CVE-2025-1147: A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by...
3.1
Basic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerable function __sanitizer::internal_strlen and its file path binutils/nm.c were directly identified from the vulnerability description and confirmed by the Red Hat Bugzilla entry. The vulnerability is a buffer overflow related to the handling of an argument named 'const' within this function. Due to the lack of direct patch or commit information, the confidence is set to medium, as the analysis relies on textual descriptions of the vulnerability rather than code changes. The initial attempts to fetch detailed patch information from the provided URLs were unsuccessful either due to content restrictions (like the Anubis anti-bot measure on sourceware.org) or because the URLs did not directly point to commit/patch files (e.g., issue trackers).