CVE-2025-7545

Name
CVE-2025-7545
Description
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
exploit https://sourceware.org/bugzilla/attachment.cgi?id=16117
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=33049
issue-tracking https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
patch https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
signature https://vuldb.com/?ctiid.316243
vdb-entry https://vuldb.com/?id.316243
third-party-advisory https://vuldb.com/?submit.614355
product https://www.gnu.org/

Match rules

CPE URI Source package Min version Max version
binutils == 2.45 == 2.45
cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:* binutils == None == 2.45

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
binutils edge-main 2.45-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable