安全公告详情

NS-SA-2021-0096

2021-09-24 00:10:31

简介

important: flatpak/binutils security update

严重级别

important

主题

An update for flatpak/binutils is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

flatpak: flatpak is a system for building, distributing and running sandboxed desktop applications on Linux. See https://wiki.gnome.org/Projects/SandboxedApps for more information.
binutils: Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line).


Security Fix(es):
flatpak: A flaw was found in Flatpak. The Flatpak portal D-Bus service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is outside the sandbox. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-21261)
flatpak: bugfix
binutils: The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.(CVE-2017-12448)
binutils: remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.(CVE-2018-12934)
binutils: An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in work_stuff_copy_to_from when called from iterate_demangle_function.(CVE-2018-17794)
binutils: The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.(CVE-2018-18483)
binutils: A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.(CVE-2018-18605)
binutils: An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.(CVE-2018-19931)
binutils: apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.(CVE-2019-14444)
binutils: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F31B4.

影响组件

  • flatpak
  • binutils

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["flatpak-1.0.9-10.el7_9.x86_64.rpm","flatpak-libs-1.0.9-10.el7_9.x86_64.rpm","flatpak-debuginfo-1.0.9-10.el7_9.x86_64.rpm","flatpak-builder-1.0.0-10.el7_9.x86_64.rpm","flatpak-devel-1.0.9-10.el7_9.x86_64.rpm"],"source":"flatpak-1.0.9-10.el7_9.src.rpm"},{"binary":["binutils-debuginfo-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm","binutils-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm","binutils-devel-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm"],"source":"binutils-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["flatpak-1.0.9-10.el7_9.x86_64.rpm","flatpak-libs-1.0.9-10.el7_9.x86_64.rpm","flatpak-debuginfo-1.0.9-10.el7_9.x86_64.rpm","flatpak-builder-1.0.0-10.el7_9.x86_64.rpm","flatpak-devel-1.0.9-10.el7_9.x86_64.rpm"],"source":"flatpak-1.0.9-10.el7_9.src.rpm"},{"binary":["binutils-debuginfo-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm","binutils-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm","binutils-devel-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.x86_64.rpm"],"source":"binutils-2.27-41.base.el7.cgslv5_4.0.2.g67a582a.src.rpm"}]}]}

CVE

参考