(https://nvd.nist.gov/vuln/detail/CVE-2019-14250): An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. Gentoo Security Padawan (domhnall)
@maintainer(s), did this get patched already, and if so, what patchset? Thanks!
CVE-2019-14444 (https://nvd.nist.gov/vuln/detail/CVE-2019-14444): apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf. CVE-2019-14250 (https://nvd.nist.gov/vuln/detail/CVE-2019-14250): An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
(In reply to Sam James (sec padawan) from comment #1) > @maintainer(s), did this get patched already, and if so, what patchset? > Thanks! ping
This issue was resolved and addressed in GLSA 202007-39 at https://security.gentoo.org/glsa/202007-39 by GLSA coordinator Sam James (sam_c).