{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2026-3441, CVE-2026-3442: fix out-of-bounds read in XCOFF relocation processing",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2026/clsa-2026_1776069305.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-23T08:41:27Z",
      "generator": {
        "date": "2026-04-23T08:41:27Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776069305",
      "initial_release_date": "2026-04-13T08:35:08Z",
      "revision_history": [
        {
          "date": "2026-04-13T08:35:08Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-23T08:41:27Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "binutils: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                "product": {
                  "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                  "product_id": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.27-44.base.el7_9.1.tuxcare.els3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
                "product": {
                  "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
                  "product_id": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.27-44.base.el7_9.1.tuxcare.els3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686"
        },
        "product_reference": "binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
        },
        "product_reference": "binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-3442",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
          "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
          "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3442",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T08:35:08.018581Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305",
          "product_ids": [
            "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-3441",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
          "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
          "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3441",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T08:35:08.018581Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305",
          "product_ids": [
            "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776069305"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:binutils-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.i686",
            "CentOS-7:binutils-devel-0:2.27-44.base.el7_9.1.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}