blob: da2e894f0174bfc7ed5be4504484283ae3c63c62 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-15">
<title>gdb: Multiple vulnerabilities</title>
Multiple vulnerabilities have been discovered in the GNU debugger,
potentially allowing the execution of arbitrary code.
<product type="ebuild">gdb</product>
<announced>May 20, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="sys-devel/gdb" auto="yes" arch="*">
<unaffected range="ge">6.3-r3</unaffected>
<vulnerable range="lt">6.3-r3</vulnerable>
gdb is the GNU project's debugger, facilitating the analysis and
debugging of applications. The BFD library provides a uniform method of
accessing a variety of object file formats.
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered an
integer overflow in the BFD library, resulting in a heap overflow. A
review also showed that by default, gdb insecurely sources
initialisation files from the working directory.
<impact type="normal">
Successful exploitation would result in the execution of arbitrary code
on loading a specially crafted object file or the execution of
arbitrary commands.
There is no known workaround at this time.
All gdb users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/gdb-6.3-r3&quot;</code>
<uri link="">CVE-2005-1704</uri>
<uri link="">CVE-2005-1705</uri>
<metadata tag="requester" timestamp="Fri, 06 May 2005 21:52:10 +0000">
<metadata tag="submitter" timestamp="Sat, 07 May 2005 04:11:43 +0000">
<metadata tag="bugReady" timestamp="Fri, 20 May 2005 12:36:18 +0000">