Search for packages
Package details: pkg:alpm/archlinux/binutils@2.36.1-3
purl pkg:alpm/archlinux/binutils@2.36.1-3
Next non-vulnerable version 2.37-1
Latest non-vulnerable version 2.38-1
Risk 3.4
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-4mbs-absj-aaae
Aliases:
CVE-2021-3530
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.
2.38-1
Affected by 0 other vulnerabilities.
VCID-h1bx-cfnr-aaaq
Aliases:
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
2.38-1
Affected by 0 other vulnerabilities.
VCID-j8km-6eau-aaak
Aliases:
CVE-2021-3648
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
2.38-1
Affected by 0 other vulnerabilities.
VCID-qmbd-knvg-aaas
Aliases:
CVE-2021-3549
An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
2.37-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:47:01.971343+00:00 Arch Linux Importer Affected by VCID-qmbd-knvg-aaas https://security.archlinux.org/AVG-2002 36.0.0
2025-03-28T07:46:23.384821+00:00 Arch Linux Importer Affected by VCID-h1bx-cfnr-aaaq https://security.archlinux.org/AVG-1540 36.0.0
2025-03-28T07:46:23.366096+00:00 Arch Linux Importer Affected by VCID-4mbs-absj-aaae https://security.archlinux.org/AVG-1540 36.0.0
2025-03-28T07:46:23.347412+00:00 Arch Linux Importer Affected by VCID-j8km-6eau-aaak https://security.archlinux.org/AVG-1540 36.0.0
2024-09-18T02:02:24.438256+00:00 Arch Linux Importer Affected by VCID-qmbd-knvg-aaas https://security.archlinux.org/AVG-2002 34.0.1
2024-09-18T02:01:37.889492+00:00 Arch Linux Importer Affected by VCID-h1bx-cfnr-aaaq https://security.archlinux.org/AVG-1540 34.0.1
2024-09-18T02:01:37.867052+00:00 Arch Linux Importer Affected by VCID-4mbs-absj-aaae https://security.archlinux.org/AVG-1540 34.0.1
2024-09-18T02:01:37.845475+00:00 Arch Linux Importer Affected by VCID-j8km-6eau-aaak https://security.archlinux.org/AVG-1540 34.0.1
2024-01-03T22:28:25.783101+00:00 Arch Linux Importer Affected by VCID-qmbd-knvg-aaas https://security.archlinux.org/AVG-2002 34.0.0rc1
2024-01-03T22:27:44.875276+00:00 Arch Linux Importer Affected by VCID-h1bx-cfnr-aaaq https://security.archlinux.org/AVG-1540 34.0.0rc1
2024-01-03T22:27:44.855581+00:00 Arch Linux Importer Affected by VCID-4mbs-absj-aaae https://security.archlinux.org/AVG-1540 34.0.0rc1
2024-01-03T22:27:44.835764+00:00 Arch Linux Importer Affected by VCID-j8km-6eau-aaak https://security.archlinux.org/AVG-1540 34.0.0rc1