{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2026-3441: heap OOB read via XTY_LD x_scnlen csect index\n- CVE-2026-3442: OOB read on r_symndx before sym_hashes[] indexing",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/tuxcare9.6esu/advisories/2026/clsa-2026_1776673982.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-20T08:33:50Z",
      "generator": {
        "date": "2026-04-20T08:33:50Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776673982",
      "initial_release_date": "2026-04-20T08:33:50Z",
      "revision_history": [
        {
          "date": "2026-04-20T08:33:50Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "binutils: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.6",
                "product": {
                  "name": "AlmaLinux 9.6",
                  "product_id": "AlmaLinux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Rocky Linux 9.6",
                "product": {
                  "name": "Rocky Linux 9.6",
                  "product_id": "Rocky Linux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:resf:rocky_linux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Rocky Linux"
          }
        ],
        "category": "vendor",
        "name": "Rocky Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
                "product": {
                  "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
                  "product_id": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.35.2-63.el9.tuxcare.els8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
                "product": {
                  "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
                  "product_id": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.35.2-63.el9.tuxcare.els8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-gold@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/cross-binutils-s390x@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/cross-binutils-ppc64le@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                "product": {
                  "name": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_id": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/cross-binutils-aarch64@2.35.2-63.el9.tuxcare.els8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686"
        },
        "product_reference": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686"
        },
        "product_reference": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686"
        },
        "product_reference": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686"
        },
        "product_reference": "binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        },
        "product_reference": "cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-3442",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
          "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
          "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
          "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
          "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3442",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-20T08:33:05.466458Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982",
          "product_ids": [
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-3441",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
          "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
          "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
          "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
          "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
          "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3441",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-20T08:33:05.466458Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982",
          "product_ids": [
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776673982"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "AlmaLinux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "AlmaLinux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.i686",
            "Rocky Linux-9.6:binutils-devel-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:binutils-gold-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-aarch64-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-ppc64le-0:2.35.2-63.el9.tuxcare.els8.x86_64",
            "Rocky Linux-9.6:cross-binutils-s390x-0:2.35.2-63.el9.tuxcare.els8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}