suse-su-2024:0319-1
Vulnerability from csaf_suse
Published
2024-02-20 16:52
Modified
2024-02-20 16:52
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
needed because there's a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it's bogus since RPM auto generated dependency will take
care of that requirement.
gdb was released in 13.2:
* This version of GDB includes the following changes and enhancements:
* Support for the following new targets has been added in both GDB and GDBserver:
* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
* The Windows native target now supports target async.
* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:
* set print nibbles [on|off]
* show print nibbles
* This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details.
* Python API improvements:
* New Python API for instruction disassembly.
* The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the frame's language.
* gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].
* GDB/MI changes:
* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno.
* Miscellaneous improvements:
* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
* The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
* The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.
* A new format '/b' has been introduce to provide the old behavior of '/r'.
* The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
* It is now possible to use the 'document' command to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
* Support Removal notices:
* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
* Support for the following commands has been removed:
* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv
* Use the 'set/show debug solib' commands instead.
See the NEWS file for a more complete and detailed list of what this release includes.
Patchnames
SUSE-2024-319,SUSE-SLE-SDK-12-SP5-2024-319,SUSE-SLE-SERVER-12-SP5-2024-319
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gdb",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gdb fixes the following issues:\n\n- Drop libdebuginfod1 BuildRequires/Recommends. The former isn\u0027t\n needed because there\u0027s a build requirement on libdebuginfod-devel\n already, which will pull the shared library. And the latter,\n because it\u0027s bogus since RPM auto generated dependency will take\n care of that requirement.\n\ngdb was released in 13.2:\n\n* This version of GDB includes the following changes and enhancements:\n\n * Support for the following new targets has been added in both GDB and GDBserver:\n\n * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*\n * GNU/Linux/CSKY (gdbserver) csky*-*linux* \n\n * The Windows native target now supports target async.\n * Floating-point support has now been added on LoongArch GNU/Linux.\n * New commands:\n\n * set print nibbles [on|off]\n * show print nibbles\n\n * This controls whether the \u0027print/t\u0027 command will display binary values in groups of four bits, known as \u0027nibbles\u0027. The default is \u0027off\u0027.\n Various styling-related commands. See the gdb/NEWS file for more details.\n Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. \n\n * Python API improvements:\n\n * New Python API for instruction disassembly.\n\n * The new attribute \u0027locations\u0027 of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.\n * New Python type gdb.BreakpointLocation.\n * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as \u0027address \u0027\n * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter(\u0027language\u0027), this will never return \u0027auto\u0027.\n * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.\n * New method gdb.Frame.language that returns the name of the frame\u0027s language.\n * gdb.Value.format_string now uses the format provided by \u0027print\u0027, if it is called during a \u0027print\u0027 or other similar operation.\n * gdb.Value.format_string now accepts the \u0027summary\u0027 keyword. This can be used to request a shorter representation of a value, the way that \u0027set print frame-arguments scalars\u0027 does.\n * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window\u0027s name must start with a character in the set [a-zA-Z], every subsequent character of a window\u0027s name must be in the set [-_.a-zA-Z0-9]. \n * GDB/MI changes:\n\n * MI version 1 is deprecated, and will be removed in GDB 14.\n * The async record stating the stopped reason \u0027breakpoint-hit\u0027 now contains an optional field locno. \n\n * Miscellaneous improvements:\n\n * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.\n * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.\n * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.\n * The \u0027info breakpoints\u0027 now displays enabled breakpoint locations of disabled breakpoints as in the \u0027y-\u0027 state.\n * The format of \u0027disassemble /r\u0027 and \u0027record instruction-history /r\u0027 has changed to match the layout of GNU objdump when disassembling.\n\n * A new format \u0027/b\u0027 has been introduce to provide the old behavior of \u0027/r\u0027.\n * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new \u0027set style tui-current-position\u0027 command.\n * It is now possible to use the \u0027document\u0027 command to document user-defined commands.\n * Support for memory tag data for AArch64 MTE. \n\n * Support Removal notices:\n\n * DBX mode has been removed.\n * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.\n * Support for the following commands has been removed:\n\n * set debug aix-solib on|off\n * show debug aix-solib\n * set debug solib-frv on|off\n * show debug solib-frv\n\n * Use the \u0027set/show debug solib\u0027 commands instead. \n\nSee the NEWS file for a more complete and detailed list of what this release includes. \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-319,SUSE-SLE-SDK-12-SP5-2024-319,SUSE-SLE-SERVER-12-SP5-2024-319",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0319-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0319-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240319-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0319-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017848.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068950",
"url": "https://bugzilla.suse.com/1068950"
},
{
"category": "self",
"summary": "SUSE Bug 1081527",
"url": "https://bugzilla.suse.com/1081527"
},
{
"category": "self",
"summary": "SUSE Bug 1211052",
"url": "https://bugzilla.suse.com/1211052"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16829 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48064 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48064/"
