Scientific Linux Security Update : binutils on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Multiple buffer overflow flaws were found in the libbdf library used
by various binutils utilities. If a user were tricked into processing
a specially crafted file with an application using the libbdf library,
it could cause the application to crash or, potentially, execute
arbitrary code. (CVE-2014-8485, CVE-2014-8501, CVE-2014-8502,
CVE-2014-8503, CVE-2014-8504, CVE-2014-8738)

An integer overflow flaw was found in the libbdf library used by
various binutils utilities. If a user were tricked into processing a
specially crafted file with an application using the libbdf library,
it could cause the application to crash. (CVE-2014-8484)

A directory traversal flaw was found in the strip and objcopy
utilities. A specially crafted file could cause strip or objdump to
overwrite an arbitrary file writable by the user running either of
these utilities. (CVE-2014-8737)

This update fixes the following bugs :

- Binary files started by the system loader could lack the
Relocation Read-Only (RELRO) protection even though it
was explicitly requested when the application was built.
This bug has been fixed on multiple architectures.
Applications and all dependent object files, archives,
and libraries built with an alpha or beta version of
binutils should be rebuilt to correct this defect.

- The ld linker on 64-bit PowerPC now correctly checks the
output format when asked to produce a binary in another
format than PowerPC.

- An important variable that holds the symbol table for
the binary being debugged has been made persistent, and
the objdump utility on 64-bit PowerPC is now able to
access the needed information without reading an invalid
memory region.

- Undesirable runtime relocations described in
SLBA-2015:0974.

The update adds these enhancements :

- New hardware instructions of the IBM z Systems z13 are
now supported by assembler, disassembler, and linker, as
well as Single Instruction, Multiple Data (SIMD)
instructions.

- Expressions of the form: '[email protected]' to refer to
the local entry point for the FUNC function (if defined)
are now supported by the PowerPC assembler. These are
required by the ELFv2 ABI on the little-endian variant
of IBM Power Systems.

See also :

http://www.nessus.org/u?f944b113

Solution :

Update the affected binutils, binutils-debuginfo and / or
binutils-devel packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87550 ()

Bugtraq ID:

CVE ID: CVE-2014-8484
CVE-2014-8485
CVE-2014-8501
CVE-2014-8502
CVE-2014-8503
CVE-2014-8504
CVE-2014-8737
CVE-2014-8738

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now