Format: 1.8 Date: Fri, 09 Jun 2017 10:42:55 -0400 Source: gdb Binary: gdb gdb-minimal gdb64 gdb-multiarch gdbserver gdb-source gdb-doc Architecture: powerpc powerpc_translations Version: 7.7.1-0ubuntu5~14.04.3 Distribution: trusty Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: gdb - GNU Debugger gdb-doc - The GNU Debugger Documentation gdb-minimal - GNU Debugger (minimal version) gdb-multiarch - GNU Debugger (with support for multiple architectures) gdb-source - GNU Debugger (source) gdb64 - GNU Debugger (64-bit) gdbserver - GNU Debugger (remote server) Changes: gdb (7.7.1-0ubuntu5~14.04.3) trusty-security; urgency=medium . * SECURITY UPDATE: DoS via invalid value in NumberOfRvaAndSizes field - debian/patches/CVE-2014-8501.patch: add check to bfd/peXXigen.c. - CVE-2014-8501 * SECURITY UPDATE: stack overflow when printing bad bytes - debian/patches/CVE-2014-9939.patch: fix escape sequences in bfd/ihex.c, bfd/srec.c. - CVE-2014-9939 * SECURITY UPDATE: integer overflow in string_appends - debian/patches/CVE-2016-2226.patch: check for overflow in libiberty/cplus-dem.c, added xmalloc_failed to gdb/common/common-utils.c. - CVE-2016-2226 * SECURITY UPDATE: use-after-free vulberabilities - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4487 - CVE-2016-4488 * SECURITY UPDATE: integer overflow in gnu_special - debian/patches/CVE-2016-4489.patch: handle case where consume_count returns -1 in libiberty/cplus-dem.c. - CVE-2016-4489 * SECURITY UPDATE: integer overflow after sanity checks - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead of long in libiberty/cp-demangle.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4490 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-4491-1.patch: limit recursion in include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c, added test to libiberty/testsuite/demangle-expected. - debian/patches/CVE-2016-4491-2.patch: limit more recursion in libiberty/cp-demangle.c. - debian/patches/CVE-2016-4491-3.patch: initialize d_printing in gdb/cp-name-parser.y, libiberty/cp-demangle.c. - CVE-2016-4491 * SECURITY UPDATE: buffer overflow in do_type - debian/patches/CVE-2016-4492_4493.patch: properly handle large values and overflow in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-4492 - CVE-2016-4493 * SECURITY UPDATE: denial of service via infinite recursion - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in libiberty/cplus-dem.c, added test to libiberty/testsuite/demangle-expected. - CVE-2016-6131 Checksums-Sha1: 36b453f8240de2c570251e654fd0ac362f0be212 2248008 gdb_7.7.1-0ubuntu5~14.04.3_powerpc.deb 4df195dd1d77e2850efc47a4d70bdc638dc4f5f1 6257688 gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb 4020da5b17d925b0f8224ad16bd38dc9a416d0fa 817806 gdb_7.7.1-0ubuntu5~14.04.3_powerpc_translations.tar.gz c504e5087d0250fbbf7601128ca78e8e7978e56e 1772662 gdb-minimal_7.7.1-0ubuntu5~14.04.3_powerpc.deb 403e27f6a4c12e62435c6d1abbac260993f54b17 4903798 gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb 47c7918c3acec3e6f553b3767183d43e75c435e4 1644932 gdb64_7.7.1-0ubuntu5~14.04.3_powerpc.deb 4001ccff76083cc3433bf94df1a79da00ccb038b 2482720 gdb-multiarch_7.7.1-0ubuntu5~14.04.3_powerpc.deb 7d37944afe574892519b38473531981effd0676a 111420 gdbserver_7.7.1-0ubuntu5~14.04.3_powerpc.deb 93bab114e22b32093a597461793c6b92d2ddcbc5 245148 gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb Checksums-Sha256: b292382160787cba2666106250b28bc55f132ce37a6dba868e531717e2b5f856 2248008 gdb_7.7.1-0ubuntu5~14.04.3_powerpc.deb 36e4c9629bd4478d8c85460a5bd2e2f1e9ad36d6d0004500025f44585f53f0f3 6257688 gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb c60539f6bf1ba9d5058faadccf8c7aab61c1652b37be094315816f09ced76fa4 817806 gdb_7.7.1-0ubuntu5~14.04.3_powerpc_translations.tar.gz 9820fae08593802ab92fe884489532227d0a7c977670920c657b0160aa3617de 1772662 gdb-minimal_7.7.1-0ubuntu5~14.04.3_powerpc.deb 49c0d83185c166258cee9e52e9c6e75828e9d7e4d1c1eb74431e773b66964bf4 4903798 gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb 3526c2b8edf28434ce6cba0850490766d9f098214aabbfb46a9b290cd97bab94 1644932 gdb64_7.7.1-0ubuntu5~14.04.3_powerpc.deb 138336d7955a338592c186eaf419e26ecfa16e191e78d234bad080e2e6168fd2 2482720 gdb-multiarch_7.7.1-0ubuntu5~14.04.3_powerpc.deb 7b8ee23bc6f461d335da8d942e06e2e41d0d1877446841a5662c99cdfe72d5a9 111420 gdbserver_7.7.1-0ubuntu5~14.04.3_powerpc.deb ebef5178ef21bf477853acb0f3fcee845193dbb7934ab67a0bdefaafbb2e6485 245148 gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb Files: d847a9dc842cf44c965f301eb525bd92 2248008 devel optional gdb_7.7.1-0ubuntu5~14.04.3_powerpc.deb c47d1fb19ffb5049956aa57b8f2da795 6257688 devel extra gdb-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb e3d99559d513a4f60c634e7a3f515382 817806 raw-translations - gdb_7.7.1-0ubuntu5~14.04.3_powerpc_translations.tar.gz 8d3ccbefb48653dc9a4b46ac31109d9b 1772662 devel optional gdb-minimal_7.7.1-0ubuntu5~14.04.3_powerpc.deb 902c4a7720b85a43b397a278aa0769a9 4903798 devel extra gdb-minimal-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb 96f715416035277729478debeaf17ec8 1644932 devel optional gdb64_7.7.1-0ubuntu5~14.04.3_powerpc.deb 22a34eb76b320ed7cb796139768622d5 2482720 devel optional gdb-multiarch_7.7.1-0ubuntu5~14.04.3_powerpc.deb 2e498bb751e44550f8abc998faa89074 111420 devel optional gdbserver_7.7.1-0ubuntu5~14.04.3_powerpc.deb 28ee1dac32108f095a2fa171260f3691 245148 devel extra gdbserver-dbgsym_7.7.1-0ubuntu5~14.04.3_powerpc.ddeb Original-Maintainer: Héctor Orón Martínez