CVE-2015-3239

Impact:
Low
Public Date:
2015-06-20
CWE:
CWE-193
Bugzilla:
1232265: CVE-2015-3239 libunwind: off-by-one in dwarf_to_unw_regnum()
An off-by-one array indexing error was found in the libunwind API, which could cause an error when reading untrusted binaries or dwarf debug info data. Red Hat products do not call the API in this way; and it is unlikely that any exploitable attack vector exists in current builds or supported usage.

Find out more about CVE-2015-3239 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 3.3
Base Metrics AV:L/AC:M/Au:N/C:P/I:P/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 (libunwind) RHSA-2015:1768 2015-09-10
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (libunwind) RHSA-2015:1769 2015-09-10
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (libunwind) RHSA-2015:1675 2015-08-24

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux mongodb24-libunwind Will not fix
Red Hat Software Collections for Red Hat Enterprise Linux rh-mongodb26-libunwind Will not fix
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 libunwind Not affected
Red Hat Enterprise Linux 7 libunwind Not affected
Red Hat Enterprise Linux 5 libunwind Not affected
Red Hat Ceph Storage 1.2 libunwind Will not fix
Red Hat Ceph Storage 1.1 libunwind Will not fix
OpenStack 6 Installer for RHEL 7 libunwind Will not fix

Acknowledgements

This issue was discovered by Paolo Bonzini of Red Hat.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.