Description
A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.
Published: 2026-03-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

A heap‑based out‑of‑bounds read in the bfd linker of GNU Binutils can be triggered by opening a specially crafted XCOFF object file. The resulting vulnerability allows an attacker to read sensitive data from memory that should not be accessible, potentially exposing confidential information or causing a denial of service at the application level. The weakness is defined as CWE‑125, representing an attempt to read beyond allocated bounds.

Affected Systems

The flaw affects GNU Binutils as shipped on several Red Hat platforms, including Red Hat Enterprise Linux 6, 7, 8, 9, and 10, the Red Hat Hardened Images distribution, and the OpenShift Container Platform 4. No specific product or version numbers that contain the fix are listed in the advisory, so any installation of these distributions that contains the vulnerable binutils component is potentially impacted.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.1, indicating medium severity, while the EPSS score is less than 1 %, implying a very low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers would need to persuade a local user or a system process to load a malicious XCOFF file; it is unlikely that remote exploitation via a network interface is possible, so the primary attack vector is local file processing. Given the moderate score and low exploitation likelihood, the risk for most environments is limited but still actionable.

Generated by OpenCVE AI on April 15, 2026 at 22:38 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Upgrade GNU Binutils or the affected Red Hat Enterprise Linux packages to a version where the patch is applied, as indicated by the latest Red Hat security advisory.
  • No official workaround has been provided; the absence of a workaround emphasizes the necessity of applying the patch.
  • If an immediate update is not possible, restrict the handling of untrusted XCOFF files to a highly privileged or isolated environment to reduce the chance of accidental processing.
  • Maintain up‑to‑date monitoring of Red Hat security releases and apply any future patches or guidance as they become available.

Generated by OpenCVE AI on April 15, 2026 at 22:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Fri, 20 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
CPEs cpe:2.3:a:gnu:binutils:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Container Platform

Mon, 16 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 15 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.
Title binutils: GNU Binutils: Information disclosure via specially crafted XCOFF object file Binutils: gnu binutils: information disclosure via specially crafted xcoff object file
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu binutils
Vendors & Products Gnu
Gnu binutils

Tue, 03 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title binutils: GNU Binutils: Information disclosure via specially crafted XCOFF object file
Weaknesses CWE-125
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}

threat_severity

Moderate


Subscriptions

Gnu Binutils
Redhat Enterprise Linux Hummingbird Openshift Openshift Container Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-28T16:31:31.861Z

Reserved: 2026-03-02T14:08:59.315Z

Link: CVE-2026-3441

cve-icon Vulnrichment

Updated: 2026-03-16T19:16:07.767Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:47.447

Modified: 2026-03-20T18:24:05.240

Link: CVE-2026-3441

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-02T11:11:00Z

Links: CVE-2026-3441 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:45:16Z

Weaknesses