Описание
ELSA-2026-2627: gcc-toolset-14-binutils security update (MODERATE)
[2.41-3.1]
- Fix a potential illegal memory access when linking a corrupt input file. (RHEL-130636)
- Thu Feb 20 2025 Nick Clifton nickc@redhat.com
- Backport fixes for PR 32082 and PR 32153 in order to fix the PR 20267 linker tests.
[2.41-3]
- NVR Bump to allow rebuilding with GTS-14 gcc. (RHEL-53519)
[2.41-2]
- Fix s390x testsuite errors to allow building for RHEL-8. (RHEL-30410)
[2.41-1]
- Initial import of upstream 2.41 release with patches from Fedora 40. (RHEL-30410)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
gcc-toolset-14-binutils
2.41-4.el8_10.1
gcc-toolset-14-binutils-devel
2.41-4.el8_10.1
gcc-toolset-14-binutils-gold
2.41-4.el8_10.1
gcc-toolset-14-binutils-gprofng
2.41-4.el8_10.1
Oracle Linux x86_64
gcc-toolset-14-binutils
2.41-4.el8_10.1
gcc-toolset-14-binutils-devel
2.41-4.el8_10.1
gcc-toolset-14-binutils-gold
2.41-4.el8_10.1
gcc-toolset-14-binutils-gprofng
2.41-4.el8_10.1
Связанные CVE
Связанные уязвимости
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow
A vulnerability has been found in GNU Binutils 2.45. The affected elem ...