QID 751313
Date Published: 2021-11-04
QID 751313: SUSE Enterprise Linux Security Update for binutils (SUSE-SU-2021:3593-1)
This update for binutils fixes the following issues: update to binutils 2.37: * the gnu binutils sources now requires a c99 compiler and library to build.
* support for the arm-symbianelf format has been removed.
* support for realm management extension (rme) for aarch64 has been added.
* a new linker option -z report-relative-reloc for x86 elf targets has been added to report dynamic relative relocations.
* a new linker option -z start-stop-gc has been added to disable special treatment of __start_*/__stop_* references when --gc-sections.
* a new linker options -bno-symbolic has been added which will cancel the -bsymbolic and -bsymbolic-functions options.
* the readelf tool has a new command line option which can be used to specify how the numeric values of symbols are reported.
--sym-base=0|8|10|16 tells readelf to display the values in base 8, base 10 or base 16.
a sym base of 0 represents the default action of displaying values under 10000 in base 10 and values above that in base 16.
* a new format has been added to the nm program.
specifying --format=just-symbols (or just using -j) will tell the program to only display symbol names and nothing else.
* a new command line option --keep-section-symbols has been added to objcopy and strip.
this stops the removal of unused section symbols when the file is copied.
removing these symbols saves space, but sometimes they are needed by other tools.
* the --weaken, --weaken-symbol and --weaken-symbols options supported by objcopy now make undefined symbols weak on targets that support weak symbols.
* readelf and objdump can now display and use the contents of .debug_sup sections.
* readelf and objdump will now follow links to separate debug info files by default.
this behaviour can be stopped via the use of the new -wn or --debug-dump=no-follow-links options for readelf and the -wn or --dwarf=no-follow-links options for objdump.
also the old behaviour can be restored by the use of the --enable-follow-debug-links=no configure time option.
the semantics of the =follow-links option have also been slightly changed.
when enabled, the option allows for the loading of symbol tables and string tables from the separate files which can be used to enhance the information displayed when dumping other sections, but it does not automatically imply that information from the separate files should be displayed.
if other debug section display options are also enabled (eg --debug-dump=info) then the contents of matching sections in both the main file and the separate debuginfo file *will* be displayed.
This is because in most cases the debug section will only be present in one of the files.
if however non-debug section display options are enabled (eg --sections) then the contents of matching parts of the separate debuginfo file will *not* be displayed.
this is because in most cases the user probably only wanted to load the symbol information from the separate debuginfo file.
in order to change this behaviour a new command line option --process-links can be used.
this will allow di0pslay options to applied to both the main file and any separate debuginfo files.
* nm has a new command line option: --quiet.
this suppresses "no symbols" diagnostic.
update to binutils 2.36: new features in the assembler: general: * when setting the link order attribute of elf sections, it is now possible to use a numeric section index instead of symbol name.
* added a .nop directive to generate a single no-op instruction in a target neutral manner.
* support non-absolute segment values for lcall and ljmp.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:3593-1 -
lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html
CVEs related to QID 751313
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:3593-1 | SUSE Enterprise Linux |
|