[RHSA-2005:763-01] Low: binutils security update

bugzilla at redhat.com bugzilla at redhat.com
Tue Oct 11 16:12:01 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: binutils security update
Advisory ID:       RHSA-2005:763-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-763.html
Issue date:        2005-10-11
Updated on:        2005-10-11
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-1704
- ---------------------------------------------------------------------

1. Summary:

An updated binutils package that fixes minor security issues is now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Binutils is a collection of utilities used for the creation of executable
code. A number of bugs were found in various binutils tools.  

Several integer overflow bugs were found in binutils. If a user is tricked
into processing a specially crafted executable with utilities such as
readelf, size, strings, objdump, or nm, it may allow the execution of
arbitrary code as the user running the utility. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1704
to this issue.

All users of binutils should upgrade to this updated package, which
contains backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

164666 - CAN-2005-1704 Integer overflow in the Binary File Descriptor (BFD) library


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/binutils-2.11.90.0.8-12.5.src.rpm
f981c9ab886387de6d68ef508e528952  binutils-2.11.90.0.8-12.5.src.rpm

i386:
84f0f3790e0ad8e889777af528e8fe32  binutils-2.11.90.0.8-12.5.i386.rpm

ia64:
29a30b2e10daa96cd73d40c992db3a69  binutils-2.11.90.0.8-12.5.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/binutils-2.11.90.0.8-12.5.src.rpm
f981c9ab886387de6d68ef508e528952  binutils-2.11.90.0.8-12.5.src.rpm

ia64:
29a30b2e10daa96cd73d40c992db3a69  binutils-2.11.90.0.8-12.5.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/binutils-2.11.90.0.8-12.5.src.rpm
f981c9ab886387de6d68ef508e528952  binutils-2.11.90.0.8-12.5.src.rpm

i386:
84f0f3790e0ad8e889777af528e8fe32  binutils-2.11.90.0.8-12.5.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/binutils-2.11.90.0.8-12.5.src.rpm
f981c9ab886387de6d68ef508e528952  binutils-2.11.90.0.8-12.5.src.rpm

i386:
84f0f3790e0ad8e889777af528e8fe32  binutils-2.11.90.0.8-12.5.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1704

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDS+QEXlSAg2UNWIIRAnSvAKDAaQwB/WmnMwCEdyaRvgnSd1MWFACgv1O1
v3/pFtSt2R9AGvBGGFNlMhY=
=j8bV
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list