{"id":"CVE-2025-7545","details":"A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.","modified":"2026-03-20T12:47:10.442625Z","published":"2025-07-13T22:15:23.873Z","related":["CGA-673m-92v8-ffvr","SUSE-SU-2025:21195-1","SUSE-SU-2025:21197-1","SUSE-SU-2025:4096-1","openSUSE-SU-2025:15651-1","openSUSE-SU-2025:20150-1","openSUSE-SU-2026:10330-1","openSUSE-SU-2026:10331-1"],"references":[{"type":"WEB","url":"https://www.gnu.org/"},{"type":"WEB","url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.614355"},{"type":"ADVISORY","url":"https://vuldb.com/?id.316243"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/attachment.cgi?id=16117"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.316243"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/binutils-gdb.git","events":[{"introduced":"0"},{"last_affected":"2bc7af1ff7732451b6a7b09462a815c3284f9613"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.45"}]}}],"versions":["binu_ss_19990502","binutils-2_41-release","binutils-2_45","gdb-10-branchpoint","gdb-11-branchpoint","gdb-12-branchpoint","gdb-13-branchpoint","gdb-14-branchpoint","gdb-15-branchpoint","gdb-16-branchpoint","gdb-4_18-branchpoint","gdb-7.10-branchpoint","gdb-7.11-branchpoint","gdb-7.12-branchpoint","gdb-7.7-branchpoint","gdb-7.8-branchpoint","gdb-7.9-branchpoint","gdb-8.0-branchpoint","gdb-8.1-branchpoint","gdb-8.2-branchpoint","gdb-8.3-branchpoint","gdb-9-branchpoint","gdb_5_2-branchpoint","gdb_5_3-branchpoint","gdb_6_0-branchpoint","gdb_6_1-branchpoint","gdb_6_2-branchpoint","gdb_6_3-branchpoint","gdb_6_4-branchpoint","gdb_6_5-branchpoint","gdb_6_6-branchpoint","gdb_6_7-branchpoint","gdb_6_8-branchpoint","gdb_7_0-branchpoint","gdb_7_1-branchpoint","gdb_7_2-branchpoint","gdb_7_3-branchpoint","gdb_7_4-branchpoint","gdb_7_5-branchpoint","gdb_7_6-branchpoint","readline_4_0","users/ARM/embedded-binutils-master-2016q4","users/ARM/embedded-binutils-master-2017q4","users/ARM/embedded-binutils-master-2018q4","users/ARM/embedded-gdb-master-2017q4","users/ARM/embedded-gdb-master-2018q4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-7545.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}