Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mhpv-qvqj-2px4

Опубликовано: 17 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 4.8
CVSS3: 3.3

Описание

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 22%
0.0009
Низкий

4.8 Medium

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-404
CWE-476

Связанные уязвимости

CVSS3: 3.3
ubuntu
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
redhat
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
nvd
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

msrc
3 месяца назад

GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference

CVSS3: 3.3
debian
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as ...

EPSS

Процентиль: 22%
0.0009
Низкий

4.8 Medium

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-404
CWE-476