diff options
| author | Soumya Sambu <soumya.sambu@windriver.com> | 2025-05-05 11:47:11 +0000 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-05-08 13:37:29 -0700 |
| commit | 38a5779745ec3a75cb573c802139b7fcb853f21d (patch) | |
| tree | 7afdf4ce0011309aabf6e537a88be57e163635b9 | |
| parent | 2e1dd3c3d687ea2c3242e5113dcc3fca59a28e29 (diff) | |
| download | poky-38a5779745ec3a75cb573c802139b7fcb853f21d.tar.gz | |
elfutils: Fix CVE-2025-1371
A vulnerability has been found in GNU elfutils 0.192 and classified as problematic.
This vulnerability affects the function handle_dynamic_symtab of the file readelf.c
of the component eu-read. The manipulation leads to null pointer dereference.
Attacking locally is a requirement. The exploit has been disclosed to the public and
may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It
is recommended to apply a patch to fix this issue.
References:
https://nvd.nist.gov/vuln/detail/CVE-2025-1371
https://ubuntu.com/security/CVE-2025-1371
Upstream patch:
https://sourceware.org/cgit/elfutils/commit/?id=b38e562a4c907e08171c76b8b2def8464d5a104a
(From OE-Core rev: 11c44bde4f3d9e63506ece2f9b27114914aacc4b)
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/recipes-devtools/elfutils/elfutils_0.191.bb | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch | 41 |
2 files changed, 42 insertions, 0 deletions
diff --git a/meta/recipes-devtools/elfutils/elfutils_0.191.bb b/meta/recipes-devtools/elfutils/elfutils_0.191.bb index 85e024179b..bab3d94d12 100644 --- a/meta/recipes-devtools/elfutils/elfutils_0.191.bb +++ b/meta/recipes-devtools/elfutils/elfutils_0.191.bb | |||
| @@ -26,6 +26,7 @@ SRC_URI = "https://sourceware.org/elfutils/ftp/${PV}/${BP}.tar.bz2 \ | |||
| 26 | file://CVE-2025-1352.patch \ | 26 | file://CVE-2025-1352.patch \ |
| 27 | file://CVE-2025-1365.patch \ | 27 | file://CVE-2025-1365.patch \ |
| 28 | file://CVE-2025-1372.patch \ | 28 | file://CVE-2025-1372.patch \ |
| 29 | file://CVE-2025-1371.patch \ | ||
| 29 | " | 30 | " |
| 30 | SRC_URI:append:libc-musl = " \ | 31 | SRC_URI:append:libc-musl = " \ |
| 31 | file://0003-musl-utils.patch \ | 32 | file://0003-musl-utils.patch \ |
diff --git a/meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch b/meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch new file mode 100644 index 0000000000..ebb57bd4e5 --- /dev/null +++ b/meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch | |||
| @@ -0,0 +1,41 @@ | |||
| 1 | From b38e562a4c907e08171c76b8b2def8464d5a104a Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Mark Wielaard <mark@klomp.org> | ||
| 3 | Date: Sun, 9 Feb 2025 00:07:13 +0100 | ||
| 4 | Subject: [PATCH] readelf: Handle NULL phdr in handle_dynamic_symtab | ||
| 5 | |||
| 6 | A corrupt ELF file can have broken program headers, in which case | ||
| 7 | gelf_getphdr returns NULL. This could crash handle_dynamic_symtab | ||
| 8 | while searching for the PT_DYNAMIC phdr. Fix this by checking whether | ||
| 9 | gelf_phdr returns NULL. | ||
| 10 | |||
| 11 | * src/readelf.c (handle_dynamic_symtab): Check whether | ||
| 12 | gelf_getphdr returns NULL. | ||
| 13 | |||
| 14 | https://sourceware.org/bugzilla/show_bug.cgi?id=32655 | ||
| 15 | |||
| 16 | Signed-off-by: Mark Wielaard <mark@klomp.org> | ||
| 17 | |||
| 18 | CVE: CVE-2025-1371 | ||
| 19 | |||
| 20 | Upstream-Status: Backport [https://sourceware.org/cgit/elfutils/commit/?id=b38e562a4c907e08171c76b8b2def8464d5a104a] | ||
| 21 | |||
| 22 | Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> | ||
| 23 | --- | ||
| 24 | src/readelf.c | 2 +- | ||
| 25 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 26 | |||
| 27 | diff --git a/src/readelf.c b/src/readelf.c | ||
| 28 | index fc04556..13344bf 100644 | ||
| 29 | --- a/src/readelf.c | ||
| 30 | +++ b/src/readelf.c | ||
| 31 | @@ -2912,7 +2912,7 @@ handle_dynamic_symtab (Ebl *ebl) | ||
| 32 | for (size_t i = 0; i < phnum; ++i) | ||
| 33 | { | ||
| 34 | phdr = gelf_getphdr (ebl->elf, i, &phdr_mem); | ||
| 35 | - if (phdr->p_type == PT_DYNAMIC) | ||
| 36 | + if (phdr == NULL || phdr->p_type == PT_DYNAMIC) | ||
| 37 | break; | ||
| 38 | } | ||
| 39 | if (phdr == NULL) | ||
| 40 | -- | ||
| 41 | 2.40.0 | ||
