Change log for binutils package in Ubuntu

175 of 605 results
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.42-4ubuntu2) noble; urgency=medium

  * No-change rebuild.

 -- Matthias Klose <email address hidden>  Fri, 29 Mar 2024 20:49:57 +0100

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.42-4ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.42-3ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Published in jammy-updates
Published in jammy-security
binutils (2.38-4ubuntu2.6) jammy-security; urgency=medium

  * SECURITY UPDATE: segmentation fault in objdump.c compare_symbols
    - debian/patches/CVE-2022-47695.patch: test symbol flags to exclude
      section and synthetic symbols before attempting to check flavour
      (compare_symbols).
    - CVE-2022-47695
  * SECURITY UPDATE: excessive memory allocation in objdump.c
    - debian/patches/CVE-2022-48063.patch: check that the amount of memory to
      be allocated matches the size of the section
      (load_specific_debug_section).
    - CVE-2022-48063
  * SECURITY UPDATE: Memory leak in find_abstract_instance in dwarf2.c
    - debian/patches/CVE-2022-48065.patch: remove memory leaks due to double
      allocation of the name variable, and free memory before re-assigning a
      new naming variable
    - CVE-2022-48065

 -- Nick Galanis <email address hidden>  Tue, 23 Jan 2024 15:08:56 +0000
Published in focal-updates
Published in focal-security
binutils (2.34-6ubuntu1.9) focal-security; urgency=medium

  * SECURITY UPDATE: segmentation fault in objdump.c compare_symbols
    - debian/patches/CVE-2022-47695.patch: test symbol flags to exclude
      section and synthetic symbols before attempting to check flavour
      (compare_symbols).
    - CVE-2022-47695
  * SECURITY UPDATE: excessive memory allocation in objdump.c
    - debian/patches/CVE-2022-48063.patch: check that the amount of memory to
      be allocated matches the size of the section
      (load_specific_debug_section).
    - CVE-2022-48063
  * SECURITY UPDATE: Memory leak in find_abstract_instance in dwarf2.c
    - debian/patches/CVE-2022-48065.patch: remove memory leaks due to double
      allocation of the name variable, and free memory before re-assigning a
      new naming variable
    - CVE-2022-48065

 -- Nick Galanis <email address hidden>  Tue, 23 Jan 2024 10:47:04 +0000
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.42-2ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in noble-proposed
binutils (2.42-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.41.90.20240122-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in noble-proposed
binutils (2.41.90.20240115-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in focal-updates
Superseded in focal-security
binutils (2.34-6ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-44840.patch: delete range check (end_cu_tu_entry
      and add_shndx_to_cu_tu_entry) and fill shndx_pool by directly scanning
      pool, rather than indirectly from index entries (process_cu_tu_index).
    - CVE-2022-44840
  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-45703-0.patch: combine sanity checks. Calculate
      element counts, not word counts (display_gdb_index).
    - debian/patches/CVE-2022-45703-1.patch: typo fix.
    - CVE-2022-45703
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47007.patch: free dt on failure path
      (stab_demangle_v3_arg).
    - CVE-2022-47007
  * SECURITY UPDATE: memory leak in bucomm.c
    - debian/patches/CVE-2022-47008.patch: free template on all failure paths
      (make_tempdir, make_tempname).
    - CVE-2022-47008
  * SECURITY UPDATE: memory leak in prdbg.c
    - debian/patches/CVE-2022-47010.patch: free "s" on failure path
      (pr_function_type).
    - CVE-2022-47010
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47011.patch: free "fields" on failure path
      (parse_stab_struct_fields).
    - CVE-2022-47011

 -- Nick Galanis <email address hidden>  Tue, 02 Jan 2024 17:48:50 +0200
Superseded in jammy-updates
Superseded in jammy-security
binutils (2.38-4ubuntu2.5) jammy-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-44840.patch: delete range check (end_cu_tu_entry
      and add_shndx_to_cu_tu_entry) and fill shndx_pool by directly scanning
      pool, rather than indirectly from index entries (process_cu_tu_index).
    - CVE-2022-44840
  * SECURITY UPDATE: heap buffer overflow in dwarf.c
    - debian/patches/CVE-2022-45703-0.patch: combine sanity checks. Calculate
      element counts, not word counts (display_gdb_index).
    - debian/patches/CVE-2022-45703-1.patch: typo fix.
    - CVE-2022-45703
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47007.patch: free dt on failure path
      (stab_demangle_v3_arg).
    - CVE-2022-47007
  * SECURITY UPDATE: memory leak in bucomm.c
    - debian/patches/CVE-2022-47008.patch: free template on all failure paths
      (make_tempdir, make_tempname).
    - CVE-2022-47008
  * SECURITY UPDATE: memory leak in prdbg.c
    - debian/patches/CVE-2022-47010.patch: free "s" on failure path
      (pr_function_type).
    - CVE-2022-47010
  * SECURITY UPDATE: memory leak in stabs.c
    - debian/patches/CVE-2022-47011.patch: free "fields" on failure path
      (parse_stab_struct_fields).
    - CVE-2022-47011

