Back to bug 2126424
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-09-13 12:18:46 UTC | CC | caswilli, fche, kaycoth | |
| Tom Hughes | 2022-09-13 12:18:53 UTC | CC | tom | |
| TEJ RATHI | 2022-09-13 12:20:07 UTC | Blocks | 2123783 | |
| TEJ RATHI | 2022-09-13 12:20:52 UTC | Depends On | 2126426 | |
| TEJ RATHI | 2022-09-13 13:18:53 UTC | Doc Text | A double-free vulnerability was found in libdwarf's dwarf_expand_frame_instructions() function of dwarf_frame.c file. A carefully crafted object file could cause 'dwarfdump' utility to do a double free in handling an error condition. This issue could cause a segmentation violation or other major error, terminating the calling application and resulting in denial of service. | |
| RaTasha Tillery-Smith | 2022-09-13 14:44:32 UTC | Doc Text | A double-free vulnerability was found in libdwarf's dwarf_expand_frame_instructions() function of dwarf_frame.c file. A carefully crafted object file could cause 'dwarfdump' utility to do a double free in handling an error condition. This issue could cause a segmentation violation or other major error, terminating the calling application and resulting in denial of service. | A double-free vulnerability was found in libdwarf's dwarf_expand_frame_instructions() function of the dwarf_frame.c file. A carefully crafted object file could cause the ‘dwarfdump' utility to do a double free in handling an error condition. This issue could cause a segmentation violation or other major error, terminating the calling application and resulting in a denial of service. |
| Red Hat Bugzilla | 2023-07-07 08:29:35 UTC | Assignee | security-response-team | nobody |
Back to bug 2126424