Format: 1.8 Date: Fri, 09 Jun 2017 10:41:47 -0400 Source: gdb Binary: gdb gdb64 gdb-multiarch gdbserver gdb-source gdb-dbg gdb-doc Architecture: powerpc powerpc_translations Version: 7.11.1-0ubuntu1~16.5 Distribution: xenial Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: gdb - GNU Debugger gdb-dbg - GNU Debugger (debug package) gdb-doc - The GNU Debugger Documentation gdb-multiarch - GNU Debugger (with support for multiple architectures) gdb-source - GNU Debugger (source) gdb64 - GNU Debugger (64-bit) gdbserver - GNU Debugger (remote server) Changes: gdb (7.11.1-0ubuntu1~16.5) xenial-security; urgency=medium . * SECURITY UPDATE: integer overflow in string_appends - debian/patches/CVE-2016-2226.patch: check for overflow in libiberty/cplus-dem.c, added xmalloc_failed to gdb/common/common-utils.c. - CVE-2016-2226 * SECURITY UPDATE: use-after-free vulberabilities - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4487 - CVE-2016-4488 * SECURITY UPDATE: integer overflow in gnu_special - debian/patches/CVE-2016-4489.patch: handle case where consume_count returns -1 in libiberty/cplus-dem.c. - CVE-2016-4489 * SECURITY UPDATE: integer overflow after sanity checks - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead of long in libiberty/cp-demangle.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4490 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-4491-1.patch: limit recursion in include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c, added test to libiberty/testsuite/demangle-expected. - debian/patches/CVE-2016-4491-2.patch: limit more recursion in libiberty/cp-demangle.c. - debian/patches/CVE-2016-4491-3.patch: initialize d_printing in gdb/cp-name-parser.y, libiberty/cp-demangle.c. - CVE-2016-4491 * SECURITY UPDATE: buffer overflow in do_type - debian/patches/CVE-2016-4492_4493.patch: properly handle large values and overflow in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4492 - CVE-2016-4493 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-6131 Checksums-Sha1: 4967f8768c82d57e7a73de2432b2b4ab849b9e12 15107698 gdb-dbg_7.11.1-0ubuntu1~16.5_powerpc.deb b2413fa53cd0f93b930284745407ee359412d884 1012 gdb-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 489bb1da442a0419e64be506b23ac577cfa03408 1054 gdb-multiarch-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb c938d14b71f26aa920b886d9903026be599ecb2c 2691824 gdb-multiarch_7.11.1-0ubuntu1~16.5_powerpc.deb 5937aabe8a83662ab0b69afb8f2fa5fb1b52a356 1052 gdb64-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb b3d6d4548b7b0b75ced7690e4f7c093c0a65e8eb 1800894 gdb64_7.11.1-0ubuntu1~16.5_powerpc.deb 8a6ec11b88cf9a76c7da6167c235ac2121832b72 2515386 gdb_7.11.1-0ubuntu1~16.5_powerpc.deb ee0a543fed952be0706d1b13bf16ba660f38382e 875075 gdb_7.11.1-0ubuntu1~16.5_powerpc_translations.tar.gz 0eb9530ac7ad1a5ab1370cdd0de524073e58a412 1060 gdbserver-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 2a5d498efed005a0bc40d40535d7196f0890f970 133026 gdbserver_7.11.1-0ubuntu1~16.5_powerpc.deb Checksums-Sha256: 9891c7f90738768ef95d144afbc366ab2006022f95ed937c6096623704a3ce67 15107698 gdb-dbg_7.11.1-0ubuntu1~16.5_powerpc.deb 1d0953a14d87d35fee91a77436f8f0179e2bd7bab0322dfcab3af453bf1e0afd 1012 gdb-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 6c6018e19be3cfc49d4fdbdb0f4dcace81a3411d6693d2667fb8f82a4e6bf4d8 1054 gdb-multiarch-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb a3144a8ca1ebf48d8a9146467fd44de1bb3d40d365c1f1f2a8ffa6c768c7aa98 2691824 gdb-multiarch_7.11.1-0ubuntu1~16.5_powerpc.deb 8273e48086cc5365792e16d6bbc154d854a165b0a9080886cf81b3e6202cae11 1052 gdb64-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 441ff6cb77d4ca5327e7edd300ade0a093cb1f76ab5a9bdcb0eb966efe753bd1 1800894 gdb64_7.11.1-0ubuntu1~16.5_powerpc.deb 94224261f9200abcfcf89bcff52039292e2bff847eac0cb1551d7216316ec20c 2515386 gdb_7.11.1-0ubuntu1~16.5_powerpc.deb a9c440feee98812f8a76cfc2b4464961a3a1d93ab1c5cfb8eacd159393c0b9d9 875075 gdb_7.11.1-0ubuntu1~16.5_powerpc_translations.tar.gz d8708d827e0662c543dd5250eaeb7c79dca8d77ed2cfebbf9cfad2b263b31bdb 1060 gdbserver-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 54cb8db258ba781fd4b2535c710c7a509563d76b15d55d6f3b49f4a98d317a1e 133026 gdbserver_7.11.1-0ubuntu1~16.5_powerpc.deb Files: 21a16ce94dd24a06f334a535846442e9 15107698 debug extra gdb-dbg_7.11.1-0ubuntu1~16.5_powerpc.deb 8edfd5a9e29cf44a97af7f4dba5d551a 1012 devel extra gdb-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb d869702f110120a03929888b5ef72153 1054 devel extra gdb-multiarch-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 2d1f146a3275ba3aa8d3e0538dec5cc7 2691824 devel optional gdb-multiarch_7.11.1-0ubuntu1~16.5_powerpc.deb 23a3152ab36d9306c599ed1ccfd1e781 1052 devel extra gdb64-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb b288a25caeceae1e50f6429c28eacf0d 1800894 devel optional gdb64_7.11.1-0ubuntu1~16.5_powerpc.deb a3e1b6628addc9c67de17bfdb43f6d9d 2515386 devel optional gdb_7.11.1-0ubuntu1~16.5_powerpc.deb c12b99b18a67367a66487ab0bd182651 875075 raw-translations - gdb_7.11.1-0ubuntu1~16.5_powerpc_translations.tar.gz 57b68349ed2934de1902c2943d5e1a27 1060 devel extra gdbserver-dbgsym_7.11.1-0ubuntu1~16.5_powerpc.ddeb 0987c34ef097f0eab997259ae8eb7818 133026 devel optional gdbserver_7.11.1-0ubuntu1~16.5_powerpc.deb Original-Maintainer: Héctor Orón Martínez