blob: ff520da543714726a3cf68a99d4538644560cd43 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>This update fixes several issues as described below.</p>
<ul>
<li>PR ld/12613 (no CVE assigned)
<p>Niranjan Hasabnis discovered that passing an malformed linker
script to GNU ld, part of binutils, may result in a stack buffer
overflow. If the linker is used with untrusted object files, this
would allow remote attackers to cause a denial of service (crash)
or possibly privilege escalation.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3509">CVE-2012-3509</a>, #688951
<p>Sang Kil Cha discovered that a buffer size calculation in
libiberty, part of binutils, may result in integer overflow and
then a heap buffer overflow. If libiberty or the commands in
binutils are used to read untrusted binaries, this would allow
remote attackers to cause a denial of service (crash) or possibly
privilege escalation.</p></li>
<li>PR binutils/18750 (no CVE assigned)
<p>Joshua Rogers reported that passing a malformed ihex (Intel
hexadecimal) file to to various commands in binutils may result in
a stack buffer overflow. A similar issue was found in readelf.
If these commands are used to read untrusted binaries, this would
allow remote attackers to cause a denial of service (crash) or
possibly privilege escalation.</p></li>
</ul>
<p>For the oldoldstable distribution (squeeze), these problems have been
fixed in version 2.20.1-16+deb6u2.</p>
<p>For the oldstable distribution (wheezy) and the stable distribution
(jessie), PR ld/12613 and <a href="https://security-tracker.debian.org/tracker/CVE-2012-3509">CVE-2012-3509</a> were fixed before release, and
PR binutils/18750 will be fixed in a later update.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2015/dla-324.data"
# $Id$
|