Integer overflow in the checksection function in dwarfbegin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
{
"binaries": [
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "elfutils"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libasm-dev"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libasm1"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libdw-dev"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libdw1"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libelf-dev"
},
{
"binary_version": "0.158-0ubuntu5.1",
"binary_name": "libelf1"
}
],
"availability": "No subscription required"
}