From ${URL} : The libdw library provides support for accessing DWARF debugging information inside ELF files. An integer overflow flaw in check_section(), leading to a heap-based buffer overflow, was found in the libdw library. A malicious ELF file could cause an application using libdw (such as eu-readelf) to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team. @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-0172 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172): Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
This was pushed in to a patch upstream: https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-April/003921.html RedHat released it under: elfutils-0.158-3 Maintainer(s): after the bump please let us know when the ebuild is ready for stabilization.
(In reply to Yury German from comment #3) elfutils-0.159 has been in the tree since August, and 0.160 since September. the latter is fine for stabilization.
This issue was resolved and addressed in GLSA 201612-32 at https://security.gentoo.org/glsa/201612-32 by GLSA coordinator Aaron Bauman (b-man).