Description
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-552-1 | binutils security update |
EUVD |
EUVD-2016-5477 | Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths. |
Ubuntu USN |
USN-3337-1 | Valgrind vulnerabilities |
Ubuntu USN |
USN-3367-1 | gdb vulnerabilities |
Ubuntu USN |
USN-3368-1 | libiberty vulnerabilities |
Ubuntu USN |
USN-4336-2 | GNU binutils vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:32:25.466Z
Reserved: 2016-05-05T00:00:00.000Z
Link: CVE-2016-4490
No data.
Status : Deferred
Published: 2017-02-24T20:59:00.500
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-4490
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN