CVE-2025-1365Improper Restriction of Operations within the Bounds of a Memory Buffer in Elfutils

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 92.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 17
Latest updateMar 24

Description

A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5gnu/elfutils0.192

🔴Vulnerability Details

4
OSV
elfutils vulnerabilities2025-03-24
GHSA
GHSA-h2c8-cfp8-j597: A vulnerability, which was classified as critical, was found in GNU elfutils 02025-02-17
OSV
CVE-2025-1365: A vulnerability, which was classified as critical, was found in GNU elfutils 02025-02-17
CVEList
GNU elfutils eu-readelf readelf.c process_symtab buffer overflow2025-02-16

📋Vendor Advisories

5
Ubuntu
elfutils vulnerabilities2025-03-24
Red Hat
elfutils: GNU elfutils eu-readelf readelf.c process_symtab buffer overflow2025-02-16
Microsoft
GNU elfutils eu-readelf readelf.c process_symtab buffer overflow2025-02-11
Debian
CVE-2025-1365: elfutils - A vulnerability, which was classified as critical, was found in GNU elfutils 0.1...2025
Microsoft
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline as demonstrated by execute in Vim and assert_fa2019-06-11
CVE-2025-1365 — GNU Elfutils vulnerability | cvebase