MGASA-2014-0177

Source
https://advisories.mageia.org/MGASA-2014-0177.html
Import Source
https://advisories.mageia.org/MGASA-2014-0177.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0177
Related
Published
2014-04-16T13:16:12Z
Modified
2014-04-16T13:16:06Z
Summary
Updated elfutils package fixes CVE-2014-0172
Details

Updated elfutils packages fix security vulnerability:

The libdw library provides support for accessing DWARF debugging information inside ELF files. An integer overflow flaw in check_section(), leading to a heap-based buffer overflow, was found in the libdw library. A malicious ELF file could cause an application using libdw (such as eu-readelf) to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-0172).

References
Credits

Affected packages

Mageia:4 / elfutils

Package

Name
elfutils
Purl
pkg:rpm/mageia/elfutils?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.157-3.1.mga4

Ecosystem specific

{
    "section": "core"
}

Database specific

source

"https://advisories.mageia.org/MGASA-2014-0177.json"

Mageia:3 / elfutils

Package

Name
elfutils
Purl
pkg:rpm/mageia/elfutils?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.155-2.1.mga3

Ecosystem specific

{
    "section": "core"
}

Database specific

source

"https://advisories.mageia.org/MGASA-2014-0177.json"