CVE-2025-1182

A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*

History

21 May 2025, 20:35

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*
References () https://sourceware.org/bugzilla/attachment.cgi?id=15919 - () https://sourceware.org/bugzilla/attachment.cgi?id=15919 - Broken Link
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32644 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32644 - Exploit, Issue Tracking
References () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad - () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad - Broken Link
References () https://vuldb.com/?ctiid.295086 - () https://vuldb.com/?ctiid.295086 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295086 - () https://vuldb.com/?id.295086 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.495407 - () https://vuldb.com/?submit.495407 - Exploit, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product
Summary
  • (es) Se ha encontrado una vulnerabilidad, que se ha clasificado como crítica, en GNU Binutils 2.43. La función bfd_elf_reloc_symbol_deleted_p del archivo bfd/elflink.c del componente ld está afectada. La manipulación provoca la corrupción de la memoria. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es difícil. El exploit se ha hecho público y puede utilizarse. El parche se identifica como b425859021d17adf62f06fb904797cf8642986ad. Se recomienda aplicar un parche para solucionar este problema.
First Time Gnu binutils
Gnu

11 Feb 2025, 15:15

Type Values Removed Values Added
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32644 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32644 -
References () https://vuldb.com/?submit.495407 - () https://vuldb.com/?submit.495407 -

11 Feb 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-11 09:15

Updated : 2025-05-21 20:35


NVD link : CVE-2025-1182

Mitre link : CVE-2025-1182

CVE.ORG link : CVE-2025-1182


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer