Количество 31
Количество 31
RLSA-2021:4364
Moderate: binutils security update
ELSA-2021-4364
ELSA-2021-4364: binutils security update (MODERATE)
openSUSE-SU-2021:3616-1
Security update for binutils
SUSE-SU-2021:3616-1
Security update for binutils
openSUSE-SU-2021:1475-1
Security update for binutils
SUSE-SU-2022:0934-1
Security update for binutils
SUSE-SU-2021:3593-1
Security update for binutils
CVE-2020-35448
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
CVE-2020-35448
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
CVE-2020-35448
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
CVE-2020-35448
An issue was discovered in the Binary File Descriptor (BFD) library (a ...
GHSA-r2cj-jqqc-j833
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
BDU:2023-05790
Уязвимость библиотеки libbfd программного средства разработки GNU Binutils, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
CVE-2021-20197
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
CVE-2021-20197
CVE-2021-20197
There is an open race window when writing output in the following util ...
GHSA-rq67-5wpf-96wv
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
BDU:2023-05789
Уязвимость программного средства разработки GNU Binutils, связанная с некорректным определением ссылки перед доступом к файлу, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2021:4364 Moderate: binutils security update | около 4 лет назад | |||
ELSA-2021-4364 ELSA-2021-4364: binutils security update (MODERATE) | около 4 лет назад | |||
openSUSE-SU-2021:3616-1 Security update for binutils | около 4 лет назад | |||
SUSE-SU-2021:3616-1 Security update for binutils | около 4 лет назад | |||
openSUSE-SU-2021:1475-1 Security update for binutils | около 4 лет назад | |||
SUSE-SU-2022:0934-1 Security update for binutils | больше 3 лет назад | |||
SUSE-SU-2021:3593-1 Security update for binutils | около 4 лет назад | |||
CVE-2020-35448 An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c. | CVSS3: 3.3 | 0% Низкий | почти 5 лет назад | |
CVE-2020-35448 An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c. | CVSS3: 3.3 | 0% Низкий | больше 5 лет назад | |
CVE-2020-35448 An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c. | CVSS3: 3.3 | 0% Низкий | почти 5 лет назад | |
CVE-2020-35448 An issue was discovered in the Binary File Descriptor (BFD) library (a ... | CVSS3: 3.3 | 0% Низкий | почти 5 лет назад | |
GHSA-r2cj-jqqc-j833 An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c. | CVSS3: 3.3 | 0% Низкий | больше 3 лет назад | |
BDU:2023-05790 Уязвимость библиотеки libbfd программного средства разработки GNU Binutils, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 3.3 | 0% Низкий | почти 5 лет назад | |
CVE-2021-20197 There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. | CVSS3: 6.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-20197 There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. | CVSS3: 4.2 | 0% Низкий | почти 5 лет назад | |
CVE-2021-20197 There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. | CVSS3: 6.3 | 0% Низкий | больше 4 лет назад | |
CVSS3: 6.3 | 0% Низкий | больше 4 лет назад | ||
CVE-2021-20197 There is an open race window when writing output in the following util ... | CVSS3: 6.3 | 0% Низкий | больше 4 лет назад | |
GHSA-rq67-5wpf-96wv There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. | CVSS3: 6.3 | 0% Низкий | больше 3 лет назад | |
BDU:2023-05789 Уязвимость программного средства разработки GNU Binutils, связанная с некорректным определением ссылки перед доступом к файлу, позволяющая нарушителю повысить свои привилегии | CVSS3: 6.3 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу