The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 | issue tracking |
http://www.openwall.com/lists/oss-security/2016/05/05/5 | mailing list third party advisory patch |
http://www.securityfocus.com/bid/90016 | vdb entry |
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html | mailing list patch vendor advisory |