A vulnerability was found in gcc. Due to the inconsistent use of long and int for string/array length in cp-demangle.c there is an integer overflow that leads to a write access violation. The target crashes on an access violation at an address matching the destination operand of the instruction. External references: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 Upstream patch: https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=235767
Created msp430-gcc tracking bugs for this issue: Affects: fedora-all [bug 1333388]
Created mingw-gcc tracking bugs for this issue: Affects: epel-all [bug 1333389]
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.