Bugzilla – Full Text Bug Listing |
Summary: | VUL-1: CVE-2016-4488: gcc: Invalid write due to a use-after-free to array ktypevec | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Alexander Bergmann <abergmann> |
Component: | Incidents | Assignee: | Michael Matz <matz> |
Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | krahmer, meissner, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/168624/ | ||
Whiteboard: | CVSSv2:SUSE:CVE-2016-4488:5.1:(AV:N/AC:H/Au:N/C:P/I:P/A:P) maint:planned:update | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Alexander Bergmann
2016-05-06 10:14:39 UTC
bugbot adjusting priority Bug in symbol name de-mangling -> VUL-1. The cited bug affects the libstdc++ demangler and thus libstdc++.so and libsupc++.a. The bug was fixed on the GCC 5 branch after the last update to the toolchain module and the fix will be included in the GCC 6 toolchain module release upcoming (and thus the system libstdc++.so). Note that the copies in static libraries of older GCC do not get updated with the system runtime. Note that bugs in the libstdc++ demangler are not as serious as those in the libiberty demangler which gets used by various tools such as gdb or nm. Any update to GCC 5 should wait until after the GCC 6 toochain release to lessen the burden on QA (it no longer replaces the system runtime). |