Skip to navigation

Security Advisory Low: gdb security and bug fix update

Advisory: RHSA-2007:0229-4
Type: Security Advisory
Severity: Low
Issued on: 2007-05-01
Last updated on: 2007-05-01
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-4146

Details

An updated gdb package that fixes a security issue and various bugs is now
available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

GDB, the GNU debugger, allows debugging of programs written in C, C++, and
other languages by executing them in a controlled fashion and then printing
their data.

Various buffer overflows and underflows were found in the DWARF expression
computation stack in GDB. If a user loaded an executable containing
malicious debugging information into GDB, an attacker might be able to
execute arbitrary code with the privileges of the user. (CVE-2006-4146)

This updated package also addresses the following issues:

* Fixed bogus 0x0 unwind of the thread's topmost function clone(3).

* Fixed deadlock accessing invalid address; for corrupted backtraces.

* Fixed a race which occasionally left the detached processes stopped.

* Fixed 'gcore' command for 32bit debugged processes on 64bit hosts.

* Added support for TLS 'errno' for threaded programs missing its '-debuginfo' package..

* Suggest TLS 'errno' resolving by hand if no threading was found..

* Added a fix to prevent stepping into asynchronously invoked signal handlers.

* Added a fix to avoid false warning on shared objects bfd close on Itanium.

* Fixed segmentation fault on the source display by ^X 1.

* Fixed object names keyboard completion.

* Added a fix to avoid crash of 'info threads' if stale threads exist.

* Fixed a bug where shared libraries occasionally failed to load .

* Fixed handling of exec() called by a threaded debugged program.

* Fixed rebuilding requirements of the gdb package itself on multilib systems.

* Fixed source directory pathname detection for the edit command.

All users of gdb should upgrade to this updated package, which contains
backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
gdb-6.3.0.0-1.143.el4.src.rpm
File outdated by:  RHBA-2009:1015
    MD5: ed563ce21a2006efbc0692d66be0bc53
 
IA-32:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
 
x86_64:
gdb-6.3.0.0-1.143.el4.x86_64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 1226da2eef9141ecb6c1a6f8cdd985ab
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
gdb-6.3.0.0-1.143.el4.src.rpm
File outdated by:  RHBA-2009:1015
    MD5: ed563ce21a2006efbc0692d66be0bc53
 
IA-32:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
 
IA-64:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
gdb-6.3.0.0-1.143.el4.ia64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 529d36635ac1f649794a221566f2338f
 
PPC:
gdb-6.3.0.0-1.143.el4.ppc64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 98566f98be211ce100067cd7b85d3509
 
s390:
gdb-6.3.0.0-1.143.el4.s390.rpm
File outdated by:  RHBA-2009:1015
    MD5: bc1203b4bff149f6c2ca5b69e534060b
 
s390x:
gdb-6.3.0.0-1.143.el4.s390x.rpm
File outdated by:  RHBA-2009:1015
    MD5: bf0e6243efc9bbe4b99c112bb018f1b3
 
x86_64:
gdb-6.3.0.0-1.143.el4.x86_64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 1226da2eef9141ecb6c1a6f8cdd985ab
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
gdb-6.3.0.0-1.143.el4.src.rpm
File outdated by:  RHBA-2009:1015
    MD5: ed563ce21a2006efbc0692d66be0bc53
 
IA-32:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
 
IA-64:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
gdb-6.3.0.0-1.143.el4.ia64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 529d36635ac1f649794a221566f2338f
 
x86_64:
gdb-6.3.0.0-1.143.el4.x86_64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 1226da2eef9141ecb6c1a6f8cdd985ab
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
gdb-6.3.0.0-1.143.el4.src.rpm
File outdated by:  RHBA-2009:1015
    MD5: ed563ce21a2006efbc0692d66be0bc53
 
IA-32:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
 
IA-64:
gdb-6.3.0.0-1.143.el4.i386.rpm
File outdated by:  RHBA-2009:1015
    MD5: 9b62527f67a18e666b0b067bcdd41c80
gdb-6.3.0.0-1.143.el4.ia64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 529d36635ac1f649794a221566f2338f
 
x86_64:
gdb-6.3.0.0-1.143.el4.x86_64.rpm
File outdated by:  RHBA-2009:1015
    MD5: 1226da2eef9141ecb6c1a6f8cdd985ab
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

185337 - p errno does not work when stopped at a breakpoint
193763 - Buffer overrun in add_minsym_members
195429 - info threads crashes if zombie threads exist
202682 - print call foo where foo is in library SEGV
202689 - Cannot find user-level thread for LWP 4256: generic error
204841 - CVE-2006-4146 GDB buffer overflow


References


Keywords

buffer, dwarf, overflow, stack


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/