First published: Mon Feb 17 2025(Updated: )
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
elfutils | ||
debian/elfutils | <=0.183-1<=0.188-2.1<=0.192-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1372 has been declared as critical due to the potential for buffer overflow.
CVE-2025-1372 affects the function dump_data_section/print_string_section in the file readelf.c of GNU elfutils.
To fix CVE-2025-1372, update to the latest version of GNU elfutils that addresses this vulnerability.
CVE-2025-1372 is a buffer overflow vulnerability that can be exploited through manipulation of arguments.
Anyone using vulnerable versions of GNU elfutils is affected by CVE-2025-1372.