 -- Nick Galanis <email address hidden>  Wed, 03 Jan 2024 13:16:50 +0200
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.41.50.20231227-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.41.50.20231214-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.41.50.20231206-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in jammy-updates
Superseded in jammy-security
binutils (2.38-4ubuntu2.4) jammy-security; urgency=medium

  * SECURITY UPDATE: reachable assertion failure in dwarf.c
    - debian/patches/CVE-2022-35205.patch: replace assert with a warning
      message (display_debug_names).
    - CVE-2022-35205

  * SECURITY UPDATE: illegal memory access flaw in elf.c while parsing an
    ELF file
    - debian/patches/CVE-2022-4285.patch: Fix an illegal memory access when
      parsing an ELF file containing corrupt symbol version information.
    - CVE-2022-4285

 -- Nick Galanis <email address hidden>  Mon, 04 Dec 2023 10:57:50 +0000
Superseded in noble-proposed
binutils (2.41.50.20231202-1ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in focal-updates
Superseded in focal-security
binutils (2.34-6ubuntu1.7) focal-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in libbfd.c
    - debian/patches/CVE-2020-19726-1.patch: check that buffer contains
      required number of auxents before processing any auxent (coffgen.c) and
      only swap in extended file name from auxents for PE (coffswap.h).
    - debian/patches/CVE-2020-19726-2.patch: fix off-by-one error in check for
      aux entries that overflow the buffer (coff_get_normalized_symtab,
      coffgen.c).
    - CVE-2020-19726

  * SECURITY UPDATE: heap buffer overflow in rddbg.c
    - debian/patches/CVE-2021-46174.patch: don't read past end of section when
      concatenating stab strings (read_section_stabs_debugging_info).
    - CVE-2021-46174

  * SECURITY UPDATE: reachable assertion failure in dwarf.c
    - debian/patches/CVE-2022-35205.patch: replace assert with a warning
      message (display_debug_names).
    - CVE-2022-35205

 -- Nick Galanis <email address hidden>  Thu, 30 Nov 2023 10:16:08 +0000
Superseded in noble-proposed
binutils (2.41-7ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
binutils (2.41-6ubuntu1) noble; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.41-5ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.41-4ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.41-3ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.41-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40.90.20230720-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-proposed
binutils (2.40.90.20230714-2ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-proposed
binutils (2.40.90.20230714-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40.90.20230705-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40.50.20230701-0ubuntu1) mantic; urgency=medium

  * New upstream snapshot, taken from the trunk.
  * Disable running tests on i386, testsuite hangs, see PR gprofng/30602.

 -- Matthias Klose <email address hidden>  Sat, 01 Jul 2023 16:24:06 +0200
Superseded in mantic-proposed
binutils (2.40.50.20230630-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40.50.20230622-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in focal-updates
Superseded in focal-security
binutils (2.34-6ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: possible denial of service via heap overflow
    - debian/patches/CVE-2021-45078.patch: fix bounds checking in
      binutils/stabs.c.
    - CVE-2021-45078

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 09:53:18 -0400
Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40.50.20230611-2ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in mantic-proposed
binutils (2.40.50.20230611-1ubuntu1) mantic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in jammy-security
Superseded in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
binutils (2.38-4ubuntu2.3) jammy-proposed; urgency=medium

  * SRU: LP: #2022845. Update from the binutils 2.38 branch:
    - Fix PR ld/29435: elf: Reset alignment for each PT_LOAD segment.
    - PowerPC64 pcrel got relocs against local symbols.
    - Fix PR ld/27998: i386: Don't allow GOTOFF relocation against
      IFUNC symbol for PIC.
    - Fix PR ld/29377: x86: Properly check invalid relocation against
      protected symbol.
  * Ignore lto-wrapper warnings when running the testsuite.

 -- Matthias Klose <email address hidden>  Sun, 04 Jun 2023 08:49:40 +0200
Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40-2ubuntu6) mantic; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow vulnerability
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zer0-lengthverdef table.
    - CVE-2023-1972

 -- Nishit Majithia <email address hidden>  Wed, 24 May 2023 09:27:23 +0530

Available diffs

Published in lunar-updates
Published in lunar-security
binutils (2.40-2ubuntu4.1) lunar-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow vulnerability
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zer0-lengthverdef table.
    - CVE-2023-1972

 -- Nishit Majithia <email address hidden>  Tue, 23 May 2023 08:55:36 +0530
Obsolete in kinetic-updates
Obsolete in kinetic-security
binutils (2.39-3ubuntu1.2) kinetic-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow vulnerability
    - debian/patches/CVE-2023-1579.patch: Fix a potential illegal memory
      access in the BFD library when parsing a corrupt DWARF file.
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zer0-lengthverdef table.
    - CVE-2023-1579
    - CVE-2023-1972
  * SECURITY UPDATE: out-of-bound read vulnerability
    - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in
      vms-alpha.c parse_module
    - CVE-2023-25584
  * SECURITY UPDATE: segmentation fault due to uninitialized `file_table`
    - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc
      file_table
    - CVE-2023-25585
  * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd`
    - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is
      uninitialised
    - CVE-2023-25588

 -- Nishit Majithia <email address hidden>  Mon, 22 May 2023 15:13:38 +0530
Superseded in jammy-updates
Superseded in jammy-security
binutils (2.38-4ubuntu2.2) jammy-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow vulnerability
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zer0-lengthverdef table.
    - CVE-2023-1972
  * SECURITY UPDATE: out-of-bound read vulnerability
    - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in
      vms-alpha.c parse_module
    - CVE-2023-25584
  * SECURITY UPDATE: segmentation fault due to uninitialized `file_table`
    - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc
      file_table
    - CVE-2023-25585
  * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd`
    - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is
      uninitialised
    - CVE-2023-25588

 -- Nishit Majithia <email address hidden>  Mon, 22 May 2023 12:48:33 +0530
Superseded in focal-updates
Superseded in focal-security
binutils (2.34-6ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: out-of-bound read vulnerability
    - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in
      vms-alpha.c parse_module
    - CVE-2023-25584
  * SECURITY UPDATE: segmentation fault due to uninitialized `file_table`
    - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc
      file_table
    - CVE-2023-25585
  * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd`
    - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is
      uninitialised
    - CVE-2023-25588

 -- Nishit Majithia <email address hidden>  Mon, 22 May 2023 08:11:49 +0530
Published in bionic-updates
Published in bionic-security
binutils (2.30-21ubuntu1~18.04.9) bionic-security; urgency=medium

  * SECURITY UPDATE: out-of-bound read vulnerability
    - debian/patches/CVE-2023-25584.patch: Lack of bounds checking in
      vms-alpha.c parse_module
    - CVE-2023-25584
  * SECURITY UPDATE: segmentation fault due to uninitialized `file_table`
    - debian/patches/CVE-2023-25585.patch: Use bfd_zmalloc to alloc
      file_table
    - CVE-2023-25585
  * SECURITY UPDATE: segmentation fault due to uninitialized `the_bfd`
    - debian/patches/CVE-2023-25588.patch: Field `the_bfd` of `asymbol` is
      uninitialised
    - CVE-2023-25588

 -- Nishit Majithia <email address hidden>  Fri, 19 May 2023 14:22:50 +0530
Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
binutils (2.40-2ubuntu5) mantic; urgency=medium

  * Update from the binutils 2.40 branch:
    - Fix PR30198, Assertion and segfault when linking x86_64 elf and coff.
    - Fix PR30217, dynamic relocations using local dynamic symbols.
    - libctf: fix assertion failure with no system qsort_r.
    - libctf: get the offsets of fields of unnamed structs/unions right.
    - gas: arm: Fix a further IT-predicated vcvt issue in the presense of
      MVE vcvtn.
    - gas: arm: Change warning message to not reference specific A-class
      architecture revision.
    - PR ld/30281: lto: Don't add indirect symbols for versioned aliases in IR.

 -- Matthias Klose <email address hidden>  Wed, 03 May 2023 09:36:09 +0200

Available diffs

Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
binutils (2.40-2ubuntu4) lunar; urgency=medium

  * debian/binutils-common.preinst: remove /etc/gprofng.rc if it has not been
    modified to avoid unnecessary conffile prompt on upgrade (LP: #2015778)

 -- Nick Rosbrook <email address hidden>  Thu, 13 Apr 2023 16:38:40 -0400

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
binutils (2.40-2ubuntu3) lunar; urgency=medium

  * Update from the binutils 2.40 branch:
    - Translation updates.
    - Fix PR ld/30155, ld segfault in _bfd_nearby_section.
    - Fix PR30046, power cmpi leads to unknown architecture.
    - ppc32 and "LOAD segment with RWX permissions"

