[SECURITY] Fedora 21 Update: arm-none-eabi-binutils-cs-2014.05.28-3.fc21

updates at fedoraproject.org updates at fedoraproject.org
Sat Dec 6 10:09:21 UTC 2014


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-14888
2014-11-13 16:58:04
--------------------------------------------------------------------------------

Name        : arm-none-eabi-binutils-cs
Product     : Fedora 21
Version     : 2014.05.28
Release     : 3.fc21
URL         : http://www.codesourcery.com/sgpp/lite/arm
Summary     : GNU Binutils for cross-compilation for arm-none-eabi target
Description :
This is a cross-compilation version of GNU Binutils, which can be used to
assemble and link binaries for the arm-none-eabi platform.

This Binutils package is based on the CodeSourcery
2014.05-28 release, which includes improved ARM target
support compared to the corresponding FSF release.  CodeSourcery
contributes their changes to the FSF, but it takes a while for them to
get merged.  For the ARM target, effectively CodeSourcery is upstream
of FSF.

--------------------------------------------------------------------------------
Update Information:

- fix directory traversal vulnerability (#1162657)
- fix CVE-2014-8501: out-of-bounds write when parsing specially crafted PE executable
- fix CVE-2014-8502: heap overflow in objdump
- fix CVE-2014-8503: stack overflow in objdump when parsing specially crafted ihex file
- fix CVE-2014-8504: stack overflow in the SREC parser
- fix out of bounds memory write
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 13 2014 Michal Hlavinka <mhlavink at redhat.com> - 2014.05.28-3
- fix CVE-2014-8738: out of bounds memory write
* Wed Nov 12 2014 Michal Hlavinka <mhlavink at redhat.com> - 2014.05.28-2
- fix directory traversal vulnerability (#1162657)
- fix CVE-2014-8501: out-of-bounds write when parsing specially crafted PE executable
- fix CVE-2014-8502: heap overflow in objdump
- fix CVE-2014-8503: stack overflow in objdump when parsing specially crafted ihex file
- fix CVE-2014-8504: stack overflow in the SREC parser
* Wed Aug 20 2014 Michal Hlavinka <mhlavink at redhat.com> - 2014.05.28-1
- updated to 2014.05-28
* Fri Aug 15 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2013.11.24-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1162655 - CVE-2014-8737 binutils: directory traversal vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=1162655
  [ 2 ] Bug #1162594 - CVE-2014-8502 binutils: heap overflow in objdump when parsing a crafted ELF/PE binary file (incomplete fix for CVE-2014-8485)
        https://bugzilla.redhat.com/show_bug.cgi?id=1162594
  [ 3 ] Bug #1162621 - CVE-2014-8504 binutils: stack overflow in the SREC parser
        https://bugzilla.redhat.com/show_bug.cgi?id=1162621
  [ 4 ] Bug #1162570 - CVE-2014-8501 binutils: out-of-bounds write when parsing specially crafted PE executable
        https://bugzilla.redhat.com/show_bug.cgi?id=1162570
  [ 5 ] Bug #1162666 - CVE-2014-8738 binutils: out of bounds memory write
        https://bugzilla.redhat.com/show_bug.cgi?id=1162666
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update arm-none-eabi-binutils-cs' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list