Bug 1333371 (CVE-2016-4491)

Summary: CVE-2016-4491 gcc: Stack overflow due to infinite recursion in d_print_comp
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: erik-fedora, gdb-bugs, jakub, jan.kratochvil, ktietz, law, mpolacek, nickc, ohudlick, rasanche, rjones, rob, sergiodj, swhiteho
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-10 10:43:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1333388, 1333389    
Bug Blocks: 1333338    

Description Andrej Nemec 2016-05-05 11:50:57 UTC
A bug was found in libiberty. A stack overflow in the libiberty demangler library causes its host applications to crash. Not considered security bug because it's a stack overflow, leading to a SIGSEGV because it lacks memory to continue the faulty recursive function.


External references:

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909

Proposed patch:

https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html

Comment 1 Andrej Nemec 2016-05-05 12:11:38 UTC
Created msp430-gcc tracking bugs for this issue:

Affects: fedora-all [bug 1333388]

Comment 2 Andrej Nemec 2016-05-05 12:11:45 UTC
Created mingw-gcc tracking bugs for this issue:

Affects: epel-all [bug 1333389]