CVE-2025-7545

EUVD-2025-21278
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VulDBCNA
5.3 MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
gnubinutils
2.45
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bookworm
unimportant
bullseye
unimportant
forky
2.46-2
fixed
sid
2.46-2
fixed
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
bionic
Fixed 2.30-21ubuntu1~18.04.9+esm5
released
focal
Fixed 2.34-6ubuntu1.11+esm1
released
jammy
Fixed 2.38-4ubuntu2.10
released
noble
Fixed 2.42-4ubuntu2.6
released
plucky
Fixed 2.44-3ubuntu1.1
released
questing
not-affected
trusty
Fixed 2.24-5ubuntu14.2+esm7
released
xenial
Fixed 2.26.1-1ubuntu1~16.04.8+esm12
released