mirror of
https://git.yoctoproject.org/poky
synced 2026-02-26 11:29:40 +01:00
elfutils: Fix CVE-2025-1371
A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue. References: https://nvd.nist.gov/vuln/detail/CVE-2025-1371 https://ubuntu.com/security/CVE-2025-1371 Upstream patch: https://sourceware.org/cgit/elfutils/commit/?id=b38e562a4c907e08171c76b8b2def8464d5a104a (From OE-Core rev: 11c44bde4f3d9e63506ece2f9b27114914aacc4b) Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
committed by
Steve Sakoman
parent
2e1dd3c3d6
commit
38a5779745
@@ -26,6 +26,7 @@ SRC_URI = "https://sourceware.org/elfutils/ftp/${PV}/${BP}.tar.bz2 \
|
||||
file://CVE-2025-1352.patch \
|
||||
file://CVE-2025-1365.patch \
|
||||
file://CVE-2025-1372.patch \
|
||||
file://CVE-2025-1371.patch \
|
||||
"
|
||||
SRC_URI:append:libc-musl = " \
|
||||
file://0003-musl-utils.patch \
|
||||
|
||||
41
meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch
Normal file
41
meta/recipes-devtools/elfutils/files/CVE-2025-1371.patch
Normal file
@@ -0,0 +1,41 @@
|
||||
From b38e562a4c907e08171c76b8b2def8464d5a104a Mon Sep 17 00:00:00 2001
|
||||
From: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun, 9 Feb 2025 00:07:13 +0100
|
||||
Subject: [PATCH] readelf: Handle NULL phdr in handle_dynamic_symtab
|
||||
|
||||
A corrupt ELF file can have broken program headers, in which case
|
||||
gelf_getphdr returns NULL. This could crash handle_dynamic_symtab
|
||||
while searching for the PT_DYNAMIC phdr. Fix this by checking whether
|
||||
gelf_phdr returns NULL.
|
||||
|
||||
* src/readelf.c (handle_dynamic_symtab): Check whether
|
||||
gelf_getphdr returns NULL.
|
||||
|
||||
https://sourceware.org/bugzilla/show_bug.cgi?id=32655
|
||||
|
||||
Signed-off-by: Mark Wielaard <mark@klomp.org>
|
||||
|
||||
CVE: CVE-2025-1371
|
||||
|
||||
Upstream-Status: Backport [https://sourceware.org/cgit/elfutils/commit/?id=b38e562a4c907e08171c76b8b2def8464d5a104a]
|
||||
|
||||
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
|
||||
---
|
||||
src/readelf.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/src/readelf.c b/src/readelf.c
|
||||
index fc04556..13344bf 100644
|
||||
--- a/src/readelf.c
|
||||
+++ b/src/readelf.c
|
||||
@@ -2912,7 +2912,7 @@ handle_dynamic_symtab (Ebl *ebl)
|
||||
for (size_t i = 0; i < phnum; ++i)
|
||||
{
|
||||
phdr = gelf_getphdr (ebl->elf, i, &phdr_mem);
|
||||
- if (phdr->p_type == PT_DYNAMIC)
|
||||
+ if (phdr == NULL || phdr->p_type == PT_DYNAMIC)
|
||||
break;
|
||||
}
|
||||
if (phdr == NULL)
|
||||
--
|
||||
2.40.0
|
||||
Reference in New Issue
Block a user