Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-460 | |
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu binutils |
|
| Vendors & Products |
Gnu
Gnu binutils |
Sat, 07 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | binutils: abort in readelf via crafted ELF binary with malformed DWARF abbrev or debug information | |
| Weaknesses | CWE-617 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 06 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-09T16:34:46.153Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69652
Updated: 2026-03-09T16:33:17.373Z
Status : Analyzed
Published: 2026-03-06T19:16:10.907
Modified: 2026-03-11T15:49:59.467
Link: CVE-2025-69652
OpenCVE Enrichment
Updated: 2026-03-09T10:08:38Z