安全公告详情

NS-SA-2021-0122

2021-09-24 00:31:58

简介

important: flatpak/binutils security update

严重级别

important

主题

An update for flatpak/binutils is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

flatpak: This package provides debug information for package flatpak-libs. Debug information is useful when developing applications that use this package or when debugging this package.
binutils: Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line).


Security Fix(es):
flatpak: A flaw was found in Flatpak. The Flatpak portal D-Bus service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is outside the sandbox. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-21261)
flatpak: bugfix
binutils: find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.(CVE-2019-17450)
binutils: An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.(CVE-2019-9074)
binutils: An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.(CVE-2019-9075)
binutils: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.60B5.

影响组件

  • flatpak
  • binutils

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["flatpak-debuginfo-1.6.2-5.el8_3.x86_64.rpm","flatpak-tests-1.6.2-5.el8_3.x86_64.rpm","flatpak-debugsource-1.6.2-5.el8_3.x86_64.rpm","flatpak-devel-1.6.2-5.el8_3.x86_64.rpm","flatpak-session-helper-debuginfo-1.6.2-5.el8_3.x86_64.rpm","flatpak-session-helper-1.6.2-5.el8_3.x86_64.rpm","flatpak-libs-debuginfo-1.6.2-5.el8_3.x86_64.rpm","flatpak-tests-debuginfo-1.6.2-5.el8_3.x86_64.rpm","flatpak-selinux-1.6.2-5.el8_3.noarch.rpm","flatpak-libs-1.6.2-5.el8_3.x86_64.rpm","flatpak-1.6.2-5.el8_3.x86_64.rpm"],"source":"flatpak-1.6.2-5.el8_3.src.rpm"},{"binary":["binutils-2.30-79.el8.cgslv6_2.0.2.gfd6e04f9.x86_64.rpm","binutils-debugsource-2.30-79.el8.cgslv6_2.0.2.gfd6e04f9.x86_64.rpm","binutils-debuginfo-2.30-79.el8.cgslv6_2.0.2.gfd6e04f9.x86_64.rpm","binutils-devel-2.30-79.el8.cgslv6_2.0.2.gfd6e04f9.x86_64.rpm"],"source":"binutils-2.30-79.el8.cgslv6_2.0.2.gfd6e04f9.src.rpm"}]}]}

CVE

参考