Impact
A flaw in the GNU Binutils BFD library allows an attacker to craft an XCOFF object file with an invalid relocation type. When this file is processed, the relocation type is not properly validated, leading to a read outside the intended memory bounds. This out-of-bounds read can cause the processing program to crash or leak memory contents that were not intended for disclosure.
Affected Systems
The vulnerability affects a wide range of Red Hat products that ship with the Binutils library, including Red Hat Enterprise Linux versions 6 through 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4. The vulnerability is present in the GNU Binutils component itself; specific version details were not supplied by the CNA data and therefore are not listed.
Risk and Exploitability
The CVSS score of 6.1 indicates a medium severity impact. The EPSS score is below 1% and the vulnerability is not currently listed in CISA’s KEV catalog, suggesting a low likelihood of widespread exploitation. The attack vector is inferred to be based on the delivery of a malicious XCOFF file, which could be supplied remotely to systems that consume such files or locally by an attacker with write access to the target system. Given the lack of an official workaround, systems remain at risk until the library is updated or the vulnerability is mitigated.
OpenCVE Enrichment