First published: Mon Feb 17 2025(Updated: )
A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU elfutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1376 is classified as a problematic vulnerability that can lead to denial of service.
CVE-2025-1376 impacts the elf_strptr function in the eu-strip component of GNU elfutils.
CVE-2025-1376 requires local access for exploitation, making it a local denial of service vulnerability.
Currently, the best mitigation for CVE-2025-1376 is to avoid using affected versions of GNU elfutils.
As of now, there are no specific patches announced for CVE-2025-1376; users should monitor vendor updates.