Описание
ELSA-2023-6372: gdb security update (LOW)
[10.2.11.0.1]
- Merge Oracle patches for ol9 Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com
[10.2-11.el9]
- Backport 'libiberty: prevent buffer overflow when decoding user input' (Luis Ferreira, RHBZ2132600)
- Mon Mar 27 2023 Bruno Larsen blarsen@redhat.com
- Backport '[gdb/breakpoint] Fix assert in jit_event_handler' (Tom de Vries, RHBZ 2130624)
- Thu Mar 23 2023 Bruno Larsen blarsen@redhat.com
- Bakport 'Fix assertion failure in copy_type' (Tom Tromey, RHBZ 2155439)
- Bakport '[gdb/testsuite] Fix PR20630 regression test in gdb.base/printcmds.exp' (Tom de Vries)
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
gdb
10.2-11.0.1.el9
gdb-doc
10.2-11.0.1.el9
gdb-gdbserver
10.2-11.0.1.el9
gdb-headless
10.2-11.0.1.el9
gdb-minimal
10.2-11.0.1.el9
Oracle Linux x86_64
gdb
10.2-11.0.1.el9
gdb-doc
10.2-11.0.1.el9
gdb-gdbserver
10.2-11.0.1.el9
gdb-headless
10.2-11.0.1.el9
gdb-minimal
10.2-11.0.1.el9
Связанные CVE
Связанные уязвимости
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c ...
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.