Impact
A heap‑based out‑of‑bounds read in the bfd linker of GNU Binutils can be triggered by opening a specially crafted XCOFF object file. The resulting vulnerability allows an attacker to read sensitive data from memory that should not be accessible, potentially exposing confidential information or causing a denial of service at the application level. The weakness is defined as CWE‑125, representing an attempt to read beyond allocated bounds.
Affected Systems
The flaw affects GNU Binutils as shipped on several Red Hat platforms, including Red Hat Enterprise Linux 6, 7, 8, 9, and 10, the Red Hat Hardened Images distribution, and the OpenShift Container Platform 4. No specific product or version numbers that contain the fix are listed in the advisory, so any installation of these distributions that contains the vulnerable binutils component is potentially impacted.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.1, indicating medium severity, while the EPSS score is less than 1 %, implying a very low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers would need to persuade a local user or a system process to load a malicious XCOFF file; it is unlikely that remote exploitation via a network interface is possible, so the primary attack vector is local file processing. Given the moderate score and low exploitation likelihood, the risk for most environments is limited but still actionable.
OpenCVE Enrichment