DEBIAN-CVE-2025-7545

Source
https://security-tracker.debian.org/tracker/CVE-2025-7545
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7545.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-7545
Upstream
Published
2025-07-13T22:15:23Z
Modified
2025-09-19T07:34:46.750554Z
Summary
[none]
Details

A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.

References

Affected packages

Debian:14 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.45-3

Affected versions

2.*

2.44-3
2.44.50.20250201-1
2.44.50.20250207-1
2.44.50.20250218-1
2.44.50.20250218-2
2.44.50.20250309-1
2.44.50.20250405-1
2.44.50.20250502-1
2.44.50.20250520-1
2.44.50.20250528-1
2.44.50.20250707-1
2.44.90.20250719-1
2.45-1
2.45-2

Ecosystem specific

{
    "urgency": "unimportant"
}