
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in GNU Binutils version 2.45, specifically affecting the getlinkhash_entry function in the bfd/elflink.c file of the Linker component. The vulnerability was disclosed on October 7, 2025, and tracked as CVE-2025-11414. This security issue has been classified as problematic and involves an out-of-bounds read condition (VulDB).
The vulnerability is classified as an out-of-bounds read (CWE-125) and improper restriction of operations within memory buffer bounds (CWE-119). The issue has received a CVSS v4.0 score of 4.8 (Medium) with the vector string CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P, and a CVSS v3.1 score of 3.3 (Low) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (NVD).
The vulnerability allows for out-of-bounds read operations, which could potentially lead to information disclosure or system instability. The attack can only be executed locally, limiting its potential impact to systems where an attacker has local access (VulDB).
The vulnerability has been addressed in GNU Binutils version 2.46. Users are advised to upgrade to this version to mitigate the risk. The fix is available through patch aeaaa9af6359c8e394ce9cf24911fec4f4d23703, which can be downloaded from sourceware.org (NVD, VulDB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."