Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis.
References
| Link | Resource |
|---|---|
| https://sourceware.org/bugzilla/show_bug.cgi?id=33638 | Exploit Issue Tracking |
| https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 18:16
Updated : 2026-03-20 16:59
NVD link : CVE-2025-69646
Mitre link : CVE-2025-69646
CVE.ORG link : CVE-2025-69646
JSON object : View
Products Affected
gnu
- binutils
CWE
CWE-400
Uncontrolled Resource Consumption
