Improper Resource Shutdown or Release Affecting elfutils package, versions *


Severity

Recommended
0.0
low
0
10

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Not Defined

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-ELFUTILS-8731394
  • published18 Feb 2025
  • disclosed17 Feb 2025

Introduced: 17 Feb 2025

NewCVE-2025-1371  (opens in a new tab)
CWE-404  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable elfutils.

NVD Description

Note: Versions mentioned in the description apply only to the upstream elfutils package and not the elfutils package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.

CVSS Scores

version 3.1