<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for elfutils is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1177</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-02-21</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-02-21</InitialReleaseDate>
		<CurrentReleaseDate>2025-02-21</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-02-21</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">elfutils security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for elfutils is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Elfutils is a collection of utilities, including stack (to show
backtraces), nm (for listing symbols from object files), size
(for listing the section sizes of an object or archive file),
strip (for discarding symbols), readelf (to see the raw ELF file
structures), elflint (to check for well-formed ELF files) and
elfcompress (to compress or decompress ELF sections).
Also included are helper libraries which implement DWARF, ELF,
and machine-specific ELF handling and process introspection.
It also provides a DSO which allows reading and
writing ELF files on a high level. Third party programs depend on
this package to read internals of ELF files. 
Yama sysctl setting to enable default attach scope settings
enabling programs to use ptrace attach, access to
/proc/PID/{mem,personality,stack,syscall}, and the syscalls
process_vm_readv and process_vm_writev which are used for
interprocess services, communication and introspection
(like synchronisation, signaling, debugging, tracing and
profiling) of processes.

Security Fix(es):

A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue.(CVE-2025-1352)

A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.(CVE-2025-1372)

A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.(CVE-2025-1376)

A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue.(CVE-2025-1377)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for elfutils is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">elfutils</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1177</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-1352</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-1372</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-1376</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-1377</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-1352</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-1372</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-1376</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-1377</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="elfutils-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfo-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfo-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-client-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-client-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-client-devel-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-client-devel-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debugsource-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debugsource-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-devel-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-devel-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-extra-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-extra-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-help-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-help-0.185-20.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="elfutils-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-0.185-20.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="elfutils-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfo-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfo-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-client-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-client-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debuginfod-client-devel-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debuginfod-client-devel-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-debugsource-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-debugsource-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-devel-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-devel-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-extra-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-extra-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="elfutils-help-0.185-20" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">elfutils-help-0.185-20.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue.</Note>
		</Notes>
		<ReleaseDate>2025-02-21</ReleaseDate>
		<CVE>CVE-2025-1352</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.0</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>elfutils security update</Description>
				<DATE>2025-02-21</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1177</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.</Note>
		</Notes>
		<ReleaseDate>2025-02-21</ReleaseDate>
		<CVE>CVE-2025-1372</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.3</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>elfutils security update</Description>
				<DATE>2025-02-21</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1177</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.</Note>
		</Notes>
		<ReleaseDate>2025-02-21</ReleaseDate>
		<CVE>CVE-2025-1376</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>2.5</BaseScore>
				<Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>elfutils security update</Description>
				<DATE>2025-02-21</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1177</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue.</Note>
		</Notes>
		<ReleaseDate>2025-02-21</ReleaseDate>
		<CVE>CVE-2025-1377</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.3</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>elfutils security update</Description>
				<DATE>2025-02-21</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1177</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>