A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*

Fri, 10 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Wed, 08 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu binutils
Vendors & Products Gnu
Gnu binutils

Tue, 07 Oct 2025 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
Title GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-08T17:34:42.195Z

Reserved: 2025-10-07T10:40:48.563Z

Link: CVE-2025-11414

cve-icon Vulnrichment

Updated: 2025-10-08T13:35:55.991Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-07T23:15:33.053

Modified: 2025-10-14T15:25:00.127

Link: CVE-2025-11414

cve-icon Redhat

Severity : Low

Publid Date: 2025-10-07T22:32:07Z

Links: CVE-2025-11414 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:35:00Z