CVE-2026-4647
Out-of-Bounds Read in GNU Binutils BFD via XCOFF Relocation
Publication date: 2026-03-23
Last updated on: 2026-03-24
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 6.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | openshift_container_platform | 4.0 |
| redhat | enterprise_linux | 9.0 |
| gnu | binutils | * |
| redhat | enterprise_linux | 10.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read flaw in the GNU Binutils BFD library, which is used to handle binary files like object files and executables.
It occurs when processing specially crafted XCOFF object files where a relocation type value (r_type) is not properly validated before being used as an array index.
Because of this improper validation, the program may read memory outside of intended bounds, which can cause crashes or expose unintended memory contents.
How can this vulnerability impact me? :
The vulnerability can lead to denial-of-service conditions by causing affected tools to crash.
It also poses a risk of limited information disclosure by exposing unintended memory contents.
In some cases, it may allow unintended control flow alterations, potentially affecting the behavior of applications using the vulnerable library.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability arises when processing specially crafted XCOFF object files using affected GNU Binutils tools. Detection involves identifying usage of vulnerable Binutils versions and analyzing if such crafted XCOFF files are processed.
Since the flaw is in the functions xcoff_ppc_relocate_section() and xcoff64_ppc_relocate_section(), detection can include monitoring for crashes or abnormal behavior when handling XCOFF files.
Specific commands to detect the vulnerability are not provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating GNU Binutils to version 2.47 or later, where the vulnerability has been fixed.
Avoid processing untrusted or specially crafted XCOFF object files with vulnerable Binutils versions to prevent exploitation.