{"id":"CVE-2021-20294","details":"A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.","modified":"2026-03-19T12:42:59.341780Z","published":"2021-04-29T16:15:09.783Z","related":["SUSE-SU-2021:3637-1","SUSE-SU-2021:3643-1","SUSE-SU-2022:0934-1","openSUSE-SU-2021:1475-1","openSUSE-SU-2021:3643-1","openSUSE-SU-2024:11634-1"],"references":[{"type":"WEB","url":"https://sourceware.org/git/?p=binutils-gdb.git%3Ba=patch%3Bh=372dd157272e0674d13372655cc60eaca9c06926"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-30"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1943533"},{"type":"FIX","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26929"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/binutils-gdb.git","events":[{"introduced":"2cb5c79dad39dd438fb0f7372ac04cf5aa2a7db7"},{"fixed":"3bcf28ab4a7205c606e6dfde4f55548f188ad7eb"}],"database_specific":{"versions":[{"introduced":"2.35"},{"fixed":"2.35.2"}]}}],"versions":["binutils-2_35","binutils-2_35_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20294.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}