Summary: | <dev-libs/elfutils-0.159: integer overflow, leading to a heap-based buffer overflow in libdw (CVE-2014-0172) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1085663 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1085663 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 563250 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-04-09 14:09:34 UTC
CVE-2014-0172 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172): Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow. CVE-2014-0172 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172): Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow. This was pushed in to a patch upstream: https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-April/003921.html RedHat released it under: elfutils-0.158-3 Maintainer(s): after the bump please let us know when the ebuild is ready for stabilization. (In reply to Yury German from comment #3) elfutils-0.159 has been in the tree since August, and 0.160 since September. the latter is fine for stabilization. This issue was resolved and addressed in GLSA 201612-32 at https://security.gentoo.org/glsa/201612-32 by GLSA coordinator Aaron Bauman (b-man). |