DEBIAN-CVE-2025-7546

Source
https://security-tracker.debian.org/tracker/CVE-2025-7546
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7546.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-7546
Upstream
Published
2025-07-13T22:15:24Z
Modified
2025-09-19T07:34:46.710223Z
Summary
[none]
Details

A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfdelfsetgroupcontents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.

References

Affected packages

Debian:14 / binutils

Package

Name
binutils
Purl
pkg:deb/debian/binutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.45-3

Affected versions

2.*

2.44-3
2.44.50.20250201-1
2.44.50.20250207-1
2.44.50.20250218-1
2.44.50.20250218-2
2.44.50.20250309-1
2.44.50.20250405-1
2.44.50.20250502-1
2.44.50.20250520-1
2.44.50.20250528-1
2.44.50.20250707-1
2.44.90.20250719-1
2.45-1
2.45-2

Ecosystem specific

{
    "urgency": "unimportant"
}