vulnerability

SUSE: CVE-2025-5244: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Published
Nov 14, 2025
Added
Nov 17, 2025
Modified
Dec 16, 2025

Description

A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.

Solutions

suse-upgrade-binutilssuse-upgrade-binutils-develsuse-upgrade-binutils-devel-32bitsuse-upgrade-bpftoolsuse-upgrade-bpftool-bash-completionsuse-upgrade-cross-aarch64-binutilssuse-upgrade-cross-arm-binutilssuse-upgrade-cross-avr-binutilssuse-upgrade-cross-bpf-binutilssuse-upgrade-cross-epiphany-binutilssuse-upgrade-cross-hppa-binutilssuse-upgrade-cross-hppa64-binutilssuse-upgrade-cross-i386-binutilssuse-upgrade-cross-ia64-binutilssuse-upgrade-cross-loongarch64-binutilssuse-upgrade-cross-m68k-binutilssuse-upgrade-cross-mips-binutilssuse-upgrade-cross-ppc-binutilssuse-upgrade-cross-ppc64-binutilssuse-upgrade-cross-ppc64le-binutilssuse-upgrade-cross-pru-binutilssuse-upgrade-cross-riscv64-binutilssuse-upgrade-cross-rx-binutilssuse-upgrade-cross-s390-binutilssuse-upgrade-cross-s390x-binutilssuse-upgrade-cross-sparc-binutilssuse-upgrade-cross-sparc64-binutilssuse-upgrade-cross-spu-binutilssuse-upgrade-cross-x86_64-binutilssuse-upgrade-cross-xtensa-binutilssuse-upgrade-gprofngsuse-upgrade-libctf-nobfd0suse-upgrade-libctf0suse-upgrade-libucm-develsuse-upgrade-libucm0suse-upgrade-libucp-develsuse-upgrade-libucp0suse-upgrade-libucs-develsuse-upgrade-libucs0suse-upgrade-libuct-develsuse-upgrade-libuct0suse-upgrade-openucx-toolssuse-upgrade-perfsuse-upgrade-perf-bash-completionsuse-upgrade-perf-develsuse-upgrade-perf-gtk
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.