A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-3441 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2443826 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Mar 2026, 18:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:binutils:-:*:*:*:*:*:*:* |
|
| First Time |
Redhat
Redhat enterprise Linux Gnu binutils Gnu Redhat openshift Container Platform |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-3441 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2443826 - Issue Tracking, Vendor Advisory | |
| Summary |
|
16 Mar 2026, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:19
Updated : 2026-03-20 18:24
NVD link : CVE-2026-3441
Mitre link : CVE-2026-3441
CVE.ORG link : CVE-2026-3441
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
gnu
- binutils
CWE
CWE-125
Out-of-bounds Read
