Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in gdb
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in gdb
ID: SUSE-SU-2024:0899-1
Distribution: SUSE
Plattformen: SUSE Enterprise Storage 7.1, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise Server 15 SP2, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP2, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise High Performance Computing LTSS 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP2, SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3, SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
Datum: Do, 14. März 2024, 22:57
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064
Applikationen: GDB

Originalnachricht

--===============5049176773003063089==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for gdb

Announcement ID: SUSE-SU-2024:0899-1
Rating: moderate
References:

* bsc#1068950
* bsc#1081527
* bsc#1211052
* jsc#PED-6584


Cross-References:

* CVE-2017-16829
* CVE-2018-7208
* CVE-2022-48064


CVSS scores:

* CVE-2017-16829 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2017-16829 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-7208 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-7208 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48064 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
* CVE-2022-48064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H


Affected Products:

* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3



An update that solves three vulnerabilities and contains one feature can now be
installed.

## Description:

This update for gdb fixes the following issues:

* Drop libdebuginfod1 BuildRequires/Recommends. The former isn't needed
because there's a build requirement on libdebuginfod-devel already,
which
will pull the shared library. And the latter, because it's bogus since
RPM
auto generated dependency will take care of that requirement.

gdb was released in 13.2:

* This version of GDB includes the following changes and enhancements:

* Support for the following new targets has been added in both GDB and
GDBserver:

* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*


* The Windows native target now supports target async.

* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:

* set print nibbles [on|off]
* show print nibbles

* This controls whether the 'print/t' command will
display binary values in groups of four bits, known as "nibbles". The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or
developers. See the gdb/NEWS file for more details.


* Python API improvements:

* New Python API for instruction disassembly.

* The new attribute 'locations' of gdb.Breakpoint
returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that
formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current
language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the
prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the
frame's language.
* gdb.Value.format_string now uses the format provided by
'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary'
keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable
window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].


* GDB/MI changes:

* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit'
now contains an optional field locno.
* Miscellaneous improvements:

* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD)
for ELF.
* New convenience variable $_inferior_thread_count contains the number of
live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the
breakpoint number and the breakpoint location number of the breakpoint last hit.
* The "info breakpoints" now displays enabled
breakpoint locations of disabled breakpoints as in the "y-" state.
* The format of 'disassemble /r' and 'record
instruction-history /r' has changed to match the layout of GNU objdump when disassembling.

* A new format "/b" has been introduce to provide the
old behavior of "/r".
* The TUI no longer styles the source and assembly code highlighted by
the current position indicator by default. You can however re-enable styling using the new "set style tui-current-position" command.
* It is now possible to use the "document" command to
document user-defined commands.
* Support for memory tag data for AArch64 MTE.


* Support Removal notices:

* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is
now only possible to build GDB against Python 3.
* Support for the following commands has been removed:

* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv

* Use the "set/show debug solib" commands instead.


See the NEWS file for a more complete and detailed list of what this release
includes.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-899=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-899=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-899=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-899=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-899=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-899=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-899=1

## Package List:

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(aarch64
x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* gdbserver-13.2-150100.8.39.1
* gdbserver-debuginfo-13.2-150100.8.39.1
* gdb-debuginfo-13.2-150100.8.39.1
* gdb-debugsource-13.2-150100.8.39.1
* gdb-13.2-150100.8.39.1

## References:

* https://www.suse.com/security/cve/CVE-2017-16829.html
* https://www.suse.com/security/cve/CVE-2018-7208.html
* https://www.suse.com/security/cve/CVE-2022-48064.html
* https://bugzilla.suse.com/show_bug.cgi?id=1068950
* https://bugzilla.suse.com/show_bug.cgi?id=1081527
* https://bugzilla.suse.com/show_bug.cgi?id=1211052
* https://jira.suse.com/browse/PED-6584


--===============5049176773003063089==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for gdb</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:0899-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1068950">bsc#1068950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1081527">bsc#1081527</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211052">bsc#1211052</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-6584">jsc#PED-6584</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2017-16829.html">CVE-2017-16829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2018-7208.html">CVE-2018-7208</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48064.html">CVE-2022-48064</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-16829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-16829</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2018-7208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2018-7208</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE
Enterprise Storage 7.1</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3 LTSS 15-SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP3</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves three vulnerabilities and contains one
feature can now be installed.</p>





<h2>Description:</h2>

<p>This update for gdb fixes the following issues:</p>
<ul>
<li>Drop libdebuginfod1 BuildRequires/Recommends. The former
isn&#x27;t
needed because there&#x27;s a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it&#x27;s bogus since RPM auto generated dependency will take
care of that requirement.</li>
</ul>
<p>gdb was released in 13.2:</p>
<ul>
<li>
<p>This version of GDB includes the following changes and
enhancements:</p>
</li>
<li>
<p>Support for the following new targets has been added in both GDB and
GDBserver:</p>
<pre><code>* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
</code></pre>
</li>
<li>
<p>The Windows native target now supports target async.</p>
</li>
<li>Floating-point support has now been added on LoongArch
GNU/Linux.</li>
<li>
<p>New commands:</p>
<pre><code>* set print nibbles [on|off]
* show print nibbles

