Name | CVE-2016-4973 |
Description | Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 848704 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
gcc-4.9 (PTS) | jessie, jessie (lts) | 4.9.2-10+deb8u2 | fixed |
gcc-6 (PTS) | stretch (security), stretch (lts), stretch | 6.3.0-18+deb9u1 | fixed |
gcc-mingw-w64 (PTS) | jessie | 14.3 | vulnerable |
| stretch | 19.3 | vulnerable |
| buster | 21.3~deb10u2 | vulnerable |
| bullseye | 24.2 | vulnerable |
| bookworm | 25.2 | vulnerable |
| sid, trixie | 26.5 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
gcc-4.9 | source | (unstable) | (not affected) | | | |
gcc-5 | source | (unstable) | (not affected) | | | |
gcc-6 | source | (unstable) | (not affected) | | | |
gcc-mingw-w64 | source | (unstable) | (unfixed) | unimportant | | 848704 |
mingw32 | source | (unstable) | (unfixed) | | | |
Notes
https://bugzilla.redhat.com/show_bug.cgi?id=1324759
- gcc-6 <not-affected> (Uses glibc-internal SSP)
- gcc-5 <not-affected> (Uses glibc-internal SSP)
- gcc-4.9 <not-affected> (Uses glibc-internal SSP)
[wheezy] - mingw32 <no-dsa> (Minor issue)
Missing security feature, not a direct vulnerability