CVE-2025-1365 – “GNU elfutils eu-readelf process_symtab Buffer Overflow”

The following table lists the changes that have been made to the
CVE-2025-1365 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 17, 2025

    Action Type Old Value New Value
    Added Description A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue.
    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    Added CVSS V2 (AV:L/AC:L/Au:S/C:P/I:P/A:P)
    Added CWE CWE-119
    Added CWE CWE-120
    Added Reference https://sourceware.org/bugzilla/attachment.cgi?id=15925
    Added Reference https://sourceware.org/bugzilla/show_bug.cgi?id=32654
    Added Reference https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2
    Added Reference https://vuldb.com/?ctiid.295977
    Added Reference https://vuldb.com/?id.295977
    Added Reference https://vuldb.com/?submit.496483
    Added Reference https://www.gnu.org/
Share the Post:

Related Posts