{"id":"MGASA-2018-0035","summary":"Updated gdb packages fix security vulnerability","details":"It was discovered that gdb incorrectly handled parsing certain binaries. If\na user or automated system were tricked into processing a specially crafted\nbinary, a remote attacker could use this issue to cause gdb to crash,\nresulting in a denial of service (CVE-2016-4491, CVE-2016-6131).\n","modified":"2026-01-30T03:07:04.576284Z","published":"2018-01-03T14:22:14Z","related":["CVE-2016-4491","CVE-2016-6131"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0035.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21376"},{"type":"REPORT","url":"https://usn.ubuntu.com/usn/usn-3367-1/"}],"affected":[{"package":{"name":"gdb","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/gdb?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.12-16.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0035.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}