{"id":"CVE-2025-69651","details":"GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.","modified":"2026-04-10T05:35:22.508709Z","published":"2026-03-06T18:16:16.633Z","references":[{"type":"WEB","url":"https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=81e90cf63a10ad11772c2437c8f2a88f1a00c739"},{"type":"WEB","url":"https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=ea4bc025abdba85a90e26e13f551c16a44bfa92"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33698"},{"type":"FIX","url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea4bc025abdba85a90e26e13f551c16a44bfa921"},{"type":"EVIDENCE","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33700"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/binutils-gdb.git","events":[{"introduced":"0"},{"last_affected":"49d4d3fafa4ec4ff5a3460d91d5b1ed5286487db"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.46"}]}}],"versions":["binutils-2_41-release","binutils-2_46","gdb-10-branchpoint","gdb-11-branchpoint","gdb-12-branchpoint","gdb-13-branchpoint","gdb-14-branchpoint","gdb-15-branchpoint","gdb-16-branchpoint","gdb-17-branchpoint","gdb-4_18-branchpoint","gdb-7.10-branchpoint","gdb-7.11-branchpoint","gdb-7.12-branchpoint","gdb-7.7-branchpoint","gdb-7.8-branchpoint","gdb-7.9-branchpoint","gdb-8.0-branchpoint","gdb-8.1-branchpoint","gdb-8.2-branchpoint","gdb-8.3-branchpoint","gdb-9-branchpoint","gdb_5_2-branchpoint","gdb_5_3-branchpoint","gdb_6_0-branchpoint","gdb_6_1-branchpoint","gdb_6_2-branchpoint","gdb_6_3-branchpoint","gdb_6_4-branchpoint","gdb_6_5-branchpoint","gdb_6_6-branchpoint","gdb_6_7-branchpoint","gdb_6_8-branchpoint","gdb_7_0-branchpoint","gdb_7_1-branchpoint","gdb_7_2-branchpoint","gdb_7_3-branchpoint","gdb_7_4-branchpoint","gdb_7_5-branchpoint","gdb_7_6-branchpoint","users/ARM/embedded-binutils-master-2016q4","users/ARM/embedded-binutils-master-2017q4","users/ARM/embedded-binutils-master-2018q4","users/ARM/embedded-gdb-master-2017q4","users/ARM/embedded-gdb-master-2018q4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69651.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}