GNU Binutils 2.45 Heap Buffer Overflow in elf_swap_shdr (Linker)
CVE-2025-11083 Published on September 27, 2025

GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2025-11083 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2025-11083

stack.watch emails you whenever new vulnerabilities are published in GNU Binutils or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

GNU Binutils Version 2.45 is affected by CVE-2025-11083

Exploit Probability

EPSS
0.02%
Percentile
6.13%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.