Package "binutils-multiarch-dev"
Name: |
binutils-multiarch-dev
|
Description: |
GNU binary utilities that support multi-arch targets (BFD development files)
|
Latest version: |
2.42-4ubuntu2.5 |
Release: |
noble (24.04) |
Level: |
security |
Repository: |
main |
Head package: |
binutils |
Homepage: |
https://www.gnu.org/software/binutils/ |
Links
Download "binutils-multiarch-dev"
Other versions of "binutils-multiarch-dev" in Noble
Changelog
binutils (2.42-4ubuntu2.5) noble-security; urgency=medium
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2025-1153.patch: introduces new variant of einfo
called 'fatal' that always exits in ld/*.
- CVE-2025-1153
* SECURITY UPDATE: Heap based buffer overflow
- debian/patches/CVE-2025-1176.patch: prevent illegal memory access
when indexing into the sym_hashes array in bfd/elflink.c.
- CVE-2025-1176
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2025-1178.patch: prevent an abort in the bfd linkder
when attempting to generate dynamic relocs for a corrupt input file
in bfd/elf64-x86-64.c.
- CVE-2025-1178
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2025-1181-pre.patch: prevent illegal memory access
when checking relocs in a corrupt ELF binary in bfd/elf-bfd.h,
bfd/elf64-x86-64.c, bfd/elflink.c, bfd/elfxx-x86.c.
- debian/patches/CVE-2025-1181.patch: add even more checks for corrupt
input when processing relocations for ELF files in bdf/elflink.c.
- CVE-2025-1181
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2025-1182.patch: fix illegal memory access
triggered by corrupt ELF input files in bfd/elflink.c.
- CVE-2025-1182
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 10 Mar 2025 10:52:52 -0300
|
Source diff to previous version |
CVE-2025-1153 |
A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the f |
CVE-2025-1176 |
A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink. |
CVE-2025-1178 |
A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the |
CVE-2025-1181 |
A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/ |
CVE-2025-1182 |
A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the fil |
|
binutils (2.42-4ubuntu2.4) noble-security; urgency=medium
* SECURITY UPDATE: Incorrect access control
- debian/patches/CVE-2024-57360.patch: avoid potential
segmentation fault when displaying symbols without version
info in binutils/nm.c.
- CVE-2024-57360
* SECURITY UPDATE: Stack-based overflow
- debian/patches/CVE-2025-0840.patch: fixing boundaries
checking in binutils/objdump.c.
- CVE-2025-0840
-- Leonidas Da Silva Barbosa <email address hidden> Wed, 05 Feb 2025 10:55:29 -0300
|
Source diff to previous version |
CVE-2024-57360 |
https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incor ... |
CVE-2025-0840 |
A vulnerability, which was classified as problematic, was found in GNU ... |
|
binutils (2.42-4ubuntu2.3) noble-proposed; urgency=medium
* SRU: LP: #2076024: Build with -fno-omit-frame-pointer.
* Build loong64 packages on arm64 and ppc64el.
* ld.bfd, ld.gold: When no package-metadata option is given, fall-back
to the envvar ELF_PACKAGE_METADATA.
-- Matthias Klose <email address hidden> Wed, 07 Aug 2024 12:15:13 +0200
|
2076024 |
SRU: build with -fno-omit-frame-pointer |
|
About
-
Send Feedback to @ubuntu_updates