Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1178725 - (CVE-2014-9482) CVE-2014-9482 libdwarf: use-after-free when parsing a crafted ELF file
CVE-2014-9482 libdwarf: use-after-free when parsing a crafted ELF file
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20141230,reported=2...
: Security
Depends On: 1177758
Blocks: 1225848
  Show dependency treegraph
 
Reported: 2015-01-05 07:09 EST by Vasyl Kaigorodov
Modified: 2015-06-18 14:46 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-06-18 14:46:19 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vasyl Kaigorodov 2015-01-05 07:09:52 EST
Use-after-free vulnerability was reported in libdwarf [1].
If dwarfdump is passed a corrupted ELF file, 'Dwarf_Debug' object will be freed in 'dwarf_elf_object_access_finish', but then this object is being referenced later in 'print_error':

--------------------------------
res = dwarf_object_init(binary_interface, errhand, errarg,
        ret_dbg, error);
    if (res != DW_DLV_OK){
        dwarf_elf_object_access_finish(binary_interface);
    }
--------------------------------
...
--------------------------
    if (obj->object) {
        dwarf_elf_object_access_internals_t *internals =
            (dwarf_elf_object_access_internals_t *)obj->object;
--------------------------

[1]: https://bugzilla.redhat.com/show_bug.cgi?id=1177758
Comment 1 Martin Prpič 2015-01-06 04:20:10 EST
MITRE assigned CVE-2014-9482 to this issue: http://seclists.org/oss-sec/2015/q1/20
Comment 2 Orion Poplawski 2015-01-23 23:06:28 EST
It appears to me that the EPEL6 version - 20140413 - is vulnerable to this as well.  I believe that upstream commit 9a2dfcfe020314672086e44bddd81c155cba2a6d is the primary fix for this, but it does not apply cleanly to 20140413.

I don't want to update to the latest release due to apparent ABI incompatibilities - see http://upstream.rosalinux.ru/versions/libdwarf.html

Note You need to log in before you can comment on or make changes to this bug.