First published: Fri Feb 24 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/libiberty | 20210106-1 20230104-1 20240117-1 20241020-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4491 is a vulnerability in the d_print_comp function in cp-demangle.c in libiberty that allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
CVE-2016-4491 triggers infinite recursion and a buffer overflow in the d_print_comp function, leading to a segmentation fault and crash.
CVE-2016-4491 affects the following software: binutils (versions up to 2.29), gdb (version 8.0-0ubuntu3), libiberty (versions up to 20131116-1ubuntu0.2), and valgrind (versions up to 1:3.12.0-1.1ubuntu2).
To fix CVE-2016-4491, upgrade binutils to version 2.29 or later, gdb to version 8.0-0ubuntu3 or later, libiberty to version 20131116-1ubuntu0.2 or later, and valgrind to version 1:3.12.0-1.1ubuntu2 or later.
You can find more information about CVE-2016-4491 at the following references: [1] [2] [3].