A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
References
| Link | Resource |
|---|---|
| https://sourceware.org/bugzilla/attachment.cgi?id=16393 | Broken Link |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33502 | Exploit Issue Tracking |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3 | Exploit Issue Tracking |
| https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0 | Patch |
| https://vuldb.com/?ctiid.327620 | Permissions Required VDB Entry |
| https://vuldb.com/?id.327620 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.668290 | Third Party Advisory VDB Entry |
| https://www.gnu.org/ | Product |
Configurations
History
No history.
Information
Published : 2025-10-08 20:15
Updated : 2025-10-14 15:28
NVD link : CVE-2025-11495
Mitre link : CVE-2025-11495
CVE.ORG link : CVE-2025-11495
JSON object : View
Products Affected
gnu
- binutils
