drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zahlenüberlauf in binutils
Name: |
Zahlenüberlauf in binutils |
|
ID: |
RHSA-2005:763-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Di, 11. Oktober 2005, 18:18 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704 |
|
Applikationen: |
binutils |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Low: binutils security update Advisory ID: RHSA-2005:763-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-763.html Issue date: 2005-10-11 Updated on: 2005-10-11 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-1704 - ---------------------------------------------------------------------
1. Summary:
An updated binutils package that fixes minor security issues is now available.
This update has been rated as having low security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
Binutils is a collection of utilities used for the creation of executable code. A number of bugs were found in various binutils tools.
Several integer overflow bugs were found in binutils. If a user is tricked into processing a specially crafted executable with utilities such as readelf, size, strings, objdump, or nm, it may allow the execution of arbitrary code as the user running the utility. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1704 to this issue.
All users of binutils should upgrade to this updated package, which contains backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
164666 - CAN-2005-1704 Integer overflow in the Binary File Descriptor (BFD) library
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS: binutils-2.11.90.0.8-12.5.src.rpm f981c9ab886387de6d68ef508e528952 binutils-2.11.90.0.8-12.5.src.rpm
i386: 84f0f3790e0ad8e889777af528e8fe32 binutils-2.11.90.0.8-12.5.i386.rpm
ia64: 29a30b2e10daa96cd73d40c992db3a69 binutils-2.11.90.0.8-12.5.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: binutils-2.11.90.0.8-12.5.src.rpm f981c9ab886387de6d68ef508e528952 binutils-2.11.90.0.8-12.5.src.rpm
ia64: 29a30b2e10daa96cd73d40c992db3a69 binutils-2.11.90.0.8-12.5.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: binutils-2.11.90.0.8-12.5.src.rpm f981c9ab886387de6d68ef508e528952 binutils-2.11.90.0.8-12.5.src.rpm
i386: 84f0f3790e0ad8e889777af528e8fe32 binutils-2.11.90.0.8-12.5.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS: binutils-2.11.90.0.8-12.5.src.rpm f981c9ab886387de6d68ef508e528952 binutils-2.11.90.0.8-12.5.src.rpm
i386: 84f0f3790e0ad8e889777af528e8fe32 binutils-2.11.90.0.8-12.5.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1704
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFDS+QEXlSAg2UNWIIRAnSvAKDAaQwB/WmnMwCEdyaRvgnSd1MWFACgv1O1 v3/pFtSt2R9AGvBGGFNlMhY= =j8bV -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|