Bug 2226593 (CVE-2023-39128)

Summary: CVE-2023-39128 gdb: dynamic-stack-buffer-overflow in ada_decode[abi:cxx11](char const*, bool, bool)
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: gdb-bugs, kdump-bugs, keiths, mcermak, ohudlick
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-09-29 11:37:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2238514, 2226597, 2226598, 2226599, 2226600, 2226601, 2226602, 2226603, 2226604, 2226605, 2226606, 2226607, 2238513, 2238515    
Bug Blocks: 2226596    

Description Sandipan Roy 2023-07-26 03:51:10 UTC
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.

https://sourceware.org/bugzilla/show_bug.cgi?id=30639

Comment 2 Dhananjay Arunesh 2023-09-12 10:28:29 UTC
Created crash tracking bugs for this issue:

Affects: fedora-all [bug 2238513]


Created gdb tracking bugs for this issue:

Affects: fedora-all [bug 2238514]


Created mingw-gdb tracking bugs for this issue:

Affects: fedora-all [bug 2238515]