Описание
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| binutils | fixed | 2.32.51.20190707-1 | package |
Примечания
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84950
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
binutils not covered by security support
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1910070b298052d7ca8e4024891465824588c1e9 (binutils-2_32)
Связанные уязвимости
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.
Уязвимость функции remember_Ktype компонента cplus-dem.c программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании