CVE-2016-2226

NameCVE-2016-2226
DescriptionInteger overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-552-1
Debian Bugs840358, 840360

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
binutils (PTS)jessie, jessie (lts)2.25-5+deb8u2vulnerable
stretch (lts), stretch2.28-5+deb9u1fixed
buster, buster (lts)2.31.1-16+deb10u1fixed
bullseye2.35.2-2fixed
bookworm2.40-2fixed
trixie2.43.50.20241215-1fixed
sid2.43.50.20241221-1fixed
ht (PTS)jessie2.0.22-2vulnerable
stretch2.1.0+repack1-2fixed
buster2.1.0+repack1-3fixed
sid, trixie, bullseye, bookworm2.1.0+repack1-5fixed
libiberty (PTS)jessie20141014-1vulnerable
stretch20161220-1fixed
buster20190122-1fixed
bullseye20210106-1fixed
bookworm20230104-1fixed
sid, trixie20241020-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
binutilssourcewheezy2.22-8+deb7u3DLA-552-1
binutilssource(unstable)2.27.51.20161102-1low
htsource(unstable)2.1.0+repack1-1low840358
libibertysource(unstable)20161011-1low840360

Notes

[jessie] - ht <no-dsa> (Minor issue)
[wheezy] - ht <no-dsa> (Minor issue)
[jessie] - binutils <ignored> (Minor issue)
[jessie] - libiberty <no-dsa> (Minor issue)
[wheezy] - libiberty <no-dsa> (Minor issue)
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=234829

Search for package or bug name: Reporting problems