Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:* |
Tue, 10 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu binutils |
|
| Vendors & Products |
Gnu
Gnu binutils |
Sat, 07 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | binutils: NULL pointer dereference in readelf via crafted ELF binary | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 06 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-10T02:43:44.186Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69649
Updated: 2026-03-10T02:43:38.302Z
Status : Analyzed
Published: 2026-03-06T19:16:10.640
Modified: 2026-03-11T15:51:24.160
Link: CVE-2025-69649
OpenCVE Enrichment
Updated: 2026-03-09T10:08:36Z