CVE-2025-8225

A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally is a requirement. The identifier of the patch is e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. It is recommended to apply a patch to fix this issue.
References
Link Resource
https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4 Patch
https://vuldb.com/?ctiid.317813 Permissions Required VDB Entry
https://vuldb.com/?id.317813 Third Party Advisory VDB Entry
https://vuldb.com/?submit.621883 Exploit Third Party Advisory VDB Entry
https://www.gnu.org/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*

History

01 Aug 2025, 17:08

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*
First Time Gnu
Gnu binutils
References () https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4 - () https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4 - Patch
References () https://vuldb.com/?ctiid.317813 - () https://vuldb.com/?ctiid.317813 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317813 - () https://vuldb.com/?id.317813 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.621883 - () https://vuldb.com/?submit.621883 - Exploit, Third Party Advisory, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en GNU Binutils 2.44 y se clasificó como problemática. Este problema afecta a la función process_debug_info del archivo binutils/dwarf.c del componente DWARF Section Handler. La manipulación provoca una fuga de memoria. Es obligatorio atacar localmente. El identificador del parche es e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. Se recomienda aplicar un parche para solucionar este problema.

27 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-27 08:15

Updated : 2025-08-01 17:08


NVD link : CVE-2025-8225

Mitre link : CVE-2025-8225

CVE.ORG link : CVE-2025-8225


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-404

Improper Resource Shutdown or Release