CVE-2025-15504: LIEF is vulnerable to segmentation fault
(updated )
A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.
References
- github.com/advisories/GHSA-mjjp-xjfg-97wg
- github.com/lief-project/LIEF
- github.com/lief-project/LIEF/commit/81bd5d7ea0c390563f1c4c017c9019d154802978
- github.com/lief-project/LIEF/issues/1277
- github.com/lief-project/LIEF/issues/1277
- github.com/lief-project/LIEF/releases/tag/0.17.2
- github.com/oneafter/1210/blob/main/segv1
- nvd.nist.gov/vuln/detail/CVE-2025-15504
- vuldb.com/?ctiid.340375
- vuldb.com/?id.340375
- vuldb.com/?submit.733329
Code Behaviors & Features
Detect and mitigate CVE-2025-15504 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →