CVE-2025-7545

A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VulDBCNA
5.3 MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
VendorProductVersion
gnubinutils
2.45
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bullseye
unimportant
bookworm
unimportant
trixie
unimportant
forky
2.45.50.20251209-1
fixed
sid
2.45.50.20260116-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
questing
not-affected
plucky
Fixed 2.44-3ubuntu1.1
released
noble
Fixed 2.42-4ubuntu2.6
released
jammy
Fixed 2.38-4ubuntu2.10
released
focal
Fixed 2.34-6ubuntu1.11+esm1
released
bionic
Fixed 2.30-21ubuntu1~18.04.9+esm5
released
xenial
Fixed 2.26.1-1ubuntu1~16.04.8+esm12
released
trusty
Fixed 2.24-5ubuntu14.2+esm7
released