First published: Tue Aug 06 2019(Updated: )
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.<br>Security Fix(es):<br><li> binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876)</li> <li> binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641)</li> <li> binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. (CVE-2018-12697)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/binutils | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-debuginfo | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-debuginfo | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-devel | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-devel | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-debuginfo | <2.27-41.base.el7 | 2.27-41.base.el7 |
redhat/binutils-devel | <2.27-41.base.el7 | 2.27-41.base.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:2075 is rated as critical.
You can fix RHSA-2019:2075 by updating the binutils package to version 2.27-41.base.el7.
RHSA-2019:2075 affects systems running Red Hat Enterprise Linux 7 with vulnerable versions of the binutils package.
Not addressing RHSA-2019:2075 may expose your system to potential exploitation leading to data compromise or system integrity issues.
There are no known workarounds for RHSA-2019:2075; the recommended action is to apply the security update.