binutils (2.38-4ubuntu2.6) jammy-security; urgency=medium * SECURITY UPDATE: segmentation fault in objdump.c compare_symbols - debian/patches/CVE-2022-47695.patch: test symbol flags to exclude section and synthetic symbols before attempting to check flavour (compare_symbols). - CVE-2022-47695 * SECURITY UPDATE: excessive memory allocation in objdump.c - debian/patches/CVE-2022-48063.patch: check that the amount of memory to be allocated matches the size of the section (load_specific_debug_section). - CVE-2022-48063 * SECURITY UPDATE: Memory leak in find_abstract_instance in dwarf2.c - debian/patches/CVE-2022-48065.patch: remove memory leaks due to double allocation of the name variable, and free memory before re-assigning a new naming variable - CVE-2022-48065 -- Nick Galanis <nick.galanis@canonical.com> Tue, 23 Jan 2024 15:08:56 +0000 binutils (2.38-4ubuntu2.5) jammy-security; urgency=medium * SECURITY UPDATE: heap buffer overflow in dwarf.c - debian/patches/CVE-2022-44840.patch: delete range check (end_cu_tu_entry and add_shndx_to_cu_tu_entry) and fill shndx_pool by directly scanning pool, rather than indirectly from index entries (process_cu_tu_index). - CVE-2022-44840 * SECURITY UPDATE: heap buffer overflow in dwarf.c - debian/patches/CVE-2022-45703-0.patch: combine sanity checks. Calculate element counts, not word counts (display_gdb_index). - debian/patches/CVE-2022-45703-1.patch: typo fix. - CVE-2022-45703 * SECURITY UPDATE: memory leak in stabs.c - debian/patches/CVE-2022-47007.patch: free dt on failure path (stab_demangle_v3_arg). - CVE-2022-47007 * SECURITY UPDATE: memory leak in bucomm.c - debian/patches/CVE-2022-47008.patch: free template on all failure paths (make_tempdir, make_tempname). - CVE-2022-47008 * SECURITY UPDATE: memory leak in prdbg.c - debian/patches/CVE-2022-47010.patch: free "s" on failure path (pr_function_type). - CVE-2022-47010 * SECURITY UPDATE: memory leak in stabs.c - debian/patches/CVE-2022-47011.patch: free "fields" on failure path (parse_stab_struct_fields). - CVE-2022-47011 -- Nick Galanis <nick.galanis@canonical.com> Wed, 03 Jan 2024 13:16:50 +0200 binutils (2.38-4ubuntu2.4) jammy-security; urgency=medium * SECURITY UPDATE: reachable assertion failure in dwarf.c - debian/patches/CVE-2022-35205.patch: replace assert with a warning message (display_debug_names). - CVE-2022-35205 * SECURITY UPDATE: illegal memory access flaw in elf.c while parsing an ELF file - debian/patches/CVE-2022-4285.patch: Fix an illegal memory access when parsing an ELF file containing corrupt symbol version information. - CVE-2022-4285 -- Nick Galanis <nick.galanis@canonical.com> Mon, 04 Dec 2023 10:57:50 +0000 binutils (2.38-4ubuntu2.3) jammy-proposed; urgency=medium * SRU: LP: #2022845. Update from the binutils 2.38 branch: - Fix PR ld/29435: elf: Reset alignment for each PT_LOAD segment. - PowerPC64 pcrel got relocs against local symbols. - Fix PR ld/27998: i386: Don't allow GOTOFF relocation against IFUNC symbol for PIC. - Fix PR ld/29377: x86: Properly check invalid relocation against protected symbol. * Ignore lto-wrapper warnings when running the testsuite. -- Matthias Klose <doko@ubuntu.com> Sun, 04 Jun 2023 08:49:40 +0200 binutils (2.38-4ubuntu2.2) jammy-security; urgency=medium * SECURITY UPDATE: heap-based buffer overflow vulnerability - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access when an accessing a zer0-lengthverdef table. - CVE-2023-1972 * SECURITY UPDATE: out-of-bound read vulnerability - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in vms-alpha.c parse_module - CVE-2023-25584 * SECURITY UPDATE: segmentation fault due to uninitialized `file_table` - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc file_table - CVE-2023-25585 * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd` - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is uninitialised - CVE-2023-25588 -- Nishit Majithia <nishit.majithia@canonical.com> Mon, 22 May 2023 12:48:33 +0530 binutils (2.38-4ubuntu2.1) jammy-security; urgency=medium * SECURITY UPDATE: Heap-buffer-overflow - debian/patches/CVE-2022-38533.patch: strip possibly heap-buffer-overflow in bfd/coffcode.h. - CVE-2022-38533 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Wed, 02 Nov 2022 10:58:51 -0300 binutils (2.38-4ubuntu2) jammy-proposed; urgency=medium * SRU: LP: #1982105. Update from the binutils 2.38 branch: - IBM zSystems: Add support for z16 as CPU name. LP: #1974115. - Fix PR libctf/29242, linking together multiple objects derived from the same source. - PowerPC64: fix assertion in ppc_build_one_stub with -Os code. - Fix PR ld/29216, x86: Properly handle IFUNC function pointer reference. - AArch64: Enable FP16 by default for Armv9-A. - Fix PR binutils/29142, segv in ar with empty archive and libdeps specified. - M68K: avoid quadratic slowdlow in label alignment check. - Adjust ld ctf test for 32-bit targets. -- Matthias Klose <doko@ubuntu.com> Tue, 19 Jul 2022 12:17:47 +0200 binutils (2.38-4ubuntu1) kinetic; urgency=medium * Merge with Debian; remaining changes: - Build from upstream sources. -- Matthias Klose <doko@ubuntu.com> Mon, 02 May 2022 23:01:48 +0200 binutils (2.38-4) unstable; urgency=medium * Update from the binutils 2.38 branch: - Fix PR ld/29087, x86: invalid relocation against protected symbol. - s390: Add DT_JMPREL pointing to .rela.[i]plt with static-pie. - Fix PR ld/22263, s390: Avoid dynamic TLS relocs in PIE. - Fix PR libctf/28933: ld: diagnose corrupted CTF header cth_strlen. - Fix PR 28885. - PR28959, obdump doesn't disassemble mftb instruction. - PowerPC64 DT_RELR relative reloc addresses. LP: #1978129. * Fix reproducible builds: source tarball embeds build user and group. Closes: #1010238. -- Matthias Klose <doko@debian.org> Mon, 02 May 2022 22:50:25 +0200 binutils (2.38-3ubuntu1) jammy; urgency=medium * Merge with Debian; remaining changes: - Build from upstream sources. -- Matthias Klose <doko@ubuntu.com> Sat, 12 Mar 2022 06:55:17 +0100 # For older changelog entries, run 'apt-get changelog binutils-common'
Generated by dwww version 1.14 on Thu Jan 23 03:22:17 CET 2025.