CVE-2016-4490

NameCVE-2016-4490
DescriptionInteger overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-552-1
NVD severitymedium (attack range: remote)
Debian Bugs840358, 840360

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
binutils (PTS)wheezy2.22-8+deb7u2vulnerable
wheezy (security)2.22-8+deb7u3fixed
jessie2.25-5+deb8u1vulnerable
stretch2.28-5fixed
buster, sid2.28-6fixed
ht (PTS)wheezy2.0.20-2vulnerable
jessie2.0.22-2vulnerable
buster, sid, stretch2.1.0+repack1-2fixed
libiberty (PTS)jessie20141014-1vulnerable
stretch20161220-1fixed
buster, sid20170627-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
binutilssource(unstable)2.27.51.20161102-1low
binutilssourcewheezy2.22-8+deb7u3mediumDLA-552-1
htsource(unstable)2.1.0+repack1-1low840358
libibertysource(unstable)20161011-1low840360

Notes

[jessie] - ht <no-dsa> (Minor issue)
[wheezy] - ht <no-dsa> (Minor issue)
[jessie] - binutils <no-dsa> (Minor issue)
[jessie] - libiberty <no-dsa> (Minor issue)
[wheezy] - libiberty <no-dsa> (Minor issue)
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=235767

Search for package or bug name: Reporting problems