CVE-2025-11413
GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
| CWE | CWE-125 CWE-119 |
| Vendor | gnu |
| Product | binutils |
| Published | Oct 7, 2025 |
| Last Updated | Feb 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for gnu binutils
Be the first to know when new low vulnerabilities affecting gnu binutils are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
GNU / Binutils
2.45
References
vuldb.com: https://vuldb.com/?id.327349 vuldb.com: https://vuldb.com/?ctiid.327349 vuldb.com: https://vuldb.com/?submit.665587 vuldb.com: https://vuldb.com/?submit.665590 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33452 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10 sourceware.org: https://sourceware.org/bugzilla/attachment.cgi?id=16362 sourceware.org: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 gnu.org: https://www.gnu.org/
Credits
๐ Yifan Zhang (VulDB User)