SB2025040818 - Multiple vulnerabilities in GNU Binutils



SB2025040818 - Multiple vulnerabilities in GNU Binutils

Published: April 8, 2025 Updated: August 22, 2025

Security Bulletin ID SB2025040818
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2025-1153)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the bfd_set_format() function in format.c. A local user can trigger memory corruption and execute arbitrary code on the target system.



2) Buffer overflow (CVE-ID: CVE-2025-5244)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the elf_gc_sweep() function in bfd/elflink.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges. 


3) Buffer overflow (CVE-ID: CVE-2025-5245)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the debug_type_samep() function in /binutils/debug.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges. 


4) NULL pointer dereference (CVE-ID: CVE-2025-8224)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bfd_elf_get_str_section() function in bfd/elf.c. A local user can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.