Heap BOF in GNU Binutils 2.45 Linker elf_x86_64_relocate_section
CVE-2025-11495 Published on October 8, 2025
GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update 40 days later.
Weakness Types
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2025-11495 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2025-11495
Want to know whenever a new CVE is published for GNU Binutils? stack.watch will email you.
Affected Versions
GNU Binutils Version 2.45 is affected by CVE-2025-11495Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.