Описание
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| ht | fixed | 2.1.0+repack1-1 | package | |
| ht | no-dsa | jessie | package | |
| ht | no-dsa | wheezy | package | |
| binutils | fixed | 2.27.51.20161102-1 | package | |
| binutils | ignored | jessie | package | |
| libiberty | fixed | 20161011-1 | package | |
| libiberty | no-dsa | jessie | package | |
| libiberty | no-dsa | wheezy | package |
Примечания
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=238313
Связанные уязвимости
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.