Elfutils is a collection of utilities, including stack (to show backtraces), nm (for listing symbols from object files), size (for listing the section sizes of an object or archive file), strip (for discarding symbols), readelf (to see the raw ELF file structures), elflint (to check for well-formed ELF files) and elfcompress (to compress or decompress ELF sections). Also included are helper libraries which implement DWARF, ELF, and machine-specific ELF handling and process introspection. It also provides a DSO which allows reading and writing ELF files on a high level. Third party programs depend on this package to read internals of ELF files. Yama sysctl setting to enable default attach scope settings enabling programs to use ptrace attach, access to /proc/PID/{mem,personality,stack,syscall}, and the syscalls processvmreadv and processvmwritev which are used for interprocess services, communication and introspection (like synchronisation, signaling, debugging, tracing and profiling) of processes.
Security Fix(es):
A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function _libdwthreadtail in the library libdwalloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue.(CVE-2025-1352)
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dumpdatasection/printstringsection of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.(CVE-2025-1372)
A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elfstrptr in the library /libelf/elfstrptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.(CVE-2025-1376)
A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue.(CVE-2025-1377)
{ "severity": "Medium" }
{ "aarch64": [ "elfutils-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-debuginfo-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-debuginfod-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-debuginfod-client-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-debuginfod-client-devel-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-debugsource-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-devel-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-extra-0.185-20.oe2203sp3.aarch64.rpm", "elfutils-help-0.185-20.oe2203sp3.aarch64.rpm" ], "src": [ "elfutils-0.185-20.oe2203sp3.src.rpm" ], "x86_64": [ "elfutils-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-debuginfo-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-debuginfod-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-debuginfod-client-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-debuginfod-client-devel-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-debugsource-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-devel-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-extra-0.185-20.oe2203sp3.x86_64.rpm", "elfutils-help-0.185-20.oe2203sp3.x86_64.rpm" ] }