CVE-2025-11495

LOW

GNU Binutils - Memory Corruption

Title source: rule
STIX 2.1

Description

A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.327620
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.327620
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.668290
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33502
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
Product product
https://www.gnu.org/

Scores

CVSS v3 3.3
EPSS 0.0003
EPSS Percentile 7.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-119 CWE-122
Status published
Products (1)
gnu/binutils 2.45
Published Oct 08, 2025
Tracked Since Feb 18, 2026