ClickCease CentOS 6 ELS: binutils package gradual rollout completed - TuxCare

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

CentOS 6 ELS: binutils package gradual rollout completed

December 27, 2021 - TuxCare PR Team

A new updated binutils package within CentOS 6 ELS has been rolled out to 100% and is now available for download from our production repository.

CHANGELOG

binutils 2.20.51.0.2-5.48.1.el6.tuxcare.els3

  • CVE-2018-6323: Fix unsigned integer overflow
  • CVE-2018-19931: Fix heap-based buffer overflow in bfd_elf32_swap_phdr_in
  • CVE-2018-6543: Fix integer overflow
  • CVE-2018-20671: Fix integer overflow vulnerability
  • CVE-2018-6759: Fix segmentation fault
  • CVE-2018-7208: Fix segmentation fault
  • CVE-2018-7568: Fix integer overflow
  • CVE-2018-7569: Fix integer underflow or overflow
  • CVE-2018-7642: Fix aout_32_swap_std_reloc_out NULL pointer dereference
  • CVE-2018-7643: Fix integer overflow
  • CVE-2018-8945: Fix segmentation fault
  • CVE-2018-13033: Fix excessive memory allocation
  • CVE-2018-10373: Fix NULL pointer dereference
  • CVE-2018-10535: Fix NULL pointer dereference
  • CVE-2018-18309: Fix invalid memory address dereference
  • CVE-2018-18605: Fix mishandles section merges
  • CVE-2018-18606: Fix NULL pointer dereference
  • CVE-2018-18607: Fix NULL pointer dereference in elf_link_input_bfd
  • CVE-2018-19932: Fix integer overflow and infinite loop
  • CVE-2018-20002: Fix memory consumption
  • CVE-2018-20623: Fix use-after-free in the error function
  • CVE-2018-1000876: Fix integer overflow trigger heap overflow
  • CVE-2019-9073: Fix excessive memory allocation
  • CVE-2019-9075: Fix heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap
  • CVE-2019-9077: Fix heap-based buffer overflow in process_mips_specific
  • CVE-2019-12972: Fix heap-based buffer over-read in _bfd_doprnt
  • CVE-2019-14444: Fix integer overflow
  • CVE-2019-17450: Fix infinite recursion
  • CVE-2016-2226: Fix integer overflow in the string_appends function in cplus-dem.c
  • CVE-2016-4487: Fix use-after-free vulnerability in libiberty
  • CVE-2016-4488: Fix use-after-free vulnerability in libiberty
  • CVE-2016-4489: Fix integer overflow in libiberty
  • CVE-2016-4490: Fix integer overflow in cp-demangle.c in libiberty
  • CVE-2016-4492: Fix buffer overflow in the do_type function in cplus-dem.c in libiberty
  • CVE-2016-4493: Fix out-of-bounds read in demangle_template_value_parm and do_hpacc_template_literal
  • CVE-2016-6131: Fix infinite loop, stack overflow

UPDATE COMMAND

yum update binutils*

 

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Related Articles

Think You Can’t Afford Consistent...

Look, everyone knows that it’s a tough act. Thousands of...

January 17, 2023

Common Government Cybersecurity Standards –...

The public sector, including state and federal agencies, are at...

January 16, 2023

Which Linux Distro is Best...

If your organization deploys IoT solutions, you know that development...

December 1, 2022

The Bugs Behind the Vulnerabilities...

We continue to look at the code issues that cause...

November 14, 2022

Cybersecurity insurance and fine print:...

Catastrophic risks such as natural disasters and indeed cyberattacks require...

June 29, 2022

IT Automation With Live...

In a symphony orchestra, instruments harmonize to create one pleasing...

June 20, 2022