Summary: | <sys-devel/binutils-2.33: Insufficient sanitization in simple-object-elf.c (CVE-2019-14250) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | D'juan McDonald (domhnall) <flopwiki> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=711324 | ||
Whiteboard: | A3 [glsa+ masked cve] | ||
Package list: | Runtime testing required: | --- |
Description
D'juan McDonald (domhnall)
2019-07-24 15:06:22 UTC
@maintainer(s), did this get patched already, and if so, what patchset? Thanks! CVE-2019-14444 (https://nvd.nist.gov/vuln/detail/CVE-2019-14444): apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf. CVE-2019-14250 (https://nvd.nist.gov/vuln/detail/CVE-2019-14250): An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. (In reply to Sam James (sec padawan) from comment #1) > @maintainer(s), did this get patched already, and if so, what patchset? > Thanks! ping This issue was resolved and addressed in GLSA 202007-39 at https://security.gentoo.org/glsa/202007-39 by GLSA coordinator Sam James (sam_c). |