CVE-2025-1371

Source
https://cve.org/CVERecord?id=CVE-2025-1371
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-1371.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-1371
Downstream
Published
2025-02-17T02:31:07.921Z
Modified
2026-05-15T04:13:03.413269862Z
Severity
  • 4.8 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference
Details

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handledynamicsymtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "AFFECTED_FIELD",
            "extracted_events": [
                {
                    "last_affected": "0.192"
                }
            ]
        }
    ],
    "cwe_ids": [
        "CWE-404",
        "CWE-476"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/1xxx/CVE-2025-1371.json",
    "cna_assigner": "VulDB"
}
References

Affected packages