suse-su-2023:2485-1
Vulnerability from csaf_suse
Published
2023-06-12 06:54
Modified
2023-06-12 06:54
Summary
Security update for gdb

Notes

Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues: gdb was updated to 12.1. (jsc#SLE-21561) * DBX mode is deprecated, and will be removed in GDB 13. * GDB 12 is the last release of GDB that will support building against Python 2. From GDB 13, it will only be possible to build GDB itself with Python 3 support. * Improved C++ template support: GDB now treats functions/types involving C++ templates like it does function overloads. Users may omit parameter lists to set breakpoints on families of template functions, including types/functions composed of multiple template types: (gdb) break template_func(template_1, int) The above will set breakpoints at every function `template_func' where the first function parameter is any template type named `template_1' and the second function parameter is `int'. TAB completion also gains similar improvements. * New commands: - maint set backtrace-on-fatal-signal on|off - maint show backtrace-on-fatal-signal This setting is 'on' by default. When 'on' GDB will print a limited backtrace to stderr in the situation where GDB terminates with a fatal signal. This only supported on some platforms where the backtrace and backtrace_symbols_fd functions are available. - set source open on|off - show source open This setting, which is on by default, controls whether GDB will try to open source code files. Switching this off will stop GDB trying to open and read source code files, which can be useful if the files are located over a slow network connection. - set varsize-limit - show varsize-limit These are now deprecated aliases for 'set max-value-size' and 'show max-value-size'. - task apply [all | TASK-IDS...] [FLAG]... COMMAND Like 'thread apply', but applies COMMAND to Ada tasks. - watch [...] task ID Watchpoints can now be restricted to a specific Ada task. - maint set internal-error backtrace on|off - maint show internal-error backtrace - maint set internal-warning backtrace on|off - maint show internal-warning backtrace GDB can now print a backtrace of itself when it encounters either an internal-error, or an internal-warning. This is on by default for internal-error and off by default for internal-warning. - set logging on|off Deprecated and replaced by 'set logging enabled on|off'. - set logging enabled on|off - show logging enabled These commands set or show whether logging is enabled or disabled. - exit You can now exit GDB by using the new command 'exit', in addition to the existing 'quit' command. - set debug threads on|off - show debug threads Print additional debug messages about thread creation and deletion. - set debug linux-nat on|off - show debug linux-nat These new commands replaced the old 'set debug lin-lwp' and 'show debug lin-lwp' respectively. Turning this setting on prints debug messages relating to GDB's handling of native Linux inferiors. - maint flush source-cache Flush the contents of the source code cache. - maint set gnu-source-highlight enabled on|off - maint show gnu-source-highlight enabled Whether GDB should use the GNU Source Highlight library for adding styling to source code. When off, the library will not be used, even when available. When GNU Source Highlight isn't used, or can't add styling to a particular source file, then the Python Pygments library will be used instead. - set suppress-cli-notifications (on|off) - show suppress-cli-notifications This controls whether printing the notifications is suppressed for CLI. CLI notifications occur when you change the selected context (i.e., the current inferior, thread and/or the frame), or when the program being debugged stops (e.g., because of hitting a breakpoint, completing source-stepping, an interrupt, etc.). - set style disassembler enabled on|off - show style disassembler enabled If GDB is compiled with Python support, and the Python Pygments package is available, then, when this setting is on, disassembler output will have styling applied. - set ada source-charset - show ada source-charset Set the character set encoding that is assumed for Ada symbols. Valid values for this follow the values that can be passed to the GNAT compiler via the '-gnati' option. The default is ISO-8859-1. * Changed commands: - print Printing of floating-point values with base-modifying formats like /x has been changed to display the underlying bytes of the value in the desired base. This was GDB's documented behavior, but was never implemented correctly. - maint packet This command can now print a reply, if the reply includes non-printable characters. Any non-printable characters are printed as escaped hex, e.g. \x?? where '??' is replaces with the value of the non-printable character. - clone-inferior The clone-inferior command now ensures that the TTY, CMD and ARGS settings are copied from the original inferior to the new one. All modifications to the environment variables done using the 'set environment' or 'unset environment' commands are also copied to the new inferior. - set debug lin-lwp on|off - show debug lin-lwp These commands have been removed from GDB. The new command 'set debug linux-nat' and 'show debug linux-nat' should be used instead. - info win This command now includes information about the width of the tui windows in its output. * GDB's Ada parser now supports an extension for specifying the exact byte contents of a floating-point literal. This can be useful for setting floating-point registers to a precise value without loss of precision. The syntax is an extension of the based literal syntax. Use, e.g., '16lf#0123abcd#' -- the number of 'l's controls the width of the floating-point type, and the 'f' is the marker