Metrics
Affected Vendors & Products
Tue, 18 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 17 Feb 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue. | |
Title | GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference | |
Weaknesses | CWE-404 CWE-476 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-18T19:32:38.490Z
Reserved: 2025-02-16T09:10:31.726Z
Link: CVE-2025-1371

Updated: 2025-02-18T18:47:09.256Z

Status : Awaiting Analysis
Published: 2025-02-17T03:15:09.400
Modified: 2025-02-18T20:15:24.360
Link: CVE-2025-1371
