First published: Tue Feb 07 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20241020-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-6131.
The title of the vulnerability is 'The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.'
The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.
The following software is affected: libiberty (version 20131116-1ubuntu0.2 and 20160215-1ubuntu0.2), valgrind (version 1:3.10.1-1ubuntu3~14.5, 1:3.11.0-1ubuntu4.2, and 1:3.12.0~), gdb (version 7.7.1-0ubuntu5~14.04.3 and 7.11.1-0ubuntu1~16.5), binutils (version 2.26.1-1ubuntu1~16.04.8+, 2.28, 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5), and ht (version 2.1.0+repack1-3 and 2.1.0+repack1-5).
To fix the vulnerability, update the affected software to the following versions: libiberty (20131116-1ubuntu0.2 and 20160215-1ubuntu0.2), valgrind (1:3.10.1-1ubuntu3~14.5, 1:3.11.0-1ubuntu4.2, and 1:3.12.0~), gdb (7.7.1-0ubuntu5~14.04.3 and 7.11.1-0ubuntu1~16.5), binutils (2.26.1-1ubuntu1~16.04.8+ and 2.28), and ht (2.1.0+repack1-3 and 2.1.0+repack1-5).