Home

Description

GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service.

PUBLISHED Reserved 2026-01-09 | Published 2026-03-06 | Updated 2026-03-06 | Assigner mitre

References

sourceware.org/...h=ea4bc025abdba85a90e26e13f551c16a44bfa921

sourceware.org/bugzilla/show_bug.cgi?id=33700

cve.org (CVE-2025-69651)

nvd.nist.gov (CVE-2025-69651)

Download JSON