}
],
"title": "Security update for gdb",
"tracking": {
"current_release_date": "2024-02-20T16:52:21Z",
"generator": {
"date": "2024-02-20T16:52:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0319-1",
"initial_release_date": "2024-02-20T16:52:21Z",
"revision_history": [
{
"date": "2024-02-20T16:52:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.aarch64",
"product": {
"name": "gdb-13.2-2.23.1.aarch64",
"product_id": "gdb-13.2-2.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.aarch64",
"product": {
"name": "gdb-testresults-13.2-2.23.1.aarch64",
"product_id": "gdb-testresults-13.2-2.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.aarch64",
"product": {
"name": "gdbserver-13.2-2.23.1.aarch64",
"product_id": "gdbserver-13.2-2.23.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-64bit-13.2-2.23.1.aarch64_ilp32",
"product": {
"name": "gdb-64bit-13.2-2.23.1.aarch64_ilp32",
"product_id": "gdb-64bit-13.2-2.23.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32",
"product": {
"name": "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32",
"product_id": "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.i586",
"product": {
"name": "gdb-13.2-2.23.1.i586",
"product_id": "gdb-13.2-2.23.1.i586"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.i586",
"product": {
"name": "gdb-testresults-13.2-2.23.1.i586",
"product_id": "gdb-testresults-13.2-2.23.1.i586"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.i586",
"product": {
"name": "gdbserver-13.2-2.23.1.i586",
"product_id": "gdbserver-13.2-2.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.ppc64le",
"product": {
"name": "gdb-13.2-2.23.1.ppc64le",
"product_id": "gdb-13.2-2.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.ppc64le",
"product": {
"name": "gdb-testresults-13.2-2.23.1.ppc64le",
"product_id": "gdb-testresults-13.2-2.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.ppc64le",
"product": {
"name": "gdbserver-13.2-2.23.1.ppc64le",
"product_id": "gdbserver-13.2-2.23.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.s390",
"product": {
"name": "gdb-13.2-2.23.1.s390",
"product_id": "gdb-13.2-2.23.1.s390"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.s390",
"product": {
"name": "gdb-testresults-13.2-2.23.1.s390",
"product_id": "gdb-testresults-13.2-2.23.1.s390"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.s390",
"product": {
"name": "gdbserver-13.2-2.23.1.s390",
"product_id": "gdbserver-13.2-2.23.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.s390x",
"product": {
"name": "gdb-13.2-2.23.1.s390x",
"product_id": "gdb-13.2-2.23.1.s390x"
}
},
{
"category": "product_version",
"name": "gdb-32bit-13.2-2.23.1.s390x",
"product": {
"name": "gdb-32bit-13.2-2.23.1.s390x",
"product_id": "gdb-32bit-13.2-2.23.1.s390x"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.s390x",
"product": {
"name": "gdb-testresults-13.2-2.23.1.s390x",
"product_id": "gdb-testresults-13.2-2.23.1.s390x"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.s390x",
"product": {
"name": "gdbserver-13.2-2.23.1.s390x",
"product_id": "gdbserver-13.2-2.23.1.s390x"
}
},
{
"category": "product_version",
"name": "gdbserver-32bit-13.2-2.23.1.s390x",
"product": {
"name": "gdbserver-32bit-13.2-2.23.1.s390x",
"product_id": "gdbserver-32bit-13.2-2.23.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gdb-13.2-2.23.1.x86_64",
"product": {
"name": "gdb-13.2-2.23.1.x86_64",
"product_id": "gdb-13.2-2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "gdb-testresults-13.2-2.23.1.x86_64",
"product": {
"name": "gdb-testresults-13.2-2.23.1.x86_64",
"product_id": "gdb-testresults-13.2-2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "gdbserver-13.2-2.23.1.x86_64",
"product": {
"name": "gdbserver-13.2-2.23.1.x86_64",
"product_id": "gdbserver-13.2-2.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gdbserver-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64"
},
"product_reference": "gdbserver-13.2-2.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdbserver-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le"
},
"product_reference": "gdbserver-13.2-2.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdbserver-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x"
},
"product_reference": "gdbserver-13.2-2.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdbserver-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64"
},
"product_reference": "gdbserver-13.2-2.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdbserver-32bit-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
},
"product_reference": "gdbserver-32bit-13.2-2.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64"
},
"product_reference": "gdb-13.2-2.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le"
},
"product_reference": "gdb-13.2-2.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x"
},
"product_reference": "gdb-13.2-2.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64"
},
"product_reference": "gdb-13.2-2.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64"
},
"product_reference": "gdb-13.2-2.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le"
},
"product_reference": "gdb-13.2-2.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x"
},
"product_reference": "gdb-13.2-2.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gdb-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64"
},
"product_reference": "gdb-13.2-2.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-16829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16829"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16829",
"url": "https://www.suse.com/security/cve/CVE-2017-16829"
},
{
"category": "external",
"summary": "SUSE Bug 1068950 for CVE-2017-16829",
"url": "https://bugzilla.suse.com/1068950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-20T16:52:21Z",
"details": "low"
}
],
"title": "CVE-2017-16829"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-20T16:52:21Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2022-48064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48064"
}
],
"notes": [
{
"category": "general",
"text": "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48064",
"url": "https://www.suse.com/security/cve/CVE-2022-48064"
},
{
"category": "external",
"summary": "SUSE Bug 1214619 for CVE-2022-48064",
"url": "https://bugzilla.suse.com/1214619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-20T16:52:21Z",
"details": "low"
}
],
"title": "CVE-2022-48064"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…