CVE-2025-8224
Published: July 29, 2025Last modified: September 3, 2025
Description
A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is db856d41004301b3a56438efd957ef5cabb91530. It is recommended to apply a patch to fix this issue.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Notes
The error occurs because of the invocation of the '_bfd_error_handler' function with incorrect arguments in the 'bfd_elf_get_str_section' function of the file 'bfd/elf.c'. In binutils releases lower than 2.43, the 'bfd_elf_get_str_section' function doesn't contain the invocation of the '_bfd_error_handler' function. So binutils in the Alpaquita 23 LTS release is not affected by this issue.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | binutils | Not affected (2.39-r2) |
25 LTS | binutils | Not affected (2.44-r0) | |
Stream | binutils | Fixed (2.44-r0) | |
Hardened Containers | 23 LTS | binutils | Not affected (2.39-r2) |
Stream | binutils | Fixed (2.44-r0) |
References
- https://sourceware.org/bugzilla/attachment.cgi?id=15680
- https://sourceware.org/bugzilla/show_bug.cgi?id=32109
- https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530
- https://vuldb.com/?ctiid.317812
- https://vuldb.com/?id.317812
- https://vuldb.com/?submit.621878
- https://www.gnu.org/