CVE-2025-69646 Affecting binutils-dev package, versions <2.45-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-BINUTILSDEV-15763677
  • published26 Mar 2026
  • disclosed6 Mar 2026

Introduced: 6 Mar 2026

NewCVE-2025-69646  (opens in a new tab)

How to fix?

Upgrade Minimos:latest binutils-dev to version 2.45-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream binutils-dev package and not the binutils-dev package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis.

CVSS Base Scores

version 3.1