Description
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-10417 | An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm. |
Ubuntu USN |
USN-4326-1 | libiberty vulnerabilities |
Ubuntu USN |
USN-4336-1 | GNU binutils vulnerabilities |
Ubuntu USN |
USN-4336-2 | GNU binutils vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:16:00.391Z
Reserved: 2018-10-27T00:00:00.000Z
Link: CVE-2018-18701
No data.
Status : Modified
Published: 2018-10-29T12:29:04.820
Modified: 2024-11-21T03:56:23.990
Link: CVE-2018-18701
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN