Format: 1.8 Date: Mon, 12 Jun 2017 12:43:14 -0400 Source: libiberty Binary: libiberty-dev Architecture: source Version: 20160215-1ubuntu0.2 Distribution: xenial-security Urgency: medium Maintainer: Ubuntu Developers Changed-By: Marc Deslauriers Description: libiberty-dev - library of utility functions used by GNU programs Changes: libiberty (20160215-1ubuntu0.2) xenial-security; urgency=medium . * SECURITY UPDATE: integer overflow in string_appends - debian/patches/CVE-2016-2226.patch: check for overflow in libiberty/cplus-dem.c. - CVE-2016-2226 * SECURITY UPDATE: use-after-free vulberabilities - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4487 - CVE-2016-4488 * SECURITY UPDATE: integer overflow in gnu_special - debian/patches/CVE-2016-4489.patch: handle case where consume_count returns -1 in libiberty/cplus-dem.c. - CVE-2016-4489 * SECURITY UPDATE: integer overflow after sanity checks - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead of long in libiberty/cp-demangle.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4490 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-4491-1.patch: limit recursion in include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c, added test to libiberty/testsuite/demangle-expected. - debian/patches/CVE-2016-4491-2.patch: limit more recursion in libiberty/cp-demangle.c. - debian/patches/CVE-2016-4491-3.patch: initialize d_printing in libiberty/cp-demangle.c. - CVE-2016-4491 * SECURITY UPDATE: buffer overflow in do_type - debian/patches/CVE-2016-4492_4493.patch: properly handle large values and overflow in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4492 - CVE-2016-4493 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-6131 Checksums-Sha1: bb464179e9d267bd325bd2e2f4a337d5c6740e55 1918 libiberty_20160215-1ubuntu0.2.dsc 5a6e8f6af4dfd855f71ee64ce2a8304014c36cd5 14568 libiberty_20160215-1ubuntu0.2.debian.tar.xz Checksums-Sha256: 8bc6338f98aa54238cf3d2bede47b287e56a761bc10e33b7236f50b7bbe999e2 1918 libiberty_20160215-1ubuntu0.2.dsc ccd8782e6454230ae78bec35e75357205c8ee7ecb274f601c5a72d9a9fb06fe8 14568 libiberty_20160215-1ubuntu0.2.debian.tar.xz Files: 7c4ae3a76698f5daf96074048b9b4bee 1918 libdevel optional libiberty_20160215-1ubuntu0.2.dsc 670405bc7ba540f7cc33369d7a899f3f 14568 libdevel optional libiberty_20160215-1ubuntu0.2.debian.tar.xz Original-Maintainer: Debian GCC Maintainers