First published: Mon Feb 17 2025(Updated: )
A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1371 is classified as a problematic vulnerability affecting GNU elfutils 0.192.
To fix CVE-2025-1371, it is recommended to upgrade to a patched version of GNU elfutils.
CVE-2025-1371 affects the function handle_dynamic_symtab in the eu-read component of GNU elfutils.
Yes, local access is a requirement to exploit the vulnerability tracked as CVE-2025-1371.
CVE-2025-1371 is a null pointer dereference vulnerability.