CVE-2006-4146

NameCVE-2006-4146
DescriptionBuffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdb (PTS)buster8.2.1-2fixed
bullseye10.1-1.7fixed
bookworm13.1-3fixed
sid, trixie13.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdbsource(unstable)7.3-1unimportant

Notes

Every sensible use of gdb involves executing the debugged binary
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=d53d4ac5aaf62c631e8d915e049eaf3f52fe24c8
https://bugzilla.redhat.com/show_bug.cgi?id=204841
https://bugs.launchpad.net/ubuntu/+source/gdb/+bug/62695

Search for package or bug name: Reporting problems