An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.
References
Configurations
History
10 Mar 2026, 20:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:* | |
| References | () https://sourceware.org/bugzilla/show_bug.cgi?id=33639 - Issue Tracking | |
| References | () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 - Patch | |
| First Time |
Gnu
Gnu binutils |
10 Mar 2026, 17:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.0 |
| CWE | CWE-400 |
06 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 18:16
Updated : 2026-03-10 20:42
NVD link : CVE-2025-69644
Mitre link : CVE-2025-69644
CVE.ORG link : CVE-2025-69644
JSON object : View
Products Affected
gnu
- binutils
CWE
CWE-400
Uncontrolled Resource Consumption
