Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:4588 - Security Advisory
Issued:
2021-11-10
Updated:
2021-11-10

RHSA-2021:4588 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: gcc-toolset-10-binutils security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for gcc-toolset-10-binutils is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

Security Fix(es):

  • Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)

The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters:

Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled.

Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used.
Using "--unicode=locale" will display them according to the current locale.
Using "--unicode=hex" will display them as hex byte values.
Using "--unicode=escape" will display them as Unicode escape sequences.
Using "--unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2005819 - CVE-2021-42574 Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks

CVEs

  • CVE-2021-42574

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/security/vulnerabilities/RHSB-2021-007
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
x86_64
gcc-toolset-10-binutils-2.35-8.el8_4.5.x86_64.rpm SHA-256: 24a5b531491bc3da2c8f3d9de6f9807a17897789179496dbe46461669bc2c841
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.i686.rpm SHA-256: adc58e9a3aab45d7ecf07786df9a2aa8ce84b118d1084c416fec4b78259e003a
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.x86_64.rpm SHA-256: 9a9e029d31f56f6c35bceba6fa264bc2ee7607a3496588e131ac14c4d8435a49
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.i686.rpm SHA-256: 0bf22047054cfd33dfe14331237e440b589e36f6638e276cacd78413c7829dc6
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.x86_64.rpm SHA-256: a6f001ca2dbc1da11ea1079f984935aa23416259f88722a56b6e15a5b206d101

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
x86_64
gcc-toolset-10-binutils-2.35-8.el8_4.5.x86_64.rpm SHA-256: 24a5b531491bc3da2c8f3d9de6f9807a17897789179496dbe46461669bc2c841
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.i686.rpm SHA-256: adc58e9a3aab45d7ecf07786df9a2aa8ce84b118d1084c416fec4b78259e003a
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.x86_64.rpm SHA-256: 9a9e029d31f56f6c35bceba6fa264bc2ee7607a3496588e131ac14c4d8435a49
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.i686.rpm SHA-256: 0bf22047054cfd33dfe14331237e440b589e36f6638e276cacd78413c7829dc6
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.x86_64.rpm SHA-256: a6f001ca2dbc1da11ea1079f984935aa23416259f88722a56b6e15a5b206d101

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
x86_64
gcc-toolset-10-binutils-2.35-8.el8_4.5.x86_64.rpm SHA-256: 24a5b531491bc3da2c8f3d9de6f9807a17897789179496dbe46461669bc2c841
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.i686.rpm SHA-256: adc58e9a3aab45d7ecf07786df9a2aa8ce84b118d1084c416fec4b78259e003a
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.x86_64.rpm SHA-256: 9a9e029d31f56f6c35bceba6fa264bc2ee7607a3496588e131ac14c4d8435a49
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.i686.rpm SHA-256: 0bf22047054cfd33dfe14331237e440b589e36f6638e276cacd78413c7829dc6
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.x86_64.rpm SHA-256: a6f001ca2dbc1da11ea1079f984935aa23416259f88722a56b6e15a5b206d101

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
s390x
gcc-toolset-10-binutils-2.35-8.el8_4.5.s390x.rpm SHA-256: e06ef118f94d1e0113530d216abb8d8a9d57fb6ab72f8bad21284a37b46505af
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.s390x.rpm SHA-256: 27dff78cc16eb4251125fdf52d5277ffb421d2b8fba6ca21271aee228ab1912c
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.s390x.rpm SHA-256: ade293c113c242bb797ee9027c5102fc975c7300ada1db420af5ae8e3a983640

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
ppc64le
gcc-toolset-10-binutils-2.35-8.el8_4.5.ppc64le.rpm SHA-256: de664101df6904d4348269b38a72b5590343cbb37d08de0bbcdd09f8881557f2
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.ppc64le.rpm SHA-256: 8de01c2670f0ae054aad237ddd1555a4a282c47a091bfb8fea1e8debfaa3615a
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.ppc64le.rpm SHA-256: c1e1a920b77ee6473f300a76a05ef0d95e0022adffa960697d58626fc5eea82e

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
x86_64
gcc-toolset-10-binutils-2.35-8.el8_4.5.x86_64.rpm SHA-256: 24a5b531491bc3da2c8f3d9de6f9807a17897789179496dbe46461669bc2c841
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.i686.rpm SHA-256: adc58e9a3aab45d7ecf07786df9a2aa8ce84b118d1084c416fec4b78259e003a
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.x86_64.rpm SHA-256: 9a9e029d31f56f6c35bceba6fa264bc2ee7607a3496588e131ac14c4d8435a49
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.i686.rpm SHA-256: 0bf22047054cfd33dfe14331237e440b589e36f6638e276cacd78413c7829dc6
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.x86_64.rpm SHA-256: a6f001ca2dbc1da11ea1079f984935aa23416259f88722a56b6e15a5b206d101

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
aarch64
gcc-toolset-10-binutils-2.35-8.el8_4.5.aarch64.rpm SHA-256: 6e584ad3ff9a21e738df50eb28309b65ce3f6db0a6c992957877b70d51000560
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.aarch64.rpm SHA-256: c7ae50993e621df9057794f0cde3b1ac35a668381da6e52570dc765acebd39b4
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.aarch64.rpm SHA-256: 3d9ea23c0531180517f06bf60188b6db613ceeda169422e3048ca514afd2a6c7

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
ppc64le
gcc-toolset-10-binutils-2.35-8.el8_4.5.ppc64le.rpm SHA-256: de664101df6904d4348269b38a72b5590343cbb37d08de0bbcdd09f8881557f2
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.ppc64le.rpm SHA-256: 8de01c2670f0ae054aad237ddd1555a4a282c47a091bfb8fea1e8debfaa3615a
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.ppc64le.rpm SHA-256: c1e1a920b77ee6473f300a76a05ef0d95e0022adffa960697d58626fc5eea82e

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
gcc-toolset-10-binutils-2.35-8.el8_4.5.src.rpm SHA-256: 16c42ef844f54dcb3ccf1a01a6f48c09a6d2f28b568705577219745888237dc6
x86_64
gcc-toolset-10-binutils-2.35-8.el8_4.5.x86_64.rpm SHA-256: 24a5b531491bc3da2c8f3d9de6f9807a17897789179496dbe46461669bc2c841
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.i686.rpm SHA-256: adc58e9a3aab45d7ecf07786df9a2aa8ce84b118d1084c416fec4b78259e003a
gcc-toolset-10-binutils-debuginfo-2.35-8.el8_4.5.x86_64.rpm SHA-256: 9a9e029d31f56f6c35bceba6fa264bc2ee7607a3496588e131ac14c4d8435a49
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.i686.rpm SHA-256: 0bf22047054cfd33dfe14331237e440b589e36f6638e276cacd78413c7829dc6
gcc-toolset-10-binutils-devel-2.35-8.el8_4.5.x86_64.rpm SHA-256: a6f001ca2dbc1da11ea1079f984935aa23416259f88722a56b6e15a5b206d101

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility