Description
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.327620
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.327620
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.668290
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33502
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
Broken Link exploit
https://sourceware.org/bugzilla/attachment.cgi?id=16393
Patch patch
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
Product product
https://www.gnu.org/
Scores
CVSS v3
3.3
EPSS
0.0003
EPSS Percentile
7.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-122
Status
published
Products (1)
gnu/binutils
2.45
Published
Oct 08, 2025
Tracked Since
Feb 18, 2026