Lucene search

K
mageiaGentoo FoundationMGASA-2018-0034
HistoryJan 03, 2018 - 5:22 p.m.

Updated gdb packages fix security vulnerability

2018-01-0317:22:14
Gentoo Foundation
advisories.mageia.org
32

0.026 Low

EPSS

Percentile

90.2%

Hanno Bรถck discovered that gdb incorrectly handled certain malformed AOUT headers in PE executables. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2014-8501). It was discovered that gdb incorrectly handled printing bad bytes in Intel Hex objects. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service (CVE-2014-9939). It was discovered that gdb incorrectly handled certain string operations. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2016-2226). It was discovered that gdb incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4491, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchgdb<ย 7.8.1-7.1gdb-7.8.1-7.1.mga5