binutils-2.30-108.el8.1

エラータID: AXSA:2022-2955:01

Release date: 
Friday, January 14, 2022 - 12:19
Subject: 
binutils-2.30-108.el8.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

Security Fix(es):

* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)

The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters:

Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled.

Using "\--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used.
Using "\--unicode=locale" will display them according to the current locale.
Using "\--unicode=hex" will display them as hex byte values.
Using "\--unicode=escape" will display them as Unicode escape sequences.
Using "\--unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-42574
An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. binutils-2.30-108.el8.1.src.rpm
    MD5: 97341e72700c89b9dd845bef87a32d2b
    SHA-256: 6443fb3d947d9a49c6e028f985dbf6803297af585e80e779e5c3ba5f6fa56224
    Size: 20.03 MB

Asianux Server 8 for x86_64
  1. binutils-2.30-108.el8.1.x86_64.rpm
    MD5: df3e335edc55a2f455df3db9440c47b9
    SHA-256: cef30b1879f8bcb445bf5d8dc82108b93940e79a6bde0b0f7f83fa799f47c6cf
    Size: 5.81 MB
  2. binutils-devel-2.30-108.el8.1.x86_64.rpm
    MD5: 00c919da24f7333a044c739ca3de3fc1
    SHA-256: c83e77b694e01cbca5dc57673a7fd10fcba73054156ee9992acd439e273c0156
    Size: 3.66 MB
  3. binutils-devel-2.30-108.el8.1.i686.rpm
    MD5: db8680db3d44570dcfd33f9af8bf3025
    SHA-256: de9de4420de96b5958d6545e5ca62c8badfd2aa69b9fcfb56efcfde68abb18e0
    Size: 3.51 MB