Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnu
Gnu binutils |
|
Vendors & Products |
Gnu
Gnu binutils |
Tue, 07 Oct 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised. | |
Title | GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds | |
Weaknesses | CWE-119 CWE-125 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T17:34:48.460Z
Reserved: 2025-10-07T10:40:46.002Z
Link: CVE-2025-11413

Updated: 2025-10-08T13:39:18.449Z

Status : Awaiting Analysis
Published: 2025-10-07T22:15:34.230
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-11413

No data.

Updated: 2025-10-08T13:35:04Z