Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in GNU binutils
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in GNU binutils
ID: USN-6413-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 14.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Datum: Do, 5. Oktober 2023, 07:50
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011
https://ubuntu.com/security/notices/USN-6413-1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008
Applikationen: binutils

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0768995898535157523==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------WBqFFqBKMz1534u3Ut1efI0W"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------WBqFFqBKMz1534u3Ut1efI0W
Content-Type: multipart/mixed;
boundary="------------W040Z00w8Z7tMqvV9gLvlFV6";
protected-headers="v1"
From: Camila Camargo de Matos <camila.camargodematos@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <d031fea7-1aa3-bad9-2be8-058fd44754de@canonical.com>
Subject: [USN-6413-1] GNU binutils vulnerabilities
References: <20231004171101.2651F40E80@people.canonical.com>
In-Reply-To: <20231004171101.2651F40E80@people.canonical.com>

--------------W040Z00w8Z7tMqvV9gLvlFV6
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6413-1
October 04, 2023

binutils vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in GNU binutils.

Software Description:
- binutils: GNU assembler, linker and binary utilities

Details:

It was discovered that GNU binutils was not properly performing checks
when dealing with memory allocation operations, which could lead to
excessive memory consumption. An attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 14.04 LTS.
(CVE-2017-17122, CVE-2017-8421)

It was discovered that GNU binutils was not properly performing bounds
checks when processing debug sections with objdump, which could lead to
an overflow. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu
14.04 LTS. (CVE-2018-20671, CVE-2018-6543)

It was discovered that GNU binutils contained a reachable assertion, which
could lead to an intentional assertion failure when processing certain
crafted DWARF files. An attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2022-35205)

It was discovered that GNU binutils incorrectly handled memory management
operations in several of its functions, which could lead to excessive
memory consumption due to memory leaks. An attacker could possibly use
these issues to cause a denial of service.
(CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)

It was discovered that GNU binutils was not properly performing bounds
checks when dealing with memory allocation operations, which could lead
to excessive memory consumption. An attacker could possibly use this issue
to cause a denial of service. (CVE-2022-48063)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
binutils 2.30-21ubuntu1~18.04.9+esm3
binutils-multiarch 2.30-21ubuntu1~18.04.9+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
binutils 2.26.1-1ubuntu1~16.04.8+esm9
binutils-multiarch 2.26.1-1ubuntu1~16.04.8+esm9

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
binutils 2.24-5ubuntu14.2+esm5
binutils-multiarch 2.24-5ubuntu14.2+esm5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6413-1
CVE-2017-17122, CVE-2017-8421, CVE-2018-20671, CVE-2018-6543,
CVE-2022-35205, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010,
CVE-2022-47011, CVE-2022-48063

--------------W040Z00w8Z7tMqvV9gLvlFV6--

--------------WBqFFqBKMz1534u3Ut1efI0W
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEGq96SdAIJY1vInRLbzAtCH6LqTYFAmUdoIgFAwAAAAAACgkQbzAtCH6LqTar
OAf+KxK3rGcRkUH3Mh5tG7To3HT1Opq3/wgQcPhd5aQfmAT48BHjsmzpGgi+dUo9U5rcs2b1bMNN
/fQim+YE1ffMwoI6/bOlICUeqlqVuoZUA21DQs7k+S3do7IlDduEZYCj1G7/7t1tD8AvePLCDvUQ
hSQZp8hj8CKd/buAHRg3Q9+L4lQceUa9L+1CpH919nMY/gtRqY7+osgITXSBlLS9tTSxquhXfJQR
eXQNYjyGG5DKzTRmW2+/7ZNLP2OJ3fVj516GgkBUdJ5s0kHDX8EIdYwk5ukxTXBB2K37qXI9rk1G
CslXm8nz0DheZPxXgCXdq8EO4URpx0U5PrM+vHur7g==
=H5o4
-----END PGP SIGNATURE-----

--------------WBqFFqBKMz1534u3Ut1efI0W--


--===============0768995898535157523==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============0768995898535157523==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung