MGASA-2020-0112

Source
https://advisories.mageia.org/MGASA-2020-0112.html
Import Source
https://advisories.mageia.org/MGASA-2020-0112.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0112
Related
Published
2020-03-06T16:13:58Z
Modified
2022-02-17T18:21:47Z
Summary
Updated binutils packages fix security vulnerabilities
Details

This update provides the binutils 2.33.1 and fixes at least the following security issues:

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simpleobjectelf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap- based buffer overflow (CVE-2019-14250).

findabstractinstance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file )CVE-2019-17450).

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in bfddwarf2findnearest_line in dwarf2.c, as demonstrated by nm (CVE-2019-17451).

GNU binutils gold linker is affected by Improper Input Validation, Signed/ Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The attack vector is: An ELF file with an invalid e_shoff header field must be opened (CVE-2019-1010204).

For more information about the other changes and additional features of binutils / gas / ld in this update, see the referenced sourceware.org NEWS links.

References
Credits

Affected packages

Mageia:7 / binutils

Package

Name
binutils
Purl
pkg:rpm/mageia/binutils?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.33.1-1.mga7

Ecosystem specific

{
    "section": "core"
}