MGASA-2020-0112

Source
https://advisories.mageia.org/MGASA-2020-0112.html
Import Source
https://advisories.mageia.org/MGASA-2020-0112.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0112
Related
Published
2020-03-06T16:13:58Z
Modified
2022-02-17T18:21:47Z
Summary
Updated binutils packages fix security vulnerabilities
Details

This update provides the binutils 2.33.1 and fixes at least the following security issues:

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simpleobjectelf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap- based buffer overflow (CVE-2019-14250).

findabstractinstance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file )CVE-2019-17450).

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in bfddwarf2findnearest_line in dwarf2.c, as demonstrated by nm (CVE-2019-17451).

GNU binutils gold linker is affected by Improper Input Validation, Signed/ Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The attack vector is: An ELF file with an invalid e_shoff header field must be opened (CVE-2019-1010204).

For more information about the other changes and additional features of binutils / gas / ld in this update, see the referenced sourceware.org NEWS links.

References
Credits

Affected packages