fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly
handles pointer overflow when folding a certain expr comparison to a
corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR,
which might introduce buffer overflow vulnerabilities into applications
that could be exploited by context-dependent attackers.NOTE: the vendor
states that the essence of the issue is “not correctly interpreting an
offset to a pointer as a signed value.”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.10 | noarch | gcc-4.1 | < 4.1.1-13ubuntu5 | UNKNOWN |
ubuntu | 7.04 | noarch | gcc-4.1 | < 4.1.1-13ubuntu5 | UNKNOWN |
ubuntu | 6.10 | noarch | gcj-4.1 | < 4.1.1-14ubuntu7 | UNKNOWN |
ubuntu | 7.04 | noarch | gcj-4.1 | < 4.1.1-14ubuntu7 | UNKNOWN |
ubuntu | 6.10 | noarch | gnat-4.1 | < 4.1.1-15ubuntu1 | UNKNOWN |
ubuntu | 7.04 | noarch | gnat-4.1 | < 4.1.1-15ubuntu1 | UNKNOWN |