CVE-2006-1902

Publication date 20 April 2006

Last updated 17 July 2025


Ubuntu priority

Description

fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."

Status

Package Ubuntu Release Status
gcj-4.2 7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
gcc-4.0 7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper
Not affected
gcc-4.1 7.04 feisty
Fixed 4.1.1-13ubuntu5
6.10 edgy
Fixed 4.1.1-13ubuntu5
6.06 LTS dapper Not in release
gcc-4.2 7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
gcj-4.1 7.04 feisty
Fixed 4.1.1-14ubuntu7
6.10 edgy
Fixed 4.1.1-14ubuntu7
6.06 LTS dapper
Not affected
gdc-4.1 7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
gnat-4.1 7.04 feisty
Fixed 4.1.1-15ubuntu1
6.10 edgy
Fixed 4.1.1-15ubuntu1
6.06 LTS dapper Not in release
gnat-4.2 7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
gpc-4.1 7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release


Access our resources on patching vulnerabilities