ALT-BU-2020-4172-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-00981
Уязвимость функции _bfd_archive_64_bit_slurp_armap программного средства разработки GNU Binutils, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04872
Уязвимость библиотеки libbfd программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12972
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- 108903
- 108903
- GLSA-202007-39
- GLSA-202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-14250
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
- openSUSE-SU-2019:2364
- openSUSE-SU-2019:2364
- openSUSE-SU-2019:2365
- openSUSE-SU-2019:2365
- openSUSE-SU-2020:0716
- openSUSE-SU-2020:0716
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- 109354
- 109354
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://security.netapp.com/advisory/ntap-20190822-0002/
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-14444
apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-17450
find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-17451
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- openSUSE-SU-2020:1804
- GLSA-202007-39
- GLSA-202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2019-9070
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls.
- 107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://support.f5.com/csp/article/K13534168
- USN-4326-1
- USN-4336-1
- 107147
- USN-4336-1
- USN-4326-1
- https://support.f5.com/csp/article/K13534168
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
Modified: 2024-11-21
CVE-2019-9071
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls.
- 107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://support.f5.com/csp/article/K02884135
- USN-4326-1
- USN-4336-1
- 107147
- USN-4336-1
- USN-4326-1
- https://support.f5.com/csp/article/K02884135
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
Modified: 2024-11-21
CVE-2019-9072
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c.
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://support.f5.com/csp/article/K12541829
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- https://support.f5.com/csp/article/K12541829
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
Modified: 2024-11-21
CVE-2019-9073
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c.
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://support.f5.com/csp/article/K37121474
- USN-4336-1
- GLSA-202107-24
- USN-4336-1
- https://support.f5.com/csp/article/K37121474
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://security.netapp.com/advisory/ntap-20190314-0003/
Modified: 2024-11-21
CVE-2019-9074
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://support.f5.com/csp/article/K09092524
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K09092524
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2019-9075
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://support.f5.com/csp/article/K42059040
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K42059040
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2019-9076
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c.
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://support.f5.com/csp/article/K44650639
- GLSA-202107-24
- https://support.f5.com/csp/article/K44650639
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://security.netapp.com/advisory/ntap-20190314-0003/
Modified: 2024-11-21
CVE-2019-9077
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
- openSUSE-SU-2020:1790
- openSUSE-SU-2020:1804
- 107139
- GLSA-202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://support.f5.com/csp/article/K00056379
- USN-4336-1
- openSUSE-SU-2020:1790
- USN-4336-1
- https://support.f5.com/csp/article/K00056379
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://security.netapp.com/advisory/ntap-20190314-0003/
- GLSA-202107-24
- 107139
- openSUSE-SU-2020:1804
Modified: 2024-11-21
CVE-2020-35493
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35494
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35495
There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35496
There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
Modified: 2024-11-21
CVE-2020-35507
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
Modified: 2024-11-21
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- GLSA-202208-30
- GLSA-202208-30
- https://security.netapp.com/advisory/ntap-20210528-0009/
- https://security.netapp.com/advisory/ntap-20210528-0009/
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
Closed bugs
Требует конкретный шрифт
Closed vulnerabilities
BDU:2021-03552
Уязвимость функции translate из translation_helper.rb программной платформы Ruby on Rails, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-15169
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
- https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5
- https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5
- [debian-lts-announce] 20201009 [SECURITY] [DLA 2403-1] rails security update
- [debian-lts-announce] 20201009 [SECURITY] [DLA 2403-1] rails security update
- FEDORA-2020-4dd34860a3
- FEDORA-2020-4dd34860a3
- DSA-4766
- DSA-4766