An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Binutils | Gnu | 2.31 (including) | 2.31 (including) |
Binutils | Ubuntu | bionic | * |
Binutils | Ubuntu | cosmic | * |
Binutils | Ubuntu | esm-infra-legacy/trusty | * |
Binutils | Ubuntu | esm-infra/xenial | * |
Binutils | Ubuntu | precise/esm | * |
Binutils | Ubuntu | trusty | * |
Binutils | Ubuntu | trusty/esm | * |
Binutils | Ubuntu | xenial | * |
Libiberty | Ubuntu | artful | * |
Libiberty | Ubuntu | bionic | * |
Libiberty | Ubuntu | cosmic | * |
Libiberty | Ubuntu | disco | * |
Libiberty | Ubuntu | trusty | * |
Libiberty | Ubuntu | upstream | * |
Libiberty | Ubuntu | xenial | * |