CVE-2014-0172

Publication date 11 April 2014

Last updated 24 July 2024


Ubuntu priority

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

Status

Package Ubuntu Release Status
elfutils 14.04 LTS trusty
Fixed 0.158-0ubuntu5.1
13.10 saucy
Fixed 0.157-1ubuntu1.1
12.10 quantal
Fixed 0.153-1ubuntu1.1
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
elfutils

References

Related Ubuntu Security Notices (USN)

Other references