Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3826

Опубликовано: 01 сент. 2022
Источник: debian
EPSS Низкий

Описание

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.37.50.20220121-1package
libibertyfixed20220713-1package
libibertyno-dsabullseyepackage
libibertyno-dsabusterpackage

Примечания

  • https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579985.html

  • https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=5481040197402be6dfee265bd2ff5a4c88e30505

  • binutils not covered by security support

EPSS

Процентиль: 58%
0.00368
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 7.5
redhat
почти 4 года назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 6.5
nvd
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 7.5
github
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

oracle-oval
почти 2 года назад

ELSA-2023-6372: gdb security update (LOW)

EPSS

Процентиль: 58%
0.00368
Низкий