<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0009</id>
    <title>An update for binutils is now available for HCE 3.0</title>
    <severity>Important</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:11"/>
    <updated date="2025-10-09 06:38:11"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-5245" id="CVE-2025-5245" title="CVE-2025-5245 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-57360" id="CVE-2024-57360" title="CVE-2024-57360 Base Score: 5.0 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545" id="CVE-2025-7545" title="CVE-2025-7545 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-3198" id="CVE-2025-3198" title="CVE-2025-3198 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-0840" id="CVE-2025-0840" title="CVE-2025-0840 Base Score: 5.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-5244" id="CVE-2025-5244" title="CVE-2025-5244 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. (CVE-2025-5245)

https://www.gnu.org/software/binutils/ nm &gt;=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function. (CVE-2024-57360)

A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue. (CVE-2025-7545)

A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue. (CVE-2025-3198)

A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component. (CVE-2025-0840)

A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component. (CVE-2025-5244)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="binutils">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="binutils" version="2.41" release="12.r7.hce3">
          <filename>binutils-2.41-12.r7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="binutils-devel" version="2.41" release="12.r7.hce3">
          <filename>binutils-devel-2.41-12.r7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="binutils-extra" version="2.41" release="12.r7.hce3">
          <filename>binutils-extra-2.41-12.r7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="binutils" version="2.41" release="12.r7.hce3">
          <filename>binutils-2.41-12.r7.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="binutils-devel" version="2.41" release="12.r7.hce3">
          <filename>binutils-devel-2.41-12.r7.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="binutils-extra" version="2.41" release="12.r7.hce3">
          <filename>binutils-extra-2.41-12.r7.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
