Bug 2450345

Summary: CVE-2025-66866 gdb: BinUtils: Denial of Service via crafted PE file [fedora-42]
Product: [Fedora] Fedora Reporter: Marco Benatto <mbenatto>
Component: gdbAssignee: Kevin Buettner <kevinb>
Status: CLOSED DEFERRED QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 42CC: ahajkova, fweimer, guinevere, jan, keiths, kevinb, mcermak, mkolar, suraj.ghimire7
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["1724afa3-cb81-404d-8b81-73f6bbe57b01"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-03-24 19:44:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2425830    

Description Marco Benatto 2026-03-23 14:28:57 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Kevin Buettner 2026-03-24 19:44:31 UTC
Closing, as this is not a GDB security vulnerability per the GDB Security Policy
(SECURITY.txt). A denial of service when demangling a PE file does not cross
the privilege boundaries that the GDB project considers security bugs.

Per SECURITY.txt section "What Is Not A Security Bug":
  "denial of service attacks targeting GDB itself ... are not considered a
   security bug"

and

  "simply triggering an internal error in GDB is not considered a security bug,
   since GDB has detected an issue and handled it in a non-exploitable manner."

Additionally, SECURITY.txt notes:
  "due to there being already known bugs in GDB relating to undefined behavior
   triggered from malformed programs, further bugs in this area should still be
   reported, but are unlikely to be given high priority."

While this is a legitimate bug in libiberty's cp-demangle.c (shared with binutils),
it does not warrant a CVE or special security handling. The fix will be addressed
upstream and will reach Fedora GDB through the normal release process. A backport
is not warranted given the low severity and nature of the issue.