
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-buffer-overflow vulnerability was discovered in GNU Binutils 2.43, specifically affecting the bfdelfgcmarkrsec function in the elflink.c file. The vulnerability was identified on February 5, 2025, and occurs when using the -w and --gc-sections options with specially crafted input files containing sufficiently long file paths ([Sourceware Bug](https://sourceware.org/bugzilla/showbug.cgi?id=32636)).
The vulnerability exists in the garbage collection code of the GNU Binutils linker (ld), where there was an incorrect assumption that external symbol indices would always be valid. The issue manifests as a heap-buffer-overflow when accessing the sym_hashes array of the elf bfd cookie structure (Sourceware Commit).
When exploited, this vulnerability leads to memory corruption and potential application crashes. The heap-buffer-overflow occurs during the linking process and could potentially affect system stability and security (Sourceware Bug).
A fix has been implemented and committed to the GNU Binutils repository. The patch prevents illegal memory access when indexing into the sym_hashes array of the elf bfd cookie structure (Sourceware Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."