Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46049: n/a

0
Medium
VulnerabilityCVE-2023-46049cvecve-2023-46049
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

LLVM 15.0.0 has a NULL pointer dereference in the parseOneMetadata() function via a crafted pdflatex.fmt file (or perhaps a crafted .o file) to llvm-lto. NOTE: this is disputed because the relationship between pdflatex.fmt and any LLVM language front end is not explained, and because a crash of the llvm-lto application should be categorized as a usability problem.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:59:26 UTC

Technical Analysis

CVE-2023-46049 is a vulnerability identified in LLVM version 15.0.0, specifically within the parseOneMetadata() function used by the llvm-lto tool, which is part of the LLVM Link Time Optimization process. The vulnerability arises from a NULL pointer dereference triggered by processing a specially crafted pdflatex.fmt file or potentially a crafted object (.o) file. This causes llvm-lto to crash, resulting in a denial of service condition. The exact connection between pdflatex.fmt—a format file used by the TeX typesetting system—and LLVM's language front ends is not clearly explained, leading to some dispute about the impact classification. The vulnerability is categorized under CWE-476 (NULL Pointer Dereference), which typically leads to application crashes or instability. The CVSS 3.1 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity, no privileges required, no user interaction, and limited impact confined to confidentiality loss without integrity or availability compromise. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability primarily affects environments where llvm-lto processes untrusted or malformed input files, potentially disrupting build or compilation workflows.

Potential Impact

For European organizations, the primary impact of CVE-2023-46049 is operational disruption due to denial of service in build or compilation pipelines that utilize LLVM 15.0.0's llvm-lto tool. This could delay software development, testing, or deployment activities, especially in sectors heavily reliant on LLVM toolchains such as software development firms, embedded systems manufacturers, and research institutions. Confidentiality and integrity of data are not directly impacted, reducing the risk of data breaches or code tampering. However, repeated crashes could lead to productivity losses and increased troubleshooting overhead. Organizations using automated build systems or continuous integration pipelines that incorporate llvm-lto should be aware of this vulnerability to avoid unexpected failures. Since no exploits are known in the wild, the immediate risk is low, but targeted attacks or accidental crashes from malformed inputs remain possible. The lack of a patch means organizations must rely on procedural mitigations until a fix is available.

Mitigation Recommendations

1. Avoid processing untrusted or unauthenticated pdflatex.fmt or .o files with llvm-lto until a patch is released. 2. Implement input validation and sanitization in build pipelines to detect and reject malformed or suspicious files before they reach llvm-lto. 3. Monitor LLVM project communications and security advisories closely for any forthcoming patches or updates addressing this vulnerability. 4. Use containerization or sandboxing techniques to isolate build environments, limiting the impact of potential crashes on broader systems. 5. Incorporate robust error handling and automated recovery mechanisms in continuous integration workflows to minimize disruption from llvm-lto crashes. 6. Consider temporarily downgrading to a prior LLVM version if feasible and if it does not contain this vulnerability. 7. Educate development teams about the vulnerability and encourage cautious handling of input files related to llvm-lto processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47376d939959c8021b1b

Added to database: 11/4/2025, 6:34:31 PM

Last enriched: 11/4/2025, 6:59:26 PM

Last updated: 11/5/2025, 2:12:40 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats