Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1371

Опубликовано: 17 фев. 2025
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

A flaw was found in GNU elfutils. This vulnerability allows a NULL pointer dereference via the handle_dynamic_symtab function in readelf.c.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10elfutilsFix deferred
Red Hat Enterprise Linux 6elfutilsNot affected
Red Hat Enterprise Linux 7elfutilsNot affected
Red Hat Enterprise Linux 8elfutilsNot affected
Red Hat Enterprise Linux 9elfutilsFix deferred
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-404
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2346055elfutils: GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference

EPSS

Процентиль: 22%
0.0009
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
nvd
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

msrc
3 месяца назад

GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference

CVSS3: 3.3
debian
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as ...

CVSS3: 3.3
github
9 месяцев назад

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 22%
0.0009
Низкий

3.3 Low

CVSS3