ALT-PU-2020-3352-1
Package avr-binutils updated to version 2.35-alt1_1 for branch sisyphus in task 262070.
Closed vulnerabilities
BDU:2019-00981
Уязвимость функции _bfd_archive_64_bit_slurp_armap программного средства разработки GNU Binutils, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04872
Уязвимость библиотеки libbfd программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12972
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/108903
- https://security.gentoo.org/glsa/202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/108903
- https://security.gentoo.org/glsa/202007-39
- https://sourceware.org/bugzilla/show_bug.cgi?id=24689
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-14250
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/109354
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/109354
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
- https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-14444
apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20190822-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24829
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-17450
find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25078
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-17451
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202007-39
- https://security.netapp.com/advisory/ntap-20191024-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25070
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9070
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls.
- http://www.securityfocus.com/bid/107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://support.f5.com/csp/article/K13534168
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
- http://www.securityfocus.com/bid/107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24229
- https://support.f5.com/csp/article/K13534168
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9071
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls.
- http://www.securityfocus.com/bid/107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://support.f5.com/csp/article/K02884135
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
- http://www.securityfocus.com/bid/107147
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24227
- https://support.f5.com/csp/article/K02884135
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9072
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c.
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://support.f5.com/csp/article/K12541829
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24232
- https://sourceware.org/bugzilla/show_bug.cgi?id=24237
- https://support.f5.com/csp/article/K12541829
Modified: 2024-11-21
CVE-2019-9073
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c.
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://support.f5.com/csp/article/K37121474
- https://usn.ubuntu.com/4336-1/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24233
- https://support.f5.com/csp/article/K37121474
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9074
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://support.f5.com/csp/article/K09092524
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24235
- https://support.f5.com/csp/article/K09092524
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9075
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://support.f5.com/csp/article/K42059040
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24236
- https://support.f5.com/csp/article/K42059040
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2019-9076
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c.
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://support.f5.com/csp/article/K44650639
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24238
- https://support.f5.com/csp/article/K44650639
Modified: 2024-11-21
CVE-2019-9077
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/107139
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://support.f5.com/csp/article/K00056379
- https://usn.ubuntu.com/4336-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
- http://www.securityfocus.com/bid/107139
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20190314-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=24243
- https://support.f5.com/csp/article/K00056379
- https://usn.ubuntu.com/4336-1/
Modified: 2024-11-21
CVE-2020-35493
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
- https://bugzilla.redhat.com/show_bug.cgi?id=1911437
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911437
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
Modified: 2024-11-21
CVE-2020-35494
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
- https://bugzilla.redhat.com/show_bug.cgi?id=1911439
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911439
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
Modified: 2024-11-21
CVE-2020-35495
There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
- https://bugzilla.redhat.com/show_bug.cgi?id=1911441
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911441
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
Modified: 2024-11-21
CVE-2020-35496
There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
- https://bugzilla.redhat.com/show_bug.cgi?id=1911444
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911444
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
Modified: 2024-11-21
CVE-2020-35507
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1911691
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911691
- https://security.gentoo.org/glsa/202107-24
- https://security.netapp.com/advisory/ntap-20210212-0007/