[ubuntu/jammy-security] gdb 12.1-0ubuntu1~22.04.2 (Accepted)

Evan Caville evan.caville at canonical.com
Thu Jun 20 06:27:47 UTC 2024


gdb (12.1-0ubuntu1~22.04.2) jammy-security; urgency=low

  * SECURITY UPDATE: illegal memory access
    - debian/patches/CVE-2022-4285.patch: Fix an illegal memory access
      when parsing an ELF file containing corrupt symbol version
      information.
    - CVE-2022-4285
  * SECURITY UPDATE: heap buffer overflow
    - debian/patches/CVE-2023-1972.patch: Fix an illegal memory access
      when an accessing a zero-length verdef table.
    - CVE-2023-1972
  * SECURITY UPDATE: stack buffer overflow
    - debian/patches/CVE-2023-39128.patch: Avoid buffer overflow in
      ada_decode
    - CVE-2023-39128
  * SECURITY UPDATE: use after free
    - debian/patches/CVE-2023-39129-1.patch: Verify COFF symbol
      stringtab offset
    - debian/patches/CVE-2023-39129-2.patch: Fix gdb/coffread.c build on
      32bit architectures
    - debian/patches/CVE-2023-39129-3.patch: Use hex_string in
      gdb/coffread.c instead of PRIxPTR
    - CVE-2023-39129
  * SECURITY UPDATE: heap buffer overflow
    - debian/patches/CVE-2023-39130.patch: gdb: warn unused result for
      bfd IO functions
    - CVE-2023-39130

Date: 2024-06-17 23:39:10.935164+00:00
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Signed-By: Evan Caville <evan.caville at canonical.com>
https://launchpad.net/ubuntu/+source/gdb/12.1-0ubuntu1~22.04.2
-------------- next part --------------
Sorry, changesfile not available.


More information about the jammy-changes mailing list