First published: Fri Feb 24 2017(Updated: )
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20241020-1 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=fa3fcee7b8c73070306ec358e730d1dfcac246bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2226 is a vulnerability that allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
The severity of CVE-2016-2226 is not specified.
CVE-2016-2226 affects binutils version up to 2.28 on Ubuntu Xenial (16.04.8+).
CVE-2016-2226 affects libiberty version up to 20160215-1ubuntu0.2 on Ubuntu Xenial (16.04.8+) and version up to 20131116-1ubuntu0.2 on Ubuntu Trusty (14.04.8+).
CVE-2016-2226 affects valgrind version up to 1:3.12.0~ on Ubuntu Yakkety (16.10+), version up to 1:3.11.0-1ubuntu4.2 on Ubuntu Xenial (16.04.8+), and version up to 1:3.10.1-1ubuntu3~14.5 on Ubuntu Trusty (14.04.8+).
CVE-2016-2226 affects gdb version up to 7.11.1-0ubuntu1~16.5 on Ubuntu Xenial (16.04.8+) and version up to 7.7.1-0ubuntu5~14.04.3 on Ubuntu Trusty (14.04.8+).
CVE-2016-2226 affects binutils version up to 2.41-5 on Debian.
CVE-2016-2226 affects ht version up to 2.1.0+repack1-5 on Debian.
CVE-2016-2226 affects libiberty on Debian, but no specific version is mentioned.
You can find more information about CVE-2016-2226 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2016/05/05/5), [Reference 2](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687), [Reference 3](http://www.securityfocus.com/bid/90103).