A vulnerability was found in gcc. A stack overflow in the libiberty demangler library causes its host applications to crash. The stack contains return addresses that are not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable. References: https://bugzilla.redhat.com/show_bug.cgi?id=1333371 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4491 http://seclists.org/oss-sec/2016/q2/240
*** This bug has been marked as a duplicate of bug 582240 ***