Direct Vulnerabilities

Known vulnerabilities in the binutils package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Unchecked Return Value

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Out-of-bounds Write

<0:2.45.1-5.hum1
  • L
Buffer Access with Incorrect Length Value

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • M
Out-of-bounds Write

<0:2.45.1-5.hum1
  • M
Information Exposure

<0:2.45.1-5.hum1
  • M
Out-of-bounds Read

<0:2.45.1-5.hum1
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
NULL Pointer Dereference

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Out-of-bounds Read

<0:2.45.1-5.hum1
  • L
Stack-based Buffer Overflow

<0:2.45.1-5.hum1
  • L
Double Free

<0:2.45.1-5.hum1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.45.1-5.hum1
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.45.1-5.hum1
  • L
Reachable Assertion

*
  • L
Access of Uninitialized Pointer

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

<0:2.45.1-5.hum1
  • L
Unchecked Input for Loop Condition

*
  • L
Unchecked Input for Loop Condition

<0:2.45.1-5.hum1
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Unchecked Input for Loop Condition

*
  • L
Double Free

*
  • L
Access of Uninitialized Pointer

*
  • L
NULL Pointer Dereference

*
  • L
Reachable Assertion

*
  • L
Unchecked Input for Loop Condition

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Information Exposure

<0:2.41-58.el10_1.2
  • M
Information Exposure

<0:2.41-53.el10_0.2
  • M
Out-of-bounds Write

<0:2.41-58.el10_1.2
  • M
Out-of-bounds Write

<0:2.41-53.el10_0.2
  • M
Out-of-Bounds

<0:2.41-58.el10
  • L
Out-of-bounds Read

*
  • L
Unchecked Return Value

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • M
Out-of-Bounds

*