GNU Binutils 2.43 ld Heap Overflow Vulnerability in _bfd_elf_gc_mark_rsec
CVE-2025-1176 Published on February 11, 2025

GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow
A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2025-1176 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2025-1176

stack.watch emails you whenever new vulnerabilities are published in GNU Binutils or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

GNU Binutils Version 2.43 is affected by CVE-2025-1176

Exploit Probability

EPSS
0.11%
Percentile
29.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.