Mageia 2022-0425: binutils/gdb security update
Summary
libiberty: Heap/stack buffer overflow in the dlang_lname function in
d-demangle.c (CVE-2021-3826)
binutils: heap-based buffer overflow in bfd_getl32() when called by
strip_main() in objcopy.c via a crafted file (CVE-2022-38533)
References
- https://bugs.mageia.org/show_bug.cgi?id=31092
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
Resolution
MGASA-2022-0425 - Updated binutils/gdb packages fix security vulnerability
SRPMS
- 8/core/binutils-2.36.1-1.5.mga8
- 8/core/gdb-10.1-5.1.mga8