{"id":"CVE-2025-11839","summary":"GNU Binutils prdbg.c tg_tag_type return value","details":"A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.","modified":"2026-05-18T05:59:08.709725920Z","published":"2025-10-16T14:02:13.689Z","related":["CGA-v5g6-v86h-jw7w"],"database_specific":{"cwe_ids":["CWE-252","CWE-253"],"cna_assigner":"VulDB","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/11xxx/CVE-2025-11839.json","unresolved_ranges":[{"extracted_events":[{"last_affected":"2.45"}],"source":"AFFECTED_FIELD"}]},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"},{"type":"WEB","url":"https://www.gnu.org/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/11xxx/CVE-2025-11839.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-11839"},{"type":"ADVISORY","url":"https://vuldb.com/?id.328774"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.661279"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33448"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.328774"},{"type":"EVIDENCE","url":"https://sourceware.org/bugzilla/attachment.cgi?id=16344"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/binutils-gdb.git","events":[{"introduced":"0"},{"last_affected":"2bc7af1ff7732451b6a7b09462a815c3284f9613"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"2.45"}],"cpe":"cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["binutils-2_45","gdb-16-branchpoint","gdb-15-branchpoint","gdb-14-branchpoint","binutils-2_41-release","gdb-13-branchpoint","gdb-12-branchpoint","gdb-11-branchpoint","gdb-10-branchpoint","gdb-9-branchpoint","gdb-8.3-branchpoint","users/ARM/embedded-gdb-master-2018q4","users/ARM/embedded-binutils-master-2018q4","gdb-8.2-branchpoint","gdb-8.1-branchpoint","users/ARM/embedded-gdb-master-2017q4","users/ARM/embedded-binutils-master-2017q4","gdb-8.0-branchpoint","users/ARM/embedded-binutils-master-2016q4","gdb-7.12-branchpoint","gdb-7.11-branchpoint","gdb-7.10-branchpoint","gdb-7.9-branchpoint","gdb-7.8-branchpoint","gdb-7.7-branchpoint","gdb_7_6-branchpoint","gdb_7_5-branchpoint","gdb_7_4-branchpoint","gdb_7_3-branchpoint","gdb_7_2-branchpoint","gdb_7_1-branchpoint","gdb_7_0-branchpoint","gdb_6_8-branchpoint","gdb_6_7-branchpoint","gdb_6_6-branchpoint","gdb_6_5-branchpoint","gdb_6_4-branchpoint","gdb_6_3-branchpoint","gdb_6_2-branchpoint","gdb_6_1-branchpoint","gdb_6_0-branchpoint","gdb_5_3-branchpoint","gdb_5_2-branchpoint","gdb-4_18-branchpoint"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-11839.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"}]}