Description
A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.
Published: 2026-03-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure or application denial of service via an out‑of‑bounds read in GNU Binutils’ bfd linker
Action: Assess Impact
AI Analysis

Impact

A heap‑based buffer overflow caused by an out‑of‑bounds read in the bfd linker component of GNU Binutils can be triggered when a user processes a specially crafted XCOFF object file. Successful exploitation may expose sensitive information or result in the linker crashing, which causes an application‑level denial of service. The weakness is recognized as CWE‑125.

Affected Systems

The vulnerability may affect systems that include Red Hat Enterprise Linux releases 6 through 10, Red Hat Hardened Images, Red Hat OpenShift Container Platform 4 and related GNU Binutils packages. No fixed version information is provided, so all installations of the affected component are considered at risk until a patch is applied.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity overall. An EPSS score of less than 1 % suggests that the likelihood of exploitation is low at the current time. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires that a user intentionally or inadvertently load a malicious XCOFF file, meaning that the threat is limited to environments that allow such file processing. Nevertheless, the potential impact on confidentiality and availability warrants assessment and, where possible, mitigation.

Generated by OpenCVE AI on April 15, 2026 at 22:39 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Update GNU Binutils to the most recent vendor release that addresses this out‑of‑bounds read; contact Red Hat support for the official patch or upgrade path.
  • Configure system security policies (e.g., SELinux or AppArmor) to restrict the Binutils bfd linker’s ability to read arbitrary memory and to limit its execution to trusted files only.
  • No suitable workaround is available for this issue; rely on the patch or upgrade to prevent exploitation.
  • Implement monitoring to detect and block attempts to process suspicious XCOFF files, and educate users to avoid opening files from untrusted sources.

Generated by OpenCVE AI on April 15, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Fri, 20 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
CPEs cpe:2.3:a:gnu:binutils:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Container Platform

Mon, 16 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 15 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.
Title binutils: GNU Binutils: Information disclosure or denial of service via out-of-bounds read in bfd linker Binutils: gnu binutils: information disclosure or denial of service via out-of-bounds read in bfd linker
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu binutils
Vendors & Products Gnu
Gnu binutils

Tue, 03 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title binutils: GNU Binutils: Information disclosure or denial of service via out-of-bounds read in bfd linker
Weaknesses CWE-125
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}

threat_severity

Moderate


Subscriptions

Gnu Binutils
Redhat Enterprise Linux Hummingbird Openshift Openshift Container Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-08T13:24:57.077Z

Reserved: 2026-03-02T14:22:03.906Z

Link: CVE-2026-3442

cve-icon Vulnrichment

Updated: 2026-03-16T19:16:51.592Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:47.720

Modified: 2026-03-20T18:23:46.453

Link: CVE-2026-3442

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-02T11:11:00Z

Links: CVE-2026-3442 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:45:16Z

Weaknesses