[CLSA-2024:1721929982] Fix CVE(s): CVE-2023-39128, CVE-2023-39129, CVE-2023-39130
Type:
security
Severity:
Moderate
Release date:
2024-07-25 17:53:05 UTC
Description:
* SECURITY UPDATE: stack buffer overflow in ada_decode - debian/patches/CVE-2023-39128.patch: Fix stack buffer overflow - CVE-2023-39128 * SECURITY UPDATE: stack buffer overflow - debian/patches/CVE-2023-39129.patch: Verify COFF symbol stringtab offset and fix problem with 32bit architecture build - CVE-2023-39129 * SECURITY UPDATE: heap buffer overflow - debian/patches/CVE-2023-39130.patch: bfd IO functions give warnings - CVE-2023-39130
Updated packages:
  • gdb_8.1.1-0ubuntu1+tuxcare.els1_amd64.deb
    sha:a41829f02518fb0178d66f534c679b0423927a57
  • gdb-doc_8.1.1-0ubuntu1+tuxcare.els1_all.deb
    sha:c90e52b533cdc06c91fa6af7c1f4e85511b16223
  • gdb-multiarch_8.1.1-0ubuntu1+tuxcare.els1_amd64.deb
    sha:670349f3b4154c4c160105b9fbc85e31b0a3c890
  • gdb-source_8.1.1-0ubuntu1+tuxcare.els1_all.deb
    sha:1f8c79a281deb6ecc6c2ec26f3218fa2168526b5
  • gdbserver_8.1.1-0ubuntu1+tuxcare.els1_amd64.deb
    sha:a82928da7908e6bbe05f9e1541986fcdff8762a5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.