 -- Matthias Klose <email address hidden>  Sun, 05 Mar 2023 09:47:46 +0100
Superseded in lunar-proposed
binutils (2.40-2ubuntu2) lunar; urgency=medium

  * Update from the binutils 2.40 branch:
    - Translation updates.
    - libctf: update regexp to allow makeinfo to build document.
    - Fix PR libsframe/30014.
    - gprofng: PR29521 [docs] man pages are not in the release tarball.
    - gprofng: PR30043 libgprofng.so.* are installed to a wrong location.
    - RISC-V: make C-extension JAL available again for (32-bit) assembly.
    - bpf: fix error conversion from long unsigned int to unsigned int.
    - Pass $JANSSON_LIBS and $ZSTD_LIBS to ld-bootstrap/bootrap.exp.
    - gas: correct symbol name comparison in .startof./.sizeof. handling.

 -- Matthias Klose <email address hidden>  Wed, 15 Feb 2023 06:31:44 +0100

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
binutils (2.40-2ubuntu1) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in lunar-proposed
binutils (2.39.90.20221231-1ubuntu1) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
binutils (2.39.50.20221224-1ubuntu1) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in lunar-proposed
binutils (2.39.50.20221211-0ubuntu1) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-updates
Superseded in kinetic-security
binutils (2.39-3ubuntu1.1) kinetic-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer-overflow
    - debian/patches/CVE-2022-38533.patch: strip possibly
      heap-buffer-overflow in bfd/coffcode.h.
    - CVE-2022-38533

 -- Leonidas Da Silva Barbosa <email address hidden>  Thu, 01 Dec 2022 08:11:36 -0300
Superseded in jammy-updates
Superseded in jammy-security
binutils (2.38-4ubuntu2.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer-overflow
    - debian/patches/CVE-2022-38533.patch: strip possibly
      heap-buffer-overflow in bfd/coffcode.h.
    - CVE-2022-38533

 -- Leonidas Da Silva Barbosa <email address hidden>  Wed, 02 Nov 2022 10:58:51 -0300
Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
binutils (2.39-8ubuntu2) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in lunar-proposed
binutils (2.39-8ubuntu1) lunar; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.39-3ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in focal-updates
Superseded in focal-security
binutils (2.34-6ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer-overflow
    - debian/patches/CVE-2022-38533.patch: strip possibly
      heap-buffer-overflow in bfd/coffcode.h.
    - CVE-2022-38533

 -- Leonidas Da Silva Barbosa <email address hidden>  Tue, 30 Aug 2022 09:53:48 -0300
Superseded in bionic-updates
Superseded in bionic-security
binutils (2.30-21ubuntu1~18.04.8) bionic-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer-overflow
    - debian/patches/CVE-2022-38533.patch: strip possibly
      heap-buffer-overflow in bfd/coffcode.h.
    - CVE-2022-38533

 -- Leonidas Da Silva Barbosa <email address hidden>  Tue, 30 Aug 2022 10:03:11 -0300
Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.39-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in jammy-security
Superseded in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
binutils (2.38-4ubuntu2) jammy-proposed; urgency=medium

  * SRU: LP: #1982105. Update from the binutils 2.38 branch:
    - IBM zSystems: Add support for z16 as CPU name. LP: #1974115.
    - Fix PR libctf/29242, linking together multiple objects derived from
      the same source.
    - PowerPC64: fix assertion in ppc_build_one_stub with -Os code.
    - Fix PR ld/29216, x86: Properly handle IFUNC function pointer reference.
    - AArch64: Enable FP16 by default for Armv9-A.
    - Fix PR binutils/29142, segv in ar with empty archive and libdeps
      specified.
    - M68K: avoid quadratic slowdlow in label alignment check.
    - Adjust ld ctf test for 32-bit targets.

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.38.90.20220713-2ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.90.20220713-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220707-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.38.50.20220629-4ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220629-3ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.38.50.20220629-2ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220629-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220627-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220615-4ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220615-3ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220615-2ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-proposed
binutils (2.38.50.20220615-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
binutils (2.38-4ubuntu1) kinetic; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
binutils (2.38-3ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
binutils (2.38-2ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Available diffs

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
binutils (2.38-1ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in jammy-proposed
binutils (2.37.90.20220207-1ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Build from upstream sources.

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
binutils (2.37.90.20220130-0ubuntu2) jammy; urgency=medium

  * Also ignore regressions for the cross packages.

 -- Matthias Klose <email address hidden>  Sun, 30 Jan 2022 16:59:06 +0100
175 of 605 results