Package "binutils-multiarch"
Name: |
binutils-multiarch
|
Description: |
Binary utilities that support multi-arch targets
|
Latest version: |
2.24-5ubuntu14.2 |
Release: |
trusty (14.04) |
Level: |
updates |
Repository: |
main |
Head package: |
binutils |
Links
Download "binutils-multiarch"
Other versions of "binutils-multiarch" in Trusty
Changelog
binutils (2.24-5ubuntu14.2) trusty; urgency=medium
* 002-dont-segv-on-initial-instructions-overflow.patch:
Fix ld crash on arm64 (LP: #1644363)
-- Julian Andres Klode <email address hidden> Tue, 25 Apr 2017 17:02:10 +0200
|
Source diff to previous version |
1644363 |
[trusty/arm64] binutils segfaults on bash gettext configure test |
|
binutils (2.24-5ubuntu14.1) trusty-security; urgency=medium
* No-change rebuild in the trusty-security pocket to address issues
building linux kernel and openjdk-7 security updates (LP: #1577553)
|
Source diff to previous version |
1577553 |
Apply gcc-4.8 updates to trusty-security pocket |
|
binutils (2.24-5ubuntu14) trusty-proposed; urgency=medium
* SRU: LP: #1490352.
* Fix -Bsymbolic-functions on arm64.
-- Michael Hudson-Doyle Thu, 10 Sep 2015 22:22:45 +1200
|
Source diff to previous version |
1490352 |
please backport aarch64 -Bsymbolic-functions fix to trusty |
|
binutils (2.24-5ubuntu13) trusty-proposed; urgency=medium
* SRU LP: #1311866.
* Update from the 2.24 branch, 20141113.
- Fix PR gold/16945, properly handle 64-bit GOT relocations on x86_64.
- Fix PR gold/16900, an issue where first reserved word of GOT is not
initialized if there is no PLT.
- gold: Fix handling of __ehdr_start when it cannot be defined.
- Apply mainline patches for ppc476 workaround.
- Add binutils test cases for AArch64.
- Disassembler fix on AArch64.
- Fix PR ld/17047, crash in the bfd linker with MALLOC_PERTURB.
- Fix PR ld/17277, ARM32, bogus DT_TEXTREL marker (and R_ARM_NONE)
for PC-relative cross-section relocs.
- [AArch64] Cortex-A53 erratum 835769 linker workaround.
* Remove the aarch64-fix-instruction-mask, applied on the branch.
* Fix PR gold/15639, -flto and ld.gold on ARM. LP: #1191909.
* Use 64k for COMMONPAGESIZE on PPC. LP: #1412553.
* Fix PR ld/16452, PR ld/16457, don't output symbol version definitions
for non-DT_NEEDED. LP: #1248642.
* Add powerpc target for ppc64el builds. Closes: #760395. LP: #1433238.
* binutils-doc: Include all info files. LP: #1410780.
* Fix PR ld/16715 (ARM), set st_value to zero for undefined symbols.
LP: #1441961.
-- Matthias Klose <email address hidden> Tue, 14 Apr 2015 19:52:45 +0200
|
Source diff to previous version |
1311866 |
update binutils and GCC for trusty |
1191909 |
gold and -flto always fails with an internal error on arm-linux-gnueabi* |
1412553 |
RELRO not working on Ubuntu 14.04 |
1248642 |
dynamic library inconsistencies with OpenGL/C++ |
1433238 |
add powerpc target for ppc64el |
1410780 |
Missing info files |
1441961 |
dataChanged signal cannot be used on ARM under certain conditions |
760395 |
binutils: add powerpc target for ppc64el - Debian Bug report logs |
|
binutils (2.24-5ubuntu3.1) trusty-security; urgency=medium
* SECURITY UPDATE: out-of-bounds read in srec_scan of bfd/srec.c
- debian/patches/binutils-CVE-2014-8484.patch: report an error for
S-records with less than the miniumum size
- debian/patches/series: disable srec_scan_null_deref.diff as it is
an incomplete fix for this issue and did not go upstream
- CVE-2014-8484
* SECURITY UPDATE: incorrect memory handling around corrupt group
section headers
- debian/patches/binutils-CVE-2014-8485.patch: Improve handling of
corrupt group sections
- CVE-2014-8485
* SECURITY UPDATE: out-of-bounds write in _bfd_XXi_swap_aouthdr_in
- debian/patches/binutils-CVE-2014-8501.patch: Handle corrupt
binaries with an invalid value for NumberOfRvaAndSizes.
- CVE-2014-8501
* SECURITY UPDATE: pe_print_edata buffer overflow
- debian/patches/binutils-CVE-2014-8502.patch: Detect out of
range and truncated rvas or entry counts
- CVE-2014-8502
* SECURITY UPDATE: ihex_scan buffer overflow
- debian/patches/binutils-CVE-2014-8503.patch: Fix typo in
invocation of ihex_bad_byte.
- CVE-2014-8503
* SECURITY UPDATE: srec_scan buffer overflow
- debian/patches/binutils-CVE-2014-8504.patch: Increase size of buf
- CVE-2014-8504
* SECURITY UPDATE: directory traversal vulnerabilities
- debian/patches/binutils-CVE-2014-8737.patch: disallow paths that
include ../
- CVE-2014-8737
* SECURITY UPDATE: _bfd_slurp_extended_name_table out-of-bounds write
- debian/patches/binutils-CVE-2014-8738.patch: Handle archives
with corrupt extended name tables.
- CVE-2014-8738
* SECURITY UPDATE: multiple miscellaneous overflows and out-of-bounds
reads and writes
- debian/patches/binutils-bz17512_prereqs.patch: cherrypicked
prerequisite commits needed to apply following patch
- debian/patches/binutils-bz17512-misc.patch: fix invalid memory
accesses.
* Security hardening: don't use libbfd by default in strings(1)
- debian/patches/binutils-harden_strings.patch: Add new command
line option --data to only scan the initialized, loadable data
sections of binaries, using libbfd; make --all the default.
-- Steve Beattie <email address hidden> Mon, 09 Feb 2015 02:09:07 -0800
|
CVE-2014-8484 |
The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) |
CVE-2014-8485 |
The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and pos |
CVE-2014-8501 |
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of |
CVE-2014-8502 |
Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denia |
CVE-2014-8503 |
Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of ser |
CVE-2014-8504 |
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of ser |
CVE-2014-8737 |
Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full |
CVE-2014-8738 |
The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (i |
|
About
-
Send Feedback to @ubuntu_updates