Null Pointer Dereference in GNU elfutils Affects readelf Functionality
CVE-2025-1371
Key Information:
Badges
Summary
A vulnerability exists in GNU elfutils version 0.192, specifically within the handle_dynamic_symtab function located in readelf.c. This flaw can lead to a null pointer dereference, which may allow an attacker to exploit the application locally. Public disclosure of the exploit has occurred, indicating a potential risk for systems utilizing this version. To mitigate this issue, a patch has been provided identified by the hash b38e562a4c907e08171c76b8b2def8464d5a104a, which is recommended for immediate application.
Affected Version(s)
elfutils 0.192
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved