Vulnerability Description
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | 2.45 |
Related Weaknesses (CWE)
References
- https://sourceware.org/bugzilla/attachment.cgi?id=16344Broken Link
- https://sourceware.org/bugzilla/show_bug.cgi?id=33448ExploitIssue Tracking
- https://vuldb.com/?ctiid.328774Permissions RequiredVDB Entry
- https://vuldb.com/?id.328774Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.661279Third Party AdvisoryVDB Entry
- https://www.gnu.org/Product
- https://cert-portal.siemens.com/productcert/html/ssa-082556.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=33448ExploitIssue Tracking
FAQ
What is CVE-2025-11839?
CVE-2025-11839 is a vulnerability with a CVSS score of 3.3 (LOW). A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be ...
How severe is CVE-2025-11839?
CVE-2025-11839 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11839?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils.