Bug 2031177 (CVE-2021-37322)

Summary: CVE-2021-37322 binutils: use-after-free in c++filt in cplus-dem.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ailan, aoliva, bdettelb, caswilli, dvlasenk, elima, erik-fedora, fjansen, fweimer, jakub, jwong, kaycoth, klember, ktietz, manisandro, marcandre.lureau, mcermak, mnewsome, mpolacek, mprchlik, nickc, ohudlick, rjones, sipoyare, virt-maint, vmugicag
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A use-after-free flaw was found in binutils’ cxxfilt functionality. The attack needs to be initiated locally where an attacker could convince a victim to read a specially crafted file which is processed by cxxfilt, leading to disclosure of memory and possibly leading to the execution of arbitrary code or causing the utility to crash.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2033453    
Bug Blocks: 2031178    

Description Guilherme de Almeida Suckevicz 2021-12-10 17:22:06 UTC
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

Reference:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188