[ubuntu/jammy-security] gdb 12.1-0ubuntu1~22.04.2 (Accepted)
Evan Caville
evan.caville at canonical.com
Thu Jun 20 06:27:47 UTC 2024
gdb (12.1-0ubuntu1~22.04.2) jammy-security; urgency=low
* SECURITY UPDATE: illegal memory access
- debian/patches/CVE-2022-4285.patch: Fix an illegal memory access
when parsing an ELF file containing corrupt symbol version
information.
- CVE-2022-4285
* SECURITY UPDATE: heap buffer overflow
- debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
when an accessing a zero-length verdef table.
- CVE-2023-1972
* SECURITY UPDATE: stack buffer overflow
- debian/patches/CVE-2023-39128.patch: Avoid buffer overflow in
ada_decode
- CVE-2023-39128
* SECURITY UPDATE: use after free
- debian/patches/CVE-2023-39129-1.patch: Verify COFF symbol
stringtab offset
- debian/patches/CVE-2023-39129-2.patch: Fix gdb/coffread.c build on
32bit architectures
- debian/patches/CVE-2023-39129-3.patch: Use hex_string in
gdb/coffread.c instead of PRIxPTR
- CVE-2023-39129
* SECURITY UPDATE: heap buffer overflow
- debian/patches/CVE-2023-39130.patch: gdb: warn unused result for
bfd IO functions
- CVE-2023-39130
Date: 2024-06-17 23:39:10.935164+00:00
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Signed-By: Evan Caville <evan.caville at canonical.com>
https://launchpad.net/ubuntu/+source/gdb/12.1-0ubuntu1~22.04.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list