dwww Home | Show directory contents | Find package

binutils (2.38-4ubuntu2.8) jammy-security; urgency=medium

  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2025-1153.patch: introduces new variant of einfo
      called 'fatal' that always exits in ld/*.
    - CVE-2025-1153
  * SECURITY UPDATE: Heap based buffer overflow
    - debian/patches/CVE-2025-1176.patch: prevent illegal memory access
      when indexing into the sym_hashes array in bfd/elflink.c.
    - CVE-2025-1176
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2025-1178.patch: prevent an abort in the bfd linkder
      when attempting to generate dynamic relocs for a corrupt input file
      in bfd/elf64-x86-64.c.
    - CVE-2025-1178
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2025-1181-pre.patch: prevent illegal memory access
      when checking relocs in a corrupt ELF binary in bfd/elf-bfd.h,
      bfd/elf64-x86-64.c, bfd/elflink.c, bfd/elfxx-x86.c.
    - debian/patches/CVE-2025-1181.patch: add even more checks for corrupt
      input when processing relocations for ELF files in bdf/elflink.c.
    - CVE-2025-1181
   * SECURITY UPDATE: Memory corruption
     - debian/patches/CVE-2025-1182.patch: fix illegal memory access
       triggered by corrupt ELF input files in bfd/elflink.c.
     - CVE-2025-1182

 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com>  Mon, 17 Mar 2025 16:24:06 -0300

binutils (2.38-4ubuntu2.7) jammy-security; urgency=medium

  * SECURITY UPDATE: Incorrect access control
    - debian/patches/CVE-2024-57360.patch: avoid potential
      segmentation fault when displaying symbols without version
      info in binutils/nm.c.
    - CVE-2024-57360
  * SECURITY UPDATE: Stack-based overflow
    - debian/patches/CVE-2025-0840.patch: fixing boundaries
      checking in binutils/objdump.c.
    - CVE-2025-0840

 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com>  Wed, 05 Feb 2025 12:56:02 -0300

binutils (2.38-4ubuntu2.6) jammy-security; urgency=medium

  * SECURITY UPDATE: segmentation fault in objdump.c compare_symbols
    - debian/patches/CVE-2022-47695.patch: test symbol flags to exclude
      section and synthetic symbols before attempting to check flavour
      (compare_symbols).
    - CVE-2022-47695 
  * SECURITY UPDATE: excessive memory allocation in objdump.c
    - debian/patches/CVE-2022-48063.patch: check that the amount of memory to
      be allocated matches the size of the section
      (load_specific_debug_section).
    - CVE-2022-48063
  * SECURITY UPDATE: Memory leak in find_abstract_instance in dwarf2.c
    - debian/patches/CVE-2022-48065.patch: remove memory leaks due to double
      allocation of the name variable, and free memory before re-assigning a
      new naming variable
    - CVE-2022-48065 

 -- Nick Galanis <nick.galanis@canonical.com>  Tue, 23 Jan 2024 15:08:56 +0000

binutils (2.38-4ubuntu2.5) jammy-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-44840.patch: delete range check (end_cu_tu_entry
      and add_shndx_to_cu_tu_entry) and fill shndx_pool by directly scanning
      pool, rather than indirectly from index entries (process_cu_tu_index).
    - CVE-2022-44840 
  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-45703-0.patch: combine sanity checks. Calculate
      element counts, not word counts (display_gdb_index).
    - debian/patches/CVE-2022-45703-1.patch: typo fix.
    - CVE-2022-45703
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47007.patch: free dt on failure path
      (stab_demangle_v3_arg).
    - CVE-2022-47007
  * SECURITY UPDATE: memory leak in bucomm.c
    - debian/patches/CVE-2022-47008.patch: free template on all failure paths
      (make_tempdir, make_tempname).
    - CVE-2022-47008
  * SECURITY UPDATE: memory leak in prdbg.c
    - debian/patches/CVE-2022-47010.patch: free "s" on failure path
      (pr_function_type).
    - CVE-2022-47010
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47011.patch: free "fields" on failure path
      (parse_stab_struct_fields).
    - CVE-2022-47011
 
 -- Nick Galanis <nick.galanis@canonical.com>  Wed, 03 Jan 2024 13:16:50 +0200

binutils (2.38-4ubuntu2.4) jammy-security; urgency=medium

  * SECURITY UPDATE: reachable assertion failure in dwarf.c
    - debian/patches/CVE-2022-35205.patch: replace assert with a warning
      message (display_debug_names).
    - CVE-2022-35205
  
  * SECURITY UPDATE: illegal memory access flaw in elf.c while parsing an
    ELF file
    - debian/patches/CVE-2022-4285.patch: Fix an illegal memory access when
      parsing an ELF file containing corrupt symbol version information.
    - CVE-2022-4285

 -- Nick Galanis <nick.galanis@canonical.com>  Mon, 04 Dec 2023 10:57:50 +0000

binutils (2.38-4ubuntu2.3) jammy-proposed; urgency=medium

  * SRU: LP: #2022845. Update from the binutils 2.38 branch:
    - Fix PR ld/29435: elf: Reset alignment for each PT_LOAD segment.
    - PowerPC64 pcrel got relocs against local symbols.
    - Fix PR ld/27998: i386: Don't allow GOTOFF relocation against
      IFUNC symbol for PIC.
    - Fix PR ld/29377: x86: Properly check invalid relocation against
      protected symbol.
  * Ignore lto-wrapper warnings when running the testsuite.

 -- Matthias Klose <doko@ubuntu.com>  Sun, 04 Jun 2023 08:49:40 +0200

binutils (2.38-4ubuntu2.2) jammy-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow vulnerability
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zer0-lengthverdef table.
    - CVE-2023-1972
  * SECURITY UPDATE: out-of-bound read vulnerability
    - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in
      vms-alpha.c parse_module
    - CVE-2023-25584
  * SECURITY UPDATE: segmentation fault due to uninitialized `file_table`
    - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc
      file_table
    - CVE-2023-25585
  * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd`
    - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is
      uninitialised
    - CVE-2023-25588

 -- Nishit Majithia <nishit.majithia@canonical.com>  Mon, 22 May 2023 12:48:33 +0530

binutils (2.38-4ubuntu2.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer-overflow
    - debian/patches/CVE-2022-38533.patch: strip possibly
      heap-buffer-overflow in bfd/coffcode.h.
    - CVE-2022-38533

 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com>  Wed, 02 Nov 2022 10:58:51 -0300

binutils (2.38-4ubuntu2) jammy-proposed; urgency=medium

  * SRU: LP: #1982105. Update from the binutils 2.38 branch:
    - IBM zSystems: Add support for z16 as CPU name. LP: #1974115.
    - Fix PR libctf/29242, linking together multiple objects derived from
      the same source.
    - PowerPC64: fix assertion in ppc_build_one_stub with -Os code.
    - Fix PR ld/29216, x86: Properly handle IFUNC function pointer reference.
    - AArch64: Enable FP16 by default for Armv9-A.
    - Fix PR binutils/29142, segv in ar with empty archive and libdeps
      specified.
    - M68K: avoid quadratic slowdlow in label alignment check.
    - Adjust ld ctf test for 32-bit targets.

 -- Matthias Klose <doko@ubuntu.com>  Tue, 19 Jul 2022 12:17:47 +0200

binutils (2.38-4ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

 -- Matthias Klose <doko@ubuntu.com>  Mon, 02 May 2022 23:01:48 +0200

# For older changelog entries, run 'apt-get changelog libctf-nobfd0'

Generated by dwww version 1.14 on Sat Apr 19 01:37:20 CEST 2025.