[Bug 1577553] Re: Apply gcc-4.8 updates to trusty-security pocket

Launchpad Bug Tracker 1577553 at bugs.launchpad.net
Tue May 17 01:04:24 UTC 2016

This bug was fixed in the package binutils - 2.24-5ubuntu14.1

binutils (2.24-5ubuntu14.1) trusty-security; urgency=medium

  * No-change rebuild in the trusty-security pocket to address issues
    building linux kernel and openjdk-7 security updates (LP: #1577553)

binutils (2.24-5ubuntu14) trusty-proposed; urgency=medium

  * SRU: LP: #1490352.
  * Fix -Bsymbolic-functions on arm64.

binutils (2.24-5ubuntu13) trusty-proposed; urgency=medium

  * SRU LP: #1311866.
  * Update from the 2.24 branch, 20141113.
    - Fix PR gold/16945, properly handle 64-bit GOT relocations on x86_64.
    - Fix PR gold/16900, an issue where first reserved word of GOT is not
      initialized if there is no PLT.
    - gold: Fix handling of __ehdr_start when it cannot be defined.
    - Apply mainline patches for ppc476 workaround.
    - Add binutils test cases for AArch64.
    - Disassembler fix on AArch64.
    - Fix PR ld/17047, crash in the bfd linker with MALLOC_PERTURB.
    - Fix PR ld/17277, ARM32, bogus DT_TEXTREL marker (and R_ARM_NONE)
      for PC-relative cross-section relocs.
    - [AArch64] Cortex-A53 erratum 835769 linker workaround.
  * Remove the aarch64-fix-instruction-mask, applied on the branch.
  * Fix PR gold/15639, -flto and ld.gold on ARM. LP: #1191909.
  * Use 64k for COMMONPAGESIZE on PPC. LP: #1412553.
  * Fix PR ld/16452, PR ld/16457, don't output symbol version definitions
    for non-DT_NEEDED. LP: #1248642.
  * Add powerpc target for ppc64el builds. Closes: #760395. LP: #1433238.
  * binutils-doc: Include all info files. LP: #1410780.
  * Fix PR ld/16715 (ARM), set st_value to zero for undefined symbols.
    LP: #1441961.

 -- Steve Beattie <sbeattie at ubuntu.com>  Mon, 02 May 2016 13:17:23 -0700

** Changed in: binutils (Ubuntu Trusty)
       Status: In Progress => Fix Released

** Changed in: gcc-4.8 (Ubuntu Trusty)
       Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-

You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to gcc-4.8 in Ubuntu.

  Apply gcc-4.8 updates to trusty-security pocket

Status in binutils package in Ubuntu:
Status in gcc-4.8 package in Ubuntu:
Status in binutils source package in Trusty:
  Fix Released
Status in gcc-4.8 source package in Trusty:
  Fix Released

Bug description:
  The version of gcc-4.8 in the 14.04 LTS release has a number of issues
  that have been addressed in the gcc-4.8 SRU that landed in trusty-
  updates. However, because they were not security related, it is not
  available in the trusty-security pocket and thus not available to
  packages being built for security updates. This is causing build
  failures for the linux kernel and openjdk-7 packages.

  The testing of the gcc-4.8 SRU was covered in

To manage notifications about this bug go to:

More information about the foundations-bugs mailing list