There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1947111 | Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ | Third Party Advisory |
https://security.gentoo.org/glsa/202208-30 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-04-15 07:15
Updated : 2022-10-27 05:45
NVD link : CVE-2021-3487
Mitre link : CVE-2021-3487
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
fedoraproject
- fedora
gnu
- binutils
redhat
- enterprise_linux