Bug 1296986 (CVE-2015-8750)

Summary: CVE-2015-8750 libdwarf: NULL pointer dereference in dwarf_utils.c
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: carnil, fche, orion
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:47:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1294264, 1296989    
Bug Blocks:    

Description Andrej Nemec 2016-01-08 15:49:44 UTC
A null pointer dereference was found in the libdwarf package. This flaw may result in a crash with specially crafted input.

This was originally filed as bug 1294264. 

CVE assignment: 

http://seclists.org/oss-sec/2016/q1/45

Upstream patch: 

11750a2838e52953013e3114ef27b3c7b1780697
in 
git://git.code.sf.net/p/libdwarf/code

Also available on GitHub:

https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697

Comment 1 Andrej Nemec 2016-01-08 15:51:31 UTC
Created libdwarf tracking bugs for this issue:

Affects: epel-6 [bug 1296989]

Comment 2 Tom Hughes 2016-01-08 15:51:37 UTC
BTW my github repo is not the upstream... The upstream is the repo at git://git.code.sf.net/p/libdwarf/code.

Comment 3 Andrej Nemec 2016-01-08 15:57:41 UTC
(In reply to Tom Hughes from comment #2)
> BTW my github repo is not the upstream... The upstream is the repo at
> git://git.code.sf.net/p/libdwarf/code.

Thanks, I updated comment #0.