ALT-BU-2023-4457-1
Branch sisyphus_riscv64 update bulletin.
Package binutils updated to version 2.40-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-00576
Уязвимость программного средства разработки GNU Binutils, связанная с разыменованием нулевого указателя, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
Modified: 2024-11-21
CVE-2022-38533
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
- https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
- FEDORA-2022-19538a3732
- FEDORA-2022-19538a3732
- FEDORA-2022-667ee398b1
- FEDORA-2022-667ee398b1
- GLSA-202309-15
- GLSA-202309-15
- https://security.netapp.com/advisory/ntap-20221104-0007/
- https://security.netapp.com/advisory/ntap-20221104-0007/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
- https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
- https://sourceware.org/bugzilla/show_bug.cgi?id=29495
- https://sourceware.org/bugzilla/show_bug.cgi?id=29495
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
Modified: 2025-03-28
CVE-2022-4285
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768
- GLSA-202309-15
- GLSA-202309-15
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
Package systemd updated to version 253.5-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-4415
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://security.netapp.com/advisory/ntap-20230216-0010/
- https://www.openwall.com/lists/oss-security/2022/12/21/3
- https://www.openwall.com/lists/oss-security/2022/12/21/3
Modified: 2024-11-21
CVE-2022-45873
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- FEDORA-2022-ef4f57b072
- FEDORA-2022-ef4f57b072
Package tzdata updated to version 2023c-alt2 for branch sisyphus_riscv64.
Closed bugs
/usr/share/zoneinfo/tzdata.zi