Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-11839

Опубликовано: 16 окт. 2025
Источник: debian
EPSS Низкий

Описание

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.46-1package

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=33448

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12ef7d5b7b02d0023db645d86eb9d0797bc747fe (binutils-2_46)

  • binutils not covered by security support

EPSS

Процентиль: 4%
0.00017
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
6 месяцев назад

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.

CVSS3: 3.3
redhat
6 месяцев назад

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.

CVSS3: 3.3
nvd
6 месяцев назад

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.

CVSS3: 3.3
msrc
около 2 месяцев назад

GNU Binutils prdbg.c tg_tag_type return value

CVSS3: 3.3
github
6 месяцев назад

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.

EPSS

Процентиль: 4%
0.00017
Низкий