[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 184-1] binutils security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : binutils
Version        : 2.20.1-16+deb6u1
CVE ID         : CVE-2014-8484 CVE-2014-8485 CVE-2014-8501 CVE-2014-8502
                 CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738

Multiple security issues have been found in binutils, a toolbox for
binary file manipulation. These vulnerabilities include multiple memory
safety errors, buffer overflows, use-after-frees and other implementation
errors may lead to the execution of arbitrary code, the bypass of security
restrictions, path traversal attack or denial of service.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=qxsH
-----END PGP SIGNATURE-----


Reply to: