You are here
Home > Preporuke > Ranjivosti programskog paketa mingw-binutils

Ranjivosti programskog paketa mingw-binutils

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-17603
2014-12-25 04:36:21
——————————————————————————–

Name : mingw-binutils
Product : Fedora 20
Version : 2.24
Release : 5.fc20
URL : http://www.gnu.org/software/binutils/
Summary : Cross-compiled version of binutils for Win32 and Win64 environments
Description :
Cross compiled binutils (utilities like ‘strip’, ‘as’, ‘ld’) which
understand Windows executables and DLLs.

——————————————————————————–
Update Information:

Fix various CVE’s
——————————————————————————–
ChangeLog:

* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> – 2.24-5
– Fix CVE-2014-8501 (RHBZ #1162578 #1162583)
– Fix CVE-2014-8502 (RHBZ #1162602)
– Fix CVE-2014-8503 (RHBZ #1162612)
– Fix CVE-2014-8504 (RHBZ #1162626)
– Fix CVE-2014-8737 (RHBZ #1162660)
– Fix CVE-2014-8738 (RHBZ #1162673)
* Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.24-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.24-3
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Fri May 30 2014 Erik van Pienbroek <epienbro@fedoraproject.org> – 2.24-2
– Fix FTBFS against gcc 4.9
* Sat Jan 11 2014 Erik van Pienbroek <epienbro@fedoraproject.org> – 2.24-1
– Update to 2.24
——————————————————————————–
References:

[ 1 ] Bug #1162578 – CVE-2014-8501 mingw-binutils: binutils: out-of-bounds write when parsing specially crafted PE executable [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162578
[ 2 ] Bug #1162602 – CVE-2014-8502 mingw-binutils: binutils: heap overflow in objdump [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162602
[ 3 ] Bug #1162612 – CVE-2014-8503 mingw-binutils: binutils: stack overflow in objdump when parsing specially crafted ihex file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162612
[ 4 ] Bug #1162626 – CVE-2014-8504 mingw-binutils: binutils: stack overflow in the SREC parser [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162626
[ 5 ] Bug #1162660 – mingw-binutils: binutils: directory traversal vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162660
[ 6 ] Bug #1162673 – mingw-binutils: binutils: out of bounds memory write [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162673
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-binutils’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-17586
2014-12-25 04:35:41
——————————————————————————–

Name : mingw-binutils
Product : Fedora 21
Version : 2.25
Release : 1.fc21
URL : http://www.gnu.org/software/binutils/
Summary : Cross-compiled version of binutils for Win32 and Win64 environments
Description :
Cross compiled binutils (utilities like ‘strip’, ‘as’, ‘ld’) which
understand Windows executables and DLLs.

——————————————————————————–
Update Information:

Fix various CVE’s
——————————————————————————–
ChangeLog:

* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> – 2.25-1
– Update to 2.25
* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> – 2.24-5
– Fix CVE-2014-8501 (RHBZ #1162578 #1162583)
– Fix CVE-2014-8502 (RHBZ #1162602)
– Fix CVE-2014-8503 (RHBZ #1162612)
– Fix CVE-2014-8504 (RHBZ #1162626)
– Fix CVE-2014-8737 (RHBZ #1162660)
– Fix CVE-2014-8738 (RHBZ #1162673)
——————————————————————————–
References:

[ 1 ] Bug #1162578 – CVE-2014-8501 mingw-binutils: binutils: out-of-bounds write when parsing specially crafted PE executable [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162578
[ 2 ] Bug #1162602 – CVE-2014-8502 mingw-binutils: binutils: heap overflow in objdump [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162602
[ 3 ] Bug #1162612 – CVE-2014-8503 mingw-binutils: binutils: stack overflow in objdump when parsing specially crafted ihex file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162612
[ 4 ] Bug #1162626 – CVE-2014-8504 mingw-binutils: binutils: stack overflow in the SREC parser [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162626
[ 5 ] Bug #1162660 – mingw-binutils: binutils: directory traversal vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162660
[ 6 ] Bug #1162673 – mingw-binutils: binutils: out of bounds memory write [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162673
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-binutils’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
7e

AutorTomislav Protega
Cert idNCERT-REF-2015-01-0011-ADV
CveCVE-2014-8501 CVE-2014-8502 CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738
ID izvornikaFEDORA-2014-17603 FEDORA-2014-17586
Proizvodmingw-binutils
Izvorhttp://www.redhat.com
Top
More in Preporuke
Ranjivosti programskog paketa mingw-dbus

Otkriveno je više ranjivosti u programskom paketu mingw-dbus za Fedoru. Ranjivosti zahvaćaju dbus-daemon, a mogle su biti iskorištene za uskraćivanje...

Close