CVE-2025-1372
CBL Mariner vulnerability analysis and mitigation

Overview

A vulnerability was found in GNU elfutils 0.192, identified as CVE-2025-1372. The issue affects the functions dumpdatasection and printstringsection in the readelf.c file of the eu-readelf component. The vulnerability was discovered on February 7, 2025, and disclosed on February 16, 2025. The affected software is GNU elfutils version 0.192 (NVD, Snyk).

Technical details

The vulnerability occurs when using the -z and -x options with a specially crafted input file in eu-readelf. The manipulation of the argument z/x leads to buffer overflow when attempting to check whether a section name starts with .zdebug for unnamed numbered sections. The issue has been assigned CWE-120 (Buffer Copy without Checking Size of Input) and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability has a CVSS v3.1 base score of 5.3 (MEDIUM) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L (Bugzilla, VulDB).

Impact

The vulnerability can lead to buffer overflow conditions when processing specially crafted input files. This could potentially result in program crashes or arbitrary code execution in a local context. The impact is considered medium severity with potential loss of confidentiality, integrity, and availability, though all at low levels (Snyk).

Mitigation and workarounds

A patch has been released with the identifier 73db9d2021cab9e23fd734b0a76a612d52a6f1db. The fix involves adding a check to verify that a section has a name before attempting to process it for .zdebug sections. It is recommended to apply this patch to fix the issue (Bugzilla).

Community reactions

The elfutils maintainers have noted that while this issue has been assigned a CVE, it does not align with their security policy. They emphasize that elfutils tools are typically used in development contexts rather than production environments, and therefore such issues are treated as ordinary bugs rather than security vulnerabilities (Bugzilla).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-10729CRITICAL9.4
  • CBL MarinerCBL Mariner
  • qtsvg
NoYesOct 03, 2025
CVE-2025-9900HIGH8.8
  • Rocky LinuxRocky Linux
  • libtiff-tools-debuginfo
NoYesSep 23, 2025
CVE-2025-9648HIGH8.7
  • CBL MarinerCBL Mariner
  • civetweb
NoYesSep 29, 2025
CVE-2025-9230HIGH7.5
  • LibreSSLLibreSSL
  • openssl11-debuginfo
NoYesSep 30, 2025
CVE-2025-10823MEDIUM4.8
  • CBL MarinerCBL Mariner
  • fio
NoYesSep 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management