CVE-2014-0172

NameCVE-2014-0172
DescriptionInteger overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs744017

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
elfutils (PTS)buster0.176-1.1fixed
buster (security)0.176-1.1+deb10u1fixed
bullseye0.183-1fixed
bookworm0.188-2.1fixed
trixie0.190-1fixed
sid0.191-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
elfutilssourcesqueeze(not affected)
elfutilssourcewheezy(not affected)
elfutilssource(unstable)0.158-1low744017

Notes

[squeeze] - elfutils <not-affected> (Affected code introduced in 0.153)
[wheezy] - elfutils <not-affected> (Affected code introduced in 0.153)

Search for package or bug name: Reporting problems