Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-39129

Published: 25 July 2023

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.

Notes

AuthorNote
Priority reason:
Crash in a command line tool, negligible security impact

Priority

Low

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
gdb
Launchpad, Ubuntu, Debian
bionic Needed

focal Needed

jammy Needed

lunar Ignored
(end of life, was needed)
mantic Needed

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needed

Patches:
upstream: https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=58abdf887821a5da09ba184c6e400a3bc5cccd5a
upstream: https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=91df9a6f810bca02883dae9275715b4960ea02f0
upstream: https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=a6ce491c3d926650407927a338d9678ca983bee4

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H