CVE-2025-1365

Name
CVE-2025-1365
Description
A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
exploit https://sourceware.org/bugzilla/attachment.cgi?id=15925
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=32654
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2
signature https://vuldb.com/?ctiid.295977
vdb-entry https://vuldb.com/?id.295977
third-party-advisory https://vuldb.com/?submit.496483
product https://www.gnu.org/

Match rules

CPE URI Source package Min version Max version
elfutils == 0.192 == 0.192

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
elfutils edge-main 0.192-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable