Bug 2122627 (CVE-2021-3826)
Summary: | CVE-2021-3826 libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | ahajkova, ailan, aoliva, blarsen, dmalcolm, dvlasenk, elima, erik-fedora, fedora, fweimer, gdb-bugs, henrik, jakub, jan, jwakely, keiths, kevinb, klember, ktietz, law, manisandro, marcandre.lureau, mcermak, michal.skrivanek, mnewsome, mperina, mpolacek, mprchlik, nickc, ohudlick, patrick, pmuldoon, rebus, rjones, rschirone91, sergiodj, sipoyare, virt-maint, yahmad |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-23 16:41:59 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2132586, 2132587, 2132588, 2132589, 2132590, 2132591, 2132592, 2132593, 2132594, 2132595, 2132596, 2132597, 2132598, 2132599, 2132600, 2132601, 2132602, 2132603, 2149659 | ||
Bug Blocks: | 2122629 |
Description
Pedro Sampaio
2022-08-30 13:21:15 UTC
Thanks for the "heads-up"! insight was already OK in Fedora>=36. In F35, insight-13.0.50.20220502-1.fc35 fixes the problem: https://koji.fedoraproject.org/koji/buildinfo?buildID=2055285 currently testing pending. FEDORA-2022-8e1df11a7a has been pushed to the Fedora 35 stable repository. If problem still persists, please make note of it in this bug report. Created binutils tracking bugs for this issue: Affects: fedora-all [bug 2132594] Created gcc tracking bugs for this issue: Affects: fedora-all [bug 2132586] Created gdb tracking bugs for this issue: Affects: fedora-all [bug 2132595] Created mingw-binutils tracking bugs for this issue: Affects: fedora-all [bug 2132596] Created mingw-gcc tracking bugs for this issue: Affects: fedora-all [bug 2132587] Created mingw-gdb tracking bugs for this issue: Affects: fedora-all [bug 2132603] This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:3269 https://access.redhat.com/errata/RHSA-2023:3269 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3826 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6372 https://access.redhat.com/errata/RHSA-2023:6372 |