—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3123-1 security@debian.org
http://www.debian.org/security/ Luciano Bello
January 09, 2015 http://www.debian.org/security/faq
– ————————————————————————-
Package : binutils
CVE ID : CVE-2014-8484 CVE-2014-8485 CVE-2014-8501 CVE-2014-8502
CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738
Multiple security issues have been found in binutils, a toolbox for
binary file manipulation. These vulnerabilities include multiple memory
safety errors, buffer overflows, use-after-frees and other implementation
errors
may lead to the execution of arbitrary code, the bypass of security
restrictions, path traversal attack or denial of service.
For the stable distribution (wheezy), these problems have been fixed in
version 2.22-8+deb7u2.
For the unstable distribution (sid), this problem has been fixed in
version 2.25-3.
We recommend that you upgrade your binutils packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCAAGBQJUsD+ZAAoJEG7C3vaP/jd0P3AP/3/neZE9Lz1GD15mjMAqGl/n
g5idQiLHtj8ASy2ZsLWzgPCzhebsuPtCjACqjv5hyYSCyNQdwaywgz4J92BoJZUB
br2kJuENlshXDVdxyBQ6QZgs64OQUV+D1GSBb6SKuxtfzpzb27c33qIUmdyGVFeD
mRG/ElRXQMddn4CvlQT/m7vrT1wAgZGqKbQZoejsYyqIyWd9l2FsrUh28PSwsP+O
wZTPrP3QdopF715A0TFKFUFxBxPFkBk9WNO90dnRvTu9qfkK7x0uS7rRczJZnCoB
YSsD1PwfiwSKt8NKv5ez7hS/srn5b8ExocaN1bvYsHmrwMjLj3FO41YO7p003wdr
XffFOXW91dAk2unaZfYo+iKsoW/TzNurr1nLMBZdhCDPBBhf1vv2HhXEyM59JIuo
/IWPrK7YwkRSJFj1pugukdNqepCtLaCLF7PLB1EDKo3d42jlrd603Llr8r/YwsLe
FJaGkFOlfk0iDRyH0Z6k/hTet9+ozTfb5CiVr8/vyeC6lD/y6gJyI3APFyHFjPG0
GpJuUvYPFtjKAOQSwYP4BztiS/w+L72F/3C7mYP45Dg2W6Kr8kJYUe94WBsJMukD
Bp2mrQi/ZYG4Uyl5dgXAK6kWO2eklm59F6NUno0wRZu4CZ442dHqPI8s3oDEN5bD
d4QGVu7rFmY+iiWikkpc
=twyz
—–END PGP SIGNATURE—–
—
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/1942886.cTmTf0LNQd@box