A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.
References
| Link | Resource |
|---|---|
| https://sourceware.org/bugzilla/attachment.cgi?id=16344 | Broken Link |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33448 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.328774 | Permissions Required VDB Entry |
| https://vuldb.com/?id.328774 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.661279 | Third Party Advisory VDB Entry |
| https://www.gnu.org/ | Product |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33448 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-10-16 14:15
Updated : 2025-11-06 22:20
NVD link : CVE-2025-11839
Mitre link : CVE-2025-11839
CVE.ORG link : CVE-2025-11839
JSON object : View
Products Affected
gnu
- binutils
