You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mingw binutils

Sigurnosni nedostaci programskog paketa mingw binutils

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-28c78a6ac3
2021-01-07 01:13:10.653189
——————————————————————————–

Name : mingw-binutils
Product : Fedora 32
Version : 2.32
Release : 9.fc32
URL : http://www.gnu.org/software/binutils/
Summary : Cross-compiled version of binutils for Win32 and Win64 environments
Description :
Cross compiled binutils (utilities like ‘strip’, ‘as’, ‘ld’) which
understand Windows executables and DLLs.

——————————————————————————–
Update Information:

Backport patches for CVE-2020-35493, CVE-2020-35494, CVE-2020-35495,
CVE-2020-35496.
——————————————————————————–
ChangeLog:

* Tue Dec 29 2020 Sandro Mani <manisandro@gmail.com> – 2.32-9
– Backport patches for CVE-2020-35493, CVE-2020-35494, CVE-2020-35495, CVE-2020-35496
——————————————————————————–
References:

[ 1 ] Bug #1911438 – CVE-2020-35493 mingw-binutils: binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1911438
[ 2 ] Bug #1911440 – CVE-2020-35494 mingw-binutils: binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1911440
[ 3 ] Bug #1911442 – CVE-2020-35495 mingw-binutils: binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1911442
[ 4 ] Bug #1911445 – CVE-2020-35496 mingw-binutils: binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1911445
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-28c78a6ac3’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorDona Šeruga
Cert idNCERT-REF-2021-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak jezgre operacijskog sustava Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja ili otkrivanje osjetljivih informacija....

Close