--===============0423224194858406513== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="2nTeH+t2PBomgucg" Content-Disposition: inline
--2nTeH+t2PBomgucg Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2496-1 February 09, 2015
binutils vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
Applications from GNU binutils could be made to crash, run programs, or delete arbitrary files as your login if they opened a specially crafted file.
Software Description: - binutils: GNU assembler, linker and binary utilities
Details:
Michal Zalewski discovered that the setup_group function in libbfd in GNU binutils did not properly check group headers in ELF files. An attacker could use this to craft input that could cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2014-8485)
Hanno Böck discovered that the _bfd_XXi_swap_aouthdr_in function in libbfd in GNU binutils allowed out-of-bounds writes. An attacker could use this to craft input that could cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2014-8501)
Hanno Böck discovered a heap-based buffer overflow in the pe_print_edata function in libbfd in GNU binutils. An attacker could use this to craft input that could cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2014-8502)
Alexander Cherepanov discovered multiple directory traversal vulnerabilities in GNU binutils. An attacker could use this to craft input that could delete arbitrary files. (CVE-2014-8737)
Alexander Cherepanov discovered the _bfd_slurp_extended_name_table function in libbfd in GNU binutils allowed invalid writes when handling extended name tables in an archive. An attacker could use this to craft input that could cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2014-8738)
Hanno Böck discovered a stack-based buffer overflow in the ihex_scan function in libbfd in GNU binutils. An attacker could use this to craft input that could cause a denial of service (application crash). (CVE-2014-8503)
Michal Zalewski discovered a stack-based buffer overflow in the srec_scan function in libbfd in GNU binutils. An attacker could use this to to craft input that could cause a denial of service (application crash); the GNU C library's Fortify Source printf protection should prevent the possibility of executing arbitrary code. (CVE-2014-8504)
Michal Zalewski discovered that the srec_scan function in libbfd in GNU binutils allowed out-of-bounds reads. An attacker could use this to craft input to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS. (CVE-2014-8484)
Sang Kil Cha discovered multiple integer overflows in the _objalloc_alloc function and objalloc_alloc macro in binutils. This could allow an attacker to cause a denial of service (application crash). This issue only affected Ubuntu 12.04 LTS and Ubuntu 10.04 LTS. (CVE-2012-3509)
Alexander Cherepanov and Hanno Böck discovered multiple additional out-of-bounds reads and writes in GNU binutils. An attacker could use these to craft input that could cause a denial of service (application crash) or possibly execute arbitrary code. A few of these issues may be limited in exposure to a denial of service (application abort) by the GNU C library's Fortify Source printf protection.
The strings(1) utility in GNU binutils used libbfd by default when examining executable object files; unfortunately, libbfd was not originally developed with the expectation of hostile input. As a defensive measure, the behavior of strings has been changed to default to 'strings --all' behavior, which does not use libbfd; use the new argument to strings, '--data', to recreate the old behavior.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: binutils 2.24.90.20141014-0ubuntu3.1 binutils-multiarch 2.24.90.20141014-0ubuntu3.1
Ubuntu 14.04 LTS: binutils 2.24-5ubuntu3.1 binutils-multiarch 2.24-5ubuntu3.1
Ubuntu 12.04 LTS: binutils 2.22-6ubuntu1.2 binutils-multiarch 2.22-6ubuntu1.2
Ubuntu 10.04 LTS: binutils 2.20.1-3ubuntu7.2 binutils-multiarch 2.20.1-3ubuntu7.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2496-1 CVE-2012-3509, CVE-2014-8484, CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504, CVE-2014-8737, CVE-2014-8738
Package Information: https://launchpad.net/ubuntu/+source/binutils/2.24.90.20141014-0ubuntu3.1 https://launchpad.net/ubuntu/+source/binutils/2.24-5ubuntu3.1 https://launchpad.net/ubuntu/+source/binutils/2.22-6ubuntu1.2 https://launchpad.net/ubuntu/+source/binutils/2.20.1-3ubuntu7.2
--2nTeH+t2PBomgucg Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJU2SrwAAoJEC8Jno0AXoH0uGYQAJNCQ/Yl+oaT3YF1dBa+dmEV IkDIcm/7B9InPMiLK1OVUtNJ5YKr1qepqBYsb+ESn0jAl1+6foxhvg2Kj3jkU2Er CHmblaAruTnsjyHVTeWdtRer51vu72LtoVg6GcMap6AJDmGKN+4E/dAj5RnDBQvl IGWaOxShYDF4qSXxuCMawDoeUDJQ2w8G97NwE8W2oUU/9Qen72msIicrHFk8iM2B GE5ocyBh6ma/fphYPWdlE53UWIHevymaV4sBOa6FXH6Ioy5Fl+THygMDzQKHjiUB JMi9NOMnltu0+6wZK79yekAu0q/3gWk4BTR3dyX+Nv9YxyC6pZi1VbhlBUx/fYYi gUba6B0wuw22J4Z0fLoWA+6/AP+6Zr4iCNN1fALZ+EOuPNomSSt8de2oGplmZzfI L4utDMiiSVLxC47U/jYTyEt5/MIws4WfSeCNhaTI3fwwsWF2fa+S98tawJ1OS5D5 TJYHJQ23FQBmWp/vvBlocDjpN6F2EullfKgc6Yv3IbCNVQYe44f94Die2yNiuGZP 1WVgzZ7iJgGhPwO+saiwQaioGtZbV6GWQVIwRqYXv+gy+GyAFp9AVGUTyS9i2S+S b69gm4QOXzLyU4j9gvncMiw5um/5QzxsbkOZ9wwNPoPH0nXQgYy1jEKSHtOVt+fG 1Q1v2IdWn38SnKdyoIby =8fPl -----END PGP SIGNATURE-----
--2nTeH+t2PBomgucg--
--===============0423224194858406513== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0423224194858406513==--
|