{"id":"UBUNTU-CVE-2016-4488","details":"Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to \"ktypevec.\"","modified":"2026-01-30T00:55:45.197404Z","published":"2017-02-24T00:00:00Z","related":["USN-3337-1","USN-3367-1","USN-3368-1","USN-4336-2"],"upstream":["CVE-2016-4488"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4488"},{"type":"REPORT","url":"https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3337-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3368-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3367-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4336-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-4488"}],"affected":[{"package":{"name":"gdb","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gdb@7.7.1-0ubuntu5~14.04.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.7.1-0ubuntu5~14.04.3"}]}],"versions":["7.6.1-0ubuntu3","7.6.1-1ubuntu1","7.6.50.20131218-0ubuntu1","7.7-0ubuntu1","7.7-0ubuntu2","7.7-0ubuntu3","7.7-0ubuntu3.1","7.7.1-0ubuntu5~14.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdb"},{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdb-minimal"},{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdb-multiarch"},{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdb-source"},{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdb64"},{"binary_version":"7.7.1-0ubuntu5~14.04.3","binary_name":"gdbserver"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"libiberty","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libiberty@20131116-1ubuntu0.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20131116-1ubuntu0.2"}]}],"versions":["20131116-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"20131116-1ubuntu0.2","binary_name":"libiberty-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"valgrind","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/valgrind@1:3.10.1-1ubuntu3~14.5?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.10.1-1ubuntu3~14.5"}]}],"versions":["1:3.8.1-4ubuntu1","1:3.8.1-5ubuntu1","1:3.8.1-5ubuntu2","1:3.8.1-5ubuntu3","1:3.9.0-4ubuntu1","1:3.9.0-4ubuntu3","1:3.9.0-4ubuntu4","1:3.10~20140411-0ubuntu1","1:3.10.1-1ubuntu3~14.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:3.10.1-1ubuntu3~14.5","binary_name":"valgrind"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.24-5ubuntu14.2+esm8?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.23.52.20130913-0ubuntu1","2.23.90.20131017-1ubuntu1","2.23.90.20131116-1ubuntu1","2.23.91.20131123-1ubuntu1","2.24-1ubuntu1","2.24-1ubuntu2","2.24-2ubuntu1","2.24-2ubuntu2","2.24-2ubuntu3","2.24-4ubuntu1","2.24-5ubuntu1","2.24-5ubuntu2","2.24-5ubuntu3","2.24-5ubuntu3.1","2.24-5ubuntu13","2.24-5ubuntu14","2.24-5ubuntu14.1","2.24-5ubuntu14.2","2.24-5ubuntu14.2+esm1","2.24-5ubuntu14.2+esm2","2.24-5ubuntu14.2+esm3","2.24-5ubuntu14.2+esm5","2.24-5ubuntu14.2+esm6","2.24-5ubuntu14.2+esm7","2.24-5ubuntu14.2+esm8"],"ecosystem_specific":{"binaries":[{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils"},{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils-dev"},{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils-multiarch"},{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils-source"},{"binary_version":"2.24-5ubuntu14.2+esm8","binary_name":"binutils-static"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gdb","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gdb@7.11.1-0ubuntu1~16.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.11.1-0ubuntu1~16.5"}]}],"versions":["7.10-1ubuntu2","7.10-1ubuntu3","7.10.1-0ubuntu1","7.10.90.20160215-0ubuntu2","7.10.90.20160220-0ubuntu1","7.11-0ubuntu1","7.11.1-0ubuntu1~16.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"7.11.1-0ubuntu1~16.5","binary_name":"gdb"},{"binary_version":"7.11.1-0ubuntu1~16.5","binary_name":"gdb-multiarch"},{"binary_version":"7.11.1-0ubuntu1~16.5","binary_name":"gdb-source"},{"binary_version":"7.11.1-0ubuntu1~16.5","binary_name":"gdb64"},{"binary_version":"7.11.1-0ubuntu1~16.5","binary_name":"gdbserver"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"libiberty","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libiberty@20160215-1ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20160215-1ubuntu0.2"}]}],"versions":["20141014-1","20160215-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"20160215-1ubuntu0.2","binary_name":"libiberty-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"valgrind","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/valgrind@1:3.11.0-1ubuntu4.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.11.0-1ubuntu4.2"}]}],"versions":["1:3.11.0-1ubuntu1","1:3.11.0-1ubuntu2","1:3.11.0-1ubuntu3","1:3.11.0-1ubuntu4","1:3.11.0-1ubuntu4.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:3.11.0-1ubuntu4.2","binary_name":"valgrind"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.26.1-1ubuntu1~16.04.8+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.26.1-1ubuntu1~16.04.8+esm1"}]}],"versions":["2.25.1-6ubuntu1","2.25.51.20151022-0ubuntu2","2.25.51.20151022-0ubuntu3","2.25.51.20151027-0ubuntu1","2.25.51.20151028-0ubuntu1","2.25.51.20151106-0ubuntu1","2.25.51.20151113-1ubuntu1","2.25.51.20151113-2ubuntu1","2.25.90.20151125-1ubuntu1","2.25.90.20151125-2ubuntu1","2.25.90.20151211-0ubuntu1","2.25.90.20151211-0ubuntu2","2.25.90.20160101-1ubuntu1","2.25.90.20160101-1ubuntu2","2.26-2ubuntu1","2.26-3ubuntu1","2.26-4ubuntu1","2.26-5ubuntu1","2.26-6ubuntu1","2.26-7ubuntu2","2.26-8ubuntu1","2.26-8ubuntu2","2.26-8ubuntu2.1","2.26.1-1ubuntu1~16.04","2.26.1-1ubuntu1~16.04.1","2.26.1-1ubuntu1~16.04.3","2.26.1-1ubuntu1~16.04.4","2.26.1-1ubuntu1~16.04.5","2.26.1-1ubuntu1~16.04.6","2.26.1-1ubuntu1~16.04.7","2.26.1-1ubuntu1~16.04.8"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-aarch64-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-alpha-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-arm-linux-gnueabi"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-arm-linux-gnueabihf"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-dev"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-hppa-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-hppa64-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-m68k-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-mips-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-mips64-linux-gnuabi64"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-mips64el-linux-gnuabi64"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-mipsel-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-multiarch"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-powerpc-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-powerpc-linux-gnuspe"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-powerpc64-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-powerpc64le-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-s390x-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-sh4-linux-gnu"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-source"},{"binary_version":"2.26.1-1ubuntu1~16.04.8+esm1","binary_name":"binutils-sparc64-linux-gnu"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-arm-none-eabi","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gcc-arm-none-eabi@15:4.9.3+svn231177-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["15:4.9.3+svn227297-1","15:4.9.3+svn227297-1build1","15:4.9.3+svn231177-1"],"ecosystem_specific":{"binaries":[{"binary_version":"15:4.9.3+svn231177-1","binary_name":"gcc-arm-none-eabi"},{"binary_version":"15:4.9.3+svn231177-1","binary_name":"gcc-arm-none-eabi-source"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4ubuntu1","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gccxml","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gccxml@0.9.0+git20140716-6?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.0+git20140716-6"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.0+git20140716-6","binary_name":"gccxml"},{"binary_version":"0.9.0+git20140716-6","binary_name":"libgccxml-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"ht","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ht@2.1.0-1build1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.0-1","2.1.0-1build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.0-1build1","binary_name":"ht"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"nescc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/nescc@1.3.5-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.5-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.5-1","binary_name":"nescc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"sdcc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/sdcc@3.5.0+dfsg-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0+dfsg-2ubuntu1","3.5.0+dfsg-1","3.5.0+dfsg-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.0+dfsg-2","binary_name":"sdcc"},{"binary_version":"3.5.0+dfsg-2","binary_name":"sdcc-libraries"},{"binary_version":"3.5.0+dfsg-2","binary_name":"sdcc-ucsim"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10build1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10","2.16.1-10build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10build1","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4ubuntu3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4ubuntu1","1:3.4.6+dfsg2-4ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4ubuntu3","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"nescc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/nescc@1.3.5-1.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.5-1","1.3.5-1.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.5-1.1","binary_name":"nescc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"sdcc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/sdcc@3.5.0+dfsg-2build1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.5.0+dfsg-2","3.5.0+dfsg-2build1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.0+dfsg-2build1","binary_name":"sdcc"},{"binary_version":"3.5.0+dfsg-2build1","binary_name":"sdcc-libraries"},{"binary_version":"3.5.0+dfsg-2build1","binary_name":"sdcc-ucsim"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10build1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10build1","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4ubuntu3","1:3.4.6+dfsg2-4.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4.1","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"nescc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/nescc@1.3.5-1.1build1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.5-1.1build1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.5-1.1build1","binary_name":"nescc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10build1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10build1","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4.1","1:3.4.6+dfsg2-4.2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4.2","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"nescc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/nescc@1.3.5-1.1build1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.3.5-1.1build1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.5-1.1build1","binary_name":"nescc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10build1","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4.2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4.2","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"binutils-h8300-hms","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/binutils-h8300-hms@2.16.1-10build1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.16.1-10build1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.1-10build1","binary_name":"binutils-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}},{"package":{"name":"gcc-h8300-hms","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/gcc-h8300-hms@1:3.4.6+dfsg2-4.2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.4.6+dfsg2-4.2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.4.6+dfsg2-4.2","binary_name":"gcc-h8300-hms"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4488.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}