Your submission was sent successfully! Close

CVE-2019-1010180

Published: 24 July 2019

GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
gdb
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(8.3-0ubuntu1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(8.3-0ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(8.3-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8ff71a9c80cfcf64c54d4ae938c644b1b1ea19fb

Notes

AuthorNote
leosilva
the patch only prints a warning about the issue, it does not
fix it.

References

Bugs