![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2024.0246 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2024-0246) |
Zusammenfassung: | The remote host is missing an update for the 'gdb' package(s) announced via the MGASA-2024-0246 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'gdb' package(s) announced via the MGASA-2024-0246 advisory. Vulnerability Insight: An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599. (CVE-2022-4285) A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability. (CVE-2023-1972) GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c. (CVE-2023-39128) GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c. (CVE-2023-39129) GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c. (CVE-2023-39130) Affected Software/OS: 'gdb' package(s) on Mageia 9. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-4285 https://security.gentoo.org/glsa/202309-15 https://bugzilla.redhat.com/show_bug.cgi?id=2150768 https://sourceware.org/bugzilla/show_bug.cgi?id=29699 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 Common Vulnerability Exposure (CVE) ID: CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 Common Vulnerability Exposure (CVE) ID: CVE-2023-39128 https://sourceware.org/bugzilla/show_bug.cgi?id=30639 Common Vulnerability Exposure (CVE) ID: CVE-2023-39129 https://sourceware.org/bugzilla/show_bug.cgi?id=30640 Common Vulnerability Exposure (CVE) ID: CVE-2023-39130 https://sourceware.org/bugzilla/show_bug.cgi?id=30641 |
Copyright | Copyright (C) 2024 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |