CVE-2014-0172

NameCVE-2014-0172
DescriptionInteger overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs744017

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
elfutils (PTS)jessie, jessie (lts)0.159-4.2+deb8u2fixed
stretch (security)0.168-1+deb9u1fixed
stretch (lts), stretch0.168-1+deb9u2fixed
buster0.176-1.1fixed
buster (security)0.176-1.1+deb10u1fixed
bullseye0.183-1fixed
bookworm0.188-2.1fixed
sid, trixie0.191-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
elfutilssourcesqueeze(not affected)
elfutilssourcewheezy(not affected)
elfutilssource(unstable)0.158-1low744017

Notes

[squeeze] - elfutils <not-affected> (Affected code introduced in 0.153)
[wheezy] - elfutils <not-affected> (Affected code introduced in 0.153)

Search for package or bug name: Reporting problems