Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mingw-binutils
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mingw-binutils
ID: FEDORA-2014-17586
Distribution: Fedora
Plattformen: Fedora 21
Datum: Fr, 2. Januar 2015, 10:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504

Originalnachricht

Name        : mingw-binutils
Product : Fedora 21
Version : 2.25
Release : 1.fc21
URL : http://www.gnu.org/software/binutils/
Summary : Cross-compiled version of binutils for Win32 and Win64
environments
Description :
Cross compiled binutils (utilities like 'strip', 'as',
'ld') which
understand Windows executables and DLLs.

-------------------------------------------------------------------------------
-
Update Information:

Fix various CVE's
-------------------------------------------------------------------------------
-
ChangeLog:

* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> -
2.25-1
- Update to 2.25
* Tue Dec 23 2014 Erik van Pienbroek <epienbro@fedoraproject.org> -
2.24-5
- Fix CVE-2014-8501 (RHBZ #1162578 #1162583)
- Fix CVE-2014-8502 (RHBZ #1162602)
- Fix CVE-2014-8503 (RHBZ #1162612)
- Fix CVE-2014-8504 (RHBZ #1162626)
- Fix CVE-2014-8737 (RHBZ #1162660)
- Fix CVE-2014-8738 (RHBZ #1162673)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1162578 - CVE-2014-8501 mingw-binutils: binutils: out-of-bounds
write when parsing specially crafted PE executable [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162578
[ 2 ] Bug #1162602 - CVE-2014-8502 mingw-binutils: binutils: heap overflow in
objdump [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162602
[ 3 ] Bug #1162612 - CVE-2014-8503 mingw-binutils: binutils: stack overflow
in objdump when parsing specially crafted ihex file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162612
[ 4 ] Bug #1162626 - CVE-2014-8504 mingw-binutils: binutils: stack overflow
in the SREC parser [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162626
[ 5 ] Bug #1162660 - mingw-binutils: binutils: directory traversal
vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162660
[ 6 ] Bug #1162673 - mingw-binutils: binutils: out of bounds memory write
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1162673
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update mingw-binutils' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung