
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been found in GNU elfutils 0.192 affecting the function handledynamicsymtab of the file readelf.c in the eu-read component. The vulnerability was discovered on February 7, 2025, and was assigned CVE-2025-1371. The issue leads to a null pointer dereference when processing specially crafted ELF files (Sourceware Bug).
The vulnerability occurs in the handledynamicsymtab function when using the -D and -a options with a specially crafted input file. The issue arises because the code doesn't properly check if gelfgetphdr returns NULL when processing program headers. This can lead to a null pointer dereference when attempting to access the ptype field of an invalid program header (Sourceware Bug).
The vulnerability can cause the eu-readelf program to crash due to a null pointer dereference when processing malformed ELF files. However, according to the GNU elfutils security policy, this is considered a regular bug rather than a security vulnerability since elfutils tools are typically run in short-lived, local, interactive, development contexts rather than remotely in production (Sourceware Bug).
A patch has been released with commit ID b38e562a4c907e08171c76b8b2def8464d5a104a that fixes the issue by adding a check for NULL return value from gelfgetphdr. It is recommended to apply this patch to affected installations ([Sourceware Bug](https://sourceware.org/bugzilla/showbug.cgi?id=32655)).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."