Bugzilla – Bug 978817
VUL-1: CVE-2016-4491: gcc: Stack overflow due to infinite recursion in d_print_comp
Last modified: 2023-02-08 16:51:15 UTC
rh#1333371 / CVE-2016-4491 A vulnerability was found in gcc. A stack overflow in the libiberty demangler library causes its host applications to crash. The stack contains return addresses that are not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable. External references: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 Proposed patch: https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html References: https://bugzilla.redhat.com/show_bug.cgi?id=1333371 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4491 http://seclists.org/oss-sec/2016/q2/240
bugbot adjusting priority
Bug in the name demangler -> VUL-1.
Fixed since a long time. (when libiberty, and hence binutils was affected: by version updates to binutils for sle-12 and sle-15 and sle-11 wontfix)