CVE-2025-11839

EUVD-2025-34764
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.3 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
VulDBCNA
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Affected Products (NVD)
VendorProductVersion
gnubinutils
2.45
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bookworm
unimportant
bullseye
unimportant
forky
2.46-2
fixed
sid
2.46-3
fixed
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
bionic
Fixed 2.30-21ubuntu1~18.04.9+esm5
released
focal
Fixed 2.34-6ubuntu1.11+esm1
released
jammy
Fixed 2.38-4ubuntu2.11
released
noble
Fixed 2.42-4ubuntu2.7
released
plucky
Fixed 2.44-3ubuntu1.2
released
questing
Fixed 2.45-7ubuntu1.1
released
trusty
Fixed 2.24-5ubuntu14.2+esm7
released
xenial
Fixed 2.26.1-1ubuntu1~16.04.8+esm13
released