{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-5244: fix NULL deref in elf_gc_sweep on empty section group\n- CVE-2025-5245: fix NULL deref in debug_type_samep for incomplete enum types\n- CVE-2026-3441, CVE-2026-3442: fix xcofflink out-of-bounds accesses",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos-stream8els/advisories/2026/clsa-2026_1776083558.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-13T12:33:24Z",
      "generator": {
        "date": "2026-04-13T12:33:24Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776083558",
      "initial_release_date": "2026-04-13T12:33:24Z",
      "revision_history": [
        {
          "date": "2026-04-13T12:33:24Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "binutils: Fix of 4 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8",
                "product": {
                  "name": "Community Enterprise Operating System 8",
                  "product_id": "CentOS-Stream-8",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
                "product": {
                  "name": "binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
                  "product_id": "binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils@2.30-123.el8.tuxcare.els5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64",
                "product": {
                  "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64",
                  "product_id": "binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.30-123.el8.tuxcare.els5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
                "product": {
                  "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
                  "product_id": "binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/binutils-devel@2.30-123.el8.tuxcare.els5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-0:2.30-123.el8.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64"
        },
        "product_reference": "binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.i686 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686"
        },
        "product_reference": "binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
        },
        "product_reference": "binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-3442",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3442",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3442"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443828"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T12:32:41.925768Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558",
          "product_ids": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-5244",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-5244"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/attachment.cgi?id=16010",
          "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16010"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=32858",
          "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32858"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5",
          "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.310346",
          "url": "https://vuldb.com/?ctiid.310346"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.310346",
          "url": "https://vuldb.com/?id.310346"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.584634",
          "url": "https://vuldb.com/?submit.584634"
        },
        {
          "category": "external",
          "summary": "https://www.gnu.org/",
          "url": "https://www.gnu.org/"
        }
      ],
      "release_date": "2025-05-27T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T12:32:41.925768Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558",
          "product_ids": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-3441",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-3441",
          "url": "https://access.redhat.com/security/cve/CVE-2026-3441"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443826"
        }
      ],
      "release_date": "2026-03-16T14:19:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T12:32:41.925768Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558",
          "product_ids": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-5245",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
          "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-5245"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/attachment.cgi?id=16004",
          "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16004"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=32829",
          "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32829"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a",
          "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.310347",
          "url": "https://vuldb.com/?ctiid.310347"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.310347",
          "url": "https://vuldb.com/?id.310347"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.584635",
          "url": "https://vuldb.com/?submit.584635"
        },
        {
          "category": "external",
          "summary": "https://www.gnu.org/",
          "url": "https://www.gnu.org/"
        }
      ],
      "release_date": "2025-05-27T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T12:32:41.925768Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558",
          "product_ids": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776083558"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:binutils-0:2.30-123.el8.tuxcare.els5.x86_64",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.i686",
            "CentOS-Stream-8:binutils-devel-0:2.30-123.el8.tuxcare.els5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}