CVE-2026-3441
Awaiting Analysis Awaiting Analysis - Queue
Heap-Based Buffer Overflow in GNU Binutils bfd Linker Causes Info Leak

Publication date: 2026-03-16

Last updated on: 2026-03-20

Assigner: Red Hat, Inc.

Description
A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-16
Last Modified
2026-03-20
Generated
2026-05-07
AI Q&A
2026-03-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat openshift_container_platform 4.0
redhat enterprise_linux 9.0
gnu binutils *
redhat enterprise_linux 10.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3441 is a medium-severity vulnerability in GNU Binutils, specifically in the bfd linker component that handles XCOFF object files.

The flaw is a heap-based buffer overflow caused by an out-of-bounds read in the function xcoff_link_add_symbols due to improper validation of the x_scnlen value. This leads to accessing memory beyond the bounds of the csects array.

An attacker can exploit this by convincing a user to run the linker on a specially crafted malicious XCOFF object file, triggering the vulnerability.


How can this vulnerability impact me? :

This vulnerability can lead to information disclosure or an application-level denial of service.

By exploiting the heap-based buffer overflow, an attacker may gain access to sensitive information processed by the linker.

Additionally, the flaw can cause the application to crash or behave unexpectedly, resulting in denial of service.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart