
CVE-2019-1010204 – binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
https://notcve.org/view.php?id=CVE-2019-1010204
23 Jul 2019 — GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened. GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) está afectado por: Validación incorrecta de entrada, comparación firmada / sin firmar, lectura fuera de lí... • https://security.netapp.com/advisory/ntap-20190822-0001 • CWE-125: Out-of-bounds Read CWE-681: Incorrect Conversion between Numeric Types •

CVE-2019-13636 – patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files
https://notcve.org/view.php?id=CVE-2019-13636
17 Jul 2019 — In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. En GNU parche hasta 2.7.6, el seguimiento de los enlaces simbólicos es manejado inapropiadamente en determinados casos diferentes a los archivos de entrada. Esto afecta a los archivos inp.c y util.c. USN-4071-1 fixed several vulnerabilities in Patch. • https://packetstorm.news/files/id/154124 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-1010025
https://notcve.org/view.php?id=CVE-2019-1010025
15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability. ** EN DISPUTA **La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. El impacto es: el atacante puede adivinar las direcciones heap del subproceso (hilo) pthread_created. • https://security-tracker.debian.org/tracker/CVE-2019-1010025 • CWE-330: Use of Insufficiently Random Values •

CVE-2019-1010023
https://notcve.org/view.php?id=CVE-2019-1010023
15 Jul 2019 — GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La corriente de GNU Libc está afectada por: Re-asignación de la biblioteca cargada actual con un archivo ELF mali... • http://www.securityfocus.com/bid/109167 •

CVE-2019-1010024
https://notcve.org/view.php?id=CVE-2019-1010024
15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. El impacto es que: el atacante puede omitir la funcionalidad ASLR utilizando la caché del subproceso (hilo) stack y heap. • http://www.securityfocus.com/bid/109162 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2019-1010022
https://notcve.org/view.php?id=CVE-2019-1010022
15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. • https://security-tracker.debian.org/tracker/CVE-2019-1010022 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2019-12972 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2019-12972
26 Jun 2019 — An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character. Fue encontrado un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.32. Se ha descubierto un problema en las versiones 0.7 y 0.... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html • CWE-125: Out-of-bounds Read •

CVE-2012-6711 – Ubuntu Security Notice USN-4180-1
https://notcve.org/view.php?id=CVE-2012-6711
18 Jun 2019 — A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv(). Existe un desbordamiento de búfer basado en el h... • http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-12886
https://notcve.org/view.php?id=CVE-2018-12886
22 May 2019 — stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. stack_protec... • https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2019-11640 – Ubuntu Security Notice USN-7137-1
https://notcve.org/view.php?id=CVE-2019-11640
01 May 2019 — An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a. Se descubrió un problema en GNU recutils versión 1.8. Hay un desbordamiento de búfer basado en memoria dinámica (heap) en la función rec_fex_parse_str_simple en rec-fex.c en librec.a. It was discovered that recutils incorrectly handled memory when parsing comments with the recparser utility. • https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils • CWE-787: Out-of-bounds Write •