Bug 158680 - CAN-2005-1704 Integer overflow in gdb
CAN-2005-1704 Integer overflow in gdb
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: gdb (Show other bugs)
All Linux
medium Severity low
: ---
: ---
Assigned To: Elena Zannoni
Jay Turner
: Security
Depends On:
Blocks: 156322
  Show dependency treegraph
Reported: 2005-05-24 16:00 EDT by Josh Bressers
Modified: 2015-01-07 19:10 EST (History)
4 users (show)

See Also:
Fixed In Version: RHSA-2005-709
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2005-10-05 08:41:41 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Demo exploit taken from the gentoo BTS (63 bytes, application/octet-stream)
2005-06-10 17:14 EDT, Josh Bressers
no flags Details

  None (edit)
Description Josh Bressers 2005-05-24 16:00:42 EDT
Integer overflow in the BFD library for gdb before 6.3 allows
attackers to execute arbitrary code via a crafted object file that
specifies a large number of section headers, leading to a heap-based
buffer overflow.

More information is available in the gentoo bug:
Comment 1 Josh Bressers 2005-05-24 16:02:27 EDT
This issue should also affect RHEL2.1 and RHEL3
Comment 6 Josh Bressers 2005-06-08 13:36:05 EDT
ping on this issue
Comment 7 Jeff Johnston 2005-06-08 18:57:18 EDT
I have pieced together the correct fix for bfd and have modified the gdb patch
discussed on the FSF list to add a query that allows the user to continue and
defaults to no if the .gdbinit file is untrusted.  I am currently building and
testing the patch.
Comment 13 Josh Bressers 2005-06-10 17:14:07 EDT
Created attachment 115313 [details]
Demo exploit taken from the gentoo BTS
Comment 14 Jakub Jelinek 2005-06-14 11:00:53 EDT
There are already separate bzs for binutils, so this one should be assigned
to GDB crowd...
Comment 16 Jeff Johnston 2005-06-30 17:52:52 EDT
Moving to modified as rpm has been built for RHEL-4: gdb-
Comment 18 Josh Bressers 2005-08-01 14:52:38 EDT

Additionally, how do these packages fall regarding the quarterly updates?  Are
they included in the current QU packages, or shall we wait until after U2/U6 to
release these?
Comment 19 Jeff Johnston 2005-08-02 13:27:55 EDT
This patch is considered between the last QU update and the upcoming one.  It is
a security patch that falls outside the normal QU timeframe.  It also allows
those who do not intend to update to the next gdb QU level to get the patch on
its own.
Comment 20 Red Hat Bugzilla 2005-10-05 08:41:41 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.