{"id":"MGASA-2015-0027","summary":"Updated binutils packages fix security vulnerabilities","details":"Updated binutils packages fix security vulnerabilities:\n\nMultiple security issues have been found in binutils. These vulnerabilities\ninclude multiple memory safety errors, buffer overflows, use-after-frees and\nother implementation errors may lead to the execution of arbitrary code, the\nbypass of security restrictions, path traversal attack or denial of service\n(CVE-2014-8484, CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503,\nCVE-2014-8504, CVE-2014-8737, CVE-2014-8738).\n","modified":"2026-04-16T06:26:30.665306241Z","published":"2015-01-19T16:47:36Z","upstream":["CVE-2014-8484","CVE-2014-8485","CVE-2014-8501","CVE-2014-8502","CVE-2014-8503","CVE-2014-8504","CVE-2014-8737","CVE-2014-8738"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0027.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15022"},{"type":"WEB","url":"https://www.debian.org/security/2015/dsa-3123"}],"affected":[{"package":{"name":"binutils","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/binutils?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.24-3.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0027.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}