Home

Description

GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version.

PUBLISHED Reserved 2026-01-09 | Published 2026-03-06 | Updated 2026-03-19 | Assigner mitre

References

sourceware.org/bugzilla/show_bug.cgi?id=33698 exploit

sourceware.org/bugzilla/show_bug.cgi?id=33698

sourceware.org/...h=ea4bc025abdba85a90e26e13f551c16a44bfa921

sourceware.org/bugzilla/show_bug.cgi?id=33700

sourceware.org/...h=81e90cf63a10ad11772c2437c8f2a88f1a00c739

sourceware.org/...;h=ea4bc025abdba85a90e26e13f551c16a44bfa92

cve.org (CVE-2025-69650)

nvd.nist.gov (CVE-2025-69650)

Download JSON