CVE-2025-1372

Name
CVE-2025-1372
Description
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
exploit https://sourceware.org/bugzilla/attachment.cgi?id=15927
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=32656
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=32657
signature https://vuldb.com/?ctiid.295981
vdb-entry https://vuldb.com/?id.295981
third-party-advisory https://vuldb.com/?submit.496485
product https://www.gnu.org/

Match rules

CPE URI Source package Min version Max version
elfutils == 0.192 == 0.192

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
elfutils edge-main 0.192-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable