binutils vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the binutils package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • L
Memory Leak

*
  • L
Out-of-Bounds

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • M
NULL Pointer Dereference

<0:2.30-113.el8_6.2
  • M
NULL Pointer Dereference

<0:2.30-113.el8_6.2
  • M
NULL Pointer Dereference

<0:2.30-113.el8_6.2
  • M
NULL Pointer Dereference

<0:2.30-113.el8_6.2
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-Bounds

*
  • L
Use of Uninitialized Variable

*
  • L
Out-of-bounds Read

*
  • L
Use of Uninitialized Variable

*
  • M
NULL Pointer Dereference

<0:2.30-119.el8_8.2
  • M
NULL Pointer Dereference

<0:2.30-119.el8_8.2
  • M
NULL Pointer Dereference

<0:2.30-119.el8_8.2
  • M
NULL Pointer Dereference

<0:2.30-119.el8_8.2
  • M
NULL Pointer Dereference

<0:2.30-119.el8_8.2
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Inappropriate Encoding for Output Context

<0:2.30-58.el8_1.3
  • M
Inappropriate Encoding for Output Context

<0:2.30-73.el8_2.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-93.el8_4.2
  • M
Inappropriate Encoding for Output Context

<0:2.30-93.el8_4.2
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-73.el8_2.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-93.el8_4.2
  • M
Inappropriate Encoding for Output Context

<0:2.30-73.el8_2.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-93.el8_4.2
  • M
Inappropriate Encoding for Output Context

<0:2.30-73.el8_2.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-58.el8_1.3
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • M
Inappropriate Encoding for Output Context

<0:2.30-108.el8_5.1
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Integer Overflow or Wraparound

<0:2.30-73.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Uncontrolled Recursion

<0:2.30-79.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Improper Input Validation

<0:2.30-73.el8
  • L
Resource Exhaustion

*
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Improper Input Validation

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • M
Link Following

<0:2.30-108.el8
  • L
Use of Uninitialized Resource

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • M
Out-of-Bounds

<0:2.30-108.el8
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-Bounds

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Heap-based Buffer Overflow

<0:2.30-125.el8_10
  • M
Integer Overflow or Wraparound

*