for floating point. * MI changes: ** The '-add-inferior' with no option flags now inherits the connection of the current inferior, this restores the behaviour of GDB as it was prior to GDB 10. ** The '-add-inferior' command now accepts a '--no-connection' option, which causes the new inferior to start without a connection. * Python API: ** New function gdb.add_history(), which takes a gdb.Value object and adds the value it represents to GDB's history list. An integer, the index of the new item in the history list, is returned. ** New function gdb.history_count(), which returns the number of values in GDB's value history. ** New gdb.events.gdb_exiting event. This event is called with a gdb.GdbExitingEvent object which has the read-only attribute 'exit_code', which contains the value of the GDB exit code. This event is triggered once GDB decides it is going to exit, but before GDB starts to clean up its internal state. ** New function gdb.architecture_names(), which returns a list containing all of the possible Architecture.name() values. Each entry is a string. ** New function gdb.Architecture.integer_type(), which returns an integer type given a size and a signed-ness. ** New gdb.TargetConnection object type that represents a connection (as displayed by the 'info connections' command). A sub-class, gdb.RemoteTargetConnection, is used to represent 'remote' and 'extended-remote' connections. ** The gdb.Inferior type now has a 'connection' property which is an instance of gdb.TargetConnection, the connection used by this inferior. This can be None if the inferior has no connection. ** New 'gdb.events.connection_removed' event registry, which emits a 'gdb.ConnectionEvent' when a connection is removed from GDB. This event has a 'connection' property, a gdb.TargetConnection object for the connection being removed. ** New gdb.connections() function that returns a list of all currently active connections. ** New gdb.RemoteTargetConnection.send_packet(PACKET) method. This is equivalent to the existing 'maint packet' CLI command; it allows a user specified packet to be sent to the remote target. ** New function gdb.host_charset(), returns a string, which is the name of the current host charset. ** New gdb.set_parameter(NAME, VALUE). This sets the gdb parameter NAME to VALUE. ** New gdb.with_parameter(NAME, VALUE). This returns a context manager that temporarily sets the gdb parameter NAME to VALUE, then resets it when the context is exited. ** The gdb.Value.format_string method now takes a 'styling' argument, which is a boolean. When true, the returned string can include escape sequences to apply styling. The styling will only be present if styling is otherwise turned on in GDB (see 'help set styling'). When false, which is the default if the argument is not given, then no styling is applied to the returned string. ** New read-only attribute gdb.InferiorThread.details, which is either a string, containing additional, target specific thread state information, or None, if there is no such additional information. ** New read-only attribute gdb.Type.is_scalar, which is True for scalar types, and False for all other types. ** New read-only attribute gdb.Type.is_signed. This attribute should only be read when Type.is_scalar is True, and will be True for signed types, and False for all other types. Attempting to read this attribute for non-scalar types will raise a ValueError. ** It is now possible to add GDB/MI commands implemented in Python. - Update libipt to v2.0.5. - CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527). - CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950). Bug fixes: - Fixed license (bsc#1210081). - Advertises RHEL version support status (bsc#1207712). - Fixed crashes while debugging a clang-cpp app (bsc#1192285).
Patchnames
SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for gdb",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for gdb fixes the following issues:\n\ngdb was updated to 12.1. (jsc#SLE-21561)\n\n* DBX mode is deprecated, and will be removed in GDB 13.\n\n* GDB 12 is the last release of GDB that will support building against\n  Python 2.  From GDB 13, it will only be possible to build GDB itself\n  with Python 3 support.\n\n* Improved C++ template support:\n\n  GDB now treats functions/types involving C++ templates like it does function\n  overloads.  Users may omit parameter lists to set breakpoints on families of\n  template functions, including types/functions composed of multiple template types:\n    (gdb) break template_func(template_1, int)\n  The above will set breakpoints at every function `template_func\u0027 where\n  the first function parameter is any template type named `template_1\u0027 and\n  the second function parameter is `int\u0027.\n  TAB completion also gains similar improvements.\n\n* New commands:\n\n  - maint set backtrace-on-fatal-signal on|off\n  - maint show backtrace-on-fatal-signal\n\n  This setting is \u0027on\u0027 by default.  When \u0027on\u0027 GDB will print a limited\n  backtrace to stderr in the situation where GDB terminates with a\n  fatal signal.  This only supported on some platforms where the\n  backtrace and backtrace_symbols_fd functions are available.\n\n  - set source open on|off\n  - show source open\n\n  This setting, which is on by default, controls whether GDB will try\n  to open source code files.  Switching this off will stop GDB trying\n  to open and read source code files, which can be useful if the files\n  are located over a slow network connection.\n\n  - set varsize-limit\n  - show varsize-limit\n\n  These are now deprecated aliases for \u0027set max-value-size\u0027 and\n  \u0027show max-value-size\u0027.\n\n  - task apply [all | TASK-IDS...] [FLAG]... COMMAND\n\n  Like \u0027thread apply\u0027, but applies COMMAND to Ada tasks.\n\n  - watch [...] task ID\n\n  Watchpoints can now be restricted to a specific Ada task.\n\n  - maint set internal-error backtrace on|off\n  - maint show internal-error backtrace\n  - maint set internal-warning backtrace on|off\n  - maint show internal-warning backtrace\n\n  GDB can now print a backtrace of itself when it encounters either an\n  internal-error, or an internal-warning.  This is on by default for\n  internal-error and off by default for internal-warning.\n\n  - set logging on|off\n\n  Deprecated and replaced by \u0027set logging enabled on|off\u0027.\n\n  - set logging enabled on|off\n  - show logging enabled\n\n  These commands set or show whether logging is enabled or disabled.\n\n  - exit\n\n  You can now exit GDB by using the new command \u0027exit\u0027, in addition to\n  the existing \u0027quit\u0027 command.\n\n  - set debug threads on|off\n  - show debug threads\n\n  Print additional debug messages about thread creation and deletion.\n\n  - set debug linux-nat on|off\n  - show debug linux-nat\n\n  These new commands replaced the old \u0027set debug lin-lwp\u0027 and \u0027show\n  debug lin-lwp\u0027 respectively.  Turning this setting on prints debug\n  messages relating to GDB\u0027s handling of native Linux inferiors.\n\n  - maint flush source-cache\n\n  Flush the contents of the source code cache.\n\n  - maint set gnu-source-highlight enabled on|off\n  - maint show gnu-source-highlight enabled\n\n  Whether GDB should use the GNU Source Highlight library for adding\n  styling to source code.  When off, the library will not be used, even\n  when available.  When GNU Source Highlight isn\u0027t used, or can\u0027t add\n  styling to a particular source file, then the Python Pygments\n  library will be used instead.\n\n  - set suppress-cli-notifications (on|off)\n  - show suppress-cli-notifications\n\n  This controls whether printing the notifications is suppressed for CLI.\n  CLI notifications occur when you change the selected context\n  (i.e., the current inferior, thread and/or the frame), or when\n  the program being debugged stops (e.g., because of hitting a\n  breakpoint, completing source-stepping, an interrupt, etc.).\n\n  - set style disassembler enabled on|off\n  - show style disassembler enabled\n\n  If GDB is compiled with Python support, and the Python Pygments\n  package is available, then, when this setting is on, disassembler\n  output will have styling applied.\n\n  - set ada source-charset\n  - show ada source-charset\n\n  Set the character set encoding that is assumed for Ada symbols.  Valid\n  values for this follow the values that can be passed to the GNAT\n  compiler via the \u0027-gnati\u0027 option.  The default is ISO-8859-1.\n\n* Changed commands:\n\n  - print\n\n  Printing of floating-point values with base-modifying formats like\n  /x has been changed to display the underlying bytes of the value in\n  the desired base.  This was GDB\u0027s documented behavior, but was never\n  implemented correctly.\n\n  - maint packet\n\n  This command can now print a reply, if the reply includes\n  non-printable characters.  Any non-printable characters are printed\n  as escaped hex, e.g. \\x?? where \u0027??\u0027 is replaces with the value of\n  the non-printable character.\n\n  - clone-inferior\n  The clone-inferior command now ensures that the TTY, CMD and ARGS\n  settings are copied from the original inferior to the new one.\n  All modifications to the environment variables done using the \u0027set\n  environment\u0027 or \u0027unset environment\u0027 commands are also copied to the new\n  inferior.\n\n  - set debug lin-lwp on|off\n  - show debug lin-lwp\n\n  These commands have been removed from GDB.  The new command \u0027set\n  debug linux-nat\u0027 and \u0027show debug linux-nat\u0027 should be used\n  instead.\n\n  - info win\n\n  This command now includes information about the width of the tui\n  windows in its output.\n\n* GDB\u0027s Ada parser now supports an extension for specifying the exact\n  byte contents of a floating-point literal.  This can be useful for\n  setting floating-point registers to a precise value without loss of\n  precision.  The syntax is an extension of the based literal syntax.\n  Use, e.g., \u002716lf#0123abcd#\u0027 -- the number of \u0027l\u0027s controls the width\n  of the floating-point type, and the \u0027f\u0027 is the marker for floating\n  point.\n\n* MI changes:\n\n ** The \u0027-add-inferior\u0027 with no option flags now inherits the\n    connection of the current inferior, this restores the behaviour of\n    GDB as it was prior to GDB 10.\n\n ** The \u0027-add-inferior\u0027 command now accepts a \u0027--no-connection\u0027\n    option, which causes the new inferior to start without a\n    connection.\n\n* Python API:\n\n  ** New function gdb.add_history(), which takes a gdb.Value object\n     and adds the value it represents to GDB\u0027s history list.  An\n     integer, the index of the new item in the history list, is\n     returned.\n\n  ** New function gdb.history_count(), which returns the number of\n     values in GDB\u0027s value history.\n\n  ** New gdb.events.gdb_exiting event.  This event is called with a\n     gdb.GdbExitingEvent object which has the read-only attribute\n     \u0027exit_code\u0027, which contains the value of the GDB exit code.  This\n     event is triggered once GDB decides it is going to exit, but\n     before GDB starts to clean up its internal state.\n\n  ** New function gdb.architecture_names(), which returns a list\n     containing all of the possible Architecture.name() values.  Each\n     entry is a string.\n\n  ** New function gdb.Architecture.integer_type(), which returns an\n     integer type given a size and a signed-ness.\n\n  ** New gdb.TargetConnection object type that represents a connection\n     (as displayed by the \u0027info connections\u0027 command).  A sub-class,\n     gdb.RemoteTargetConnection, is used to represent \u0027remote\u0027 and\n     \u0027extended-remote\u0027 connections.\n\n  ** The gdb.Inferior type now has a \u0027connection\u0027 property which is an\n     instance of gdb.TargetConnection, the connection used by this\n     inferior.  This can be None if the inferior has no connection.\n\n  ** New \u0027gdb.events.connection_removed\u0027 event registry, which emits a\n     \u0027gdb.ConnectionEvent\u0027 when a connection is removed from GDB.\n     This event has a \u0027connection\u0027 property, a gdb.TargetConnection\n     object for the connection being removed.\n\n  ** New gdb.connections() function that returns a list of all\n     currently active connections.\n\n  ** New gdb.RemoteTargetConnection.send_packet(PACKET) method.  This\n     is equivalent to the existing \u0027maint packet\u0027 CLI command; it\n     allows a user specified packet to be sent to the remote target.\n\n  ** New function gdb.host_charset(), returns a string, which is the\n     name of the current host charset.\n\n  ** New gdb.set_parameter(NAME, VALUE).  This sets the gdb parameter\n     NAME to VALUE.\n\n  ** New gdb.with_parameter(NAME, VALUE).  This returns a context\n     manager that temporarily sets the gdb parameter NAME to VALUE,\n     then resets it when the context is exited.\n\n  ** The gdb.Value.format_string method now takes a \u0027styling\u0027\n     argument, which is a boolean.  When true, the returned string can\n     include escape sequences to apply styling.  The styling will only\n     be present if styling is otherwise turned on in GDB (see \u0027help\n     set styling\u0027).  When false, which is the default if the argument\n     is not given, then no styling is applied to the returned string.\n\n  ** New read-only attribute gdb.InferiorThread.details, which is\n     either a string, containing additional, target specific thread\n     state information, or None, if there is no such additional\n     information.\n\n  ** New read-only attribute gdb.Type.is_scalar, which is True for\n     scalar types, and False for all other types.\n\n  ** New read-only attribute gdb.Type.is_signed.  This attribute\n     should only be read when Type.is_scalar is True, and will be True\n     for signed types, and False for all other types.  Attempting to\n     read this attribute for non-scalar types will raise a ValueError.\n\n  ** It is now possible to add GDB/MI commands implemented in Python.\n\n- Update libipt to v2.0.5.\n\n- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).\n- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).\n\nBug fixes:\n\n- Fixed license (bsc#1210081).\n- Advertises RHEL version support status (bsc#1207712).\n- Fixed crashes while debugging a clang-cpp app (bsc#1192285).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2485-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2023:2485-1",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232485-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2023:2485-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029799.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068950",
        "url": "https://bugzilla.suse.com/1068950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1081527",
        "url": "https://bugzilla.suse.com/1081527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192285",
        "url": "https://bugzilla.suse.com/1192285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207712",
        "url": "https://bugzilla.suse.com/1207712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210081",
        "url": "https://bugzilla.suse.com/1210081"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16829 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16829/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-7208 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-7208/"
      }
    ],
    "title": "Security update for gdb",
    "tracking": {
      "current_release_date": "2023-06-12T06:54:40Z",
      "generator": {
        "date": "2023-06-12T06:54:40Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2023:2485-1",
      "initial_release_date": "2023-06-12T06:54:40Z",
      "revision_history": [
        {
          "date": "2023-06-12T06:54:40Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.aarch64",
                "product": {
                  "name": "gdb-12.1-2.20.1.aarch64",
                  "product_id": "gdb-12.1-2.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.aarch64",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.aarch64",
                  "product_id": "gdb-testresults-12.1-2.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.aarch64",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.aarch64",
                  "product_id": "gdbserver-12.1-2.20.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-64bit-12.1-2.20.1.aarch64_ilp32",
                "product": {
                  "name": "gdb-64bit-12.1-2.20.1.aarch64_ilp32",
                  "product_id": "gdb-64bit-12.1-2.20.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32",
                "product": {
                  "name": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32",
                  "product_id": "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.i586",
                "product": {
                  "name": "gdb-12.1-2.20.1.i586",
                  "product_id": "gdb-12.1-2.20.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.i586",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.i586",
                  "product_id": "gdb-testresults-12.1-2.20.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.i586",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.i586",
                  "product_id": "gdbserver-12.1-2.20.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.ppc64le",
                "product": {
                  "name": "gdb-12.1-2.20.1.ppc64le",
                  "product_id": "gdb-12.1-2.20.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.ppc64le",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.ppc64le",
                  "product_id": "gdb-testresults-12.1-2.20.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.ppc64le",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.ppc64le",
                  "product_id": "gdbserver-12.1-2.20.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.s390",
                "product": {
                  "name": "gdb-12.1-2.20.1.s390",
                  "product_id": "gdb-12.1-2.20.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.s390",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.s390",
                  "product_id": "gdb-testresults-12.1-2.20.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.s390",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.s390",
                  "product_id": "gdbserver-12.1-2.20.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.s390x",
                "product": {
                  "name": "gdb-12.1-2.20.1.s390x",
                  "product_id": "gdb-12.1-2.20.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-32bit-12.1-2.20.1.s390x",
                "product": {
                  "name": "gdb-32bit-12.1-2.20.1.s390x",
                  "product_id": "gdb-32bit-12.1-2.20.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.s390x",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.s390x",
                  "product_id": "gdb-testresults-12.1-2.20.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.s390x",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.s390x",
                  "product_id": "gdbserver-12.1-2.20.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-32bit-12.1-2.20.1.s390x",
                "product": {
                  "name": "gdbserver-32bit-12.1-2.20.1.s390x",
                  "product_id": "gdbserver-32bit-12.1-2.20.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gdb-12.1-2.20.1.x86_64",
                "product": {
                  "name": "gdb-12.1-2.20.1.x86_64",
                  "product_id": "gdb-12.1-2.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gdb-testresults-12.1-2.20.1.x86_64",
                "product": {
                  "name": "gdb-testresults-12.1-2.20.1.x86_64",
                  "product_id": "gdb-testresults-12.1-2.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gdbserver-12.1-2.20.1.x86_64",
                "product": {
                  "name": "gdbserver-12.1-2.20.1.x86_64",
                  "product_id": "gdbserver-12.1-2.20.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdbserver-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64"
        },
        "product_reference": "gdbserver-12.1-2.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdbserver-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le"
        },
        "product_reference": "gdbserver-12.1-2.20.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdbserver-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x"
        },
        "product_reference": "gdbserver-12.1-2.20.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdbserver-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64"
        },
        "product_reference": "gdbserver-12.1-2.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdbserver-32bit-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
        },
        "product_reference": "gdbserver-32bit-12.1-2.20.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64"
        },
        "product_reference": "gdb-12.1-2.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le"
        },
        "product_reference": "gdb-12.1-2.20.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x"
        },
        "product_reference": "gdb-12.1-2.20.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64"
        },
        "product_reference": "gdb-12.1-2.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64"
        },
        "product_reference": "gdb-12.1-2.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le"
        },
        "product_reference": "gdb-12.1-2.20.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x"
        },
        "product_reference": "gdb-12.1-2.20.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64"
        },
        "product_reference": "gdb-12.1-2.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-16829",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16829"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16829",
          "url": "https://www.suse.com/security/cve/CVE-2017-16829"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068950 for CVE-2017-16829",
          "url": "https://bugzilla.suse.com/1068950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-06-12T06:54:40Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2018-7208",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-7208"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-7208",
          "url": "https://www.suse.com/security/cve/CVE-2018-7208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1081527 for CVE-2018-7208",
          "url": "https://bugzilla.suse.com/1081527"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-06-12T06:54:40Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-7208"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…