CVE-2026-4647
Awaiting Analysis Awaiting Analysis - Queue
Out-of-Bounds Read in GNU Binutils BFD via XCOFF Relocation

Publication date: 2026-03-23

Last updated on: 2026-03-24

Assigner: Red Hat, Inc.

Description
A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation type value is not properly validated before being used. This can cause the program to read memory outside of intended bounds. As a result, affected tools may crash or expose unintended memory contents, leading to denial-of-service or limited information disclosure risks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat openshift_container_platform 4.0
redhat enterprise_linux 9.0
gnu binutils *
redhat enterprise_linux 10.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read flaw in the GNU Binutils BFD library, which is used to handle binary files like object files and executables.

It occurs when processing specially crafted XCOFF object files where a relocation type value (r_type) is not properly validated before being used as an array index.

Because of this improper validation, the program may read memory outside of intended bounds, which can cause crashes or expose unintended memory contents.


How can this vulnerability impact me? :

The vulnerability can lead to denial-of-service conditions by causing affected tools to crash.

It also poses a risk of limited information disclosure by exposing unintended memory contents.

In some cases, it may allow unintended control flow alterations, potentially affecting the behavior of applications using the vulnerable library.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability arises when processing specially crafted XCOFF object files using affected GNU Binutils tools. Detection involves identifying usage of vulnerable Binutils versions and analyzing if such crafted XCOFF files are processed.

Since the flaw is in the functions xcoff_ppc_relocate_section() and xcoff64_ppc_relocate_section(), detection can include monitoring for crashes or abnormal behavior when handling XCOFF files.

Specific commands to detect the vulnerability are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating GNU Binutils to version 2.47 or later, where the vulnerability has been fixed.

Avoid processing untrusted or specially crafted XCOFF object files with vulnerable Binutils versions to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart