Integer overflow in the checksection function in dwarfbegin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.158-0ubuntu5.1", "binary_name": "elfutils" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libasm-dev" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libasm1" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libdw-dev" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libdw1" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libelf-dev" }, { "binary_version": "0.158-0ubuntu5.1", "binary_name": "libelf1" } ] }