The d_print_comp function in cp-demangle.c in libiberty allows remote
attackers to cause a denial of service (segmentation fault and crash) via a
crafted binary, which triggers infinite recursion and a buffer overflow,
related to a node having “itself as ancestor more than once.”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | binutils | < any | UNKNOWN |
ubuntu | 16.04 | noarch | binutils | < 2.26.1-1ubuntu1~16.04.8+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 20.04 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 22.04 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 23.10 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 24.04 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 16.04 | noarch | binutils-h8300-hms | < any | UNKNOWN |
ubuntu | 18.04 | noarch | gcc-arm-none-eabi | < any | UNKNOWN |
ubuntu | 16.04 | noarch | gcc-arm-none-eabi | < any | UNKNOWN |
gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
launchpad.net/bugs/cve/CVE-2016-4491
nvd.nist.gov/vuln/detail/CVE-2016-4491
security-tracker.debian.org/tracker/CVE-2016-4491
ubuntu.com/security/notices/USN-3337-1
ubuntu.com/security/notices/USN-3367-1
ubuntu.com/security/notices/USN-3368-1
ubuntu.com/security/notices/USN-4336-2
www.cve.org/CVERecord?id=CVE-2016-4491