drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in binutils
Name: |
Mehrere Probleme in binutils |
|
ID: |
DSA-3123-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Fr, 9. Januar 2015, 23:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738 |
|
Applikationen: |
binutils |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3123-1 security@debian.org http://www.debian.org/security/ Luciano Bello January 09, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : binutils CVE ID : CVE-2014-8484 CVE-2014-8485 CVE-2014-8501 CVE-2014-8502 CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738
Multiple security issues have been found in binutils, a toolbox for binary file manipulation. These vulnerabilities include multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions, path traversal attack or denial of service.
For the stable distribution (wheezy), these problems have been fixed in version 2.22-8+deb7u2.
For the unstable distribution (sid), this problem has been fixed in version 2.25-3.
We recommend that you upgrade your binutils packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCAAGBQJUsD+ZAAoJEG7C3vaP/jd0P3AP/3/neZE9Lz1GD15mjMAqGl/n g5idQiLHtj8ASy2ZsLWzgPCzhebsuPtCjACqjv5hyYSCyNQdwaywgz4J92BoJZUB br2kJuENlshXDVdxyBQ6QZgs64OQUV+D1GSBb6SKuxtfzpzb27c33qIUmdyGVFeD mRG/ElRXQMddn4CvlQT/m7vrT1wAgZGqKbQZoejsYyqIyWd9l2FsrUh28PSwsP+O wZTPrP3QdopF715A0TFKFUFxBxPFkBk9WNO90dnRvTu9qfkK7x0uS7rRczJZnCoB YSsD1PwfiwSKt8NKv5ez7hS/srn5b8ExocaN1bvYsHmrwMjLj3FO41YO7p003wdr XffFOXW91dAk2unaZfYo+iKsoW/TzNurr1nLMBZdhCDPBBhf1vv2HhXEyM59JIuo /IWPrK7YwkRSJFj1pugukdNqepCtLaCLF7PLB1EDKo3d42jlrd603Llr8r/YwsLe FJaGkFOlfk0iDRyH0Z6k/hTet9+ozTfb5CiVr8/vyeC6lD/y6gJyI3APFyHFjPG0 GpJuUvYPFtjKAOQSwYP4BztiS/w+L72F/3C7mYP45Dg2W6Kr8kJYUe94WBsJMukD Bp2mrQi/ZYG4Uyl5dgXAK6kWO2eklm59F6NUno0wRZu4CZ442dHqPI8s3oDEN5bD d4QGVu7rFmY+iiWikkpc =twyz -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/1942886.cTmTf0LNQd@box
|
|
|
|