Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3826

Опубликовано: 01 сент. 2022
Источник: debian
EPSS Низкий

Описание

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.37.50.20220121-1package
libibertyfixed20220713-1package
libibertyno-dsabullseyepackage
libibertyno-dsabusterpackage

Примечания

  • https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579985.html

  • https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=5481040197402be6dfee265bd2ff5a4c88e30505

  • binutils not covered by security support

EPSS

Процентиль: 62%
0.00428
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 7.5
redhat
больше 4 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 6.5
nvd
больше 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 7.5
github
больше 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

oracle-oval
около 2 лет назад

ELSA-2023-6372: gdb security update (LOW)

EPSS

Процентиль: 62%
0.00428
Низкий