CVE-2016-4491

NameCVE-2016-4491
DescriptionThe d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
binutils (PTS)wheezy2.22-8+deb7u2vulnerable
wheezy (security)2.22-8+deb7u3vulnerable
jessie2.25-5+deb8u1vulnerable
stretch2.28-5fixed
buster, sid2.28-6fixed
libiberty (PTS)jessie20141014-1vulnerable
buster, sid, stretch20161220-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
binutilssource(unstable)2.28-3low
libibertysource(unstable)(unfixed)low

Notes

[jessie] - binutils <no-dsa> (Minor issue)
[wheezy] - binutils <no-dsa> (Minor issue)
[stretch] - libiberty <no-dsa> (Minor issue)
[jessie] - libiberty <no-dsa> (Minor issue)
[wheezy] - libiberty <no-dsa> (Minor issue)
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://gcc.gnu.org/viewcvs?rev=247056&root=gcc&view=rev

Search for package or bug name: Reporting problems