SB2025082140 - Privilege escalation in GNU Binutils
Published: August 21, 2025 Updated: October 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2025-7546)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the bfd_elf_set_group_contents() function in bfd/elf.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.
2) Heap-based buffer overflow (CVE-ID: CVE-2025-7545)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the copy_section() function in binutils/objcopy.c. A local user can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
3) Buffer overflow (CVE-ID: CVE-2025-11413)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the elf_link_add_object_symbols() function in bfd/elflink.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
4) Buffer overflow (CVE-ID: CVE-2025-11412)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the bfd_elf_gc_record_vtentry() function in bfd/elflink.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
5) Buffer overflow (CVE-ID: CVE-2025-11414)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the get_link_hash_entry() function in bfd/elflink.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
6) Buffer overflow (CVE-ID: CVE-2025-11495)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the elf_x86_64_relocate_section() function in elf64-x86-64.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
7) Buffer overflow (CVE-ID: CVE-2025-11081)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the dump_dwarf_section() function in binutils/objdump.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
8) Heap-based buffer overflow (CVE-ID: CVE-2025-11082)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the _bfd_elf_parse_eh_frame() function in bfd/elf-eh-frame.c. A local user can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
9) Heap-based buffer overflow (CVE-ID: CVE-2025-11083)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the elf_swap_shdr() function in bfd/elfcode.h. A local user can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
10) Buffer overflow (CVE-ID: CVE-2025-11494)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the _bfd_x86_elf_late_size_sections() function in bfd/elfxx-x86.c. A local user can trigger memory corruption and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://sourceware.org/bugzilla/attachment.cgi?id=16118
- https://sourceware.org/bugzilla/show_bug.cgi?id=33050
- https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b
- https://vuldb.com/?ctiid.316244
- https://vuldb.com/?id.316244
- https://vuldb.com/?submit.614375
- https://sourceware.org/bugzilla/attachment.cgi?id=16117
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
- https://vuldb.com/?ctiid.316243
- https://vuldb.com/?id.316243
- https://vuldb.com/?submit.614355
- https://sourceware.org/bugzilla/attachment.cgi?id=16362
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452
- https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
- https://vuldb.com/?ctiid.327349
- https://vuldb.com/?id.327349
- https://vuldb.com/?submit.665587
- https://sourceware.org/bugzilla/attachment.cgi?id=16378
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
- https://vuldb.com/?ctiid.327348
- https://vuldb.com/?id.327348
- https://sourceware.org/bugzilla/attachment.cgi?id=16361
- https://sourceware.org/bugzilla/show_bug.cgi?id=33450
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
- https://vuldb.com/?ctiid.327350
- https://vuldb.com/?id.327350
- https://vuldb.com/?submit.665591
- https://sourceware.org/bugzilla/attachment.cgi?id=16393
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
- https://vuldb.com/?ctiid.327620
- https://vuldb.com/?id.327620
- https://vuldb.com/?submit.668290
- https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt
- https://sourceware.org/bugzilla/show_bug.cgi?id=33406
- https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
- https://vuldb.com/?ctiid.326122
- https://vuldb.com/?id.326122
- https://vuldb.com/?submit.661275
- https://sourceware.org/bugzilla/attachment.cgi?id=16358
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
- https://vuldb.com/?ctiid.326123
- https://vuldb.com/?id.326123
- https://vuldb.com/?submit.661276
- https://sourceware.org/bugzilla/attachment.cgi?id=16353
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
- https://vuldb.com/?ctiid.326124
- https://vuldb.com/?id.326124
- https://vuldb.com/?submit.661277
- https://sourceware.org/bugzilla/attachment.cgi?id=16389
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
- https://vuldb.com/?ctiid.327619
- https://vuldb.com/?id.327619
- https://vuldb.com/?submit.668281