CVE-2025-1371

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:elfutils_project:elfutils:0.192:*:*:*:*:*:*:*

History

04 Nov 2025, 20:13

Type Values Removed Values Added
CPE cpe:2.3:a:elfutils_project:elfutils:0.192:*:*:*:*:*:*:*
References () https://sourceware.org/bugzilla/attachment.cgi?id=15926 - () https://sourceware.org/bugzilla/attachment.cgi?id=15926 - Broken Link
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32655 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32655 - Broken Link
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2 - Broken Link
References () https://vuldb.com/?ctiid.295978 - () https://vuldb.com/?ctiid.295978 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295978 - () https://vuldb.com/?id.295978 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.496484 - () https://vuldb.com/?submit.496484 - Third Party Advisory, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product
First Time Elfutils Project
Elfutils Project elfutils

Information

Published : 2025-02-17 03:15

Updated : 2025-11-04 20:13


NVD link : CVE-2025-1371

Mitre link : CVE-2025-1371

CVE.ORG link : CVE-2025-1371


JSON object : View

Products Affected

elfutils_project

  • elfutils
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference