|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2021-33294: elfutils: hang while process crafted file | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Leroy <thomas.leroy> |
| Component: | Incidents | Assignee: | Michael Matz <matz> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P3 - Medium | CC: | matz, security-team, stoyan.manolov, tonyj |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/372807/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2021-33294:2.5:(AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Thomas Leroy
2023-07-19 09:29:25 UTC
Should be affected: - SUSE:SLE-12:Update - SUSE:SLE-15-SP3:Update - SUSE:SLE-15:Update I'm not the maintainer of elfutils. (In reply to Tony Jones from comment #2) > I'm not the maintainer of elfutils. According to IBS: $ isc maintainer -e -A elfutils Defined in package: SUSE:SLE-11-SP1:GA/elfutils bugowner of elfutils : tonyj@suse.com maintainer of elfutils : - Defined in package: SUSE:SLE-11:GA/elfutils bugowner of elfutils : tonyj@suse.com maintainer of elfutils : - I handed maintenance of elfutils over to the toolchain team several years ago. I have no idea why the maintainer hasn't been updated. Ask Matz. Please dispute the CVE. Like with binutils fuzzing it doesn't make sense to handle this as a security bug. If you get a hang with 'eu-readelf' on a crafted input file you got from the internet then the right way of action is "don't do that". I will cite from upstream bug report: ------------------ Apparently someone created a CVE for this bug: https://nvd.nist.gov/vuln/detail/CVE-2021-33294 Note that we don't consider this a security issue: https://sourceware.org/cgit/elfutils/tree/SECURITY Since most elfutils tools are run in short-lived, local, interactive, development context rather than remotely "in production", we generally treat malfunctions as ordinary bugs rather than security vulnerabilities. ------------------ I could handle this in a similar way to binutils and update elfutils from time to time wholesale. I could also backport the patch in this specific instance, it seems simple enough. But I fear that would set a precedent I don't want to follow. I don't want to risk the stability of our stuff based on totally non-sense CVEs. So... I would close this as INVALID or WONTFIX, but that needs to be done by the security team. classified as "Wont Fix". i added a note to elfutils SUSE considers elfutils a developer tool which does not receive untrusted input. Code processed by elfutils is being executed in any normal scenario, so security exploits could just inject regular binary code. For this reason we update elfutils ocassionaly to the current stable version to catch up on features and bugfixes. If you are processing untrusted binary code with elfutils we recommend doing so on a seperate system or VM. |