Lucene search

K
amazonAmazonALAS-2013-159
HistoryMar 02, 2013 - 4:48 p.m.

Medium: gdb

2013-03-0216:48:00
alas.aws.amazon.com
18

6.9 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

Issue Overview:

GDB tried to auto-load certain files (such as GDB scripts, Python scripts, and a thread debugging library) from the current working directory when debugging programs. This could result in the execution of arbitrary code with the user’s privileges when GDB was run in a directory that has untrusted content. (CVE-2011-4355)

With this update, GDB no longer auto-loads files from the current directory and only trusts certain system directories by default. The list of trusted directories can be viewed and modified using the “show auto-load safe-path” and “set auto-load safe-path” GDB commands. Refer to the GDB manual, linked to in the References, for further information.

Affected Packages:

gdb

Issue Correction:
Run yum update gdb to update your system.

New Packages:

i686:  
    gdb-7.2-60.13.amzn1.i686  
    gdb-gdbserver-7.2-60.13.amzn1.i686  
    gdb-debuginfo-7.2-60.13.amzn1.i686  
  
src:  
    gdb-7.2-60.13.amzn1.src  
  
x86_64:  
    gdb-debuginfo-7.2-60.13.amzn1.x86_64  
    gdb-gdbserver-7.2-60.13.amzn1.x86_64  
    gdb-7.2-60.13.amzn1.x86_64  

Additional References

Red Hat: CVE-2011-4355

Mitre: CVE-2011-4355

6.9 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C