CVE-2018-18700

Published: 29 October 2018

An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.

Priority

Low

CVSS 3 base score: 5.5

Status

Package Release Status
binutils
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.32-8ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.32-8ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.30-21ubuntu1~18.04.3)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.26.1-1ubuntu1~16.04.8+esm1)
Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

Patches:
Upstream: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03e51746ed98d9106803f6009ebd71ea670ad3b9
libiberty
Launchpad, Ubuntu, Debian
Upstream
Released (20190122-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(20190122-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(20190122-1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (20170913-1ubuntu0.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (20160215-1ubuntu0.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=266886