First published: Fri Feb 24 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20240117-1 20241020-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4493 is a vulnerability that allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.
The affected software includes binutils 2.28, binutils 2.26.1-1ubuntu1~16.04.8+, libiberty 20131116-1ubuntu0.2, libiberty 20160215-1ubuntu0.2, valgrind 1:3.10.1-1ubuntu3~14.5, valgrind 1:3.11.0-1ubuntu4.2, valgrind 1:3.12.0~, gdb 7.7.1-0ubuntu5~14.04.3, gdb 7.11.1-0ubuntu1~16.5, binutils 2.31.1-16, binutils 2.35.2-2, binutils 2.40-2, binutils 2.41-5, ht 2.1.0+repack1-3, ht 2.1.0+repack1-5, libiberty 20190122-1, libiberty 20210106-1, libiberty 20230104-1, and libiberty 20230721-1.
To fix CVE-2016-4493, update the affected software to the recommended versions: binutils 2.28, binutils 2.26.1-1ubuntu1~16.04.8+, libiberty 20131116-1ubuntu0.2, libiberty 20160215-1ubuntu0.2, valgrind 1:3.10.1-1ubuntu3~14.5, valgrind 1:3.11.0-1ubuntu4.2, valgrind 1:3.12.0~, gdb 7.7.1-0ubuntu5~14.04.3, gdb 7.11.1-0ubuntu1~16.5, binutils 2.31.1-16, binutils 2.35.2-2, binutils 2.40-2, binutils 2.41-5, ht 2.1.0+repack1-3, ht 2.1.0+repack1-5, libiberty 20190122-1, libiberty 20210106-1, libiberty 20230104-1, and libiberty 20230721-1.
Yes, you can find references for CVE-2016-4493 at the following URLs: https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html, http://www.openwall.com/lists/oss-security/2016/05/05/5, and https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926.
CVE-2016-4493 is a vulnerability that allows remote attackers to cause a denial of service, which can be considered a high-severity issue.