ALT-BU-2020-4151-1
Branch sisyphus update bulletin.
Package texlive-texmf updated to version 2019-alt4_7 for branch sisyphus in task 261965.
Closed bugs
Упакованы различные скрипты в /usr/share/texmf-dist/scripts/
Closed bugs
mono-core предоставляет все метапакеты mono
Package referenceassemblies-pcl updated to version 2014.04.14-alt5 for branch sisyphus in task 261566.
Closed bugs
mono-core предоставляет все метапакеты mono
Package avr-binutils updated to version 2.35-alt1_1 for branch sisyphus in task 262070.
Closed vulnerabilities
BDU:2019-00981
Уязвимость функции _bfd_archive_64_bit_slurp_armap программного средства разработки GNU Binutils, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04872
Уязвимость библиотеки libbfd программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12972
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- 108903
- 108903
- GLSA-202007-39
- GLSA-202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-14250
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
- openSUSE-SU-2019:2364
- openSUSE-SU-2019:2364
- openSUSE-SU-2019:2365
- openSUSE-SU-2019:2365
- openSUSE-SU-2020:0716
- openSUSE-SU-2020:0716
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- 109354
- 109354
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://security.netapp.com/advisory/ntap-20190822-0002/
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-14444
apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-17450
find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-17451
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-9070
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls.
- 107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://support.f5.com/csp/article/K13534168
- USN-4326-1
- USN-4336-1
- 107147
- USN-4336-1
- USN-4326-1
- https://support.f5.com/csp/article/K13534168
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
Modified: 2024-11-21
CVE-2019-9071
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls.
- 107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://support.f5.com/csp/article/K02884135
- USN-4326-1
- USN-4336-1
- 107147
- USN-4336-1
- USN-4326-1
- https://support.f5.com/csp/article/K02884135
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
Modified: 2024-11-21
CVE-2019-9072
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c.
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://support.f5.com/csp/article/K12541829
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- https://support.f5.com/csp/article/K12541829
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
Modified: 2024-11-21
CVE-2019-9073
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c.
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://support.f5.com/csp/article/K37121474
- USN-4336-1
- GLSA-202107-24
- USN-4336-1
- https://support.f5.com/csp/article/K37121474
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://security.netapp.com/advisory/ntap-20190314-0003/
Modified: 2024-11-21
CVE-2019-9074
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://support.f5.com/csp/article/K09092524
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K09092524
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2019-9075
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://support.f5.com/csp/article/K42059040
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K42059040
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2019-9076
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c.
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://support.f5.com/csp/article/K44650639
- GLSA-202107-24
- https://support.f5.com/csp/article/K44650639
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://security.netapp.com/advisory/ntap-20190314-0003/
Modified: 2024-11-21
CVE-2019-9077
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- 107139
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://support.f5.com/csp/article/K00056379
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K00056379
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- 107139
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2020-35493
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35494
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35495
There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35496
There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35507
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
Package libgdk-pixbuf updated to version 2.42.0-alt1 for branch sisyphus in task 261999.
Closed vulnerabilities
BDU:2021-04598
Уязвимость библиотеки загрузки изображений GdkPixbuf, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-02-12
CVE-2021-20240
A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15847
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
Modified: 2024-11-21
CVE-2021-37322
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
Closed vulnerabilities
BDU:2021-02853
Уязвимость криптографических функций библиотеки средства разработки GoLang прикладного программного обеспечения Аврора Центр, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-28362
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
- https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
- https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
- [trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5
- [trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5
- FEDORA-2020-e971480183
- FEDORA-2020-e971480183
- FEDORA-2020-864922e78a
- FEDORA-2020-864922e78a
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
- https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
Modified: 2024-11-21
CVE-2020-28366
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
- https://go.dev/cl/269658
- https://go.dev/cl/269658
- https://go.dev/issue/42559
- https://go.dev/issue/42559
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://pkg.go.dev/vuln/GO-2022-0475
- https://pkg.go.dev/vuln/GO-2022-0475
Modified: 2024-11-21
CVE-2020-28367
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
- https://go.dev/cl/267277
- https://go.dev/cl/267277
- https://go.dev/issue/42556
- https://go.dev/issue/42556
- https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
- https://pkg.go.dev/vuln/GO-2022-0476
- https://pkg.go.dev/vuln/GO-2022-0476