First published: Sun Feb 16 2025(Updated: )
A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1365 has been classified as a critical vulnerability.
To address CVE-2025-1365, upgrade to the latest version of GNU elfutils that addresses this buffer overflow issue.
CVE-2025-1365 affects the eu-readelf component of GNU elfutils.
Local access is required to exploit the vulnerability CVE-2025-1365.
CVE-2025-1365 is a buffer overflow vulnerability caused by manipulation of the argument D/a in the process_symtab function.