<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0137</id>
    <title>An update for elfutils is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2025-05-20 06:42:51"/>
    <updated date="2025-05-20 06:42:51"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-1376" id="CVE-2025-1376" title="CVE-2025-1376 Base Score: 2.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-1372" id="CVE-2025-1372" title="CVE-2025-1372 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue. (CVE-2025-1376)

A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue. (CVE-2025-1372)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="elfutils">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="elfutils" version="0.185" release="5.r11.hce2">
          <filename>elfutils-0.185-5.r11.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="elfutils-devel" version="0.185" release="5.r11.hce2">
          <filename>elfutils-devel-0.185-5.r11.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="elfutils-extra" version="0.185" release="5.r11.hce2">
          <filename>elfutils-extra-0.185-5.r11.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="elfutils-help" version="0.185" release="5.r11.hce2">
          <filename>elfutils-help-0.185-5.r11.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="elfutils" version="0.185" release="5.r11.hce2">
          <filename>elfutils-0.185-5.r11.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="elfutils-devel" version="0.185" release="5.r11.hce2">
          <filename>elfutils-devel-0.185-5.r11.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="elfutils-extra" version="0.185" release="5.r11.hce2">
          <filename>elfutils-extra-0.185-5.r11.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="elfutils-help" version="0.185" release="5.r11.hce2">
          <filename>elfutils-help-0.185-5.r11.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
