First published: Wed Sep 22 2021(Updated: )
A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/devtoolset | <12-binutils-0:2.36.1-6.el7 | 12-binutils-0:2.36.1-6.el7 |
GNU GCC | =11.2 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-3826.
The severity of CVE-2021-3826 is high with a CVSS score of 7.5.
CVE-2021-3826 is a heap/stack buffer overflow in the dlang_lname function in libiberty, allowing attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
The affected software packages include devtoolset 12-binutils-0:2.36.1-6.el7, GNU GCC 11.2, and Fedora versions 35, 36, and 37.
To fix CVE-2021-3826, it is recommended to update to the latest version of the affected software packages provided by the respective vendors.