Bug 2122627 (CVE-2021-3826)
| Summary: | CVE-2021-3826 libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | ahajkova, ailan, aoliva, dmalcolm, dvlasenk, elima, erik-fedora, fedora, fweimer, gdb-bugs, guinevere, henrik, jakub, jan, jwakely, keiths, kevinb, klember, ktietz, law, manisandro, marcandre.lureau, mcermak, michal.skrivanek, mnewsome, mperina, mpolacek, mprchlik, nickc, ohudlick, patrick, pmuldoon, rebus, rjones, rschirone91, sbonazzo, sergiodj, sipoyare, virt-maint, yahmad |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-05-23 16:41:59 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2132586, 2132587, 2132588, 2132589, 2132590, 2132591, 2132592, 2132593, 2132594, 2132595, 2132596, 2132597, 2132598, 2132599, 2132600, 2132601, 2132602, 2132603, 2149659 | ||
| Bug Blocks: | 2122629 | ||
|
Description
Pedro Sampaio
2022-08-30 13:21:15 UTC
Thanks for the "heads-up"! insight was already OK in Fedora>=36. In F35, insight-13.0.50.20220502-1.fc35 fixes the problem: https://koji.fedoraproject.org/koji/buildinfo?buildID=2055285 currently testing pending. FEDORA-2022-8e1df11a7a has been pushed to the Fedora 35 stable repository. If problem still persists, please make note of it in this bug report. Created binutils tracking bugs for this issue: Affects: fedora-all [bug 2132594] Created gcc tracking bugs for this issue: Affects: fedora-all [bug 2132586] Created gdb tracking bugs for this issue: Affects: fedora-all [bug 2132595] Created mingw-binutils tracking bugs for this issue: Affects: fedora-all [bug 2132596] Created mingw-gcc tracking bugs for this issue: Affects: fedora-all [bug 2132587] Created mingw-gdb tracking bugs for this issue: Affects: fedora-all [bug 2132603] This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:3269 https://access.redhat.com/errata/RHSA-2023:3269 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3826 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6372 https://access.redhat.com/errata/RHSA-2023:6372 |