Format: 1.8 Date: Fri, 09 Jun 2017 10:42:55 -0400 Source: gdb Binary: gdb gdb-minimal gdb64 gdb-multiarch gdbserver gdb-source gdb-doc Architecture: amd64 amd64_translations Version: 7.7.1-0ubuntu5~14.04.3 Distribution: trusty Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: gdb - GNU Debugger gdb-doc - The GNU Debugger Documentation gdb-minimal - GNU Debugger (minimal version) gdb-multiarch - GNU Debugger (with support for multiple architectures) gdb-source - GNU Debugger (source) gdb64 - GNU Debugger (64-bit) gdbserver - GNU Debugger (remote server) Changes: gdb (7.7.1-0ubuntu5~14.04.3) trusty-security; urgency=medium . * SECURITY UPDATE: DoS via invalid value in NumberOfRvaAndSizes field - debian/patches/CVE-2014-8501.patch: add check to bfd/peXXigen.c. - CVE-2014-8501 * SECURITY UPDATE: stack overflow when printing bad bytes - debian/patches/CVE-2014-9939.patch: fix escape sequences in bfd/ihex.c, bfd/srec.c. - CVE-2014-9939 * SECURITY UPDATE: integer overflow in string_appends - debian/patches/CVE-2016-2226.patch: check for overflow in libiberty/cplus-dem.c, added xmalloc_failed to gdb/common/common-utils.c. - CVE-2016-2226 * SECURITY UPDATE: use-after-free vulberabilities - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4487 - CVE-2016-4488 * SECURITY UPDATE: integer overflow in gnu_special - debian/patches/CVE-2016-4489.patch: handle case where consume_count returns -1 in libiberty/cplus-dem.c. - CVE-2016-4489 * SECURITY UPDATE: integer overflow after sanity checks - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead of long in libiberty/cp-demangle.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4490 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-4491-1.patch: limit recursion in include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c, added test to libiberty/testsuite/demangle-expected. - debian/patches/CVE-2016-4491-2.patch: limit more recursion in libiberty/cp-demangle.c. - debian/patches/CVE-2016-4491-3.patch: initialize d_printing in gdb/cp-name-parser.y, libiberty/cp-demangle.c. - CVE-2016-4491 * SECURITY UPDATE: buffer overflow in do_type - debian/patches/CVE-2016-4492_4493.patch: properly handle large values and overflow in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4492 - CVE-2016-4493 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-6131 Checksums-Sha1: 80f736382d274e8bdf44458f3ac2c3cc5c6838c4 2198542 gdb_7.7.1-0ubuntu5~14.04.3_amd64.deb ec126795e46e609dfa058282b328e47715af69db 4545806 gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb 6aae67c779e2919655607a7eb8a5d91407a1f0b1 818489 gdb_7.7.1-0ubuntu5~14.04.3_amd64_translations.tar.gz 81dee3151a3d61342f7152a538ee13187aac09dc 1839562 gdb-minimal_7.7.1-0ubuntu5~14.04.3_amd64.deb 5afbfbb97fe57b80641ff717a6a24187fdf65e04 4243456 gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb e47eaec559dbda9f9847ddbf02308792b3918584 2730454 gdb-multiarch_7.7.1-0ubuntu5~14.04.3_amd64.deb 79b2a01101dad6dd66c518abc83406096d9c3aba 127976 gdbserver_7.7.1-0ubuntu5~14.04.3_amd64.deb f7c419bd24812f01cada721a7821da142ff7d867 273360 gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb Checksums-Sha256: 978f0174c76cf49c70b036c79344eb1442cc560053eb957c9d2bf680c9d4209b 2198542 gdb_7.7.1-0ubuntu5~14.04.3_amd64.deb a55341fb8559098eca1850e0a47336c7ffd8052eaa0298e4101f38e0b9b566db 4545806 gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb 451f7981379bca233d1e76bfe8912b27b7c94f25168984b2003c089a40b5c0fd 818489 gdb_7.7.1-0ubuntu5~14.04.3_amd64_translations.tar.gz ba9cb313f8b4861577974585d72f0272e1e1997339029bd9ba2f4c5f653f2b40 1839562 gdb-minimal_7.7.1-0ubuntu5~14.04.3_amd64.deb 705714ea65a3576ecb710e127da38e582725555ba19dee53b3c148cee96a9df2 4243456 gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb 858b36f3255c30421682f3b5833693af8c917b79ce8a4dab838e9fd6c7f4f94a 2730454 gdb-multiarch_7.7.1-0ubuntu5~14.04.3_amd64.deb 1b4c5b513f074e28eac0c25d54f21783537f266ba14d3fd5d97222ba96747b87 127976 gdbserver_7.7.1-0ubuntu5~14.04.3_amd64.deb 446cc43012eb63c274d91c6674c3c5ea94f851c2ac96bd030fa5002326fa0de7 273360 gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb Files: 680715773d7b9b35ad8f3ef5952efbfe 2198542 devel optional gdb_7.7.1-0ubuntu5~14.04.3_amd64.deb 270923ded82e91f4ef5bdb1b8889c891 4545806 devel extra gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb 6ed19ae38ca8359784d9e938778164ea 818489 raw-translations - gdb_7.7.1-0ubuntu5~14.04.3_amd64_translations.tar.gz 15f4776964ca95f0f5d3c1c8e56dd8bf 1839562 devel optional gdb-minimal_7.7.1-0ubuntu5~14.04.3_amd64.deb 7e9dccc364a2d4ff9de2b599ab649245 4243456 devel extra gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb 37224762c1c4d4fb8cf677d707009e72 2730454 devel optional gdb-multiarch_7.7.1-0ubuntu5~14.04.3_amd64.deb bda76fdc46b09fbd286c7673eb852ad7 127976 devel optional gdbserver_7.7.1-0ubuntu5~14.04.3_amd64.deb 2934060393eed5820c5d336d718bf541 273360 devel extra gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_amd64.ddeb Original-Maintainer: Héctor Orón Martínez