Bug 1202969 - (CVE-2021-3826) VUL-0: CVE-2021-3826: binutils: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
(CVE-2021-3826)
VUL-0: CVE-2021-3826: binutils: Heap/stack buffer overflow in the dlang_lname...
Status: CONFIRMED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Michael Matz
Security Team bot
https://smash.suse.de/issue/341159/
CVSSv3.1:SUSE:CVE-2021-3826:6.6:(AV:L...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-08-31 08:27 UTC by Hu
Modified: 2022-11-29 17:45 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-08-31 08:27:44 UTC
rh#2122627

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

Upstream fix:

https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505

References:

https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579985.html

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2122627
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3826
Comment 1 Hu 2022-08-31 08:29:26 UTC
Affected:
- SUSE:SLE-15:Update/gcc11               11.3.0+git1637
- SUSE:SLE-12:Update/gcc11               11.3.0+git1637
- openSUSE:Factory/gcc11                 11.3.1+git1902

Other gcc versions < 11 are not affected, the function was introduced in 3f30a274913bde0a1e01a86ce7c85e3be34ea13f.
Comment 2 Thomas Leroy 2022-09-27 11:27:05 UTC
(In reply to Hu from comment #1)
> Affected:
> - SUSE:SLE-15:Update/gcc11               11.3.0+git1637
> - SUSE:SLE-12:Update/gcc11               11.3.0+git1637

Hi, any news on these?
Comment 3 Richard Biener 2022-09-27 11:35:51 UTC
I think it's not GCC that is affected but binutils from which we build and ship c++filt from and the version we ship probably already has this fix.

There's no reproducer in the CVE so it's not clear what they are talking about.
Comment 4 Richard Biener 2022-09-27 11:44:52 UTC
Just as a note to myself, the C++ demangler parts from libiberty also end up in the sanitizer runtime.
Comment 5 Thomas Leroy 2022-09-27 12:17:24 UTC
(In reply to Richard Biener from comment #3)
> I think it's not GCC that is affected but binutils from which we build and
> ship c++filt from and the version we ship probably already has this fix.
> 
> There's no reproducer in the CVE so it's not clear what they are talking
> about.

Thanks for checking Richard.

Tracked as affected binutils codesttreams:
- SUSE:SLE-12:Update
- SUSE:SLE-15:Update
- SUSE:SLE-15-SP1:Update

Michael, please include the fix and references of this bug in next update :)
Comment 6 Michael Matz 2022-09-27 12:29:14 UTC
Yep, will be fixed by the update later this year.  binutils 2.37 (used in SLE-12
and SLE-15) indeed still has the problem.
Comment 9 Swamp Workflow Management 2022-11-21 14:30:26 UTC
SUSE-SU-2022:4146-1: An update that solves 10 vulnerabilities, contains 10 features and has three fixes is now available.

