CVE-2021-3826

NameCVE-2021-3826
DescriptionHeap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
binutils (PTS)jessie, jessie (lts)2.25-5+deb8u2vulnerable
stretch (lts), stretch2.28-5+deb9u1vulnerable
buster, buster (lts)2.31.1-16+deb10u1vulnerable
bullseye2.35.2-2vulnerable
bookworm2.40-2fixed
trixie2.43.50.20241215-1fixed
sid2.43.50.20241221-1fixed
libiberty (PTS)jessie20141014-1vulnerable
stretch20161220-1vulnerable
buster20190122-1vulnerable
bullseye20210106-1vulnerable
bookworm20230104-1fixed
sid, trixie20241020-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
binutilssource(unstable)2.37.50.20220121-1unimportant
libibertysourcejessie(unfixed)end-of-life
libibertysource(unstable)20220713-1

Notes

[bullseye] - libiberty <no-dsa> (Minor issue)
[buster] - libiberty <no-dsa> (Minor issue)
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579985.html
https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=5481040197402be6dfee265bd2ff5a4c88e30505
binutils not covered by security support
[stretch] - libiberty <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems