CVE-2025-69652
Published: March 11, 2026Last modified: March 28, 2026
Description
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.2 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | binutils | Unknown (2.39-r2) |
| 25 LTS | binutils | Fixed (2.45.1-r1) | |
| Stream | binutils | Fixed (2.45.1-r3) | |
| Hardened Containers | 23 LTS | binutils | Unknown (2.39-r2) |
| 25 LTS | binutils | Fixed (2.45.1-r1) | |
| Stream | binutils | Fixed (2.45.1-r3) |