๐Ÿ” CVE Alert

CVE-2025-11413

LOW 3.3

GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.

CWE CWE-125 CWE-119
Vendor gnu
Product binutils
Published Oct 7, 2025
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for gnu binutils

Be the first to know when new low vulnerabilities affecting gnu binutils are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

GNU / Binutils
2.45

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.327349 vuldb.com: https://vuldb.com/?ctiid.327349 vuldb.com: https://vuldb.com/?submit.665587 vuldb.com: https://vuldb.com/?submit.665590 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33452 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10 sourceware.org: https://sourceware.org/bugzilla/attachment.cgi?id=16362 sourceware.org: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 gnu.org: https://www.gnu.org/

Credits

๐Ÿ” Yifan Zhang (VulDB User)