First published: Fri Mar 26 2021(Updated: )
A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | >=2.35<2.35.2 | |
redhat/binutils | <2.35.2 | 2.35.2 |
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2021-20294.
The affected software is GNU Binutils version 2.35 up to version 2.35.2.
The severity of CVE-2021-20294 is high with a CVSS score of 7.8.
The highest impact of this vulnerability is to confidentiality and integrity.
It is recommended to update GNU Binutils to version 2.35.2 or apply the necessary patches provided by the vendor.