CVE-2025-5245
Published: May 28, 2025Last modified: August 1, 2025
Description
A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | LOW |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
Notes
The fix didn't land in 2.44, it's in 2.45.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | binutils | Fixed (2.40-r5) |
Stream | binutils | Fixed (2.45-r0) | |
Hardened Containers | 23 LTS | binutils | Fixed (2.40-r5) |
Stream | binutils | Fixed (2.45-r0) |
References
- https://sourceware.org/bugzilla/attachment.cgi?id=16004
- https://sourceware.org/bugzilla/show_bug.cgi?id=32829
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
- https://vuldb.com/?ctiid.310347
- https://vuldb.com/?id.310347
- https://vuldb.com/?submit.584635
- https://www.gnu.org/