Your submission was sent successfully! Close

CVE-2019-14250

Published: 24 July 2019

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
binutils
Launchpad, Ubuntu, Debian
bionic
Released (2.30-21ubuntu1~18.04.3)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(2.33-2ubuntu1)
focal Not vulnerable
(2.34-5ubuntu1)
groovy Not vulnerable
(2.34-5ubuntu1)
hirsute Not vulnerable
(2.34-5ubuntu1)
impish Not vulnerable
(2.34-5ubuntu1)
jammy Not vulnerable
(2.34-5ubuntu1)
kinetic Not vulnerable
(2.34-5ubuntu1)
precise Ignored
(end of ESM support, was needs-triage)
trusty Needs triage

upstream
Released (2.33)
xenial
Released (2.26.1-1ubuntu1~16.04.8+esm1)
Patches:
other: https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
vendor: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=b1bc0f50350a568e67ed731c4fec2c72847f15fe

libiberty
Launchpad, Ubuntu, Debian
bionic
Released (20170913-1ubuntu0.1)
cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(20190907-1)
focal Not vulnerable
(20190907-1)
groovy Not vulnerable
(20190907-1)
hirsute Not vulnerable
(20190907-1)
impish Not vulnerable
(20190907-1)
jammy Not vulnerable
(20190907-1)
kinetic Not vulnerable
(20190907-1)
precise Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (20160215-1ubuntu0.3)
Patches:


upstream: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=b1bc0f50350a568e67ed731c4fec2c72847f15fe