-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-8e96009030 2021-04-03 00:47:48.204165 --------------------------------------------------------------------------------
Name : atasm Product : Fedora 33 Version : 1.09 Release : 1.fc33 URL : https://atari.miribilist.com/atasm/ Summary : 6502 cross-assembler Description : ATasm is a 6502 command-line cross-assembler that is compatible with the original Mac/65 macro-assembler released by OSS software. Code development can now be performed using "modern" editors and compiles with lightning speed.
-------------------------------------------------------------------------------- Update Information:
- update to 1.09 -------------------------------------------------------------------------------- ChangeLog:
* Thu Mar 25 2021 Dan Hor��k <dan[at]danny.cz> - 1.09-1 - update to 1.09 - CVE-2019-19785 CVE-2019-19786 CVE-2019-19787 * Tue Jan 26 2021 Fedora Release Engineering releng@fedoraproject.org - 1.08-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Thu Jan 21 2021 Dan Hor��k <dan[at]danny.cz> - 1.08-7 - pass correct linker flags -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1786344 - CVE-2019-19785 atasm: stack-based buffer overflow in to_comma in asm.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1786344 [ 2 ] Bug #1786346 - CVE-2019-19785 atasm: stack-based buffer overflow in to_comma in asm.c [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1786346 [ 3 ] Bug #1786347 - CVE-2019-19786 atasm: stack-based buffer overflow in parse_expr in setparse.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1786347 [ 4 ] Bug #1786349 - CVE-2019-19786 atasm: stack-based buffer overflow in parse_expr in setparse.c [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1786349 [ 5 ] Bug #1786605 - CVE-2019-19787 atasm: stack-based buffer overflow in get_signed_expression in setparse.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1786605 [ 6 ] Bug #1786607 - CVE-2019-19787 atasm: stack-based buffer overflow in get_signed_expression in setparse.c [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1786607 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-8e96009030' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------