A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.
References
| Link | Resource |
|---|---|
| https://sourceware.org/bugzilla/attachment.cgi?id=16344 | Broken Link |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33448 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.328774 | Permissions Required VDB Entry |
| https://vuldb.com/?id.328774 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.661279 | Third Party Advisory VDB Entry |
| https://www.gnu.org/ | Product |
| https://sourceware.org/bugzilla/show_bug.cgi?id=33448 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-10-16 14:15
Updated : 2026-02-24 08:16
NVD link : CVE-2025-11839
Mitre link : CVE-2025-11839
CVE.ORG link : CVE-2025-11839
JSON object : View
Products Affected
gnu
- binutils
