Upstream Debian package version 2.22-8+deb7u3 fixes these issues: * Exploitable buffer overflow (CVE-2016-2226) * Invalid write due to a use-after-free to array btypevec (CVE-2016-4487) * Invalid write due to a use-after-free to array ktypevec (CVE-2016-4488) * Invalid write due to integer overflow (CVE-2016-4489) * Write access violation (CVE-2016-4490) * Write access violations (CVE-2016-4492) * Read access violations (CVE-2016-4493) * Bug 1352068 – CVE-2016-6131 gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler (CVE-2016-6131)
Of these CVE-2016-2226 currently has the highest impact CVSS v2 Base score (6.1 AV:N/AC:M/Au:N/C:P/I:P/A:P)
This issue has been filed against UCS 4.1. UCS 4.1 is out of maintenance and many UCS components have vastly changed in later releases. Thus, this issue is now being closed. If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen this issue. In this case please provide detailed information on how this issue is affecting you.