Bug 2102019 (CVE-2022-34299)

Summary: CVE-2022-34299 libdwarf: heap buffer over-read in dwarf_global_formref_b() in dwarf_form.c
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: caswilli, epel-packagers-sig, fche, jitesh.1337, kaycoth, michel, orion
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: libdwarf 0.4.1 Doc Type: If docs needed, set a value
Doc Text:
A buffer-overflow vulnerability was found in libdwarf's dwarf_global_formref_b() function in dwarf_form.c. A carefully crafted `.debug_info` causes libdwarf to read outside a buffer containing a Dwarf_Sig8 symbolic reference. This issue can cause a segmentation violation or other major error, terminating the calling application and resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2102021    
Bug Blocks: 2100818    

Description TEJ RATHI 2022-06-29 07:13:49 UTC
There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.


Comment 1 TEJ RATHI 2022-06-29 07:20:19 UTC
Created libdwarf tracking bugs for this issue:

Affects: fedora-all [bug 2102021]