Name | CVE-2016-2226 |
Description | Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DLA-552-1 |
NVD severity | medium (attack range: remote) |
Debian Bugs | 840358, 840360 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
binutils (PTS) | wheezy | 2.22-8+deb7u2 | vulnerable |
wheezy (security) | 2.22-8+deb7u3 | fixed | |
jessie | 2.25-5+deb8u1 | vulnerable | |
stretch | 2.28-5 | fixed | |
buster, sid | 2.30-15 | fixed | |
ht (PTS) | wheezy | 2.0.20-2 | vulnerable |
jessie | 2.0.22-2 | vulnerable | |
stretch | 2.1.0+repack1-2 | fixed | |
buster, sid | 2.1.0+repack1-3 | fixed | |
libiberty (PTS) | jessie | 20141014-1 | vulnerable |
stretch | 20161220-1 | fixed | |
buster, sid | 20170913-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
binutils | source | (unstable) | 2.27.51.20161102-1 | low | ||
binutils | source | wheezy | 2.22-8+deb7u3 | medium | DLA-552-1 | |
ht | source | (unstable) | 2.1.0+repack1-1 | low | 840358 | |
libiberty | source | (unstable) | 20161011-1 | low | 840360 |
[jessie] - ht <no-dsa> (Minor issue)
[wheezy] - ht <no-dsa> (Minor issue)
[jessie] - binutils <ignored> (Minor issue)
[jessie] - libiberty <no-dsa> (Minor issue)
[wheezy] - libiberty <no-dsa> (Minor issue)
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=234829