Category: security (moderate)
Bug References: 1142579,1185597,1185712,1188374,1191473,1193929,1194783,1197592,1198237,1202816,1202966,1202967,1202969
CVE References: CVE-2019-1010204,CVE-2021-3530,CVE-2021-3648,CVE-2021-3826,CVE-2021-45078,CVE-2021-46195,CVE-2022-27943,CVE-2022-38126,CVE-2022-38127,CVE-2022-38533
JIRA References: PED-2029,PED-2030,PED-2031,PED-2032,PED-2033,PED-2034,PED-2035,PED-2038,SLE-25046,SLE-25047
Sources used:
openSUSE Leap 15.4 (src):    binutils-2.39-150100.7.40.1, cross-aarch64-binutils-2.39-150100.7.40.1, cross-arm-binutils-2.39-150100.7.40.1, cross-avr-binutils-2.39-150100.7.40.1, cross-epiphany-binutils-2.39-150100.7.40.1, cross-hppa-binutils-2.39-150100.7.40.1, cross-hppa64-binutils-2.39-150100.7.40.1, cross-i386-binutils-2.39-150100.7.40.1, cross-ia64-binutils-2.39-150100.7.40.1, cross-m68k-binutils-2.39-150100.7.40.1, cross-mips-binutils-2.39-150100.7.40.1, cross-ppc-binutils-2.39-150100.7.40.1, cross-ppc64-binutils-2.39-150100.7.40.1, cross-ppc64le-binutils-2.39-150100.7.40.1, cross-riscv64-binutils-2.39-150100.7.40.1, cross-rx-binutils-2.39-150100.7.40.1, cross-s390-binutils-2.39-150100.7.40.1, cross-s390x-binutils-2.39-150100.7.40.1, cross-sparc-binutils-2.39-150100.7.40.1, cross-sparc64-binutils-2.39-150100.7.40.1, cross-spu-binutils-2.39-150100.7.40.1, cross-x86_64-binutils-2.39-150100.7.40.1
openSUSE Leap 15.3 (src):    binutils-2.39-150100.7.40.1, cross-aarch64-binutils-2.39-150100.7.40.1, cross-arm-binutils-2.39-150100.7.40.1, cross-avr-binutils-2.39-150100.7.40.1, cross-epiphany-binutils-2.39-150100.7.40.1, cross-hppa-binutils-2.39-150100.7.40.1, cross-hppa64-binutils-2.39-150100.7.40.1, cross-i386-binutils-2.39-150100.7.40.1, cross-ia64-binutils-2.39-150100.7.40.1, cross-m68k-binutils-2.39-150100.7.40.1, cross-mips-binutils-2.39-150100.7.40.1, cross-ppc-binutils-2.39-150100.7.40.1, cross-ppc64-binutils-2.39-150100.7.40.1, cross-ppc64le-binutils-2.39-150100.7.40.1, cross-riscv64-binutils-2.39-150100.7.40.1, cross-rx-binutils-2.39-150100.7.40.1, cross-s390-binutils-2.39-150100.7.40.1, cross-s390x-binutils-2.39-150100.7.40.1, cross-sparc-binutils-2.39-150100.7.40.1, cross-sparc64-binutils-2.39-150100.7.40.1, cross-spu-binutils-2.39-150100.7.40.1, cross-x86_64-binutils-2.39-150100.7.40.1
SUSE Manager Server 4.1 (src):    binutils-2.39-150100.7.40.1
SUSE Manager Retail Branch Server 4.1 (src):    binutils-2.39-150100.7.40.1
SUSE Manager Proxy 4.1 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    binutils-2.39-150100.7.40.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    binutils-2.39-150100.7.40.1
SUSE Enterprise Storage 7 (src):    binutils-2.39-150100.7.40.1
SUSE Enterprise Storage 6 (src):    binutils-2.39-150100.7.40.1
SUSE CaaS Platform 4.0 (src):    binutils-2.39-150100.7.40.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-11-29 17:45:56 UTC
SUSE-SU-2022:4277-1: An update that solves 10 vulnerabilities, contains 10 features and has 5 fixes is now available.

Category: security (important)
Bug References: 1142579,1185597,1185712,1188374,1191473,1191908,1193929,1194783,1197592,1198237,1198458,1202816,1202966,1202967,1202969
CVE References: CVE-2019-1010204,CVE-2021-3530,CVE-2021-3648,CVE-2021-3826,CVE-2021-45078,CVE-2021-46195,CVE-2022-27943,CVE-2022-38126,CVE-2022-38127,CVE-2022-38533
JIRA References: PED-2029,PED-2030,PED-2031,PED-2032,PED-2033,PED-2034,PED-2035,PED-2038,SLE-25046,SLE-25047
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    binutils-2.39-9.50.1
SUSE OpenStack Cloud 9 (src):    binutils-2.39-9.50.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    binutils-2.39-9.50.1, cross-ppc-binutils-2.39-9.50.1, cross-spu-binutils-2.39-9.50.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    binutils-2.39-9.50.1
SUSE Linux Enterprise Server 12-SP5 (src):    binutils-2.39-9.50.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    binutils-2.39-9.50.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    binutils-2.39-9.50.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    binutils-2.39-9.50.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.