Impact
GNU Binutils up to version 2.46 includes a defect in the readelf component that can cause an invalid pointer free when it processes a crafted ELF binary with malformed relocation or symbol data. The bug is triggered if the routine that dumps relocations terminates early due to parse errors, leaving the internal relocation array only partially initialized. Later, when the relocation processing routine attempts to free a symbol pointer that was never set, glibc detects an invalid free and aborts the program with SIGABRT. Only a crash is observed; no further memory corruption or code execution has been documented, so the impact is limited to service disruption.
Affected Systems
The affected product is GNU Binutils for all releases up to and including 2.46. The vulnerability is reported for the readelf utility in these releases; it is not present in any tagged release beyond 2.46 and was observed only in pre‑release code, so systems running newer stable releases are unaffected.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score is below 1%, showing a very low probability that the flaw will be widely exploited. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local execution: an attacker who can run readelf on a malicious ELF file can trigger the crash. Without ability to supply a crafted ELF file to the vulnerable binary, the exploitability is limited to environments that process untrusted binaries with readelf.
OpenCVE Enrichment