ALT-PU-2023-2815-1
Package binutils updated to version 2.36-alt2.E2K.26.012 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-05843
Уязвимость функции read_section() компонента dwarf2.c программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-16590
A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25821
- https://sourceware.org/bugzilla/show_bug.cgi?id=25821
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
Modified: 2024-11-21
CVE-2020-16591
A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://security.netapp.com/advisory/ntap-20210115-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25822
- https://sourceware.org/bugzilla/show_bug.cgi?id=25822
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=001890e1f9269697f7e0212430a51479271bdab2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=001890e1f9269697f7e0212430a51479271bdab2
Modified: 2024-11-21
CVE-2020-16593
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25827
- https://sourceware.org/bugzilla/show_bug.cgi?id=25827
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=aec72fda3b320c36eb99fc1c4cf95b10fc026729
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=aec72fda3b320c36eb99fc1c4cf95b10fc026729
Modified: 2024-11-21
CVE-2020-16599
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://security.netapp.com/advisory/ntap-20210122-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25842
- https://sourceware.org/bugzilla/show_bug.cgi?id=25842
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
Modified: 2024-11-21
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- GLSA-202208-30
- GLSA-202208-30
- https://security.netapp.com/advisory/ntap-20210528-0009/
- https://security.netapp.com/advisory/ntap-20210528-0009/
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
Modified: 2024-11-21
CVE-2021-20294
A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1943533
- https://bugzilla.redhat.com/show_bug.cgi?id=1943533
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-202208-30
- GLSA-202208-30
- https://sourceware.org/bugzilla/show_bug.cgi?id=26929
- https://sourceware.org/bugzilla/show_bug.cgi?id=26929
- https://sourceware.org/git/?p=binutils-gdb.git%3Ba=patch%3Bh=372dd157272e0674d13372655cc60eaca9c06926
- https://sourceware.org/git/?p=binutils-gdb.git%3Ba=patch%3Bh=372dd157272e0674d13372655cc60eaca9c06926
Modified: 2023-11-20
CVE-2021-3487
Rejected reason: Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt