suse-su-2023:2485-1
Vulnerability from csaf_suse
Published
2023-06-12 06:54
Modified
2023-06-12 06:54
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
gdb was updated to 12.1. (jsc#SLE-21561)
* DBX mode is deprecated, and will be removed in GDB 13.
* GDB 12 is the last release of GDB that will support building against
Python 2. From GDB 13, it will only be possible to build GDB itself
with Python 3 support.
* Improved C++ template support:
GDB now treats functions/types involving C++ templates like it does function
overloads. Users may omit parameter lists to set breakpoints on families of
template functions, including types/functions composed of multiple template types:
(gdb) break template_func(template_1, int)
The above will set breakpoints at every function `template_func' where
the first function parameter is any template type named `template_1' and
the second function parameter is `int'.
TAB completion also gains similar improvements.
* New commands:
- maint set backtrace-on-fatal-signal on|off
- maint show backtrace-on-fatal-signal
This setting is 'on' by default. When 'on' GDB will print a limited
backtrace to stderr in the situation where GDB terminates with a
fatal signal. This only supported on some platforms where the
backtrace and backtrace_symbols_fd functions are available.
- set source open on|off
- show source open
This setting, which is on by default, controls whether GDB will try
to open source code files. Switching this off will stop GDB trying
to open and read source code files, which can be useful if the files
are located over a slow network connection.
- set varsize-limit
- show varsize-limit
These are now deprecated aliases for 'set max-value-size' and
'show max-value-size'.
- task apply [all | TASK-IDS...] [FLAG]... COMMAND
Like 'thread apply', but applies COMMAND to Ada tasks.
- watch [...] task ID
Watchpoints can now be restricted to a specific Ada task.
- maint set internal-error backtrace on|off
- maint show internal-error backtrace
- maint set internal-warning backtrace on|off
- maint show internal-warning backtrace
GDB can now print a backtrace of itself when it encounters either an
internal-error, or an internal-warning. This is on by default for
internal-error and off by default for internal-warning.
- set logging on|off
Deprecated and replaced by 'set logging enabled on|off'.
- set logging enabled on|off
- show logging enabled
These commands set or show whether logging is enabled or disabled.
- exit
You can now exit GDB by using the new command 'exit', in addition to
the existing 'quit' command.
- set debug threads on|off
- show debug threads
Print additional debug messages about thread creation and deletion.
- set debug linux-nat on|off
- show debug linux-nat
These new commands replaced the old 'set debug lin-lwp' and 'show
debug lin-lwp' respectively. Turning this setting on prints debug
messages relating to GDB's handling of native Linux inferiors.
- maint flush source-cache
Flush the contents of the source code cache.
- maint set gnu-source-highlight enabled on|off
- maint show gnu-source-highlight enabled
Whether GDB should use the GNU Source Highlight library for adding
styling to source code. When off, the library will not be used, even
when available. When GNU Source Highlight isn't used, or can't add
styling to a particular source file, then the Python Pygments
library will be used instead.
- set suppress-cli-notifications (on|off)
- show suppress-cli-notifications
This controls whether printing the notifications is suppressed for CLI.
CLI notifications occur when you change the selected context
(i.e., the current inferior, thread and/or the frame), or when
the program being debugged stops (e.g., because of hitting a
breakpoint, completing source-stepping, an interrupt, etc.).
- set style disassembler enabled on|off
- show style disassembler enabled
If GDB is compiled with Python support, and the Python Pygments
package is available, then, when this setting is on, disassembler
output will have styling applied.
- set ada source-charset
- show ada source-charset
Set the character set encoding that is assumed for Ada symbols. Valid
values for this follow the values that can be passed to the GNAT
compiler via the '-gnati' option. The default is ISO-8859-1.
* Changed commands:
- print
Printing of floating-point values with base-modifying formats like
/x has been changed to display the underlying bytes of the value in
the desired base. This was GDB's documented behavior, but was never
implemented correctly.
- maint packet
This command can now print a reply, if the reply includes
non-printable characters. Any non-printable characters are printed
as escaped hex, e.g. \x?? where '??' is replaces with the value of
the non-printable character.
- clone-inferior
The clone-inferior command now ensures that the TTY, CMD and ARGS
settings are copied from the original inferior to the new one.
All modifications to the environment variables done using the 'set
environment' or 'unset environment' commands are also copied to the new
inferior.
- set debug lin-lwp on|off
- show debug lin-lwp
These commands have been removed from GDB. The new command 'set
debug linux-nat' and 'show debug linux-nat' should be used
instead.
- info win
This command now includes information about the width of the tui
windows in its output.
* GDB's Ada parser now supports an extension for specifying the exact
byte contents of a floating-point literal. This can be useful for
setting floating-point registers to a precise value without loss of
precision. The syntax is an extension of the based literal syntax.
Use, e.g., '16lf#0123abcd#' -- the number of 'l's controls the width
of the floating-point type, and the 'f' is the marker for floating
point.
* MI changes:
** The '-add-inferior' with no option flags now inherits the
connection of the current inferior, this restores the behaviour of
GDB as it was prior to GDB 10.
** The '-add-inferior' command now accepts a '--no-connection'
option, which causes the new inferior to start without a
connection.
* Python API:
** New function gdb.add_history(), which takes a gdb.Value object
and adds the value it represents to GDB's history list. An
integer, the index of the new item in the history list, is
returned.
** New function gdb.history_count(), which returns the number of
values in GDB's value history.
** New gdb.events.gdb_exiting event. This event is called with a
gdb.GdbExitingEvent object which has the read-only attribute
'exit_code', which contains the value of the GDB exit code. This
event is triggered once GDB decides it is going to exit, but
before GDB starts to clean up its internal state.
** New function gdb.architecture_names(), which returns a list
containing all of the possible Architecture.name() values. Each
entry is a string.
** New function gdb.Architecture.integer_type(), which returns an
integer type given a size and a signed-ness.
** New gdb.TargetConnection object type that represents a connection
(as displayed by the 'info connections' command). A sub-class,
gdb.RemoteTargetConnection, is used to represent 'remote' and
'extended-remote' connections.
** The gdb.Inferior type now has a 'connection' property which is an
instance of gdb.TargetConnection, the connection used by this
inferior. This can be None if the inferior has no connection.
** New 'gdb.events.connection_removed' event registry, which emits a
'gdb.ConnectionEvent' when a connection is removed from GDB.
This event has a 'connection' property, a gdb.TargetConnection
object for the connection being removed.
** New gdb.connections() function that returns a list of all
currently active connections.
** New gdb.RemoteTargetConnection.send_packet(PACKET) method. This
is equivalent to the existing 'maint packet' CLI command; it
allows a user specified packet to be sent to the remote target.
** New function gdb.host_charset(), returns a string, which is the
name of the current host charset.
** New gdb.set_parameter(NAME, VALUE). This sets the gdb parameter
NAME to VALUE.
** New gdb.with_parameter(NAME, VALUE). This returns a context
manager that temporarily sets the gdb parameter NAME to VALUE,
then resets it when the context is exited.
** The gdb.Value.format_string method now takes a 'styling'
argument, which is a boolean. When true, the returned string can
include escape sequences to apply styling. The styling will only
be present if styling is otherwise turned on in GDB (see 'help
set styling'). When false, which is the default if the argument
is not given, then no styling is applied to the returned string.
** New read-only attribute gdb.InferiorThread.details, which is
either a string, containing additional, target specific thread
state information, or None, if there is no such additional
information.
** New read-only attribute gdb.Type.is_scalar, which is True for
scalar types, and False for all other types.
** New read-only attribute gdb.Type.is_signed. This attribute
should only be read when Type.is_scalar is True, and will be True
for signed types, and False for all other types. Attempting to
read this attribute for non-scalar types will raise a ValueError.
** It is now possible to add GDB/MI commands implemented in Python.
- Update libipt to v2.0.5.
- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).
- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).
Bug fixes:
- Fixed license (bsc#1210081).
- Advertises RHEL version support status (bsc#1207712).
- Fixed crashes while debugging a clang-cpp app (bsc#1192285).
Patchnames
SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for gdb", "title": "Title of the patch" }, { "category": "description", "text": "This update for gdb fixes the following issues:\n\ngdb was updated to 12.1. (jsc#SLE-21561)\n\n* DBX mode is deprecated, and will be removed in GDB 13.\n\n* GDB 12 is the last release of GDB that will support building against\n Python 2. From GDB 13, it will only be possible to build GDB itself\n with Python 3 support.\n\n* Improved C++ template support:\n\n GDB now treats functions/types involving C++ templates like it does function\n overloads. Users may omit parameter lists to set breakpoints on families of\n template functions, including types/functions composed of multiple template types:\n (gdb) break template_func(template_1, int)\n The above will set breakpoints at every function `template_func\u0027 where\n the first function parameter is any template type named `template_1\u0027 and\n the second function parameter is `int\u0027.\n TAB completion also gains similar improvements.\n\n* New commands:\n\n - maint set backtrace-on-fatal-signal on|off\n - maint show backtrace-on-fatal-signal\n\n This setting is \u0027on\u0027 by default. When \u0027on\u0027 GDB will print a limited\n backtrace to stderr in the situation where GDB terminates with a\n fatal signal. This only supported on some platforms where the\n backtrace and backtrace_symbols_fd functions are available.\n\n - set source open on|off\n - show source open\n\n This setting, which is on by default, controls whether GDB will try\n to open source code files. Switching this off will stop GDB trying\n to open and read source code files, which can be useful if the files\n are located over a slow network connection.\n\n - set varsize-limit\n - show varsize-limit\n\n These are now deprecated aliases for \u0027set max-value-size\u0027 and\n \u0027show max-value-size\u0027.\n\n - task apply [all | TASK-IDS...] [FLAG]... COMMAND\n\n Like \u0027thread apply\u0027, but applies COMMAND to Ada tasks.\n\n - watch [...] task ID\n\n Watchpoints can now be restricted to a specific Ada task.\n\n - maint set internal-error backtrace on|off\n - maint show internal-error backtrace\n - maint set internal-warning backtrace on|off\n - maint show internal-warning backtrace\n\n GDB can now print a backtrace of itself when it encounters either an\n internal-error, or an internal-warning. This is on by default for\n internal-error and off by default for internal-warning.\n\n - set logging on|off\n\n Deprecated and replaced by \u0027set logging enabled on|off\u0027.\n\n - set logging enabled on|off\n - show logging enabled\n\n These commands set or show whether logging is enabled or disabled.\n\n - exit\n\n You can now exit GDB by using the new command \u0027exit\u0027, in addition to\n the existing \u0027quit\u0027 command.\n\n - set debug threads on|off\n - show debug threads\n\n Print additional debug messages about thread creation and deletion.\n\n - set debug linux-nat on|off\n - show debug linux-nat\n\n These new commands replaced the old \u0027set debug lin-lwp\u0027 and \u0027show\n debug lin-lwp\u0027 respectively. Turning this setting on prints debug\n messages relating to GDB\u0027s handling of native Linux inferiors.\n\n - maint flush source-cache\n\n Flush the contents of the source code cache.\n\n - maint set gnu-source-highlight enabled on|off\n - maint show gnu-source-highlight enabled\n\n Whether GDB should use the GNU Source Highlight library for adding\n styling to source code. When off, the library will not be used, even\n when available. When GNU Source Highlight isn\u0027t used, or can\u0027t add\n styling to a particular source file, then the Python Pygments\n library will be used instead.\n\n - set suppress-cli-notifications (on|off)\n - show suppress-cli-notifications\n\n This controls whether printing the notifications is suppressed for CLI.\n CLI notifications occur when you change the selected context\n (i.e., the current inferior, thread and/or the frame), or when\n the program being debugged stops (e.g., because of hitting a\n breakpoint, completing source-stepping, an interrupt, etc.).\n\n - set style disassembler enabled on|off\n - show style disassembler enabled\n\n If GDB is compiled with Python support, and the Python Pygments\n package is available, then, when this setting is on, disassembler\n output will have styling applied.\n\n - set ada source-charset\n - show ada source-charset\n\n Set the character set encoding that is assumed for Ada symbols. Valid\n values for this follow the values that can be passed to the GNAT\n compiler via the \u0027-gnati\u0027 option. The default is ISO-8859-1.\n\n* Changed commands:\n\n - print\n\n Printing of floating-point values with base-modifying formats like\n /x has been changed to display the underlying bytes of the value in\n the desired base. This was GDB\u0027s documented behavior, but was never\n implemented correctly.\n\n - maint packet\n\n This command can now print a reply, if the reply includes\n non-printable characters. Any non-printable characters are printed\n as escaped hex, e.g. \\x?? where \u0027??\u0027 is replaces with the value of\n the non-printable character.\n\n - clone-inferior\n The clone-inferior command now ensures that the TTY, CMD and ARGS\n settings are copied from the original inferior to the new one.\n All modifications to the environment variables done using the \u0027set\n environment\u0027 or \u0027unset environment\u0027 commands are also copied to the new\n inferior.\n\n - set debug lin-lwp on|off\n - show debug lin-lwp\n\n These commands have been removed from GDB. The new command \u0027set\n debug linux-nat\u0027 and \u0027show debug linux-nat\u0027 should be used\n instead.\n\n - info win\n\n This command now includes information about the width of the tui\n windows in its output.\n\n* GDB\u0027s Ada parser now supports an extension for specifying the exact\n byte contents of a floating-point literal. This can be useful for\n setting floating-point registers to a precise value without loss of\n precision. The syntax is an extension of the based literal syntax.\n Use, e.g., \u002716lf#0123abcd#\u0027 -- the number of \u0027l\u0027s controls the width\n of the floating-point type, and the \u0027f\u0027 is the marker for floating\n point.\n\n* MI changes:\n\n ** The \u0027-add-inferior\u0027 with no option flags now inherits the\n connection of the current inferior, this restores the behaviour of\n GDB as it was prior to GDB 10.\n\n ** The \u0027-add-inferior\u0027 command now accepts a \u0027--no-connection\u0027\n option, which causes the new inferior to start without a\n connection.\n\n* Python API:\n\n ** New function gdb.add_history(), which takes a gdb.Value object\n and adds the value it represents to GDB\u0027s history list. An\n integer, the index of the new item in the history list, is\n returned.\n\n ** New function gdb.history_count(), which returns the number of\n values in GDB\u0027s value history.\n\n ** New gdb.events.gdb_exiting event. This event is called with a\n gdb.GdbExitingEvent object which has the read-only attribute\n \u0027exit_code\u0027, which contains the value of the GDB exit code. This\n event is triggered once GDB decides it is going to exit, but\n before GDB starts to clean up its internal state.\n\n ** New function gdb.architecture_names(), which returns a list\n containing all of the possible Architecture.name() values. Each\n entry is a string.\n\n ** New function gdb.Architecture.integer_type(), which returns an\n integer type given a size and a signed-ness.\n\n ** New gdb.TargetConnection object type that represents a connection\n (as displayed by the \u0027info connections\u0027 command). A sub-class,\n gdb.RemoteTargetConnection, is used to represent \u0027remote\u0027 and\n \u0027extended-remote\u0027 connections.\n\n ** The gdb.Inferior type now has a \u0027connection\u0027 property which is an\n instance of gdb.TargetConnection, the connection used by this\n inferior. This can be None if the inferior has no connection.\n\n ** New \u0027gdb.events.connection_removed\u0027 event registry, which emits a\n \u0027gdb.ConnectionEvent\u0027 when a connection is removed from GDB.\n This event has a \u0027connection\u0027 property, a gdb.TargetConnection\n object for the connection being removed.\n\n ** New gdb.connections() function that returns a list of all\n currently active connections.\n\n ** New gdb.RemoteTargetConnection.send_packet(PACKET) method. This\n is equivalent to the existing \u0027maint packet\u0027 CLI command; it\n allows a user specified packet to be sent to the remote target.\n\n ** New function gdb.host_charset(), returns a string, which is the\n name of the current host charset.\n\n ** New gdb.set_parameter(NAME, VALUE). This sets the gdb parameter\n NAME to VALUE.\n\n ** New gdb.with_parameter(NAME, VALUE). This returns a context\n manager that temporarily sets the gdb parameter NAME to VALUE,\n then resets it when the context is exited.\n\n ** The gdb.Value.format_string method now takes a \u0027styling\u0027\n argument, which is a boolean. When true, the returned string can\n include escape sequences to apply styling. The styling will only\n be present if styling is otherwise turned on in GDB (see \u0027help\n set styling\u0027). When false, which is the default if the argument\n is not given, then no styling is applied to the returned string.\n\n ** New read-only attribute gdb.InferiorThread.details, which is\n either a string, containing additional, target specific thread\n state information, or None, if there is no such additional\n information.\n\n ** New read-only attribute gdb.Type.is_scalar, which is True for\n scalar types, and False for all other types.\n\n ** New read-only attribute gdb.Type.is_signed. This attribute\n should only be read when Type.is_scalar is True, and will be True\n for signed types, and False for all other types. Attempting to\n read this attribute for non-scalar types will raise a ValueError.\n\n ** It is now possible to add GDB/MI commands implemented in Python.\n\n- Update libipt to v2.0.5.\n\n- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).\n- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).\n\nBug fixes:\n\n- Fixed license (bsc#1210081).\n- Advertises RHEL version support status (bsc#1207712).\n- Fixed crashes while debugging a clang-cpp app (bsc#1192285).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2485-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2485-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232485-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2485-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029799.html" }, { "category": "self", "summary": "SUSE Bug 1068950", "url": "https://bugzilla.suse.com/1068950" }, { "category": "self", "summary": "SUSE Bug 1081527", "url": "https://bugzilla.suse.com/1081527" }, { "category": "self", "summary": "SUSE Bug 1192285", "url": "https://bugzilla.suse.com/1192285" }, { "category": "self", "summary": "SUSE Bug 1207712", "url": "https://bugzilla.suse.com/1207712" }, { "category": "self", "summary": "SUSE Bug 1210081", "url": "https://bugzilla.suse.com/1210081" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16829 page", "url": "https://www.suse.com/security/cve/CVE-2017-16829/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7208 page", "url": "https://www.suse.com/security/cve/CVE-2018-7208/" } ], "title": "Security update for gdb", "tracking": { "current_release_date": "2023-06-12T06:54:40Z", "generator": { "date": "2023-06-12T06:54:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2485-1", "initial_release_date": "2023-06-12T06:54:40Z", "revision_history": [ { "date": "2023-06-12T06:54:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.aarch64", "product": { "name": "gdb-12.1-2.20.1.aarch64", "product_id": "gdb-12.1-2.20.1.aarch64" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.aarch64", "product": { "name": "gdb-testresults-12.1-2.20.1.aarch64", "product_id": "gdb-testresults-12.1-2.20.1.aarch64" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.aarch64", "product": { "name": "gdbserver-12.1-2.20.1.aarch64", "product_id": "gdbserver-12.1-2.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gdb-64bit-12.1-2.20.1.aarch64_ilp32", "product": { "name": "gdb-64bit-12.1-2.20.1.aarch64_ilp32", "product_id": "gdb-64bit-12.1-2.20.1.aarch64_ilp32" } }, { "category": "product_version", "name": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32", "product": { "name": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32", "product_id": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.i586", "product": { "name": "gdb-12.1-2.20.1.i586", "product_id": "gdb-12.1-2.20.1.i586" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.i586", "product": { "name": "gdb-testresults-12.1-2.20.1.i586", "product_id": "gdb-testresults-12.1-2.20.1.i586" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.i586", "product": { "name": "gdbserver-12.1-2.20.1.i586", "product_id": "gdbserver-12.1-2.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.ppc64le", "product": { "name": "gdb-12.1-2.20.1.ppc64le", "product_id": "gdb-12.1-2.20.1.ppc64le" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.ppc64le", "product": { "name": "gdb-testresults-12.1-2.20.1.ppc64le", "product_id": "gdb-testresults-12.1-2.20.1.ppc64le" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.ppc64le", "product": { "name": "gdbserver-12.1-2.20.1.ppc64le", "product_id": "gdbserver-12.1-2.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.s390", "product": { "name": "gdb-12.1-2.20.1.s390", "product_id": "gdb-12.1-2.20.1.s390" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.s390", "product": { "name": "gdb-testresults-12.1-2.20.1.s390", "product_id": "gdb-testresults-12.1-2.20.1.s390" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.s390", "product": { "name": "gdbserver-12.1-2.20.1.s390", "product_id": "gdbserver-12.1-2.20.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.s390x", "product": { "name": "gdb-12.1-2.20.1.s390x", "product_id": "gdb-12.1-2.20.1.s390x" } }, { "category": "product_version", "name": "gdb-32bit-12.1-2.20.1.s390x", "product": { "name": "gdb-32bit-12.1-2.20.1.s390x", "product_id": "gdb-32bit-12.1-2.20.1.s390x" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.s390x", "product": { "name": "gdb-testresults-12.1-2.20.1.s390x", "product_id": "gdb-testresults-12.1-2.20.1.s390x" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.s390x", "product": { "name": "gdbserver-12.1-2.20.1.s390x", "product_id": "gdbserver-12.1-2.20.1.s390x" } }, { "category": "product_version", "name": "gdbserver-32bit-12.1-2.20.1.s390x", "product": { "name": "gdbserver-32bit-12.1-2.20.1.s390x", "product_id": "gdbserver-32bit-12.1-2.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gdb-12.1-2.20.1.x86_64", "product": { "name": "gdb-12.1-2.20.1.x86_64", "product_id": "gdb-12.1-2.20.1.x86_64" } }, { "category": "product_version", "name": "gdb-testresults-12.1-2.20.1.x86_64", "product": { "name": "gdb-testresults-12.1-2.20.1.x86_64", "product_id": "gdb-testresults-12.1-2.20.1.x86_64" } }, { "category": "product_version", "name": "gdbserver-12.1-2.20.1.x86_64", "product": { "name": "gdbserver-12.1-2.20.1.x86_64", "product_id": "gdbserver-12.1-2.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gdbserver-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64" }, "product_reference": "gdbserver-12.1-2.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdbserver-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le" }, "product_reference": "gdbserver-12.1-2.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdbserver-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x" }, "product_reference": "gdbserver-12.1-2.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdbserver-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64" }, "product_reference": "gdbserver-12.1-2.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdbserver-32bit-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" }, "product_reference": "gdbserver-32bit-12.1-2.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64" }, "product_reference": "gdb-12.1-2.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le" }, "product_reference": "gdb-12.1-2.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x" }, "product_reference": "gdb-12.1-2.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64" }, "product_reference": "gdb-12.1-2.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64" }, "product_reference": "gdb-12.1-2.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le" }, "product_reference": "gdb-12.1-2.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x" }, "product_reference": "gdb-12.1-2.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64" }, "product_reference": "gdb-12.1-2.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16829" } ], "notes": [ { "category": "general", "text": "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16829", "url": "https://www.suse.com/security/cve/CVE-2017-16829" }, { "category": "external", "summary": "SUSE Bug 1068950 for CVE-2017-16829", "url": "https://bugzilla.suse.com/1068950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-06-12T06:54:40Z", "details": "low" } ], "title": "CVE-2017-16829" }, { "cve": "CVE-2018-7208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7208" } ], "notes": [ { "category": "general", "text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7208", "url": "https://www.suse.com/security/cve/CVE-2018-7208" }, { "category": "external", "summary": "SUSE Bug 1081527 for CVE-2018-7208", "url": "https://bugzilla.suse.com/1081527" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-06-12T06:54:40Z", "details": "low" } ], "title": "CVE-2018-7208" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…