Heap BOF in GNU Binutils 2.45 Linker elf_x86_64_relocate_section
CVE-2025-11495 Published on October 8, 2025

GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update 40 days later.

Weakness Types

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2025-11495 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2025-11495

Want to know whenever a new CVE is published for GNU Binutils? stack.watch will email you.

 

Affected Versions

GNU Binutils Version 2.45 is affected by CVE-2025-11495

Exploit Probability

EPSS
0.02%
Percentile
4.57%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.