ALT-PU-2019-1367-1
Package arm-none-eabi-binutils updated to version 2.32-alt1 for branch sisyphus in task 221175.
Closed vulnerabilities
BDU:2019-00568
Уязвимость функции display_debug_ranges программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00569
Уязвимость функции coff_pointerize_aux программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00572
Уязвимость функции load_specific_debug_section программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00574
Уязвимость функции bfd_get_debug_link_info_1 программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00575
Уязвимость функции elf_parse_notes программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00576
Уязвимость функции parse_die программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00577
Уязвимость функции parse_die программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00578
Уязвимость функции assign_file_positions_for_non_load_sections программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00579
Уязвимость функции swap_std_reloc_in программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00668
Уязвимость функций _bfd_XX_bfd_copy_private_bfd_data_common программного средства разработки GNU Binutils, связанная с неограниченным циклом обработки каталога данных, позволяющая нарушителю вызвать запись за пределами буфера
BDU:2019-00671
Уязвимость программного средства разработки GNU Binutils, связанная с неограниченным рекурсивным выполнением группы функций, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00672
Уязвимость функции ignore_section_sym программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00673
Уязвимость в файле cplus-dem.c программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00676
Уязвимость функции bfd_elf32_swap_phdr_in программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01241
Уязвимость функции load_specific_debug_section в GNU Binutils, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01389
Уязвимость функции finish_stab файла stabs.c набора средств разработки программ Binutils, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-01657
Уязвимость функции disassemble_data() компонента objdump.c программного средства разработки GNU Binutils, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1000876
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- 106304
- 106304
- RHSA-2019:2075
- RHSA-2019:2075
- https://sourceware.org/bugzilla/show_bug.cgi?id=23994
- https://sourceware.org/bugzilla/show_bug.cgi?id=23994
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-10372
process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
Modified: 2024-11-21
CVE-2018-10373
concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
Modified: 2024-11-21
CVE-2018-10534
The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.
Modified: 2024-11-21
CVE-2018-10535
The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
Modified: 2024-11-21
CVE-2018-12641
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.
- RHSA-2019:2075
- RHSA-2019:2075
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763099
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763099
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85452
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85452
- GLSA-201908-01
- GLSA-201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23058
- https://sourceware.org/bugzilla/show_bug.cgi?id=23058
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-12697
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
- 104538
- 104538
- RHSA-2019:2075
- RHSA-2019:2075
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- GLSA-201908-01
- GLSA-201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-12698
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
- 104539
- 104539
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- GLSA-201908-01
- GLSA-201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-12699
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
- 104540
- 104540
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
- GLSA-201908-01
- GLSA-201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-12934
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
- https://sourceware.org/bugzilla/show_bug.cgi?id=23059
- https://sourceware.org/bugzilla/show_bug.cgi?id=23059
- USN-4326-1
- USN-4326-1
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-13033
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm.
Modified: 2024-11-21
CVE-2018-19931
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- 106144
- 106144
- GLSA-201908-01
- GLSA-201908-01
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://sourceware.org/bugzilla/show_bug.cgi?id=23942
- https://sourceware.org/bugzilla/show_bug.cgi?id=23942
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-19932
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- 106144
- 106144
- GLSA-201908-01
- GLSA-201908-01
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://security.netapp.com/advisory/ntap-20190221-0004/
- https://sourceware.org/bugzilla/show_bug.cgi?id=23932
- https://sourceware.org/bugzilla/show_bug.cgi?id=23932
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=beab453223769279cc1cef68a1622ab8978641f7
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=beab453223769279cc1cef68a1622ab8978641f7
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-20671
load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- 106457
- 106457
- https://sourceware.org/bugzilla/show_bug.cgi?id=24005
- https://sourceware.org/bugzilla/show_bug.cgi?id=24005
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-6543
In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2018-6759
The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
Modified: 2024-11-21
CVE-2018-6872
The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- 103103
- 103103
- GLSA-201811-17
- GLSA-201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22788
- https://sourceware.org/bugzilla/show_bug.cgi?id=22788
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
Modified: 2024-11-21
CVE-2018-7208
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
Modified: 2024-11-21
CVE-2018-7568
The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
Modified: 2024-11-21
CVE-2018-7569
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
Modified: 2024-11-21
CVE-2018-7570
The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- GLSA-201811-17
- GLSA-201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22881
- https://sourceware.org/bugzilla/show_bug.cgi?id=22881
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=01f7e10cf2dcf403462b2feed06c43135651556d
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=01f7e10cf2dcf403462b2feed06c43135651556d
Modified: 2024-11-21
CVE-2018-7642
The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2018:3032
- RHSA-2018:3032
- GLSA-201811-17
- GLSA-201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22887
- https://sourceware.org/bugzilla/show_bug.cgi?id=22887
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=116acb2c268c89c89186673a7c92620d21825b25
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=116acb2c268c89c89186673a7c92620d21825b25
Modified: 2024-11-21
CVE-2018-7643
The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
Modified: 2024-11-21
CVE-2018-8945
The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2415
- openSUSE-SU-2019:2432
- openSUSE-SU-2019:2432
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2018:3032
- RHSA-2018:3032
- GLSA-201811-17
- GLSA-201811-17
- https://sourceware.org/bugzilla/show_bug.cgi?id=22809
- https://sourceware.org/bugzilla/show_bug.cgi?id=22809
- USN-4336-1
- USN-4336-1
Modified: 2024-11-21
CVE-2018-9138
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.
Modified: 2024-11-21
CVE-2018-9996
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.
Modified: 2024-11-21
CVE-2019-1010204
GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.
- https://security.netapp.com/advisory/ntap-20190822-0001/
- https://security.netapp.com/advisory/ntap-20190822-0001/
- https://sourceware.org/bugzilla/show_bug.cgi?id=23765
- https://sourceware.org/bugzilla/show_bug.cgi?id=23765
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&%3Butm_medium=RSS
Modified: 2024-11-21
CVE-2021-37322
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.