Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:* |
Wed, 28 May 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 27 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. | |
Title | GNU Binutils objdump debug.c debug_type_samep memory corruption | |
Weaknesses | CWE-119 | |
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-05-27T15:20:54.076Z
Reserved: 2025-05-27T08:07:06.452Z
Link: CVE-2025-5245

Updated: 2025-05-27T15:20:50.875Z

Status : Analyzed
Published: 2025-05-27T15:15:36.057
Modified: 2025-10-03T14:45:57.887
Link: CVE-2025-5245


Updated: 2025-06-24T09:44:15Z