CVE-2019-1010180

Priority
Description
GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory
access. The impact is: Deny of Service, Memory Disclosure, and Possible
Code Execution. The component is: The main gdb module. The attack vector
is: Open an ELF for debugging. The fixed version is: Not fixed yet.
Notes
leosilvathe patch only prints a warning about the issue, it does not
fix it.
Package
Source: gdb (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):not-affected (8.3-0ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (8.3-0ubuntu1)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8ff71a9c80cfcf64c54d4ae938c644b1b1ea19fb
More Information

Updated: 2020-01-29 18:56:24 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)