
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical vulnerability was discovered in GNU elfutils version 0.192, identified as CVE-2025-1365. The vulnerability affects the process_symtab function in the readelf.c file of the eu-readelf component. This buffer overflow vulnerability was discovered on February 16, 2025, and requires local access to exploit (NVD, VulDB).
The vulnerability occurs when using the -D and -a options with a specially crafted input file in eu-readelf. The issue stems from the direct use of string data from symstrdata->dbuf without proper validation when the -D/--dynamic option is used, potentially leading to reading unallocated memory past the end of the symstr data. The vulnerability has been assigned CVSS v3.1 Base Score of 5.3 (MEDIUM) and CVSS v4.0 Score of 4.8 (MEDIUM) (Bugzilla, VulDB).
The buffer overflow vulnerability can lead to a crash in the eu-readelf tool and potentially affect the confidentiality, integrity, and availability of the system. However, the impact is limited as the tool is typically run in short-lived, local, interactive, development contexts rather than remotely in production environments (Bugzilla).
A patch has been released with the identifier 5e5c0394d82c53e97750fe7b18023e6f84157b81. The fix involves implementing proper string validation by turning the elfstrptr validatestr function into a generic lib/system.h helper function. It is recommended to apply this patch to address the vulnerability (Bugzilla).
The GNU Project maintainers have noted that this issue is not considered a security vulnerability according to their security policy, as elfutils tools are typically run in short-lived, local, interactive, development contexts. They have requested that future security vulnerability reports be submitted through their official security contacts rather than through non-affiliated CNAs (Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”