2023-07-07
ALT-BU-2023-4224-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2023-01-27
BDU:2023-00576
Уязвимость программного средства разработки GNU Binutils, связанная с разыменованием нулевого указателя, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
Severity: MEDIUM (5.5)
Vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
References:
Published: 2022-08-26
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2022-38533
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
References:
- https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
- FEDORA-2022-19538a3732
- FEDORA-2022-19538a3732
- FEDORA-2022-667ee398b1
- FEDORA-2022-667ee398b1
- GLSA-202309-15
- GLSA-202309-15
- https://security.netapp.com/advisory/ntap-20221104-0007/
- https://security.netapp.com/advisory/ntap-20221104-0007/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
- https://sourceware.org/bugzilla/show_bug.cgi?id=29495
- https://sourceware.org/bugzilla/show_bug.cgi?id=29495
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
Published: 2023-01-27
Modified: 2025-03-28
Modified: 2025-03-28
CVE-2022-4285
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768
- GLSA-202309-15
- GLSA-202309-15
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
Closed bugs
Неверный системный вызов при использовании $ pspax