UbuntuUpdates.org

Package "binutils-doc"

Name: binutils-doc

Description:

Documentation for the GNU assembler, linker and binary utilities

Latest version: 2.24-5ubuntu14.2
Release: trusty (14.04)
Level: updates
Repository: main
Head package: binutils

Links


Download "binutils-doc"


Other versions of "binutils-doc" in Trusty

Repository Area Version
base main 2.24-5ubuntu3
security main 2.24-5ubuntu14.2

Changelog

Version: 2.24-5ubuntu14.2 2017-05-08 12:06:43 UTC

  binutils (2.24-5ubuntu14.2) trusty; urgency=medium

  * 002-dont-segv-on-initial-instructions-overflow.patch:
    Fix ld crash on arm64 (LP: #1644363)

 -- Julian Andres Klode <email address hidden> Tue, 25 Apr 2017 17:02:10 +0200

Source diff to previous version
1644363 [trusty/arm64] binutils segfaults on bash gettext configure test

Version: 2.24-5ubuntu14.1 2016-05-17 03:07:03 UTC

  binutils (2.24-5ubuntu14.1) trusty-security; urgency=medium

  * No-change rebuild in the trusty-security pocket to address issues
    building linux kernel and openjdk-7 security updates (LP: #1577553)

Source diff to previous version
1577553 Apply gcc-4.8 updates to trusty-security pocket

Version: 2.24-5ubuntu14 2015-09-23 20:06:43 UTC

  binutils (2.24-5ubuntu14) trusty-proposed; urgency=medium

  * SRU: LP: #1490352.
  * Fix -Bsymbolic-functions on arm64.

 -- Michael Hudson-Doyle Thu, 10 Sep 2015 22:22:45 +1200

Source diff to previous version
1490352 please backport aarch64 -Bsymbolic-functions fix to trusty

Version: 2.24-5ubuntu13 2015-06-18 07:06:51 UTC

  binutils (2.24-5ubuntu13) trusty-proposed; urgency=medium

  * SRU LP: #1311866.
  * Update from the 2.24 branch, 20141113.
    - Fix PR gold/16945, properly handle 64-bit GOT relocations on x86_64.
    - Fix PR gold/16900, an issue where first reserved word of GOT is not
      initialized if there is no PLT.
    - gold: Fix handling of __ehdr_start when it cannot be defined.
    - Apply mainline patches for ppc476 workaround.
    - Add binutils test cases for AArch64.
    - Disassembler fix on AArch64.
    - Fix PR ld/17047, crash in the bfd linker with MALLOC_PERTURB.
    - Fix PR ld/17277, ARM32, bogus DT_TEXTREL marker (and R_ARM_NONE)
      for PC-relative cross-section relocs.
    - [AArch64] Cortex-A53 erratum 835769 linker workaround.
  * Remove the aarch64-fix-instruction-mask, applied on the branch.
  * Fix PR gold/15639, -flto and ld.gold on ARM. LP: #1191909.
  * Use 64k for COMMONPAGESIZE on PPC. LP: #1412553.
  * Fix PR ld/16452, PR ld/16457, don't output symbol version definitions
    for non-DT_NEEDED. LP: #1248642.
  * Add powerpc target for ppc64el builds. Closes: #760395. LP: #1433238.
  * binutils-doc: Include all info files. LP: #1410780.
  * Fix PR ld/16715 (ARM), set st_value to zero for undefined symbols.
    LP: #1441961.
 -- Matthias Klose <email address hidden> Tue, 14 Apr 2015 19:52:45 +0200

Source diff to previous version
1311866 update binutils and GCC for trusty
1191909 gold and -flto always fails with an internal error on arm-linux-gnueabi*
1412553 RELRO not working on Ubuntu 14.04
1248642 dynamic library inconsistencies with OpenGL/C++
1433238 add powerpc target for ppc64el
1410780 Missing info files
1441961 dataChanged signal cannot be used on ARM under certain conditions
760395 binutils: add powerpc target for ppc64el - Debian Bug report logs

Version: 2.24-5ubuntu3.1 2015-02-09 23:06:59 UTC

  binutils (2.24-5ubuntu3.1) trusty-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds read in srec_scan of bfd/srec.c
    - debian/patches/binutils-CVE-2014-8484.patch: report an error for
      S-records with less than the miniumum size
    - debian/patches/series: disable srec_scan_null_deref.diff as it is
      an incomplete fix for this issue and did not go upstream
    - CVE-2014-8484
  * SECURITY UPDATE: incorrect memory handling around corrupt group
    section headers
    - debian/patches/binutils-CVE-2014-8485.patch: Improve handling of
      corrupt group sections
    - CVE-2014-8485
  * SECURITY UPDATE: out-of-bounds write in _bfd_XXi_swap_aouthdr_in
    - debian/patches/binutils-CVE-2014-8501.patch: Handle corrupt
      binaries with an invalid value for NumberOfRvaAndSizes.
    - CVE-2014-8501
  * SECURITY UPDATE: pe_print_edata buffer overflow
    - debian/patches/binutils-CVE-2014-8502.patch: Detect out of
      range and truncated rvas or entry counts
    - CVE-2014-8502
  * SECURITY UPDATE: ihex_scan buffer overflow
    - debian/patches/binutils-CVE-2014-8503.patch: Fix typo in
      invocation of ihex_bad_byte.
    - CVE-2014-8503
  * SECURITY UPDATE: srec_scan buffer overflow
    - debian/patches/binutils-CVE-2014-8504.patch: Increase size of buf
    - CVE-2014-8504
  * SECURITY UPDATE: directory traversal vulnerabilities
    - debian/patches/binutils-CVE-2014-8737.patch: disallow paths that
      include ../
    - CVE-2014-8737
  * SECURITY UPDATE: _bfd_slurp_extended_name_table out-of-bounds write
    - debian/patches/binutils-CVE-2014-8738.patch: Handle archives
      with corrupt extended name tables.
    - CVE-2014-8738
  * SECURITY UPDATE: multiple miscellaneous overflows and out-of-bounds
    reads and writes
    - debian/patches/binutils-bz17512_prereqs.patch: cherrypicked
      prerequisite commits needed to apply following patch
    - debian/patches/binutils-bz17512-misc.patch: fix invalid memory
      accesses.
  * Security hardening: don't use libbfd by default in strings(1)
    - debian/patches/binutils-harden_strings.patch: Add new command
      line option --data to only scan the initialized, loadable data
      sections of binaries, using libbfd; make --all the default.
 -- Steve Beattie <email address hidden> Mon, 09 Feb 2015 02:09:07 -0800

CVE-2014-8484 The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read)
CVE-2014-8485 The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and pos
CVE-2014-8501 The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of
CVE-2014-8502 Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denia
CVE-2014-8503 Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of ser
CVE-2014-8504 Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of ser
CVE-2014-8737 Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full
CVE-2014-8738 The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (i



About   -   Send Feedback to @ubuntu_updates