* This controls whether the &amp;#x27;print/t&amp;#x27; command will
display binary values in groups of four bits, known as &amp;quot;nibbles&amp;quot;. The default is &amp;#x27;off&amp;#x27;.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or
developers. See the gdb/NEWS file for more details.
</code></pre>
</li>
<li>
<p>Python API improvements:</p>
<pre><code> * New Python API for instruction disassembly.

* The new attribute &amp;#x27;locations&amp;#x27; of gdb.Breakpoint
returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that
formats ADDRESS as &amp;#x27;address &amp;#x27;
* New function gdb.current_language that returns the name of the current
language. Unlike gdb.parameter(&amp;#x27;language&amp;#x27;), this will never return &amp;#x27;auto&amp;#x27;.
* New function gdb.print_options that returns a dictionary of the prevailing
print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the
frame&amp;#x27;s language.
* gdb.Value.format_string now uses the format provided by
&amp;#x27;print&amp;#x27;, if it is called during a &amp;#x27;print&amp;#x27; or other similar operation.
* gdb.Value.format_string now accepts the &amp;#x27;summary&amp;#x27;
keyword. This can be used to request a shorter representation of a value, the way that &amp;#x27;set print frame-arguments scalars&amp;#x27; does.
* The gdb.register_window_type method now restricts the set of acceptable
window names. The first character of a window&amp;#x27;s name must start with a character in the set [a-zA-Z], every subsequent character of a window&amp;#x27;s name must be in the set [-_.a-zA-Z0-9].
</code></pre>
<ul>
<li>
<p>GDB/MI changes:</p>
<ul>
<li>MI version 1 is deprecated, and will be removed in GDB 14.</li>
<li>The async record stating the stopped reason
&#x27;breakpoint-hit&#x27; now contains an optional field locno. </li>
</ul>
</li>
</ul>
</li>
<li>
<p>Miscellaneous improvements:</p>
<pre><code> * gdb now supports zstd compressed debug sections
(ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of
live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the
breakpoint number and the breakpoint location number of the breakpoint last hit.
* The &amp;quot;info breakpoints&amp;quot; now displays enabled
breakpoint locations of disabled breakpoints as in the &amp;quot;y-&amp;quot; state.
* The format of &amp;#x27;disassemble /r&amp;#x27; and
&amp;#x27;record instruction-history /r&amp;#x27; has changed to match the layout of GNU objdump when disassembling.

* A new format &amp;quot;/b&amp;quot; has been introduce to provide
the old behavior of &amp;quot;/r&amp;quot;.
* The TUI no longer styles the source and assembly code highlighted by the
current position indicator by default. You can however re-enable styling using the new &amp;quot;set style tui-current-position&amp;quot; command.
* It is now possible to use the &amp;quot;document&amp;quot; command
to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
</code></pre>
</li>
<li>
<p>Support Removal notices:</p>
<pre><code> * DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now
only possible to build GDB against Python 3.
* Support for the following commands has been removed:

* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv

* Use the &amp;quot;set/show debug solib&amp;quot; commands instead.
</code></pre>
</li>
</ul>
<p>See the NEWS file for a more complete and detailed list of what this
release includes.</p>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP2-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP3-2024-899=1</code>



</li>

<li class="list-group-item">
SUSE Enterprise Storage 7.1


<br/>
<code>zypper in -t patch
SUSE-Storage-7.1-2024-899=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (aarch64 x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP3 (aarch64 x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
ppc64le s390x x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64
ppc64le s390x x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(ppc64le x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3
(ppc64le x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>



<li>
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
<ul>

<li>gdbserver-13.2-150100.8.39.1</li>


<li>gdbserver-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debuginfo-13.2-150100.8.39.1</li>


<li>gdb-debugsource-13.2-150100.8.39.1</li>

<li>gdb-13.2-150100.8.39.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2017-16829.html">https://www.suse.com/security/cve/CVE-2017-16829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2018-7208.html">https://www.suse.com/security/cve/CVE-2018-7208.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48064.html">https://www.suse.com/security/cve/CVE-2022-48064.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1068950">https://bugzilla.suse.com/show_bug.cgi?id=1068950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1081527">https://bugzilla.suse.com/show_bug.cgi?id=1081527</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211052">https://bugzilla.suse.com/show_bug.cgi?id=1211052</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-6584">https://jira.suse.com/browse/PED-6584</a>
</li>


</ul>

</div>

--===============5049176773003063089==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung