https://security-tracker.debian.org/tracker/CVE-2020-24827
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24827

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
Version: 0.3-5+rm

Dear submitter,

as the package libelfin has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1103642

The version of this package that was in Debian prior to this removal
can still be found using https://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Thorsten Alteholz (the ftpmaster behind the curtain)

--- End Message ---

Reply via email to