Name | CVE-2018-12698 |
Description | demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
binutils (PTS) | jessie, jessie (lts) | 2.25-5+deb8u2 | vulnerable |
| stretch (lts), stretch | 2.28-5+deb9u1 | vulnerable |
| buster, buster (lts) | 2.31.1-16+deb10u1 | vulnerable |
| bullseye | 2.35.2-2 | fixed |
| bookworm | 2.40-2 | fixed |
| sid, trixie | 2.43.1-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
binutils | source | (unstable) | 2.32.51.20190707-1 | unimportant | | |
Notes
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
Fixed by: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03e51746ed98d9106803f6009ebd71ea670ad3b9
binutils not covered by security support
[wheezy] - binutils <ignored> (Minor issue)