Unchecked Input for Loop Condition The advisory has been revoked - it doesn't affect any version of package gdb.src  (opens in a new tab)


Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-GDBSRC-15439592
  • published7 Mar 2026
  • disclosed1 Jan 2025

Introduced: 1 Jan 2025

CVE-2025-69644  (opens in a new tab)
CWE-606  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gdb.src package and not the gdb.src package as distributed by RHEL.

An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.