Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2025-1352 CVE-2025-1365 CVE-2025-1371 CVE-2025-1372 CVE-2025-1376 CVE-2025-1377 |
CWE-ID | CWE-119 CWE-476 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system elfutils-default-yama-scope Operating systems & Components / Operating system package or component elfutils-libs Operating systems & Components / Operating system package or component elfutils-libelf-devel Operating systems & Components / Operating system package or component elfutils-libelf Operating systems & Components / Operating system package or component elfutils-help Operating systems & Components / Operating system package or component elfutils-extra Operating systems & Components / Operating system package or component elfutils-devel Operating systems & Components / Operating system package or component elfutils-debugsource Operating systems & Components / Operating system package or component elfutils-debuginfod-client-devel Operating systems & Components / Operating system package or component elfutils-debuginfod-client Operating systems & Components / Operating system package or component elfutils-debuginfod Operating systems & Components / Operating system package or component elfutils-debuginfo Operating systems & Components / Operating system package or component elfutils Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU106005
Risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-1352
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the __libdw_thread_tail() function in libdw_alloc.c. A remote attacker can trick the victim into passing specially crafted file to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106004
Risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-1365
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the process_symtab() function in readelf.c. A remote attacker can trick the victim into passing specially crafted file to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106002
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-1371
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the handle_dynamic_symtab() function in readelf.c. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106003
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-1372
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the dump_data_section() and print_string_section() functions in readelf.c. A remote attacker can trick the victim into passing specially crafted file to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106000
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-1376
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the elf_strptr() function in /libelf/elf_strptr.c. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106001
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-1377
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the gelf_getsymshndx() function in strip.c. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 24.03 LTS SP1
elfutils-default-yama-scope: before 0.190-8
elfutils-libs: before 0.190-8
elfutils-libelf-devel: before 0.190-8
elfutils-libelf: before 0.190-8
elfutils-help: before 0.190-8
elfutils-extra: before 0.190-8
elfutils-devel: before 0.190-8
elfutils-debugsource: before 0.190-8
elfutils-debuginfod-client-devel: before 0.190-8
elfutils-debuginfod-client: before 0.190-8
elfutils-debuginfod: before 0.190-8
elfutils-debuginfo: before 0.190-8
elfutils: before 0.190-8
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1179
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.