ALT-BU-2016-2532-1
Branch sisyphus update bulletin.
Package avr-binutils updated to version 2.25-alt1 for branch sisyphus in task 155749.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-8484
The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- [oss-security] 20141023 Re: strings / libbfd crasher
- [oss-security] 20141023 Re: strings / libbfd crasher
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141026 Re: strings / libbfd crasher
- [oss-security] 20141026 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70714
- 70714
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1156272
- https://bugzilla.redhat.com/show_bug.cgi?id=1156272
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17509
- https://sourceware.org/bugzilla/show_bug.cgi?id=17509
- https://sourceware.org/git/?p=binutils-gdb.git%3Ba=commit%3Bh=bd25671c6f202c4a5108883caa2adb24ff6f361f
- https://sourceware.org/git/?p=binutils-gdb.git%3Ba=commit%3Bh=bd25671c6f202c4a5108883caa2adb24ff6f361f
Modified: 2024-11-21
CVE-2014-8485
The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
- http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html
- http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141026 Re: strings / libbfd crasher
- [oss-security] 20141026 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70741
- 70741
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1157276
- https://bugzilla.redhat.com/show_bug.cgi?id=1157276
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17510
- https://sourceware.org/bugzilla/show_bug.cgi?id=17510
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=493a33860c71cac998f1a56d6d87d6faa801fbaa
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=493a33860c71cac998f1a56d6d87d6faa801fbaa
Modified: 2024-11-21
CVE-2014-8501
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141026 Re: Re: strings / libbfd crasher
- [oss-security] 20141026 Re: Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70866
- 70866
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1162570
- https://bugzilla.redhat.com/show_bug.cgi?id=1162570
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e1e19887abd24aeb15066b141cdff5541e0ec8e
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e1e19887abd24aeb15066b141cdff5541e0ec8e
Modified: 2024-11-21
CVE-2014-8502
Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141031 Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70869
- 70869
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1162594
- https://bugzilla.redhat.com/show_bug.cgi?id=1162594
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339
Modified: 2024-11-21
CVE-2014-8503
Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141031 Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70868
- 70868
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1162607
- https://bugzilla.redhat.com/show_bug.cgi?id=1162607
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/bugzilla/show_bug.cgi?id=17512
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=0102ea8cec5fc509bba6c91df61b7ce23a799d32
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=0102ea8cec5fc509bba6c91df61b7ce23a799d32
Modified: 2024-11-21
CVE-2014-8504
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
- FEDORA-2014-14963
- FEDORA-2014-14963
- FEDORA-2014-14995
- FEDORA-2014-14995
- FEDORA-2014-14838
- FEDORA-2014-14838
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141027 Re: Re: strings / libbfd crasher
- [oss-security] 20141027 Re: Re: strings / libbfd crasher
- [oss-security] 20141027 Re: Re: strings / libbfd crasher
- [oss-security] 20141027 Re: Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- [oss-security] 20141031 Re: strings / libbfd crasher
- 70761
- 70761
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1162621
- https://bugzilla.redhat.com/show_bug.cgi?id=1162621
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17510
- https://sourceware.org/bugzilla/show_bug.cgi?id=17510
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=708d7d0d11f0f2d776171979aa3479e8e12a38a0
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=708d7d0d11f0f2d776171979aa3479e8e12a38a0
Modified: 2024-11-21
CVE-2014-8737
Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
- FEDORA-2014-14833
- FEDORA-2014-14833
- FEDORA-2014-14888
- FEDORA-2014-14888
- FEDORA-2014-14874
- FEDORA-2014-14874
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- FEDORA-2015-0750
- FEDORA-2015-0750
- 62241
- 62241
- 62746
- 62746
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141113 Re: CVE Request: binutils -- directory traversal
- [oss-security] 20141113 Re: CVE Request: binutils -- directory traversal
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 70908
- 70908
- USN-2496-1
- USN-2496-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1162655
- https://bugzilla.redhat.com/show_bug.cgi?id=1162655
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17533
- https://sourceware.org/bugzilla/show_bug.cgi?id=17533
- https://sourceware.org/bugzilla/show_bug.cgi?id=17552
- https://sourceware.org/bugzilla/show_bug.cgi?id=17552
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dd9b91de2149ee81d47f708e7b0bbf57da10ad42
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dd9b91de2149ee81d47f708e7b0bbf57da10ad42
Modified: 2024-11-21
CVE-2014-8738
The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
- FEDORA-2014-17603
- FEDORA-2014-17603
- FEDORA-2014-17586
- FEDORA-2014-17586
- FEDORA-2015-0471
- FEDORA-2015-0471
- FEDORA-2015-0750
- FEDORA-2015-0750
- 62241
- 62241
- 62746
- 62746
- DSA-3123
- DSA-3123
- MDVSA-2015:029
- MDVSA-2015:029
- [oss-security] 20141103 Re: Re: strings / libbfd crasher
- [oss-security] 20141103 Re: Re: strings / libbfd crasher
- [oss-security] 20141105 Re: Re: strings / libbfd crasher
- [oss-security] 20141105 Re: Re: strings / libbfd crasher
- [oss-security] 20141113 Re: strings / libbfd crasher
- [oss-security] 20141113 Re: strings / libbfd crasher
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71083
- 71083
- USN-2496-1
- USN-2496-1
- GLSA-201612-24
- GLSA-201612-24
- https://sourceware.org/bugzilla/show_bug.cgi?id=17533
- https://sourceware.org/bugzilla/show_bug.cgi?id=17533
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bb0d867169d7e9743d229804106a8fbcab7f3b3f
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bb0d867169d7e9743d229804106a8fbcab7f3b3f
Closed bugs
Сломан перевод на русский язык
Closed vulnerabilities
BDU:2016-01067
Уязвимость свободной реализации DHCP-клиента dhcpcd, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2016-1503
dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.
- http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30
- http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30
- http://source.android.com/security/bulletin/2016-04-02.html
- http://source.android.com/security/bulletin/2016-04-02.html
- 1034601
- 1034601
- https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09
- https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09
- HPSBPI03554
- HPSBPI03554
- GLSA-201606-07
- GLSA-201606-07
Modified: 2024-11-21
CVE-2016-1504
dhcpcd before 6.10.0 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to the option length.
- http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403
- http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403
- http://roy.marples.name/projects/dhcpcd/timeline?r=trunk&nd&c=2016-01-07+16%3A47%3A19&n=200
- http://roy.marples.name/projects/dhcpcd/timeline?r=trunk&nd&c=2016-01-07+16%3A47%3A19&n=200
- [oss-security] 20160107 CVE id request: dhcpcd
- [oss-security] 20160107 CVE id request: dhcpcd
- [oss-security] 20160107 Re: CVE id request: dhcpcd
- [oss-security] 20160107 Re: CVE id request: dhcpcd
- 1034601
- 1034601
- GLSA-201606-07
- GLSA-201606-07