A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1956423 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202208-30 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210716-0006/ | Third Party Advisory |
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1956423 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202208-30 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210716-0006/ | Third Party Advisory |
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1956423 - Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202208-30 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210716-0006/ - Third Party Advisory | |
References | () https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch - Patch, Third Party Advisory |
Information
Published : 2021-06-02 15:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3530
Mitre link : CVE-2021-3530
CVE.ORG link : CVE-2021-3530
JSON object : View
Products Affected
gnu
- binutils
netapp
- ontap_select_deploy_administration_utility
CWE
CWE-674
Uncontrolled Recursion