First published: Tue Feb 11 2025(Updated: )
A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1181 is classified as a critical vulnerability due to its potential for remote memory corruption.
CVE-2025-1181 affects the function _bfd_elf_gc_mark_rsec in the file bfd/elflink.c of the ld component.
To mitigate CVE-2025-1181, it is recommended to update GNU Binutils to a patched version provided by the vendor.
Yes, CVE-2025-1181 can be exploited remotely, which increases its risk profile significantly.
CVE-2025-1181 facilitates attacks that lead to memory corruption, potentially allowing attackers to compromise system integrity.