Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 690590 (CVE-2019-14250) - <sys-devel/binutils-2.33: Insufficient sanitization in simple-object-elf.c (CVE-2019-14250)
Summary: <sys-devel/binutils-2.33: Insufficient sanitization in simple-object-elf.c (C...
Status: RESOLVED FIXED
Alias: CVE-2019-14250
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://gcc.gnu.org/bugzilla/show_bug...
Whiteboard: A3 [glsa+ masked cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-07-24 15:06 UTC by D'juan McDonald (domhnall)
Modified: 2020-07-27 00:51 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-07-24 15:06:22 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2019-14250):
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.




Gentoo Security Padawan
(domhnall)
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-26 00:53:35 UTC
@maintainer(s), did this get patched already, and if so, what patchset? Thanks!
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2020-04-26 00:53:51 UTC
CVE-2019-14444 (https://nvd.nist.gov/vuln/detail/CVE-2019-14444):
  apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer
  overflow that allows attackers to trigger a write access violation (in
  byte_put_little_endian function in elfcomm.c) via an ELF file, as
  demonstrated by readelf.

CVE-2019-14250 (https://nvd.nist.gov/vuln/detail/CVE-2019-14250):
  An issue was discovered in GNU libiberty, as distributed in GNU Binutils
  2.32. simple_object_elf_match in simple-object-elf.c does not check for a
  zero shstrndx value, leading to an integer overflow and resultant heap-based
  buffer overflow.
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-06-20 01:57:55 UTC
(In reply to Sam James (sec padawan) from comment #1)
> @maintainer(s), did this get patched already, and if so, what patchset?
> Thanks!

ping
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2020-07-27 00:51:34 UTC
This issue was resolved and addressed in
 GLSA 202007-39 at https://security.gentoo.org/glsa/202007-39
by GLSA coordinator Sam James (sam_c).