MGASA-2018-0034

Source
https://advisories.mageia.org/MGASA-2018-0034.html
Import Source
https://advisories.mageia.org/MGASA-2018-0034.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0034
Related
Published
2018-01-03T14:22:14Z
Modified
2018-01-03T13:50:45Z
Summary
Updated gdb packages fix security vulnerability
Details

Hanno Böck discovered that gdb incorrectly handled certain malformed AOUT headers in PE executables. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2014-8501).

It was discovered that gdb incorrectly handled printing bad bytes in Intel Hex objects. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service (CVE-2014-9939).

It was discovered that gdb incorrectly handled certain string operations. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2016-2226).

It was discovered that gdb incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4491, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131).

References
Credits

Affected packages